Room progress ( NaN% )
Task 1Introduction
Task includes a deployable machine
Task 2What is Brim?
Task 3The Basics
Task 4Default Queries
Task 5Use Cases
Task 6Exercise: Threat Hunting with Brim | Malware C2 Detection
Task 7Exercise: Threat Hunting with Brim | Crypto Mining
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The Brim room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in