17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Oreilly - Threat Intelligence And Threat Hunting, 2nd Edition
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Explore key threat intelligence and threat hunting concepts to help you protect your sensitive data.
A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. The Threat Intelligence and Threat Hunting, 2nd Edition video course provides learners with the knowledge and skills to fortify systems, protect sensitive data, and ensure compliance with privacy regulations.
Throughout the course, expert trainer, author, and cybersecurity expert Aamir Lakhani uses hands-on s, in-depth discussions and lightboard explanations to explore how to classify threats, work with the vulnerabilities, and use common assessment methodologies. By the end of this course, you will be able to protect sensitive data and ensure compliance with privacy regulations, secure systems and applications to prevent data exposure and advise your organization on privacy-by-design principles.
If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com
Get More Tutorials and Support Us -->> https://CourseWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Introduction/001. Threat Intelligence and Threat Hunting Introduction.en.srt
1.4 KB
~Get Your Files Here !/Introduction/001. Threat Intelligence and Threat Hunting Introduction.mp4
3.9 MB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/001. Learning objectives.en.srt
964 B
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/001. Learning objectives.mp4
2.9 MB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.en.srt
19.8 KB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4
51.1 MB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/003. 1.2 Threat actors Part 2.en.srt
6.1 KB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/003. 1.2 Threat actors Part 2.mp4
16.8 MB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/004. 1.3 Confidence levels.en.srt
7.3 KB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/004. 1.3 Confidence levels.mp4
18.2 MB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/005. 1.4 Threat hunting.en.srt
7.1 KB
~Get Your Files Here !/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/005. 1.4 Threat hunting.mp4
17.4 MB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/001. Learning objectives.en.srt
2 KB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/001. Learning objectives.mp4
5.6 MB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.en.srt
32.6 KB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4
73.5 MB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/003. 2.2 Host-related.en.srt
18.3 KB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/003. 2.2 Host-related.mp4
39.3 MB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/004. 2.3 Application-related.en.srt
4 KB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/004. 2.3 Application-related.mp4
12.7 MB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/005. 2.4 Malicious Activity Indicators.en.srt
7.5 KB
~Get Your Files Here !/Lesson 2 Analyze Indicators of Potentially Malicious Activity/005. 2.4 Malicious Activity Indicators.mp4
22.5 MB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/001. Learning objectives.en.srt
1.4 KB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/001. Learning objectives.mp4
3.9 MB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/002. 3.1 Tools Part 1.en.srt
13.3 KB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/002. 3.1 Tools Part 1.mp4
39.4 MB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/003. 3.2 Tools Part 2.en.srt
15.8 KB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/003. 3.2 Tools Part 2.mp4
37.1 MB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.en.srt
21.4 KB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4
54.3 MB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.en.srt
18.4 KB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4
48.7 MB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.en.srt
25.4 KB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4
60.7 MB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/007. 3.6 Programming languagesscripting.en.srt
11.3 KB
~Get Your Files Here !/Lesson 3 Tools or Techniques to Determine Malicious Activity/007. 3.6 Programming languagesscripting.mp4
23.9 MB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/001. Learning objectives.en.srt
657 B
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/001. Learning objectives.mp4
2.4 MB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/002. 4.1 Cyber kill chains.en.srt
8.4 KB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/002. 4.1 Cyber kill chains.mp4
21.5 MB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/003. 4.2 Diamond Model of Intrusion Analysis.en.srt
3.9 KB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/003. 4.2 Diamond Model of Intrusion Analysis.mp4
9.6 MB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/004. 4.3 MITRE ATT&CK Part 1.en.srt
12.1 KB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/004. 4.3 MITRE ATT&CK Part 1.mp4
32.7 MB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/005. 4.4 MITRE ATT&CK Part 2.en.srt
14.9 KB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/005. 4.4 MITRE ATT&CK Part 2.mp4
36.4 MB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).en.srt
2.1 KB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).mp4
5.1 MB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/007. 4.6 OWASP Testing Guide.en.srt
6.9 KB
~Get Your Files Here !/Lesson 4 Concepts Related to Attack Methodology Frameworks/007. 4.6 OWASP Testing Guide.mp4
15.4 MB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/001. Learning objectives.en.srt
952 B
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/001. Learning objectives.mp4
3.7 MB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/002. 5.1 Attack Frameworks Part 1.en.srt
23.1 KB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/002. 5.1 Attack Frameworks Part 1.mp4
35.3 MB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/003. 5.2 Attack Frameworks Part 2.en.srt
6.8 KB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/003. 5.2 Attack Frameworks Part 2.mp4
22.1 MB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/004. 5.3 Threat Research.en.srt
6.3 KB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/004. 5.3 Threat Research.mp4
15.2 MB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.mp4
9.3 MB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.srt
5 KB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/006. 5.5 Wireless Analysis Techniques.en.srt
11.6 KB
~Get Your Files Here !/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/006. 5.5 Wireless Analysis Techniques.mp4
18.1 MB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/001. Learning objectives.en.srt
484 B
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/001. Learning objectives.mp4
2.1 MB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/002. 6.1 Understanding Results.en.srt
13.7 KB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/002. 6.1 Understanding Results.mp4
18 MB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/003. 6.2 Web Application Scanners.en.srt
2.7 KB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/003. 6.2 Web Application Scanners.mp4
4.1 MB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/004. 6.3 Infrastructure Vulnerability Scanner.en.srt
7.5 KB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/004. 6.3 Infrastructure Vulnerability Scanner.mp4
8.6 MB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/005. 6.4 Software Assessment Tools and Techniques.en.srt
2.6 KB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/005. 6.4 Software Assessment Tools and Techniques.mp4
2.7 MB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/006. 6.5 Wireless Assessment.en.srt
6.7 KB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/006. 6.5 Wireless Assessment.mp4
8.1 MB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/007. 6.6 Cloud Infrastructure Assessment.en.srt
2.7 KB
~Get Your Files Here !/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/007. 6.6 Cloud Infrastructure Assessment.mp4
3.6 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/001. Learning objectives.en.srt
431 B
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/001. Learning objectives.mp4
2.1 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/002. 7.1 Mobile.en.srt
7.5 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/002. 7.1 Mobile.mp4
10.9 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.en.srt
13.4 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.mp4
18.6 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.en.srt
26 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4
43.2 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/005. 7.4 APTs.en.srt
20.8 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/005. 7.4 APTs.mp4
24.9 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/006. 7.5 Embedded and Real-Time Operating Systems (RTOS).en.srt
10.4 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/006. 7.5 Embedded and Real-Time Operating Systems (RTOS).mp4
16.4 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.en.srt
9.5 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4
48.1 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/008. 7.7 Physical Access Control.en.srt
1.8 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/008. 7.7 Physical Access Control.mp4
3.5 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/009. 7.8 Building Automation Systems, Vehicles, and Drones.en.srt
11.2 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/009. 7.8 Building Automation Systems, Vehicles, and Drones.mp4
22.3 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.en.srt
24.4 KB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4
44.1 MB
~Get Your Files Here !/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/011. 7.10 Defending Critical Infrastructure.en.srt