17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Gain expertise in analyzing your network while tracking various security threats
Video Details
ISBN 9781838557812
Course Length 3 hours 7 minutes
Table of Contents
• THREAT HUNTING INTRODUCTION
• THREAT HUNTING METHODOLOGY
• NETWORK HUNTING
• SUSPICIOUS NETWORK TRAFFIC HUNTING
• HUNTING WEB SHELLS
• ENDPOINT HUNTING
• HUNTING MALWARE
Video Description
Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them.
In this course, you will get to know about the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to minimize incidents. You'll perform incident response and hunt across hundreds of unique systems using PowerShell and identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connection residues.
You will determine how the breach occurred by identifying the beachhead and spear phishing attack mechanisms. You will be able to use memory analysis, incident response, and threat hunting tools to detect malware, attacker command lines, network connections, and more.
Style and Approach
With extensive theoretical exploration on the subject in the initial half of the course, the concepts are demonstrated effectively with the help of detailed practical sessions in the second half of the course.
What You Will Learn
• Be vigilant and keep your systems secure before they’re infested
• Proactively hunt for threats in your organization’s network
• Use threat intelligence to hunt for known threats
• Analyze network traffic and identify malicious traffic with ease
• Perform memory analysis using Redline and Volatility to identify malware attacks
Authors
Sunil Gupta
A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of, many key organizations.
Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. His primary passion is cyber security, but he understands that, to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber-security expert, and always exceeds his clients' expectations.
Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/