Technical requirements
In this chapter, it might be helpful to have some knowledge of any SIEM solutions. Splunk will specifically help, as well as Microsoft Defender for Endpoint and its KQL.
Knowledge of regular expressions (regexes) might also be needed to understand detection rule matching on specific patterns.
Finally, knowledge of some of the data sources mentioned in the previous chapter will be helpful, specifically, Windows events and their different fields and contents.