17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks With Wireshark
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
This course will teach you how to quickly spot cyber attacks and indicators of compromise in network traffic with Wireshark.
Description
Cyber attacks are everywhere. Are they lurking in your network? Every IT professional needs to develop the skills with Wireshark to quickly spot them. In this course, Identify Common Cyber Network Attacks with Wireshark, you’ll gain the ability to threat hunt at the packet level. First, you’ll explore how network and OS Fingerprinting scans work and how to identify them. Next, you’ll discover how to spot indicators of compromise in malware infections. Finally, you’ll learn how to isolate botnet and data exfiltration traffic. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting with Wireshark needed to identify common cyber network attacks on your network.
Course Overview
Hi everyone. My name is Chris Greer, and welcome to my course, Identify Common Cyber Network Attacks with Wireshark. I'm a network analyst and a Wireshark instructor at Packet Pioneer, and I'm excited to show you how all IT professionals can use this tool to quickly spot cyberattacks and network traffic. After all, even with our IDS systems in place, cybersecurity attacks have become so common that threat hunting with Wireshark is no longer an optional skill for IT pros. Engineers need to quickly spot enumeration scans, malware behavior, data exfiltration efforts, and other suspect traffic with Wireshark, especially during incident response. But before we can do that, we first need to know how these common attack methods work and how to identify them at the packet level. So join me, and you'll get hands-on experience with pcap examples of common threats and learn how to spot them in Wireshark. In this course, you'll learn how to filter for network scans and OS fingerprinting, how to spot traffic exfiltration in the packets, you'll learn the top 10 attack patterns to search for, and how to identify common indicators of compromise in malware behavior. By the end of this course, you'll have the skills necessary to quickly spot cyber network attacks with Wireshark. Before beginning the course, you should have already viewed the first course in this path, Wireshark Configuration for Cybersecurity Analysis. I hope that you'll join me on this journey to learn how to threat hunt with Wireshark, here at Pluralsight.
Level
• Intermediate
About Author
Chris Greer is a network analyst for Packet Pioneer, delivering training and packet analysis consulting services to customers all over the world. He specializes in using Wireshark to combat network and application performance problems on networks of all sizes. Chris leverages his 20 years of practical experience in network monitoring, analysis, and troubleshooting to heighten the experience of any attendee to his interactive and energetic courses.
SIMILAR
TORRENT
UPLOADEDSIZESEEDS LEECHS
Pluralsight | Cisco Enterprise Networks: Troubleshooting BGP and GRE Tunnels [FCO]by Prom3th3uS
7 months 280.31 MB15 2
Python for Data Analysis, 2nd Edition By Wes McKinney (2017) [AhLaN]by abidmail
1 year 8.98 MB14 2
O’REILLY | Go for Python Developers [FCO]by Prom3th3uS
4 months 392.94 MB17 1
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help our Group!.txt
204 B
01. Course Overview/01. Course Overview.mp4
4.6 MB
02. When to Break Out Wireshark for Threat Hunting/02. Course Introduction.mp4
2.5 MB
02. When to Break Out Wireshark for Threat Hunting/03. When to Break out Wireshark for Threat Hunting.mp4
3.1 MB
02. When to Break Out Wireshark for Threat Hunting/04. Starting with IDS Alerts and Firewall Server Event Logs.mp4
5.1 MB
02. When to Break Out Wireshark for Threat Hunting/05. Packet Analysis and the MITRE ATTCK Framework Cyber Kill Chain.mp4
2.1 MB
02. When to Break Out Wireshark for Threat Hunting/06. Module Review.mp4
709.5 KB
03. Analyzing Port Scans and Enumeration Methods/07. Module Intro.mp4
1.7 MB
03. Analyzing Port Scans and Enumeration Methods/08. Network and Host Discovery Scans.mp4
5.2 MB
03. Analyzing Port Scans and Enumeration Methods/09. Lab 1 - Detecting Network Discovery Scans with Wireshark.mp4
24.5 MB
03. Analyzing Port Scans and Enumeration Methods/10. Lab 2 - Identifying Port Scans with Wireshark.mp4
31.9 MB
03. Analyzing Port Scans and Enumeration Methods/11. Lab 2 - Part 2 - Detecting Port Scans.mp4
20.6 MB
03. Analyzing Port Scans and Enumeration Methods/12. Lab 3 - Analyzing Malware for Network and Port Scans.mp4
40.4 MB
03. Analyzing Port Scans and Enumeration Methods/13. Lab 3 - Part 2 - Analyzing Malware for Network and Port Scans.mp4
16 MB
03. Analyzing Port Scans and Enumeration Methods/14. How OS Fingerprinting Works.mp4
5.5 MB
03. Analyzing Port Scans and Enumeration Methods/15. Lab 4 - Detecting OS Fingerprinting with Wireshark.mp4
36.2 MB
03. Analyzing Port Scans and Enumeration Methods/16. Lab 4 - Part 2 - Detecting OS Fingerprinting.mp4
26.7 MB
03. Analyzing Port Scans and Enumeration Methods/17. How HTTP Path Enumeration Works.mp4
3.1 MB
03. Analyzing Port Scans and Enumeration Methods/18. Lab 5 - Analyzing HTTP Path Enumeration with Wireshark.mp4
40.7 MB
03. Analyzing Port Scans and Enumeration Methods/19. Module Review.mp4
786.1 KB
04. Analyzing Common Attack Signatures of Suspect Traffic/20. Module Intro.mp4
764.8 KB
04. Analyzing Common Attack Signatures of Suspect Traffic/21. How to Find Suspect Traffic Patterns.mp4
3.8 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/22. Spotting Network Attacks - The Top 10 Things to Look For.mp4
4 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/23. Lab 4 - Analyzing TCP SYN Attacks.mp4
20.9 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/24. Identifying Unusual Country Codes with GeoIP.mp4
4 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/25. Lab 7 - Spotting Suspect Country Codes with Wireshark.mp4
27.3 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/26. Lab 8 - Filtering for Unusual Domain Name Lookups.mp4
19.4 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/27. Analyzing HTTP Traffic and File Transfers.mp4
5 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/28. Lab 9 - Analyzing HTTP Traffic and Unencrypted File Transfers.mp4
39.8 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/29. Spotting Data Exfiltration Brute Force Password Behavior and Reverse Shell.mp4
4.4 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/30. Lab 10 - Analysis of a Brute Force Attack.mp4
25.9 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/31. Module Review.mp4
962.8 KB
05. Identifying Common Malware Behavior/32. Module Intro.mp4
819 KB
05. Identifying Common Malware Behavior/33. What Is Malware How Can I Spot It.mp4
4.5 MB
05. Identifying Common Malware Behavior/34. Indicators of Compromise in Malware Analysis.mp4
1.9 MB
05. Identifying Common Malware Behavior/35. Lab 11 - Malware Analysis with Wireshark - Part 1.mp4
43.7 MB
05. Identifying Common Malware Behavior/36. Lab 11 - Malware Analysis with Wireshark - Part 2.mp4
15.1 MB
05. Identifying Common Malware Behavior/37. Module Review.mp4