Foro Wanako1
¿Quieres reaccionar a este mensaje? Regístrate en el foro con unos pocos clics o inicia sesión para continuar.

Foro Wanako1

Programas Gratuitos, Desatendidos y Mucho más!!!
 
PortalPortal  ÍndiceÍndice  BuscarBuscar  Últimas imágenesÚltimas imágenes  ConectarseConectarse  RegistrarseRegistrarse  
Buscar
 
 

Resultados por:
 
Rechercher Búsqueda avanzada
Los posteadores más activos del mes
missyou123
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
tano1221
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
ПΣӨƧӨFƬ
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
大†Shinegumi†大
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
ℛeℙ@¢ᴋ€r
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
ronaldinho424
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
Engh3
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
geodasoft
Practical Cyber Threat  Hunting Vote_lcapPractical Cyber Threat  Hunting Voting_barPractical Cyber Threat  Hunting Vote_rcap 
Noviembre 2024
LunMarMiérJueVieSábDom
    123
45678910
11121314151617
18192021222324
252627282930 
CalendarioCalendario
Últimos temas
» Mastering Interpersonal Communication And Social Dynamics
Practical Cyber Threat  Hunting EmptyHoy a las 9:56 pm por missyou123

» Mastering Epigenetics How To Hack Your Genes
Practical Cyber Threat  Hunting EmptyHoy a las 8:21 pm por missyou123

» Master Accounting A-Z Crash Course for Success
Practical Cyber Threat  Hunting EmptyHoy a las 8:19 pm por missyou123

» Lose Weight, Tone Up And Balance Your Hormones
Practical Cyber Threat  Hunting EmptyHoy a las 8:17 pm por missyou123

» Linux Incident Response Basics
Practical Cyber Threat  Hunting EmptyHoy a las 8:15 pm por missyou123

» Linkedin Mastery For Solopreneurs & Small Businesses 2024
Practical Cyber Threat  Hunting EmptyHoy a las 8:13 pm por missyou123

» Linkedin - Introduction to Artificial Intelligence (2024)
Practical Cyber Threat  Hunting EmptyHoy a las 8:10 pm por missyou123

» Learn Python from scratch. by Faryal Imran
Practical Cyber Threat  Hunting EmptyHoy a las 7:44 pm por missyou123

» Learning Notebook LM: Your AI-Powered Research Assistant
Practical Cyber Threat  Hunting EmptyHoy a las 7:42 pm por missyou123

Sondeo
Visita de Paises
free counters
Free counters

Comparte | 
 

 Practical Cyber Threat Hunting

Ver el tema anterior Ver el tema siguiente Ir abajo 
AutorMensaje
Invitado
Invitado



Practical Cyber Threat  Hunting Empty
MensajeTema: Practical Cyber Threat Hunting   Practical Cyber Threat  Hunting EmptyJue Mayo 21, 2020 2:23 pm

Practical Cyber Threat  Hunting 9efc38b53369cf7de291f3f7f3201c1a

Practical Cyber Threat Hunting
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz
Language: English | Size: 4.64 GB | Duration: 7.5 hours

What you'll learn
Students will gain abilities like Network forensic skills, Memory Forensic skills threat hunting over ELK incident response skills for APT analysis and more. In this course students will learn counducting threat hunting and compromise assessment. In the first module I created a real life attack scenerio as an adversary simulation in a demo lab. I lecture to my students about cyber threat intelligence sources and types, basic definition and terms like IOC, TTP, Cyber Kill Chain Model, Incident Response Steps. I critisize security devices capabilities for explaining why we need monitoring and SIEM infrastructure. In the second module I give you therotical knowledge about real attack techniques like SQL Injection, Buffer OverFlow Exploit Codes, SSH tunneling methods and more... I teach to my students how to collect full pcap traffic and which tools should be used for analysing. In module two I analysis tunnels, pivot points, web attacks, Remote Code Execution Exploits, Web Shells and Web attacks traffic from pcap files and I share my real world analysis experince with my students. In third module, First I present the fundamental windows processes and process injections, hollowing techniques and tools, pe injection and thread injection techniques and tools as theoritically. Then I teach you dumping memory samples for memory forensic and I analyze Stuxnet attack's memory image, Cridex, Zeus, Darkcomet Rat's Memory images and DLL injection event's memory image. In fourth module I perform therat hunting over ELK. First I explain the event id numbers which are used common for hunting and I analyze a real life scenerio. I detected malicious word documents, hta files, unsigned exe files, vbs files and more. I teach you how to detect and investigate tunneling methods, persistency methods like registeries, services, schedule tasks. Some techniques are used like lolbas in attack lab and we investigate and map them by using MITRE framework. Google Rapid Response And Osquery usage and labs are performed by me.

