app.letsdefend.io
Open in
urlscan Pro
2606:4700:20::681a:e3d
Public Scan
URL:
https://app.letsdefend.io/training
Submission Tags: falconsandbox
Submission: On February 21 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On February 21 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Home Learn Practice Challenge Pricing Login Register Filter Menu Reset All * LEARNING TYPE Path(5) Course(109) Challenge(49) Lesson(761) Quiz(82) * CATEGORIES Architecture(323) Cloud(48) Code Analysis(4) Cryptology(16) Detection(585) Forensics(113) Incident Response(283) Linux(306) Malware(158) Memory Analysis(23) Network(235) PDF Analysis(1) Phishing(25) Ransomware(9) Reverse Engineering(4) Soft Skills(16) Threat Intelligence(56) Web Attacks(104) Windows(394) * SKILL LEVEL Beginner(84) Easy(125) Medium(374) Hard(423) * ROLE Security Analyst(423) Incident Responder(364) Detection Engineer(275) Cloud Security Engineer(48) * STATUS Uncompleted(1006) In Progress(0) Completed(0) Not sure where to start? Take our quiz → FilterMenu 1011 Results Path DETECTION ENGINEERING PATH Detection Engineering: Advanced cybersecurity training focusing on threat detection tools, incident response, and advanced log analysis for experienced cybersecurity professionals Detection EngineerHard Detection Engineering: Advanced cybersecurity training focusing on threat detection tools, incident response, and advanced log analysis for experienced cybersecurity professionals Path MALWARE ANALYSIS SKILL PATH This malware analysis skill path is designed to equip cybersecurity professionals, SOC analysts, IT enthusiasts, and students with the knowledge and hands-on expertise to identify, analyze, and mitigate malware threats and networks from cyberattacks effectively. Security AnalystMedium This malware analysis skill path is designed to equip cybersecurity professionals, SOC analysts, IT enthusiasts, and students with the knowledge and hands-on expertise to identify, analyze, and mitigate malware threats and networks from cyberattacks effectively. Path INCIDENT RESPONDER PATH This path teaches the technical skills needed for responding to security incidents and handling cyber attacks. Security AnalystHard This path teaches the technical skills needed for responding to security incidents and handling cyber attacks. Path SOC ANALYST LEARNING PATH Learn the technical skills necessary for a career in Security Operations Center (SOC) analysis. Security AnalystMedium Learn the technical skills necessary for a career in Security Operations Center (SOC) analysis. Path CYBERSECURITY FOR STUDENTS This learning path equips students with essential cybersecurity knowledge and helps build their careers in blue team. Security AnalystBeginner This learning path equips students with essential cybersecurity knowledge and helps build their careers in blue team. New Course CLOUD ARMOR NETWORK SECURITY Learn how to safeguard your cloud infrastructure with advanced network security techniques in the Cloud Armor Network Security course. Cloud Security EngineerMedium Learn how to safeguard your cloud infrastructure with advanced network security techniques in the Cloud Armor Network Security course. Course AWS CLOUDTRAIL: UNVEILING AWS ACCOUNT ACTIVITY AWS CloudTrail allows for detailed monitoring and auditing of your AWS account activity, enabling robust security and compliance measures for your cloud environment. Cloud Security EngineerMedium AWS CloudTrail allows for detailed monitoring and auditing of your AWS account activity, enabling robust security and compliance measures for your cloud environment. Course INFORMATION SECURITY BASICS This course equips learners with vital skills to fortify digital defenses against evolving cyber threats in information security. Incident ResponderMedium This course equips learners with vital skills to fortify digital defenses against evolving cyber threats in information security. Course THREAT HUNTING FOR C2 WITH RITA Learn C2 threat hunting with RITA in this course. Incident ResponderHard Learn C2 threat hunting with RITA in this course. Course AMAZON VIRTUAL PRIVATE CLOUD (VPC) This course covers Amazon Virtual Private Cloud (VPC) to enhance your understanding of cloud security in AWS environments. Incident ResponderMedium This course covers Amazon Virtual Private Cloud (VPC) to enhance your understanding of cloud security in AWS environments. Course AWS GUARDDUTY FOR BLUE TEAM Effectively leverage AWS GuardDuty in your Blue Team toolkit for robust cloud security defense. Cloud Security EngineerHard Effectively leverage AWS GuardDuty in your Blue Team toolkit for robust cloud security defense. Course GCP CLOUD LOGGING Explore the essentials of Google Cloud Platform (GCP) Cloud Logging in this course, gaining expertise in efficient log management, analysis within the GCP environment. Cloud Security EngineerMedium Explore the essentials of Google Cloud Platform (GCP) Cloud Logging in this course, gaining expertise in efficient log management, analysis within the GCP environment. Course USB FORENSICS Master USB forensics to analyze and extract digital evidence from USB devices with this comprehensive course Incident ResponderHard Master USB forensics to analyze and extract digital evidence from USB devices with