CodeAtlas CL Classic CY Cyber FR Forest SS Sunset AU Aurora MN Mono
Loading…
If this never completes: start PostgreSQL, check DATABASE_URL and DIRECT_URL in .env, run npx prisma db push. Optional: set SKIP_RUNTIME_CATALOG_SEED=1 to skip heavy catalog seed while debugging.
1 Security Command FoundationsBEGINNER Build command confidence with safe workflows, context awareness, and basic system visibility.
1001 Defensive Workflow with pwd #11002 ls for Secure Operations #21003 Clean cd Playbook: increase alert quality and triage speed #31004 mkdir Monitoring and Hardening Routine #41005 cp Threat Validation Procedure #51006 mv Incident-Safe Usage Pattern #61007 Defensive Workflow with cat #71008 less for Secure Operations #81009 Clean tail Playbook: prevent abuse of exposed endpoints #91010 grep Monitoring and Hardening Routine #101011 find Threat Validation Procedure #111012 chmod Incident-Safe Usage Pattern #121013 Defensive Workflow with chown #131014 whoami for Secure Operations #141015 Clean ipconfig Playbook: improve incident traceability #151016 ifconfig Monitoring and Hardening Routine #161017 ping Threat Validation Procedure #171018 tracert Incident-Safe Usage Pattern #181019 Defensive Workflow with nslookup #191020 curl for Secure Operations #201021 Clean pwd Playbook: harden service-to-service trust boundaries #211022 ls Monitoring and Hardening Routine #221023 cd Threat Validation Procedure #231024 mkdir Incident-Safe Usage Pattern #241025 Defensive Workflow with cp #251026 mv for Secure Operations #261027 Clean cat Playbook: increase alert quality and triage speed #271028 less Monitoring and Hardening Routine #281029 tail Threat Validation Procedure #291030 grep Incident-Safe Usage Pattern #301031 Defensive Workflow with find #311032 chmod for Secure Operations #321033 Clean chown Playbook: prevent abuse of exposed endpoints #331034 whoami Monitoring and Hardening Routine #341035 ipconfig Threat Validation Procedure #351036 ifconfig Incident-Safe Usage Pattern #361037 Defensive Workflow with ping #371038 tracert for Secure Operations #381039 Clean nslookup Playbook: improve incident traceability #391040 curl Monitoring and Hardening Routine #40FULL SUBSCRIPTION
2 Host Defense BasicsBEGINNER Apply clean hardening steps on user, file, and process surfaces with practical command usage.
2001 Defensive Workflow with less #12002 tail for Secure Operations #22003 Clean grep Playbook: minimize blast radius during failures #32004 find Monitoring and Hardening Routine #42005 chmod Threat Validation Procedure #52006 chown Incident-Safe Usage Pattern #62007 Defensive Workflow with whoami #72008 ipconfig for Secure Operations #82009 Clean ifconfig Playbook: detect suspicious behavior earlier #9
3 Web and Traffic BasicsBEGINNER Understand requests, DNS, and basic traffic checks using defensively scoped command practice.
3001 Defensive Workflow with ipconfig #13002 ifconfig for Secure Operations #23003 Clean ping Playbook: harden service-to-service trust boundaries #33004 tracert Monitoring and Hardening Routine #43005 nslookup Threat Validation Procedure #53006 curl Incident-Safe Usage Pattern #63007 Defensive Workflow with pwd #73008 ls for Secure Operations #83009 Clean cd Playbook: increase alert quality and triage speed #9
4 Network Defense OperationsINTERMEDIATE Use network commands to monitor, restrict, and validate defensive posture in live environments.
4001 Defensive Workflow with ss #14002 netstat for Secure Operations #24003 Clean nmap Playbook: increase alert quality and triage speed #34004 tcpdump Monitoring and Hardening Routine #44005 tshark Threat Validation Procedure #54006 dig Incident-Safe Usage Pattern #64007 Defensive Workflow with host #74008 openssl s_client for Secure Operations #84009 Clean ufw Playbook: prevent abuse of exposed endpoints #9
5 Web Defense WorkflowsINTERMEDIATE Run practical secure web checks with clean methodology and remediation-focused outputs.
