Cyber Threat Hunting, Video Edition

seeders: 1
leechers: 14
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 24
  • Language: English

Files

[ DevCourseWeb.com ] Cyber Threat Hunting, Video Edition
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here !
    • 001. Part 1. Threat-hunting fundamentals.mp4 (2.7 MB)
    • 002. Chapter 1. Introducing threat hunting.mp4 (7.8 MB)
    • 003. Chapter 1. Why hunt.mp4 (8.5 MB)
    • 004. Chapter 1. Structuring threat hunting.mp4 (18.2 MB)
    • 005. Chapter 1. Threat hunting vs. threat detecting.mp4 (10.7 MB)
    • 006. Chapter 1. The background of a threat hunter.mp4 (8.3 MB)
    • 007. Chapter 1. The threat-hunting process.mp4 (8.2 MB)
    • 008. Chapter 1. Overview of technologies and tools.mp4 (6.8 MB)
    • 009. Chapter 1. Summary.mp4 (4.3 MB)
    • 010. Chapter 2. Building the foundation of a threat-hunting practice.mp4 (16.1 MB)
    • 011. Chapter 2. Developing a threat-hunting hypothesis.mp4 (22.8 MB)
    • 012. Chapter 2. Cyber threat intelligence.mp4 (7.9 MB)
    • 013. Chapter 2. Security situational awareness.mp4 (7.3 MB)
    • 014. Chapter 2. Cognitive-bias challenges.mp4 (7.3 MB)
    • 015. Chapter 2. MITRE ATT&CK.mp4 (16.3 MB)
    • 016. Chapter 2. Frameworks.mp4 (37.1 MB)
    • 017. Chapter 2. Building maturity over time.mp4 (9.9 MB)
    • 018. Chapter 2. Exercises.mp4 (2.6 MB)
    • 019. Chapter 2. Summary.mp4 (2.7 MB)
    • 020. Part 2. Threat-hunting expeditions.mp4 (4.4 MB)
    • 021. Chapter 3. Your first threat-hunting expedition.mp4 (49.9 MB)
    • 022. Chapter 3. The threat-hunting process.mp4 (21.4 MB)
    • 023. Chapter 3. Microsoft Windows Sysmon events.mp4 (11.4 MB)
    • 024. Chapter 3. Exercises.mp4 (3.0 MB)
    • 025. Chapter 3. Answers to exercises.mp4 (4.0 MB)
    • 026. Chapter 3. Summary.mp4 (4.1 MB)
    • 027. Chapter 4. Threat intelligence for threat hunting.mp4 (32.5 MB)
    • 028. Chapter 4. The hunting expedition.mp4 (44.3 MB)
    • 029. Chapter 4. The threat-hunting process.mp4 (15.3 MB)
    • 030. Chapter 4. Exercises.mp4 (5.7 MB)
    • 031. Chapter 4. Answers to exercises.mp4 (4.4 MB)
    • 032. Chapter 4. Summary.mp4 (4.2 MB)
    • 033. Chapter 5. Hunting in clouds.mp4 (70.2 MB)
    • 034. Chapter 5. A short introduction to Kubernetes security.mp4 (12.8 MB)
    • 035. Chapter 5. Threat-hunting process.mp4 (12.6 MB)
    • 036. Chapter 5. Exercises.mp4 (2.6 MB)
    • 037. Chapter 5. Answers to exercises.mp4 (837.2 KB)
    • 038. Chapter 5. Summary.mp4 (4.4 MB)
    • 039. Part 3. Threat hunting using advanced analytics.mp4 (4.5 MB)
    • 040. Chapter 6. Using fundamental statistical constructs.mp4 (97.1 MB)
    • 041. Chapter 6. Exercises.mp4 (2.2 MB)
    • 042. Chapter 6. Answers to exercises.mp4 (3.4 MB)
    • 043. Chapter 6. Summary.mp4 (3.5 MB)
    • 044. Chapter 7. Tuning statistical logic.mp4 (96.4 MB)
    • 045. Chapter 7. Exercises.mp4 (2.7 MB)
    • 046. Chapter 7. Answers to exercises.mp4 (6.9 MB)
