:Search:

Oreilly Threat Intelligence and Threat Hunting 2nd Edition FreeCourseWeb

Torrent:
Info Hash: 704BF2A0E047C32DCC2F16B5BFC46730BEC30DEF
Similar Posts:
Uploader: FreeCourseWeb
Source: T Logo Torrent Galaxy
Downloads: 714
Language: English
Category: Other
Size: 1.1 GB
Added: April 8, 2024, 10:04 p.m.
Peers: Seeders: 9, Leechers: 17 (Last updated: 11 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 2 4 519
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 2 3 69
udp://tracker.torrent.eu.org:451/announce 2 3 121
udp://explodie.org:6969/announce 2 3 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 1 2 5
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 183 bytes
  2. Bonus Resources.txt 386 bytes
  3. 001. Threat Intelligence and Threat Hunting Introduction.en.srt 1.4 KB
  4. 001. Threat Intelligence and Threat Hunting Introduction.mp4 3.9 MB
  5. 001. Learning objectives.en.srt 964 bytes
  6. 001. Learning objectives.mp4 2.9 MB
  7. 002. 1.1 Threat actors Part 1.en.srt 19.8 KB
  8. 002. 1.1 Threat actors Part 1.mp4 51.1 MB
  9. 003. 1.2 Threat actors Part 2.en.srt 6.1 KB
  10. 003. 1.2 Threat actors Part 2.mp4 16.8 MB
  11. 004. 1.3 Confidence levels.en.srt 7.3 KB
  12. 004. 1.3 Confidence levels.mp4 18.2 MB
  13. 005. 1.4 Threat hunting.en.srt 7.1 KB
  14. 005. 1.4 Threat hunting.mp4 17.4 MB
  15. 001. Learning objectives.en.srt 2.0 KB
  16. 001. Learning objectives.mp4 5.6 MB
  17. 002. 2.1 Network-related.en.srt 32.6 KB
  18. 002. 2.1 Network-related.mp4 73.5 MB
  19. 003. 2.2 Host-related.en.srt 18.3 KB
  20. 003. 2.2 Host-related.mp4 39.3 MB
  21. 004. 2.3 Application-related.en.srt 4.0 KB
  22. 004. 2.3 Application-related.mp4 12.7 MB
  23. 005. 2.4 Malicious Activity Indicators.en.srt 7.5 KB
  24. 005. 2.4 Malicious Activity Indicators.mp4 22.5 MB
  25. 001. Learning objectives.en.srt 1.4 KB
  26. 001. Learning objectives.mp4 3.9 MB
  27. 002. 3.1 Tools Part 1.en.srt 13.3 KB
  28. 002. 3.1 Tools Part 1.mp4 39.4 MB
  29. 003. 3.2 Tools Part 2.en.srt 15.8 KB
  30. 003. 3.2 Tools Part 2.mp4 37.1 MB
  31. 004. 3.3 Common techniques Part 1.en.srt 21.4 KB
  32. 004. 3.3 Common techniques Part 1.mp4 54.3 MB
  33. 005. 3.4 Common techniques Part 2.en.srt 18.4 KB
  34. 005. 3.4 Common techniques Part 2.mp4 48.7 MB
  35. 006. 3.5 Common techniques Part 3.en.srt 25.4 KB
  36. 006. 3.5 Common techniques Part 3.mp4 60.7 MB
  37. 007. 3.6 Programming languagesscripting.en.srt 11.3 KB
  38. 007. 3.6 Programming languagesscripting.mp4 23.9 MB
  39. 001. Learning objectives.en.srt 657 bytes
  40. 001. Learning objectives.mp4 2.4 MB
  41. 002. 4.1 Cyber kill chains.en.srt 8.4 KB
  42. 002. 4.1 Cyber kill chains.mp4 21.5 MB
  43. 003. 4.2 Diamond Model of Intrusion Analysis.en.srt 3.9 KB
  44. 003. 4.2 Diamond Model of Intrusion Analysis.mp4 9.6 MB
  45. 004. 4.3 MITRE ATT&CK Part 1.en.srt 12.1 KB
  46. 004. 4.3 MITRE ATT&CK Part 1.mp4 32.7 MB
  47. 005. 4.4 MITRE ATT&CK Part 2.en.srt 14.9 KB
  48. 005. 4.4 MITRE ATT&CK Part 2.mp4 36.4 MB
  49. 006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).en.srt 2.1 KB
  50. 006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 5.1 MB
  51. 007. 4.6 OWASP Testing Guide.en.srt 6.9 KB
  52. 007. 4.6 OWASP Testing Guide.mp4 15.4 MB
  53. 001. Learning objectives.en.srt 952 bytes
