Free Learning Resources
Cyber Threat Intelligence
Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
Threat Intelligence with MISP: Part 4 – Using Feeds
Threat Profiling: How to Understand Hackers and Their TTPs
What Are Intelligence Requirements? A Comprehensive Guide
The Traffic Light Protocol: How to Classify Cyber Threat Intelligence
5 Cyber Kill Chain Challenges and How to Prevail
YARA Rules: Empower Your Security With Custom Detections
The Cyber Kill Chain: How to Map and Analyze Cyber Attacks
Crown Jewel Analysis: How to Figure Out What to Protect
Cyber Threat Intelligence Report Template (+FREE Download)Â
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.Elevate Your Threat Detections Using the Almighty Pyramid of Pain
How to Optimize Data Sources: Collection Management Framework
Hunting for Persistence with Cympire: Part I — Registry Run Keys
How to Create a Home Lab: Virtualize all the Things!
Python Threat Hunting Tools Part 7 — Parsing CSV
Unraveling the Courses of Action Matrix: Full Guide to CoA
Python Threat Hunting Tools: Part 9 — Creating Python Packages with Poetry
Python Threat Hunting Tools: Part 4 — Browser Automation
Threat Hunting With Velociraptor III – Hunting Demo
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
Discover MITRE’s CTI Blueprints: A Revolutionary New Project
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Let Us Find Out Whodunit
Python Threat Hunting Tools: Part 2 — Web Scraping
Web Scraping Cyber Threat Intelligence Using Octoparse: Full Guide
Netlas.io: A Powerful Suite of Tools for Threat Hunting
How to Create a Local Kubernetes Cluster: Terraform and Ansible
How to Create a Home Lab: Virtualize all the Things!
Malware Configuration Parsers: An Essential Hunting Tool
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don’t miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.