LetsDefendIO Profile Banner
LetsDefend Profile
LetsDefend

@LetsDefendIO

Followers
127K
Following
1K
Media
2K
Statuses
3K

Learn cybersecurity with hands-on blue team training

Cloud
Joined July 2020
Don't wanna be here? Send us removal request.
@LetsDefendIO
LetsDefend
6 hours
Make a decision
Tweet media one
5
27
317
@LetsDefendIO
LetsDefend
10 hours
Network Security
3
73
343
@LetsDefendIO
LetsDefend
1 day
🚀 New Course: Introduction to IDA Tool. 🙍 Role: Malware Analyst.🛠️ Tool: IDA.⏰ Time to complete: ~2 hours
Tweet media one
2
9
40
@LetsDefendIO
LetsDefend
1 day
Cybersecurity
Tweet media one
5
37
318
@LetsDefendIO
LetsDefend
2 days
Build a SOC team
Tweet media one
0
8
101
@LetsDefendIO
LetsDefend
2 days
Spyware 101
0
21
95
@LetsDefendIO
LetsDefend
2 days
Popular ports for security teams
Tweet media one
1
131
905
@LetsDefendIO
LetsDefend
3 days
Smart people
Tweet media one
2
10
140
@LetsDefendIO
LetsDefend
3 days
Cybersecurity search engines
Tweet media one
6
205
1K
@LetsDefendIO
LetsDefend
3 days
The 7 Layer OSI Model
Tweet media one
1
40
233
@LetsDefendIO
LetsDefend
4 days
USB Forensics. 🙍 Role: Incident Responder.💪 Difficulty: Hard
Tweet media one
0
3
40
@LetsDefendIO
LetsDefend
4 days
SIEM vs SOAR vs XDR
Tweet media one
0
90
530
@LetsDefendIO
LetsDefend
5 days
MITRE ATTCK vs Cyber Kill Chain
Tweet media one
1
88
474
@LetsDefendIO
LetsDefend
5 days
Important Linux Commands
0
27
129
@LetsDefendIO
LetsDefend
6 days
⚠️ New SOC Alert: Corporate Policy Violation - Insider Threat Activities Detected. Attackers use this technique because insiders exploit their legitimate access to steal data, misuse privileges, or sabotage systems for financial gain, revenge, espionage, or ideological reasons,
Tweet media one
2
6
28
@LetsDefendIO
LetsDefend
6 days
Getting started to Cybersecurity
Tweet media one
9
68
519
@LetsDefendIO
LetsDefend
7 days
Fix it
Tweet media one
2
29
308
@LetsDefendIO
LetsDefend
7 days
HTTP Status Codes for SOC Teams
1
44
197
@LetsDefendIO
LetsDefend
8 days
🔑 New Course: Public Key Infrastructure. Learn Public Key Infrastructure in our course. Explore PKI concepts and processes with engaging tutorials for comprehensive understanding and application.
Tweet media one
0
8
20
@LetsDefendIO
LetsDefend
8 days
SOC Analyst
Tweet media one
4
14
206