LetsDefend Profile Banner
LetsDefend Profile
LetsDefend

@LetsDefendIO

90,064
Followers
0
Following
1,316
Media
1,829
Statuses

LetsDefend is a hands-on Blue Team training platform that enables people to gain practical experience by investigating real cyber attacks inside a simulated SOC

Cloud
Joined July 2020
Don't wanna be here? Send us removal request.
@LetsDefendIO
LetsDefend
2 years
Linux Permissions Explained
Tweet media one
42
1K
5K
@LetsDefendIO
LetsDefend
3 months
Network Protocols
19
1K
4K
@LetsDefendIO
LetsDefend
2 months
Getting a cybersecurity job offer
Tweet media one
27
544
4K
@LetsDefendIO
LetsDefend
2 years
Linux Log parsing cheat sheet
Tweet media one
39
979
4K
@LetsDefendIO
LetsDefend
4 months
Cybersecurity Job
Tweet media one
36
436
3K
@LetsDefendIO
LetsDefend
8 months
How HTTPS works?
Tweet media one
13
781
3K
@LetsDefendIO
LetsDefend
2 years
How DNS works?
Tweet media one
29
863
3K
@LetsDefendIO
LetsDefend
11 months
Linux File System for SOC Analysts
Tweet media one
16
625
3K
@LetsDefendIO
LetsDefend
10 months
Basic Server Types
Tweet media one
6
591
3K
@LetsDefendIO
LetsDefend
26 days
The power of the Linux
Tweet media one
16
375
3K
@LetsDefendIO
LetsDefend
2 years
Useful Linux networking commands
Tweet media one
22
681
3K
@LetsDefendIO
LetsDefend
1 year
Linux Folder Structure
Tweet media one
24
585
3K
@LetsDefendIO
LetsDefend
9 months
How HTTPs Works
Tweet media one
8
517
3K
@LetsDefendIO
LetsDefend
6 months
How HTTPS Works?
11
581
3K
@LetsDefendIO
LetsDefend
8 months
Cybersecurity.
Tweet media one
34
403
2K
@LetsDefendIO
LetsDefend
7 months
30 Cybersecurity search engines
Tweet media one
8
630
2K
@LetsDefendIO
LetsDefend
11 months
Important Windows directories for SOC Analysts
Tweet media one
9
584
2K
@LetsDefendIO
LetsDefend
1 year
Tweet media one
22
513
2K
@LetsDefendIO
LetsDefend
2 years
Types of cyber attacks
Tweet media one
11
655
2K
@LetsDefendIO
LetsDefend
4 months
Linux Boot Process
14
555
2K
@LetsDefendIO
LetsDefend
1 month
TCP vs UDP for beginners
Tweet media one
24
296
2K
@LetsDefendIO
LetsDefend
3 months
Linux File Systems
20
474
2K
@LetsDefendIO
LetsDefend
2 years
Windows security log quick reference for SOC Analysts #CyberSecurity
Tweet media one
13
632
2K
@LetsDefendIO
LetsDefend
9 months
Types of Firewall
Tweet media one
8
484
2K
@LetsDefendIO
LetsDefend
1 year
DNS System Hierarchy for #cybersecurity people
Tweet media one
8
416
2K
@LetsDefendIO
LetsDefend
5 months
Defensive Security Tools
Tweet media one
3
404
2K
@LetsDefendIO
LetsDefend
1 year
Blue Team Toolkit
Tweet media one
15
471
2K
@LetsDefendIO
LetsDefend
2 years
Windows server auditing for SOC teams
Tweet media one
13
483
2K
@LetsDefendIO
LetsDefend
2 years
The Cyber Threat Universe
Tweet media one
11
484
2K
@LetsDefendIO
LetsDefend
11 months
Linux cheat sheet for security teams
Tweet media one
14
410
2K
@LetsDefendIO
LetsDefend
10 months
The layer 7 of OSI #network #cybersecurity
Tweet media one
