Download link
File List
-
1 - Threat Hunting Introduction/01_Course Overview.mp4 10.44 MB
1 - Threat Hunting Introduction/02_Introduction to Threat Hunting.mp4 17.84 MB
1 - Threat Hunting Introduction/03_Incident Response and Incident Handling.mp4 12.81 MB
1 - Threat Hunting Introduction/04_Hunting Mindset - Threat Intelligence.mp4 11.03 MB
1 - Threat Hunting Introduction/05_Hunter Mindset - Forensics.mp4 13.7 MB
1 - Threat Hunting Introduction/06_Threat Hunting Simulation.mp4 13.5 MB
1 - Threat Hunting Introduction/07_Threat Hunting Terminologies.mp4 22.76 MB
2 - Threat Hunting Methodology/01_Threat Reports and Research.mp4 20.25 MB
2 - Threat Hunting Methodology/02_Threat Sharing and Exchanges.mp4 12.16 MB
2 - Threat Hunting Methodology/03_Indicators of Compromise.mp4 15.52 MB
2 - Threat Hunting Methodology/04_Threat Hunting Methods.mp4 10.11 MB
2 - Threat Hunting Methodology/05_Report Writing.mp4 14.89 MB
3 - Network Hunting/01_Network Hunting Overview.mp4 11.4 MB
3 - Network Hunting/02_TCP_IP and Networking Primer.mp4 10.45 MB
3 - Network Hunting/03_Network Hunting Tools.mp4 38.49 MB
3 - Network Hunting/04_Network Hunting Summary.mp4 12.11 MB
4 - Suspicious Network Traffic Hunting/01_ARP Analysis.mp4 19.21 MB
4 - Suspicious Network Traffic Hunting/02_ICMP Analysis.mp4 15.19 MB
4 - Suspicious Network Traffic Hunting/03_TCP Analysis.mp4 22.09 MB
4 - Suspicious Network Traffic Hunting/04_DHCP Analysis.mp4 29.85 MB
4 - Suspicious Network Traffic Hunting/05_DNS Analysis.mp4 18.19 MB
4 - Suspicious Network Traffic Hunting/06_HTTP_HTTPS Analysis.mp4 14.78 MB
4 - Suspicious Network Traffic Hunting/07_Unknown Traffic.mp4 20.33 MB
5 - Hunting Web Shells/01_Web Shell Hunting Overview.mp4 11.05 MB
5 - Hunting Web Shells/02_Web Shell Hunting Tools.mp4 32.86 MB
5 - Hunting Web Shells/03_Hunting Web Shell – Part 1.mp4 36.69 MB
5 - Hunting Web Shells/04_Hunting Web Shell – Part 2.mp4 42.15 MB
6 - Endpoint Hunting/01_Endpoint Hunting Overview.mp4 10.76 MB
6 - Endpoint Hunting/02_Windows Processes.mp4 63.74 MB
6 - Endpoint Hunting/03_Endpoint Baselines.mp4 12.29 MB
6 - Endpoint Hunting/04_Malware Classifications.mp4 95.14 MB
6 - Endpoint Hunting/05_Malware Delivery.mp4 39.79 MB
6 - Endpoint Hunting/06_Malware Evasion Techniques.mp4 44.43 MB
6 - Endpoint Hunting/07_Malware Persistence.mp4 29.08 MB
7 - Hunting Malware/01_Malware Hunting Overview.mp4 8.24 MB
7 - Hunting Malware/02_Malware Detection Tools.mp4 22.2 MB
7 - Hunting Malware/03_Malware Detection Techniques.mp4 45.97 MB
7 - Hunting Malware/04_Memory Analysis.mp4 53.52 MB
7 - Hunting Malware/05_Windows Event Logs.mp4 26.36 MB
7 - Hunting Malware/06_Windows Event IDs.mp4 16.77 MB
Discuss.FreeTutorials.Us.html 165.68 KB
FreeCoursesOnline.Me.html 108.3 KB
FreeTutorials.Eu.html 102.23 KB
How you can help Team-FTU.txt 259 B
[TGx]Downloaded from torrentgalaxy.org.txt 524 B
Torrent Downloaded From GloDls.to.txt 84 B
Download Info
-
Tips
“[FreeCoursesOnline.Me] [Packt] Cyber Threat Hunting [FCO]” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.