SOC for Blue Teaming
Complete Practical Course on SOC for Blue Teaming with no filler. New
The Bad Pyramid
Collaboration Between Red and Blue Teams
Primary Roles and Responsibilities
Understanding the Cyber Threat Landscape
Overview of MITRE ATT&CK Framework and Atomic Red Team
Log Analysis Using Splunk
Custom Log Analysis with Splunk
Introduction to Malware and Its Analysis
Static and Dynamic Malware Analysis
Malware Analysis Using VirusTotal
Malware Analysis: Techniques, Tactics, and Behaviors (Part 1)
Malware Analysis: Techniques, Tactics, and Behaviors (Part 2)
Step-by-Step Malware Analysis Process
Malware Analysis at the Network Layer
Decompiling Malware
Decompiling Malware Using PCAP Files