Pluralsight Blue Team Tools 2022 |
||
Name |
DOWNLOAD
Copy Link
Trouble downloading? see How To |
|
Total Size |
1.5 GB |
|
Total Files |
328 |
|
Last Seen |
2025-07-19 00:01 |
|
Hash |
4C304C46C3CD632B53E9B1995D458F74A41B06F7 |
/.../blue-team-tools-defense-adversary-activity-mitre/02/ |
|
blue-team-tools-vital-role-in-enterprise-security-slides.pdf |
2.8 MB |
/.../Module 1 - Course Overview/ |
|
|
3.9 MB |
|
2.5 KB |
/.../Module 2 - Blue Team Tool’s Vital Role in Enterprise Security/ |
|
|
7.7 MB |
|
7.1 KB |
|
13.7 MB |
|
9.6 KB |
|
12.6 MB |
|
8.7 KB |
/.../1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 3 - Resources/ |
|
|
6.1 MB |
|
4.6 KB |
/.../network-analysis-arkime/02/ |
|
identifying-initial-access-command-and-control-and-data-exfiltration-with-moloch-slides.pdf |
966.2 KB |
/.../network-analysis-arkime/03/ |
|
|
51.7 KB |
/.../network-analysis-arkime/course assets/ |
|
|
0.3 KB |
|
7.3 MB |
/.../Module 1 - Course Overview/ |
|
|
2.8 MB |
|
1.8 KB |
/.../Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/ |
|
|
13.8 MB |
|
11.1 KB |
|
33.3 MB |
|
17.5 KB |
|
52.7 MB |
|
17.6 KB |
4. Developing Techniques for Detecting Data Exfiltration.mp4 |
32.6 MB |
4. Developing Techniques for Detecting Data Exfiltration.vtt |
14.7 KB |
|
18.1 MB |
|
8.3 KB |
/.../1. Network Analysis with Arkime/Module 3 - Resources/ |
|
|
3.7 MB |
|
2.7 KB |
/.../network-analysis-pfsense/02/ |
|
using-pfsense-to-block-malicious-network-activity-slides.pdf |
1.3 MB |
/.../Module 1 - Course Overview/ |
|
|
2.7 MB |
|
1.5 KB |
/.../Module 2 - Using pfSense to Block Malicious Network Activity/ |
|
|
13.1 MB |
|
7.2 KB |
|
20.6 MB |
|
10.0 KB |
|
28.5 MB |
|
13.1 KB |
|
22.0 MB |
|
9.8 KB |
|
25.2 MB |
|
8.4 KB |
|
5.8 MB |
|
3.4 KB |
/.../3. Network Analysis with Maltrail/Exercise Files/ |
|
|
711.8 KB |
/.../Module 1 - Course Overview/ |
|
|
2.4 MB |
|
1.4 KB |
/.../Module 2 - Analyzing Network Trail Logs with Maltrail/ |
|
|
5.0 MB |
|
3.6 KB |
|
2.2 MB |
|
1.5 KB |
|
8.6 MB |
|
4.3 KB |
|
17.7 MB |
|
9.2 KB |
|
13.1 MB |
|
5.5 KB |
|
295.1 KB |
|
0.3 KB |
/.../3. Network Analysis with Maltrail/Module 3 - Resources/ |
|
|
2.2 MB |
|
0.9 KB |
/.../os-analysis-helk/02/demos/downloads/ |
|
|
0.6 KB |
|
6.4 MB |
|
69.6 KB |
|
6.4 MB |
|
1.1 MB |
|
69.6 KB |
/.../os-analysis-helk/02/ |
|
using-windows-event-logs-with-helk-to-hunt-for-advanced-adversary-activity-slides.pdf |
1.3 MB |
/.../Module 1 - Course Overview/ |
|
|
3.8 MB |
|
2.7 KB |
/.../Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/ |
|
|
14.0 MB |
|
9.6 KB |
|
8.2 MB |
|
4.8 KB |
|
14.5 MB |
|
5.1 KB |
|
32.8 MB |
|
16.1 KB |
5. Investigating Anomalous Activity and Adversary Techniques.mp4 |
15.0 MB |
5. Investigating Anomalous Activity and Adversary Techniques.vtt |
7.5 KB |
/.../1. OS Analysis with HELK/Module 3 - Resources/ |
|
|
4.2 MB |
|
3.2 KB |
/.../os-analysis-regripper/02/ |
|
|
1.7 MB |
/.../Module 1 - Course Overview (Tool Introduction)/ |
|
|
3.0 MB |
|
1.3 KB |
/.../Module 2 - Analyzing Windows Registry with RegRipper/ |
|
|
13.3 MB |
|
8.5 KB |
|
37.8 MB |
|
11.0 KB |
|
32.3 MB |
|
7.5 KB |
|
16.4 MB |
|
5.5 KB |
|
17.1 MB |
|
6.5 KB |
/.../2. OS Analysis with RegRipper/Module 3 - Resources/ |
|
|
2.0 MB |
|
1.5 KB |
/.../os-analysis-wazuh/02/ |
|
detecting-process-level-and-file-level-attacks-with-wazuh-slides.pdf |
1.5 MB |
/.../os-analysis-wazuh/03/ |
|
|
0.5 KB |
/.../Module 1 - Course Overview/ |
|
|
2.7 MB |
|
1.5 KB |
/.../Module 2 - Detecting Process-level and File-level Attacks with Wazuh/ |
|
|
9.1 MB |
|
7.0 KB |
|
3.3 MB |
|
2.3 KB |
|
8.8 MB |
|
5.1 KB |
|
6.0 MB |
|
3.5 KB |
|
5.0 MB |
|
3.1 KB |
|
4.1 MB |
|
2.5 KB |
|
16.8 MB |
|
5.9 KB |
|
16.0 MB |
|
4.8 KB |
|
3.5 MB |
|
2.4 KB |
|
5.2 MB |
|
2.7 KB |
|
5.3 MB |
|
4.1 KB |
/.../3. OS Analysis with Wazuh/Module 3 - Resources/ |
|
|
5.0 MB |
|
3.4 KB |
/.../os-analysis-volatility/02/ |
|
|
853.4 KB |
/.../os-analysis-volatility/03/ |
|
|
266.0 KB |
/.../Module 1 - Course Overview/ |
|
|
4.2 MB |
|
3.3 KB |
/.../Module 2 - Detect and Respond with Volatility/ |
|
|
13.6 MB |
|
13.0 KB |
|
11.9 MB |
|
13.9 KB |
|
14.8 MB |
|
10.1 KB |
/.../4. OS Analysis with Volatility/Module 3 - Resources/ |
|
|
2.2 MB |
|
1.8 KB |
/.../os-analysis-sleuth-kit-autopsy/02/ |
|
|
549.0 KB |
/.../os-analysis-sleuth-kit-autopsy/03/ |
|
|
320.8 KB |
/.../Module 1 - Course Overview/ |
|
|
2.4 MB |
|
1.7 KB |
/.../Module 2 - OS Analysis with Sleuth Kit and Autopsy/ |
|
|
2.2 MB |
|
2.2 KB |
|
2.1 MB |
|
1.6 KB |
|
4.3 MB |
|
4.3 KB |
|
11.0 MB |
|
6.1 KB |
|
5.8 MB |
|
5.3 KB |
/.../5. OS Analysis with The Sleuth Kit & Autopsy/Module 3 - Resources/ |
|
|
2.7 MB |
|
2.9 KB |
/.../os-analysis-osquery/02/ |
|
|
1.5 MB |
/.../Module 1 - Course Overview/ |
|
|
2.3 MB |
|
1.2 KB |
/.../Module 2 - OS Analysis with osquery/ |
|
|
11.4 MB |
|
7.9 KB |
|
27.3 MB |
|
10.3 KB |
|
18.2 MB |
