Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition

seeders: 6
leechers: 16
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 30
  • Language: English

Files

[ FreeCourseWeb.com ] Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here !
    • Bonus Resources.txt (0.4 KB)
    • Introduction
      • 001. Threat Intelligence and Threat Hunting Introduction.en.srt (1.4 KB)
      • 001. Threat Intelligence and Threat Hunting Introduction.mp4 (3.9 MB)
      Lesson 1 Threat-Intelligence and Threat-Hunting Concepts
      • 001. Learning objectives.en.srt (0.9 KB)
      • 001. Learning objectives.mp4 (2.9 MB)
      • 002. 1.1 Threat actors Part 1.en.srt (19.8 KB)
      • 002. 1.1 Threat actors Part 1.mp4 (51.1 MB)
      • 003. 1.2 Threat actors Part 2.en.srt (6.1 KB)
      • 003. 1.2 Threat actors Part 2.mp4 (16.8 MB)
      • 004. 1.3 Confidence levels.en.srt (7.3 KB)
      • 004. 1.3 Confidence levels.mp4 (18.2 MB)
      • 005. 1.4 Threat hunting.en.srt (7.1 KB)
      • 005. 1.4 Threat hunting.mp4 (17.4 MB)
      Lesson 2 Analyze Indicators of Potentially Malicious Activity
      • 001. Learning objectives.en.srt (2.0 KB)
      • 001. Learning objectives.mp4 (5.6 MB)
      • 002. 2.1 Network-related.en.srt (32.6 KB)
      • 002. 2.1 Network-related.mp4 (73.5 MB)
      • 003. 2.2 Host-related.en.srt (18.3 KB)
      • 003. 2.2 Host-related.mp4 (39.3 MB)
      • 004. 2.3 Application-related.en.srt (4.0 KB)
      • 004. 2.3 Application-related.mp4 (12.7 MB)
      • 005. 2.4 Malicious Activity Indicators.en.srt (7.5 KB)
      • 005. 2.4 Malicious Activity Indicators.mp4 (22.5 MB)
      Lesson 3 Tools or Techniques to Determine Malicious Activity
      • 001. Learning objectives.en.srt (1.4 KB)
      • 001. Learning objectives.mp4 (3.9 MB)
      • 002. 3.1 Tools Part 1.en.srt (13.3 KB)
      • 002. 3.1 Tools Part 1.mp4 (39.4 MB)
      • 003. 3.2 Tools Part 2.en.srt (15.8 KB)
      • 003. 3.2 Tools Part 2.mp4 (37.1 MB)
      • 004. 3.3 Common techniques Part 1.en.srt (21.4 KB)
      • 004. 3.3 Common techniques Part 1.mp4 (54.3 MB)
      • 005. 3.4 Common techniques Part 2.en.srt (18.4 KB)
      • 005. 3.4 Common techniques Part 2.mp4 (48.7 MB)
      • 006. 3.5 Common techniques Part 3.en.srt (25.4 KB)
      • 006. 3.5 Common techniques Part 3.mp4 (60.7 MB)
      • 007. 3.6 Programming languagesscripting.en.srt (11.3 KB)
      • 007. 3.6 Programming languagesscripting.mp4 (23.9 MB)
      Lesson 4 Concepts Related to Attack Methodology Frameworks
      • 001. Learning objectives.en.srt (0.6 KB)
      • 001. Learning objectives.mp4 (2.4 MB)
      • 002. 4.1 Cyber kill chains.en.srt (8.4 KB)
      • 002. 4.1 Cyber kill chains.mp4 (21.5 MB)
      • 003. 4.2 Diamond Model of Intrusion Analysis.en.srt (3.9 KB)
      • 003. 4.2 Diamond Model of Intrusion Analysis.mp4 (9.6 MB)
      • 004. 4.3 MITRE ATT&CK Part 1.en.srt (12.1 KB)
      • 004. 4.3 MITRE ATT&CK Part 1.mp4 (32.7 MB)
      • 005. 4.4 MITRE ATT&CK Part 2.en.srt (14.9 KB)
      • 005. 4.4 MITRE ATT&CK Part 2.mp4 (36.4 MB)
      • 006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).en.srt (2.1 KB)
      • 006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 (5.1 MB)
      • 007. 4.6 OWASP Testing Guide.en.srt (6.9 KB)
      • 007. 4.6 OWASP Testing Guide.mp4 (15.4 MB)
      Lesson 5 Utilizing Threat Intelligence to Support Organization Security
      • 001. Learning objectives.en.srt (0.9 KB)
      • 001. Learning objectives.mp4 (3.7 MB)
      • 002. 5.1 Attack Frameworks Part 1.en.srt (23.1 KB)
      • 002. 5.1 Attack Frameworks Part 1.mp4 (35.3 MB)
      • 003. 5.2 Attack Frameworks Part 2.en.srt (6.8 KB)
      • 003. 5.2 Attack Frameworks Part 2.mp4 (22.1 MB)
      • 004. 5.3 Threat Research.en.srt (6.3 KB)
