<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>More Categories &#8211; Free &amp; Affordable DFIR, OSINT, &amp; Cybersecurity Training</title>
	<atom:link href="https://training.dfirdiva.com/listing-category/additional-categories/feed" rel="self" type="application/rss+xml" />
	<link>https://training.dfirdiva.com</link>
	<description>Free &#38; Affordable DFIR, OSINT, &#38; Cybersecurity Training</description>
	<lastBuildDate>Wed, 25 Feb 2026 04:31:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://training.dfirdiva.com/wp-content/uploads/2021/09/cropped-DFIRDivaLogoTwitterMultiBkg-32x32.png</url>
	<title>More Categories &#8211; Free &amp; Affordable DFIR, OSINT, &amp; Cybersecurity Training</title>
	<link>https://training.dfirdiva.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Threat/Warning Analyst (OSINT and Dark Web) Pathway (CyberSkills2Work) &#8211; US ONLY</title>
		<link>https://training.dfirdiva.com/listing/threat-warning-analyst-osint-and-dark-web-pathway-cyberskills2work-us-only</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Tue, 23 Dec 2025 22:58:15 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=3153</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-100x100.png 100w" sizes="(max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: Threat/Warning Analyst (OSINT and Dark Web Pathway)  Platform: CyberSkills2Work/Dakota State University Cost: Free for Eligible Students. Application Link: https://cyberskills2work.org/join Eligibility Requirements: Must be a U.S. citizen or permanent resident. Must be a veteran, transitioning service member, first responder, military spouse, or government personnel. Must have at least a high school diploma,&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-100x100.png 100w" sizes="(max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://cyberskills2work.org/training-programs/dsu-osintthreat-analysis-pathway/">Threat/Warning Analyst (OSINT and Dark Web Pathway) </a></strong></p>
<p><strong>Platform</strong>: CyberSkills2Work/Dakota State University</p>
<p><strong>Cost:</strong> Free for Eligible Students.</p>
<p><strong>Application Link</strong>: <a href="https://cyberskills2work.org/join">https://cyberskills2work.org/join</a></p>
<p><strong>Eligibility Requirements:</strong></p>
<ul>
<li>Must be a U.S. citizen or permanent resident.</li>
<li>Must be a veteran, transitioning service member, first responder, military spouse, or government personnel.</li>
<li>Must have at least a high school diploma, GED, or equivalent. School transcripts of the highest level of education completed are required.</li>
<li>Must have some IT or cybersecurity experience.</li>
</ul>
<hr />
<p><strong>Courses Included</strong>:</p>
<ul>
<li>OSINT Foundations</li>
<li>OSINT Optimized</li>
<li>OSINT Search Engine Researcher</li>
<li>OSINT Social Media Researcher</li>
<li>OSINT Technical Researcher</li>
<li>OSINT Public Records Researcher</li>
<li>OSINT Analyst</li>
<li>OSINT Presenter</li>
<li>OSINT Special Investigator &#8211; Capstone</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hardware Hacking (TrainSec)</title>
		<link>https://training.dfirdiva.com/listing/hardware-hacking-trainsec</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Sat, 09 Aug 2025 20:53:09 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=3103</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/Red.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/Red.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-400x210.png 400w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>Name &#38; Affiliate Link*: Hardware Hacking Expert &#8211; Level I &#8211; Full learning path: Mastering Embedded Systems and Communication Protocols Platform: TrainSec Course Instructor: Amichai Yifrach Cost: $50 &#8211; $729 Proof of Completion: Certification of Completion Community/Forum: There is a Discord community Individual Hardware Hacking Courses &#38; Prices: Hardware Hacking Expert &#8211; Level I &#8211; Class 01:&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/Red.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/Red.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/Red-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p><p><strong>Name &amp; Affiliate Link*: <a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/hardware-hacking-expert-level-i/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Full learning path: Mastering Embedded Systems and Communication Protocols</a></strong></p>
<p><strong>Platform</strong>: TrainSec</p>
<p><strong>Course Instructor: </strong><a href="https://x.com/The_H1tchH1ker">Amichai Yifrach</a></p>
<p><strong>Cost:</strong> $50 &#8211; $729</p>
<p><strong>Proof of Completion</strong>: Certification of Completion</p>
<p><strong>Community/Forum</strong>: There is a <a href="https://discord.gg/qugcNyWdaU">Discord</a> community</p>
<p><b>Individual Hardware Hacking Courses &amp; Prices:</b></p>
<ul>
