 |
MITRE |
Explore the various resources that MITRE has made available to the cyber security community. |
Medium
|
Walkthrough
|
 |
Phishing Analysis Fundamentals |
Learn all the components that make up an email. |
Easy
|
Walkthrough
|
 |
Phishing Analysis Tools |
Learn the tools used to aid an analyst to investigate suspicious emails. |
Easy
|
Walkthrough
|
 |
Phishing Emails in Action |
Learn the different indicators of phishing attempts by examining actual phishing emails. |
Easy
|
Walkthrough
|
 |
Junior Security Analyst Intro |
Play through a day in the life of a Security Analyst and experience their everyday duties. |
Easy
|
Walkthrough
|
 |
Phishing Prevention |
Learn how to defend against phishing emails. |
Easy
|
Walkthrough
|
 |
Pyramid Of Pain |
Learn what is the Pyramid of Pain and how to utilize this model to determine the level of difficulty it will cause for an adversary to change the indicators associated with them, and their campaign. |
Easy
|
Walkthrough
|
 |
Cyber Kill Chain |
The Cyber Kill Chain framework is designed for identification and prevention of the network intrusions. You will learn what the adversaries need to do in order to achieve their goals. |
Easy
|
Walkthrough
|
 |
Offensive Security Intro |
Hack your first website (legally in a safe environment) and experience an ethical hacker's job. |
Easy
|
Walkthrough
|
 |
Elastic Stack: The Basics |
Understand how SOC analysts use the Elastic Stack (ELK) for log investigations. |
Medium
|
Walkthrough
|
 |
Unified Kill Chain |
The Unified Kill Chain is a framework which establishes the phases of an attack, and a means of identifying and mitigating risk to IT assets. |
Easy
|
Walkthrough
|
 |
Careers in Cyber |
Learn about the different careers in cyber security. |
Info
|
Walkthrough
|
 |
Introduction to SIEM |
Learn the fundamentals of SIEM and explore its features and functionality. |
Easy
|
Walkthrough
|
 |
Introduction to SOAR |
Learn the concepts and methodology surrounding security orchestration, automation, and response. |
Medium
|
Walkthrough
|
 |
Splunk: The Basics |
Understand how SOC analysts use Splunk for log investigations. |
Easy
|
Walkthrough
|
 |
Eviction |
Unearth the monster from under your bed. |
Easy
|
Walkthrough
|
 |
Summit |
Can you chase a simulated adversary up the Pyramid of Pain until they finally back down? |
Easy
|
Challenge
|
 |
SOC L1 Alert Triage |
Learn more about SOC alerts and build a systematic approach to efficiently triaging them. |
Easy
|
Walkthrough
|
 |
SOC L1 Alert Reporting |
Learn how to properly report, escalate, and communicate about high-risk SOC alerts. |
Easy
|
Walkthrough
|
 |
SOC Workbooks and Lookups |
Discover useful corporate resources to help you structure and simplify L1 alert triage. |
Easy
|
Walkthrough
|
 |
SOC Metrics and Objectives |
Explore key metrics driving SOC effectiveness and discover ways to improve them. |
Easy
|
Walkthrough
|
 |
Humans as Attack Vectors |
Understand why and how people are targeted in cyber attacks and how the SOC helps defend them. |
Easy
|
Walkthrough
|
 |
Systems as Attack Vectors |
Learn how attackers exploit vulnerable and misconfigured systems, and how you can protect them. |
Easy
|
Walkthrough
|
 |
SOC Role in Blue Team |
Discover security roles and learn how to advance your SOC career, starting from the L1 analyst. |
Easy
|
Walkthrough
|
 |
Defensive Security Intro |
Introducing defensive security, what it involves and looks like within the real-world, as well as the technologies involved. |
Easy
|
Walkthrough
|
 |
Introduction to EDR |
Learn the fundamentals of EDR and explore its features and working. |
Easy
|
Walkthrough
|