Autoplay
Autocomplete
Previous Lesson
Complete and Continue
SOC for Blue Teams
Training Overview
Description of Training
Video Overview (1:22)
Section : Introduction to Cyber Defense
Introduction (1:22)
Overview of Red & Blue team (6:49)
Section : Understanding Adversary Tactics
Bad Pyramid (8:52)
Collabaration of Red & Blue team (2:49)
Section : Roles and Responsibilities in Cyber Operations
Primary Roles & Responsibility (12:32)
Section : Cyber Threat Landscape and Frameworks
Understading the cyber threat landscape (7:31)
Overview of Mitre famework & Atomic red team (14:23)
Section : Log Analysis and Threat Detection
Log analysis with SplunK using custom log (14:53)
Log analysis using Splunk (8:26)
Section : Introduction to Malware Analysis
Dynamic & Static malware analysis (4:26)
Malware and its analysis (5:35)
Malware analysis using virrus total (5:21)
Section : Malware Analysis Techniques and Tactics
Techniques & tactics and behaviour of Malware analysis (16:46)
Techniques & tactics and behaviour of Malware analysis part 2 (11:17)
Section : Malware Analysis Process
Analyse the process of malware analysis (13:35)
Section : Network and File-Based Malware Analysis
Malware analysis on network layer (13:41)
Decompyling malware (17:14)
Decompyling malware using Pcap file (18:17)
Audio Version of Training
Audio Download
Understading the cyber threat landscape
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock