Course
Go defensive: learn to read logs, detect intrusions, harden systems, and analyze incidents like a real SOC analyst.
Structured path preview
1 free lesson to get started, then 12 premium lessons with exercises, scenarios, and detailed solutions.
First locked checkpoint: Detect an Nmap Scan in Firewall Logs
Lessons
13
Completed
0
Progress
0%
Lessons
Lesson 01
Read and analyze system logs
Free
Lesson 02
Detect an Nmap Scan in Firewall Logs
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
fail2ban — Automatically Banning Attackers
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 04
Harden a Server with UFW and iptables
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 01
Introduction to IDS/IPS — Understanding Network Detection
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 02
Installing and Configuring Suricata
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
Write Your Own Suricata Detection Rules
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 01
Introduction to SIEM — Why Centralize Logs
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 02
Set Up the ELK Stack
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
Create Security Alerts and Dashboards in Kibana
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 01
Forensic Analysis of a Compromised System
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 02
Recover Deleted Data with Autopsy and Foremost
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
Write a Professional Incident Report
Members only
Unlock exercises, detailed solutions, and the next steps.