Free Learning Resources
Cyber Threat Intelligence
Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
Cyber Threat Intelligence Report Template (+FREE Download)Â
How to Optimize Data Sources: Collection Management Framework
ATT&CK Powered Suit: Streamline Your Research and Save TimeÂ
CTI Analysis Bias: How to Overcome Your Prejudices During Analysis
Visual Threat Intelligence: A Masterpiece of Infographics and StorytellingÂ
Intrusion Analysis: How to Fully Investigate Cyber Security Attacks
Top 5 Challenges When Creating Intelligence Requirements
Threat Intelligence vs Threat Hunting: What is the Perfect Pipeline?
Threat Intelligence with MISP Part 7 – Exporting IOCs
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.Python Threat Hunting Tools: Part 9 — Creating Python Packages with Poetry
Learn 10 ways to use ChatGPT for Threat Hunting Right Now!
Python Threat Hunting Tools: Part 2 — Web Scraping
Python Threat Hunting Tools Part 7 — Parsing CSV
Threat Hunting With Velociraptor II – Environment Setup
Hunting for Persistence with Cympire: Part IV — Startup Folder
Unraveling the Courses of Action Matrix: Full Guide to CoA
Malware Configuration Parsers: An Essential Hunting Tool
How to Create a Home Lab: Virtualize all the Things!
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
Python Threat Hunting Tools: Part 3 — Interacting with APIs
Python Threat Hunting Tools Part 7 — Parsing CSV
Netlas.io: A Powerful Suite of Tools for Threat Hunting
How to Create a Home Lab: Virtualize all the Things!
Malware Configuration Parsers: An Essential Hunting Tool
Python Threat Hunting Tools: Part 11 – A Jupyter Notebook for MISP
Creating a Virtualized Malware Analysis Lab Environment
Python Threat Hunting Tools: Part 8 — Parsing JSON
Python Threat Hunting Tools: Part 5 — Command Line Arguments
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don’t miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.