detection 10
- Building a SOC Co-Pilot with Safe Retrieval Boundaries
- Detecting Token Abuse and API Key Theft in LLM Platforms
- Canary Tokens for RAG Exfiltration Detection
- Building an AI Security Logging Baseline
- Linux Auditd Essentials for Privilege Escalation Detection
- Kerberos Attack Lab: AS-REP Roasting and Detection
- Container Breakout Detection with eBPF and Tracee
- Detecting Lateral Movement with SMB and WinRM Telemetry
- Detecting DNS Tunneling with Zeek, Passive DNS, and Python
- Introduction to Threat Hunting