Download Free Download : Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition
mp4 | Video: h264,1280X720 | Audio: AAC, 44.1 KHz
Genre:eLearning | Language: English | Size:1.14 GB
Files Included :
001 Threat Intelligence and Threat Hunting Introduction.mp4 (3.9 MB)
MP4
001 Learning objectives.mp4 (2.9 MB)
MP4
002 1 1 Threat actors Part 1.mp4 (51.05 MB)
MP4
003 1 2 Threat actors Part 2.mp4 (16.8 MB)
MP4
004 1 3 Confidence levels.mp4 (18.21 MB)
MP4
005 1 4 Threat hunting.mp4 (17.37 MB)
MP4
001 Learning objectives.mp4 (5.63 MB)
MP4
002 2 1 Network-related.mp4 (73.55 MB)
MP4
003 2 2 Host-related.mp4 (39.25 MB)
MP4
004 2 3 Application-related.mp4 (12.74 MB)
MP4
005 2 4 Malicious Activity Indicators.mp4 (22.47 MB)
MP4
001 Learning objectives.mp4 (3.94 MB)
MP4
002 3 1 Tools Part 1.mp4 (39.36 MB)
MP4
003 3 2 Tools Part 2.mp4 (37.07 MB)
MP4
004 3 3 Common techniques Part 1.mp4 (54.29 MB)
MP4
005 3 4 Common techniques Part 2.mp4 (48.73 MB)
MP4
006 3 5 Common techniques Part 3.mp4 (60.74 MB)
MP4
007 3 6 Programming languagesscripting.mp4 (23.92 MB)
MP4
001 Learning objectives.mp4 (2.44 MB)
MP4
002 4 1 Cyber kill chains.mp4 (21.48 MB)
MP4
003 4 2 Diamond Model of Intrusion Analysis.mp4 (9.61 MB)
MP4
004 4 3 MITRE ATT&CK Part 1.mp4 (32.7 MB)
MP4
005 4 4 MITRE ATT&CK Part 2.mp4 (36.42 MB)
MP4
006 4 5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 (5.07 MB)
MP4
007 4 6 OWASP Testing Guide.mp4 (15.41 MB)
MP4
001 Learning objectives.mp4 (3.7 MB)
MP4
002 5 1 Attack Frameworks Part 1.mp4 (35.25 MB)
MP4
003 5 2 Attack Frameworks Part 2.mp4 (22.07 MB)
MP4
004 5 3 Threat Research.mp4 (15.22 MB)
MP4
006 5 5 Wireless Analysis Techniques.mp4 (18.11 MB)
MP4
001 Learning objectives.mp4 (2.07 MB)
MP4
002 6 1 Understanding Results.mp4 (17.99 MB)
MP4
003 6 2 Web Application Scanners.mp4 (4.07 MB)
MP4
004 6 3 Infrastructure Vulnerability Scanner.mp4 (8.57 MB)
MP4
005 6 4 Software Assessment Tools and Techniques.mp4 (2.68 MB)
MP4
006 6 5 Wireless Assessment.mp4 (8.08 MB)
MP4
007 6 6 Cloud Infrastructure Assessment.mp4 (3.65 MB)
MP4
001 Learning objectives.mp4 (2.09 MB)
MP4
002 7 1 Mobile.mp4 (10.89 MB)
MP4
003 7 2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 (18.63 MB)
MP4
004 7 3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 (43.16 MB)
MP4
005 7 4 APTs.mp4 (24.93 MB)
MP4
006 7 5 Embedded and Real-Time Operating Systems (RTOS).mp4 (16.4 MB)
MP4
007 7 6 SOC and FPGA.mp4 (48.13 MB)
MP4
008 7 7 Physical Access Control.mp4 (3.52 MB)
MP4
009 7 8 Building Automation Systems, Vehicles, and Drones.mp4 (22.3 MB)
MP4
010 7 9 Industrial Control Systems (ICS) and Process Automation.mp4 (44.07 MB)
MP4
011 7 10 Defending Critical Infrastructure.mp4 (37.2 MB)
MP4
012 7 11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 (37.52 MB)
MP4
013 7 12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 (39.32 MB)
MP4
014 7 13 Verifications and Quality Controls.mp4 (25.27 MB)
MP4
