mrBraun
Servidae: Log Analysis in ELK TryHackMe WalkThrough
Alert Triage With Elastic TryHackMe Walkthrough
Alert Triage With Splunk TryHackMe WalkThrough
Log Analysis with SIEM TryHAckMe WalkThrough
Invite Only TryHackMe WalkThrough
IP and Domain Threat Intel TryHackMe WalkThrough
File and Hash Threat Intel TryHackMe WalkThrough
Shadow Trace TryHackMe WalkThrough
Living Off the Land Attacks TryHackMe WalktThrough
Malware Classification TryHackMe WalkThrough
Linux Threat Detection 3 TryHackMe WalkThrough
Linux Threat Detection 2 TryHackMe WalkThrough
Linux Threat Detection 1 TryHackMe WalkThrough
Linux Logging for SOC TryHackMe WalkThrough
Windows Threat Detection 3 TryHackMe WalkThrough
Windows Threat Detection 2 TryHackMe WalkThrough
Detecting Web DDoS TryHackMe WalkThrough
Detecting Web Shell TryHackMe WalkThrough
Detecting Web Attacks TryHackMe WalkThrough
Web Security Essential TryHackMe WalkThrough
Man-in-the-Middle Detection TryHackMe WalkThrough
Data Exfiltration Detection TryHackMe Walkthrough
Network Discovery Detection TryHackMe WalkThrough
Network Security Essentials TryHackMe WalkThrough
Network Traffic Basics TryHackMe WalkThrough
Phishing Unfolding TryHackMe WalkThrough
Introduction to EDR TryHackMe WalkThrough
SOC Workbooks and Lookups TryHackMe WalkThrough
SOC L1 Alert Reporting TryHackMe WalkThrough
SOC L1 Alert Triage TryHackMe WalkThrough