app.letsdefend.io Open in urlscan Pro
2606:4700:20::681a:745  Public Scan

URL: https://app.letsdefend.io/training
Submission: On May 13 via manual from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Home
Learn
Practice
Challenge
Pricing
Login
Register

Filter Menu

Reset All


 * LEARNING TYPE
   
   Path(5)
   Course(121)
   Challenge(61)
   Lesson(829)
   Quiz(91)


 * CATEGORIES
   
   Architecture(352)
   Cloud(67)
   Code Analysis(10)
   Cryptology(16)
   Detection(624)
   Forensics(145)
   Incident Response(321)
   Linux(320)
   MacOS(7)
   Malware(166)
   Memory Analysis(38)
   Network(243)
   PDF Analysis(3)
   Phishing(25)
   Ransomware(11)
   Reverse Engineering(9)
   Soft Skills(23)
   Threat Intelligence(56)
   Web Attacks(104)
   Windows(422)


 * SKILL LEVEL
   
   Beginner(84)
   Easy(162)
   Medium(406)
   Hard(455)


 * ROLE
   
   Security Analyst(426)
   Incident Responder(401)
   Detection Engineer(266)
   Cloud Security Engineer(67)
   Information Security Specialist(56)


 * STATUS
   
   Uncompleted(1107)
   In Progress(0)
   Completed(0)

Not sure where to start?
Take our quiz →
FilterMenu
1108 Results

Path

DETECTION ENGINEERING PATH

Detection Engineering: Advanced cybersecurity training focusing on threat
detection tools, incident response, and advanced log analysis for experienced
cybersecurity professionals
Detection EngineerHard
Detection Engineering: Advanced cybersecurity training focusing on threat
detection tools, incident response, and advanced log analysis for experienced
cybersecurity professionals

Path

MALWARE ANALYSIS SKILL PATH

This malware analysis skill path is designed to equip cybersecurity
professionals, SOC analysts, IT enthusiasts, and students with the knowledge and
hands-on expertise to identify, analyze, and mitigate malware threats and
networks from cyberattacks effectively.
Security AnalystMedium
This malware analysis skill path is designed to equip cybersecurity
professionals, SOC analysts, IT enthusiasts, and students with the knowledge and
hands-on expertise to identify, analyze, and mitigate malware threats and
networks from cyberattacks effectively.

Path

INCIDENT RESPONDER PATH

This path teaches the technical skills needed for responding to security
incidents and handling cyber attacks.
Security AnalystHard
This path teaches the technical skills needed for responding to security
incidents and handling cyber attacks.

Path

SOC ANALYST LEARNING PATH

Learn the technical skills necessary for a career in Security Operations Center
(SOC) analysis.
Security AnalystMedium
Learn the technical skills necessary for a career in Security Operations Center
(SOC) analysis.

Path

CYBERSECURITY FOR STUDENTS

This learning path equips students with essential cybersecurity knowledge and
helps build their careers in blue team.
Security AnalystBeginner
This learning path equips students with essential cybersecurity knowledge and
helps build their careers in blue team.

New


Course

COMPUTER CRIME AND LEGAL ISSUES

Explore the intersection of technology and law in understanding, preventing, and
prosecuting computer-related crimes.
Information Security SpecialistEasy

Explore the intersection of technology and law in understanding, preventing, and
prosecuting computer-related crimes.

Course

NETWORK FORENSICS

Discover Network Forensics techniques through hands-on labs using advanced
cybersecurity tools.
Incident ResponderMedium

Discover Network Forensics techniques through hands-on labs using advanced
cybersecurity tools.

Course

PHYSICAL SECURITY

Master the art of safeguarding digital infrastructure with expertly crafted
physical security strategies in this indispensable Blue Team course.
Information Security SpecialistEasy

Master the art of safeguarding digital infrastructure with expertly crafted
physical security strategies in this indispensable Blue Team course.

Course

WINDOWS MEMORY FORENSICS

Unlock the secrets of Windows Memory Forensics in our hands-on course.
Incident ResponderHard

Unlock the secrets of Windows Memory Forensics in our hands-on course.

Course

SYSTEM ARCHITECTURE AND HARDWARE SECURITY

Explore the relationship between system architecture and hardware security in
this course.
Information Security SpecialistMedium

Explore the relationship between system architecture and hardware security in
this course.

Course

LINUX MEMORY FORENSICS

Learn techniques and tools for analyzing memory dumps in Linux environments to
uncover forensic evidence and investigate security incidents.
Incident ResponderHard

Learn techniques and tools for analyzing memory dumps in Linux environments to
uncover forensic evidence and investigate security incidents.

Course

SECURITY AUDIT AND TESTING

Learn how to assess and enhance the security posture of systems through
comprehensive auditing and testing methodologies.
Information Security SpecialistEasy

Learn how to assess and enhance the security posture of systems through
comprehensive auditing and testing methodologies.

Course

PRACTICAL GCP CLOUD ARMOR

Explore practical methods for implementing and optimizing Google Cloud Armor to
fortify security within your GCP infrastructure.
Cloud Security EngineerHard

Explore practical methods for implementing and optimizing Google Cloud Armor to
fortify security within your GCP infrastructure.

Course

AWS IDENTITY AND ACCESS MANAGEMENT

Learn how to effectively manage user identities and control access to AWS
resources.
Cloud Security EngineerEasy

Learn how to effectively manage user identities and control access to AWS
resources.

