📖
Medhat Fathy
  • Whoami
  • cyber kill chain Arabic
  • Incident Response Process Arabic
  • PythonScripts
  • BTL1 Notes
  • Threat Hunting Hypothesis
  • writesUp
    • Boss Of The Soc V1
    • Network Hunting with zeek & wireshak
    • Hammered Cyberdefenders
    • Hacked Cyberdefenders
    • HireMe CyberDefenders
    • Sysinternals cyberdefenders
    • Hunting .Net Malware
    • Unattended TryHackMe
    • Disgruntled TryHackMe
    • RDP Cache Forensics
  • Use Case With elk
  • Hunting with elk
  • hunting with Splunk
  • Digital Forensics
  • SOC Roadmap "Rooms and Challanges zero 2 hero "
  • SOC Roadmap for Cat Reloaded Team
  • Soc Interviews
  • Investigating with Windows Event Logs
  • Detect AD attacks
  • Hunt Evil
  • cs
  • Crowdstrike Random
  • Random Notes
  • KQL
  • Threat Hunting series
    • Hunting with ATP
      • Hunting Attacks Using ATP part 2
      • Hunting Attacks Using ATP part 1
  • CTHPv2 prep
    • Introduction to Threat Hunting
    • Threat Hunting Terminology
    • Threat Intelligence
    • Practical Exercise on threat intelligence
  • Attacks & Detections
    • part 1
    • part 2
    • part 3
    • Part 4
    • Part 5
    • Part 6
    • Part 7
Powered by GitBook
On this page
  • Pre Security
  • SOC Theory & Pratical
  • Network Analysis
  • Security Monitoring
  • Osquery: The Basics
  • Phishing Analysis
  • Basic Forensics
  • Threat and Vulnerability Management
  • Basic MAL Analysis “ optional” “ Recommended”

SOC Roadmap "Rooms and Challanges zero 2 hero "

PreviousDigital ForensicsNextSOC Roadmap for Cat Reloaded Team

Last updated 1 year ago

THM

Pre Security

What is Networking?

Introductory Networking

Network Services

Network Services 2

Intro to LAN

OSI Model

Packets & Frames

Extending Your Network

DNS in detail

HTTP in detail

How websites work

Linux Fundamentals Part 1

Linux Fundamentals Part 2

Linux Fundamentals Part 3

Windows Fundamentals 1

Windows Fundamentals 2

Windows Fundamentals 3

Active Directory Basics

Principles of Security

SOC Theory & Pratical

Intro to Defensive Security

Security Operations

Network Analysis

Wireshark 101

Wireshark: The Basics [Walkthrough]

Wireshark: Packet Operations [Walkthrough]

Wireshark: Traffic Analysis [Walkthrough]

Carnage [Challenge]

Brim

Security Monitoring

Core Windows Processes

Sysinternals

Windows Event Logs

Sysmon

Osquery: The Basics

Wazuh

Cyber Kill Chain

Pyramid Of Pain

Introduction to SIEM

Splunk: Basics

Incident handling with Splunk

MITRE

Splunk 2

What the Shell?

Phishing Analysis

Phishing Analysis Fundamentals

Phishing Emails in Action

Phishing Analysis Tools

Phishing Prevention

The Greenholt Phish

Basic Forensics

Volatility

Windows Forensics 1

Windows Forensics 2

Linux Forensics

Redline

Autopsy

Disk Analysis & Autopsy

Threat and Vulnerability Management

Nessus

Yara

MISP

Basic MAL Analysis “ optional” “ Recommended”

