top of page
![](https://static.wixstatic.com/media/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg/v1/fill/w_1920,h_1323,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg)
![](https://static.wixstatic.com/media/11062b_441b803e3b474f93910676a0719f5a1d~mv2.jpeg/v1/fill/w_980,h_694,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/11062b_441b803e3b474f93910676a0719f5a1d~mv2.jpeg)
Security Related Useful Blogs
Pages Count
6 Pages
Links for the courses
Managing and Securing SMB Protocol          :Click Me
Web search reconnaissance defense           :Click Me
Network Sniffing: The Basics and Beyond       :Click Me
Fileless Malware || LOLBAS || LOLBAS Hunting Using Prefetch, Event Logs,
and Sysmon : Click Me
Advanced Tools for Adversary Emulation and Purple Teaming: Enhancing Resilience Against Cyber Threats : Click Me
Unified Kill Chain: An evolution of Cyber Kill chain : Click Me
Your Instructor
Dean
![Dean](https://static.wixstatic.com/media/5fb032_3db91b1fff95466183c4e25d0c5a3d22~mv2.jpg/v1/fill/w_110,h_153,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Image-empty-state.jpg)
bottom of page