[ FreeCourseWeb.com ] Linkedin - Modern Threat Hunting Strategies to Identify Attacks
File List
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.mp4 83.5 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.mp4 67.7 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.mp4 31.9 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.mp4 30.3 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.mp4 24.3 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.mp4 21.0 MB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.mp4 21.0 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.mp4 20.0 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.mp4 19.2 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.mp4 17.4 MB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.mp4 16.0 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.mp4 15.7 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.mp4 15.1 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.mp4 12.4 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.mp4 9.1 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.mp4 7.7 MB
- ~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 7.6 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.mp4 6.0 MB
- ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.mp4 5.5 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.mp4 5.0 MB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.mp4 4.2 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.mp4 4.0 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.srt 44.4 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.srt 38.7 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.srt 17.1 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.srt 10.5 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.srt 8.3 KB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.srt 8.2 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.srt 7.3 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.srt 7.0 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.srt 6.6 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.srt 6.5 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.srt 6.5 KB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.srt 6.5 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.srt 6.1 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.srt 4.3 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.srt 3.4 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.srt 2.8 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.srt 2.5 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.srt 2.5 KB
- ~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt 2.4 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.srt 2.3 KB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.srt 2.2 KB
- ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.srt 1.7 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 183 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.