51:44Automated Firewall IP Blocking from a Live Threat Feed (Full Script Walkthrough)funbird8 views·1 week ago
24:07How to Manually Analyze Firewall Logs, VPN & Web Application Firewall on Ubuntu (SOC Analyst Guide)funbird17 views·1 week ago
5:18Wireshark Traffic Analysis Decoding Kerberos Protocol SOC Analyst Blue Team Labfunbird34 views·1 month ago
51:44Writing a Bash Script to Automate Threat Feeds on Linux SOC Analyst Labfunbird25 views·1 month ago
24:13Wireshark FTP Traffic Analysis How to Detect Data Exfiltration Like a SOC Analystfunbird13 views·1 month ago
10:19Wireshark Analysis on DHCP Protocol Blue Team Network Traffic Deep Dive CySA+ Exam Prepfunbird1 views·1 month ago
10:17Unmasking DNS Spoofing on Network Traffic PCAP Part 3 Advanced Wireshark Detectionfunbird41 views·1 month ago
6:09Unmasking DNS Spoofing on Network Traffic PCAP Part 2 Wireshark Blue Team Analysisfunbird14 views·1 month ago
19:37Wireshark Analysis of Man-in-the-Middle Detection Part 1 PCAP Network Traffic Forensicsfunbird11 views·1 month ago
13:56Spotting SSL Stripping in Action Wireshark PCAP Network Traffic Analysisfunbird18 views·1 month ago
6:11NetworkMiner Credentials, DNS & Anomaly Detection Blue Team Series Part 3funbird9 views·1 month ago
1:20NetworkMiner IOC Extraction & Deep PCAP Inspection Blue Team Series Part 2funbird6 views·1 month ago
18:31NetworkMiner for Beginners PCAP Analysis & Network Forensics Blue Team Series Part 1funbird79 views·1 month ago
3:35IDS Fundamentals Using Snort Intrusion Detection Explained for SOC Analysts & CySA+funbird12 views·2 months ago
8:00Wireshark HTTP User-Agent Analysis Detect Suspicious Traffic Like a SOC Analystfunbird5 views·2 months ago
9:46Detect Data Exfiltration in HTTP Logs Using Splunk SOC Analyst Skills & CySA+ CS0-003 Prepfunbird5 views·2 months ago
29:48Web Vulnerability Scanning for Beginners Find & Exploit Web Flaws Step-by-Step Part 1funbird22 views·1 year ago
51:43Malware Analysis for Beginners Extract, Hash & Investigate Malicious Filesfunbird4.8K views·1 year ago
59:04How to Hunt & Analyze Indicators of Compromise (IoCs) Threat Hunting for Beginnersfunbird138 views·1 year ago
1:22:44How to Configure Centralized Logging in Windows Server Manager Event Log Forwarding Tutorialfunbird7 views·1 year ago
4:10Local Group Policy Editor The Ultimate Windows Security Hardening Tutorialfunbird41 views·1 year ago
1:10Top 5 Apps & Websites Used by Billions Worldwide — You've Never Heard of These! Loveworld Networksfunbird41 views·3 years ago