Foundational
Application Security Overview
Intermediate
ASCII and JSON Logs: Interpreting and Processing
Intermediate
Baselining on Windows: Introduction
Intermediate
Basic Malware Analysis Exercise
Intermediate
Basic Malware Analysis Workshop
Foundational
Docker Fundamentals
Intermediate
Elastic Configuration and Data Ingestion
Intermediate
Elastic Endpoint Forwarders
Foundational
Elastic Incident Investigation
Foundational
Elastic Manual Uploads
Foundational
Elastic Overview
Intermediate
Encrypted Traffic Forensics: CA and Issuance
Intermediate
Encrypted Traffic Forensics: Introduction
Intermediate
Encrypted Traffic Forensics: JA3, JA3S, and Other Tools
Intermediate
Endpoint Security with HBSS/ESS
Foundational
Flow Control in PowerShell
Intermediate
Follina Defense: Legacy Threat
Foundational
Git: Introduction
Intermediate
Host Analyst Exercise: Threat Hunting and Incident Response
Advanced
Host Analyst: APT28 Exercise
Foundational
Host Analyst: APT28 Workshop 1
Intermediate
Host Analyst: APT28 Workshop 2
Advanced
Host Analyst: APT34 Exercise
Foundational
Host Analyst: APT34 Workshop 1
Intermediate
Host Analyst: APT34 Workshop 2
Advanced
Host Analyst: APT38 Exercise
Foundational
Host Analyst: APT38 Workshop 1
Intermediate
Host Analyst: APT38 Workshop 2
Advanced
Host Analyst: APT40 Exercise
Foundational
Host Analyst: APT40 Workshop 1
Intermediate
Host Analyst: APT40 Workshop 2
Foundational
ICS Foundations: Attacks
Foundational
ICS Foundations: Introduction
Foundational
ICS Foundations: Modbus-CLI and PLC Interaction
Foundational
ICS Foundations: Network Defense
Foundational
ICS Foundations: PLCs and Ladder Logic
Foundational
ICS Foundations: Protocols
Foundational
ICS Foundations: Ransomware
Foundational
Identifying Indicators of Compromise
Foundational
Integration Testing in CI
Intermediate
Kibana Data Visualization
Intermediate
Kibana SIEM Application
Foundational
Kibana: Introduction
Foundational
Linux Firewall
Intermediate
Log4Shell Defense: Legacy Threat
Foundational
MITRE ATT&CK Framework
Foundational
MITRE ATT&CK Practical Use
Intermediate
MITRE ATT&CK Threat Mapping
Intermediate
Modifying Zeek Scripts
Intermediate
Network Analyst Exercise: Network Threat Hunting
Intermediate
Network Analyst Walkthrough: ASCII and JSON Logging
Intermediate
Network Analyst Walkthrough: Modifying Zeek Scripts
Intermediate
Network Analyst Walkthrough: Packet Capture and Analysis
Foundational
Network Device Configuration
Foundational
Network Firewalls
Intermediate
Network Remediation: Introduction
Foundational
NetworkMiner: Introduction
Foundational
Open-Source Intelligence (OSINT) Techniques
Foundational
Operational Security 101
Intermediate
Parsing Network Traffic with Zeek
Foundational
PowerShell: Introduction
Advanced
PrintNightmare Defense: Legacy Threat
Advanced
ProxyLogon Defense: Legacy Threat
Intermediate
Secure Coding
Foundational
Secure SDLC: Deployment and Maintenance
Foundational
Secure SDLC: Development
Foundational
Secure SDLC: Requirements and Design
Foundational
Secure SDLC: Testing
Foundational
Security Operations Center (SOC) Overview
Intermediate
Security Testing
Advanced
SIEM Walkthrough: Incident Response
Foundational
SIEM: Conceptual Introduction
Intermediate
SIEM: Practical Introduction
Intermediate
Sigma: Introduction
Intermediate
SIP Telephony
Foundational
SOC: Incident Response
Foundational
SOC: Security Monitoring
Foundational
SOC: Threat Hunting
Intermediate
Splunk Configuration and Data Ingestion
Advanced
Splunk Enterprise Security
Foundational
Splunk Forwarders and Normalization
Foundational
Splunk Incident Investigation
Foundational
Splunk Overview
Foundational
Splunk Post Incident Investigation Actions
Foundational
Splunk Searching
Intermediate
Suricata Rule Writing
Foundational
Suricata: Introduction
Foundational
System Monitor (Sysmon)
Foundational
Threat Hunting in Windows Files
Intermediate
Threat Hunting Physical Devices
Intermediate
Threat Hunting with IOCs Exercise
Foundational
Threat Hunting with IOCs Workshop
Foundational
Threat Hunting with MITRE ATT&CK®
Foundational
Threat Modeling
Foundational
Unit Testing in CI
Foundational
Volatility: Introduction
Intermediate
Vulnerability Remediation
Intermediate
Windows Event Forwarding
Foundational
Windows Libraries: Introduction
Foundational
Windows Memory Analysis: Introduction
Foundational
Windows Processes: Introduction
Foundational
YARA and Signature-Based Writing