:Search:

Advanced Intrusion Detection by InfoSec

Torrent:
Info Hash: C79924DC689518DF8550E9F04FB24EE9186F0EA0
Similar Posts:
Name Uploaded Size Se Le Upl. by
2025-09-05 848.4 MB 1 11 freecoursewb
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Language: English
Category: Other
Size: 848.4 MB
Added: Sept. 5, 2025, 12:17 p.m.
Peers: Seeders: 1, Leechers: 11 (Last updated: 7 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 1 8 0
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 2 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 01 - Introduction to advanced intrusion detection.mp4 7.0 MB
  3. 01 - Introduction to advanced intrusion detection.srt 7.6 KB
  4. 01 - What is intrusion detection.mp4 25.2 MB
  5. 01 - What is intrusion detection.srt 21.1 KB
  6. 02 - Detection methodology.mp4 20.9 MB
  7. 02 - Detection methodology.srt 21.1 KB
  8. 03 - Types of intrusion detection.mp4 22.7 MB
  9. 03 - Types of intrusion detection.srt 18.7 KB
  10. 04 - Intrusion detection requirements.mp4 25.1 MB
  11. 04 - Intrusion detection requirements.srt 22.2 KB
  12. 01 - Detection lab overview.mp4 33.7 MB
  13. 01 - Detection lab overview.srt 37.4 KB
  14. 02 - Lab use cases.mp4 9.6 MB
  15. 02 - Lab use cases.srt 10.8 KB
  16. 03 - Tools and technology.mp4 32.4 MB
  17. 03 - Tools and technology.srt 19.8 KB
  18. 04 - Documentation.mp4 14.1 MB
  19. 04 - Documentation.srt 13.1 KB
  20. 05 - Intro to building a security lab.mp4 6.9 MB
  21. 05 - Intro to building a security lab.srt 8.2 KB
  22. 06 - VirtualBox installation.mp4 40.6 MB
  23. 06 - VirtualBox installation.srt 22.0 KB
  24. 07 - Set up and provision Security Onion.mp4 17.0 MB
  25. 07 - Set up and provision Security Onion.srt 15.9 KB
  26. 01 - Network-based vs. host-based.mp4 27.7 MB
  27. 01 - Network-based vs. host-based.srt 25.5 KB
  28. 02 - IDS and IPS rules.mp4 33.7 MB
  29. 02 - IDS and IPS rules.srt 29.9 KB
  30. 03 - Wazuh (HIDS overview).mp4 19.3 MB
  31. 03 - Wazuh (HIDS overview).srt 12.2 KB
  32. 01 - Anomaly detection overview.mp4 22.1 MB
  33. 01 - Anomaly detection overview.srt 20.3 KB
  34. 02 - Anomaly detection techniques.mp4 31.7 MB
  35. 02 - Anomaly detection techniques.srt 27.4 KB
  36. 03 - Issues with anomaly detection.mp4 11.3 MB
  37. 03 - Issues with anomaly detection.srt 10.0 KB
  38. 01 - What is the ATT&CK Matrix.mp4 25.7 MB
  39. 01 - What is the ATT&CK Matrix.srt 26.0 KB
  40. 02 - Adversary tactics, techniques, and procedures (TTPs).mp4 46.0 MB
  41. 02 - Adversary tactics, techniques, and procedures (TTPs).srt 19.8 KB
  42. 03 - Leveraging threat intelligence.mp4 40.5 MB
  43. 03 - Leveraging threat intelligence.srt 20.5 KB
  44. 01 - Data management overview.mp4 47.4 MB
  45. 01 - Data management overview.srt 48.9 KB
  46. 02 - Data collection methods.mp4 15.3 MB
  47. 02 - Data collection methods.srt 16.2 KB
  48. 03 - Data mover example.mp4 55.5 MB
  49. 03 - Data mover example.srt 39.3 KB
  50. 04 - Data science and cybersecurity.mp4 23.8 MB
  51. 04 - Data science and cybersecurity.srt 24.0 KB
  52. 01 - Detection life cycle.mp4 31.1 MB
  53. 01 - Detection life cycle.srt 34.5 KB
  54. 02 - Data dictionary and data models.mp4 30.3 MB
  55. 02 - Data dictionary and data models.srt 26.2 KB
  56. 03 - Crafting detections.mp4 55.4 MB
  57. 03 - Crafting detections.srt 41.8 KB
  58. 01 - What is cyber deception.mp4 28.6 MB
  59. 01 - What is cyber deception.srt 28.0 KB
  60. 02 - Honeypot usage.mp4 47.0 MB
  61. 02 - Honeypot usage.srt 36.1 KB
  62. Bonus Resources.txt 70 bytes

Discussion