    • 047. Chapter 7. Summary.mp4 (3.5 MB)
    • 048. Chapter 8. Unsupervised machine learning with k-means.mp4 (45.8 MB)
    • 049. Chapter 8. K-means clustering.mp4 (23.3 MB)
    • 050. Chapter 8. Analyzing clusters of interest.mp4 (17.5 MB)
    • 051. Chapter 8. Silhouette analysis as an alternative to the elbow method.mp4 (8.7 MB)
    • 052. Chapter 8. K-means with k = 6.mp4 (6.4 MB)
    • 053. Chapter 8. Exercises.mp4 (2.9 MB)
    • 054. Chapter 8. Answers to exercises.mp4 (5.7 MB)
    • 055. Chapter 8. Summary.mp4 (5.3 MB)
    • 056. Chapter 9. Supervised machine learning with Random Forest and XGBoost.mp4 (19.0 MB)
    • 057. Chapter 9. Supervised machine learning.mp4 (55.3 MB)
    • 058. Chapter 9. Random Forest.mp4 (43.4 MB)
    • 059. Chapter 9. XGBoost.mp4 (7.7 MB)
    • 060. Chapter 9. Exercises.mp4 (1.4 MB)
    • 061. Chapter 9. Answers to exercises.mp4 (5.2 MB)
    • 062. Chapter 9. Summary.mp4 (3.8 MB)
    • 063. Chapter 10. Hunting with deception.mp4 (7.9 MB)
    • 064. Chapter 10. Hunting for an adversary on the run.mp4 (58.8 MB)
    • 065. Chapter 10. Deception platforms.mp4 (2.5 MB)
    • 066. Chapter 10. Exercises.mp4 (2.0 MB)
    • 067. Chapter 10. Answers to exercises.mp4 (5.8 MB)
    • 068. Chapter 10. Summary.mp4 (1.5 MB)
    • 069. Part 4. Operating a threat-hunting practice.mp4 (5.6 MB)
    • 070. Chapter 11. Responding to findings.mp4 (74.6 MB)
    • 071. Chapter 11. Exercises.mp4 (3.5 MB)
    • 072. Chapter 11. Answers to exercises.mp4 (4.4 MB)
    • 073. Chapter 11. Summary.mp4 (2.2 MB)
    • 074. Chapter 12. Measuring success.mp4 (10.3 MB)
    • 075. Chapter 12. The ask.mp4 (2.6 MB)
    • 076. Chapter 12. Threat-hunting metrics.mp4 (13.9 MB)
    • 077. Chapter 12. Scenario Uncovering a threat before an adversary executes it.mp4 (42.5 MB)
    • 078. Chapter 12. Reporting to stakeholders.mp4 (21.7 MB)
    • 079. Chapter 12. Summary.mp4 (3.0 MB)
    • 080. Chapter 13. Enabling the team.mp4 (29.2 MB)
    • 081. Chapter 13. Supporting threat hunters well-being.mp4 (6.5 MB)
    • 082. Chapter 13. Becoming a threat hunter.mp4 (19.2 MB)
    • 083. Chapter 13. Keeping threat hunters engaged.mp4 (8.1 MB)
    • 084. Chapter 13. Continuous learning and development.mp4 (9.4 MB)
    • 085. Chapter 13. Threat hunting in the age of artificial intelligence.mp4 (8.6 MB)
    • 086. Chapter 13. Summary.mp4 (3.1 MB)
    • Bonus Resources.txt (0.1 KB)

Description

Cyber Threat Hunting, Video Edition

https://DevCourseWeb.com

January 2025
Duration: 9h 20m | Video: .MP4, 1920x1080 15 fps | Audio: AAC, 44.1 kHz, 2ch | Size: 1.3 GB
Genre: eLearning | Language: English

In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video.

Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary.

Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework to see and stop attacks.



Download torrent
1.3 GB
seeders:1
leechers:14
Cyber Threat Hunting, Video Edition


Loading...