every resource found necessary to read/use during our training phase at coordinates
- Mitre Attack Tactics
- Windows Security Log Events
- Article: windows logs don't make sense
- sharepoint & onedrive unmanaged device access controls
- Article: user-based MFA vs CA MFA
- Azure AD block legacy authentication with conditional Access
- Microsoft Login Error Codes
- Video: IR event log analysis
- SIEM solutions crash course
- Documentaion: FortiGate Logs
- Anti-Virus vs EDR
- IPsec protocol
- Documentaion: mimecast logs
- Documentation: Palo Alto logs
- Video: IPsec site-2-site tunnels
- Documentation: sonicwall firewall log
- Video: Email Header Analysis and Forensics
- What is SPF?
- SPF syntax
- Article: SPF hard fail vs soft fail
- multiple email security using arc-authentication
- Documentation: Office 365 logs
- Documentation: ATP Mail Blocking Detection technologies
- Documentation: LogRhythm Search Syntax
- Documentation: FortiSIEM