|  

Threat Hunting: Endpoint Hunting



Size :562.4 MB
Peers : Seeders : 0      Leechers : 0
Added : 1 year ago » by tutsnode » in Other
Language : English
Last Updated :6 months ago
Info_Hash :F62D087E870F4E7177C72B83ACC24915D8792926

Torrent File Contents

Threat Hunting: Endpoint Hunting
  [TutsNode.net] - 5. Privilege Escalation and Credential Stealing/1. Elevating Status.mp4
  -  45.76 MB

  TutsNode.net.txt
  -  63 Bytes

  [TutsNode.net] - 4. Persistence/4. Demo - Hunting for Scheduled Tasks.vtt
  -  11.07 KB

  [TutsNode.net] - 1. Course Overview/1. Course Overview.vtt
  -  2.1 KB

  [TutsNode.net] - 2. Endpoint Data Sets/3. Demo - MITRE ATT&CK.vtt
  -  8.23 KB

  [TutsNode.net] - 2. Endpoint Data Sets/1. Who Are You and Where Are We Now.vtt
  -  2.44 KB

  [TutsNode.net] - 5. Privilege Escalation and Credential Stealing/2. Demo - Mimikatz Execution.vtt
  -  7.28 KB

  [TutsNode.net] - 3. Access and Implants/2. Demo - Process Execution.vtt
  -  7.08 KB

  [TutsNode.net] - 5. Privilege Escalation and Credential Stealing/1. Elevating Status.vtt
  -  6.66 KB

  [TutsNode.net] - 4. Persistence/2. Demo - Hunting for Registry Keys.vtt
  -  6.16 KB

  [TutsNode.net] - 3. Access and Implants/1. Gaining Access.vtt
  -  6.1 KB

  [TutsNode.net] - 6. Impossible Login/1. What Are They up To.vtt
  -  5.5 KB

  [TutsNode.net] - 2. Endpoint Data Sets/4. Where’s the Data Come From.vtt
  -  5.87 KB

  [TutsNode.net] - 2. Endpoint Data Sets/5. Scaling and Obfuscation.vtt
  -  2.22 KB

  [TutsNode.net] - 3. Access and Implants/4. Demo - LNK Analysis.vtt
  -  5.37 KB

  [TutsNode.net] - 6. Impossible Login/3. Caveats and Additional Metrics.vtt
  -  5.32 KB

  [TutsNode.net] - 6. Impossible Login/2. Demo - Detecting Impossible Travel.vtt
  -  4.23 KB

  [TutsNode.net] - 4. Persistence/1. Digging In.vtt
  -  3.71 KB

  [TutsNode.net] - 2. Endpoint Data Sets/2. Approaching an Intel Based Threat Hunt.vtt
  -  4.18 KB

  [TutsNode.net] - 3. Access and Implants/3. LNK Parser.vtt
  -  2.25 KB

  [TutsNode.net] - 4. Persistence/3. More Holes.vtt
  -  1.82 KB

  [TutsNode.net] - 5. Privilege Escalation and Credential Stealing/3. Hunting with Expertise.vtt
  -  1.7 KB

  [TutsNode.net] - 3. Access and Implants/5. User Behavior.vtt
  -  1.08 KB

  [TutsNode.net] - 6. Impossible Login/4. Conclusion.vtt
  -  1.04 KB

  [TutsNode.net] - 4. Persistence/5. Looking Harder.vtt
  -  1019 Bytes

  [TGx]Downloaded from torrentgalaxy.buzz .txt
  -  585 Bytes

  .pad/0
  -  145.37 KB

  [TutsNode.net] - 4. Persistence/4. Demo - Hunting for Scheduled Tasks.mp4
  -  43.78 MB

  .pad/1
  -  229.14 KB

  [TutsNode.net] - 6. Impossible Login/1. What Are They up To.mp4
  -  39.15 MB

  .pad/2
  -  105.69 KB

  [TutsNode.net] - 3. Access and Implants/1. Gaining Access.mp4
  -  38.75 MB

  .pad/3
  -  3.16 KB

  [TutsNode.net] - 2. Endpoint Data Sets/4. Where’s the Data Come From.mp4
  -  35.8 MB

  .pad/4
  -  201.5 KB

  [TutsNode.net] - 2. Endpoint Data Sets/3. Demo - MITRE ATT&CK.mp4
  -  35.72 MB

  .pad/5
  -  32.59 KB

  [TutsNode.net] - 6. Impossible Login/3. Caveats and Additional Metrics.mp4
  -  29.33 MB

  .pad/6
  -  177.42 KB

  [TutsNode.net] - 3. Access and Implants/2. Demo - Process Execution.mp4
  -  26.78 MB

  .pad/7
  -  229.75 KB

  [TutsNode.net] - 2. Endpoint Data Sets/2. Approaching an Intel Based Threat Hunt.mp4
  -  26.35 MB

  .pad/8
  -  151.92 KB

  [TutsNode.net] - 5. Privilege Escalation and Credential Stealing/2. Demo - Mimikatz Execution.mp4
  -  24.54 MB

  .pad/9
  -  214.44 KB

  [TutsNode.net] - 4. Persistence/1. Digging In.mp4
  -  23.46 MB

  .pad/10
  -  40.04 KB

  [TutsNode.net] - 2. Endpoint Data Sets/1. Who Are You and Where Are We Now.mp4
  -  21.83 MB

  .pad/11
  -  174.51 KB

  [TutsNode.net] - 3. Access and Implants/4. Demo - LNK Analysis.mp4
  -  21.32 MB

  .pad/12
  -  181.52 KB

  [TutsNode.net] - 1. Course Overview/1. Course Overview.mp4
  -  19.33 MB

  .pad/13
  -  177.7 KB

  [TutsNode.net] - 4. Persistence/2. Demo - Hunting for Registry Keys.mp4
  -  19.28 MB

  .pad/14
  -  221.56 KB

  [TutsNode.net] - 3. Access and Implants/3. LNK Parser.mp4
  -  18.98 MB

  .pad/15
  -  18.14 KB

  [TutsNode.net] - 2. Endpoint Data Sets/5. Scaling and Obfuscation.mp4
  -  18.8 MB

  .pad/16
  -  208.04 KB

  [TutsNode.net] - 5. Privilege Escalation and Credential Stealing/3. Hunting with Expertise.mp4
  -  15.32 MB

  .pad/17
  -  183.27 KB

  [TutsNode.net] - 6. Impossible Login/2. Demo - Detecting Impossible Travel.mp4
  -  14.32 MB

  .pad/18
  -  187.35 KB

  [TutsNode.net] - 4. Persistence/3. More Holes.mp4
  -  13.18 MB

  .pad/19
  -  67.02 KB

  [TutsNode.net] - 3. Access and Implants/5. User Behavior.mp4
  -  10.13 MB

  .pad/20
  -  127.01 KB

  [TutsNode.net] - 6. Impossible Login/4. Conclusion.mp4
  -  8.94 MB

  .pad/21
  -  59.79 KB

  [TutsNode.net] - 4. Persistence/5. Looking Harder.mp4
  -  8.42 MB



Torrent Description


Description

Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.

Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Endpoint Hunting, you’ll learn to hunt for specific APT techniques found in endpoint data. First, you’ll explore the various endpoint data sets and how to take advantage of correlation. Next, you’ll discover how to find artifacts related to initial access, implants, and persistence. Finally, you’ll learn how to detect behaviors related to privilege escalation and credential stealing. When you’re finished with this course, you’ll have the skills and knowledge of endpoint hunting needed to provide the proactive approach to security analytics.

Released 2/2023