Blue Team
Detection, response, and defense: SIEM, EDR, threat hunting, and incident response.
-
SIEM & Log AnalysisView RoadmapSPL / KQL, dashboards, use cases
-
Endpoint DetectionView RoadmapEDR, hunting, YARA
-
Incident ResponseView RoadmapTriage, memory & disk forensics
Red Team
Offensive techniques: pentesting, AD, exploitation, and post-exploitation.
-
Web App ExploitsView RoadmapXSS, SQLi, SSRF, Burp practice
-
AD & Lateral MovementView RoadmapKerberoast, Pass-the-Hash, BloodHound
-
Post-ExploitationView RoadmapMimikatz, persistence