5001 Defensive Workflow with openssl s_client #15002 ufw for Secure Operations #25003 Clean iptables Playbook: minimize blast radius during failures #35004 fail2ban-client Monitoring and Hardening Routine #45005 journalctl Threat Validation Procedure #55006 systemctl Incident-Safe Usage Pattern #65007 Defensive Workflow with crontab #75008 scp for Secure Operations #85009 Clean ssh-keygen Playbook: detect suspicious behavior earlier #9
6 Service HardeningINTERMEDIATE Harden service runtime settings and access policies with repeatable command-driven routines.
6001 Defensive Workflow with scp #16002 ssh-keygen for Secure Operations #26003 Clean rsync Playbook: harden service-to-service trust boundaries #36004 nikto Monitoring and Hardening Routine #46005 sqlmap Threat Validation Procedure #56006 lynis Incident-Safe Usage Pattern #66007 Defensive Workflow with ss #76008 netstat for Secure Operations #86009 Clean nmap Playbook: increase alert quality and triage speed #9
7 Detection EngineeringADVANCED Create and refine detection controls with rule-based and behavior-based command workflows.
7001 Defensive Workflow with yara #17002 clamav for Secure Operations #27003 Clean auditctl Playbook: increase alert quality and triage speed #37004 ausearch Monitoring and Hardening Routine #47005 aureport Threat Validation Procedure #57006 osqueryi Incident-Safe Usage Pattern #67007 Defensive Workflow with suricata #77008 zeek for Secure Operations #87009 Clean modsecurity Playbook: prevent abuse of exposed endpoints #9
8 Supply Chain SecurityADVANCED Audit dependencies, images, and artifacts with clean security gates across release pipelines.
8001 Defensive Workflow with zeek #18002 modsecurity for Secure Operations #28003 Clean semgrep Playbook: minimize blast radius during failures #38004 trivy Monitoring and Hardening Routine #48005 grype Threat Validation Procedure #58006 snyk test Incident-Safe Usage Pattern #68007 Defensive Workflow with hashdeep #78008 rkhunter for Secure Operations #88009 Clean chkrootkit Playbook: detect suspicious behavior earlier #9
9 Forensics and ResponseADVANCED Collect and analyze evidence with repeatable command procedures ready for incident response.
9001 Defensive Workflow with rkhunter #19002 chkrootkit for Secure Operations #29003 Clean logrotate Playbook: harden service-to-service trust boundaries #39004 docker scout Monitoring and Hardening Routine #49005 kube-bench Threat Validation Procedure #59006 kube-hunter Incident-Safe Usage Pattern #69007 Defensive Workflow with yara #79008 clamav for Secure Operations #89009 Clean auditctl Playbook: increase alert quality and triage speed #9
10 SOC OrchestrationPROFESSIONAL Operationalize triage, enrichment, and response with scalable command-assisted SOC workflows.
10001 Defensive Workflow with wazuh-agent #110002 wazuh-manager for Secure Operations #210003 Clean elasticsearch Playbook: increase alert quality and triage speed #310004 kibana Monitoring and Hardening Routine #410005 opensearch Threat Validation Procedure #510006 promtail Incident-Safe Usage Pattern #610007 Defensive Workflow with loki #710008 grafana for Secure Operations #810009 Clean velociraptor Playbook: prevent abuse of exposed endpoints #9
11 Platform Security at ScalePROFESSIONAL Harden cloud-native platforms and automate guardrails using professional-grade command tooling.
