Explore All Rooms
Browse and search through all available cybersecurity rooms. 97 rooms available
How Alerts Are Generated?
Deep dive into the underlying logic, regular expressions, and detection rules that generate security alerts.
EDR Indicators, Artifacts, and Metadata
Identify the different types of indicators, artifacts, and metadata available in logs to assist in your investigation.
Investigating an Alert in SIEM
Follow a structured process to investigate a live alert within a SIEM platform from detection to conclusion.
Linux Auth, Cron, and Audit Logs
Learn how to analyze Linux-specific logs related to authentication, scheduled tasks, and audit events.
MITRE ATT&CK
Master the MITRE ATT&CK framework to map adversary techniques and understand the "why" behind an attack.
Network and Firewall Logs
Analyze network traffic and firewall logs to detect unauthorized connections, scans, and lateral movement.
PowerShell Activity Logs
Detect malicious script execution and fileless malware by analyzing PowerShell and other script logs.
EDR Process Tree Walkthrough
Learn how to read process trees to identify parent-child relationships and suspicious process spawning.
Pyramid of Pain
Understand the Pyramid of Pain and how difficult it is for attackers to change various types of indicators.
CYBRIXEN Assistant
How can I help you today?
What does CYBRIXEN provide?
Which cybersecurity areas?
Learn at my own time?
Free to start?
Certifications included?
Job placement help?
No tech background?
Average salary?
Welcome to CYBRIXEN Assistant
Click on any question above to see the detailed answer here.
Contact Support Team
We'll respond to your email within 24 hours