Do you want to deploy a script or software quickly via Group Policy? Learn the fastest software or script deployment method in Group Policy.
A step-by-step guide to building a WinFE bootable live OS ISO file for Incident Response or troubleshooting.
Do you have a Data Collection Incident Response Plan? Here is a method to jump-start the process.
How to deobfuscate malicious PowerShell using a real-world example. Learn what you need to know now before an incident occurs!
LetsDefend’s Malware Analysis: Suspicious Browser Extension Walk-Through. Everything you need to know to solve the challenge!
How you can create fun and engaging cybersecurity tabletop exercises at your organization. Fulfill compliance requirements for tabletop exercises or security awareness training with the provided documents.
A walk-through of the IcedID Malware Family for the LetsDefend’s DFIR Challenge. An analysis of the IcedID malware and how to defend against it.
The top tools and news sources you need to know if you are in cybersecurity. Don’t get caught off guard by an attack!
LetsDefend’s DFIR challenge walk-through of the REvil ransomware challenge! Everything you need to know to complete the DFIR challenge.
Learn how to automate the deployment and configurations of Sysmon in your environment.