•
Intrusion Detection Systems, Elasticsearch 8.x and Elasticsearch Integrations.
•
Sandbox, Integrations, Wazuh and Arkime.
•
Command Line IR, Registry Investigation and Browser Forensics.
•
E-mail Threat Hunting, Windows Threat Hunting e Windows Security.
•
Adversary Strategies, Evidence Acquisition and Incident Response.
•
Windows Incident Response, Threat Hunting Information and Yara.
•
Attack Overview, Disk/File System Forensic Analysis and Windows Logging.
•
Managing Sysmon, Lateral Movement and Forensic Timeline.
•
Malware Attack Simulation.