sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me

Massarv9 Threat Logs

Session 13: Introduction to Blue TeamSession 13: Introduction to Blue Team
Session 13: Introduction to Blue Team
Session 14: Incident Handling/ResponseSession 14: Incident Handling/Response
Session 14: Incident Handling/Response
Session 15: Incident Handling/Response Part 2Session 15: Incident Handling/Response Part 2
Session 15: Incident Handling/Response Part 2
Session 16: Digital ForensicsSession 16: Digital Forensics
Session 16: Digital Forensics
Session 17: Digital Forensics Part 2Session 17: Digital Forensics Part 2
Session 17: Digital Forensics Part 2
Session 18: Secure Configuration Management (SCM)Session 18: Secure Configuration Management (SCM)
Session 18: Secure Configuration Management (SCM)
Session 19: Secure Configuration Management (SCM) Part 2Session 19: Secure Configuration Management (SCM) Part 2
Session 19: Secure Configuration Management (SCM) Part 2
Session 20: Threat Intelligence and Threat HuntingSession 20: Threat Intelligence and Threat Hunting
Session 20: Threat Intelligence and Threat Hunting
Session 21: Threat Intelligence and Threat Hunting Part 2Session 21: Threat Intelligence and Threat Hunting Part 2
Session 21: Threat Intelligence and Threat Hunting Part 2

©sameer fakhoury

GitHubLinkedIn