Free Learning Resources
Cyber Threat Intelligence
Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
Visual Threat Intelligence: A Masterpiece of Infographics and Storytelling
Crown Jewel Analysis: How to Figure Out What to Protect
Day in the Life of a Senior Threat Intelligence Analyst
Intelligence Requirements Template (PDF + Word Doc Download)
Threat Intelligence with MISP: Part 2 – Setting up MISP
YARA Rules: Empower Your Security With Custom Detections
Intrusion Analysis: How to Fully Investigate Cyber Security Attacks
Threat Intelligence with MISP: Part 5 – Searching and Filtering
Top 5 Challenges When Creating Intelligence Requirements
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.Python Threat Hunting Tools: Part 2 — Web Scraping
Malware Configuration Parsers: An Essential Hunting Tool
Creating a Virtualized Malware Analysis Lab Environment
Python Threat Hunting Tools: Part 10 — The Power of Jupyter Notebooks
Python Threat Hunting Tools: Part 5 — Command Line Arguments
Learn 10 ways to use ChatGPT for Threat Hunting Right Now!
Unraveling the Courses of Action Matrix: Full Guide to CoA
How to Optimize Data Sources: Collection Management Framework
How to Arm Yourself with Custom Sigma Rules
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Creating a Virtualized Malware Analysis Lab Environment
How to Automatically Deploy a Malware Analysis Environment
Python Threat Hunting Tools: Part 8 — Parsing JSON
Python Threat Hunting Tools: Part 10 — The Power of Jupyter Notebooks
How to Create a Local Kubernetes Cluster: Terraform and Ansible
How to Create a Home Lab: Virtualize all the Things!
Python Threat Hunting Tools Part 7 — Parsing CSV
Netlas.io: A Powerful Suite of Tools for Threat Hunting
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don’t miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.