8
436
2K
@LetsDefendIO
LetsDefend
9 months
Blue team toolkit
Tweet media one
13
351
2K
@LetsDefendIO
LetsDefend
9 months
Linux IP command Cheat Sheet
Tweet media one
6
363
2K
@LetsDefendIO
LetsDefend
2 years
Useful Linux commands for host investigation
Tweet media one
7
411
2K
@LetsDefendIO
LetsDefend
7 months
Popular HTTP Request methods to detect web attacks
Tweet media one
2
390
2K
@LetsDefendIO
LetsDefend
2 years
Linux Path Structure
Tweet media one
15
358
2K
@LetsDefendIO
LetsDefend
1 year
Linux Cheat Sheet for Cybersecurity
Tweet media one
16
353
1K
@LetsDefendIO
LetsDefend
2 years
Forensics Mindmap
Tweet media one
8
413
2K
@LetsDefendIO
LetsDefend
3 months
Top 8 cyber attacks
7
445
1K
@LetsDefendIO
LetsDefend
1 year
How Does HTTPS Works
Tweet media one
4
302
1K
@LetsDefendIO
LetsDefend
2 years
Cybersecurity Wheel
Tweet media one
19
335
1K
@LetsDefendIO
LetsDefend
8 months
OSI Layers & Attacks
Tweet media one
3
341
1K
@LetsDefendIO
LetsDefend
9 months
Types of VPN
Tweet media one
5
350
1K
@LetsDefendIO
LetsDefend
9 months
The best explanation about phishing attacks
Tweet media one
14
311
1K
@LetsDefendIO
LetsDefend
7 months
Linux Directory Structure
Tweet media one
4
297
1K
@LetsDefendIO
LetsDefend
10 months
Server Types for Cybersecurity Learners
Tweet media one
9
260
1K
@LetsDefendIO
LetsDefend
2 months
Types of IP Addresses
4
346
1K
@LetsDefendIO
LetsDefend
3 months
Can you hack ...
Tweet media one
14
165
1K
@LetsDefendIO
LetsDefend
2 months
How Linux Works?
4
346
1K
@LetsDefendIO
LetsDefend
1 year
Basic Server Types
Tweet media one
13
336
1K
@LetsDefendIO
LetsDefend
8 months
Components of a URL for SOC analysts
Tweet media one
3
255
1K
@LetsDefendIO
LetsDefend
1 month
How DNS Works?
5
327
1K
@LetsDefendIO
LetsDefend
3 years
Digital Forensics Cheat Sheet #DFIR #blueteam #cybersecurity
Tweet media one
8
392
1K
@LetsDefendIO
LetsDefend
14 days
OSI Model and Protocols
Tweet media one
3
332
1K
@LetsDefendIO
LetsDefend
2 years
Wireshark Cheat Sheet
Tweet media one
18
310
1K
@LetsDefendIO
LetsDefend
9 months
Cyber people on Youtube
Tweet media one
40
160
1K
@LetsDefendIO
LetsDefend
2 years
Detailed OSI Model
Tweet media one
26
276
1K
@LetsDefendIO
LetsDefend
6 months
Some Pentest Tools SOC teams should know
Tweet media one
3
261
1K
@LetsDefendIO
LetsDefend
1 year
Linux System Path
Tweet media one
10
259
1K
@LetsDefendIO
LetsDefend
9 months
What is EDR?
Tweet media one
4
243
1K
@LetsDefendIO
LetsDefend
5 months
UDP vs TCP Protocol
Tweet media one
12
230
1K
@LetsDefendIO
LetsDefend
6 months
Linux File Permission Cheat Sheet
Tweet media one
3
252
1K
@LetsDefendIO
LetsDefend
9 months
Most Common Cyber Attacks #malware #cybersecurity
Tweet media one
11
252
1K
@LetsDefendIO
LetsDefend
3 months
Linux Networking Commands
Tweet media one
3
274
1K
@LetsDefendIO
LetsDefend
1 year
Ls Linux Command Details
Tweet media one
13
211
1K
@LetsDefendIO
LetsDefend
2 years
Why is DNS so important for #cybersecurity ?
