
Actively looking roles in cybersecurity. If you have a reference or a job opportunity, your support would mean the world to me!
WordCraft: Your Guide to Document Mastery

The Evolution and Impact of Ransomware
Learn how ransomware operators communicate, share data, and execute attacks. This series covers lateral movement, privilege escalation, and post-attack recovery, providing tools and strategies for comprehensive analysis and defense.
Duration
26 Pages

KAPE Unleashed: Harnessing Power in Incident Response
This series offers a comprehensive exploration of KAPE’s capabilities, practical use cases in incident response, and its role in uncovering critical artifacts. Whether you're a seasoned professional or new to digital forensics, learn how to leverage KAPE for effective data collection and analysis.
Duration
3 Pages

Mastering Velociraptor: A Comprehensive Guide to Incident Response and Digital Forensics
Dive into the world of Velociraptor with this in-depth series designed to empower forensic investigators and incident responders. Whether you’re a beginner setting up your first home lab or an experienced professional navigating advanced threat-hunting techniques, this course offers step-by-step guidance to harness the full potential of Velociraptor.
Duration
4 Pages

Windows Forensic Artifacts: Unveiling Key Evidence
Explore critical Windows forensic artifacts such as Prefetch, Shellbags, Lnk files, and more. This series covers tools and techniques for analyzing file activity, program execution, USB usage, and autostart locations.
Duration
28 Pages

Introducing: Browser Forensics – Your Ultimate Guide to Manual Analysis
This course will cover different browsers Like, Edge, Chrome, Firefox. I know it can seem overwhelming with all the tech jargon out there, but don’t worry! I’m here to help you. By the end of this series, you'll be able to analyze browsers data like a pro—without the hefty price tag.
Duration
18 Pages

Mastering Windows Registry Forensics:
Explore the intricacies of the Windows Registry, including key hives, transaction logs, and system configurations. This series uncovers valuable insights into user activity, program execution, and critical registry artifacts for comprehensive forensic investigations.
Duration
10 Pages

Mastering Memory Forensics: In-Depth Analysis with Volatility and Advanced Tools
This course provides a hands-on journey into memory forensics, covering essential tools like Volatility, MemProcFS, and advanced analysis techniques with Strings and Bstrings. Learn to set up, analyze, and uncover threats from memory data in Windows and WSL environments, ideal for anyone aiming to strengthen their threat detection skills.
Duration
5 Pages

Insights into File Systems and Anti-Forensics
Delve into the versatile world of NTFS with an in-depth exploration of metadata structures, system files, and the nuances of metadata entries. This series also tackles anti-forensics techniques like timestomping, equipping you with the knowledge to navigate and counteract forensic challenges.
Duration
5 Pages

NTFS Journaling(Different Artifact like $I30, $MFT, $LogFile, $UsnJrnl)
This series delves into parsing and analyzing these vital components using tools like MFTECmd.exe and Timeline Explorer, while also exploring common activity patterns and the intricacies of the $MFT and $I30. Enhance your forensic skills and understanding of NTFS file systems with these essential insights.
Duration
8 Pages

Decoding Timeline Analysis in Digital Forensics
Learn how to leverage NTFS timestamps and advanced tools like Plaso/Log2Timeline for accurate forensic investigations. This series covers step-by-step examples, tool usage, and the critical role of timestamps in building a comprehensive forensic timeline.
Duration
7 Pages

Mastering SentinelOne: A Comprehensive Guide to Deep Visibility, Threat Hunting, and Advanced Querying"
Unlock the full potential of SentinelOne with this in-depth series of articles designed to elevate your expertise in threat detection, investigation, Incident response and forensic and much more
Duration
13 Pages

Data Carving: Advanced Techniques in Digital Forensics
This course is designed to equip you with the knowledge and tools needed to recover crucial data from damaged, corrupted, or deleted files. You will learn about various methods used to restore and extract digital evidence, focusing on the art of file and stream carving, metadata recovery, and much more.
Duration
7 Pages

USB Forensics
Unlock the secrets of USB device investigations with insights into USBSTOR keys, volume GUIDs, and event logging. This series guides you through identifying USB artifacts, tracking device activity, and leveraging quick analysis tools.
Duration
10 Pages

