Threat Intelligence- Cyber Threats and Kill Chain Methodology - TorrentBank

File Name:Threat Intelligence- Cyber Threats and Kill Chain Methodology

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:274.97 MB

File Count:50

File Hash:f8a8825ecd33247d69b76dbc3b9fb62fe3ed0727

Magnet Link:

Magnet Link:

Torrent File:

04. Advanced Persistent Threats (APTs)/04. Demo- The Mitre Att&ck Framework.mp4 30.71 MB
00. Course Overview/00. Course Overview.srt 2.78 KB
01. Threat Vectors and Threat Actors/00. The Threat Based Approach.mp4 11.75 MB
01. Threat Vectors and Threat Actors/00. The Threat Based Approach.srt 11.83 KB
01. Threat Vectors and Threat Actors/01. Cyber Threats Overview.mp4 5.31 MB
01. Threat Vectors and Threat Actors/01. Cyber Threats Overview.srt 4.43 KB
01. Threat Vectors and Threat Actors/02. Analyzing Main Threat Vectors.mp4 23.69 MB
01. Threat Vectors and Threat Actors/02. Analyzing Main Threat Vectors.srt 18.96 KB
01. Threat Vectors and Threat Actors/03. Analyzing Threat Actors.mp4 13.93 MB
01. Threat Vectors and Threat Actors/03. Analyzing Threat Actors.srt 13.74 KB
01. Threat Vectors and Threat Actors/04. Real-World Analysis- Threat Actors.mp4 6.38 MB
01. Threat Vectors and Threat Actors/04. Real-World Analysis- Threat Actors.srt 7.22 KB
01. Threat Vectors and Threat Actors/05. Understanding Your Enemies.mp4 14.59 MB
01. Threat Vectors and Threat Actors/05. Understanding Your Enemies.srt 13.90 KB
01. Threat Vectors and Threat Actors/Secret/6 Simple Memory Techniques - All hacker use this.html 98 B
01. Threat Vectors and Threat Actors/Secret/You Can Boost Brain Power.html 114 B
02. Indicators of Compromise (IoCs)/00. Threats and IoCs.mp4 14.63 MB
02. Indicators of Compromise (IoCs)/00. Threats and IoCs.srt 13.35 KB
02. Indicators of Compromise (IoCs)/01. Understanding Main Indicators of Compromise.mp4 16.57 MB
02. Indicators of Compromise (IoCs)/01. Understanding Main Indicators of Compromise.srt 16.65 KB
02. Indicators of Compromise (IoCs)/02. Indicators of Compromise in the Real World.mp4 5.71 MB
02. Indicators of Compromise (IoCs)/02. Indicators of Compromise in the Real World.srt 5.95 KB
02. Indicators of Compromise (IoCs)/03. Demo- Investigating IoCs of a Ransomware Attack.mp4 22.99 MB
02. Indicators of Compromise (IoCs)/03. Demo- Investigating IoCs of a Ransomware Attack.srt 11.84 KB
02. Indicators of Compromise (IoCs)/Linux Tails Operating System.html 84 B
03. The Kill Chain Methodology/00. Understanding the Kill Chain Methodology.mp4 4.07 MB
03. The Kill Chain Methodology/00. Understanding the Kill Chain Methodology.srt 5.23 KB
03. The Kill Chain Methodology/01. The Kill Chain Process.mp4 18.31 MB
03. The Kill Chain Methodology/01. The Kill Chain Process.srt 17.33 KB
03. The Kill Chain Methodology/02. Identifying Common Adversary Behavior.mp4 13.32 MB
03. The Kill Chain Methodology/02. Identifying Common Adversary Behavior.srt 12.89 KB
03. The Kill Chain Methodology/03. Fingerprinting an Adversary.mp4 4.62 MB
03. The Kill Chain Methodology/03. Fingerprinting an Adversary.srt 5.70 KB
03. The Kill Chain Methodology/04. Analyzing Real World Cyber Attacks.mp4 17.35 MB
03. The Kill Chain Methodology/04. Analyzing Real World Cyber Attacks.srt 17.00 KB
04. Advanced Persistent Threats (APTs)/00. Understanding Highly Skilled Attackers.mp4 2.70 MB
04. Advanced Persistent Threats (APTs)/00. Understanding Highly Skilled Attackers.srt 3.39 KB
04. Advanced Persistent Threats (APTs)/01. APT Objectives and Characteristics.mp4 12.83 MB
04. Advanced Persistent Threats (APTs)/01. APT Objectives and Characteristics.srt 13.30 KB
04. Advanced Persistent Threats (APTs)/02. The APT Lifecycle.mp4 11.24 MB
04. Advanced Persistent Threats (APTs)/02. The APT Lifecycle.srt 12.66 KB
04. Advanced Persistent Threats (APTs)/03. Detecting and Preventing APTs.mp4 4.22 MB
04. Advanced Persistent Threats (APTs)/03. Detecting and Preventing APTs.srt 4.30 KB
00. Course Overview/00. Course Overview.mp4 3.79 MB
04. Advanced Persistent Threats (APTs)/04. Demo- The Mitre Att&ck Framework.srt 11.99 KB
04. Advanced Persistent Threats (APTs)/05. Analyzing Real World APT Groups.mp4 9.50 MB
04. Advanced Persistent Threats (APTs)/05. Analyzing Real World APT Groups.srt 9.18 KB
04. Advanced Persistent Threats (APTs)/06. Course Closure and C-TIA Certification Tips.mp4 6.52 MB
04. Advanced Persistent Threats (APTs)/06. Course Closure and C-TIA Certification Tips.srt 7.51 KB
04. Advanced Persistent Threats (APTs)/Yubico - YubiKey 5 NFC.html 84 B
No trackers found

TorrentBank
Copyright © 2024