
Enhance Your Cybersecurity Expertise
Learn to write and create custom detection rules to integrate with SIEM systems

Detect Malicious Behaviors Effectively
Acquire the skills to identify and respond to threats swiftly

Empower Your SOC Analysis
Equip yourself with advanced techniques for threat hunting and analysis
About The Sigma Rules Bootcamp
The Sigma Rules Bootcamp is tailored for cybersecurity professionals, threat hunters, and SOC analysts seeking to elevate their skills. Dive into the world of custom detection rules, amplify your SIEM integration capabilities, and master the art of detecting malicious behaviors. Take the leap towards becoming a cybersecurity expert today!

Meet Your Instructor
Hey there, I'm Roberto MartÃnez, a seasoned professional in cybersecurity with a genuine passion for sharing knowledge. I've faced the same challenges you have and I am thrilled to support you on your journey to cybersecurity excellence. Let's learn and conquer together!
Curriculum
-
1
Course Resources
-
(Included in full purchase)
Virtual Machines and Tools
-
(Included in full purchase)
eLibrary
-
(Included in full purchase)
-
2
Introduction to Sigma Rules and Setup
-
(Included in full purchase)
What are Sigma Rules?
-
(Included in full purchase)
Recorded Class: 2025.03.03
-
(Included in full purchase)
Activity: Setting up the environment.
-
(Included in full purchase)
Walkthrough: Basic YAML constructs: Scalars, sequences, and mappings
-
(Included in full purchase)
Walkthrough: Key Components of Sigma Rules
-
(Included in full purchase)
Activity: Writing and Testing a simple Sigma rule
-
(Included in full purchase)
Practice Lab: Writing and testing a simple Sigma rule to detect the execution of the whoami command on a Windows system
-
(Included in full purchase)
-
3
Detection Analytics and Data Sources
-
(Included in full purchase)
Recorded Class: 2025.03.04
-
(Included in full purchase)
Introduction to MITRE ATT&CK and Cyber Analytics
-
(Included in full purchase)
Walkthrough: Incorporating MITRE ATT&CK framework and CAR into Sigma rules
-
(Included in full purchase)
Walkthrough: Identifying different Data Sources
-
(Included in full purchase)
Walkthrough: Creating Detection Analytics
-
(Included in full purchase)
Hands-On Lab: Emulating and Detecting a malicious behavior with Sigma
-
(Included in full purchase)
-
4
Using Sigma-Compatible Tools
-
(Included in full purchase)
Recorded Class: 2025.03.05
-
(Included in full purchase)
Overview of Sigma-Compatible Tools
-
(Included in full purchase)
Walkthrough: Setting Up Chainsaw and Hayabusa
-
(Included in full purchase)
Walkthrough: Cutting Through Cyber Threats with Chainsaw
-
(Included in full purchase)
Walkthrough: Precision Threat Detection with Hayabusa
-
(Included in full purchase)
Hands-On Lab: Investigating and analyzing logs for malicious activity
-
(Included in full purchase)
-
5
Sigma rules Management and Deployment
-
(Included in full purchase)
Overview of SIEM Systems and Sigma Integration
-
(Included in full purchase)
Walkthrough: Using Sigma UI Converters
-
(Included in full purchase)
Walkthrough: Integrating Sigma Rules with Elastic SIEM
-
(Included in full purchase)
Sigma Rulesets and Automation
-
(Included in full purchase)
Walkthrough: Managing Sigma rulesets
-
(Included in full purchase)
Walkthrough: Sigma automation tools
-
(Included in full purchase)
Hands-On Lab: Emulating behaviors and testing Alerts
-
(Included in full purchase)
Hans-On-Lab: Creating a Sigma ruleset
-
(Included in full purchase)
Hands-On Lab: Automating Sigma rules Creation
-
(Included in full purchase)
Unlock the Power of Detection Rules Today
Take the First Step Towards Advanced Cybersecurity Skills
$195.00