Admin, Labs
New labWindows Logon Anomaly Triage
Intro Defensive Investigation
PowerShell Execution Review
Intro Defensive Investigation
Webshell Hunting Intro
Intro Defensive Investigation
Host Discovery Basics
Nmap Fundamentals
Turning Scan Output into Findings
Nmap Fundamentals
Top Ports and Service Detection
Nmap Fundamentals
Version Detection and Default Scripts
Nmap Fundamentals
Map a Small Web Attack Surface
Nmap Fundamentals
Attachment Review Without Detonation
SOC Analyst – Phishing Email Investigation
BEC Wire Fraud Attempt
SOC Analyst – Phishing Email Investigation
Suspicious Invoice Header Triage
SOC Analyst – Phishing Email Investigation
Link Inspection and Redirect Hunt
SOC Analyst – Phishing Email Investigation
Microsoft 365 Credential Harvest
SOC Analyst – Phishing Email Investigation
DNS Beaconing Clues
Wireshark Fundamentals
Simple Exfiltration Over HTTP
Wireshark Fundamentals
HTTP Credentials in Cleartext
Wireshark Fundamentals
SMB Lateral Movement Clues
Wireshark Fundamentals
TLS Handshake Basics
Wireshark Fundamentals