Welcome to my page where I share and document the exciting projects, labs, various trainings and publications I'm currently involved in. Feel free to kick back, relax, and enjoy the content I have in store for you! πππ
- Home SOC Analyst Lab
- Getting Started in Security and MITRE ATT&CK Labs
- SOC Core Skills Labs
- Active Defense & Cyber Deception Labs
- Security Blue Team Labs
- Google Cybersecurity Professional Wireshark Activity
- TryHackMe Rooms
- SC-900: Microsoft Security, Compliance, and Identity
- ISC2 Certified in Cybersecurity
- Google Cybersecurity Professional
- Getting Started with Elastic Stack for the Security Analyst
- Level 1 - Cyber Threat Hunting Training
- SOC Core Skills with John Strand
- Active Defense & Cyber Deception with John Strand
- How to Annoy Attackers with John Strand
- Cyber Threat Hunting
- Access Granted - Practical Physical
- Infiltrating Kubernetes - Attacker Motives and Methods
- Unveiling the Breach - A Security Analyst's Journey
- Threat Hunting using Memory Forensics
- Getting Started in Security with BHIS and MITRE ATT&CK | John Strand
- Security Blue Team Junior Analyst - Introduction to OSINT
- Security Blue Team Junior Analyst - Introduction to Network Analysis
- API-ocalypse Now
- Log File Analysis
- Credential Compartmentalization in Active Directory
- ARP Cache Poisoning
- Bring Your Own Vulnerable Driver (BYOVD) Attacks
- Exploring PowerShell Logging
- Antisyphon Blue Team Summit 2023
- Foundations of Cybersecurity
- Play It Safe: Manage Security Risks
- Connect and Protect: Networks and Network Security
- Tools of the Trade: Linux and SQL
- Assets, Threats, and Vulnerabilities
- Sound the Alarm: Detection and Response
- Automate Cybersecurity Tasks with Python
- Put It to Work: Prepare for Cybersecurity Jobs
- Network Analysis
- OSINT
- [Digital Forensics]
- [Dark Web Operations]
- [Threat Hunting]
- [Vulnerability Management]
- [Active Directory Homelab]
- [Python]
- SQL