FileMood

Download [ DevCourseWeb.com ] Cyber Threat Hunting, Video Edition

DevCourseWeb com Cyber Threat Hunting Video Edition

Name

[ DevCourseWeb.com ] Cyber Threat Hunting, Video Edition

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.4 GB

Total Files

88

Last Seen

2025-07-19 00:06

Hash

B7A88FD1A98AC13DB33BFC40D8174FAF2448202C

/

Get Bonus Downloads Here.url

0.2 KB

/~Get Your Files Here !/

001. Part 1. Threat-hunting fundamentals.mp4

2.9 MB

002. Chapter 1. Introducing threat hunting.mp4

8.2 MB

003. Chapter 1. Why hunt.mp4

8.9 MB

004. Chapter 1. Structuring threat hunting.mp4

19.1 MB

005. Chapter 1. Threat hunting vs. threat detecting.mp4

11.3 MB

006. Chapter 1. The background of a threat hunter.mp4

8.7 MB

007. Chapter 1. The threat-hunting process.mp4

8.6 MB

008. Chapter 1. Overview of technologies and tools.mp4

7.2 MB

009. Chapter 1. Summary.mp4

4.5 MB

010. Chapter 2. Building the foundation of a threat-hunting practice.mp4

16.9 MB

011. Chapter 2. Developing a threat-hunting hypothesis.mp4

23.9 MB

012. Chapter 2. Cyber threat intelligence.mp4

8.3 MB

013. Chapter 2. Security situational awareness.mp4

7.7 MB

014. Chapter 2. Cognitive-bias challenges.mp4

7.7 MB

015. Chapter 2. MITRE ATT&CK.mp4

17.1 MB

016. Chapter 2. Frameworks.mp4

38.9 MB

017. Chapter 2. Building maturity over time.mp4

10.3 MB

018. Chapter 2. Exercises.mp4

2.8 MB

019. Chapter 2. Summary.mp4

2.8 MB

020. Part 2. Threat-hunting expeditions.mp4

4.6 MB

021. Chapter 3. Your first threat-hunting expedition.mp4

52.3 MB

022. Chapter 3. The threat-hunting process.mp4

22.5 MB

023. Chapter 3. Microsoft Windows Sysmon events.mp4

11.9 MB

024. Chapter 3. Exercises.mp4

3.1 MB

025. Chapter 3. Answers to exercises.mp4

4.2 MB

026. Chapter 3. Summary.mp4

4.3 MB

027. Chapter 4. Threat intelligence for threat hunting.mp4

34.1 MB

028. Chapter 4. The hunting expedition.mp4

46.5 MB

029. Chapter 4. The threat-hunting process.mp4

16.0 MB

030. Chapter 4. Exercises.mp4

6.0 MB

031. Chapter 4. Answers to exercises.mp4

4.6 MB

032. Chapter 4. Summary.mp4

4.4 MB

033. Chapter 5. Hunting in clouds.mp4

73.6 MB

034. Chapter 5. A short introduction to Kubernetes security.mp4

13.4 MB

035. Chapter 5. Threat-hunting process.mp4

13.3 MB

036. Chapter 5. Exercises.mp4

2.7 MB

037. Chapter 5. Answers to exercises.mp4

857.3 KB

038. Chapter 5. Summary.mp4

4.7 MB

039. Part 3. Threat hunting using advanced analytics.mp4

4.7 MB

040. Chapter 6. Using fundamental statistical constructs.mp4

101.8 MB

041. Chapter 6. Exercises.mp4

2.3 MB

042. Chapter 6. Answers to exercises.mp4

3.6 MB

043. Chapter 6. Summary.mp4

3.7 MB

044. Chapter 7. Tuning statistical logic.mp4

101.1 MB

045. Chapter 7. Exercises.mp4

2.8 MB

046. Chapter 7. Answers to exercises.mp4

7.2 MB

047. Chapter 7. Summary.mp4

3.7 MB

048. Chapter 8. Unsupervised machine learning with k-means.mp4

48.1 MB

049. Chapter 8. K-means clustering.mp4

24.4 MB

050. Chapter 8. Analyzing clusters of interest.mp4

18.3 MB

051. Chapter 8. Silhouette analysis as an alternative to the elbow method.mp4

9.2 MB

052. Chapter 8. K-means with k = 6.mp4

6.8 MB

053. Chapter 8. Exercises.mp4

3.1 MB

054. Chapter 8. Answers to exercises.mp4

6.0 MB

055. Chapter 8. Summary.mp4

5.6 MB

056. Chapter 9. Supervised machine learning with Random Forest and XGBoost.mp4

20.0 MB

057. Chapter 9. Supervised machine learning.mp4

57.9 MB

058. Chapter 9. Random Forest.mp4

45.5 MB

059. Chapter 9. XGBoost.mp4

8.1 MB

060. Chapter 9. Exercises.mp4

1.5 MB

061. Chapter 9. Answers to exercises.mp4

5.5 MB

062. Chapter 9. Summary.mp4

4.0 MB

063. Chapter 10. Hunting with deception.mp4

8.3 MB

064. Chapter 10. Hunting for an adversary on the run.mp4

61.7 MB

065. Chapter 10. Deception platforms.mp4

2.6 MB

066. Chapter 10. Exercises.mp4

2.1 MB

067. Chapter 10. Answers to exercises.mp4

6.1 MB

068. Chapter 10. Summary.mp4

1.6 MB

069. Part 4. Operating a threat-hunting practice.mp4

5.9 MB

070. Chapter 11. Responding to findings.mp4

78.2 MB

071. Chapter 11. Exercises.mp4

3.6 MB

072. Chapter 11. Answers to exercises.mp4

4.6 MB

073. Chapter 11. Summary.mp4

2.3 MB

074. Chapter 12. Measuring success.mp4

10.8 MB

075. Chapter 12. The ask.mp4

2.7 MB

076. Chapter 12. Threat-hunting metrics.mp4

14.6 MB

077. Chapter 12. Scenario Uncovering a threat before an adversary executes it.mp4

44.6 MB

078. Chapter 12. Reporting to stakeholders.mp4

22.8 MB

079. Chapter 12. Summary.mp4

3.1 MB

080. Chapter 13. Enabling the team.mp4

30.6 MB

081. Chapter 13. Supporting threat hunters well-being.mp4

6.8 MB

082. Chapter 13. Becoming a threat hunter.mp4

20.2 MB

083. Chapter 13. Keeping threat hunters engaged.mp4

8.5 MB

084. Chapter 13. Continuous learning and development.mp4

9.9 MB

085. Chapter 13. Threat hunting in the age of artificial intelligence.mp4

9.0 MB

086. Chapter 13. Summary.mp4

3.2 MB

Bonus Resources.txt

0.1 KB

 

Total files 88


Copyright © 2025 FileMood.com