<li><a href="https://training.trainsec.net/introduction-to-embedded-systems/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 01: Introduction to Embedded Systems &amp; Reverse Engineering</a> ($100)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/the-hardware-hacking-methodology-part-1/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 02: Hacker Mindset &amp; Attack Strategies for Hardware Experts</a> ($50)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/basic-components-identification-part-1/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 03: Analyzing PCBs and Smart Components: Essentials for Hardware Hackers</a> ($50)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/datasheet-hunting-part-1/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 04: Datasheet Hunting: Mastering Component Analysis for Hardware Hackers</a> ($50)</li>
<li><a href="https://training.trainsec.net/embedded-system-analysis-toolkit/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 05: Hardware Hacker&#8217;s Toolkit: Essential Tools and Setup</a> ($50)</li>
<li><a href="https://training.trainsec.net/introduction-to-wired-communication-protocols/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 06: Introduction to Wired Communication Protocols for Hardware Hackers</a> ($50)</li>
<li><a href="https://training.trainsec.net/uart-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 07: Wired Communication Protocols: UART Deep Dive for Hardware Hackers</a> ($100)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/uart-driven-protocols-rs232-422-485/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 08: Advanced UART Protocols (RS232/422/485): Techniques for Hardware Hackers</a> ($50)</li>
<li><a href="https://training.trainsec.net/spi-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 09: Advanced SPI Techniques</a> ($100)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/i2c-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 10: I2C Protocol Mastery: Analysis and Exploitation Techniques</a> ($100)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/jtag-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 11: JTAG Communication Protocol Mastery</a> ($100)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/usb-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 12: Communication Protocols: Mastering USB for Hardware Hackers</a> ($150)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/can-bus-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 13: Mastering CAN Bus: Advanced Techniques for Hardware Hackers</a> ($100)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/introduction-to-wireless-communication-protocols/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 14: Wireless Communication Protocols: Security, Exploitation, and Defense</a> ($100)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/rfid-nfc-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 15: RFID and NFC Security: Analysis, Exploitation, and Defense</a> ($200)</li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/bluetooth-ble-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 16: Bluetooth &amp; BLE: Deep Dive into Protocols and Security</a> ($200)</li>
</ul>
<hr />
<p><strong>Hardware Hacking Bundles and Prices</strong></p>
<p><strong><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/hardware-hacking-expert-level-i/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Full learning path: Mastering Embedded Systems and Communication Protocols</a> </strong>($729)</p>
<p>Includes all Hardware Hacking Courses</p>
<hr />
<p><a href="https://training.trainsec.net/hardware-hacking-methodology/21jhc"><strong>Hardware Hacking Expert &#8211; Level I &#8211; Bundle 01: Hardware Hacking Foundations: From Mindset to Mastery</strong></a> ($174)</p>
<p>Includes:</p>
<ul>
<li><a href="https://training.trainsec.net/introduction-to-embedded-systems/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 01: Introduction to Embedded Systems &amp; Reverse Engineering</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/the-hardware-hacking-methodology-part-1/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 02: Hacker Mindset &amp; Attack Strategies for Hardware Experts</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/basic-components-identification-part-1/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 03: Analyzing PCBs and Smart Components: Essentials for Hardware Hackers</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/datasheet-hunting-part-1/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 04: Datasheet Hunting: Mastering Component Analysis for Hardware Hackers</a></li>
<li><a href="https://training.trainsec.net/embedded-system-analysis-toolkit/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 05: Hardware Hacker&#8217;s Toolkit: Essential Tools and Setup</a></li>
</ul>
<hr />
<p><strong><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/wired-communication-protocols-mastery-deep-analysis-exploitation/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Bundle 02: Wired Communication Protocols Mastery: Deep Analysis &amp; Exploitation</a> </strong>($435)</p>
<p>Includes:</p>
<ul>
<li><a href="https://training.trainsec.net/introduction-to-wired-communication-protocols/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 06: Introduction to Wired Communication Protocols for Hardware Hackers</a></li>
