Cyber Threat Hunting, Video Edition
- Category Other
- Type Tutorials
- Language English
- Total size 1.3 GB
- Uploaded By freecoursewb
- Downloads 202
- Last checked 6 days ago
- Date uploaded 10 months ago
- Seeders 6
- Leechers 0
Infohash : B7A88FD1A98AC13DB33BFC40D8174FAF2448202C
Cyber Threat Hunting, Video Edition
https://DevCourseWeb.com
January 2025
Duration: 9h 20m | Video: .MP4, 1920x1080 15 fps | Audio: AAC, 44.1 kHz, 2ch | Size: 1.3 GB
Genre: eLearning | Language: English
In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video.
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary.
Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework to see and stop attacks.
Files:
[ DevCourseWeb.com ] Cyber Threat Hunting, Video Edition- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here !
- 001. Part 1. Threat-hunting fundamentals.mp4 (2.7 MB)
- 002. Chapter 1. Introducing threat hunting.mp4 (7.8 MB)
- 003. Chapter 1. Why hunt.mp4 (8.5 MB)
- 004. Chapter 1. Structuring threat hunting.mp4 (18.2 MB)
- 005. Chapter 1. Threat hunting vs. threat detecting.mp4 (10.7 MB)
- 006. Chapter 1. The background of a threat hunter.mp4 (8.3 MB)
- 007. Chapter 1. The threat-hunting process.mp4 (8.2 MB)
- 008. Chapter 1. Overview of technologies and tools.mp4 (6.8 MB)
- 009. Chapter 1. Summary.mp4 (4.3 MB)
- 010. Chapter 2. Building the foundation of a threat-hunting practice.mp4 (16.1 MB)
- 011. Chapter 2. Developing a threat-hunting hypothesis.mp4 (22.8 MB)
- 012. Chapter 2. Cyber threat intelligence.mp4 (7.9 MB)
- 013. Chapter 2. Security situational awareness.mp4 (7.3 MB)
- 014. Chapter 2. Cognitive-bias challenges.mp4 (7.3 MB)
- 015. Chapter 2. MITRE ATT&CK.mp4 (16.3 MB)
- 016. Chapter 2. Frameworks.mp4 (37.1 MB)
- 017. Chapter 2. Building maturity over time.mp4 (9.9 MB)
- 018. Chapter 2. Exercises.mp4 (2.6 MB)
- 019. Chapter 2. Summary.mp4 (2.7 MB)
- 020. Part 2. Threat-hunting expeditions.mp4 (4.4 MB)
- 021. Chapter 3. Your first threat-hunting expedition.mp4 (49.9 MB)
- 022. Chapter 3. The threat-hunting process.mp4 (21.4 MB)
- 023. Chapter 3. Microsoft Windows Sysmon events.mp4 (11.4 MB)
- 024. Chapter 3. Exercises.mp4 (3.0 MB)
- 025. Chapter 3. Answers to exercises.mp4 (4.0 MB)
- 026. Chapter 3. Summary.mp4 (4.1 MB)
- 027. Chapter 4. Threat intelligence for threat hunting.mp4 (32.5 MB)
- 028. Chapter 4. The hunting expedition.mp4 (44.3 MB)
- 029. Chapter 4. The threat-hunting process.mp4 (15.3 MB)
- 030. Chapter 4. Exercises.mp4 (5.7 MB)
- 031. Chapter 4. Answers to exercises.mp4 (4.4 MB)
- 032. Chapter 4. Summary.mp4 (4.2 MB)
- 033. Chapter 5. Hunting in clouds.mp4 (70.2 MB)
- 034. Chapter 5. A short introduction to Kubernetes security.mp4 (12.8 MB)
- 035. Chapter 5. Threat-hunting process.mp4 (12.6 MB)
- 036. Chapter 5. Exercises.mp4 (2.6 MB)
