Tags analysis2 chapter 11 chapter 31 Chirpy1 ctf2 cyber talents2 DFIR1 Hunting1 Malware analysis1 phishing1 PMA Chapter 51 PMA Labs2 Practical Malware Analysis Chapter 51 Reverse Engineering1 Splunk1 Sysmon1