Introduction to Endpoint Hunting
Malware Overview Part 1
Malware Overview Part 2
Malware Overview Part 3
Malware Overview Part 4
Malware Overview Part 5
Hunting Malware Part 1
Hunting Malware Part 2
Lab: Malware Hunting Part 1
Lab: Malware Hunting Part 2
Lab: Malware Hunting Part 3
Event IDs, Logging, & SIEMs Part 1
Event IDs, Logging, & SIEMs Part 2
Lab: ELK Part 1
Lab: ELK Part 2
Lab: Splunk Part 1
Lab: Splunk Part 2
Lab: Splunk Part 3
محمد عيبان