[ FreeCourseWeb.com ] Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition

File Type Create Time File Size Seeders Leechers Updated
Movie 2024-04-08 1.15GB 1 0 1 day ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
FreeCourseWeb  com  Oreilly  Threat  Intelligence  and  Threat  Hunting  2nd  Edition  
Related Torrents
  1. [ FreeCourseWeb.com ] Frommer's England and Scotland (CompleteGuide), 2nd Edition 120.21MB
  2. [ FreeCourseWeb.com ] Optimal Control of ODEs and DAEs, 2nd Edition (EPUB) 60.67MB
  3. [ FreeCourseWeb.com ] Visual Notes for Architects and Designers, 2nd Edition (PDF) 158.82MB
  4. [ FreeCourseWeb.com ] CompTIA PenTest + PT0-002 Cert Guide, 2nd Edition (PDF) 34.39MB
  5. [ FreeCourseWeb.com ] Atlas of the World's Languages, 2nd Edition 157.40MB
  6. [ FreeCourseWeb.com ] How Well Do You Know Harry - 2nd Edition, 2023 87.15MB
  7. [ FreeCourseWeb.com ] Close-Range Photogrammetry and 3D Imaging, 4th Edition (EPUB) 307.02MB
  8. [ CourseWikia.com ] Oreilly - Secure Operations and Protections, 2nd Edition 1.26GB
  9. [ FreeCourseWeb.com ] Oreilly - Quantum Computing in Action, Video Edition 987.34MB
  10. [ FreeCourseWeb.com ] Oreilly - Practical Automation with PowerShell, Video Edition 1.24GB
Files
  1. Get Bonus Downloads Here.url 183B
  2. ~Get Your Files Here !/Bonus Resources.txt 386B
  3. ~Get Your Files Here !/Introduction/001. Threat Intelligence and Threat Hunting Introduction.en.srt 1.38KB
  4. ~Get Your Files Here !/Introduction/001. Threat Intelligence and Threat Hunting Introduction.mp4 3.90MB
  5. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/001. Learning objectives.en.srt 964B
  6. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/001. Learning objectives.mp4 2.90MB
  7. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.en.srt 19.85KB
  8. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 51.05MB
  9. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/003. 1.2 Threat actors Part 2.en.srt 6.08KB
  10. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/003. 1.2 Threat actors Part 2.mp4 16.80MB
  11. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/004. 1.3 Confidence levels.en.srt 7.35KB
  12. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/004. 1.3 Confidence levels.mp4 18.21MB
  13. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/005. 1.4 Threat hunting.en.srt 7.14KB
  14. ~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/005. 1.4 Threat hunting.mp4 17.37MB
  15. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/001. Learning objectives.en.srt 2.04KB
  16. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/001. Learning objectives.mp4 5.63MB
  17. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.en.srt 32.64KB
  18. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 73.55MB
  19. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/003. 2.2 Host-related.en.srt 18.33KB
  20. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/003. 2.2 Host-related.mp4 39.25MB
  21. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/004. 2.3 Application-related.en.srt 4.00KB
  22. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/004. 2.3 Application-related.mp4 12.74MB
  23. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/005. 2.4 Malicious Activity Indicators.en.srt 7.55KB
  24. ~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/005. 2.4 Malicious Activity Indicators.mp4 22.47MB
  25. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/001. Learning objectives.en.srt 1.37KB
  26. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/001. Learning objectives.mp4 3.94MB
  27. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/002. 3.1 Tools Part 1.en.srt 13.26KB
  28. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/002. 3.1 Tools Part 1.mp4 39.36MB
  29. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/003. 3.2 Tools Part 2.en.srt 15.79KB
  30. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/003. 3.2 Tools Part 2.mp4 37.07MB
  31. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.en.srt 21.43KB
  32. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 54.29MB
  33. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.en.srt 18.37KB
  34. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 48.73MB
  35. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.en.srt 25.40KB
  36. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 60.74MB
  37. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/007. 3.6 Programming languagesscripting.en.srt 11.32KB
  38. ~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/007. 3.6 Programming languagesscripting.mp4 23.92MB
  39. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/001. Learning objectives.en.srt 657B
  40. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/001. Learning objectives.mp4 2.44MB
  41. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/002. 4.1 Cyber kill chains.en.srt 8.41KB
  42. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/002. 4.1 Cyber kill chains.mp4 21.48MB
  43. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/003. 4.2 Diamond Model of Intrusion Analysis.en.srt 3.87KB
  44. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/003. 4.2 Diamond Model of Intrusion Analysis.mp4 9.61MB
  45. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/004. 4.3 MITRE ATT&CK Part 1.en.srt 12.12KB
  46. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/004. 4.3 MITRE ATT&CK Part 1.mp4 32.70MB
  47. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/005. 4.4 MITRE ATT&CK Part 2.en.srt 14.94KB
  48. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/005. 4.4 MITRE ATT&CK Part 2.mp4 36.42MB
  49. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).en.srt 2.08KB