11001 Defensive Workflow with grafana #111002 velociraptor for Secure Operations #211003 Clean timesketch Playbook: minimize blast radius during failures #311004 misp Monitoring and Hardening Routine #411005 thehive Threat Validation Procedure #511006 cortex Incident-Safe Usage Pattern #611007 Defensive Workflow with ansible #711008 terraform for Secure Operations #811009 Clean kubectl Playbook: detect suspicious behavior earlier #9
12 Enterprise Incident ProgramPROFESSIONAL Design mature incident programs with measurable controls, timelines, and post-incident hardening.
12001 Defensive Workflow with terraform #112002 kubectl for Secure Operations #212003 Clean helm Playbook: harden service-to-service trust boundaries #312004 falco Monitoring and Hardening Routine #412005 crowdsec Threat Validation Procedure #512006 openvas Incident-Safe Usage Pattern #612007 Defensive Workflow with wazuh-agent #712008 wazuh-manager for Secure Operations #812009 Clean elasticsearch Playbook: increase alert quality and triage speed #9First 40 lessons are free. Subscribe to unlock all 480 Cyber Security lessons.
2010 ping Monitoring and Hardening Routine #10
2011 tracert Threat Validation Procedure #11
2012 nslookup Incident-Safe Usage Pattern #12
2013 Defensive Workflow with curl #13
2014 pwd for Secure Operations #14
2015 Clean ls Playbook: stop unsafe input from reaching core logic #15
2016 cd Monitoring and Hardening Routine #16
2017 mkdir Threat Validation Procedure #17
2018 cp Incident-Safe Usage Pattern #18
2019 Defensive Workflow with mv #19
2020 cat for Secure Operations #20
2021 Clean less Playbook: reduce credential misuse risk #21
2022 tail Monitoring and Hardening Routine #22
2023 grep Threat Validation Procedure #23
2024 find Incident-Safe Usage Pattern #24
2025 Defensive Workflow with chmod #25
2026 chown for Secure Operations #26
2027 Clean whoami Playbook: minimize blast radius during failures #27
2028 ipconfig Monitoring and Hardening Routine #28
2029 ifconfig Threat Validation Procedure #29
2030 ping Incident-Safe Usage Pattern #30
2031 Defensive Workflow with tracert #31
2032 nslookup for Secure Operations #32
2033 Clean curl Playbook: detect suspicious behavior earlier #33
2034 pwd Monitoring and Hardening Routine #34
2035 ls Threat Validation Procedure #35
2036 cd Incident-Safe Usage Pattern #36
2037 Defensive Workflow with mkdir #37
2038 cp for Secure Operations #38
2039 Clean mv Playbook: stop unsafe input from reaching core logic #39
2040 cat Monitoring and Hardening Routine #40
3010 mkdir Monitoring and Hardening Routine #10
3011 cp Threat Validation Procedure #11
3012 mv Incident-Safe Usage Pattern #12
3013 Defensive Workflow with cat #13
3014 less for Secure Operations #14
3015 Clean tail Playbook: prevent abuse of exposed endpoints #15
3016 grep Monitoring and Hardening Routine #16
3017 find Threat Validation Procedure #17
3018 chmod Incident-Safe Usage Pattern #18
3019 Defensive Workflow with chown #19
3020 whoami for Secure Operations #20
3021 Clean ipconfig Playbook: improve incident traceability #21
3022 ifconfig Monitoring and Hardening Routine #22
3023 ping Threat Validation Procedure #23
3024 tracert Incident-Safe Usage Pattern #24
3025 Defensive Workflow with nslookup #25
3026 curl for Secure Operations #26
3027 Clean pwd Playbook: harden service-to-service trust boundaries #27
3028 ls Monitoring and Hardening Routine #28
3029 cd Threat Validation Procedure #29
3030 mkdir Incident-Safe Usage Pattern #30
3031 Defensive Workflow with cp #31
