LetsDefend Profile Banner
LetsDefend Profile
LetsDefend

@LetsDefendIO

Followers
102,902
Following
0
Media
1,560
Statuses
2,108

LetsDefend is a hands-on Blue Team training platform that enables people to gain practical experience by investigating real cyber attacks inside a simulated SOC

Cloud
Joined July 2020
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@LetsDefendIO
LetsDefend
2 years
Linux Permissions Explained
Tweet media one
42
1K
5K
@LetsDefendIO
LetsDefend
6 months
Network Protocols
19
1K
4K
@LetsDefendIO
LetsDefend
5 months
Getting a cybersecurity job offer
Tweet media one
25
540
4K
@LetsDefendIO
LetsDefend
2 years
Linux Log parsing cheat sheet
Tweet media one
37
971
4K
@LetsDefendIO
LetsDefend
8 months
Cybersecurity Job
Tweet media one
36
428
3K
@LetsDefendIO
LetsDefend
11 months
How HTTPS works?
Tweet media one
13
767
3K
@LetsDefendIO
LetsDefend
2 years
How DNS works?
Tweet media one
29
853
3K
@LetsDefendIO
LetsDefend
1 year
Linux File System for SOC Analysts
Tweet media one
16
620
3K
@LetsDefendIO
LetsDefend
1 year
Basic Server Types
Tweet media one
6
585
3K
@LetsDefendIO
LetsDefend
2 months
Windows vs Linux
Tweet media one
49
295
3K
@LetsDefendIO
LetsDefend
4 months
The power of the Linux
Tweet media one
16
367
3K
@LetsDefendIO
LetsDefend
2 years
Useful Linux networking commands
Tweet media one
22
681
3K
@LetsDefendIO
LetsDefend
1 year
Linux Folder Structure
Tweet media one
24
584
3K
@LetsDefendIO
LetsDefend
3 months
You can do it!
Tweet media one
16
368
3K
@LetsDefendIO
LetsDefend
1 year
How HTTPs Works
Tweet media one
8
509
3K
@LetsDefendIO
LetsDefend
10 months
How HTTPS Works?
11
574
3K
@LetsDefendIO
LetsDefend
11 months
Cybersecurity.
Tweet media one
32
394
2K
@LetsDefendIO
LetsDefend
11 months
30 Cybersecurity search engines
Tweet media one
8
620
2K
@LetsDefendIO
LetsDefend
1 year
Important Windows directories for SOC Analysts
Tweet media one
9
582
2K
@LetsDefendIO
LetsDefend
2 months
TCP IP Model
6
516
2K
@LetsDefendIO
LetsDefend
24 days
Linux Commands for Beginners
Tweet media one
11
419
2K
@LetsDefendIO
LetsDefend
2 years
Tweet media one
22
511
2K
@LetsDefendIO
LetsDefend
1 month
IPv4 Addresses and IPv4 Subnetting
Tweet media one
8
401
2K
@LetsDefendIO
LetsDefend
2 years
Types of cyber attacks
Tweet media one
11
652
2K
@LetsDefendIO
LetsDefend
24 days
Hacker vs SOC Team
Tweet media one
29
337
2K
@LetsDefendIO
LetsDefend
10 days
HTTPS 101
Tweet media one
10
352
2K
@LetsDefendIO
LetsDefend
7 months
Linux Boot Process
14
540
2K
@LetsDefendIO
LetsDefend
5 months
TCP vs UDP for beginners
Tweet media one
23
290
2K
@LetsDefendIO
LetsDefend
6 months
Linux File Systems
20
462
2K
@LetsDefendIO
LetsDefend
3 years
Windows security log quick reference for SOC Analysts #CyberSecurity
Tweet media one
12
627
2K
@LetsDefendIO
LetsDefend
1 year
Types of Firewall
Tweet media one
8
475
2K
@LetsDefendIO
LetsDefend
29 days
Linux Folder Structure
Tweet media one
6
326
2K
@LetsDefendIO
LetsDefend
1 year
DNS System Hierarchy for #cybersecurity people
Tweet media one
8
414
2K
@LetsDefendIO
LetsDefend
2 months
How DNS Works?
