FreeCourseWeb com Oreilly Threat Intelligence and Threat Hunting 2nd Edition |
||
Name |
[ FreeCourseWeb.com ] Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition |
DOWNLOAD Copy Link |
Total Size |
1.2 GB |
|
Total Files |
108 |
|
Last Seen |
2024-07-23 00:26 |
|
Hash |
704BF2A0E047C32DCC2F16B5BFC46730BEC30DEF |
/ |
|
|
0.2 KB |
/~Get Your Files Here !/ |
|
|
0.4 KB |
/Introduction/ |
|
001. Threat Intelligence and Threat Hunting Introduction.en.srt |
1.4 KB |
001. Threat Intelligence and Threat Hunting Introduction.mp4 |
4.1 MB |
/.../Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/ |
|
|
1.0 KB |
|
3.0 MB |
|
20.3 KB |
|
53.5 MB |
|
6.2 KB |
|
17.6 MB |
|
7.5 KB |
|
19.1 MB |
|
7.3 KB |
|
18.2 MB |
/.../Lesson 2 Analyze Indicators of Potentially Malicious Activity/ |
|
|
2.1 KB |
|
5.9 MB |
|
33.4 KB |
|
77.1 MB |
|
18.8 KB |
|
41.2 MB |
|
4.1 KB |
|
13.4 MB |
|
7.7 KB |
|
23.6 MB |
/.../Lesson 3 Tools or Techniques to Determine Malicious Activity/ |
|
|
1.4 KB |
|
4.1 MB |
|
13.6 KB |
|
41.3 MB |
|
16.2 KB |
|
38.9 MB |
|
21.9 KB |
|
56.9 MB |
|
18.8 KB |
|
51.1 MB |
|
26.0 KB |
|
63.7 MB |
|
11.6 KB |
|
25.1 MB |
/.../Lesson 4 Concepts Related to Attack Methodology Frameworks/ |
|
|
0.7 KB |
|
2.6 MB |
|
8.6 KB |
|
22.5 MB |
|
4.0 KB |
|
10.1 MB |
|
12.4 KB |
|
34.3 MB |
|
15.3 KB |
|
38.2 MB |
006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).en.srt |
2.1 KB |
006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 |
5.3 MB |
|
7.0 KB |
|
16.2 MB |
/.../Lesson 5 Utilizing Threat Intelligence to Support Organization Security/ |
|
|
1.0 KB |
|
3.9 MB |
|
23.7 KB |
|
37.0 MB |
|
7.0 KB |
|
23.1 MB |
|
6.5 KB |
|
16.0 MB |
005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.mp4 |
9.7 MB |
005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.srt |
5.2 KB |
|
11.9 KB |
|
19.0 MB |
/.../Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/ |
|
|
0.5 KB |
|
2.2 MB |
|
14.0 KB |
|
18.9 MB |
|
2.7 KB |
|
4.3 MB |
|
7.7 KB |
|
9.0 MB |
|
2.6 KB |
|
2.8 MB |
|
6.9 KB |
|
8.5 MB |
|
2.7 KB |
|
3.8 MB |
/.../Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/ |
|
|
0.4 KB |
|
2.2 MB |
|
7.6 KB |
|
11.4 MB |
003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.en.srt |
13.7 KB |
003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 |
19.5 MB |
004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.en.srt |
26.7 KB |
004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 |
45.3 MB |
|
21.3 KB |
|
26.1 MB |
006. 7.5 Embedded and Real-Time Operating Systems (RTOS).en.srt |
10.6 KB |
006. 7.5 Embedded and Real-Time Operating Systems (RTOS).mp4 |
17.2 MB |
|
9.8 KB |
|
50.5 MB |
|
1.9 KB |
|
3.7 MB |
009. 7.8 Building Automation Systems, Vehicles, and Drones.en.srt |
11.4 KB |
009. 7.8 Building Automation Systems, Vehicles, and Drones.mp4 |
23.4 MB |
010. 7.9 Industrial Control Systems (ICS) and Process Automation.en.srt |
25.0 KB |
010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 |
46.2 MB |
|
22.6 KB |
|
39.0 MB |
012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.en.srt |
24.6 KB |
012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 |
39.3 MB |
013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.en.srt |
21.5 KB |
013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 |
41.2 MB |
|
13.4 KB |
|
26.5 MB |
/Summary/ |
|
|
0.3 KB |
|
1.2 MB |
Total files 108 |
Copyright © 2024 FileMood.com