Threat Detection & Analysis

Developing the analytical mindset: from log aggregation to incident response lifecycle management.

Hunting and Remediation Strategies

Learn to identify suspicious activities by analyzing logs (SIEM), conducting basic packet inspection, and applying the standard incident response methodology to contain and eradicate threats.

  • Log Analysis & Correlation (Splunk/ELK)
  • Packet Capture Interpretation (Wireshark)
  • The Kill Chain & MITRE ATT&CK Framework

Ready for the Next Phase?

Back to Modules