<li><a href="https://training.trainsec.net/uart-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 07: Wired Communication Protocols: UART Deep Dive for Hardware Hackers</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/uart-driven-protocols-rs232-422-485/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 08: Advanced UART Protocols (RS232/422/485): Techniques for Hardware Hackers</a></li>
<li><a href="https://training.trainsec.net/spi-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 09: Advanced SPI Techniques</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/i2c-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 10: I2C Protocol Mastery: Analysis and Exploitation Techniques</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/jtag-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 11: JTAG Communication Protocol Mastery</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/usb-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 12: Communication Protocols: Mastering USB for Hardware Hackers</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/can-bus-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 13: Mastering CAN Bus: Advanced Techniques for Hardware Hackers</a></li>
</ul>
<hr />
<p><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/wireless-security-mastery-exploiting-and-defending-communication-protocols/21jhc"><strong>Hardware Hacking Expert &#8211; Level I &#8211; Bundle 03: Wireless Security Mastery: Exploiting and Defending Communication Protocols</strong></a> ($290)</p>
<p>Includes:</p>
<ul>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/introduction-to-wireless-communication-protocols/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 14: Wireless Communication Protocols: Security, Exploitation, and Defense</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/rfid-nfc-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 15: RFID and NFC Security: Analysis, Exploitation, and Defense</a></li>
<li><a class="text-link-grey text-md font-weight-bold text-decoration-none mb-n1 text-truncate" href="https://training.trainsec.net/bluetooth-ble-introduction-and-deep-dive/21jhc">Hardware Hacking Expert &#8211; Level I &#8211; Class 16: Bluetooth &amp; BLE: Deep Dive into Protocols and Security</a></li>
</ul>
<hr />
<p>*DFIR Diva is an affiliate of TrainSec and receives a small percentage of sales made through affiliate links that go toward keeping the site running.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Automated Detection with Sigma (The Taggart Institute)</title>
		<link>https://training.dfirdiva.com/listing/automated-detection-with-sigma-the-taggart-institute</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 21 Nov 2024 05:36:23 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2965</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: Automated Detection with Sigma Platform: The Taggart Institute Cost: Free or Pay What You Can Community: There is a Taggart Institute Discord Server Topics Include: Understanding Sigma Rules Using Sigma CLI to Convert a Single Rule PySigma Pipelines Automation Threat Hunting and Detection Engineering Atomic Red Team for Log Generation Writing You&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://taggartinstitute.org/p/detection-with-sigma">Automated Detection with Sigma</a></strong></p>
<p><strong>Platform</strong>: The Taggart Institute</p>
<p><strong>Cost</strong>: Free or Pay What You Can</p>
<p><strong>Community:</strong> There is a <a href="https://discord.com/invite/VQfyzB62H3">Taggart Institute Discord Server</a></p>
<p><strong>Topics Include</strong>:</p>
<ul>
<li>Understanding Sigma Rules</li>
<li>Using Sigma CLI to Convert a Single Rule</li>
<li>PySigma Pipelines</li>
<li>Automation</li>
<li>Threat Hunting and Detection Engineering</li>
<li>Atomic Red Team for Log Generation</li>
<li>Writing You Own Sigma Rules</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Foundations of Threat Hunting (Picus Purple Academy)</title>
		<link>https://training.dfirdiva.com/listing/foundations-of-threat-hunting-picus-purple-academy</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Fri, 02 Aug 2024 02:46:57 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2890</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: Foundations of Threat Hunting Platform: Picus Purple Academy Cost: Free Topics: Threat Hunting Fundamentals Threat Hunting Loop Create Hypothesis Investigate via Tools &#38; Techniques Uncover New Patterns &#38; TTPs Inform &#38; Enrich Analytics]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://academy.picussecurity.com/course/foundations-of-threat-hunting-training-free-course-certification">Foundations of Threat Hunting</a></strong></p>
<p><strong>Platform</strong>: Picus Purple Academy</p>
<p><strong>Cost</strong>: Free</p>
<p><strong>Topics</strong>:</p>
<ul>
<li>Threat Hunting Fundamentals</li>
<li>Threat Hunting Loop</li>
<li>Create Hypothesis</li>
<li>Investigate via Tools &amp; Techniques</li>
<li>Uncover New Patterns &amp; TTPs</li>
<li>Inform &amp; Enrich Analytics</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Insider Threat Hunting: Detecting and Responding to Internal Security Risks (LinkedIn Learning)</title>
