Torrent details for "Oreilly Threat Intelligence and Threat Hunting 2nd Edition FreeC…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
1.1 GB
Info Hash:
704BF2A0E047C32DCC2F16B5BFC46730BEC30DEF
Added By:
Added:
April 8, 2024, 10:04 p.m.
Stats:
|
(Last updated: May 4, 2025, 3:34 p.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 183 bytes |
| Bonus Resources.txt | 386 bytes |
| 001. Threat Intelligence and Threat Hunting Introduction.en.srt | 1.4 KB |
| 001. Threat Intelligence and Threat Hunting Introduction.mp4 | 3.9 MB |
| 001. Learning objectives.en.srt | 964 bytes |
| 001. Learning objectives.mp4 | 2.9 MB |
| 002. 1.1 Threat actors Part 1.en.srt | 19.8 KB |
| 002. 1.1 Threat actors Part 1.mp4 | 51.1 MB |
| 003. 1.2 Threat actors Part 2.en.srt | 6.1 KB |
| 003. 1.2 Threat actors Part 2.mp4 | 16.8 MB |
| 004. 1.3 Confidence levels.en.srt | 7.3 KB |
| 004. 1.3 Confidence levels.mp4 | 18.2 MB |
| 005. 1.4 Threat hunting.en.srt | 7.1 KB |
| 005. 1.4 Threat hunting.mp4 | 17.4 MB |
| 001. Learning objectives.en.srt | 2.0 KB |
| 001. Learning objectives.mp4 | 5.6 MB |
| 002. 2.1 Network-related.en.srt | 32.6 KB |
| 002. 2.1 Network-related.mp4 | 73.5 MB |
| 003. 2.2 Host-related.en.srt | 18.3 KB |
| 003. 2.2 Host-related.mp4 | 39.3 MB |
| 004. 2.3 Application-related.en.srt | 4.0 KB |
| 004. 2.3 Application-related.mp4 | 12.7 MB |
| 005. 2.4 Malicious Activity Indicators.en.srt | 7.5 KB |
| 005. 2.4 Malicious Activity Indicators.mp4 | 22.5 MB |
| 001. Learning objectives.en.srt | 1.4 KB |
| 001. Learning objectives.mp4 | 3.9 MB |
| 002. 3.1 Tools Part 1.en.srt | 13.3 KB |
| 002. 3.1 Tools Part 1.mp4 | 39.4 MB |
| 003. 3.2 Tools Part 2.en.srt | 15.8 KB |
| 003. 3.2 Tools Part 2.mp4 | 37.1 MB |
| 004. 3.3 Common techniques Part 1.en.srt | 21.4 KB |
| 004. 3.3 Common techniques Part 1.mp4 | 54.3 MB |
| 005. 3.4 Common techniques Part 2.en.srt | 18.4 KB |
| 005. 3.4 Common techniques Part 2.mp4 | 48.7 MB |
| 006. 3.5 Common techniques Part 3.en.srt | 25.4 KB |
| 006. 3.5 Common techniques Part 3.mp4 | 60.7 MB |
| 007. 3.6 Programming languagesscripting.en.srt | 11.3 KB |
| 007. 3.6 Programming languagesscripting.mp4 | 23.9 MB |
| 001. Learning objectives.en.srt | 657 bytes |
| 001. Learning objectives.mp4 | 2.4 MB |
| 002. 4.1 Cyber kill chains.en.srt | 8.4 KB |
| 002. 4.1 Cyber kill chains.mp4 | 21.5 MB |
| 003. 4.2 Diamond Model of Intrusion Analysis.en.srt | 3.9 KB |
| 003. 4.2 Diamond Model of Intrusion Analysis.mp4 | 9.6 MB |
| 004. 4.3 MITRE ATT&CK Part 1.en.srt | 12.1 KB |
| 004. 4.3 MITRE ATT&CK Part 1.mp4 | 32.7 MB |
| 005. 4.4 MITRE ATT&CK Part 2.en.srt | 14.9 KB |
| 005. 4.4 MITRE ATT&CK Part 2.mp4 | 36.4 MB |
| 006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).en.srt | 2.1 KB |
| 006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 | 5.1 MB |
| 007. 4.6 OWASP Testing Guide.en.srt | 6.9 KB |
| 007. 4.6 OWASP Testing Guide.mp4 | 15.4 MB |
| 001. Learning objectives.en.srt | 952 bytes |
| 001. Learning objectives.mp4 | 3.7 MB |
| 002. 5.1 Attack Frameworks Part 1.en.srt | 23.1 KB |
| 002. 5.1 Attack Frameworks Part 1.mp4 | 35.3 MB |
| 003. 5.2 Attack Frameworks Part 2.en.srt | 6.8 KB |
| 003. 5.2 Attack Frameworks Part 2.mp4 | 22.1 MB |
| 004. 5.3 Threat Research.en.srt | 6.3 KB |
| 004. 5.3 Threat Research.mp4 | 15.2 MB |
