Write your awesome label here.
Case 001 (Incident Response & Investigation)
Uncover a stealthy attack by responding to an initial alert or proactively hunting for a TTP!
This hands-on challenge puts you in the shoes of a SOC analyst; either triaging an alert in Incident Response mode or hypothesis-driven hunting in Threat Hunting mode. Both paths lead to the same sophisticated attack, testing your ability to investigate logs, connect the dots, and expose the full kill chain.
Will you stop the attacker after the first alert, or will you find them before the damage is done?
*This standalone challenge is also part of our paid KQL courses.
*This standalone challenge is also part of our paid KQL courses.
Threat Hunting and Incident Response:
Case #001
Uncover a stealthy attack by responding to an initial alert or proactively hunting for a TTP!
This hands-on challenge puts you in the shoes of a SOC analyst; either triaging an alert in Incident Response mode or hypothesis-driven hunting in Threat Hunting mode. Both paths lead to the same sophisticated attack, testing your ability to investigate logs, connect the dots, and expose the full kill chain.
Will you stop the attacker after the first alert, or will you find them before the damage is done?
*This standalone challenge is also part of our paid KQL courses.
*This standalone challenge is also part of our paid KQL courses.
Write your awesome label here.
What You Will Do
What Is Included
Real-world telemetry from:
-
Microsoft Defender for Endpoint (all devices)
-
Microsoft Defender for Identity
-
Windows Security Event Logs (Servers)
Challenge Overview
Frequently asked questions
Who should take the course?
This course is ideal for:
- SOC Analysts and Incident Responders who want to improve their investigation skills
- Cybersecurity professionals seeking to deepen their data analysis skills.
- IT professionals and analysts interested in specializing in security data analysis using KQL.
- Beginners who are keen to learn KQL in the context of cybersecurity.
Are there any prerequisites?
A basic understanding of databases and a keen interest in cybersecurity data analysis are recommended, but the course begins with foundational concepts, making it accessible to all enthusiastic learners.
Does the course contain video content?
No. While the course is text-based, the content is supported by screenshots with explanations. This approach makes it easy to follow and understand the content. You may check the free "Introduction to KQL for Security Analysis" course to see how it looks.
Are there any prerequisites or lab requirements?
No additional software and hardware is required. You will access the lab environment via a web browser. The lab environment is an Azure Data Explorer instance where you will analyze the logs of a simulated organization.
Can I get a certificate of completion?
Yes, you will receive a certificate of completion.
What is Lemon Squeezy?
Lemon Squeezy is a Merchant of Record that processes payments and handles taxes. You may see its name on your card statements.