- CyMentorsPort Scanning Execution and Detection Techniques8 WeeksIntermediate12 Lessons6 Quizzes51 Students
- CyMentorsBrute Force Attacks: How to Identify and Mitigate with SIEM8 WeeksIntermediate19 Lessons7 Quizzes51 Students
- CyMentorsUnmasking Malicious PowerShell Activity: Detection Strategies using SIEM8 WeeksIntermediate19 Lessons10 Quizzes51 Students
- CyMentorsInsider Threats: Recognizing and Responding with SIEM8 WeeksIntermediate18 Lessons6 Quizzes51 Students
- CyMentorsMalware Defense: Detection and Analysis through SIEM8 WeeksIntermediate10 Lessons6 Quizzes50 Students
- CyMentorsWeb Attack Detection: Strategies and Defense Mechanisms8 WeeksIntermediate34 Lessons8 Quizzes50 Students
- CyMentorsCombating Ransomware: Effective Detection using SIEM8 WeeksIntermediate21 Lessons8 Quizzes50 Students
- CyMentorsCryptominer Detection: Identifying Unauthorized Mining Activities8 WeeksIntermediate14 Lessons6 Quizzes50 Students
- CyMentorsPhishing Detection: Tactics and Prevention using Security Monitoring8 WeeksIntermediate19 Lessons5 Quizzes50 Students
- CyMentorsIntro to Incident Response and Threat Hunting with a SIEM8 WeeksAll levels8 Lessons7 Quizzes16 Students
- CyMentorsCybersecurity Incident Response: Strategies and Practices8 WeeksIntermediate16 Lessons3 Quizzes8 Students
- CyMentorsCyber Forensics: Leveraging SIEM for Investigative Insights8 WeeksIntermediate15 Lessons5 Quizzes6 Students
- CyMentorsPrivate: APT Attacks: Uncovering Advanced Persistent Threats with SIEM8 WeeksIntermediate16 Lessons2 Quizzes2 Students
- CyMentorsPrivilege Escalation: Analyzing Windows Security Vulnerabilities8 WeeksAll levels18 Lessons6 Quizzes1 Student
- charalamposgaganisPrivate: Privilege Escalation: Analyzing Linux Security Vulnerabilities10 WeeksAll levels17 Lessons6 Quizzes0 Students