Skip to main content
Cyber Defense TacticsCyber Defense Tactics
HomeLearnResourcesBlogCommunity
Cyber Defense TacticsCyber Defense Tactics

Learn defensive security, leverage AI for cyber defense, and join a community of security professionals.

Learning

  • Blog
  • Resources
  • Newsletter

Community

  • Discord
  • YouTube
  • About

Legal

  • Privacy Policy
  • Terms of Service

© 2026 Cyber Defense Tactics. All rights reserved.

A Carbene.AI Project

Back to Playbook Library

Technical Procedures

Detailed technical workflows for forensics, log analysis, and IOC collection

5 playbooks

More Playbooks

Memory Forensics Basics

intermediate

Fundamental procedures for capturing and analyzing system memory during incident response.

5 steps9 checklist items2-4 hours

Network Traffic Analysis for Incident Response

intermediate

Procedures for capturing and analyzing network traffic during security incidents.

5 steps9 checklist items2-4 hours

Log Analysis Workflow

intermediate

Systematic approach to analyzing logs during incident investigation.

5 steps9 checklist items1-4 hours

IOC Collection Guide

beginner

Standardized procedures for collecting and documenting indicators of compromise.

5 steps8 checklist itemsOngoing

Endpoint Forensics Collection

intermediate

Procedures for forensic evidence collection from Windows and Linux endpoints.

5 steps11 checklist items2-4 hours per system

All Playbooks Are Free

Step-by-step procedures, checklists, and communication templates for every incident type — no account required.