Pluralsight | Identify Common Cyber Network Attacks with Wireshark [FCO]

Seeders : 3
Leechers : 0
Downloads : 289
Size : 685.6 MB
Uploaded :08 Mar, 2022
Uploader :one

Pluralsight | Identify Common Cyber Network Attacks with Wireshark [FCO]

  • Pluralsight | Identify Common Cyber Network Attacks with Wireshark [FCO]685.6 MB
    • 0. Websites you may like
      • 0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url377.0 B
      • 1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url286.0 B
      • 3. FTUApps.com Download Cracked Developers Applications For Free.url239.0 B
      • For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url1.8 KB
      • How you can help our Group!.txt204.0 B
    • 01. Course Overview
      • 01. Course Overview.mp44.6 MB
    • 02. When to Break Out Wireshark for Threat Hunting
      • 02. Course Introduction.mp42.5 MB
      • 03. When to Break out Wireshark for Threat Hunting.mp43.1 MB
      • 04. Starting with IDS Alerts and Firewall Server Event Logs.mp45.1 MB
      • 05. Packet Analysis and the MITRE ATTCK Framework Cyber Kill Chain.mp42.1 MB
      • 06. Module Review.mp4709.5 KB
    • 03. Analyzing Port Scans and Enumeration Methods
      • 07. Module Intro.mp41.7 MB
      • 08. Network and Host Discovery Scans.mp45.2 MB
      • 09. Lab 1 - Detecting Network Discovery Scans with Wireshark.mp424.5 MB
      • 10. Lab 2 - Identifying Port Scans with Wireshark.mp431.9 MB
      • 11. Lab 2 - Part 2 - Detecting Port Scans.mp420.6 MB
      • 12. Lab 3 - Analyzing Malware for Network and Port Scans.mp440.4 MB
      • 13. Lab 3 - Part 2 - Analyzing Malware for Network and Port Scans.mp416.0 MB
      • 14. How OS Fingerprinting Works.mp45.5 MB
      • 15. Lab 4 - Detecting OS Fingerprinting with Wireshark.mp436.2 MB
      • 16. Lab 4 - Part 2 - Detecting OS Fingerprinting.mp426.7 MB
      • 17. How HTTP Path Enumeration Works.mp43.1 MB
      • 18. Lab 5 - Analyzing HTTP Path Enumeration with Wireshark.mp440.7 MB
      • 19. Module Review.mp4786.1 KB
    • 04. Analyzing Common Attack Signatures of Suspect Traffic
      • 20. Module Intro.mp4764.8 KB
      • 21. How to Find Suspect Traffic Patterns.mp43.8 MB
      • 22. Spotting Network Attacks - The Top 10 Things to Look For.mp44.0 MB
      • 23. Lab 4 - Analyzing TCP SYN Attacks.mp420.9 MB
      • 24. Identifying Unusual Country Codes with GeoIP.mp44.0 MB
      • 25. Lab 7 - Spotting Suspect Country Codes with Wireshark.mp427.3 MB