File Integrity Monitoring

- Posted in Project by

What is the CIA Triad? The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security [...]
Persistence is a common tactic used by cybercriminals to maintain long-term access to compromised systems. Detecting these techniques early is critical for effective incident response. In this lab, [...]

Netstat Command In Linux

- Posted in Discussion by

NETSTAT In today's digital world networks connect everything. Whether you're fixing connection problems checking system performance or looking into suspicious activity understanding network traffic [...]

SOC Automation Lab

- Posted in Project by

In this project, I will delve into the setup and automation of Secure Operations Center (SOC). Overview Windows 10 Host (hosted in Azure ) Wazuh server (hosted in DigitalOcean cloud) TheHive server [...]