3032 mv for Secure Operations #32
3033 Clean cat Playbook: increase alert quality and triage speed #33
3034 less Monitoring and Hardening Routine #34
3035 tail Threat Validation Procedure #35
3036 grep Incident-Safe Usage Pattern #36
3037 Defensive Workflow with find #37
3038 chmod for Secure Operations #38
3039 Clean chown Playbook: prevent abuse of exposed endpoints #39
3040 whoami Monitoring and Hardening Routine #40
4010 iptables Monitoring and Hardening Routine #10
4011 fail2ban-client Threat Validation Procedure #11
4012 journalctl Incident-Safe Usage Pattern #12
4013 Defensive Workflow with systemctl #13
4014 crontab for Secure Operations #14
4015 Clean scp Playbook: improve incident traceability #15
4016 ssh-keygen Monitoring and Hardening Routine #16
4017 rsync Threat Validation Procedure #17
4018 nikto Incident-Safe Usage Pattern #18
4019 Defensive Workflow with sqlmap #19
4020 lynis for Secure Operations #20
4021 Clean ss Playbook: harden service-to-service trust boundaries #21
4022 netstat Monitoring and Hardening Routine #22
4023 nmap Threat Validation Procedure #23
4024 tcpdump Incident-Safe Usage Pattern #24
4025 Defensive Workflow with tshark #25
4026 dig for Secure Operations #26
4027 Clean host Playbook: increase alert quality and triage speed #27
4028 openssl s_client Monitoring and Hardening Routine #28
4029 ufw Threat Validation Procedure #29
4030 iptables Incident-Safe Usage Pattern #30
4031 Defensive Workflow with fail2ban-client #31
4032 journalctl for Secure Operations #32
4033 Clean systemctl Playbook: prevent abuse of exposed endpoints #33
4034 crontab Monitoring and Hardening Routine #34
4035 scp Threat Validation Procedure #35
4036 ssh-keygen Incident-Safe Usage Pattern #36
4037 Defensive Workflow with rsync #37
4038 nikto for Secure Operations #38
4039 Clean sqlmap Playbook: improve incident traceability #39
4040 lynis Monitoring and Hardening Routine #40
5010 rsync Monitoring and Hardening Routine #10
5011 nikto Threat Validation Procedure #11
5012 sqlmap Incident-Safe Usage Pattern #12
5013 Defensive Workflow with lynis #13
5014 ss for Secure Operations #14
5015 Clean netstat Playbook: stop unsafe input from reaching core logic #15
5016 nmap Monitoring and Hardening Routine #16
5017 tcpdump Threat Validation Procedure #17
5018 tshark Incident-Safe Usage Pattern #18
5019 Defensive Workflow with dig #19
5020 host for Secure Operations #20
5021 Clean openssl s_client Playbook: reduce credential misuse risk #21
5022 ufw Monitoring and Hardening Routine #22
5023 iptables Threat Validation Procedure #23
5024 fail2ban-client Incident-Safe Usage Pattern #24
5025 Defensive Workflow with journalctl #25
5026 systemctl for Secure Operations #26
5027 Clean crontab Playbook: minimize blast radius during failures #27
5028 scp Monitoring and Hardening Routine #28
5029 ssh-keygen Threat Validation Procedure #29
5030 rsync Incident-Safe Usage Pattern #30
5031 Defensive Workflow with nikto #31
5032 sqlmap for Secure Operations #32
5033 Clean lynis Playbook: detect suspicious behavior earlier #33
5034 ss Monitoring and Hardening Routine #34
5035 netstat Threat Validation Procedure #35
5036 nmap Incident-Safe Usage Pattern #36
5037 Defensive Workflow with tcpdump #37
5038 tshark for Secure Operations #38
5039 Clean dig Playbook: stop unsafe input from reaching core logic #39
5040 host Monitoring and Hardening Routine #40
6010 tcpdump Monitoring and Hardening Routine #10
6011 tshark Threat Validation Procedure #11
6012 dig Incident-Safe Usage Pattern #12
