🔓
PURPLEBYTEONE
Ctrlk
  • main
  • Notes
    • Education
      • Base
        • Information Technology
        • Purple Team
          • Splunk
          • Security Team Blue
          • ISC2
          • TCM Security
          • Coursera
          • ICSI Global
          • OccupyTheWeb
          • CompTIA
          • EC-Council
          • Intel Techniques
          • SANS
          • IBM
          • Cybrary
          • Zero Point Security
          • Web Security Academy
          • INE
          • Pentester Lab
          • Pentester Academy
          • Offensive Security
          • Sektor7
          • Black Hat
          • Fortinet
          • VHL
          • DFIRdiva
          • YouTube
          • Udemy
          • AntiSyphon
          • THM
          • HTB
            • HTB Academy
              • Job Role Path
                • Penetration Tester
                • SOC Analyst
                  • Incident Handling Process
                  • Security Monitoring & SIEM Fundamentals
                  • Windows Event Logs & Finding Evil
                  • Introduction to Threat Hunting & Hunting With Elastic
                  • Understanding Log Sources & Investigating with Splunk
                  • Windows Attacks & Defense
                  • Intro to Network Traffic Analysis
                  • Intermediate Network Traffic Analysis
                  • Working with IDS/IPS
                  • Introduction to Malware Analysis
                  • JavaScript Deobfuscation
                  • YARA & Sigma for SOC Analysts
                  • Introduction to Digital Forensics
                  • Detecting Windows Attacks with Splunk
                  • Security Incident Reporting
            • Challenges
            • Machines
          • Blueteamlabs.online
          • LetsDefend.io
          • CyberDefenders.org
      • Infinity
    • Carrier
    • Note
  • Roadmap
Powered by GitBook
On this page
  1. Notes
  2. Education
  3. Base
  4. Purple Team
  5. HTB
  6. HTB Academy
  7. Job Role Path
  8. SOC Analyst

Windows Attacks & Defense