-
0 Videos
-
0 Quizzes
-
3 Worksheets
-
10 Files
-
Introduction to SOC
-
Career as Cyber Security Analyst-Mindset
-
Security Operation Center-Team
-
Security Operation Analyst Responsibilities
-
PAIN OF PYRAMID
-
CYBER KILL CHAIN
-
DIAMOND MODEL
-
MITRE ATT&CK
-
UNIFIED KILL CHAIN
-
Commonly used cyber defense frameworks
-
Introduction
-
Cyber Threat Intelligence
-
CTI Lifecycle
-
CTI Standards & Frameworks
-
Practical Analysis
-
Introduction to Network Security, Network Data, and Traffic Analysis
-
Network Security and Network Data
-
Traffic Analysis
-
Introduction
-
Endpoint Security Fundamentals
-
Endpoint Login and Monitoring
-
Event Log Analysis
-
Introduction
-
Investigating with SIEM Tools
-
Phishing Analysis
-
Phishing Emails in Action
-
Phishing Analysis Tools
-
Phishing Prevention
-
The Greenholt Phish