- 037. Chapter 5. Answers to exercises.mp4 (837.2 KB)
- 038. Chapter 5. Summary.mp4 (4.4 MB)
- 039. Part 3. Threat hunting using advanced analytics.mp4 (4.5 MB)
- 040. Chapter 6. Using fundamental statistical constructs.mp4 (97.1 MB)
- 041. Chapter 6. Exercises.mp4 (2.2 MB)
- 042. Chapter 6. Answers to exercises.mp4 (3.4 MB)
- 043. Chapter 6. Summary.mp4 (3.5 MB)
- 044. Chapter 7. Tuning statistical logic.mp4 (96.4 MB)
- 045. Chapter 7. Exercises.mp4 (2.7 MB)
- 046. Chapter 7. Answers to exercises.mp4 (6.9 MB)
- 047. Chapter 7. Summary.mp4 (3.5 MB)
- 048. Chapter 8. Unsupervised machine learning with k-means.mp4 (45.8 MB)
- 049. Chapter 8. K-means clustering.mp4 (23.3 MB)
- 050. Chapter 8. Analyzing clusters of interest.mp4 (17.5 MB)
- 051. Chapter 8. Silhouette analysis as an alternative to the elbow method.mp4 (8.7 MB)
- 052. Chapter 8. K-means with k = 6.mp4 (6.4 MB)
- 053. Chapter 8. Exercises.mp4 (2.9 MB)
- 054. Chapter 8. Answers to exercises.mp4 (5.7 MB)
- 055. Chapter 8. Summary.mp4 (5.3 MB)
- 056. Chapter 9. Supervised machine learning with Random Forest and XGBoost.mp4 (19.0 MB)
- 057. Chapter 9. Supervised machine learning.mp4 (55.3 MB)
- 058. Chapter 9. Random Forest.mp4 (43.4 MB)
- 059. Chapter 9. XGBoost.mp4 (7.7 MB)
- 060. Chapter 9. Exercises.mp4 (1.4 MB)
- 061. Chapter 9. Answers to exercises.mp4 (5.2 MB)
- 062. Chapter 9. Summary.mp4 (3.8 MB)
- 063. Chapter 10. Hunting with deception.mp4 (7.9 MB)
- 064. Chapter 10. Hunting for an adversary on the run.mp4 (58.8 MB)
- 065. Chapter 10. Deception platforms.mp4 (2.5 MB)
- 066. Chapter 10. Exercises.mp4 (2.0 MB)
- 067. Chapter 10. Answers to exercises.mp4 (5.8 MB)
- 068. Chapter 10. Summary.mp4 (1.5 MB)
- 069. Part 4. Operating a threat-hunting practice.mp4 (5.6 MB)
- 070. Chapter 11. Responding to findings.mp4 (74.6 MB)
- 071. Chapter 11. Exercises.mp4 (3.5 MB)
- 072. Chapter 11. Answers to exercises.mp4 (4.4 MB)
- 073. Chapter 11. Summary.mp4 (2.2 MB)
- 074. Chapter 12. Measuring success.mp4 (10.3 MB)
- 075. Chapter 12. The ask.mp4 (2.6 MB)
- 076. Chapter 12. Threat-hunting metrics.mp4 (13.9 MB)
- 077. Chapter 12. Scenario Uncovering a threat before an adversary executes it.mp4 (42.5 MB)
- 078. Chapter 12. Reporting to stakeholders.mp4 (21.7 MB)
- 079. Chapter 12. Summary.mp4 (3.0 MB)
- 080. Chapter 13. Enabling the team.mp4 (29.2 MB)
- 081. Chapter 13. Supporting threat hunters well-being.mp4 (6.5 MB)
- 082. Chapter 13. Becoming a threat hunter.mp4 (19.2 MB)
- 083. Chapter 13. Keeping threat hunters engaged.mp4 (8.1 MB)
- 084. Chapter 13. Continuous learning and development.mp4 (9.4 MB)
- 085. Chapter 13. Threat hunting in the age of artificial intelligence.mp4 (8.6 MB)
- 086. Chapter 13. Summary.mp4 (3.1 MB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce