[ FreeCourseWeb.com ] Linkedin - Modern Threat Hunting Strategies to Identify Attacks

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:455.64 MB
  3. Creat Time:2024-10-03
  4. Active Degree:25
  5. Last Active:2024-11-10
  6. File Tags:FreeCourseWeb  com  Linkedin  Modern  Threat  Hunting  Strategies  to  Identify  Attacks  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    [ FreeCourseWeb.com ] Linkedin - Modern Threat Hunting Strategies to Identify Attacks

  1. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.mp4 85.50 MB
  2. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.mp4 69.28 MB
  3. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.mp4 32.68 MB
  4. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.mp4 31.04 MB
  5. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.mp4 24.87 MB
  6. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.mp4 21.53 MB
  7. ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.mp4 21.53 MB
  8. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.mp4 20.52 MB
  9. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.mp4 19.64 MB
  10. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.mp4 17.83 MB
  11. ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.mp4 16.42 MB
  12. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.mp4 16.09 MB
  13. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.mp4 15.50 MB
  14. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.mp4 12.73 MB
  15. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.mp4 9.27 MB
  16. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.mp4 7.86 MB
  17. ~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 7.78 MB
  18. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.mp4 6.17 MB
  19. ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.mp4 5.61 MB
  20. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.mp4 5.15 MB
  21. ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.mp4 4.33 MB
  22. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.mp4 4.12 MB
  23. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.srt 45 KB
  24. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.srt 39 KB
  25. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.srt 17 KB
  26. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.srt 10 KB
  27. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.srt 8 KB
  28. ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.srt 8 KB
  29. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.srt 7 KB
  30. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.srt 7 KB
  31. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.srt 6 KB
  32. ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.srt 6 KB
  33. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.srt 6 KB
  34. ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.srt 6 KB
  35. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.srt 6 KB
  36. ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.srt 4 KB
  37. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.srt 3 KB
  38. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.srt 2 KB
  39. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.srt 2 KB
  40. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.srt 2 KB
  41. ~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt 2 KB
  42. ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.srt 2 KB
  43. ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.srt 2 KB
  44. ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.srt 1 KB
  45. ~Get Your Files Here !/Bonus Resources.txt 0 KB
  46. Get Bonus Downloads Here.url 0 KB