CYBERSECURITY
BLUE TEAM CONTENT
This blog is not intended to be a guide or a tutorial by any meaning. What this website presents is my humble knowledge accumulated over the years.
This journal blog presents my methodological approach/notes to solving investigations/challenges covering areas such as phishing analysis, network traffic analysis, security monitoring, threat intelligence, SIEM, digital forensics, incident response, and generic cybersecurity-related content.
* Currently in progress – TCM Security PSAA (Practical SOC Analyst Associate) Certification – Expected Completion: December 2025
* New content will be added frequently; thank you for taking the time to visit.
TRYHACKME ROOMS
What is rid Microsoft? When a DC creates a security principal object such as a user or group, it...
IMPORTANT NOTES NTFS – Master File Table Like the File Allocation Table, there is a Master...
In the attached virtual machine, view the information in email2.txt and reconstruct the PDF using...
BLUE TEAM LABS ONLINE
Scenario – Desi Sukana is an aspiring DFIR Analyst. These are professionals who gather and...
Scenario – A highly confidential document has been stolen from the President’s laptop...
Scenario – In a race against time, can you investigate a laptop seized by law enforcement to...
Scenario – Your organization doesn’t use Amazon Web Services, so when a Threat Hunter...
CYBERSECURITY MISCELLANEOUS
Experience taking the BTLO1 As a reference, before taking the BTL1 exam, I had my Sec+ and I was...