|  

[Packt] Cyber Threat Hunting [FCO] GloDLS



Size :978.49 MB
Peers : Seeders : 0      Leechers : 0
Added : 5 years ago » by SaM » in Tutorials
Language : English
Last Updated :7 months ago
Info_Hash :0F3E8AE8A4FEA8233E5980DE6A6D329A2BC98911

Torrent File Contents

[Packt] Cyber Threat Hunting [FCO] GloDLS
  1 - Threat Hunting Introduction/01_Course Overview.mp4
  -  10.44 MB

  1 - Threat Hunting Introduction/02_Introduction to Threat Hunting.mp4
  -  17.84 MB

  1 - Threat Hunting Introduction/03_Incident Response and Incident Handling.mp4
  -  12.81 MB

  1 - Threat Hunting Introduction/04_Hunting Mindset - Threat Intelligence.mp4
  -  11.03 MB

  1 - Threat Hunting Introduction/05_Hunter Mindset - Forensics.mp4
  -  13.7 MB

  1 - Threat Hunting Introduction/06_Threat Hunting Simulation.mp4
  -  13.5 MB

  1 - Threat Hunting Introduction/07_Threat Hunting Terminologies.mp4
  -  22.76 MB

  2 - Threat Hunting Methodology/01_Threat Reports and Research.mp4
  -  20.25 MB

  2 - Threat Hunting Methodology/02_Threat Sharing and Exchanges.mp4
  -  12.16 MB

  2 - Threat Hunting Methodology/03_Indicators of Compromise.mp4
  -  15.52 MB

  2 - Threat Hunting Methodology/04_Threat Hunting Methods.mp4
  -  10.11 MB

  2 - Threat Hunting Methodology/05_Report Writing.mp4
  -  14.89 MB

  3 - Network Hunting/01_Network Hunting Overview.mp4
  -  11.4 MB

  3 - Network Hunting/02_TCP_IP and Networking Primer.mp4
  -  10.45 MB

  3 - Network Hunting/03_Network Hunting Tools.mp4
  -  38.49 MB

  3 - Network Hunting/04_Network Hunting Summary.mp4
  -  12.11 MB

  4 - Suspicious Network Traffic Hunting/01_ARP Analysis.mp4
  -  19.21 MB

  4 - Suspicious Network Traffic Hunting/02_ICMP Analysis.mp4
  -  15.19 MB

  4 - Suspicious Network Traffic Hunting/03_TCP Analysis.mp4
  -  22.09 MB

  4 - Suspicious Network Traffic Hunting/04_DHCP Analysis.mp4
  -  29.85 MB

  4 - Suspicious Network Traffic Hunting/05_DNS Analysis.mp4
  -  18.19 MB

  4 - Suspicious Network Traffic Hunting/06_HTTP_HTTPS Analysis.mp4
  -  14.78 MB

  4 - Suspicious Network Traffic Hunting/07_Unknown Traffic.mp4
  -  20.33 MB

  5 - Hunting Web Shells/01_Web Shell Hunting Overview.mp4
  -  11.05 MB

  5 - Hunting Web Shells/02_Web Shell Hunting Tools.mp4
  -  32.86 MB

  5 - Hunting Web Shells/03_Hunting Web Shell – Part 1.mp4
  -  36.69 MB

  5 - Hunting Web Shells/04_Hunting Web Shell – Part 2.mp4
  -  42.15 MB

  6 - Endpoint Hunting/01_Endpoint Hunting Overview.mp4
  -  10.76 MB

  6 - Endpoint Hunting/02_Windows Processes.mp4
  -  63.74 MB

  6 - Endpoint Hunting/03_Endpoint Baselines.mp4
  -  12.29 MB

  6 - Endpoint Hunting/04_Malware Classifications.mp4
  -  95.14 MB

  6 - Endpoint Hunting/05_Malware Delivery.mp4
  -  39.79 MB

  6 - Endpoint Hunting/06_Malware Evasion Techniques.mp4
  -  44.43 MB

  6 - Endpoint Hunting/07_Malware Persistence.mp4
  -  29.08 MB

  7 - Hunting Malware/01_Malware Hunting Overview.mp4
  -  8.24 MB

  7 - Hunting Malware/02_Malware Detection Tools.mp4
  -  22.2 MB

  7 - Hunting Malware/03_Malware Detection Techniques.mp4
  -  45.97 MB

  7 - Hunting Malware/04_Memory Analysis.mp4
  -  53.52 MB

  7 - Hunting Malware/05_Windows Event Logs.mp4
  -  26.36 MB

  7 - Hunting Malware/06_Windows Event IDs.mp4
  -  16.77 MB

  Discuss.FreeTutorials.Us.html
  -  165.68 KB

  FreeCoursesOnline.Me.html
  -  108.3 KB

  FreeTutorials.Eu.html
  -  102.23 KB

  How you can help Team-FTU.txt
  -  259 Bytes

  [TGx]Downloaded from torrentgalaxy.org.txt
  -  524 Bytes

  Torrent Downloaded From GloDls.buzz.txt
  -  84 Bytes



Torrent Description

Description:


By: Sunil Gupta
Released: Thursday, January 31, 2019 New Release!
Torrent Contains: 46 Files, 7 Folders
Course Source: https://www.packtpub.com/networking-and-servers/cyber-threat-hunting-video

Gain expertise in analyzing your network while tracking various security threats

Video Details

ISBN 9781838557812
Course Length 3 hours 7 minutes

Table of Contents

• THREAT HUNTING INTRODUCTION
• THREAT HUNTING METHODOLOGY
• NETWORK HUNTING
• SUSPICIOUS NETWORK TRAFFIC HUNTING
• HUNTING WEB SHELLS
• ENDPOINT HUNTING
• HUNTING MALWARE

Video Description

Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them.

In this course, you will get to know about the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to minimize incidents. You'll perform incident response and hunt across hundreds of unique systems using PowerShell and identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connection residues.
You will determine how the breach occurred by identifying the beachhead and spear phishing attack mechanisms. You will be able to use memory analysis, incident response, and threat hunting tools to detect malware, attacker command lines, network connections, and more.

Style and Approach

With extensive theoretical exploration on the subject in the initial half of the course, the concepts are demonstrated effectively with the help of detailed practical sessions in the second half of the course.

What You Will Learn

• Be vigilant and keep your systems secure before they’re infested
• Proactively hunt for threats in your organization’s network
• Use threat intelligence to hunt for known threats
• Analyze network traffic and identify malicious traffic with ease
• Perform memory analysis using Redline and Volatility to identify malware attacks

Authors

Sunil Gupta

A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of, many key organizations.
Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. His primary passion is cyber security, but he understands that, to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber-security expert, and always exceeds his clients' expectations.
Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.