Magnetic link has been copied to the cutting board

Name [ FreeCourseWeb.com ] Linkedin - Modern Threat Hunting Strategies to Identify Attacks

File Type video

Size 444.96MB

UpdateDate 2024-9-30

hash *****D2C8B6DC340668CA3C0BE197260A215F52

Hot 2

Files Get Bonus Downloads Here.url | 183B ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.mp4 | 5.48MB ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.srt | 1.70KB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.mp4 | 16.04MB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.srt | 6.45KB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.mp4 | 21.03MB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.srt | 8.22KB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.mp4 | 4.22MB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.srt | 2.25KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.mp4 | 31.92MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.srt | 10.53KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.mp4 | 19.18MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.srt | 6.46KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.mp4 | 67.66MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.srt | 38.75KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.mp4 | 15.14MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.srt | 6.07KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.mp4 | 12.43MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.srt | 4.27KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.mp4 | 15.72MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.srt | 7.31KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.mp4 | 4.03MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.srt | 2.46KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.mp4 | 6.02MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.srt | 3.37KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.mp4 | 9.05MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.srt | 2.78KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.mp4 | 7.67MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.srt | 2.46KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.mp4 | 5.03MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.srt | 2.27KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.mp4 | 20.04MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.srt | 6.52KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.mp4 | 30.31MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.srt | 17.12KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.mp4 | 24.29MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.srt | 8.32KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.mp4 | 21.03MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.srt | 7.01KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.mp4 | 17.41MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.srt | 6.64KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.mp4 | 83.50MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.srt | 44.36KB ~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 | 7.59MB ~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt | 2.37KB ~Get Your Files Here !/Bonus Resources.txt | 386B

Recommend

Magnetic link has been copied to the cutting board