6013 Defensive Workflow with host #13
6014 openssl s_client for Secure Operations #14
6015 Clean ufw Playbook: prevent abuse of exposed endpoints #15
6016 iptables Monitoring and Hardening Routine #16
6017 fail2ban-client Threat Validation Procedure #17
6018 journalctl Incident-Safe Usage Pattern #18
6019 Defensive Workflow with systemctl #19
6020 crontab for Secure Operations #20
6021 Clean scp Playbook: improve incident traceability #21
6022 ssh-keygen Monitoring and Hardening Routine #22
6023 rsync Threat Validation Procedure #23
6024 nikto Incident-Safe Usage Pattern #24
6025 Defensive Workflow with sqlmap #25
6026 lynis for Secure Operations #26
6027 Clean ss Playbook: harden service-to-service trust boundaries #27
6028 netstat Monitoring and Hardening Routine #28
6029 nmap Threat Validation Procedure #29
6030 tcpdump Incident-Safe Usage Pattern #30
6031 Defensive Workflow with tshark #31
6032 dig for Secure Operations #32
6033 Clean host Playbook: increase alert quality and triage speed #33
6034 openssl s_client Monitoring and Hardening Routine #34
6035 ufw Threat Validation Procedure #35
6036 iptables Incident-Safe Usage Pattern #36
6037 Defensive Workflow with fail2ban-client #37
6038 journalctl for Secure Operations #38
6039 Clean systemctl Playbook: prevent abuse of exposed endpoints #39
6040 crontab Monitoring and Hardening Routine #40
7010 semgrep Monitoring and Hardening Routine #10
7011 trivy Threat Validation Procedure #11
7012 grype Incident-Safe Usage Pattern #12
7013 Defensive Workflow with snyk test #13
7014 hashdeep for Secure Operations #14
7015 Clean rkhunter Playbook: improve incident traceability #15
7016 chkrootkit Monitoring and Hardening Routine #16
7017 logrotate Threat Validation Procedure #17
7018 docker scout Incident-Safe Usage Pattern #18
7019 Defensive Workflow with kube-bench #19
7020 kube-hunter for Secure Operations #20
7021 Clean yara Playbook: harden service-to-service trust boundaries #21
7022 clamav Monitoring and Hardening Routine #22
7023 auditctl Threat Validation Procedure #23
7024 ausearch Incident-Safe Usage Pattern #24
7025 Defensive Workflow with aureport #25
7026 osqueryi for Secure Operations #26
7027 Clean suricata Playbook: increase alert quality and triage speed #27
7028 zeek Monitoring and Hardening Routine #28
7029 modsecurity Threat Validation Procedure #29
7030 semgrep Incident-Safe Usage Pattern #30
7031 Defensive Workflow with trivy #31
7032 grype for Secure Operations #32
7033 Clean snyk test Playbook: prevent abuse of exposed endpoints #33
7034 hashdeep Monitoring and Hardening Routine #34
7035 rkhunter Threat Validation Procedure #35
7036 chkrootkit Incident-Safe Usage Pattern #36
7037 Defensive Workflow with logrotate #37
7038 docker scout for Secure Operations #38
7039 Clean kube-bench Playbook: improve incident traceability #39
7040 kube-hunter Monitoring and Hardening Routine #40
8010 logrotate Monitoring and Hardening Routine #10
8011 docker scout Threat Validation Procedure #11
8012 kube-bench Incident-Safe Usage Pattern #12
8013 Defensive Workflow with kube-hunter #13
8014 yara for Secure Operations #14
8015 Clean clamav Playbook: stop unsafe input from reaching core logic #15
8016 auditctl Monitoring and Hardening Routine #16
8017 ausearch Threat Validation Procedure #17
8018 aureport Incident-Safe Usage Pattern #18
8019 Defensive Workflow with osqueryi #19
8020 suricata for Secure Operations #20
8021 Clean zeek Playbook: reduce credential misuse risk #21
8022 modsecurity Monitoring and Hardening Routine #22
