Courses and Resources

To shape your learning path.

5. YARA Rule Creation
5. YARA Rule Creation
Read More
4. Behavioral analysis
4. Behavioral analysis
Read More
3. Reverse engineering with IDA & Ghidra
3. Reverse engineering with IDA & Ghidra
Read More
2. Sandbox Evasion Techniques
2. Sandbox Evasion Techniques
Read More
1. Static & Dynamic Malware Analysis
1. Static & Dynamic Malware Analysis
Read More
5. Chain of Custody & Legal Considerations
5. Chain of Custody & Legal Considerations
Read More
4. Log Correlation & Timeline Analysis
4. Log Correlation & Timeline Analysis
Read More
3. Disk Forensics (The Sleuth Kit & Autopsy)
3. Disk Forensics (The Sleuth Kit & Autopsy)
Read More
2. Memory Forensics (Volatility)
2. Memory Forensics (Volatility)
Read More
1. IR lifecycle (NIST 800-61)
1. IR lifecycle (NIST 800-61)
Read More
4. Security Metrics & Key Performance Indicators (KPIs)
4. Security Metrics & Key Performance Indicators (KPIs)
Read More
3. Threat modeling (STRIDE, PASTA, LINDDUN)
3. Threat modeling (STRIDE, PASTA, LINDDUN)
Read More
2. Probabilistic Risk Modeling
2. Probabilistic Risk Modeling
Read More
1. Risk Frameworks: ISO 27005, FAIR
1. Risk Frameworks: ISO 27005, FAIR
Read More
5. Continuity Simulations
5. Continuity Simulations
Read More
4. Backup Strategies
4. Backup Strategies
Read More
3. Recovery Time Objectives (RTO/RPO)
3. Recovery Time Objectives (RTO/RPO)
Read More
2. Crisis Management
2. Crisis Management
Read More
1. Business Continuity (BCP) & Disaster Recovery (DRP)
1. Business Continuity (BCP) & Disaster Recovery (DRP)
Read More
3. Infrastructure as Code (IaC) Security
3. Infrastructure as Code (IaC) Security
Read More
2. Secrets Management
2. Secrets Management
Read More