Home
Courses
Instructors
Blog
Contact
Home
Courses
Instructors
Blog
Contact
Curriculum
1 Section
4 Lessons
10 Weeks
Expanse all sections
Collapse all sections
SOC Investigation - how to investigate in variant Cyber Cases
4
1.0
01-Introduction
3 Minutes
1.1
02-Suspicious outbound Traffic from local to remote (Proxy Log Analysis)
48 Minutes
1.2
03-Phishing and Email Attack Types And Mail gateway Log Analysis
19 Minutes
1.3
04-Phishing URL Analysis (URL Scan)
5 Minutes
03-Phishing and Email Attack Types And Mail gateway Log Analysis
The lesson content is empty.
Leave A Reply
Cancel reply
You must be
logged in
to post a comment.
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content