Table of Contents
- Investigating Email Threats
- Email Flow and Header Analysis
- Introduction to Windows Event Logs
- Tracking Accounts Login and Management
- Investigating Suspicious Process Execution Using Windows Event Logs
- Investigating PowerShell Event Logs
- Investigating Persistence and Lateral Movement Using Windows Event Logs
- Network Firewall Logs Analysis
- Investigating Cyber Threats by Using the Firewall Logs
- Web Proxy Logs Analysis
- Investigating Suspicious Outbound Communications (C&C Communications) by Using Proxy Logs
- Investigating External Threats
- Investigating Network Flows and Security Solutions Alerts
- Threat Intelligence in a SOC Analyst's Day
- Malware Sandboxing – Building a Malware Sandbox