8023 semgrep Threat Validation Procedure #23
8024 trivy Incident-Safe Usage Pattern #24
8025 Defensive Workflow with grype #25
8026 snyk test for Secure Operations #26
8027 Clean hashdeep Playbook: minimize blast radius during failures #27
8028 rkhunter Monitoring and Hardening Routine #28
8029 chkrootkit Threat Validation Procedure #29
8030 logrotate Incident-Safe Usage Pattern #30
8031 Defensive Workflow with docker scout #31
8032 kube-bench for Secure Operations #32
8033 Clean kube-hunter Playbook: detect suspicious behavior earlier #33
8034 yara Monitoring and Hardening Routine #34
8035 clamav Threat Validation Procedure #35
8036 auditctl Incident-Safe Usage Pattern #36
8037 Defensive Workflow with ausearch #37
8038 aureport for Secure Operations #38
8039 Clean osqueryi Playbook: stop unsafe input from reaching core logic #39
8040 suricata Monitoring and Hardening Routine #40
9010 ausearch Monitoring and Hardening Routine #10
9011 aureport Threat Validation Procedure #11
9012 osqueryi Incident-Safe Usage Pattern #12
9013 Defensive Workflow with suricata #13
9014 zeek for Secure Operations #14
9015 Clean modsecurity Playbook: prevent abuse of exposed endpoints #15
9016 semgrep Monitoring and Hardening Routine #16
9017 trivy Threat Validation Procedure #17
9018 grype Incident-Safe Usage Pattern #18
9019 Defensive Workflow with snyk test #19
9020 hashdeep for Secure Operations #20
9021 Clean rkhunter Playbook: improve incident traceability #21
9022 chkrootkit Monitoring and Hardening Routine #22
9023 logrotate Threat Validation Procedure #23
9024 docker scout Incident-Safe Usage Pattern #24
9025 Defensive Workflow with kube-bench #25
9026 kube-hunter for Secure Operations #26
9027 Clean yara Playbook: harden service-to-service trust boundaries #27
9028 clamav Monitoring and Hardening Routine #28
9029 auditctl Threat Validation Procedure #29
9030 ausearch Incident-Safe Usage Pattern #30
9031 Defensive Workflow with aureport #31
9032 osqueryi for Secure Operations #32
9033 Clean suricata Playbook: increase alert quality and triage speed #33
9034 zeek Monitoring and Hardening Routine #34
9035 modsecurity Threat Validation Procedure #35
9036 semgrep Incident-Safe Usage Pattern #36
9037 Defensive Workflow with trivy #37
9038 grype for Secure Operations #38
9039 Clean snyk test Playbook: prevent abuse of exposed endpoints #39
9040 hashdeep Monitoring and Hardening Routine #40
10010 timesketch Monitoring and Hardening Routine #10
10011 misp Threat Validation Procedure #11
10012 thehive Incident-Safe Usage Pattern #12
10013 Defensive Workflow with cortex #13
10014 ansible for Secure Operations #14
10015 Clean terraform Playbook: improve incident traceability #15
10016 kubectl Monitoring and Hardening Routine #16
10017 helm Threat Validation Procedure #17
10018 falco Incident-Safe Usage Pattern #18
10019 Defensive Workflow with crowdsec #19
10020 openvas for Secure Operations #20
10021 Clean wazuh-agent Playbook: harden service-to-service trust boundaries #21
10022 wazuh-manager Monitoring and Hardening Routine #22
10023 elasticsearch Threat Validation Procedure #23
10024 kibana Incident-Safe Usage Pattern #24
10025 Defensive Workflow with opensearch #25
10026 promtail for Secure Operations #26
10027 Clean loki Playbook: increase alert quality and triage speed #27
10028 grafana Monitoring and Hardening Routine #28
10029 velociraptor Threat Validation Procedure #29
10030 timesketch Incident-Safe Usage Pattern #30
10031 Defensive Workflow with misp #31
10032 thehive for Secure Operations #32
