17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Misconfigurations Defense For Red And Blue Teams
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Misconfigurations Defense for Red and Blue Teams as well as GRC Professionals
What you'll learn:
An awareness of the Top common cybersecurity misconfigurations found in large organizations that leads to cyber attacks.
How to establish security baselines in Windows Cloud Environments (Azure) to mitigate misconfigurations leading to cyber attacks.
An in-dept understanding of cyber risks associated with these misconfigurations and how they are exploited by attackers.
Application of AI(ChatGPT, Gimini) to execute various lab activities involving misconfiguration mitigation
Best Practice recommendations for mitigating these cyber risks associated with these misconfigurations
How to use MITRE ATT&CK for Technical Mitigation of attacks as a result of these misconfiguartions
How to secure your cloud (Azure) environment from misconfigurations via Red Team-Azure Penetration Testing
An Introduction to root cause analsysis and its benefits to a cybersecurity mindset
Open-Source Tools for Configurations Management to mitigate cyber attacks
How develop a Root cause analysis for selected security misconfigurations
How to address various scenarios involving the skills of Red or Blue Teamer as it relates to protecting systems from these top 10 misconfiguartions.
A better understanding of cyber risks in order to develop appropriate policies & conduct effective risks assessments policies as a GRC Professional
Requirements:
AnUnderstanding of the fundmentals of networking, information security principles, & the ability to setup up your own cloud or on-premise virtual lab environment.
Having a basic to advanced understanding of Penetration testing steps or phases and tools used at each phase.
A curious mind to research and go beyond the surface.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. SECTION 1/1. Introduction.mp4
58.6 MB
~Get Your Files Here !/1. SECTION 1/10. Misconfiguration #6.mp4
36.1 MB
~Get Your Files Here !/1. SECTION 1/11. Misconfiguration #7.mp4
46.8 MB
~Get Your Files Here !/1. SECTION 1/12. Misconfiguration #8.mp4
67.8 MB
~Get Your Files Here !/1. SECTION 1/13. Misconfiguration #9.mp4
31.7 MB
~Get Your Files Here !/1. SECTION 1/14. Misconfiguration #10.mp4
47.4 MB
~Get Your Files Here !/1. SECTION 1/15. End of Section 1 Quiz.mp4
25 MB
~Get Your Files Here !/1. SECTION 1/2. Course Agenda.mp4.mp4
43.5 MB
~Get Your Files Here !/1. SECTION 1/3. Intro to Systemic weaknesses in relation to cybersecurity misconfigurations.mp4
83 MB
~Get Your Files Here !/1. SECTION 1/4. Intro to the top 10 NSA & CISA Misconfigurations.mp4
21.4 MB
~Get Your Files Here !/1. SECTION 1/5. Misconfiguration #1.mp4
100.3 MB
~Get Your Files Here !/1. SECTION 1/6. Misconfiguration #2.mp4
94.9 MB
~Get Your Files Here !/1. SECTION 1/7. Misconfiguration #3.mp4
78.4 MB
~Get Your Files Here !/1. SECTION 1/8. Misconfiguration #4.mp4
47.6 MB
~Get Your Files Here !/1. SECTION 1/9. Misconfiguration #5.mp4
58.2 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/1. An Intro to MITRE ATT&CK Framework.mp4
36.2 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/10. Mitigate-Poor credential hygiene.mp4
65.6 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/11. Mitigate- Unrestricted code execution.mp4
67.7 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/12. Validating Security Controls.mp4
54.8 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/13. Open-Source Tools for Testing Active Directory Misconfigurations.mp4
65.7 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/14. Intro to Open-Source Tools for addressing the top 10 misconfigurations.mp4
13.7 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/15. Open-Source Tools for Preventing Insufficient Access Control Lists (ACLs) on Net.mp4
63.1 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/16. Open-Source Tools for Preventing Lack of Network Segmentation.mp4
51.4 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/17. Open-Source Tools for Preventing Insufficient Internal Network Monitoring.mp4
51.2 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/18. Establishing security baselines to help with mitigating misconfigurations.mp4
37.4 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/19. Lab#1- Creating Security Baselines In Azure.mp4
56.3 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/2. Mitigate-Default configurations of software and applications.mp4
79.2 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/20. Lab#2- PenTest Azure Deployments Misconfigurations using ChatGPT.mp4
99.8 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/21. Lab#3- PenTest Azure Deployments Misconfigurations using ChatGPT.mp4
59.9 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/22. Lab#4-Misconfigurations Research Defense Challenge.mp4
32.1 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/3. Mitigate-Improper separation of useradministrator privilege.mp4
75.9 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/4. Mitigate-Insufficient internal network monitoring.mp4
79 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/5. Mitigate-Lack of network segmentation.mp4
54.8 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/6. Mitigate-Poor patch management.mp4
33.1 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/7. Mitigate-Bypass of system access controls.mp4
59.2 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/8. Mitigate-Weak or misconfigured multifactor authentication (MFA) methods.mp4
51.8 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/9. Mitigate-Insufficient access control lists (ACLs) on network shares and services.mp4
68 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/1. Introduction to Section 3.mp4
16.9 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/10. Case Scenario- Applying Misconfigurations Checklist to a Data Breach Incident.mp4
115 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/11. Improving Hardening of environment against these misconfigurations.mp4
128.9 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/12. Prevent cloud security misconfigurations via Azure Red Team Pen Testing.mp4
65.5 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/13. End of Course.mp4
13.7 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/2. Intro to Root Cause Analysis (RCA).mp4
23 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/3. Benefits of RCA for both Red and Blue Teamers.mp4
36.7 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/4. Steps for conducting RCA.mp4
78.5 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/5. Quiz#2.mp4
9.6 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/6. Intro to creating misconfigurations mitigation checklists using AI.mp4
16.8 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/7. Creating a misconfiguration prevention checklist.mp4
58.9 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/8. Creating a misconfiguration checklist that prevents bypass of system access cont.mp4
33.7 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/9. Challenge-Create Your own misconfigurations checklist.mp4
8.8 MB
~Get Your Files Here !/4. Course Resources/1. Bonus Lecture.html
2.2 KB
~Get Your Files Here !/4. Course Resources/1.1 Case Scenario-The Breach of Acme Inc.pdf
197.7 KB
~Get Your Files Here !/4. Course Resources/1.2 JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF
1.1 MB
~Get Your Files Here !/4. Course Resources/1.3 Links to websites.txt
959 B
~Get Your Files Here !/4. Course Resources/1.4 Steps Involved in Root Cause Analysis.pdf