Login: Password:  Do not remember me

Categories




Video TrainingThreat Hunting - Endpoint Hunting



Threat Hunting - Endpoint Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.
Released 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English + vtt | Duration: 1h 21m | Size: 560 MB



      Read more...         

Video TrainingThreat Hunting Essential Training



Threat Hunting Essential Training
Released 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 39m | Size: 121 MB
Just because an organization opts to spend a fortune on cybersecurity doesn't mean that it's immune to an attack. While properly configured technology can stop most of today's cyber-attacks, hackers have become experts at evading detection. In this course, information security expert Michael Wylie gives you an introduction to threat hunting: a core skill for any cybersecurity professional tasked with detecting and isolating the most advanced, hard-to-find security threats.



      Read more...         

Video TrainingUdemy - Checkpoint Threat Prevention



Udemy - Checkpoint Threat Prevention
Published 11/2022
Created by Grezitech Company
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 8 Lectures ( 2h 11m ) | Size: 921 MB



      Read more...         

Video TrainingThreat Hunting Network Hunting 2022



Threat Hunting Network Hunting 2022
Released 04/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + vtt | Duration: 1h 29m | Size: 491.6 MB
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior



      Read more...         

Video TrainingLinkedin Learning - The Cybersecurity Threat Landscape



Linkedin Learning - The Cybersecurity Threat Landscape

Linkedin Learning - The Cybersecurity Threat Landscape-XQZT
English | Tutorial | Size: 217.87 MB

Learn how to protect your organization s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors

      Read more...         

Video TrainingLinkedin - The Cybersecurity Threat Landscape (2022)



Linkedin - The Cybersecurity Threat Landscape (2022)
Released 06/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 59m | Size: 222 MB



      Read more...         

Video TrainingO`Reilly - Hands-on Threat Modeling



O`Reilly - Hands-on Threat Modeling

O`Reilly - Hands-on Threat Modeling-iLLiTERATE
English | Tutorial | Size: 395.96 MB

Threat modeling (also known as architecture risk analysis) is the primary security analysis task performed during the software design stage.

      Read more...         

Video TrainingHands-On Threat Modeling [Video]



Hands-On Threat Modeling [Video]
Instructors: Sebastien Deleersnyder | March 2022 | Duration: 1h 34m
Video: MP4 1920x1080 48 KHz | English | Size: 392 MB
Threat modeling (also known as architecture risk analysis) is the primary security analysis task performed during the software design stage. It is a structured activity for identifying and evaluating application threats and related design flaws. You use the identified flaws to adapt your design, or scope your security testing.



      Read more...         

Video TrainingUdemy - Cybersecurity Threat Hunting Professional





Udemy - Cybersecurity Threat Hunting Professional
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 989 MB | Duration: 1h 27m
Cybersecurity Threat Hunting Professional



      Read more...         

Video TrainingFOR572 Advanced Network Forensics - Threat Hunting, Analysis, and Incident Response





FOR572 Advanced Network Forensics - Threat Hunting, Analysis, and Incident Response
Philip Hagen | Duration: 36h 00m | Video: H264 1280x720 | Audio: AAC 32 kHz mono | 6,60 GB | Language: English
Whether you handle an intrusion incident, data theft case, employee misuse scenario, or are engaged in proactive adversary discovery, the network often provides an unparalleled view of the incident. SANS FOR572 covers the tools, technology, and processes required to integrate network evidence sources into your investigations to provide better findings, and to get the job done faster.
Take your system-based forensic knowledge onto the wire. Incorporate network evidence into your investigations, provide better findings, and get the job done faster.



      Read more...         

Page:

Search



Updates




Friend Sites


» TinyDL
» EbookTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)