Course

ADVANCED EVENT LOG ANALYSIS

Dive into Advanced Event Log Analysis techniques tailored for incident
responders to swiftly detect, investigate, and mitigate security incidents.
Incident ResponderHard

Dive into Advanced Event Log Analysis techniques tailored for incident
responders to swiftly detect, investigate, and mitigate security incidents.

Course

AWS INCIDENT MANAGER - SYSTEM MANAGER

Learn to effectively manage and respond to incidents within AWS environments
using Incident Manager and System Manager tools.
Cloud Security EngineerEasy

Learn to effectively manage and respond to incidents within AWS environments
using Incident Manager and System Manager tools.

Course

RISK MANAGEMENT

Strengthen the risk management skills of information security professionals with
specialized training tailored to the digital environment.
Information Security SpecialistMedium

Strengthen the risk management skills of information security professionals with
specialized training tailored to the digital environment.

Course

CLOUD ARMOR NETWORK SECURITY

Learn how to safeguard your cloud infrastructure with advanced network security
techniques in the Cloud Armor Network Security course.
Cloud Security EngineerMedium

Learn how to safeguard your cloud infrastructure with advanced network security
techniques in the Cloud Armor Network Security course.

Course

AWS CLOUDTRAIL: UNVEILING AWS ACCOUNT ACTIVITY

AWS CloudTrail allows for detailed monitoring and auditing of your AWS account
activity, enabling robust security and compliance measures for your cloud
environment.
Cloud Security EngineerMedium

AWS CloudTrail allows for detailed monitoring and auditing of your AWS account
activity, enabling robust security and compliance measures for your cloud
environment.

Course

INFORMATION SECURITY BASICS

This course equips learners with vital skills to fortify digital defenses
against evolving cyber threats in information security.
Information Security SpecialistMedium

This course equips learners with vital skills to fortify digital defenses
against evolving cyber threats in information security.

Course

THREAT HUNTING FOR C2 WITH RITA

Learn C2 threat hunting with RITA in this course.
Incident ResponderHard

Learn C2 threat hunting with RITA in this course.

Course

AMAZON VIRTUAL PRIVATE CLOUD (VPC)

This course covers Amazon Virtual Private Cloud (VPC) to enhance your
understanding of cloud security in AWS environments.
Incident ResponderMedium

This course covers Amazon Virtual Private Cloud (VPC) to enhance your
understanding of cloud security in AWS environments.

Course

AWS GUARDDUTY FOR BLUE TEAM

Effectively leverage AWS GuardDuty in your Blue Team toolkit for robust cloud
security defense.
Cloud Security EngineerHard

Effectively leverage AWS GuardDuty in your Blue Team toolkit for robust cloud
security defense.

Course

GCP CLOUD LOGGING

Explore the essentials of Google Cloud Platform (GCP) Cloud Logging in this
course, gaining expertise in efficient log management, analysis within the GCP
environment.
Cloud Security EngineerMedium

Explore the essentials of Google Cloud Platform (GCP) Cloud Logging in this
course, gaining expertise in efficient log management, analysis within the GCP
environment.

Course

USB FORENSICS

Master USB forensics to analyze and extract digital evidence from USB devices
with this comprehensive course
Incident ResponderHard

Master USB forensics to analyze and extract digital evidence from USB devices
with this comprehensive course

Course

AWS WAF: DEFENDING WEB APPLICATIONS IN THE CLOUD

Learn to secure web applications in the cloud with 'AWS WAF,' mastering defense
strategies for enhanced protection
Cloud Security EngineerMedium

Learn to secure web applications in the cloud with 'AWS WAF,' mastering defense
strategies for enhanced protection

Course

DETECTING CONFLUENCE CVES

Detect and secure against Confluence CVEs in this targeted course.
Incident ResponderHard

Detect and secure against Confluence CVEs in this targeted course.

Course

AWS S3 BASICS

Discover AWS S3 basics in cybersecurity, emphasizing secure data storage
practices
Cloud Security EngineerMedium

Discover AWS S3 basics in cybersecurity, emphasizing secure data storage
practices

Course

ORGANIZATIONAL STRUCTURE AND HUMAN RESOURCE SECURITY

Navigate organizational security with a focus on structure and human resources
in this insightful course.
Information Security SpecialistMedium

Navigate organizational security with a focus on structure and human resources
in this insightful course.

Course

THREAT HUNTING WITH SYSMON

Master the art of threat hunting using Sysmon to proactively detect and mitigate
cybersecurity threats.
Incident ResponderHard

Master the art of threat hunting using Sysmon to proactively detect and mitigate
cybersecurity threats.




SOCIAL

 * 
 * 
 * 
 * 
 * 


RESOURCES

Blog
MITRE ATT&CK Map
Dictionary
Use Cases


SUPPORT

Contact us
Help Center
Forum
Walkthroughs
Videos
Tour


COMMUNITY

Discord
Contribute


PLANS

For individual
For teams
For students


ROLES

SOC Analyst
Incident Responder
Detection Engineer

LetsDefend


SOCIAL

 * 
 * 
 * 
 * 
 * 

RESOURCES



Blog
MITRE ATT&CK Map
Dictionary
Use Cases

SUPPORT



Contact us
Help Center
Forum
Walkthroughs
Videos
Tour

COMMUNITY



Discord
Contribute

PLANS



For individual
For teams
For students

ROLES



SOC Analyst
Incident Responder
Detection Engineer