Cyber Security Threat Intelligence Research (CTIR)
File List
- 1 - Phases Overview/02 Hunting and Features Extraction.mp4 158.1 MB
- 8 - Attribution/25 Tactics, Techniques & Procedures-Part 01.mp4 153.3 MB
- 8 - Attribution/24 Who Are The Targets and Where Are They Located_.mp4 150.6 MB
- 7 - Taking Down/22 Sinkhole.mp4 126.9 MB
- 4 - Behavior Extraction/17 Process Infector, Keylogger & Passive DNS.mp4 123.8 MB
- 2 - Hunting/07 Lab-VirusTotal Intelligence.mp4 119.5 MB
- 2 - Hunting/08 Hacking Forums.mp4 115.1 MB
- 4 - Behavior Extraction/16 Dynamic Indicators.mp4 97.6 MB
- 3 - Features Extraction/12 Import Table Hash (imphash).mp4 93.7 MB
- 2 - Hunting/09 DeepWeb.mp4 92.3 MB
- 8 - Attribution/26 Tactics, Techniques & Procedures-Part 02.mp4 86.6 MB
- 1 - Phases Overview/03 Behavior Extraction.mp4 77.2 MB
- 3 - Features Extraction/14 Lab 1-Extracting VBA Macros with Didier Stevens Tools.mp4 75.3 MB
- 1 - Phases Overview/01 Phases Overview.mp4 74.7 MB
- 1 - Phases Overview/04 Clustering and Correlation & Threat Actor Attribution.mp4 69.5 MB
- 5 - Clustering and Correlation/18 How Clustering & Correlation Work.mp4 69.5 MB
- 6 - Tracking/21 Lookups, OSINT & Hacking Forums.mp4 64.5 MB
- 2 - Hunting/10 Honeypot and OSINT.mp4 63.7 MB
- 1 - Phases Overview/05 Tracking and Taking Down.mp4 62.9 MB
- 3 - Features Extraction/15 Lab 2-C2 IP Pivoting.mp4 61.1 MB
- 7 - Taking Down/23 Hacking Forums & Victim Notification.mp4 60.8 MB
- 3 - Features Extraction/11 Intro.mp4 55.6 MB
- 2 - Hunting/06 VirusTotal.mp4 53.4 MB
- 3 - Features Extraction/13 Strings.mp4 50.5 MB
- 5 - Clustering and Correlation/19 GraphDB.mp4 45.6 MB
- 8 - Attribution/27 Profiling the Attacker.mp4 33.7 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.