12 Days of Defense - Day 2: How to use Zeek for PCAP Analysis
![](https://i.ytimg.com/vi/Y8yb9_apYEE/mqdefault.jpg)
18:33
12 Days of Defense - Day 3: How the SOC Works (Security Monitoring Tools and Architecture)
![](https://i.ytimg.com/vi/3rh82pG7MME/mqdefault.jpg)
16:34
12 Days of Defense - Day 1: PDF and Office Doc Malware IOC Extraction
![](https://i.ytimg.com/vi/HUCpc6EPJxk/mqdefault.jpg)
24:07
Packet & Log Analysis with Zeek P1 | TryHackMe Zeek
![](https://i.ytimg.com/vi/d1593_bkN8g/mqdefault.jpg)
13:59
Open Source Cyber Threat Hunting with Zeek: Getting Started
![](https://i.ytimg.com/vi/reRzWHUwI80/mqdefault.jpg)
21:31
12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works
![](https://i.ytimg.com/vi/R3fFzYXKn3c/mqdefault.jpg)
16:38
Detect Hackers & Malware on your Computer (literally for free)
![](https://i.ytimg.com/vi/JzLvo4ERDpo/mqdefault.jpg)
14:57
12 Days of Defense - Day 5: How Windows Security Logging Works
![](https://i.ytimg.com/vi/oP5xYq0_44E/mqdefault.jpg)
7:13