Put your knowledge into practice with gamified cyber security challenges.
Threat Hunting
Apply Attack-Based Hunting principles to Splunk logs, correlating Windows and Sysmon data to identify and reconstruct a multi-stage ransomware attack.