  54. 001. Learning objectives.mp4 3.7 MB
  55. 002. 5.1 Attack Frameworks Part 1.en.srt 23.1 KB
  56. 002. 5.1 Attack Frameworks Part 1.mp4 35.3 MB
  57. 003. 5.2 Attack Frameworks Part 2.en.srt 6.8 KB
  58. 003. 5.2 Attack Frameworks Part 2.mp4 22.1 MB
  59. 004. 5.3 Threat Research.en.srt 6.3 KB
  60. 004. 5.3 Threat Research.mp4 15.2 MB
  61. 005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.mp4 9.3 MB
  62. 005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.srt 5.0 KB
  63. 006. 5.5 Wireless Analysis Techniques.en.srt 11.6 KB
  64. 006. 5.5 Wireless Analysis Techniques.mp4 18.1 MB
  65. 001. Learning objectives.en.srt 484 bytes
  66. 001. Learning objectives.mp4 2.1 MB
  67. 002. 6.1 Understanding Results.en.srt 13.7 KB
  68. 002. 6.1 Understanding Results.mp4 18.0 MB
  69. 003. 6.2 Web Application Scanners.en.srt 2.7 KB
  70. 003. 6.2 Web Application Scanners.mp4 4.1 MB
  71. 004. 6.3 Infrastructure Vulnerability Scanner.en.srt 7.5 KB
  72. 004. 6.3 Infrastructure Vulnerability Scanner.mp4 8.6 MB
  73. 005. 6.4 Software Assessment Tools and Techniques.en.srt 2.6 KB
  74. 005. 6.4 Software Assessment Tools and Techniques.mp4 2.7 MB
  75. 006. 6.5 Wireless Assessment.en.srt 6.7 KB
  76. 006. 6.5 Wireless Assessment.mp4 8.1 MB
  77. 007. 6.6 Cloud Infrastructure Assessment.en.srt 2.7 KB
  78. 007. 6.6 Cloud Infrastructure Assessment.mp4 3.6 MB
  79. 001. Learning objectives.en.srt 431 bytes
  80. 001. Learning objectives.mp4 2.1 MB
  81. 002. 7.1 Mobile.en.srt 7.5 KB
  82. 002. 7.1 Mobile.mp4 10.9 MB
  83. 003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.en.srt 13.4 KB
  84. 003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 18.6 MB
  85. 004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.en.srt 26.0 KB
  86. 004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 43.2 MB
  87. 005. 7.4 APTs.en.srt 20.8 KB
  88. 005. 7.4 APTs.mp4 24.9 MB
  89. 006. 7.5 Embedded and Real-Time Operating Systems (RTOS).en.srt 10.4 KB
  90. 006. 7.5 Embedded and Real-Time Operating Systems (RTOS).mp4 16.4 MB
  91. 007. 7.6 SOC and FPGA.en.srt 9.5 KB
  92. 007. 7.6 SOC and FPGA.mp4 48.1 MB
  93. 008. 7.7 Physical Access Control.en.srt 1.8 KB
  94. 008. 7.7 Physical Access Control.mp4 3.5 MB
  95. 009. 7.8 Building Automation Systems, Vehicles, and Drones.en.srt 11.2 KB
  96. 009. 7.8 Building Automation Systems, Vehicles, and Drones.mp4 22.3 MB
  97. 010. 7.9 Industrial Control Systems (ICS) and Process Automation.en.srt 24.4 KB
  98. 010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 44.1 MB
  99. 011. 7.10 Defending Critical Infrastructure.en.srt 22.1 KB
  100. 011. 7.10 Defending Critical Infrastructure.mp4 37.2 MB
  101. 012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.en.srt 24.0 KB
  102. 012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 37.5 MB
  103. 013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.en.srt 21.0 KB
  104. 013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 39.3 MB
  105. 014. 7.13 Verifications and Quality Controls.en.srt 13.1 KB
  106. 014. 7.13 Verifications and Quality Controls.mp4 25.3 MB
  107. 001. Threat Intelligence and Threat Hunting Summary.en.srt 346 bytes
  108. 001. Threat Intelligence and Threat Hunting Summary.mp4 1.1 MB

Discussion