5 of 5 free uses remaining today
The complete SOC analyst playbook for investigating phishing emails. 52-page guide, Excel investigation log, and quick reference card β built by practitioners, verified against industry standards.
Referenced against NIST SP 800-61, MITRE ATT&CK, and 25+ free tools.

91% of cyberattacks start with a phishing email. Yet most security teams rely on ad-hoc investigation methods β no structured process, no documentation trail, no consistent risk scoring. When an incident escalates, there's no evidence package ready for management or legal.
Ad-hoc investigation leads to missed indicators and inconsistent outcomes.
Without a workflow, analysts waste time deciding what to check next.
When incidents escalate, there's no evidence package for management.
Three professional-grade deliverables that work together as a complete investigation system.

PDF with 11 embedded diagrams
Excel with auto-calculations
Printable desk reference
Every phase is a structured step with decision points, tool recommendations, and documentation requirements.
Rapid assessment of the reported email to determine priority and investigation scope.
Parse Received chains, verify From/Return-Path/Reply-To consistency, identify originating IP.
Check SPF, DKIM, and DMARC results to determine if the sender is authorised.
Extract, deobfuscate, and safely analyse all URLs using sandboxed tools.
Assess file risk levels, check hashes against threat intelligence, sandbox suspicious files.
Domain age, WHOIS data, blacklist checks, and historical sending patterns.
Identify manipulation techniques, urgency triggers, and impersonation patterns.
Extract all Indicators of Compromise and map to MITRE ATT&CK techniques.
Risk score calculation, escalation decision tree, and containment actions.
Lessons learned, detection rule creation, and process improvement.
Professional-quality content you can use on day one.

Sample pages showing investigation workflow and SPF/DKIM/DMARC reference table
11 professional diagrams embedded throughout the playbook
Every tool in the playbook is free and publicly accessible. No paid subscriptions required.
L1βL3 analysts investigating phishing alerts daily
SME security leads who are the de facto security team
Need professional-grade deliverables for client work
Training staff on structured email triage
NIST SP 800-61 Rev. 2
Computer Security Incident Handling Guide
MITRE ATT&CK
Phishing techniques T1566.001βT1566.003
RFC 5322 / 7208 / 6376 / 7489
Email authentication protocol standards
Microsoft IR Playbook
Official phishing investigation procedures
Early access feedback from security professionals.
"Finally, a structured process I can follow for every phishing alert. The investigation log alone saves me 20 minutes per case."
SOC Analyst, L2
Financial Services
"We used the playbook to train our help desk team. The quick reference card sits on every desk now."
IT Security Manager
Healthcare SME
"I use the investigation log as a deliverable for my clients. Professional quality, saves me building my own templates."
Cybersecurity Consultant
Independent
Both licences include all three components with free lifetime updates.
Use code LAUNCH20 at checkout for 20% off.
If the toolkit does not meet your expectations, contact us within 30 days for a full refund. No questions asked. We are confident you will find it valuable.