~Get Your Files Here !*1 - Introduction To SOC5 项
- 1 - Introduction To Security Operation Center.mp414.45 MB
- 2 - SOC Tools You Need to Defend.mp454.71 MB
- 3 - Threats Handled by SOC Analyst.mp451.60 MB
- 4 - Cyber Kill Chain Framework.mp415.89 MB
- 5 - SOC Analyst Roles Duties.mp461.76 MB
~Get Your Files Here !*2 - Phishing Email Fundamentals12 项
- 10 - Phishing Email Analysis Lab2 Part1.mp4116.95 MB
- 11 - Phishing Email Analysis Lab2 Part2.mp476.27 MB
- 12 - Phishing Email Indicator of Compromise IOCs.mp460.07 MB
- 13 - Malicious Email AttachmentsAnalysis.mp4101.10 MB
- 14 - Automated IOC Extraction from Phishing Email Part1.mp466.78 MB
- 15 - Automated IOC Extraction from Phishing Email Part2.mp440.61 MB
- 16 - Automated Malicious Shortcut LNK File Analysis.mp4116.62 MB
- 17 - Manual Malicious Shortcut LNK File Analysis.mp453.90 MB
- 6 - Email Fundamentals.mp414.43 MB
- 7 - Types Of Phishing Attack.mp430.52 MB
- 8 - Phishing Analysis Lab Setup.mp438.56 MB
- 9 - Practical Phishing Email Analysis Lab1.mp4124.93 MB
~Get Your Files Here !*3 - Malicious Traffic Analysis C2 Identification8 项
- 18 - Traffic Analysis Network Devices.mp438.95 MB
- 19 - Malicious Traffic Analysis Tools.mp449.94 MB
- 20 - Wireshark Basics Filtering Methods.mp473.08 MB
- 21 - Agent Tesla Background Infection Chain.mp437.61 MB
- 22 - Agent Tesla Malicious Traffic Analysis Lab 1.mp471.82 MB
- 23 - Agent Tesla Traffic Analysis In Network Minor.mp4102.41 MB
- 24 - GOZI Trojan Malicious Traffic Analysis Lab2 Part 1.mp4106.04 MB
- 25 - GOZI Trojan Malicious Traffic Analysis Lab2 Part 2.mp483.83 MB
~Get Your Files Here !*4 - Intrusion Detection Prevention System IDS2 项
- 26 - Intro to Intrusion Detection Prevention System.mp449.80 MB
- 27 - Snort Network Intrusion Detection Prevention System.mp426.07 MB
~Get Your Files Here !*5 - Endpoint Detection Response EDR13 项
- 28 - Introduction to EDR.mp430.94 MB
- 29 - Endpoint Security Monitoring.mp447.57 MB
- 30 - Important Windows Core Artifacts Part1.mp4136.97 MB
- 31 - Important Windows Core Artifacts Part2.mp454.47 MB
- 32 - Windows Event Logs.mp436.38 MB
- 33 - Windows Scheduled Task.mp450.17 MB
- 34 - Windows Persistence.mp474.53 MB
- 35 - Introduction to Sysmon.mp432.13 MB
- 36 - Sysmon Installation.mp419.26 MB
- 37 - Powershell Activity Sysmon Detetction Lab 1.mp477.87 MB
- 38 - Wazuh For Endpoint Detection Response.mp434.98 MB
- 39 - Wazuh EDR Setup Installation.mp441.29 MB
- 40 - Wazuh EDR Agent Installation on Endpoint.mp425.02 MB
~Get Your Files Here !*6 - Threat Intelligence Hunting10 项
- 41 - Introduction to Threat Intelligence.mp418.36 MB
- 42 - Cyber Threat Intelligence Framework.mp471.23 MB
- 43 - Cyber Threat Intelligence Lifecycle.mp440.67 MB
- 44 - Pyramid of Pain.mp439.76 MB
- 45 - MITRE ATTCK Basic.mp440.72 MB
- 46 - What is MITRE ATTCK Navigator.mp472.61 MB
- 47 - MITRE ATTCK Navigator Lab 1.mp449.53 MB
- 48 - Advanced Persistent Threat APT TTPs.mp4126.22 MB
- 49 - Yara Rules For Malware Detection.mp428.72 MB
- 50 - Writing Yara Rule For WannaCry Ransomware Lab 1.mp469.45 MB
~Get Your Files Here !*7 - Security Information Event Management SIEM6 项
- 51 - Intro to Security Information Event Management SIEM.mp424.76 MB
- 52 - SIEM Capabilities.mp416.04 MB
- 53 - Splunk Dashboard Basics.mp426.98 MB
- 54 - Splunk Search Processing Language.mp440.34 MB
- 55 - Ransomware Attack Investigation via Splunk Lab Part1.mp4114.06 MB
- 56 - Ransomware Attack Investigation via Splunk Lab Part2.mp4111.97 MB
~Get Your Files Here !1 项
- Bonus Resources.txt0.00 MB