Hands-On Incident Response Fundamentals
File List
- 03. Common IR Tasks- An Overview/04. Demo- Reviewing and Parsing Logs.mp4 80.2 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/08. Demo- Using a Hex Editor to Identify Files.mp4 66.8 MB
- 02. The Nature of the Threat- Why Are We Here/06. Demo- VirusTotal and OpSec Considerations.mp4 39.2 MB
- 03. Common IR Tasks- An Overview/03. Demo- Understanding and Fielding Alerts.mp4 37.0 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/06. Demo- Intel Pivoting Tools.mp4 30.9 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/07. An Introduction to Hex Editors.mp4 20.6 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/04. Demo- Base64 Encoding & Decoding.mp4 19.4 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/04. Demo- OpenIOC Creation.mp4 18.4 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/02. Indicators of Compromise.mp4 13.2 MB
- 03. Common IR Tasks- An Overview/02. Logs- Convenient Morsels of Evidence.mp4 13.1 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/02. ASCII and Unicode.mp4 10.5 MB
- 01. Incident Response- Job Security at Its Best/00. Course Introduction.mp4 10.5 MB
- 02. The Nature of the Threat- Why Are We Here/05. The Importance of Operations Security.mp4 9.2 MB
- 06. Course Review & Next Steps/01. What's Next-.mp4 9.1 MB
- 02. The Nature of the Threat- Why Are We Here/04. APT Group Exposé- APT1 & APT28.mp4 7.9 MB
- 02. The Nature of the Threat- Why Are We Here/03. APT Modus Operandi.mp4 7.9 MB
- 02. The Nature of the Threat- Why Are We Here/02. Attackers- Commodity vs. APT.mp4 7.4 MB
- 02. The Nature of the Threat- Why Are We Here/01. The Threat Is Real.mp4 7.4 MB
- 01. Incident Response- Job Security at Its Best/03. Who Does the Things-.mp4 6.9 MB
- 01. Incident Response- Job Security at Its Best/02. The Talent Divide.mp4 6.7 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/03. Much Ado About Base64.mp4 6.0 MB
- 03. Common IR Tasks- An Overview/01. The Groundwork- Terms and Definitions.mp4 5.9 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/06. Understanding Carrier Files & File Signatures.mp4 5.8 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/01. Character Encodings Overview.mp4 5.3 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/01. The Types of Cyber Threat Intelligence.mp4 4.6 MB
- 00. Course Overview/00. Course Overview.mp4 4.4 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/05. Hexadecimal and Character Encodings Comparison.mp4 4.1 MB
- 01. Incident Response- Job Security at Its Best/01. Defining IR, Course Pre-reqs, and Demo Setup.mp4 3.7 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/03. Intel Sharing- IOC File Formats.mp4 3.6 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/05. Becoming an Intel Shop.mp4 3.3 MB
- 02. The Nature of the Threat- Why Are We Here/00. Module Intro.mp4 2.1 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/09. Module Wrap-up.mp4 1.9 MB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/00. Module Intro.mp4 1.7 MB
- 03. Common IR Tasks- An Overview/00. Module Intro.mp4 1.7 MB
- 03. Common IR Tasks- An Overview/05. Module Wrap-up.mp4 1.5 MB
- 01. Incident Response- Job Security at Its Best/04. Module Wrap-up.mp4 1.5 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/07. Module Wrap-up.mp4 1.3 MB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/00. Module Intro.mp4 1.2 MB
- 06. Course Review & Next Steps/00. Module Overview.mp4 1.0 MB
- 06. Course Review & Next Steps/02. Course Wrap-up.mp4 688.2 KB
- 03. Common IR Tasks- An Overview/04. Demo- Reviewing and Parsing Logs.srt 37.3 KB
- 02. The Nature of the Threat- Why Are We Here/06. Demo- VirusTotal and OpSec Considerations.srt 21.0 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/06. Demo- Intel Pivoting Tools.srt 17.7 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/02. Indicators of Compromise.srt 14.6 KB
- 03. Common IR Tasks- An Overview/03. Demo- Understanding and Fielding Alerts.srt 13.6 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/08. Demo- Using a Hex Editor to Identify Files.srt 13.3 KB
- 03. Common IR Tasks- An Overview/02. Logs- Convenient Morsels of Evidence.srt 12.1 KB
- 02. The Nature of the Threat- Why Are We Here/05. The Importance of Operations Security.srt 11.5 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/04. Demo- OpenIOC Creation.srt 11.4 KB
- 06. Course Review & Next Steps/01. What's Next-.srt 11.4 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/07. An Introduction to Hex Editors.srt 11.2 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/04. Demo- Base64 Encoding & Decoding.srt 10.5 KB
- 02. The Nature of the Threat- Why Are We Here/03. APT Modus Operandi.srt 9.7 KB
- 02. The Nature of the Threat- Why Are We Here/04. APT Group Exposé- APT1 & APT28.srt 8.5 KB
- 02. The Nature of the Threat- Why Are We Here/01. The Threat Is Real.srt 8.0 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/02. ASCII and Unicode.srt 7.8 KB
- 01. Incident Response- Job Security at Its Best/02. The Talent Divide.srt 7.5 KB
- 02. The Nature of the Threat- Why Are We Here/02. Attackers- Commodity vs. APT.srt 7.1 KB
- 01. Incident Response- Job Security at Its Best/03. Who Does the Things-.srt 7.1 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/01. The Types of Cyber Threat Intelligence.srt 6.8 KB
- 03. Common IR Tasks- An Overview/01. The Groundwork- Terms and Definitions.srt 6.4 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/06. Understanding Carrier Files & File Signatures.srt 6.2 KB
- 01. Incident Response- Job Security at Its Best/00. Course Introduction.srt 5.5 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/03. Much Ado About Base64.srt 5.2 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/05. Becoming an Intel Shop.srt 5.1 KB
- 01. Incident Response- Job Security at Its Best/01. Defining IR, Course Pre-reqs, and Demo Setup.srt 4.9 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/05. Hexadecimal and Character Encodings Comparison.srt 3.6 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/01. Character Encodings Overview.srt 3.5 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/03. Intel Sharing- IOC File Formats.srt 3.2 KB
- 00. Course Overview/00. Course Overview.srt 2.5 KB
- 02. The Nature of the Threat- Why Are We Here/00. Module Intro.srt 2.4 KB
- 03. Common IR Tasks- An Overview/00. Module Intro.srt 2.3 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/09. Module Wrap-up.srt 2.1 KB
- 03. Common IR Tasks- An Overview/05. Module Wrap-up.srt 1.9 KB
- 04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors/00. Module Intro.srt 1.9 KB
- 01. Incident Response- Job Security at Its Best/04. Module Wrap-up.srt 1.6 KB
- 06. Course Review & Next Steps/00. Module Overview.srt 1.6 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/07. Module Wrap-up.srt 1.5 KB
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/00. Module Intro.srt 1.3 KB
- 06. Course Review & Next Steps/02. Course Wrap-up.srt 1.0 KB
- 01. Incident Response- Job Security at Its Best/6 Simple Memory Techniques - All Hacker use.html 98 bytes
- 03. Common IR Tasks- An Overview/Linux Tails Operating System.html 84 bytes
- 05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84 bytes
- 06. Course Review & Next Steps/LIFX 1100-Lumen.html 84 bytes
- 06. Course Review & Next Steps/Yubico - YubiKey 5 NFC.html 84 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.