Oreilly Threat Intelligence and Threat Hunting 2nd Edition - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Oreilly Threat Intelligence and Threat Hunting 2nd Edition (/Thread-Oreilly-Threat-Intelligence-and-Threat-Hunting-2nd-Edition) |
Oreilly Threat Intelligence and Threat Hunting 2nd Edition - AD-TEAM - 06-16-2024
Download Free Download : Oreilly Threat Intelligence and Threat Hunting 2nd Edition
mp4 | Video: h264,1280X720 | Audio: AAC, 44.1 KHz Genre:eLearning | Language: English | Size:1.15 GB Files Included : 001 Threat Intelligence and Threat Hunting Introduction.mp4 (3.9 MB) MP4 001 Learning objectives.mp4 (2.9 MB) MP4 002 1 1 Threat actors Part 1.mp4 (51.05 MB) MP4 003 1 2 Threat actors Part 2.mp4 (16.8 MB) MP4 004 1 3 Confidence levels.mp4 (18.21 MB) MP4 005 1 4 Threat hunting.mp4 (17.37 MB) MP4 001 Learning objectives.mp4 (5.63 MB) MP4 002 2 1 Network-related.mp4 (73.55 MB) MP4 003 2 2 Host-related.mp4 (39.25 MB) MP4 004 2 3 Application-related.mp4 (12.74 MB) MP4 005 2 4 Malicious Activity Indicators.mp4 (22.47 MB) MP4 001 Learning objectives.mp4 (3.94 MB) MP4 002 3 1 Tools Part 1.mp4 (39.36 MB) MP4 003 3 2 Tools Part 2.mp4 (37.07 MB) MP4 004 3 3 Common techniques Part 1.mp4 (54.29 MB) MP4 005 3 4 Common techniques Part 2.mp4 (48.73 MB) MP4 006 3 5 Common techniques Part 3.mp4 (60.74 MB) MP4 007 3 6 Programming languagesscripting.mp4 (23.92 MB) MP4 001 Learning objectives.mp4 (2.44 MB) MP4 002 4 1 Cyber kill chains.mp4 (21.48 MB) MP4 003 4 2 Diamond Model of Intrusion Analysis.mp4 (9.61 MB) MP4 004 4 3 MITRE ATT&CK Part 1.mp4 (32.7 MB) MP4 005 4 4 MITRE ATT&CK Part 2.mp4 (36.42 MB) MP4 006 4 5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 (5.07 MB) MP4 007 4 6 OWASP Testing Guide.mp4 (15.41 MB) MP4 001 Learning objectives.mp4 (3.7 MB) MP4 002 5 1 Attack Frameworks Part 1.mp4 (35.25 MB) MP4 003 5 2 Attack Frameworks Part 2.mp4 (22.07 MB) MP4 004 5 3 Threat Research.mp4 (15.22 MB) MP4 005 5 4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.mp4 (9.27 MB) MP4 006 5 5 Wireless Analysis Techniques.mp4 (18.11 MB) MP4 001 Learning objectives.mp4 (2.07 MB) MP4 002 6 1 Understanding Results.mp4 (17.99 MB) MP4 003 6 2 Web Application Scanners.mp4 (4.07 MB) MP4 004 6 3 Infrastructure Vulnerability Scanner.mp4 (8.57 MB) MP4 005 6 4 Software Assessment Tools and Techniques.mp4 (2.68 MB) MP4 006 6 5 Wireless Assessment.mp4 (8.08 MB) MP4 007 6 6 Cloud Infrastructure Assessment.mp4 (3.65 MB) MP4 001 Learning objectives.mp4 (2.09 MB) MP4 002 7 1 Mobile.mp4 (10.89 MB) MP4 003 7 2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 (18.63 MB) MP4 004 7 3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 (43.16 MB) MP4 005 7 4 APTs.mp4 (24.93 MB) MP4 006 7 5 Embedded and Real-Time Operating Systems (RTOS).mp4 (16.4 MB) MP4 007 7 6 SOC and FPGA.mp4 (48.13 MB) MP4 008 7 7 Physical Access Control.mp4 (3.52 MB) MP4 009 7 8 Building Automation Systems, Vehicles, and Drones.mp4 (22.3 MB) MP4 010 7 9 Industrial Control Systems (ICS) and Process Automation.mp4 (44.07 MB) MP4 011 7 10 Defending Critical Infrastructure.mp4 (37.2 MB) MP4 012 7 11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 (37.52 MB) MP4 013 7 12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 (39.32 MB) MP4 014 7 13 Verifications and Quality Controls.mp4 (25.27 MB) MP4 001 Threat Intelligence and Threat Hunting Summary.mp4 (1.14 MB) MP4 [To see links please register or login] |