O’REILLY | Threat Intelligence and Threat Hunting [FCO]

Seeders : 12
Leechers : 30
Downloads : 248
Size : 15.1 GB
Uploaded :05 Jun, 2022
Uploader :one

O’REILLY | Threat Intelligence and Threat Hunting [FCO]

  • O’REILLY | Threat Intelligence and Threat Hunting [FCO]15.1 GB
    • 00001 Threat_Intelligence_and_Threat_Hunting_-_Introduction.mp442.9 MB
    • 00002 Learning_objectives.mp423.4 MB
    • 00003 1.1_What_is_Threat_Intelligence.mp4700.9 MB
    • 00004 1.2_Threat_Sources_-_Part_1.mp4334.3 MB
    • 00005 1.3_Threat_Sources_-_Part_2.mp4169.5 MB
    • 00006 1.4_Threat_Classifications.mp4389.7 MB
    • 00007 1.5_Cyber_Threat_Investigation_-_Part_1.mp4437.6 MB
    • 00008 1.6_Cyber_Threat_Investigation_-_Part_2.mp4318.0 MB
    • 00009 1.7_Social_Media_Graphs_-_Part_1.mp4356.4 MB
    • 00010 1.8_Social_Media_Graphs_-_Part_2.mp4315.3 MB
    • 00011 1.9_Log_Challenges_-_Part_1.mp4358.4 MB
    • 00012 1.10_Log_Challenges_-_Part_2.mp4323.1 MB
    • 00013 1.11_Advanced_Threat_Hunting_-_Part_1.mp4292.8 MB
    • 00014 1.12_Advanced_Threat_Hunting_-_Part_2.mp4438.9 MB
    • 00015 1.13_Endpoint_Detection.mp4305.5 MB
    • 00016 Learning_objectives.mp429.1 MB
    • 00017 2.1_Attack_Frameworks_-_Part_1.mp4292.2 MB
    • 00018 2.2_Attack_Frameworks_-_Part_2.mp4194.6 MB
    • 00019 2.3_Threat_Research.mp4122.5 MB
    • 00020 2.4_Threat_Modeling_Methodologies_and_Threat_Intelligence_Sharing_with_Support_Functions.mp478.9 MB
    • 00021 2.5_Wireless_Analysis_Techniques.mp4150.6 MB
    • 00022 Learning_objectives.mp418.5 MB
    • 00023 3.1_Vulnerability_Identification_-_Part_1.mp4430.8 MB
    • 00024 3.2_Vulnerability_Identification_-_Part_2.mp4120.3 MB
    • 00025 3.3_Validation.mp4303.0 MB
    • 00026 3.4_Remediation_and_Mitigation_and_Inhibitors.mp467.1 MB
    • 00027 3.5_Scanning_Parameters_and_Criteria.mp4524.1 MB
    • 00028 3.6_Vulnerability_Scanning_-_Part_1.mp4208.4 MB
    • 00029 3.7_Vulnerability_Scanning_-_Part_2.mp4115.1 MB
    • 00030 3.8_Enumeration.mp4685.7 MB