12 Days of Defense - Day 9: How to Analyze HTTP Traffic in Wireshark

16:41
12 Days of Defense - Day 10: How to Analyze HTTP/2 Traffic in Wireshark

21:31
12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works

14:53
MALWARE Analysis with Wireshark // TRICKBOT Infection

18:33
12 Days of Defense - Day 3: How the SOC Works (Security Monitoring Tools and Architecture)

16:34
12 Days of Defense - Day 1: PDF and Office Doc Malware IOC Extraction

16:32
12 Days of Defense - Day 11: Prioritizing Detection with MITRE ATT&CK Navigator

11:56
12 Days of Defense - Day 12: Should I Get A SOC/Cyber Defense Job?

24:19