- George ZirasPort Scanning Execution and Detection Techniques32 WeeksIntermediate12 Lessons6 Quizzes88 Students
- selflearnBrute Force Attacks: How to Identify and Mitigate with SIEM32 WeeksIntermediate19 Lessons7 Quizzes88 Students
- selflearnCombating Ransomware: Effective Detection using SIEM32 WeeksIntermediate21 Lessons8 Quizzes85 Students
- selflearnInsider Threats: Recognizing and Responding with SIEM32 WeeksIntermediate18 Lessons6 Quizzes85 Students
- selflearnUnmasking Malicious PowerShell Activity: Detection Strategies using SIEM32 WeeksIntermediate19 Lessons10 Quizzes85 Students
- George ZirasMalware Defense: Detection and Analysis through SIEM32 WeeksIntermediate10 Lessons6 Quizzes84 Students
- selflearnWeb Attack Detection: Strategies and Defense Mechanisms32 WeeksIntermediate34 Lessons8 Quizzes84 Students
- selflearnPhishing Detection: Tactics and Prevention using Security Monitoring32 WeeksIntermediate19 Lessons5 Quizzes84 Students
- selflearnCryptominer Detection: Identifying Unauthorized Mining Activities32 WeeksIntermediate14 Lessons6 Quizzes84 Students
- selflearnIntro to Incident Response and Threat Hunting with a SIEM12 WeeksAll levels8 Lessons7 Quizzes49 Students
- George ZirasCybersecurity Incident Response: Strategies and Practices32 WeeksIntermediate16 Lessons3 Quizzes41 Students
- George ZirasCyber Forensics: Leveraging SIEM for Investigative Insights32 WeeksIntermediate15 Lessons5 Quizzes39 Students
- selflearnPrivilege Escalation: Analyzing Windows Security Vulnerabilities16 WeeksAll levels18 Lessons6 Quizzes16 Students