| 005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.mp4 | 9.3 MB |
| 005. 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Suppor.srt | 5.0 KB |
| 006. 5.5 Wireless Analysis Techniques.en.srt | 11.6 KB |
| 006. 5.5 Wireless Analysis Techniques.mp4 | 18.1 MB |
| 001. Learning objectives.en.srt | 484 bytes |
| 001. Learning objectives.mp4 | 2.1 MB |
| 002. 6.1 Understanding Results.en.srt | 13.7 KB |
| 002. 6.1 Understanding Results.mp4 | 18.0 MB |
| 003. 6.2 Web Application Scanners.en.srt | 2.7 KB |
| 003. 6.2 Web Application Scanners.mp4 | 4.1 MB |
| 004. 6.3 Infrastructure Vulnerability Scanner.en.srt | 7.5 KB |
| 004. 6.3 Infrastructure Vulnerability Scanner.mp4 | 8.6 MB |
| 005. 6.4 Software Assessment Tools and Techniques.en.srt | 2.6 KB |
| 005. 6.4 Software Assessment Tools and Techniques.mp4 | 2.7 MB |
| 006. 6.5 Wireless Assessment.en.srt | 6.7 KB |
| 006. 6.5 Wireless Assessment.mp4 | 8.1 MB |
| 007. 6.6 Cloud Infrastructure Assessment.en.srt | 2.7 KB |
| 007. 6.6 Cloud Infrastructure Assessment.mp4 | 3.6 MB |
| 001. Learning objectives.en.srt | 431 bytes |
| 001. Learning objectives.mp4 | 2.1 MB |
| 002. 7.1 Mobile.en.srt | 7.5 KB |
| 002. 7.1 Mobile.mp4 | 10.9 MB |
| 003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.en.srt | 13.4 KB |
| 003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 | 18.6 MB |
| 004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.en.srt | 26.0 KB |
| 004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 | 43.2 MB |
| 005. 7.4 APTs.en.srt | 20.8 KB |
| 005. 7.4 APTs.mp4 | 24.9 MB |
| 006. 7.5 Embedded and Real-Time Operating Systems (RTOS).en.srt | 10.4 KB |
| 006. 7.5 Embedded and Real-Time Operating Systems (RTOS).mp4 | 16.4 MB |
| 007. 7.6 SOC and FPGA.en.srt | 9.5 KB |
| 007. 7.6 SOC and FPGA.mp4 | 48.1 MB |
| 008. 7.7 Physical Access Control.en.srt | 1.8 KB |
| 008. 7.7 Physical Access Control.mp4 | 3.5 MB |
| 009. 7.8 Building Automation Systems, Vehicles, and Drones.en.srt | 11.2 KB |
| 009. 7.8 Building Automation Systems, Vehicles, and Drones.mp4 | 22.3 MB |
| 010. 7.9 Industrial Control Systems (ICS) and Process Automation.en.srt | 24.4 KB |
| 010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 | 44.1 MB |
| 011. 7.10 Defending Critical Infrastructure.en.srt | 22.1 KB |
| 011. 7.10 Defending Critical Infrastructure.mp4 | 37.2 MB |
| 012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.en.srt | 24.0 KB |
| 012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 | 37.5 MB |
| 013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.en.srt | 21.0 KB |
| 013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 | 39.3 MB |
| 014. 7.13 Verifications and Quality Controls.en.srt | 13.1 KB |
| 014. 7.13 Verifications and Quality Controls.mp4 | 25.3 MB |
| 001. Threat Intelligence and Threat Hunting Summary.en.srt | 346 bytes |
| 001. Threat Intelligence and Threat Hunting Summary.mp4 | 1.1 MB |
Name
DL
Uploader
Size
S/L
Added
-
1.1 GB
[9
/
17]
2024-04-08
| Uploaded by FreeCourseWeb | Size 1.1 GB | Health [ 9 /17 ] | Added 2024-04-08 |
-
276.2 MB
[0
/
2]
2023-10-28
| Uploaded by NoMercyReal | Size 276.2 MB | Health [ 0 /2 ] | Added 2023-10-28 |
NOTE
SOURCE: Oreilly Threat Intelligence and Threat Hunting 2nd Edition FreeCourseWeb
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


