Section 1: Cyber Defense Framework

Section 2: Cyber Threat Intelligence

  • Intro to Cyber Threat Intel
  • Threat Intelligence Tools
  • Yara
  • OpenCTI
  • MISP

Section 3: Network Security and Traffic Analysis

  • Traffic Analysis Essentials
  • Snort
  • Snort Challenge - The Basics
  • Snort Challenge - Live Attacks
  • NetworkMiner
  • Zeek
  • Zeek Exercises
  • Brim
  • Wireshark: The Basics
  • Wireshark: Packet Operations
  • Wireshark: Traffic Analysis

Section 4: Endpoint Security Monitoring

  • Intro to Endpoint Security
  • Core Windows Processes
  • Sysinternals
  • Windows Event Logs
  • Sysmon
  • Osquery: The Basics
  • Wazuh!!!!!!!!

Section 5: SIEM - Security Information and Even Management

  • Introduction to SIEM
  • Investigating with ELK 101
  • ItsyBitsy
  • Splunk: Basics
  • Incident handling with Splunk
  • Investigating with Splunk
  • Benign

Section 6: Digital Forensics and Incident Response

  • DFIR: An Introduction
  • Windows Forensics 1
  • Windows Forensics 2
  • Linux Forensics
  • Autopsy
  • Redline
  • KAPE
  • Volatility
  • Velociraptor
  • TheHive Project
  • Intro to Malware Analysis

Section 7: Phishing

  • Phishing Analysis Fundamentals
  • Phishing Emails in Action
  • Phishing Analysis Tools
  • Phishing Prevention
  • The Greenholt Phish