Begin understanding how attackers think by performing threat profiling to map out how they might attack your organization using the MITRE ATT&CK matrix.
Discover how the cyber world is shifting to a new era of employment with the emergence of the gig economy so you can take advantage of it and stay relevant.
Learn the key components of incident response playbooks, how to create your own, and the best implementation practices to get them enterprise ready.
Discover what a typical workday looks like for a senior cyber threat intelligence analyst, the daily tasks I perform, and what you can expect in this role.
Learn 5 ways to use AI and ChatGPT to create custom tools that you can use in your day-to-day work to improve your organization’s cyber security posture.
Discover what Jupyter Notebooks are and learn how to create your own to structure your threat hunting workflow and improve your efficiency.
Learn 7 of the best cyber security notetaking applications you can use to capture your thoughts, document what needs to be done, and create a knowledge base.
Learn to create your own Python packages using the Python module Poetry. This lets you easily share your threat hunting tools with the community.
Discover what soft skills are and why they are so important to master if you want to excel in the cyber security industry and reach your full potential.
Find out how you can fight imposter syndrome by finding confidence in the work you do rather than living a lie and faking it till you make it.
Discover how to extract valuable information from JSON to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
Discover how to extract data from a CSV file to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
Ever wondered what KFC and threat intelligence have in common? Discover how relevance, timeliness, and actionability relate good threat intelligence.
Discover how to create standalone executable programs from your Python scripts that you can use on any Windows operating system using the Python module py2exe.
Learn how to give your threat hunting tools command line arguments that modify their behavior when they are executed.