  50. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 5.07MB
  51. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/007. 4.6 OWASP Testing Guide.en.srt 6.86KB
  52. ~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/007. 4.6 OWASP Testing Guide.mp4 15.41MB
  53. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/001. Learning objectives.en.srt 952B
  54. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/001. Learning objectives.mp4 3.70MB
  55. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/002. 5.1 Attack Frameworks Part 1.en.srt 23.12KB
  56. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/002. 5.1 Attack Frameworks Part 1.mp4 35.25MB
  57. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/003. 5.2 Attack Frameworks Part 2.en.srt 6.82KB
  58. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/003. 5.2 Attack Frameworks Part 2.mp4 22.07MB
  59. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/004. 5.3 Threat Research.en.srt 6.31KB
  60. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/004. 5.3 Threat Research.mp4 15.22MB
  61. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.mp4 9.27MB
  62. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.srt 5.05KB
  63. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/006. 5.5 Wireless Analysis Techniques.en.srt 11.60KB
  64. ~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/006. 5.5 Wireless Analysis Techniques.mp4 18.11MB
  65. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/001. Learning objectives.en.srt 484B
  66. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/001. Learning objectives.mp4 2.07MB
  67. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/002. 6.1 Understanding Results.en.srt 13.70KB
  68. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/002. 6.1 Understanding Results.mp4 17.99MB
  69. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/003. 6.2 Web Application Scanners.en.srt 2.66KB
  70. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/003. 6.2 Web Application Scanners.mp4 4.07MB
  71. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/004. 6.3 Infrastructure Vulnerability Scanner.en.srt 7.54KB
  72. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/004. 6.3 Infrastructure Vulnerability Scanner.mp4 8.57MB
  73. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/005. 6.4 Software Assessment Tools and Techniques.en.srt 2.57KB
  74. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/005. 6.4 Software Assessment Tools and Techniques.mp4 2.68MB
  75. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/006. 6.5 Wireless Assessment.en.srt 6.75KB
  76. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/006. 6.5 Wireless Assessment.mp4 8.08MB
  77. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/007. 6.6 Cloud Infrastructure Assessment.en.srt 2.67KB
  78. ~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/007. 6.6 Cloud Infrastructure Assessment.mp4 3.65MB
  79. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/001. Learning objectives.en.srt 431B
  80. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/001. Learning objectives.mp4 2.09MB
  81. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/002. 7.1 Mobile.en.srt 7.46KB
  82. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/002. 7.1 Mobile.mp4 10.89MB
  83. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.en.srt 13.35KB
  84. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 18.63MB
  85. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.en.srt 26.05KB
  86. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 43.16MB
  87. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/005. 7.4 APTs.en.srt 20.83KB
  88. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/005. 7.4 APTs.mp4 24.93MB
  89. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/006. 7.5 Embedded and Real-Time Operating Systems (RTOS).en.srt 10.38KB
  90. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/006. 7.5 Embedded and Real-Time Operating Systems (RTOS).mp4 16.40MB
  91. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.en.srt 9.54KB
  92. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 48.13MB
  93. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/008. 7.7 Physical Access Control.en.srt 1.81KB
  94. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/008. 7.7 Physical Access Control.mp4 3.52MB
  95. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/009. 7.8 Building Automation Systems, Vehicles, and Drones.en.srt 11.17KB
  96. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/009. 7.8 Building Automation Systems, Vehicles, and Drones.mp4 22.30MB
  97. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.en.srt 24.44KB
  98. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 44.07MB
  99. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/011. 7.10 Defending Critical Infrastructure.en.srt 22.10KB
  100. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/011. 7.10 Defending Critical Infrastructure.mp4 37.20MB
  101. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.en.srt 24.05KB
  102. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 37.52MB
  103. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.en.srt 21.02KB
  104. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 39.32MB
  105. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/014. 7.13 Verifications and Quality Controls.en.srt 13.12KB
  106. ~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/014. 7.13 Verifications and Quality Controls.mp4 25.27MB
  107. ~Get Your Files Here !/Summary/001. Threat Intelligence and Threat Hunting Summary.en.srt 346B
  108. ~Get Your Files Here !/Summary/001. Threat Intelligence and Threat Hunting Summary.mp4 1.14MB