2:00:20Scenario 1 Threat Hunt Notes Devices Accidentally Exposed to the InternetNii OB’s Tech Journey1 views·1 day ago
47:4602. Detecting Remote Code Execution with Microsoft Defender KQL & Automated Response LabNii OB’s Tech Journey15 views·1 month ago
1:08:1401. From Setup to Investigation MDE Lab with Advanced HuntingNii OB’s Tech Journey32 views·1 month ago
21:5302. Cloud Security with AWS IAM Users, Policies, EC2 & Policy SimulatorNii OB’s Tech Journey15 views·1 month ago
13:0201. Host a Website on Amazon S3 AWS Beginner Project (ACLs & Bucket Policy)Nii OB’s Tech Journey10 views·1 month ago
8:3004. Detecting Malicious Traffic with Microsoft Sentinel World Map Visualization LabNii OB’s Tech Journey6 views·1 month ago
8:0903. VM Authentication Failures Visualization Microsoft Sentinel World Map LabNii OB’s Tech Journey6 views·1 month ago
15:0802. Azure Resource Activity Visualization in Microsoft Sentinel World Map Workbook LabNii OB’s Tech Journey22 views·1 month ago
32:5501. Microsoft Sentinel World Map Visualization Entra ID Authentication Success & Failure LogsNii OB’s Tech Journey9 views·1 month ago
54:2610. Programmatic Vulnerability Remediation in Linux Using Bash Security LabNii OB’s Tech Journey4 views·2 months ago
1:09:2109. Programmatic Vulnerability Remediation in Windows Using PowerShell Security LabNii OB’s Tech Journey3 views·2 months ago
35:3908. Manual Vulnerability Remediation on Ubuntu Linux Security Lab via TenableNii OB’s Tech Journey19 views·2 months ago
45:3307. Manual Vulnerability Creation & Remediation on Windows Tenable Vulnerability Management LabNii OB’s Tech Journey16 views·2 months ago
7:1206. Network Discovery Scan of the Cyber Range Subnets Tenable Asset Discovery LabNii OB’s Tech Journey4 views·2 months ago
31:3905. Vulnerability Scanning on Linux Agent-Based MonitoringNii OB’s Tech Journey1 views·2 months ago
37:3804. Vulnerability Scanning on Windows Agent-Based MonitoringNii OB’s Tech Journey25 views·2 months ago