Tweet media one
4
352
2K
@LetsDefendIO
LetsDefend
17 days
Linux IP command Cheat Sheet
Tweet media one
4
312
2K
@LetsDefendIO
LetsDefend
1 year
Blue Team Toolkit
Tweet media one
15
466
2K
@LetsDefendIO
LetsDefend
3 years
Windows server auditing for SOC teams
Tweet media one
13
483
2K
@LetsDefendIO
LetsDefend
8 months
Defensive Security Tools
Tweet media one
3
398
2K
@LetsDefendIO
LetsDefend
2 years
The Cyber Threat Universe
Tweet media one
11
483
2K
@LetsDefendIO
LetsDefend
1 year
The layer 7 of OSI #network #cybersecurity
Tweet media one
8
431
2K
@LetsDefendIO
LetsDefend
1 year
Linux cheat sheet for security teams
Tweet media one
14
403
2K
@LetsDefendIO
LetsDefend
1 month
Linux users, today.
16
264
2K
@LetsDefendIO
LetsDefend
2 months
Warning!
Tweet media one
19
179
2K
@LetsDefendIO
LetsDefend
1 year
Blue team toolkit
Tweet media one
13
346
2K
@LetsDefendIO
LetsDefend
1 year
Linux IP command Cheat Sheet
Tweet media one
6
361
2K
@LetsDefendIO
LetsDefend
3 years
Useful Linux commands for host investigation
Tweet media one
7
406
2K
@LetsDefendIO
LetsDefend
11 months
Popular HTTP Request methods to detect web attacks
Tweet media one
3
384
2K
@LetsDefendIO
LetsDefend
2 years
Linux Path Structure
Tweet media one
15
354
1K
@LetsDefendIO
LetsDefend
2 years
Forensics Mindmap
Tweet media one
8
409
1K
@LetsDefendIO
LetsDefend
1 year
Linux Cheat Sheet for Cybersecurity
Tweet media one
16
350
1K
@LetsDefendIO
LetsDefend
1 year
How Does HTTPS Works
Tweet media one
4
300
1K
@LetsDefendIO
LetsDefend
6 months
Top 8 cyber attacks
7
442
1K
@LetsDefendIO
LetsDefend
1 month
HTTP status codes for SOC Analysts
Tweet media one
2
277
1K
@LetsDefendIO
LetsDefend
2 years
Cybersecurity Wheel
Tweet media one
19
331
1K
@LetsDefendIO
LetsDefend
11 months
OSI Layers & Attacks
Tweet media one
3
329
1K
@LetsDefendIO
LetsDefend
1 year
Types of VPN
Tweet media one
5
342
1K
@LetsDefendIO
LetsDefend
1 year
The best explanation about phishing attacks
Tweet media one
14
309
1K
@LetsDefendIO
LetsDefend
3 months
TLS vs IPsec vs SSH
Tweet media one
2
289
1K
@LetsDefendIO
LetsDefend
11 months
Linux Directory Structure
Tweet media one
4
296
1K
@LetsDefendIO
LetsDefend
1 month
IPv4 vs IPv6
Tweet media one
2
275
1K
@LetsDefendIO
LetsDefend
20 days
TCP vs UDP
Tweet media one
5
209
1K
@LetsDefendIO
LetsDefend
1 year
Server Types for Cybersecurity Learners
Tweet media one
9
254
1K
@LetsDefendIO
LetsDefend
4 months
Linux Filesystem for beginners
Tweet media one
5
280
1K
@LetsDefendIO
LetsDefend
5 months
Types of IP Addresses
4
339
1K
@LetsDefendIO
LetsDefend
6 months
Can you hack ...
