Skip to content
View RahulCyberX's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report RahulCyberX

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Cyber-Threat-Intelligence Cyber-Threat-Intelligence Public

    Identifying and using available security knowledge to mitigate and manage potential adversary actions.

    1

  2. Network-Security-and-Traffic-Analysis Network-Security-and-Traffic-Analysis Public

    Hand's on use of Network Security and Traffic Analysis concepts to spot and probe network anomalies using industry tools and techniques.

    5

  3. Endpoint-Security-Monitoring Endpoint-Security-Monitoring Public

    Hands-on practice in monitoring activity on workstations, as that’s where adversaries spend the most time trying to achieve their objectives. Practice done in the simulated challenge/room environme…

    1

  4. Security-Information-Event-Management Security-Information-Event-Management Public

    Hands-on practices in simulated VM environment to understand how SIEM works and get comfortable creating simple and advanced search queries to look for specific answers from the ingested logs.

  5. Digital-Forensics-Incident-Response Digital-Forensics-Incident-Response Public

    Understanding what forensic artifacts are present in the Windows and Linux Operating Systems, how to collect them, and leverage them to investigate security incidents.

    1 1

  6. Phishing-Analysis Phishing-Analysis Public

    Hands on analysis and defending against phishing emails. Investigating real-world phishing attempts using a variety of techniques.

    1