Log Sources for SOC

Explore the diverse ecosystem of telemetry. Gain hands-on insight into logs from firewalls, endpoints, cloud environments, and identity providers that fuel SOC visibility.

Windows Authentication & Security Logs

Analyze Windows Event Logs to identify suspicious logins, RDP sessions, and privilege escalations. Learn to navigate the Security Log and recognize critical Event IDs associated with credential theft and lateral movement.

PowerShell Activity Logs

Detect malicious script execution and fileless malware by analyzing PowerShell and other script logs. Master the analysis of Script Block Logging and Transcription to uncover obfuscated commands.

Linux Auth, Cron, and Audit Logs

Learn how to analyze Linux-specific logs related to authentication, scheduled tasks, and audit events. Explore /var/log/auth.log and auditd to track user activity and persistence mechanisms.

Network and Firewall Logs

Analyze network traffic and firewall logs to detect unauthorized connections, scans, and lateral movement. Learn to interpret permit/deny patterns and identify beaconing behavior.

Web Server Logs

Analyze Apache, Nginx, and IIS logs to identify common web attacks like SQLi, XSS, and directory traversal. Understand HTTP status codes and how they reveal the success or failure of an attack.

CYBRIXEN Assistant

How can I help you today?

What does CYBRIXEN provide?
Which cybersecurity areas?
Learn at my own time?
Free to start?
Certifications included?
Job placement help?
No tech background?
Average salary?

Welcome to CYBRIXEN Assistant

Click on any question above to see the detailed answer here.

Contact Support Team

We'll respond to your email within 24 hours