Tweet media one
13
163
1K
@LetsDefendIO
LetsDefend
2 years
Basic Server Types
Tweet media one
13
335
1K
@LetsDefendIO
LetsDefend
11 months
Components of a URL for SOC analysts
Tweet media one
3
251
1K
@LetsDefendIO
LetsDefend
6 months
How Linux Works?
4
339
1K
@LetsDefendIO
LetsDefend
4 years
Digital Forensics Cheat Sheet #DFIR #blueteam #cybersecurity
Tweet media one
8
386
1K
@LetsDefendIO
LetsDefend
5 months
How DNS Works?
5
322
1K
@LetsDefendIO
LetsDefend
21 days
Some Pentest Tools SOC teams should know
Tweet media one
2
240
1K
@LetsDefendIO
LetsDefend
4 months
OSI Model and Protocols
Tweet media one
3
333
1K
@LetsDefendIO
LetsDefend
2 months
Cybersecurity Tools
Tweet media one
4
235
1K
@LetsDefendIO
LetsDefend
2 years
Wireshark Cheat Sheet
Tweet media one
18
309
1K
@LetsDefendIO
LetsDefend
3 months
OSI Reference Model
5
298
1K
@LetsDefendIO
LetsDefend
1 year
Cyber people on Youtube
Tweet media one
38
158
1K
@LetsDefendIO
LetsDefend
2 months
How DNS Works?
Tweet media one
6
215
1K
@LetsDefendIO
LetsDefend
22 days
SIEM vs XDR vs SOAR
Tweet media one
0
262
1K
@LetsDefendIO
LetsDefend
2 years
Detailed OSI Model
Tweet media one
26
276
1K
@LetsDefendIO
LetsDefend
2 months
Linux commands for Network Engineers
Tweet media one
4
222
1K
@LetsDefendIO
LetsDefend
10 months
Some Pentest Tools SOC teams should know
Tweet media one
3
257
1K
@LetsDefendIO
LetsDefend
2 years
Linux System Path
Tweet media one
10
258
1K
@LetsDefendIO
LetsDefend
1 year
What is EDR?
Tweet media one
4
237
1K
@LetsDefendIO
LetsDefend
1 year
Most Common Cyber Attacks #malware #cybersecurity
Tweet media one
12
254
1K
@LetsDefendIO
LetsDefend
8 months
UDP vs TCP Protocol
Tweet media one
12
226
1K
@LetsDefendIO
LetsDefend
10 months
Linux File Permission Cheat Sheet
Tweet media one
3
247
1K
@LetsDefendIO
LetsDefend
2 years
Why is DNS so important for #cybersecurity ?
Tweet media one
9
286
1K
@LetsDefendIO
LetsDefend
2 years
Ls Linux Command Details
Tweet media one
13
209
1K
@LetsDefendIO
LetsDefend
6 months
Linux Networking Commands
Tweet media one
3
274
1K
@LetsDefendIO
LetsDefend
3 months
Network Security Cheatsheet
4
270
1K
@LetsDefendIO
LetsDefend
1 year
Linux file permissions #linux #cybersecurity
Tweet media one
10
237
1K
@LetsDefendIO
LetsDefend
22 days
Cybersecurity Acronyms
Tweet media one
2
199
1K
@LetsDefendIO
LetsDefend
2 years
Cyber Security Attack Vectors
Tweet media one
11
296
1K
@LetsDefendIO
LetsDefend
5 months
What is OSI model?
1
290
1K
@LetsDefendIO
LetsDefend
2 years
What is Firewall?
Tweet media one
6
222
1K
@LetsDefendIO
LetsDefend
2 months
TCP/IP Model
3
261
1K
@LetsDefendIO
LetsDefend
14 days
What is EDR?
Tweet media one
4
188
1K
@LetsDefendIO
LetsDefend
6 months
Top Network Security Cheatsheet
3
292
986
@LetsDefendIO
LetsDefend
2 years
The SSL TLS Handshake Process
Tweet media one
6
284
986
@LetsDefendIO
LetsDefend
6 months
TCP vs UDP
Tweet media one
6
135
974