How to Approach Malware Analysis Topics?

Follow these following steps:

Go to Malware Analysis Section and Pick a topic

Bintext

PEID

SSDT View

IDA

OllyDbg

FakeNet-NG

How to Approach Incident Response Topics?

Go to Incident Response Section and Pick a Topic

THOR

Velociraptor

LOKI

OfficeMalScanner

Get-EventLog PS

PDFStreamDumper

Follow these following steps:

How to Approach Digital Forensic Topics?

Follow these following steps:

Go to Digital Forensic Section and Pick a Topic

EZViewer

Velociraptor

FireEye Memoryze

FTK Imager

yarascan

FireEye Redline

How to Approach Threat Hunting?

Go to Threat Hunting Section and Pick a Topic

Attack Lifecycle

OSINT

MITRE ATT&CK

Hunting Methodology

Threat Mapping

APT38 OSINT