Introduction to Endpoint Hunting
- Introduction to Endpoint Hunting
Malware Overview
Hunting Malware
- Hunting Malware
- Redline: Create Standard Collector
- Redline: Basic Usage
- Redline: Create Analysis File
- Redline: Detecting Code Injection
- Lab: Hunting in Memory Lab 1
- Lab: Hunting in Memory Lab 2
- Lab: Hunting for Process Injection & Proactive API Monitoring
- Lab: Advanced Endpoint Hunting Lab 1
- Lab: Advanced Endpoint Hunting Lab 2
- Lab: Hunting Malware Part 1
- Lab: Hunting Malware Part 2
Event IDs, Logging, & SIEMs
- Event IDs, Logging, & SIEMs
- Introduction to Sysmon