Email Forensics
Delve into the world of email forensics with a focus on analyzing email headers, encryption, PST/OST files, and more. This series covers essential techniques for email data extraction, recovery, and forensic challenges across platforms.
Duration
18 Pages

Linux IR and Forensic
This course dives into the fundamentals of Linux Incident Response and Digital Forensics, covering critical topics like attack vectors, key directories, log analysis, and defense strategies.
Duration
7 Pages

macOS Forensics: Structure, Persistence, and Investigation
Master the fundamentals of macOS forensics, including live data capture, image mounting, persistence analysis, and key device information profiling for incident response
Duration
5 Pages

(MS365 and Azure)Cloud-Based Investigations
This series focuses on Microsoft Cloud Services, including MS365 and Azure, providing essential insights into logging, incident response, and data exfiltration. Equip yourself with practical tools and strategies for log acquisition and analysis, ensuring you can effectively navigate the challenges of cloud forensics and enhance your investigative capabilities.
Duration
7 Pages

Mastering Cloud Storage Forensics: Google Drive, OneDrive, Dropbox & Box Investigation Techniques
Unlock the secrets of cloud storage forensics with this comprehensive course that covers the forensic analysis of Google Drive, OneDrive, Dropbox, and Box. Learn how to investigate and retrieve crucial evidence from these platforms with in-depth modules on analyzing file structures, synchronizations, cached files, and audit logs.
Duration
12 Pages

Azure Incident response
This series provides a comprehensive guide to understanding, collecting, centralizing, Azure logs, culminating in a step-by-step approach to acquiring and analyzing virtual machine images directly within Azure.
Duration
7 Pages

AWS Forensics: Strategies for Effective Incident Response
This series covers essential topics such as account management, secure access, and the AWS Instance Metadata Service (IMDS). Gain insights into optimizing incident response using tools like CloudWatch, GuardDuty, and automated forensics techniques.
Duration
5 Pages

Incident Response Framework: A Comprehensive Guide
This course offers an overview of the IR process, covering all phases from preparation to post-incident evaluation, and provides essential tools such as checklists and strategies for effective containment and eradication. Explore advanced concepts like leveraging enterprise-wide logs for detection and the distinctions between containment and remediation in modern IR practices.
Duration
12 Pages

Understanding Lateral Movement in Cybersecurity
This course delves into the mechanics of lateral movement in cyber attacks, exploring key protocols, tools, and effective detection methods to enhance your organization's security posture against such threats.
Duration
3 Pages

WMI: Detection, Defense, and Hunting
This course covers WMI capabilities, stealthy persistence techniques, detection of WMI-based attacks, and effective hunting strategies to combat malicious activity, including an exploration of event consumers and MOF files.
Duration
6 Pages

SRUM: Unveiling Insights for Digital Investigations
This series provides a deep dive into SRUM’s capabilities, showcasing how to extract valuable insights from resource usage data. Learn to unpack SRUM’s potential, utilize ESEDatabaseView for effective examination, and streamline your analysis with innovative strategies to enhance your investigative prowess.
Duration
5 Pages

Pass the Hash and Golden Ticket Attacks
This course delves into the evolving tactics of malicious actors, focusing on Pass the Hash and Golden Ticket attacks. It covers the mechanisms behind these techniques, their associated threats, and effective mitigation strategies, emphasizing the importance of robust defenses against such sophisticated breaches.
Duration
4 Pages

Forensic Articles/Persistence Mechanisms, and Credential Theft Defense
This hands-on course covers essential cybersecurity topics, including digital forensics, data recovery, and credential theft prevention. Participants will learn techniques for analyzing VSS data, handling SSDs, and acquiring memory in encrypted systems. The course also focuses on combating fileless malware, network sniffing, and managing SMB protocols. Additionally, students will explore Windows security, persistence mechanisms, and advanced adversary emulation, equipping them with practical skills to detect and defend against modern cyber threats.
Duration
26 Pages

Cyber-Crimes
This collection highlights multiple infamous cybercrimes that have occurred over the years, each offering invaluable lessons. These incidents not only reveal vulnerabilities in systems but also emphasize the importance of proactive cybersecurity measures.
Duration
6 Pages