Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CYSA+ Jan weekend batch by Ashish | 2025
Zoom ID
Zoom ID
live batch recordings
CYSA+ Jan weekend batch by Ashish 18th jan 2024 (webinar) (112:27)
CYSA+ Jan weekend batch by Ashish 25th jan 2025 (119:20)
CYSA+ Jan weekend batch by Ashish 26th jan 2025 (122:26)
self paced videos
Cysa+ | Introduction to CYSA+ | 17th April
CYSA+ | Introduction to SOC | 24th April
CYSA | Responsibilities of SOC | 25th April
CYSA | Intro to Threat Intelligence | 26th April
CYSA | Threat intelligence lifecycle | 27th April
CYSA | Phases of Threat Intelligence Lifecycle | 1st May
CYSA | Pyramid of Pain | 2nd May
CYSA | Threat Hunting | 3rd May
Cysa | Threat Hunting labs | 4th May
CYSA | IOCs in Mandiant | 5th May
CYSA | Network Threat Hunting | 8th May
CYSA | Network Threat Hunting (continued) | 9th May
CYSA | Doubts related session | 10th May
CYSA | Network Threat hunting lab 2 | 11th May
CYSA | 1Finishing Network Threat Hunting | 2th May
CYSA | Assembly Language | 15th May
CYSA | Concepts of Assembly Language | 16th May
CYSA | Assembly Language Basic Blocks | 17th May
CYSA | Multiplication And Division in Assembly | 18th May
CYSA | Lab on comparison | 19th May
CYSA | Installing Flare VM | 22nd May
CYSA | 23rd May
CYSA | Disassembler | 24th May
CYSA | Reverse engineering using Ghidra | 25th May
CYSA | Malware Analysis Lab Setup | 30th May
CYSA | Network setup for Malware Analysis | 31st May
CYSA | Analysing WannaCry | 1st June
CYSA | Dynamic Analysis of Malware | 2nd June
CYSA | GRC intro | 5th June
CYSA | RISK MANAGEMENT | 6th June
CYSA | Risk Response | 7th June
CYSA | Policies and Procedures | 8th June
CYSA | Baselines and Guidelines | 9th June
CYSA | Endpoint Security | 12th June
CYSA | IDS | 13th June
CYSA | Installing Snort | 14th June
CYSA | Working with Snort | 15th June
CYSA | Installing Falcon | 16th June
CYSA | Configuring Snort | 19th June
CYSA | Snort Modes | 20th June
CYSA | Finishing Snort | 21st June
CYSA | Rules for Snort | 22nd June
CYSA | Snort in IDS mode | 26th June
CYSA | Installibg sensors on Crowdstrike | 27th June
CYSA | Finishing Crowdstrike | 29th June
CYSA | Compliance | 3rd July
CYSA | Laws and Frameworks | 4th July
CYSA | Finishing up Compliance | 5th July
CYSA | SIEMS | 6th July
CYSA | Configuring SIEMS | 7th July
CYSA | Installing Splunk Forwarder | 10th July
CYSA | Verifying connectivity between Forwader and Receiver | 11th July
CYSA | SPL | 12th July
CYSA | Lab on Splunk | 13th July
CYSA | Cyberdefenders Lab on Splunk | 14th July
CYSA | BoTSV2 | 17th July
CYSA | Troubleshooting Splunk | 18th July
CYSA | BOTSv2 | 19th July
CYSA | Advanced SPL Queries | 20th July
CYSA | SOAR | 21st July
CYSA | SOAR 24th July
CYSA | SOAR Installation | 25th July
CYSA | Chronicle SOAR | 26th July
CYSA | Working with Siemplify SOAR | 27th April
CYSA | Use cases of Siemplify | 28th July
CYSA | OpenStego
CYSA | Working on SOAR cases
CYSA | RAM Forensics | 7th Aug
CYSA | Volatility | 8th Aug
CYSA | Real world RAM forensics | 9th Aug
CYSA | Autopsy and Hard Drive Forensics | 10th Aug
CYSA | Persistent memory Forensics | 11th Aug
CYSA | IAM | 14th Aug
CYSA | IAM Lab | 16th Aug
CYSA | Real world RAM forensics | 9th Aug
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock