The Art of DFIR Training
Understanding how we can perform Forensics on network captures using Wireshark tool
Understanding how SIEM Works
Analysis of CyberGate RAT
Understanding how to forensically analyze Google Drive
understanding how Registry works in windows and how to analyze it
understanding how Event logs work in windows and how to analyze them
How to write a good YARA Rule
Looking at how you can perform an investigation and detect malicious Emails