Initial Access and Anomaly Hunting
Initial Access & Anomaly Hunting trains you to simulate attacker entry methods and detect anomalies using SIEM‑based lab exercises and real-world threat techniques like macros, LNK, HTA, ISO, scheduled tasks, and service abuse.