this comprehensive course Course AWS WAF: DEFENDING WEB APPLICATIONS IN THE CLOUD Learn to secure web applications in the cloud with 'AWS WAF,' mastering defense strategies for enhanced protection Cloud Security EngineerMedium Learn to secure web applications in the cloud with 'AWS WAF,' mastering defense strategies for enhanced protection Course DETECTING CONFLUENCE CVES Detect and secure against Confluence CVEs in this targeted course. Incident ResponderHard Detect and secure against Confluence CVEs in this targeted course. Course AWS S3 BASICS Discover AWS S3 basics in cybersecurity, emphasizing secure data storage practices Cloud Security EngineerMedium Discover AWS S3 basics in cybersecurity, emphasizing secure data storage practices Course ORGANIZATIONAL STRUCTURE AND HUMAN RESOURCE SECURITY Navigate organizational security with a focus on structure and human resources in this insightful course. Detection EngineerMedium Navigate organizational security with a focus on structure and human resources in this insightful course. Course THREAT HUNTING WITH SYSMON Master the art of threat hunting using Sysmon to proactively detect and mitigate cybersecurity threats. Incident ResponderHard Master the art of threat hunting using Sysmon to proactively detect and mitigate cybersecurity threats. Course AWS CLOUDWATCH Master AWS CloudWatch for cybersecurity, gaining advanced insights and proactive monitoring capabilities to fortify and safeguard your cloud infrastructure. Cloud Security EngineerMedium Master AWS CloudWatch for cybersecurity, gaining advanced insights and proactive monitoring capabilities to fortify and safeguard your cloud infrastructure. Course ADVANCED SOAR Advance your Security Orchestration, Automation, and Response (SOAR) skills with this in-depth course Detection EngineerHard Advance your Security Orchestration, Automation, and Response (SOAR) skills with this in-depth course Course OPEN SOURCE SOAR: THEHIVE Explore TheHive, an open-source Security Orchestration, Automation, and Response (SOAR) platform Detection EngineerHard Explore TheHive, an open-source Security Orchestration, Automation, and Response (SOAR) platform Course SOAR FUNDAMENTALS Acquire foundational knowledge in Security Orchestration, Automation, and Response (SOAR) in this introductory course Detection EngineerMedium Acquire foundational knowledge in Security Orchestration, Automation, and Response (SOAR) in this introductory course Course SIEM ALERT TUNING Enhance your expertise in SIEM alert tuning to minimize false positive alerts and optimize cybersecurity incident detection in this specialized course Detection EngineerHard Enhance your expertise in SIEM alert tuning to minimize false positive alerts and optimize cybersecurity incident detection in this specialized course Course SIEM LOG SEARCH, ANALYSIS AND REPORTING Gain advanced skills in searching, analyzing, and reporting logs within SIEM systems for enhanced cybersecurity capabilities Detection EngineerHard Gain advanced skills in searching, analyzing, and reporting logs within SIEM systems for enhanced cybersecurity capabilities Course SIEM ALERT GENERATION Gain expertise in generating effective alerts within SIEM for advanced threat detection in this specialized course Detection EngineerHard Gain expertise in generating effective alerts within SIEM for advanced threat detection in this specialized course Course SIEM LOG COLLECTION AND PARSING Refine your cybersecurity skills with focused expertise in SIEM log collection and parsing techniques in this course Detection EngineerHard Refine your cybersecurity skills with focused expertise in SIEM log collection and parsing techniques in this course Course SIEM BASICS, INSTALLATION AND CONFIGURATION Discover the fundamentals of SIEM through hands-on installation and configuration guidance in this course Detection EngineerEasy Discover the fundamentals of SIEM through hands-on installation and configuration guidance in this course Course VULNERABILITY MANAGEMENT Learn to effectively manage vulnerabilities for stronger cybersecurity defenses Detection EngineerHard Learn to effectively manage vulnerabilities for stronger cybersecurity defenses Course CYBER THREAT INTELLIGENCE FOR DETECTION Learn how to use Cyber Threat Intelligence to develop effective strategies for detecting threats in cybersecurity Detection EngineerMedium Learn how to use Cyber Threat Intelligence to develop effective strategies for detecting threats in cybersecurity Course ATTACK SURFACE MANAGEMENT Dive into Attack Surface Management to secure systems by reducing potential vulnerabilities Detection EngineerHard Dive into Attack Surface Management to secure systems by reducing potential vulnerabilities SOCIAL * * * * * RESOURCES Blog MITRE ATT&CK Map Dictionary Use Cases SUPPORT Contact us Help Center Forum Walkthroughs Videos Tour COMMUNITY Discord Contribute PLANS For individual For teams For students ROLES SOC Analyst Incident Responder Detection Engineer LetsDefend SOCIAL * * * * * RESOURCES Blog MITRE ATT&CK Map Dictionary Use Cases SUPPORT Contact us Help Center Forum Walkthroughs Videos Tour COMMUNITY Discord Contribute PLANS For individual For teams For students ROLES SOC Analyst Incident Responder Detection Engineer