app.letsdefend.io Open in urlscan Pro
2606:4700:20::681a:e3d  Public Scan

URL: https://app.letsdefend.io/training
Submission Tags: falconsandbox
Submission: On February 21 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Home
Learn
Practice
Challenge
Pricing
Login
Register

Filter Menu

Reset All


 * LEARNING TYPE
   
   Path(5)
   Course(109)
   Challenge(49)
   Lesson(761)
   Quiz(82)


 * CATEGORIES
   
   Architecture(323)
   Cloud(48)
   Code Analysis(4)
   Cryptology(16)
   Detection(585)
   Forensics(113)
   Incident Response(283)
   Linux(306)
   Malware(158)
   Memory Analysis(23)
   Network(235)
   PDF Analysis(1)
   Phishing(25)
   Ransomware(9)
   Reverse Engineering(4)
   Soft Skills(16)
   Threat Intelligence(56)
   Web Attacks(104)
   Windows(394)


 * SKILL LEVEL
   
   Beginner(84)
   Easy(125)
   Medium(374)
   Hard(423)


 * ROLE
   
   Security Analyst(423)
   Incident Responder(364)
   Detection Engineer(275)
   Cloud Security Engineer(48)


 * STATUS
   
   Uncompleted(1006)
   In Progress(0)
   Completed(0)

Not sure where to start?
Take our quiz →
FilterMenu
1011 Results

Path

DETECTION ENGINEERING PATH

Detection Engineering: Advanced cybersecurity training focusing on threat
detection tools, incident response, and advanced log analysis for experienced
cybersecurity professionals
Detection EngineerHard
Detection Engineering: Advanced cybersecurity training focusing on threat
detection tools, incident response, and advanced log analysis for experienced
cybersecurity professionals

Path

MALWARE ANALYSIS SKILL PATH

This malware analysis skill path is designed to equip cybersecurity
professionals, SOC analysts, IT enthusiasts, and students with the knowledge and
hands-on expertise to identify, analyze, and mitigate malware threats and
networks from cyberattacks effectively.
Security AnalystMedium
This malware analysis skill path is designed to equip cybersecurity
professionals, SOC analysts, IT enthusiasts, and students with the knowledge and
hands-on expertise to identify, analyze, and mitigate malware threats and
networks from cyberattacks effectively.

Path

INCIDENT RESPONDER PATH

This path teaches the technical skills needed for responding to security
incidents and handling cyber attacks.
Security AnalystHard
This path teaches the technical skills needed for responding to security
incidents and handling cyber attacks.

Path

SOC ANALYST LEARNING PATH

Learn the technical skills necessary for a career in Security Operations Center
(SOC) analysis.
Security AnalystMedium
Learn the technical skills necessary for a career in Security Operations Center
(SOC) analysis.

Path

CYBERSECURITY FOR STUDENTS

This learning path equips students with essential cybersecurity knowledge and
helps build their careers in blue team.
Security AnalystBeginner
This learning path equips students with essential cybersecurity knowledge and
helps build their careers in blue team.

New


Course

CLOUD ARMOR NETWORK SECURITY

Learn how to safeguard your cloud infrastructure with advanced network security
techniques in the Cloud Armor Network Security course.
Cloud Security EngineerMedium

Learn how to safeguard your cloud infrastructure with advanced network security
techniques in the Cloud Armor Network Security course.

Course

AWS CLOUDTRAIL: UNVEILING AWS ACCOUNT ACTIVITY

AWS CloudTrail allows for detailed monitoring and auditing of your AWS account
activity, enabling robust security and compliance measures for your cloud
environment.
Cloud Security EngineerMedium

AWS CloudTrail allows for detailed monitoring and auditing of your AWS account
activity, enabling robust security and compliance measures for your cloud
environment.

Course

INFORMATION SECURITY BASICS

This course equips learners with vital skills to fortify digital defenses
against evolving cyber threats in information security.
Incident ResponderMedium

This course equips learners with vital skills to fortify digital defenses
against evolving cyber threats in information security.

Course

THREAT HUNTING FOR C2 WITH RITA

Learn C2 threat hunting with RITA in this course.
Incident ResponderHard

Learn C2 threat hunting with RITA in this course.

Course

AMAZON VIRTUAL PRIVATE CLOUD (VPC)

This course covers Amazon Virtual Private Cloud (VPC) to enhance your
understanding of cloud security in AWS environments.
Incident ResponderMedium

This course covers Amazon Virtual Private Cloud (VPC) to enhance your
understanding of cloud security in AWS environments.

Course

AWS GUARDDUTY FOR BLUE TEAM

Effectively leverage AWS GuardDuty in your Blue Team toolkit for robust cloud
security defense.
Cloud Security EngineerHard

Effectively leverage AWS GuardDuty in your Blue Team toolkit for robust cloud
security defense.

Course

GCP CLOUD LOGGING

Explore the essentials of Google Cloud Platform (GCP) Cloud Logging in this
course, gaining expertise in efficient log management, analysis within the GCP
environment.
Cloud Security EngineerMedium

Explore the essentials of Google Cloud Platform (GCP) Cloud Logging in this
course, gaining expertise in efficient log management, analysis within the GCP
environment.

