Martian Defense NoteBook
search
⌘Ctrlk
Martian Defense NoteBook
  • Martian Defense Notebook
  • Training and Career
    • Keeping it Real for Beginners
    • Cybersecurity Domains
    • Reading and Repos
    • Media
    • Guides
    • Platforms
      • General
      • Offensive Security
      • Defensive Security
      • CTF Sites
      • Live Vulnerable Sites
  • Resources
    • Application Security
    • Recon + OSINT
    • Offensive
    • Defensive
    • General Cybersecurity
    • Programming
    • Reverse Engineering
    • AI for cybersecurity
  • Notes
    • Product Security Engineering
    • AppSec Testing
    • Security Research
    • Programming
    • Network Security
    • Cloud Security Testing
    • Red Teaming
    • Incident Response
    • Governance, Risk, Compliance
    • Cheatsheets
    • Reporting
    • Common System Task Info
    • App Pentest Toolkit
  • Digital Privacy
    • Personal Information Removal Services
    • Privacy-Focused DNS Configuration Guides
    • Public DNS Services
    • Privacy and Opsec Resources
    • Self-Hosting
    • Monero Mining Guide
    • Android OSes
  • Cyber Entreprenuership
    • Entrepreneurship Roadmaps
    • Open Source Business & SaaS Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Training and Careerchevron-right
  2. Platforms

Defensive Security

hashtag
Malware Analysis

Awesome Malware Analysis repoarrow-up-right !

University of Cincinatti Malware Analysis classarrow-up-right

Malware Analysis course by RPISECarrow-up-right

Zero2Auto Malware RE coursearrow-up-right !

TCM Security Practical Junior Malware Researcher coursearrow-up-right !

LetsDefend Malware Analysis Fundamentalsarrow-up-right

MSSP Labarrow-up-right

Malware Unicornarrow-up-right

hashtag
Vendor-Specific

Qualys Vulnerability Management trainingarrow-up-right

Azure Sentinel Trainingarrow-up-right

hashtag
Incident Response

OpenSOC - Network Defense Simulationarrow-up-right

PreviousOffensive Securitychevron-leftNextCTF Siteschevron-right

Last updated 1 year ago

  • Malware Analysis
  • Vendor-Specific
  • Incident Response