sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
NCSC Massarv9 Blue Teaming Extended Notes

NCSC Massarv9 Blue Teaming Extended Notes

These notes serve as external references that have been provided. They do not contain the full content but act as a repository for external knowledge and material for reference.

Massarv9 Threat Logs

Session 13: Introduction to Blue TeamSession 13: Introduction to Blue Team
Session 13: Introduction to Blue Team
Session 14: Incident Handling/ResponseSession 14: Incident Handling/Response
Session 14: Incident Handling/Response
Session 15: Incident Handling/Response Part 2Session 15: Incident Handling/Response Part 2
Session 15: Incident Handling/Response Part 2
Session 16: Digital ForensicsSession 16: Digital Forensics
Session 16: Digital Forensics
Session 17: Digital Forensics Part 2Session 17: Digital Forensics Part 2
Session 17: Digital Forensics Part 2
Session 18: Secure Configuration Management (SCM)Session 18: Secure Configuration Management (SCM)
Session 18: Secure Configuration Management (SCM)
Session 19: Secure Configuration Management (SCM) Part 2Session 19: Secure Configuration Management (SCM) Part 2
Session 19: Secure Configuration Management (SCM) Part 2
Session 20: Threat Intelligence and Threat HuntingSession 20: Threat Intelligence and Threat Hunting
Session 20: Threat Intelligence and Threat Hunting
Session 21: Threat Intelligence and Threat Hunting Part 2Session 21: Threat Intelligence and Threat Hunting Part 2
Session 21: Threat Intelligence and Threat Hunting Part 2

©sameer fakhoury

GitHubLinkedIn