Tweet media one
9
288
1K
@LetsDefendIO
LetsDefend
9 months
Linux file permissions #linux #cybersecurity
Tweet media one
10
234
1K
@LetsDefendIO
LetsDefend
1 year
Cyber Security Attack Vectors
Tweet media one
11
299
1K
@LetsDefendIO
LetsDefend
1 month
What is OSI model?
1
298
1K
@LetsDefendIO
LetsDefend
1 year
What is Firewall?
Tweet media one
6
224
1K
@LetsDefendIO
LetsDefend
2 months
Top Network Security Cheatsheet
3
294
1K
@LetsDefendIO
LetsDefend
2 months
TCP vs UDP
Tweet media one
6
137
994
@LetsDefendIO
LetsDefend
1 year
The SSL TLS Handshake Process
Tweet media one
6
285
990
@LetsDefendIO
LetsDefend
4 months
How SSL Works?
4
297
980
@LetsDefendIO
LetsDefend
9 months
Linux Common Directories and Configuration Files
Tweet media one
1
233
954
@LetsDefendIO
LetsDefend
25 days
LetsDefend vs University
Tweet media one
15
79
980
@LetsDefendIO
LetsDefend
2 years
NIST Cybersecurity framework
Tweet media one
11
264
949
@LetsDefendIO
LetsDefend
4 months
How DNS Works?
1
251
951
@LetsDefendIO
LetsDefend
1 year
Cybersecurity Acronyms
Tweet media one
11
285
952
@LetsDefendIO
LetsDefend
29 days
TCP vs UDP
Tweet media one
3
251
947
@LetsDefendIO
LetsDefend
2 years
Top 100 Reused Passwords
Tweet media one
30
285
924
@LetsDefendIO
LetsDefend
11 months
TCP vs UDP
Tweet media one
6
221
933
@LetsDefendIO
LetsDefend
2 years
Attack Chain approach for #Blueteam vs Red team
Tweet media one
8
268
935
@LetsDefendIO
LetsDefend
9 days
Types of IP Addresses
3
239
955
@LetsDefendIO
LetsDefend
3 months
File Systems for Linux
5
246
935
@LetsDefendIO
LetsDefend
2 years
Forward Proxy vs Reverse Proxy
Tweet media one
7
220
916
@LetsDefendIO
LetsDefend
2 years
Useful logs for Incident Responders Bigger format:
Tweet media one
1
300
932
@LetsDefendIO
LetsDefend
2 years
Email security mindmap
Tweet media one
4
247
917
@LetsDefendIO
LetsDefend
8 months
OSI Model
Tweet media one
4
193
912
@LetsDefendIO
LetsDefend
1 year
Popular Network Attacks
Tweet media one
4
235
904
@LetsDefendIO
LetsDefend
1 year
Popular interview question: What Happens When You Enter the URL In a Browser?
Tweet media one
10
219
905
@LetsDefendIO
LetsDefend
4 months
What is OSI model?
0
242
896
@LetsDefendIO
LetsDefend
2 years
Types of VPN Protocols
Tweet media one
10
220
872
@LetsDefendIO
LetsDefend
6 months
Cybersecurity in 1 min
Tweet media one
16
142
862
@LetsDefendIO
LetsDefend
2 years
Types of Hackers
Tweet media one
20
187
859
@LetsDefendIO
LetsDefend
1 year
HTTP status codes for SOC Analysts
Tweet media one
8
221
870
@LetsDefendIO
LetsDefend
2 months
How SIEM Works?
Tweet media one
5
270
874
@LetsDefendIO
LetsDefend
1 year
Incident Response for Common Attacks
Tweet media one
6
247
868
@LetsDefendIO
LetsDefend
6 months
Layers of OSI Model
Tweet media one
3
193
843
@LetsDefendIO
LetsDefend
2 years
Helpful Linux commands
Tweet media one
4
227
841