Filename Size ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.mp4 5.5 MB ~Get Your Files Here !/01 - Introduction/01 - Threat hunting in the modern world.srt 1.7 KB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.mp4 16 MB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/01 - Permissions and deflecting cyberattacks.srt 6.5 KB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.mp4 21 MB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/02 - Privileges and deflecting cyberattacks.srt 8.2 KB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.mp4 4.2 MB ~Get Your Files Here !/02 - 1. Permissions and Privileges Impact on Attack Success/03 - Security hygiene checklist Permissions and privileges.srt 2.2 KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.mp4 31.9 MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/01 - Detecting unnecessary services.srt 10.5 KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.mp4 19.2 MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/02 - Reviewing places with persistence.srt 6.5 KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.mp4 67.7 MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/03 - Case Study Misconfigured service account.srt 38.7 KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.mp4 15.1 MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/04 - Steps for static malware analysis.srt 6.1 KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.mp4 12.4 MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/05 - Steps for dynamic malware analysis.srt 4.3 KB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.mp4 15.7 MB ~Get Your Files Here !/03 - 2. Modern Threat Hunting Practices/06 - Uncovering lateral movement.srt 7.3 KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.mp4 4 MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/01 - Network tracing in threat hunting.srt 2.5 KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.mp4 6 MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/02 - Tools for network tracing.srt 3.4 KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.mp4 9.1 MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/03 - Types of vulnerabilities found in network tracing.srt 2.8 KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.mp4 7.7 MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/04 - Proactive security Network tracing and system processes.srt 2.5 KB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.mp4 5 MB ~Get Your Files Here !/04 - 3. Uncovering Network Communication/05 - Security hygiene checklist Network tracing.srt 2.3 KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.mp4 20 MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/01 - Data correlation techniques.srt 6.5 KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.mp4 30.3 MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/02 - Case study Kerberoasting Attack.srt 17.1 KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.mp4 24.3 MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/03 - Extracting traces of attacks from the disk.srt 8.3 KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.mp4 21 MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/04 - Extracting traces of attacks from the memory.srt 7 KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.mp4 17.4 MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/05 - Reviewing logs for useful events.srt 6.6 KB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.mp4 83.5 MB ~Get Your Files Here !/05 - 4. Data, Extracting Traces, and Logs/06 - Case study Practical attack scenario.srt 44.4 KB ~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 7.6 MB ~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt 2.4 KB ~Get Your Files Here !/Bonus Resources.txt 386 B