THREAT 2 Threat Hunting: A Comprehensive Analysis of Proactive Cyber Defence Feb 20, 2025 Metasploit for SOC Analysts Feb 12, 2025