CB
CyberBlueAcademy
CoursesSyllabusToolsPricing
CoursesCyberBlueSOC AcademyModule 8

Module 8: Endpoint Visibility & Response

The endpoint is where attacks land. Learn to look inside it.

Tools:Velociraptor
5
Lessons
4
Hands-on Labs

Lessons

1

Why Endpoint Visibility Matters

What endpoints reveal that SIEM can't

2

Velociraptor: Endpoint Investigation

Artifacts, VQL basics

3

Process Analysis

Suspicious processes, parent-child trees

4

Persistence Mechanisms

Tasks, services, registry, startup

5

Endpoint Triage Workflow

SIEM alert → Velociraptor → confirm

Labs

Lab 8.1 — Endpoint Collection

Use Velociraptor to remotely collect running processes, network connections, and scheduled tasks from a compromised endpoint. Identify C2 beacons, crypto miners, and persistence mechanisms.

Intermediate

Lab 8.2 — Process Tree Investigation

Trace parent-child process relationships using Velociraptor to reconstruct a suspicious execution chain. Analyze command lines, user context, and timing to determine if the activity is malicious.

Advanced

Lab 8.3 — Persistence Hunt

Systematically search a compromised endpoint for all persistence mechanisms — cron jobs, systemd services, SSH keys, shell config backdoors, and init scripts — using Velociraptor.

Advanced

Lab 8.4 — SIEM to Endpoint

Start from a Wazuh alert, pivot to Velociraptor for endpoint investigation, and build a complete incident narrative connecting SIEM detection to endpoint forensic evidence.

Advanced
CB
CyberBlueAcademy

The SANS alternative you can actually afford. Real tools. Real labs. Real skills.

Course

  • Syllabus
  • Tools
  • Certification
  • Pricing

Platform

  • CyberBlueSOC (GitHub)
  • Installation Guide
  • Documentation

Community

  • Discord
  • Twitter / X
  • LinkedIn

© 2026 CyberBlue Academy. All rights reserved.

Privacy PolicyTerms of Service