Arquivo | Tamanho |
---|
1 - Threat Hunting Introduction/01_Course Overview.mp4 | 10.44 MB |
1 - Threat Hunting Introduction/02_Introduction to Threat Hunting.mp4 | 17.84 MB |
1 - Threat Hunting Introduction/03_Incident Response and Incident Handling.mp4 | 12.81 MB |
1 - Threat Hunting Introduction/04_Hunting Mindset - Threat Intelligence.mp4 | 11.03 MB |
1 - Threat Hunting Introduction/05_Hunter Mindset - Forensics.mp4 | 13.70 MB |
1 - Threat Hunting Introduction/06_Threat Hunting Simulation.mp4 | 13.50 MB |
1 - Threat Hunting Introduction/07_Threat Hunting Terminologies.mp4 | 22.76 MB |
2 - Threat Hunting Methodology/01_Threat Reports and Research.mp4 | 20.25 MB |
2 - Threat Hunting Methodology/02_Threat Sharing and Exchanges.mp4 | 12.16 MB |
2 - Threat Hunting Methodology/03_Indicators of Compromise.mp4 | 15.52 MB |
2 - Threat Hunting Methodology/04_Threat Hunting Methods.mp4 | 10.11 MB |
2 - Threat Hunting Methodology/05_Report Writing.mp4 | 14.89 MB |
3 - Network Hunting/01_Network Hunting Overview.mp4 | 11.40 MB |
3 - Network Hunting/02_TCP_IP and Networking Primer.mp4 | 10.45 MB |
3 - Network Hunting/03_Network Hunting Tools.mp4 | 38.49 MB |
3 - Network Hunting/04_Network Hunting Summary.mp4 | 12.11 MB |
4 - Suspicious Network Traffic Hunting/01_ARP Analysis.mp4 | 19.21 MB |
4 - Suspicious Network Traffic Hunting/02_ICMP Analysis.mp4 | 15.19 MB |
4 - Suspicious Network Traffic Hunting/03_TCP Analysis.mp4 | 22.09 MB |
4 - Suspicious Network Traffic Hunting/04_DHCP Analysis.mp4 | 29.85 MB |
4 - Suspicious Network Traffic Hunting/05_DNS Analysis.mp4 | 18.19 MB |
4 - Suspicious Network Traffic Hunting/06_HTTP_HTTPS Analysis.mp4 | 14.78 MB |
4 - Suspicious Network Traffic Hunting/07_Unknown Traffic.mp4 | 20.33 MB |
5 - Hunting Web Shells/01_Web Shell Hunting Overview.mp4 | 11.05 MB |
5 - Hunting Web Shells/02_Web Shell Hunting Tools.mp4 | 32.86 MB |
5 - Hunting Web Shells/03_Hunting Web Shell – Part 1.mp4 | 36.69 MB |
5 - Hunting Web Shells/04_Hunting Web Shell – Part 2.mp4 | 42.15 MB |
6 - Endpoint Hunting/01_Endpoint Hunting Overview.mp4 | 10.76 MB |
6 - Endpoint Hunting/02_Windows Processes.mp4 | 63.74 MB |
6 - Endpoint Hunting/03_Endpoint Baselines.mp4 | 12.29 MB |
6 - Endpoint Hunting/04_Malware Classifications.mp4 | 95.14 MB |
6 - Endpoint Hunting/05_Malware Delivery.mp4 | 39.79 MB |
6 - Endpoint Hunting/06_Malware Evasion Techniques.mp4 | 44.43 MB |
6 - Endpoint Hunting/07_Malware Persistence.mp4 | 29.08 MB |
7 - Hunting Malware/01_Malware Hunting Overview.mp4 | 8.24 MB |
7 - Hunting Malware/02_Malware Detection Tools.mp4 | 22.20 MB |
7 - Hunting Malware/03_Malware Detection Techniques.mp4 | 45.97 MB |
7 - Hunting Malware/04_Memory Analysis.mp4 | 53.52 MB |
7 - Hunting Malware/05_Windows Event Logs.mp4 | 26.36 MB |
7 - Hunting Malware/06_Windows Event IDs.mp4 | 16.77 MB |
Discuss.FreeTutorials.Us.html | 165.68 kB |
FreeCoursesOnline.Me.html | 108.30 kB |
FreeTutorials.Eu.html | 102.23 kB |
How you can help Team-FTU.txt | 259.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
[TGx]Downloaded from torrentgalaxy.org.txt | 524.00 B |