Course

USB FORENSICS

Master USB forensics to analyze and extract digital evidence from USB devices
with this comprehensive course
Incident ResponderHard

Master USB forensics to analyze and extract digital evidence from USB devices
with this comprehensive course

Course

AWS WAF: DEFENDING WEB APPLICATIONS IN THE CLOUD

Learn to secure web applications in the cloud with 'AWS WAF,' mastering defense
strategies for enhanced protection
Cloud Security EngineerMedium

Learn to secure web applications in the cloud with 'AWS WAF,' mastering defense
strategies for enhanced protection

Course

DETECTING CONFLUENCE CVES

Detect and secure against Confluence CVEs in this targeted course.
Incident ResponderHard

Detect and secure against Confluence CVEs in this targeted course.

Course

AWS S3 BASICS

Discover AWS S3 basics in cybersecurity, emphasizing secure data storage
practices
Cloud Security EngineerMedium

Discover AWS S3 basics in cybersecurity, emphasizing secure data storage
practices

Course

ORGANIZATIONAL STRUCTURE AND HUMAN RESOURCE SECURITY

Navigate organizational security with a focus on structure and human resources
in this insightful course.
Detection EngineerMedium

Navigate organizational security with a focus on structure and human resources
in this insightful course.

Course

THREAT HUNTING WITH SYSMON

Master the art of threat hunting using Sysmon to proactively detect and mitigate
cybersecurity threats.
Incident ResponderHard

Master the art of threat hunting using Sysmon to proactively detect and mitigate
cybersecurity threats.

Course

AWS CLOUDWATCH

Master AWS CloudWatch for cybersecurity, gaining advanced insights and proactive
monitoring capabilities to fortify and safeguard your cloud infrastructure.
Cloud Security EngineerMedium

Master AWS CloudWatch for cybersecurity, gaining advanced insights and proactive
monitoring capabilities to fortify and safeguard your cloud infrastructure.

Course

ADVANCED SOAR

Advance your Security Orchestration, Automation, and Response (SOAR) skills with
this in-depth course
Detection EngineerHard

Advance your Security Orchestration, Automation, and Response (SOAR) skills with
this in-depth course

Course

OPEN SOURCE SOAR: THEHIVE

Explore TheHive, an open-source Security Orchestration, Automation, and Response
(SOAR) platform
Detection EngineerHard

Explore TheHive, an open-source Security Orchestration, Automation, and Response
(SOAR) platform

Course

SOAR FUNDAMENTALS

Acquire foundational knowledge in Security Orchestration, Automation, and
Response (SOAR) in this introductory course
Detection EngineerMedium

Acquire foundational knowledge in Security Orchestration, Automation, and
Response (SOAR) in this introductory course

Course

SIEM ALERT TUNING

Enhance your expertise in SIEM alert tuning to minimize false positive alerts
and optimize cybersecurity incident detection in this specialized course
Detection EngineerHard

Enhance your expertise in SIEM alert tuning to minimize false positive alerts
and optimize cybersecurity incident detection in this specialized course

Course

SIEM LOG SEARCH, ANALYSIS AND REPORTING

Gain advanced skills in searching, analyzing, and reporting logs within SIEM
systems for enhanced cybersecurity capabilities
Detection EngineerHard

Gain advanced skills in searching, analyzing, and reporting logs within SIEM
systems for enhanced cybersecurity capabilities

Course

SIEM ALERT GENERATION

Gain expertise in generating effective alerts within SIEM for advanced threat
detection in this specialized course
Detection EngineerHard

Gain expertise in generating effective alerts within SIEM for advanced threat
detection in this specialized course

Course

SIEM LOG COLLECTION AND PARSING

Refine your cybersecurity skills with focused expertise in SIEM log collection
and parsing techniques in this course
Detection EngineerHard

Refine your cybersecurity skills with focused expertise in SIEM log collection
and parsing techniques in this course

Course

SIEM BASICS, INSTALLATION AND CONFIGURATION

Discover the fundamentals of SIEM through hands-on installation and
configuration guidance in this course
Detection EngineerEasy

Discover the fundamentals of SIEM through hands-on installation and
configuration guidance in this course

Course

VULNERABILITY MANAGEMENT

Learn to effectively manage vulnerabilities for stronger cybersecurity defenses
Detection EngineerHard

Learn to effectively manage vulnerabilities for stronger cybersecurity defenses

Course

CYBER THREAT INTELLIGENCE FOR DETECTION

Learn how to use Cyber Threat Intelligence to develop effective strategies for
detecting threats in cybersecurity
Detection EngineerMedium

Learn how to use Cyber Threat Intelligence to develop effective strategies for
detecting threats in cybersecurity

Course

ATTACK SURFACE MANAGEMENT

Dive into Attack Surface Management to secure systems by reducing potential
vulnerabilities
Detection EngineerHard

Dive into Attack Surface Management to secure systems by reducing potential
vulnerabilities




SOCIAL

 * 
 * 
 * 
 * 
 * 


RESOURCES

Blog
MITRE ATT&CK Map
Dictionary
Use Cases


SUPPORT

Contact us
Help Center
Forum
Walkthroughs
Videos
Tour


COMMUNITY

Discord
Contribute


PLANS

For individual
For teams
For students


ROLES

SOC Analyst
Incident Responder
Detection Engineer

LetsDefend


SOCIAL

 * 
 * 
 * 
 * 
 * 

RESOURCES



Blog
MITRE ATT&CK Map
Dictionary
Use Cases

SUPPORT



Contact us
Help Center
Forum
Walkthroughs
Videos
Tour

COMMUNITY



Discord
Contribute

PLANS



For individual
For teams
For students

ROLES



SOC Analyst
Incident Responder
Detection Engineer