

Video Training → Threat Hunting - Endpoint Hunting
Published by: voska89 on 26-02-2023, 23:02 |
0

Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.
Released 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English + vtt | Duration: 1h 21m | Size: 560 MB
Video Training → Threat Hunting Essential Training
Published by: voska89 on 3-02-2023, 01:33 |
0

Released 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 39m | Size: 121 MB
Just because an organization opts to spend a fortune on cybersecurity doesn't mean that it's immune to an attack. While properly configured technology can stop most of today's cyber-attacks, hackers have become experts at evading detection. In this course, information security expert Michael Wylie gives you an introduction to threat hunting: a core skill for any cybersecurity professional tasked with detecting and isolating the most advanced, hard-to-find security threats.
Video Training → Udemy - Checkpoint Threat Prevention
Published by: voska89 on 26-11-2022, 08:02 |
0

Published 11/2022
Created by Grezitech Company
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 8 Lectures ( 2h 11m ) | Size: 921 MB
Video Training → Threat Hunting Network Hunting 2022
Published by: voska89 on 20-08-2022, 10:42 |
0

Released 04/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + vtt | Duration: 1h 29m | Size: 491.6 MB
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior
Video Training → Linkedin Learning - The Cybersecurity Threat Landscape
Published by: Minhchick on 19-07-2022, 18:04 |
0

Linkedin Learning - The Cybersecurity Threat Landscape-XQZT
English | Tutorial | Size: 217.87 MB
Learn how to protect your organization s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors
Video Training → Linkedin - The Cybersecurity Threat Landscape (2022)
Published by: voska89 on 2-07-2022, 21:35 |
0

Released 06/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 59m | Size: 222 MB
Video Training → O`Reilly - Hands-on Threat Modeling
Published by: Minhchick on 20-06-2022, 19:03 |
0

O`Reilly - Hands-on Threat Modeling-iLLiTERATE
English | Tutorial | Size: 395.96 MB
Threat modeling (also known as architecture risk analysis) is the primary security analysis task performed during the software design stage.
Video Training → Hands-On Threat Modeling [Video]
Published by: voska89 on 2-06-2022, 12:54 |
0
![Hands-On Threat Modeling [Video] Hands-On Threat Modeling [Video]](https://i120.fastpic.org/big/2022/0602/2b/360fb8a70ea85b51d2cc990b5b1bf22b.jpeg)
Instructors: Sebastien Deleersnyder | March 2022 | Duration: 1h 34m
Video: MP4 1920x1080 48 KHz | English | Size: 392 MB
Threat modeling (also known as architecture risk analysis) is the primary security analysis task performed during the software design stage. It is a structured activity for identifying and evaluating application threats and related design flaws. You use the identified flaws to adapt your design, or scope your security testing.
Video Training → Udemy - Cybersecurity Threat Hunting Professional
Published by: voska89 on 9-03-2022, 12:32 |
0

Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 989 MB | Duration: 1h 27m
Cybersecurity Threat Hunting Professional
Video Training → FOR572 Advanced Network Forensics - Threat Hunting, Analysis, and Incident Response
Published by: voska89 on 5-03-2022, 18:11 |
0

Philip Hagen | Duration: 36h 00m | Video: H264 1280x720 | Audio: AAC 32 kHz mono | 6,60 GB | Language: English
Whether you handle an intrusion incident, data theft case, employee misuse scenario, or are engaged in proactive adversary discovery, the network often provides an unparalleled view of the incident. SANS FOR572 covers the tools, technology, and processes required to integrate network evidence sources into your investigations to provide better findings, and to get the job done faster.
Take your system-based forensic knowledge onto the wire. Incorporate network evidence into your investigations, provide better findings, and get the job done faster.


