SOC 18
- Collaborative Threat Defense: Tools Working Together in a SOC
- Threat Intelligence for SOC
- SOC : Essential Tools for Threat Detection
- SOC : Essential Tools for Threat Detection
- Dealing with DDoS Attacks
- Zero Trust Security Architecture
- Threat Hunting: A Comprehensive Analysis of Proactive Cyber Defence
- Understanding EDR: A Deep Dive
- Exploring Sysmon
- Streamlining Incident Response and Threat Detection
- Incident Response: A Deep Dive
- Understanding SIEM
- Understanding IDS/IPS: A Dive into Threat Monitoring
- Vulnerability Assessment: A Deep Dive
- Metasploit for SOC Analysts
- Significance of Bash Scripting
- IAM in Cloud Security
- The CIA Triad