Example Usage
. ├── 00_Introduction_BTL1/ # exam format, philosophy, strategy, personal experience ├── 01_Phishing_Analysis/ # header analysis, attachment triage, detection workflows ├── 02_Threat_Intelligence/ # IOC management, ATT&CK TTP mapping ├── 03_Digital_Forensics/ │ ├── 02_Disk_Analysis/ # NTFS artifacts, registry hives, file carving │ └── 03_Memory_Analysis/ # Volatility profiles, injection detection ├── 04_SIEM_Analysis/ # SPL query structures, log correlation rules ├── 05_Network_Analysis/ # BPF filters, protocol anomalies, PCAP carving └── 06_Incident_Response/ # IR lifecycle, containment, live response