CBTnuggets SEC503 NetWork Monitoring and Threat Detection In Depth - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: CBTnuggets SEC503 NetWork Monitoring and Threat Detection In Depth (/Thread-CBTnuggets-SEC503-NetWork-Monitoring-and-Threat-Detection-In-Depth--617775) |
CBTnuggets SEC503 NetWork Monitoring and Threat Detection In Depth - AD-TEAM - 10-18-2024 39.46 GB | 00:18:56 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 Concepts of TCPIP (218.61 MB) 2 Part of the Bigger Picture (251 MB) 3 Different parts of TCPIP (176.82 MB) 4 Were do we Get These Packets From (326.2 MB) 5 Replay the Traffic (110.02 MB) 6 Learning Binary and Hex (136.76 MB) supplemental files (455.56 KB) 1 IPv6 (34.13 MB) 2 Identifying IPv6 (149.85 MB) 3 IPv6 Communication (219.51 MB) 4 IPv6 Addressing (230.58 MB) 5 Where is IPv6 in our Packet (100.36 MB) 6 Packet Examples (459.06 MB) 1 IPv4 (55.22 MB) 2 Identifying IPv4 (132.48 MB) 3 IPv4 Communication (267.53 MB) 4 IPv4 Addressing (323.89 MB) 5 Where is IPv4 in our Packet (410.96 MB) 6 Packet Examples (164.34 MB) 1 Wireshark Display Filters (35.9 MB) 2 To the Boolean-Mobile! (279.41 MB) 3 Knowing the Basic Filters (170.87 MB) 4 Expanding on Basic Filters (293.25 MB) 5 Syntax is Everything (340.95 MB) 6 Apply Filtering to Live Capture (192.03 MB) 1 Layer 4 and Beyond (87.83 MB) 2 Pen to Paper (319.9 MB) 3 DNS (309.01 MB) 4 Microsoft Protocols (268.52 MB) 5 HTTP (316.55 MB) 1 Advanced Wireshark (38.21 MB) 2 Magic Numbers (344.55 MB) 3 Regular Expressions (251.26 MB) 4 BPF Filtering (283.52 MB) 5 Supplemental Material (409.25 MB) 1 Introduction to Suricata (99.66 MB) 2 Installing Suricata (299.44 MB) 3 Continuing our Install (210.59 MB) 4 Setting up Suricata (413.28 MB) 5 Rule Configuration (383.13 MB) 1 DNS (137.18 MB) 2 Identifying DNS (231.61 MB) 3 DNS Communication (261.63 MB) 4 DNS Addressing (193.85 MB) 5 Where is DNS in our packet (320.29 MB) 6 Packet Examples (183.35 MB) 1 Microsoft Protocols (110.35 MB) 2 NETBIOS (382.74 MB) 3 LDAP (203.5 MB) 4 RDP (223.26 MB) 5 Kerberos (268.37 MB) 6 SMB (342.32 MB) 7 RPC (244.24 MB) 1 Modern HTTP (42.18 MB) 2 HTTP Basics (146.62 MB) 3 HTTP Delivery (147.05 MB) 4 Understanding HTTP on the Network (363.84 MB) 5 Files From Within (390.95 MB) 6 Looking for Web Traffic (234.25 MB) 1 Real-world Applications (64.33 MB) 2 Solarwinds (291.01 MB) 3 Starting up our Solarwinds (380.84 MB) 4 Basic Configurations (385.45 MB) 5 Adding a Log Source (347.55 MB) 1 Introduction to Wireshark (30.63 MB) 2 Uses of Wireshark (198.93 MB) 3 Being Promiscuous (318.15 MB) 4 Saving our Work for Later (273.8 MB) 5 Exporting Things From Wireshark (390.9 MB) 6 Filtering Results (266.01 MB) 1 How to Research a Protocol (72.7 MB) 2 There's something strange, and it don't look good. (283.3 MB) 3 Requesting a comment (222.33 MB) 4 Tying in the Results to our Packets (388.75 MB) 5 What is this Protocol Used for (383.79 MB) 6 Other Protocols Moving Forward (100.35 MB) 1 Scapy (55.11 MB) 2 What is Scapy (174.96 MB) 3 Installing Scapy (335.7 MB) 4 Crafting with Scapy (256.89 MB) 5 Making Our Packets Look Legit (267.34 MB) 6 What's the real purpose of Scapy (204.7 MB) 1 Snort (140.76 MB) 2 What is Snort (272.61 MB) 3 Installing Snort (272.36 MB) 4 Setting up Snort (390.34 MB) 5 Configuring Some Rules (200.8 MB) 6 Security Considerations (228.71 MB) 1 Burp Suite (89.06 MB) 2 Getting the Software (261.12 MB) 3 Configuration of Burp Suite (288.52 MB) 4 Crawling Around (389.9 MB) 5 Burp Suite Detection (339.96 MB) 1 Introduction to Network Forensic Analysis (84.81 MB) 2 Who Owns What (313.46 MB) 3 Finding Our Practice (288.29 MB) 4 Starting Our Practice (571.47 MB) 5 Checking Our Results (110.95 MB) 1 Zeek (Bro) (63.01 MB) 2 Zeek Installation (271.86 MB) 3 Some of the Basics (276.91 MB) 4 Running Zeek (277.3 MB) 5 Examining the Results (499.77 MB) 6 Practice at Home (160.46 MB) 1 Network Architecture (84.77 MB) 2 The Internal Network (168.19 MB) 3 The External Network (282.14 MB) 4 Mapping out the Cloud (263.27 MB) 5 Putting Pen to Paper (348.81 MB) 6 Let's Review (205.51 MB) 1 Introduction to Network Monitoring at Scale (131.67 MB) 2 Understanding the Network (224.52 MB) 3 Solarwinds (Again) (424.33 MB) 4 Monitoring with Solarwinds (469.9 MB) 5 Other Network Monitoring Options (414.3 MB) 1 IDS and IPS Evasion Theory (72.26 MB) 2 Understanding What Evasion Actually Is (282.7 MB) 3 Fragmentation (304.76 MB) 4 Spoofing (309.44 MB) 5 Sledding Past the IDSIPS (345.71 MB) 6 Forging a Signature (270.44 MB) 1 Threat Hunting and Visualization (57.62 MB) 2 What is a Netflow (134.55 MB) 3 Examining a Netflow (210.43 MB) 4 Replaying the Traffic (368.48 MB) 5 Is It Something Bad (284.73 MB) 6 Stress Testing Our Packet Captures (210.76 MB) 7 Let's Review (110.62 MB) 1 UNIX Command Line Processing (83.59 MB) 2 Why UNIX (328.74 MB) 3 Network Analysis on POSIX-based Systems (274.93 MB) 4 Burpsuite (315.02 MB) 5 sslstrip (247.61 MB) 6 Back to the Field. Manual (154.84 MB) 1 Network Access Link Layer 2 (37.71 MB) 2 Identifying Layer 2 (207.15 MB) 3 Layer 2 Communication (350.59 MB) 4 Using Layer 2 as a Forwarding Address (326.55 MB) 5 Where is Layer 2 in our Packet (201.96 MB) 6 Packet Examples (189.04 MB) 1 IP Link Layer 3 (37.05 MB) 2 Identifying Layer 3 (223.54 MB) 3 Layer 3 Communication (315.66 MB) 4 Using Layer 3 as a Forwarding Address (278.68 MB) 5 Where is Layer 3 in our Packet (204.78 MB) 6 Packet Examples (283.14 MB) 1 Real-world Application (79.69 MB) 2 Knowing the Packet (330.37 MB) 3 Quirks in IP Addressing (238.85 MB) 4 Layer 3 Protocols (302.54 MB) 5 Encryption Issues (331.49 MB) 6 Capturing Those Packets (218.11 MB) 1 ICMP (53.25 MB) 2 Identifying ICMP (129.13 MB) 3 ICMP Communication (294.1 MB) 4 ICMP Addressing (206.34 MB) 5 Where is ICMP in our Packet (442.9 MB) 6 Packet Examples (318.25 MB) 1 UDP (33.03 MB) 2 Identifying UDP (189.87 MB) 3 UDP Communication (249.79 MB) 4 UDP Addressing (191.08 MB) 5 Where is UDP in our Packet (193.33 MB) 6 Packet Examples (278.59 MB) 1 TCP (30.73 MB) 2 Identifying TCP (222.43 MB) 3 TCP Communication (244.26 MB) 4 TCP Addressing (292.01 MB) 5 Where is TCP in our Packet (213.38 MB) 6 Packet Examples (258.94 MB)
Screenshot
|