10033 Clean cortex Playbook: prevent abuse of exposed endpoints #33
10034 ansible Monitoring and Hardening Routine #34
10035 terraform Threat Validation Procedure #35
10036 kubectl Incident-Safe Usage Pattern #36
10037 Defensive Workflow with helm #37
10038 falco for Secure Operations #38
10039 Clean crowdsec Playbook: improve incident traceability #39
10040 openvas Monitoring and Hardening Routine #40
11010 helm Monitoring and Hardening Routine #10
11011 falco Threat Validation Procedure #11
11012 crowdsec Incident-Safe Usage Pattern #12
11013 Defensive Workflow with openvas #13
11014 wazuh-agent for Secure Operations #14
11015 Clean wazuh-manager Playbook: stop unsafe input from reaching core logic #15
11016 elasticsearch Monitoring and Hardening Routine #16
11017 kibana Threat Validation Procedure #17
11018 opensearch Incident-Safe Usage Pattern #18
11019 Defensive Workflow with promtail #19
11020 loki for Secure Operations #20
11021 Clean grafana Playbook: reduce credential misuse risk #21
11022 velociraptor Monitoring and Hardening Routine #22
11023 timesketch Threat Validation Procedure #23
11024 misp Incident-Safe Usage Pattern #24
11025 Defensive Workflow with thehive #25
11026 cortex for Secure Operations #26
11027 Clean ansible Playbook: minimize blast radius during failures #27
11028 terraform Monitoring and Hardening Routine #28
11029 kubectl Threat Validation Procedure #29
11030 helm Incident-Safe Usage Pattern #30
11031 Defensive Workflow with falco #31
11032 crowdsec for Secure Operations #32
11033 Clean openvas Playbook: detect suspicious behavior earlier #33
11034 wazuh-agent Monitoring and Hardening Routine #34
11035 wazuh-manager Threat Validation Procedure #35
11036 elasticsearch Incident-Safe Usage Pattern #36
11037 Defensive Workflow with kibana #37
11038 opensearch for Secure Operations #38
11039 Clean promtail Playbook: stop unsafe input from reaching core logic #39
11040 loki Monitoring and Hardening Routine #40
12010 kibana Monitoring and Hardening Routine #10
12011 opensearch Threat Validation Procedure #11
12012 promtail Incident-Safe Usage Pattern #12
12013 Defensive Workflow with loki #13
12014 grafana for Secure Operations #14
12015 Clean velociraptor Playbook: prevent abuse of exposed endpoints #15
12016 timesketch Monitoring and Hardening Routine #16
12017 misp Threat Validation Procedure #17
12018 thehive Incident-Safe Usage Pattern #18
12019 Defensive Workflow with cortex #19
12020 ansible for Secure Operations #20
12021 Clean terraform Playbook: improve incident traceability #21
12022 kubectl Monitoring and Hardening Routine #22
12023 helm Threat Validation Procedure #23
12024 falco Incident-Safe Usage Pattern #24
12025 Defensive Workflow with crowdsec #25
12026 openvas for Secure Operations #26
12027 Clean wazuh-agent Playbook: harden service-to-service trust boundaries #27
12028 wazuh-manager Monitoring and Hardening Routine #28
12029 elasticsearch Threat Validation Procedure #29
12030 kibana Incident-Safe Usage Pattern #30
12031 Defensive Workflow with opensearch #31
12032 promtail for Secure Operations #32
12033 Clean loki Playbook: increase alert quality and triage speed #33
12034 grafana Monitoring and Hardening Routine #34
12035 velociraptor Threat Validation Procedure #35
12036 timesketch Incident-Safe Usage Pattern #36
12037 Defensive Workflow with misp #37
12038 thehive for Secure Operations #38
12039 Clean cortex Playbook: prevent abuse of exposed endpoints #39
12040 ansible Monitoring and Hardening Routine #40