SOC Roadmap "Rooms and Challanges zero 2 hero "

THM

Pre Security

What is Networking?

TryHackMe | What is Networking?

Introductory Networking

TryHackMe | Introductory Networking

Network Services

TryHackMe | Cyber Security Training

Network Services 2

TryHackMe | Cyber Security Training

Intro to LAN

TryHackMe | Intro to LAN

OSI Model

TryHackMe | Cyber Security Training

Packets & Frames

TryHackMe | Cyber Security Training

Extending Your Network

TryHackMe | Cyber Security Training

DNS in detail

TryHackMe | DNS in detail

HTTP in detail

TryHackMe | HTTP in detail

How websites work

TryHackMe | Cyber Security Training

Linux Fundamentals Part 1

TryHackMe | Linux Fundamentals Part 1

Linux Fundamentals Part 2

TryHackMe | Linux Fundamentals Part 2

Linux Fundamentals Part 3

TryHackMe | Linux Fundamentals Part 3

Windows Fundamentals 1

TryHackMe | Windows Fundamentals 1

Windows Fundamentals 2

TryHackMe | Windows Fundamentals 2

Windows Fundamentals 3

TryHackMe | Windows Fundamentals 3

Active Directory Basics

TryHackMe | Active Directory Basics

Principles of Security

SOC Theory & Pratical

Intro to Defensive Security

TryHackMe | Cyber Security Training

Security Operations

TryHackMe | Cyber Security Training

Network Analysis

Wireshark 101

TryHackMe | Cyber Security Training

Wireshark: The Basics [Walkthrough]

Wireshark: Packet Operations [Walkthrough]

Wireshark: Traffic Analysis [Walkthrough]

Carnage [Challenge]

Brim

Security Monitoring

Core Windows Processes

TryHackMe | Cyber Security Training

Sysinternals

TryHackMe | Cyber Security Training

Windows Event Logs

TryHackMe | Cyber Security Training

Sysmon

TryHackMe | Cyber Security Training

Osquery: The Basics

Wazuh

Cyber Kill Chain

Pyramid Of Pain

Introduction to SIEM

Splunk: Basics

TryHackMe | Cyber Security Training

Incident handling with Splunk

TryHackMe | Cyber Security Training

MITRE

Splunk 2

What the Shell?

Phishing Analysis

Phishing Analysis Fundamentals

Phishing Emails in Action

Phishing Analysis Tools

Phishing Prevention

The Greenholt Phish

Basic Forensics

Volatility

Windows Forensics 1

Windows Forensics 2

Linux Forensics

Redline

Autopsy

Disk Analysis & Autopsy

Threat and Vulnerability Management

Nessus

Yara

MISP

Intro to Malware Analysis

MAL: Malware Introductory

MAL: Strings

Basic Malware RE

MAL: REMnux - The Redux

----

CyberDefenders Challanges to improve your Skills

WireDive

CyberDefenders: WireDive blueteam challenge.

PacketMaze

CyberDefenders: PacketMaze blueteam challenge.

EscapeRoom

CyberDefenders: EscapeRoom blueteam challenge.

DeepDive

CyberDefenders: DeepDive blueteam challenge.

HawkEye

CyberDefenders: HawkEye blueteam challenge.

DumpMe

CyberDefenders: DumpMe blueteam challenge.

Malware Traffic Analysis 1

CyberDefenders: Malware Traffic Analysis 1 blueteam challenge.

Malware Traffic Analysis 2

CyberDefenders: Malware Traffic Analysis 2 blueteam challenge.

Malware Traffic Analysis 3

CyberDefenders: Malware Traffic Analysis 3 blueteam challenge.

Malware Traffic Analysis 4

CyberDefenders: Malware Traffic Analysis 4 blueteam challenge.

Malware Traffic Analysis 5

CyberDefenders: Malware Traffic Analysis 5 blueteam challenge.

Malware Traffic Analysis 6

CyberDefenders: Malware Traffic Analysis 6 blueteam challenge.

Seized

CyberDefenders: Seized blueteam challenge.

Pwned-DC

CyberDefenders: Pwned-DC blueteam challenge.

BankingTroubles

CyberDefenders: BankingTroubles blueteam challenge.

HoneyBOT

https://cyberdefenders.org/blueteam-ctf-challenges/45

Hunter

CyberDefenders: Hunter blueteam challenge.

Ulysses

CyberDefenders: Ulysses blueteam challenge.

Injector

CyberDefenders: Injector blueteam challenge.

Insider

CyberDefenders: Insider blueteam challenge.

Hacked

CyberDefenders: Hacked blueteam challenge.

CyberCorp Case 1

CyberDefenders: CyberCorp Case 1 blueteam challenge.

MrRobot

CyberDefenders: MrRobot blueteam challenge.

Hammered

CyberDefenders: Hammered blueteam challenge.

—

Elastic-Case

CyberDefenders: Elastic-Case blueteam challenge.

LTE Fallen Wall

CyberDefenders: LTE Fallen Wall blueteam challenge.

Boss Of The SOC v1

CyberDefenders: Boss Of The SOC v1 blueteam challenge.

Boss Of The SOC v2

CyberDefenders: Boss Of The SOC v2 blueteam challenge.

Qradar101

https://cyberdefenders.org/blueteam-ctf-challenges/39

Last updated