[ FreeCourseWeb.com ] Linkedin - Modern Threat Hunting Strategies to Identify Attacks
File Information:
- Magnet Link:Magnet Link
- File Size:455.64 MB
- Creat Time:2024-10-03
- Active Degree:25
- Last Active:2024-11-10
- File Tags:FreeCourseWeb com Linkedin Modern Threat Hunting Strategies to Identify Attacks
- Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.mp4 85.50 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.mp4 69.28 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.mp4 32.68 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.mp4 31.04 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.mp4 24.87 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.mp4 21.53 MB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.mp4 21.53 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.mp4 20.52 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.mp4 19.64 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.mp4 17.83 MB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.mp4 16.42 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.mp4 16.09 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.mp4 15.50 MB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.mp4 12.73 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.mp4 9.27 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.mp4 7.86 MB
- ~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 7.78 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.mp4 6.17 MB
- ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.mp4 5.61 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.mp4 5.15 MB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.mp4 4.33 MB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.mp4 4.12 MB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.srt 45 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.srt 39 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.srt 17 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.srt 10 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.srt 8 KB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.srt 8 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.srt 7 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.srt 7 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.srt 6 KB
- ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.srt 6 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.srt 6 KB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.srt 6 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.srt 6 KB
- ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.srt 4 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.srt 3 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.srt 2 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.srt 2 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.srt 2 KB
- ~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt 2 KB
- ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.srt 2 KB
- ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.srt 2 KB
- ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.srt 1 KB
- ~Get Your Files Here !/Bonus Resources.txt 0 KB
- Get Bonus Downloads Here.url 0 KB
[ FreeCourseWeb.com ] Linkedin - Modern Threat Hunting Strategies to Identify Attacks
Hot Tags: