Section 1: Cyber Defense Framework
Section 2: Cyber Threat Intelligence
- Intro to Cyber Threat Intel
- Threat Intelligence Tools
- Yara
- OpenCTI
- MISP
Section 3: Network Security and Traffic Analysis
- Traffic Analysis Essentials
- Snort
- Snort Challenge - The Basics
- Snort Challenge - Live Attacks
- NetworkMiner
- Zeek
- Zeek Exercises
- Brim
- Wireshark: The Basics
- Wireshark: Packet Operations
- Wireshark: Traffic Analysis
Section 4: Endpoint Security Monitoring
- Intro to Endpoint Security
- Core Windows Processes
- Sysinternals
- Windows Event Logs
- Sysmon
- Osquery: The Basics
- Wazuh!!!!!!!!
- Introduction to SIEM
- Investigating with ELK 101
- ItsyBitsy
- Splunk: Basics
- Incident handling with Splunk
- Investigating with Splunk
- Benign
Section 6: Digital Forensics and Incident Response
- DFIR: An Introduction
- Windows Forensics 1
- Windows Forensics 2
- Linux Forensics
- Autopsy
- Redline
- KAPE
- Volatility
- Velociraptor
- TheHive Project
- Intro to Malware Analysis
Section 7: Phishing
- Phishing Analysis Fundamentals
- Phishing Emails in Action
- Phishing Analysis Tools
- Phishing Prevention
- The Greenholt Phish