		<link>https://training.dfirdiva.com/listing/insider-threat-hunting-detecting-and-responding-to-internal-security-risks-linkedin-learning</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 02:51:45 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2877</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: Insider Threat Hunting: Detecting and Responding to Internal Security Risks Platform: LinkedIn Learning Instructor: Mike Wylie Cost: $39.99/month (includes all LinkedIn Learning courses) Topics: Insider Threat Hunting Framework PRECEED Framework for Hunting Insider Threats Hunting for Insider Threat Reconnaissance Hunting for Insider Threat Pre-Exfiltration Evasion Hunting for Insider Threat Data Collection&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/ReddishBrown-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://www.linkedin.com/learning/insider-threat-hunting-detecting-and-responding-to-internal-security-risks">Insider Threat Hunting: Detecting and Responding to Internal Security Risks</a></strong></p>
<p><strong>Platform:</strong> LinkedIn Learning</p>
<p><strong>Instructor</strong>: Mike Wylie</p>
<p><strong>Cost</strong>: $39.99/month (includes all LinkedIn Learning courses)</p>
<p><strong>Topics</strong>:</p>
<ul>
<li>Insider Threat Hunting Framework</li>
<li>PRECEED Framework for Hunting Insider Threats</li>
<li>Hunting for Insider Threat Reconnaissance</li>
<li>Hunting for Insider Threat Pre-Exfiltration Evasion</li>
<li>Hunting for Insider Threat Data Collection</li>
<li>Hunting for Insider Threat Data Exfiltration</li>
<li>Hunting for Insider Threat Post-Exfiltration Evasion</li>
<li>Hunting Insider Threats in Email</li>
<li>Hunting Insider Threats in Cloud File Storage</li>
<li>User and Entity Behavior Analytics (UEBA)</li>
<li>Using AI to Hunt for Insider Threats</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MASA &#8211; Certified All Source Analyst (Mossé Cyber Security Institute)</title>
		<link>https://training.dfirdiva.com/listing/masa-certified-all-source-analyst-mosse-cyber-security-institute</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 02:11:10 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2874</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: MASA &#8211; Certified All Source Analyst Platform: Mossé Cyber Security Institute Community: They have a Discord Server Training &#38; Certification Pricing: $995 Exam Type: Practical Hands-On Topics: Lab Setup Fundamentals of Open Source Intelligence (OSINT) Search Engines Social Media Personal Identifiable Information (PII) Documents Data Breaches Multimedia Deep Web Geolocation Documentation&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://www.mosse-institute.com/dcwf-certifications/masa-certified-all-source-analyst.html">MASA &#8211; Certified All Source Analyst</a></strong></p>
<p><strong>Platform</strong>: Mossé Cyber Security Institute</p>
<p><strong>Community</strong>: They have a Discord Server</p>
<p><strong>Training &amp; Certification Pricing</strong>: $995</p>
<p><strong>Exam Type</strong>: Practical Hands-On</p>
<p><strong>Topics</strong>:</p>
<ul>
<li>Lab Setup</li>
<li>Fundamentals of Open Source Intelligence (OSINT)</li>
<li>Search Engines</li>
<li>Social Media</li>
<li>Personal Identifiable Information (PII)</li>
<li>Documents</li>
<li>Data Breaches</li>
<li>Multimedia</li>
<li>Deep Web</li>
<li>Geolocation</li>
<li>Documentation for OSINT</li>
<li>Fundamentals of Cyber Threat Intelligence (CTI)</li>
<li>Situational Awareness</li>
<li>Open-Source Intelligence for CTI</li>
<li>Monitoring for New Threats</li>
<li>Harnessing Threat Feeds</li>
<li>Cyber Threat Intelligence Operations</li>
<li>Internal Logs Sources</li>
<li>Hypothesis Creation</li>
<li>Supporting Red Teams and Threat Hunting Teams</li>
<li>Reporting for CTI</li>
<li>Policies, Procedures and Methodologies</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Live OSINT Training (Unchartered)</title>
		<link>https://training.dfirdiva.com/listing/live-osint-training-unchartered</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Sat, 08 Jun 2024 02:10:13 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2851</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: Live OSINT Training Courses Platform: Unchartered Cost: $225 &#8211; $800 Courses Include: OSINT Fundamentals Advanced OPSEC Report Writing Workshop Investigating the Dark Web Crypto Essentials Unmasking Fraud OSINT Risk Intelligence Global Intelligence Discovery: Uncovering Insights from Nation-States]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/OSINTCTIColor-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://www.unchartered.info/training">Live OSINT Training Courses</a></strong></p>
<p><strong>Platform</strong>: Unchartered</p>
<p><strong>Cost</strong>: $225 &#8211; $800</p>
<p><strong>Courses Include</strong>:</p>
<ul>
<li>OSINT Fundamentals</li>
<li>Advanced OPSEC</li>
<li>Report Writing Workshop</li>
<li>Investigating the Dark Web</li>
<li>Crypto Essentials</li>
<li>Unmasking Fraud</li>
<li>OSINT Risk Intelligence</li>
<li>Global Intelligence Discovery: Uncovering Insights from Nation-States</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Introduction to AWS Threat Detection (LinkedIn Learning)</title>
