[ WebToolTip.com ] Udemy - Soc Analyst Course - Detect, Analyze, Respond
    
    File List
    
        
            
                
                    - ~Get Your Files Here !/5 - Endpoint Detection Response EDR/30 - Important Windows Core Artifacts Part1.mp4  137.0 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/48 - Advanced Persistent Threat APT TTPs.mp4  126.2 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/9 - Practical Phishing Email Analysis Lab1.mp4  124.9 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/10 - Phishing Email Analysis Lab2 Part1.mp4  116.9 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/16 - Automated Malicious Shortcut LNK File Analysis.mp4  116.6 MB
- ~Get Your Files Here !/7 - Security Information Event Management SIEM/55 - Ransomware Attack Investigation via Splunk Lab Part1.mp4  114.1 MB
- ~Get Your Files Here !/7 - Security Information Event Management SIEM/56 - Ransomware Attack Investigation via Splunk Lab Part2.mp4  112.0 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/24 - GOZI Trojan Malicious Traffic Analysis Lab2 Part 1.mp4  106.0 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/23 - Agent Tesla Traffic Analysis In Network Minor.mp4  102.4 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/13 - Malicious Email AttachmentsAnalysis.mp4  101.1 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/25 - GOZI Trojan Malicious Traffic Analysis Lab2 Part 2.mp4  83.8 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/37 - Powershell Activity Sysmon Detetction Lab 1.mp4  77.9 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/11 - Phishing Email Analysis Lab2 Part2.mp4  76.3 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/34 - Windows Persistence.mp4  74.5 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/20 - Wireshark Basics Filtering Methods.mp4  73.1 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/46 - What is MITRE ATTCK Navigator.mp4  72.6 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/22 - Agent Tesla Malicious Traffic Analysis Lab 1.mp4  71.8 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/42 - Cyber Threat Intelligence Framework.mp4  71.2 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/50 - Writing Yara Rule For WannaCry Ransomware Lab 1.mp4  69.5 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/14 - Automated IOC Extraction from Phishing Email Part1.mp4  66.8 MB
- ~Get Your Files Here !/1 - Introduction To SOC/5 - SOC Analyst Roles Duties.mp4  61.8 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/12 - Phishing Email Indicator of Compromise IOCs.mp4  60.1 MB
- ~Get Your Files Here !/1 - Introduction To SOC/2 - SOC Tools You Need to Defend.mp4  54.7 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/31 - Important Windows Core Artifacts Part2.mp4  54.5 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/17 - Manual Malicious Shortcut LNK File Analysis.mp4  53.9 MB
- ~Get Your Files Here !/1 - Introduction To SOC/3 - Threats Handled by SOC Analyst.mp4  51.6 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/33 - Windows Scheduled Task.mp4  50.2 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/19 - Malicious Traffic Analysis Tools.mp4  49.9 MB
- ~Get Your Files Here !/4 - Intrusion Detection Prevention System IDS/26 - Intro to Intrusion Detection Prevention System.mp4  49.8 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/47 - MITRE ATTCK Navigator Lab 1.mp4  49.5 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/29 - Endpoint Security Monitoring.mp4  47.6 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/39 - Wazuh EDR Setup Installation.mp4  41.3 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/45 - MITRE ATTCK Basic.mp4  40.7 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/43 - Cyber Threat Intelligence Lifecycle.mp4  40.7 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/15 - Automated IOC Extraction from Phishing Email Part2.mp4  40.6 MB
- ~Get Your Files Here !/7 - Security Information Event Management SIEM/54 - Splunk Search Processing Language.mp4  40.3 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/44 - Pyramid of Pain.mp4  39.8 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/18 - Traffic Analysis Network Devices.mp4  39.0 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/8 - Phishing Analysis Lab Setup.mp4  38.6 MB
- ~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/21 - Agent Tesla Background Infection Chain.mp4  37.6 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/32 - Windows Event Logs.mp4  36.4 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/38 - Wazuh For Endpoint Detection Response.mp4  35.0 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/35 - Introduction to Sysmon.mp4  32.1 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/28 - Introduction to EDR.mp4  30.9 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/7 - Types Of Phishing Attack.mp4  30.5 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/49 - Yara Rules For Malware Detection.mp4  28.7 MB
- ~Get Your Files Here !/7 - Security Information Event Management SIEM/53 - Splunk Dashboard Basics.mp4  27.0 MB
- ~Get Your Files Here !/4 - Intrusion Detection Prevention System IDS/27 - Snort Network Intrusion Detection Prevention System.mp4  26.1 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/40 - Wazuh EDR Agent Installation on Endpoint.mp4  25.0 MB
- ~Get Your Files Here !/7 - Security Information Event Management SIEM/51 - Intro to Security Information Event Management SIEM.mp4  24.8 MB
- ~Get Your Files Here !/5 - Endpoint Detection Response EDR/36 - Sysmon Installation.mp4  19.3 MB
- ~Get Your Files Here !/6 - Threat Intelligence Hunting/41 - Introduction to Threat Intelligence.mp4  18.4 MB
- ~Get Your Files Here !/7 - Security Information Event Management SIEM/52 - SIEM Capabilities.mp4  16.0 MB
- ~Get Your Files Here !/1 - Introduction To SOC/4 - Cyber Kill Chain Framework.mp4  15.9 MB
- ~Get Your Files Here !/1 - Introduction To SOC/1 - Introduction To Security Operation Center.mp4  14.5 MB
- ~Get Your Files Here !/2 - Phishing Email Fundamentals/6 - Email Fundamentals.mp4  14.4 MB
- Get Bonus Downloads Here.url  180 bytes
- ~Get Your Files Here !/Bonus Resources.txt  70 bytes
 
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.