      • 004. 5.3 Threat Research.mp4 (15.2 MB)
      • 005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.mp4 (9.3 MB)
      • 005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.srt (5.0 KB)
      • 006. 5.5 Wireless Analysis Techniques.en.srt (11.6 KB)
      • 006. 5.5 Wireless Analysis Techniques.mp4 (18.1 MB)
      Lesson 6 Analyze Output from Common Vulnerability Assessment Tools
      • 001. Learning objectives.en.srt (0.5 KB)
      • 001. Learning objectives.mp4 (2.1 MB)
      • 002. 6.1 Understanding Results.en.srt (13.7 KB)
      • 002. 6.1 Understanding Results.mp4 (18.0 MB)
      • 003. 6.2 Web Application Scanners.en.srt (2.7 KB)
      • 003. 6.2 Web Application Scanners.mp4 (4.1 MB)
      • 004. 6.3 Infrastructure Vulnerability Scanner.en.srt (7.5 KB)
      • 004. 6.3 Infrastructure Vulnerability Scanner.mp4 (8.6 MB)
      • 005. 6.4 Software Assessment Tools and Techniques.en.srt (2.6 KB)
      • 005. 6.4 Software Assessment Tools and Techniques.mp4 (2.7 MB)
      • 006. 6.5 Wireless Assessment.en.srt (6.7 KB)
      • 006. 6.5 Wireless Assessment.mp4 (8.1 MB)
      • 007. 6.6 Cloud Infrastructure Assessment.en.srt (2.7 KB)
      • 007. 6.6 Cloud Infrastructure Assessment.mp4 (3.6 MB)
      Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology
      • 001. Learning objectives.en.srt (0.4 KB)
      • 001. Learning objectives.mp4 (2.1 MB)
      • 002. 7.1 Mobile.en.srt (7.5 KB)
      • 002. 7.1 Mobile.mp4 (10.9 MB)
      • 003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.en.srt (13.4 KB)
      • 003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 (18.6 MB)
      • 004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.en.srt (26.0 KB)
      • 004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 (43.2 MB)
      • 005. 7.4 APTs.en.srt (20.8 KB)
      • 005. 7.4 APTs.mp4 (24.9 MB)
      • 006. 7.5 Embedded and Real-Time Operating Systems (RTOS).en.srt (10.4 KB)
      • 006. 7.5 Embedded and Real-Time Operating Systems (RTOS).mp4 (16.4 MB)
      • 007. 7.6 SOC and FPGA.en.srt (9.5 KB)
      • 007. 7.6 SOC and FPGA.mp4 (48.1 MB)
      • 008. 7.7 Physical Access Control.en.srt (1.8 KB)
      • 008. 7.7 Physical Access Control.mp4 (3.5 MB)
      • 009. 7.8 Building Automation Systems, Vehicles, and Drones.en.srt (11.2 KB)
      • 009. 7.8 Building Automation Systems, Vehicles, and Drones.mp4 (22.3 MB)
      • 010. 7.9 Industria

Description

Threat Intelligence and Threat Hunting, 2nd Edition

https://FreeCourseWeb.com

Released 4/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 4h 58m | Size: 1.15 GB

Explore key threat intelligence and threat hunting concepts to help you protect your sensitive data.

A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. The Threat Intelligence and Threat Hunting, 2nd Edition video course provides learners with the knowledge and skills to fortify systems, protect sensitive data, and ensure compliance with privacy regulations.

Throughout the course, expert trainer, author, and cybersecurity expert Aamir Lakhani uses hands-on s, in-depth discussions and lightboard explanations to explore how to classify threats, work with the vulnerabilities, and use common assessment methodologies. By the end of this course, you will be able to protect sensitive data and ensure compliance with privacy regulations, secure systems and applications to prevent data exposure and advise your organization on privacy-by-design principles.



Download torrent
1.2 GB
seeders:6
leechers:16
Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1.2 GB
seeders:6
leechers:16
Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition


Torrent hash: 704BF2A0E047C32DCC2F16B5BFC46730BEC30DEF