Build – Open Source Threat Hunting Platform

This course will teach the abilities required to build and use an open-source threat hunting security stack to analyze network and host data. A student who completes this course will be able to build the stack, add data to the stack, enhance the data with contextual...
Tunneling Demystified

Tunneling Demystified

Tunneling Demystified Whether you’re just beginning your journey into the security field, or you’re a seasoned professional, the ability to redirect and encapsulate traffic is a skill that allows you to protect insecure protocols, bypass ingress/egress restrictions,...