Epic Detect


Epic Detect

Attack Pathways

Follow guided attack scenarios that simulate real-world threats. Each pathway combines multiple techniques to help you understand how sophisticated attacks unfold and how to defend against them.

Epic Detect

Total Pathways

2

Comprehensive learning tracks

Hours of Content

4+

Of hands-on practice

Total Points

120

To earn through completion

Categories

Tutorial
Cloud
Introduction to SPL
Introduction to SPL
1

Tutorial

Before diving into EpicDetect and a journey into your career as a cyber security analyst, let us show you the basics of Splunk Processing Language (SPL). Get rolling in this quick pathway catered to beginners!

60 Points
2h
Cloud Catastrophe
Cloud Catastrophe
1

Cloud

The morning started like any other at Nimbus Technologies, a growing startup with a substantial AWS footprint. Their monitoring dashboard suddenly lit up with alerts—unusual login patterns, unexpected API calls, and resource changes nobody authorized. As Nimbus' newly hired security analyst, you've been tasked with investigating this potential breach. The CTO is breathing down your neck while the company's critical cloud infrastructure and sensitive customer data hang in the balance. Using your SPL skills and cloud security knowledge, you'll need to trace the attacker's path through CloudTrail logs, determine what systems were compromised, assess potential data exfiltration, and identify unauthorized infrastructure changes. Time is of the essence—every minute the attacker remains in the environment, they could be accessing more sensitive data or setting up persistent backdoors. Your mission: follow the digital breadcrumbs, understand the scope of the breach, and provide the intelligence needed to stop the attack and begin recovery. Are your cloud forensics skills up to the challenge? Dive into the logs and find out!

60 Points
2h