001 Threat Intelligence and Threat Hunting Summary.mp4 (1.14 MB)
MP4
MP4
001 Learning objectives.mp4 (2.9 MB)
MP4
002 1 1 Threat actors Part 1.mp4 (51.05 MB)
MP4
003 1 2 Threat actors Part 2.mp4 (16.8 MB)
MP4
004 1 3 Confidence levels.mp4 (18.21 MB)
MP4
005 1 4 Threat hunting.mp4 (17.37 MB)
MP4
001 Learning objectives.mp4 (5.63 MB)
MP4
002 2 1 Network-related.mp4 (73.55 MB)
MP4
003 2 2 Host-related.mp4 (39.25 MB)
MP4
004 2 3 Application-related.mp4 (12.74 MB)
MP4
005 2 4 Malicious Activity Indicators.mp4 (22.47 MB)
MP4
001 Learning objectives.mp4 (3.94 MB)
MP4
002 3 1 Tools Part 1.mp4 (39.36 MB)
MP4
003 3 2 Tools Part 2.mp4 (37.07 MB)
MP4
004 3 3 Common techniques Part 1.mp4 (54.29 MB)
MP4
005 3 4 Common techniques Part 2.mp4 (48.73 MB)
MP4
006 3 5 Common techniques Part 3.mp4 (60.74 MB)
MP4
007 3 6 Programming languagesscripting.mp4 (23.92 MB)
MP4
001 Learning objectives.mp4 (2.44 MB)
MP4
002 4 1 Cyber kill chains.mp4 (21.48 MB)
MP4
003 4 2 Diamond Model of Intrusion Analysis.mp4 (9.61 MB)
MP4
004 4 3 MITRE ATT&CK Part 1.mp4 (32.7 MB)
MP4
005 4 4 MITRE ATT&CK Part 2.mp4 (36.42 MB)
MP4
006 4 5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 (5.07 MB)
MP4
007 4 6 OWASP Testing Guide.mp4 (15.41 MB)
MP4
001 Learning objectives.mp4 (3.7 MB)
MP4
002 5 1 Attack Frameworks Part 1.mp4 (35.25 MB)
MP4
003 5 2 Attack Frameworks Part 2.mp4 (22.07 MB)
MP4
004 5 3 Threat Research.mp4 (15.22 MB)
MP4
006 5 5 Wireless Analysis Techniques.mp4 (18.11 MB)
MP4
001 Learning objectives.mp4 (2.07 MB)
MP4
002 6 1 Understanding Results.mp4 (17.99 MB)
MP4
003 6 2 Web Application Scanners.mp4 (4.07 MB)
MP4
004 6 3 Infrastructure Vulnerability Scanner.mp4 (8.57 MB)
MP4
005 6 4 Software Assessment Tools and Techniques.mp4 (2.68 MB)
MP4
006 6 5 Wireless Assessment.mp4 (8.08 MB)
MP4
007 6 6 Cloud Infrastructure Assessment.mp4 (3.65 MB)
MP4
001 Learning objectives.mp4 (2.09 MB)
MP4
002 7 1 Mobile.mp4 (10.89 MB)
MP4
003 7 2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 (18.63 MB)
MP4
004 7 3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 (43.16 MB)
MP4
005 7 4 APTs.mp4 (24.93 MB)
MP4
006 7 5 Embedded and Real-Time Operating Systems (RTOS).mp4 (16.4 MB)
MP4
007 7 6 SOC and FPGA.mp4 (48.13 MB)
MP4
008 7 7 Physical Access Control.mp4 (3.52 MB)
MP4
009 7 8 Building Automation Systems, Vehicles, and Drones.mp4 (22.3 MB)
MP4
010 7 9 Industrial Control Systems (ICS) and Process Automation.mp4 (44.07 MB)
MP4
011 7 10 Defending Critical Infrastructure.mp4 (37.2 MB)
MP4
012 7 11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 (37.52 MB)
MP4
013 7 12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 (39.32 MB)
MP4
014 7 13 Verifications and Quality Controls.mp4 (25.27 MB)
MP4
001 Threat Intelligence and Threat Hunting Summary.mp4 (1.14 MB)
MP4
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Free search engine download: Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition