Torrent Info
Title [FreeCoursesOnline.Me] O’REILLY - Threat Intelligence and Threat Hunting
Category
Size 15.07GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377B
00001 Threat_Intelligence_and_Threat_Hunting_-_Introduction.mp4 42.89MB
00002 Learning_objectives.mp4 23.39MB
00003 1.1_What_is_Threat_Intelligence.mp4 700.92MB
00004 1.2_Threat_Sources_-_Part_1.mp4 334.29MB
00005 1.3_Threat_Sources_-_Part_2.mp4 169.46MB
00006 1.4_Threat_Classifications.mp4 389.72MB
00007 1.5_Cyber_Threat_Investigation_-_Part_1.mp4 437.57MB
00008 1.6_Cyber_Threat_Investigation_-_Part_2.mp4 318.03MB
00009 1.7_Social_Media_Graphs_-_Part_1.mp4 356.39MB
00010 1.8_Social_Media_Graphs_-_Part_2.mp4 315.30MB
00011 1.9_Log_Challenges_-_Part_1.mp4 358.37MB
00012 1.10_Log_Challenges_-_Part_2.mp4 323.12MB
00013 1.11_Advanced_Threat_Hunting_-_Part_1.mp4 292.78MB
00014 1.12_Advanced_Threat_Hunting_-_Part_2.mp4 438.93MB
00015 1.13_Endpoint_Detection.mp4 305.55MB
00016 Learning_objectives.mp4 29.10MB
00017 2.1_Attack_Frameworks_-_Part_1.mp4 292.24MB
00018 2.2_Attack_Frameworks_-_Part_2.mp4 194.57MB
00019 2.3_Threat_Research.mp4 122.52MB
00020 2.4_Threat_Modeling_Methodologies_and_Threat_Intelligence_Sharing_with_Support_Functions.mp4 78.91MB
00021 2.5_Wireless_Analysis_Techniques.mp4 150.60MB
00022 Learning_objectives.mp4 18.54MB
00023 3.1_Vulnerability_Identification_-_Part_1.mp4 430.80MB
00024 3.2_Vulnerability_Identification_-_Part_2.mp4 120.33MB
00025 3.3_Validation.mp4 303.03MB
00026 3.4_Remediation_and_Mitigation_and_Inhibitors.mp4 67.11MB
00027 3.5_Scanning_Parameters_and_Criteria.mp4 524.14MB
00028 3.6_Vulnerability_Scanning_-_Part_1.mp4 208.44MB
00029 3.7_Vulnerability_Scanning_-_Part_2.mp4 115.15MB
00030 3.8_Enumeration.mp4 685.66MB
00031 Learning_objectives.mp4 17.66MB
00032 4.1_Understanding_Results.mp4 146.84MB
00033 4.2_Web_Application_Scanners.mp4 30.91MB
00034 4.3_Infrastructure_Vulnerability_Scanner.mp4 58.37MB
00035 4.4_Software_Assessment_Tools_and_Techniques.mp4 18.96MB
00036 4.5_Wireless_Assessment.mp4 64.97MB
00037 4.6_Cloud_Infrastructure_Assessment.mp4 30.44MB
00038 Learning_objectives.mp4 16.09MB
00039 5.1_Mobile.mp4 82.40MB
00040 5.2_Internet_of_Things_IoT_and_Embedded_Devices_-_Part_1.mp4 160.83MB
00041 5.3_Internet_of_Things_IoT_and_Embedded_Devices_-_Part_2.mp4 383.83MB
00042 5.4_APTs.mp4 200.87MB
00043 5.5_Embedded_and_Real-Time_Operating_Systems_RTOS.mp4 149.15MB
00044 5.6_SOC_and_FPGA.mp4 276.17MB
00045 5.7_Physical_Access_Control.mp4 33.87MB
00046 5.8_Building_Automation_Systems_Vehicles_and_Drones.mp4 205.40MB
00047 5.9_Industrial_Control_Systems_ICS_and_Process_Automation.mp4 407.67MB
00048 5.10_Defending_Critical_Infrastructure.mp4 354.80MB
00049 5.11_Supervisory_Control_and_Data_Acquisition_SCADA_-_Part_1.mp4 327.07MB
00050 5.12_Supervisory_Control_and_Data_Acquisition_SCADA_-_Part_2.mp4 367.51MB
00051 5.13_Verifications_and_Quality_Controls.mp4 239.02MB
00052 Learning_objectives.mp4 18.15MB
00053 6.1_Cloud_Service_FaaS_and_Deployment_Models.mp4 70.89MB
00054 6.2_IaC_Insecure_Applications.mp4 56.28MB
00055 6.3_Application_Programming_Interface.mp4 91.03MB
00056 6.4_Improper_Key_Management.mp4 117.67MB
00057 6.5_Logging_and_Monitoring.mp4 227.17MB
00058 Learning_objectives.mp4 18.58MB
00059 7.1_Attack_Types_and_XML_Types.mp4 20.07MB
00060 7.2_SQL_Attacks.mp4 26.99MB
00061 7.3_Overflow_Attacks.mp4 31.99MB
00062 7.4_Cross-Site_Scripting.mp4 221.50MB
00063 7.5_Remote_Code_Execution.mp4 43.78MB
00064 7.6_Directory_Traversal.mp4 40.31MB
00065 7.7_Privilege_Escalation.mp4 280.42MB
00066 7.8_Password_Spraying.mp4 42.60MB
00067 7.9_Credential_Stuffing.mp4 8.16MB
00068 7.10_Impersonation.mp4 11.77MB
00069 7.11_On-path_and_Man-in-the-Middle.mp4 28.59MB
00070 7.12_Session_Hijacking.mp4 17.00MB
00071 Learning_objectives.mp4 16.24MB
00072 8.1_Vulnerabilities_Improper_Error_Handling.mp4 56.57MB
00073 8.2_Dereferencing.mp4 71.66MB
00074 8.3_Insecure_Object_Reference.mp4 64.07MB
00075 8.4_Race_Condition.mp4 212.52MB
00076 8.5_Broker_Authentication.mp4 64.04MB
00077 8.6_Sensitive_Data_Exposure.mp4 55.38MB
00078 8.7_Insecure_Components.mp4 50.02MB
00079 8.8_Insufficient_Logging_and_Monitoring.mp4 39.13MB
00080 8.9_Weak_or_Default_Configurations.mp4 116.60MB
00081 Learning_objectives.mp4 15.05MB
00082 9.1_Event_Logs.mp4 32.10MB
00083 9.2_Syslogs.mp4 131.46MB
00084 9.3_Firewall_Logs.mp4 193.06MB
00085 9.4_Web_Application_Firewall_WAF.mp4 172.52MB
00086 9.5_Proxy.mp4 315.21MB
00087 9.6_Intrusion_Detection_and_Prevention_IDS_IPS.mp4 203.80MB
00088 9.7_Impact_Analysis.mp4 460.99MB
00089 9.8_Organizations_Impact_vs._Localized_Impact.mp4 24.31MB
00090 9.9_Immediate_vs._Total.mp4 16.74MB
00091 Threat_Intelligence_and_Threat_Hunting_-_Summary.mp4 22.33MB
1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286B
3. FTUApps.com Download Cracked Developers Applications For Free.url 239B
For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url 1.82KB
How you can help our Group!.txt 204B
Distribution statistics by country
Sweden (SE) 1
Cameroon (CM) 1
Switzerland (CH) 1
Republic of Korea (KR) 1
Ukraine (UA) 1
Canada (CA) 1
Total 6
IP List List of IP addresses which were distributed this torrent