Memuat Detail Pengguna

Mengambil data dari API TryHackMe...

Mohon tunggu sebentar, proses ini mungkin memakan waktu beberapa detik

Detail Pengguna: fuadganss

Avatar

fuad bahreisy

Rank: 91845

Poin: None

Room Selesai: 68

Badge: 18

Negara: ID

Streak: 0

Aktivitas Harian

Badges

Gambar Badge Judul
First Four First Four
First Step into SOC First Step into SOC
3 Day Streak 3 Day Streak
SOC Apprentice SOC Apprentice
Defensive Toolsmith Defensive Toolsmith
Skilled Navigator Skilled Navigator
Phish Hunter Phish Hunter
Wireshark Wireshark
Network Hog Network Hog
Web Defender Web Defender

Room yang Telah Diselesaikan

Gambar Nama Room Kesulitan Tipe
Room Image MITRE Medium Walkthrough
Room Image Phishing Analysis Fundamentals Easy Walkthrough
Room Image Phishing Analysis Tools Easy Walkthrough
Room Image Phishing Emails in Action Easy Walkthrough
Room Image Junior Security Analyst Intro Easy Walkthrough
Room Image Phishing Prevention Easy Walkthrough
Room Image Pyramid Of Pain Easy Walkthrough
Room Image The Greenholt Phish Easy Challenge
Room Image Cyber Kill Chain Easy Walkthrough
Room Image Snort Medium Walkthrough
Room Image Intro to Malware Analysis Medium Walkthrough
Room Image NetworkMiner Easy Walkthrough
Room Image Elastic Stack: The Basics Medium Walkthrough
Room Image Unified Kill Chain Easy Walkthrough
Room Image ItsyBitsy Medium Challenge
Room Image Benign Medium Challenge
Room Image Wireshark: The Basics Easy Walkthrough
Room Image Intro to Cyber Threat Intel Easy Walkthrough
Room Image Wireshark: Packet Operations Easy Walkthrough
Room Image Introduction to SIEM Easy Walkthrough
Room Image Tempest Medium Challenge
Room Image Wireshark: Traffic Analysis Medium Walkthrough
Room Image Introduction to SOAR Medium Walkthrough
Room Image Splunk: The Basics Easy Walkthrough
Room Image Boogeyman 1 Medium Walkthrough
Room Image Snapped Phish-ing Line Easy Challenge
Room Image Intro to Logs Easy Walkthrough
Room Image Boogeyman 2 Medium Challenge
Room Image Boogeyman 3 Medium Challenge
Room Image Intro to Log Analysis Easy Walkthrough
Room Image Eviction Easy Walkthrough
Room Image Summit Easy Challenge
Room Image Log Operations Easy Walkthrough
Room Image IDS Fundamentals Easy Walkthrough
Room Image SOC L1 Alert Triage Easy Walkthrough
Room Image SOC L1 Alert Reporting Easy Walkthrough
Room Image SOC Workbooks and Lookups Easy Walkthrough
Room Image SOC Metrics and Objectives Easy Walkthrough
Room Image Windows Logging for SOC Easy Walkthrough
Room Image Windows Threat Detection 1 Medium Walkthrough
Room Image Windows Threat Detection 2 Medium Walkthrough
Room Image Detecting Web Shells Easy Walkthrough
Room Image File and Hash Threat Intel Easy Walkthrough
Room Image Windows Threat Detection 3 Medium Walkthrough
Room Image Humans as Attack Vectors Easy Walkthrough
Room Image Systems as Attack Vectors Easy Walkthrough
Room Image Log Analysis with SIEM Medium Walkthrough
Room Image SOC Role in Blue Team Easy Walkthrough
Room Image Web Security Essentials Easy Walkthrough
Room Image Network Discovery Detection Medium Walkthrough
Room Image Linux Logging for SOC Easy Walkthrough
Room Image IP and Domain Threat Intel Medium Walkthrough
Room Image Invite Only Easy Challenge
Room Image Detecting Web Attacks Easy Walkthrough
Room Image Man-in-the-Middle Detection Easy Walkthrough
Room Image Linux Threat Detection 1 Medium Walkthrough
Room Image Malware Classification Easy Walkthrough
Room Image Alert Triage With Splunk Medium Walkthrough
Room Image Introduction to EDR Easy Walkthrough
Room Image Network Security Essentials Easy Walkthrough
Room Image Detecting Web DDoS Easy Walkthrough
Room Image Linux Threat Detection 2 Medium Walkthrough
Room Image Shadow Trace Easy Challenge
Room Image Linux Threat Detection 3 Medium Walkthrough
Room Image Alert Triage With Elastic Medium Walkthrough
Room Image Network Traffic Basics Easy Walkthrough
Room Image Data Exfiltration Detection Medium Walkthrough
Room Image Living Off the Land Attacks Easy Walkthrough
Kembali ke Dashboard