Lesson 1:
PAIN OF PYRAMID
Lesson 2:
CYBER KILL CHAIN
Lesson 3:
DIAMOND MODEL
Lesson 4:
MITRE ATT&CK
Lesson 5:
UNIFIED KILL CHAIN
Lesson 6:
Commonly used cyber defense frameworks
Lesson 1:
Introduction
Lesson 2:
Cyber Threat Intelligence
Lesson 3:
CTI Lifecycle
Lesson 4:
CTI Standards & Frameworks
Lesson 5:
Practical Analysis
Lesson 1:
Introduction to Network Security, Network Data, and Traffic Analysis
Lesson 2:
Network Security and Network Data
Lesson 3:
Traffic Analysis
Lesson 1:
Introduction
Lesson 2:
Endpoint Security Fundamentals
Lesson 3:
Endpoint Login and Monitoring
Lesson 4:
Event Log Analysis
Lesson 1:
Introduction
Lesson 2:
Investigating with SIEM Tools
Lesson 1:
Phishing Analysis
Lesson 2:
Phishing Emails in Action
Lesson 3:
Phishing Analysis Tools
Lesson 4:
Phishing Prevention
Comments are closed.