Intro to Malware Analysis

MAL: Malware Introductory

MAL: Strings

Basic Malware RE

MAL: REMnux - The Redux

----

CyberDefenders Challanges to improve your Skills

WireDive

PacketMaze

EscapeRoom

DeepDive

HawkEye

DumpMe

Malware Traffic Analysis 1

Malware Traffic Analysis 2

Malware Traffic Analysis 3

Malware Traffic Analysis 4

Malware Traffic Analysis 5

Malware Traffic Analysis 6

Seized

Pwned-DC

BankingTroubles

HoneyBOT

Hunter

Ulysses

Injector

Insider

Hacked

CyberCorp Case 1

MrRobot

Hammered

—

Elastic-Case

LTE Fallen Wall

Boss Of The SOC v1

Boss Of The SOC v2

Qradar101

TryHackMe | What is Networking?
TryHackMe | Introductory Networking
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Intro to LAN
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | DNS in detail
TryHackMe | HTTP in detail
TryHackMe | Cyber Security Training
TryHackMe | Linux Fundamentals Part 1
TryHackMe | Linux Fundamentals Part 2
TryHackMe | Linux Fundamentals Part 3
TryHackMe | Windows Fundamentals 1
TryHackMe | Windows Fundamentals 2
TryHackMe | Windows Fundamentals 3
TryHackMe | Active Directory Basics
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
TryHackMe | Cyber Security Training
CyberDefenders: WireDive blueteam challenge.
CyberDefenders: PacketMaze blueteam challenge.
CyberDefenders: EscapeRoom blueteam challenge.
CyberDefenders: DeepDive blueteam challenge.
CyberDefenders: HawkEye blueteam challenge.
CyberDefenders: DumpMe blueteam challenge.
CyberDefenders: Malware Traffic Analysis 1 blueteam challenge.
CyberDefenders: Malware Traffic Analysis 2 blueteam challenge.
CyberDefenders: Malware Traffic Analysis 3 blueteam challenge.
CyberDefenders: Malware Traffic Analysis 4 blueteam challenge.
CyberDefenders: Malware Traffic Analysis 5 blueteam challenge.
CyberDefenders: Malware Traffic Analysis 6 blueteam challenge.
CyberDefenders: Seized blueteam challenge.
CyberDefenders: Pwned-DC blueteam challenge.
CyberDefenders: BankingTroubles blueteam challenge.
https://cyberdefenders.org/blueteam-ctf-challenges/45
CyberDefenders: Hunter blueteam challenge.
CyberDefenders: Ulysses blueteam challenge.
CyberDefenders: Injector blueteam challenge.
CyberDefenders: Insider blueteam challenge.
CyberDefenders: Hacked blueteam challenge.
CyberDefenders: CyberCorp Case 1 blueteam challenge.
CyberDefenders: MrRobot blueteam challenge.
CyberDefenders: Hammered blueteam challenge.
CyberDefenders: Elastic-Case blueteam challenge.
CyberDefenders: LTE Fallen Wall blueteam challenge.
CyberDefenders: Boss Of The SOC v1 blueteam challenge.
CyberDefenders: Boss Of The SOC v2 blueteam challenge.
https://cyberdefenders.org/blueteam-ctf-challenges/39
TryHackMe | Principles of SecurityTryHackMe
TryHackMe | Wireshark: The BasicsTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | CarnageTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | WazuhTryHackMe
TryHackMe | WazuhTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Pyramid Of PainTryHackMe
TryHackMe | Introduction to SIEMTryHackMe
TryHackMe | MITRETryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Phishing Emails 1TryHackMe
TryHackMe | Phishing Emails 2TryHackMe
Logo
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
Logo
TryHackMe | VolatilityTryHackMe
TryHackMe | Windows Forensics 1TryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
Logo
Logo
Logo
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | RedlineTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
Logo
Logo
Logo
Logo
TryHackMe | NessusTryHackMe
TryHackMe | YaraTryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
Logo
TryHackMe | Cyber Security TrainingTryHackMe
Logo
Logo
TryHackMe | MAL: Malware IntroductoryTryHackMe
Logo
TryHackMe | Cyber Security TrainingTryHackMe
Logo
TryHackMe | Basic Malware RETryHackMe
TryHackMe | Cyber Security TrainingTryHackMe
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo