Topics
- Introduction 1
- Attack Stages 1
- Lab Time - Wear a hat as a Victim 1
- Lab Time - Wear a hat as a security operations center (SOC) analyst 1
- Threat Hunting using Carbon Black Cloud 1
- Investigate each process, command, binary leveraging CB 1
- Threat Hunting Takeaways and How to find Hostname / IP in Windows 1
- Additional Resources 1
Other Resources
-
Knowledge Base
- TestDrive Fundamentals
- Digital Workspace
- Accelerate Cloud Journey
- Networking and Intrinsic Security Walkthroughs
- Industry-Specific Walkthroughs
- vSphere Assessment Tool
- SaaS Guides
- Horizon_Cloud
-
Edited for Discovery (Pathfinder)
- SPL-TD-CB-01
- SPL-TD-CB-02
- SPL-TD-AWS-01
- SPL-TD-TKG-01
- SPL-TD-SASE-01
- SPL-TD-SASE-02
- SPL-TD-CB-04
- SPL-TD-NSX-01
- SPL-TD-CB-03