LetsDefend AcademyπŸ¦–

Training and skill assessment platform for blue team members

Course List

Incident Response

Basic Incident Response checklist

Phishing Campaign Analysis

Most common attack vector in SOC environment

Event Log Analysis

Detection cyber attacks from Windows Event Logs

Cyber Threat Intelligence

General concept about Cyber Threat Intelligence

SOC Fundamentals

What is SOC and how it works?


SIEM Introduction to 101

Malware Analysis

Malware analysis tutorials for beginners


Detection techniques for cyber-attacks