|
7.0 KB |
|
31.4 MB |
|
10.3 KB |
|
10.8 MB |
|
5.1 KB |
/.../6. OS Analysis with osquery/Module 3 - Resources/ |
|
|
2.1 MB |
|
1.7 KB |
/.../os-analysis-ossec/02/ |
|
|
2.7 MB |
/.../os-analysis-ossec/03/ |
|
|
332.4 KB |
/.../Module 1 - Course Overview/ |
|
|
2.5 MB |
|
1.4 KB |
/.../Module 2 - Monitor OS Activity with OSSEC/ |
|
|
3.8 MB |
|
3.9 KB |
|
10.8 MB |
|
5.6 KB |
|
5.2 MB |
|
4.1 KB |
4. Detect Authentication Bypass Using Accessibility Features.mp4 |
3.6 MB |
4. Detect Authentication Bypass Using Accessibility Features.vtt |
2.5 KB |
5. Demo_ Detect Authentication Bypass Using Accessibility Features.mp4 |
13.3 MB |
5. Demo_ Detect Authentication Bypass Using Accessibility Features.vtt |
8.4 KB |
|
5.1 MB |
|
3.5 KB |
|
5.6 MB |
|
3.8 KB |
/.../7. OS Analysis with OSSEC/Module 3 - Resources/ |
|
|
1.9 MB |
|
1.6 KB |
/.../cloud-infrastructure-analysis-scout-suite/02/demos/M2-files/ |
|
|
0.4 KB |
|
0.9 KB |
/.../cloud-infrastructure-analysis-scout-suite/02/ |
|
discovering-unsafe-cloud-configurations-with-scout-suite-slides.pdf |
2.3 MB |
/.../Module 1 - Course Overview/ |
|
|
2.2 MB |
|
1.2 KB |
/.../Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/ |
|
|
9.7 MB |
|
7.1 KB |
|
15.2 MB |
|
6.9 KB |
|
24.8 MB |
|
7.7 KB |
|
35.2 MB |
|
11.2 KB |
|
9.9 MB |
|
2.1 KB |
|
8.2 MB |
|
2.4 KB |
/.../1. Cloud Infrastructure Analysis with Scout Suite/Module 3 - Resources/ |
|
|
2.2 MB |
|
1.7 KB |
/.../cloud-infrastructure-analysis-prowler/02/ |
|
identify-assess-and-report-cloud-security-threats-with-prowler-slides.pdf |
523.9 KB |
/.../cloud-infrastructure-analysis-prowler/03/ |
|
|
274.1 KB |
/.../cloud-infrastructure-analysis-prowler/ |
|
|
1.2 MB |
|
126.8 KB |
|
204.6 KB |
/.../Module 1 - Course Overview/ |
|
|
3.0 MB |
|
2.1 KB |
/.../Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/ |
|
|
10.5 MB |
|
9.0 KB |
|
18.2 MB |
|
8.8 KB |
|
10.7 MB |
|
10.3 KB |
|
5.1 MB |
|
5.1 KB |
/.../2. Cloud Infrastructure Analysis with Prowler/Module 3 - Resources/ |
|
|
2.9 MB |
|
2.0 KB |
/.../container-infrastructure-analysis-kube-hunter/02/ |
|
detecting-and-preventing-kubernetes-attacks-with-kube-hunter-slides.pdf |
1.1 MB |
/.../container-infrastructure-analysis-kube-hunter/03/ |
|
|
0.1 KB |
|
1.1 MB |
/.../Module 1 - Course Overview/ |
|
|
2.6 MB |
|
1.7 KB |
/.../Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/ |
|
|
10.7 MB |
|
6.4 KB |
|
9.3 MB |
|
5.3 KB |
|
4.7 MB |
