- CyMentorsBrute Force Attacks: How to Identify and Mitigate with SIEM12 WeeksIntermediate19 Lessons7 Quizzes66 Students
- CyMentorsPort Scanning Execution and Detection Techniques16 WeeksIntermediate12 Lessons6 Quizzes64 Students
- CyMentorsCombating Ransomware: Effective Detection using SIEM12 WeeksIntermediate21 Lessons8 Quizzes61 Students
- CyMentorsInsider Threats: Recognizing and Responding with SIEM16 WeeksIntermediate18 Lessons6 Quizzes61 Students
- CyMentorsUnmasking Malicious PowerShell Activity: Detection Strategies using SIEM16 WeeksIntermediate19 Lessons10 Quizzes61 Students
- CyMentorsMalware Defense: Detection and Analysis through SIEM16 WeeksIntermediate10 Lessons6 Quizzes60 Students
- CyMentorsWeb Attack Detection: Strategies and Defense Mechanisms16 WeeksIntermediate34 Lessons8 Quizzes60 Students
- CyMentorsPhishing Detection: Tactics and Prevention using Security Monitoring16 WeeksIntermediate19 Lessons5 Quizzes60 Students
- CyMentorsCryptominer Detection: Identifying Unauthorized Mining Activities16 WeeksIntermediate14 Lessons6 Quizzes60 Students
- CyMentorsIntro to Incident Response and Threat Hunting with a SIEM12 WeeksAll levels8 Lessons7 Quizzes24 Students
- CyMentorsCybersecurity Incident Response: Strategies and Practices12 WeeksIntermediate16 Lessons3 Quizzes17 Students
- CyMentorsCyber Forensics: Leveraging SIEM for Investigative Insights16 WeeksIntermediate15 Lessons5 Quizzes15 Students
- CyMentorsPrivilege Escalation: Analyzing Windows Security Vulnerabilities8 WeeksAll levels18 Lessons6 Quizzes12 Students