Free Learning Resources
Cyber Threat Intelligence
Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
Intrusion Analysis: How to Fully Investigate Cyber Security Attacks
Threat Profiling: How to Understand Hackers and Their TTPs
5 Reasons Why a Threat Intelligence Platform Will Improve Your Business
Web Scraping Cyber Threat Intelligence Using Octoparse: Full Guide
CTI Report Writing: How to Communicate Threat Intelligence
The Cyber Threat Intelligence Lifecycle: A Fundamental Model
Threat Intelligence with MISP: Part 4 – Using Feeds
Threat Intelligence with MISP Part 7 – Exporting IOCs
What Is the Indicator Lifecycle? A Guide to Using Indicators
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.Python Threat Hunting Tools: Part 2 — Web Scraping
How to Create a Home Lab: Virtualize all the Things!
How to Optimize Data Sources: Collection Management Framework
Python Threat Hunting Tools: Part 11 – A Jupyter Notebook for MISP
Python Threat Hunting Tools Part 7 — Parsing CSV
Threat Hunting With Velociraptor I – Introduction
Python Threat Hunting Tools: Part 1 — Why?
Python Threat Hunting Tools: Part 4 — Browser Automation
Creating a Virtualized Malware Analysis Lab Environment
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
Malware Configuration Parsers: An Essential Hunting Tool
Discover the Ultimate Cyber Security Notetaking App: Polarity
Let Us Find Out Whodunit
Python Threat Hunting Tools: Part 3 — Interacting with APIs
Python Threat Hunting Tools: Part 10 — The Power of Jupyter Notebooks
How to Create a Local Kubernetes Cluster: Terraform and Ansible
Netlas.io: A Powerful Suite of Tools for Threat Hunting
Python Threat Hunting Tools: Part 11 – A Jupyter Notebook for MISP
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don’t miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.