Cyber Security Incident Response Explained | Preparation Phase | TryHackMe Preparation
We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification…
We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification…
We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact…
We covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed…
We covered threat emulation using Caldera which is a popular tool that can be used to emulate…
We covered how to harden and secure Windows workstations from both the identity management and network side.This…
We solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and…
We covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a…
We covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing…
We covered DNS tunneling technique along with SSH Dynamic port forwarding that are used to perform DNS…
We covered a scenario of Windows machine compromised with a fake 7z archiving tools designed to infect…
We covered a threat hunting challenge that involved hunting Windows event logs exported from a compromised machine…
We covered a threat hunting challenge using elastic search where we demonstrated searching and analyzing logs to…
We covered a CTF scenario where we started with nmap scanning followed by enumeration of the web…
We covered the first part of buffer overflow training using TryHackMe Buffer Overflow room which is part…
We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine…
We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover…
Introduction We covered live forensics of a Linux workstation suspected of being infected with malware. We analyzed…
We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt…
We covered a very easy penetration testing challenge where we started with an Nmap scan followed by…