|
3.1 KB |
|
6.0 MB |
|
3.1 KB |
|
6.3 MB |
|
4.4 KB |
|
5.7 MB |
|
5.0 KB |
|
5.1 MB |
|
4.1 KB |
|
12.4 MB |
|
8.2 KB |
|
7.7 MB |
|
5.4 KB |
|
3.4 MB |
|
3.2 KB |
|
9.6 MB |
|
7.0 KB |
|
7.2 MB |
|
4.4 KB |
/.../3. Container Infrastructure Analysis with kube-hunter/Module 3 - Resources/ |
|
|
2.9 MB |
|
3.0 KB |
/.../container-infrastructure-analysis-trivy/02/ |
|
|
1.1 MB |
/.../container-infrastructure-analysis-trivy/03/ |
|
|
0.1 KB |
|
496.7 KB |
/.../Module 1 - Course Overview/ |
|
|
2.7 MB |
|
1.7 KB |
/.../Module 2 - Automating Docker Security Scans with Trivy/ |
|
|
12.2 MB |
|
10.9 KB |
|
7.5 MB |
|
4.1 KB |
|
4.7 MB |
|
4.1 KB |
|
9.8 MB |
|
5.7 KB |
|
23.4 MB |
|
11.1 KB |
|
9.2 MB |
|
6.7 KB |
|
10.6 MB |
|
6.5 KB |
|
14.0 MB |
|
7.6 KB |
|
17.0 MB |
|
9.8 KB |
/.../4. Container Infrastructure Analysis with Trivy/Module 3 - Resources/ |
|
|
6.5 MB |
|
4.9 KB |
/.../file-analysis-trufflehog/02/ |
|
identify-assess-and-report-credential-leakage-with-trufflehog-slides.pdf |
1.8 MB |
/.../file-analysis-trufflehog/03/ |
|
|
265.9 KB |
/.../Module 1 - Course Overview/ |
|
|
3.1 MB |
|
2.8 KB |
/.../Module 2 - Identify, Assess, and Report Credential Leakage with TruffleHog/ |
|
|
12.2 MB |
|
11.2 KB |
|
17.9 MB |
|
18.8 KB |
|
6.5 MB |
|
5.6 KB |
/.../1. File Analysis with TruffleHog/Module 3 - Resources/ |
|
|
3.2 MB |
|
2.6 KB |
/.../application-analysis-endlessh/02/ |
|
|
949.7 KB |
/.../application-analysis-endlessh/03/ |
|
|
169.7 KB |
/.../Module 1 - Course Overview/ |
|
|
2.6 MB |
|
1.3 KB |
/.../Module 2 - Application Analysis with Endlessh/ |
|
|
3.2 MB |
|
2.8 KB |
|
2.5 MB |
|
2.1 KB |
|
2.0 MB |
|
2.0 KB |
|
2.3 MB |
|
1.7 KB |
|
6.7 MB |
|
5.6 KB |
|
6.1 MB |
|
5.1 KB |
/.../1. Application Analysis with Endlessh/Module 3 - Resources/ |
|
|
2.6 MB |
|
1.9 KB |
/.../incident-management-thehive/02/ |
|
|
355.4 KB |
/.../incident-management-thehive/03/ |
|
|
23.8 KB |
/.../Module 1 - Course Overview/ |
|
|
3.4 MB |
|
2.7 KB |
/.../Module 2 - Incident Management with TheHive/ |
|
|
14.3 MB |
|
11.0 KB |
2. Tool Administration, Taxonomies, and MITRE ATT&CK Framework.mp4 |
6.8 MB |
2. Tool Administration, Taxonomies, and MITRE ATT&CK Framework.vtt |
3.9 KB |
|
12.9 MB |
|
8.2 KB |
|
4.4 MB |
|
3.0 KB |
|
9.0 MB |
|
5.5 KB |
|
5.7 MB |
|
2.8 KB |
/.../1. Incident Management with TheHive/Module 3 - Resources/ |
|
|
3.0 MB |
|
1.5 KB |
Total files 328 |
Copyright © 2025 FileMood.com