Requirements
Knowledge of Basic TCP/IP Basic Attack techniques lile SQL injection, RCE and others.
Description
In this course students will learn counducting threat hunting and compromise assessment. In the first module I created a real life attack scenerio as an adversary simulation in a demo lab. I lecture to my students about cyber threat intelligence sources and types, basic definition and terms like IOC, TTP, Cyber Kill Chain Model, Incident Response Steps. I critisize security devices capabilities for explaining why we need monitoring and SIEM infrastructure. In the second module I give you therotical knowledge about real attack techniques like SQL Injection, Buffer OverFlow Exploit Codes, SSH tunneling methods and more... I teach to my students how to collect full pcap traffic and which tools should be used for analysing. In module two I analysis tunnels, pivot points, web attacks, Remote Code Execution Exploits, Web Shells and Web attacks traffic from pcap files and I share my real world analysis experince with my students. In third module, First I present the fundamental windows processes and process injections, hollowing techniques and tools, pe injection and thread injection techniques and tools as theoritically. Then I teach you dumping memory samples for memory forensic and I analyze Stuxnet attack's memory image, Cridex, Zeus, Darkcomet Rat's Memory images and DLL injection event's memory image. In fourth module I perform therat hunting over ELK. First I explain the event id numbers which are used common for hunting and I analyze a real life scenerio. I detected malicious word documents, hta files, unsigned exe files, vbs files and more. I teach you how to detect and investigate tunneling methods, persistency methods like registeries, services, schedule tasks. Some techniques are used like lolbas in attack lab and we investigate and map them by using MITRE framework. Google Rapid Response And Osquery usage and labs are performed by me.

Important Note: My Udemy Training only includes the videos. Memory images, pcaps and virtual machines aren't shared in Udemy. I am creating lab environment in a different platform in Cloud and when I complete the Lab network in cloud I will announce and You can purchase separately from this.

Who this course is for:
Who want to be member of Blue Team Or Purple Team As a Threat Intelligence Analyst Or Incident Responder Or Threat Hunter

Screenshots

Practical Cyber Threat  Hunting 1ca83540d1f3bab5b87c3536821553b9

Download link:
Citación :
rapidgator_net:
https://rapidgator.net/file/e6fced49b74b4a91f8aaa042ee5d1d3d/9isyz.Practical.Cyber.Threat.Hunting.part1.rar.html
https://rapidgator.net/file/404293fe2c6ff7cc143cde74d6d6b6da/9isyz.Practical.Cyber.Threat.Hunting.part2.rar.html
https://rapidgator.net/file/0324c35f3e7d487433d893faf96024a4/9isyz.Practical.Cyber.Threat.Hunting.part3.rar.html
https://rapidgator.net/file/1da19bc41af599d7987c7b1439ca79a4/9isyz.Practical.Cyber.Threat.Hunting.part4.rar.html
https://rapidgator.net/file/868ed773a5d0210fc393b1595a1a80ed/9isyz.Practical.Cyber.Threat.Hunting.part5.rar.html

nitroflare_com:
https://nitroflare.com/view/2F63B78EBF8B23C/9isyz.Practical.Cyber.Threat.Hunting.part1.rar
https://nitroflare.com/view/05DD3CCE000AA24/9isyz.Practical.Cyber.Threat.Hunting.part2.rar
https://nitroflare.com/view/7CCE9AC96E2861C/9isyz.Practical.Cyber.Threat.Hunting.part3.rar
https://nitroflare.com/view/F2174313FC6A00F/9isyz.Practical.Cyber.Threat.Hunting.part4.rar
https://nitroflare.com/view/E2F935DFAB44D7C/9isyz.Practical.Cyber.Threat.Hunting.part5.rar

uploadgig_com:
http://uploadgig.com/file/download/a6eE4a12B4b7fCdB/9isyz.Practical.Cyber.Threat.Hunting.part1.rar
http://uploadgig.com/file/download/f60618a0c8F7eEa4/9isyz.Practical.Cyber.Threat.Hunting.part2.rar
http://uploadgig.com/file/download/D6b863763dd68A40/9isyz.Practical.Cyber.Threat.Hunting.part3.rar
http://uploadgig.com/file/download/2EbDaeab3a37d791/9isyz.Practical.Cyber.Threat.Hunting.part4.rar
http://uploadgig.com/file/download/8b582b3ed0b6B75f/9isyz.Practical.Cyber.Threat.Hunting.part5.rar

Links are Interchangeable - No Password - Single Extraction
Volver arriba Ir abajo
 

Practical Cyber Threat Hunting

Ver el tema anterior Ver el tema siguiente Volver arriba 
Página 1 de 1.

 Temas similares

-
» Threat Hunting with Yara
» Advanced Threat Hunting on Active Directory
» Threat Hunting with the Elastic Stack: BSides JAX 2019
» Mastering Threat Hunting: Memory Forensics With Volatility
» The complete Cyber Security Threat Intelligence Researcher

Permisos de este foro:No puedes responder a temas en este foro.
Foro Wanako1 :: Programas o Aplicaciónes :: Ayuda, Tutoriales-