		<link>https://training.dfirdiva.com/listing/introduction-to-aws-threat-detection-linkedin-learning</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Sat, 18 May 2024 04:42:41 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2820</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: Introduction to AWS Threat Detection Platform: LinkedIn Learning Instructor: Day Johnson Cost: $34.99 Topics: MITRE Cloud Matrix Log Analysis in AWS CloudTrail Log Analysis Investigating Compute Threats Investigating IAM Threats Investigating Storage Threats Investigating Logging and Monitoring Threats Amazon GuardDuty]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection" data-wplink-edit="true">Introduction to AWS Threat Detection</a></strong></p>
<p><strong>Platform</strong>: LinkedIn Learning</p>
<p><strong>Instructor</strong>: Day Johnson</p>
<p><strong>Cost</strong>: $34.99</p>
<p><strong>Topics</strong>:</p>
<ul>
<li>MITRE Cloud Matrix</li>
<li>Log Analysis in AWS</li>
<li>CloudTrail Log Analysis</li>
<li>Investigating Compute Threats</li>
<li>Investigating IAM Threats</li>
<li>Investigating Storage Threats</li>
<li>Investigating Logging and Monitoring Threats</li>
<li>Amazon GuardDuty</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Foundations of Detection Engineering (LinkedIn Learning)</title>
		<link>https://training.dfirdiva.com/listing/foundations-of-detection-engineering-linkedin-learning</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 18 Apr 2024 05:04:49 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2768</guid>

					<description><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>Name &#38; Direct Link: Foundations of Detection Engineering Platform: LinkedIn Learning Instructor: Eric Thomas Cost: $24.99 Proof of Completion: Certificate of Completion Topics: What is Detection Engineering? The History of Intrusion Detection A Day in the Life of a Detection Engineer Career Pathways for Detection Engineers Understanding the Adversary Detection Lifecycle Detection Engineering and Threat&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="512" height="512" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray.png 512w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-300x300.png 300w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-150x150.png 150w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-200x200.png 200w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-400x400.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DarkGray-100x100.png 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p><p><strong>Name &amp; Direct Link: <a href="https://www.linkedin.com/learning/foundations-of-detection-engineering/">Foundations of Detection Engineering</a></strong></p>
<p><strong>Platform</strong>: LinkedIn Learning</p>
<p><strong>Instructor</strong>: Eric Thomas</p>
<p><strong>Cost</strong>: $24.99</p>
<p><strong>Proof of Completion</strong>: Certificate of Completion</p>
<p><strong>Topics</strong>:</p>
<ul>
<li>What is Detection Engineering?</li>
<li>The History of Intrusion Detection</li>
<li>A Day in the Life of a Detection Engineer</li>
<li>Career Pathways for Detection Engineers</li>
<li>Understanding the Adversary</li>
<li>Detection Lifecycle</li>
<li>Detection Engineering and Threat Intelligence</li>
<li>Detection Engineering and the SOC</li>
<li>Detection Engineering and Incident Response</li>
<li>Working with SIEM Systems</li>
<li>Building on Your Detection Skills</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Constructing Defense</title>
		<link>https://training.dfirdiva.com/listing/constructing-defense</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 18 Apr 2024 04:16:16 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2765</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Name &#38; Direct Link: Constructing Defense Platform: Constructing Defense Cost: $150 (get 25% off using code: DFIRDIVA) Proof of Completion: Certificate of Completion Topics Include:  Lab Construction and Provisioning Terraform Setup Domain Controller Windows 11 Certer Linux PCAP Cloud Accounts (Azure, AWS) Kubernetes Setup Sysmon Setup Telemetry Setup &#38; Miscellaneous Lab Configuration Windows Auditing and&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2022/11/PurpleTeam-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p><p><strong>Name &amp; Direct Link: <a href="https://course.constructingdefense.com/constructing-defense">Constructing Defense</a></strong></p>
<p><strong>Platform</strong>: Constructing Defense</p>
<p><strong>Cost</strong>: $150 (get 25% off using code: DFIRDIVA)</p>
<p><strong>Proof of Completion</strong>: Certificate of Completion</p>
<p><strong>Topics Include: </strong></p>
<ul>
<li>Lab Construction and Provisioning</li>
<li>Terraform Setup</li>
<li>Domain Controller</li>
<li>Windows 11</li>
<li>Certer</li>
<li>Linux</li>
<li>PCAP</li>
<li>Cloud Accounts (Azure, AWS)</li>
<li>Kubernetes Setup</li>
<li>Sysmon Setup</li>
<li>Telemetry Setup &amp; Miscellaneous Lab Configuration</li>
<li>Windows Auditing and GPO Setup</li>
<li>Linux Auditd + Laurel</li>
<li>SIEM</li>
<li>Windows and Linux Event Collection</li>
<li>Kubernetes Monitoring</li>
<li>Cloud Collection</li>
<li>Lab Executions</li>
<li>Credential Access</li>
<li>Lateral Movement</li>
<li>Threat Detection</li>
<li>LOLBAS / LOLBINs</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
