classifiedsuf.blogg.se

Learn ida pro
Learn ida pro










learn ida pro

Reverse engineering is a very important task in information security. Module 24 - Azure Sentinel - Using Custom Logs and DNSTwist to Monitor Malicious Similar DomainsĪzure Sentinel - Code Samples and projectsĪzure Security Center and Security Hygiene - Small Steps, Big Impact Module 23 - Azure Sentinel - Send Events with Filebeat and Logstash Module 22 - Azure Sentinel - Process Hollowing (T1055.012) Analysis Module 21 - How to build a Machine Learning Intrusion Detection system

learn ida pro

Module 20 - Red Teaming Attack Simulation with "Atomic Red Team" Module 19 - How to Perform Memory Analysis Module 18 - Getting Started with Reverse Engineering using Ghidra Module 16 - How to use Yara rules to detect malware Module 15 - How to Perform Static Malware Analysis with Radare2 Module 14 - Digital Forensics Fundamentals Module 13 - Hands-on Malicious Traffic Analysis with Wireshark Module 12 - Using MITRE ATT&CK to defend against Advanced Persistent Threats Module 11 - How to perform OSINT with Shodan Module 10 - How to Perform Open Source Intelligence (OSINT) with SpiderFoot Module 9 - How to use the MITRE PRE-ATT&CK framework to enhance your reconnaissance assessments Module 8 - Incident Response and Threat hunting with OSQuery and Kolide Fleet Module 7 - How to Install and use The Hive Project in Incident Management Module 6 - Threat Intelligence Fundamentals Module 5 - Hands-on Wazuh Host-based Intrusion Detection System (HIDS) Deployment Module 4 - Getting started using Microsoft Azure Sentinel (Cloud-Native SIEM and SOAR) Module 3 - How to deploy your Elastic Stack (ELK) SIEM Module 2 - TOP 20 Open-source tools every Blue Teamer should have Module 1 - Incident Response and Security Operations Fundamentals












Learn ida pro