[FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks With Wireshark

Torrent Details


[FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks with Wireshark

NAME
[FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks with Wireshark.torrent
CATEGORY
Other
INFOHASH
b69327bb89e4bf32a3aa5e9bb09a0c03dd5b5a3f
SIZE
686 MB in 67 files
ADDED
Uploaded on 28-10-2021 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Lynda and other Courses >>> https://www.freecoursesonline.me/

Forum for discussion >>> https://1hack.us/








Created by: Christopher Greer

Language: English

Updated: Oct 12, 2021  

Duration: 2h 34m

Course Source: https://www.pluralsight.com/courses/identify-common-cyber-network-attacks-wireshark



About



This course will teach you how to quickly spot cyber attacks and indicators of compromise in network traffic with Wireshark.



Description



Cyber attacks are everywhere. Are they lurking in your network? Every IT professional needs to develop the skills with Wireshark to quickly spot them. In this course, Identify Common Cyber Network Attacks with Wireshark, you’ll gain the ability to threat hunt at the packet level. First, you’ll explore how network and OS Fingerprinting scans work and how to identify them. Next, you’ll discover how to spot indicators of compromise in malware infections. Finally, you’ll learn how to isolate botnet and data exfiltration traffic. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting with Wireshark needed to identify common cyber network attacks on your network.



Course Overview



Hi everyone. My name is Chris Greer, and welcome to my course, Identify Common Cyber Network Attacks with Wireshark. I'm a network analyst and a Wireshark instructor at Packet Pioneer, and I'm excited to show you how all IT professionals can use this tool to quickly spot cyberattacks and network traffic. After all, even with our IDS systems in place, cybersecurity attacks have become so common that threat hunting with Wireshark is no longer an optional skill for IT pros. Engineers need to quickly spot enumeration scans, malware behavior, data exfiltration efforts, and other suspect traffic with Wireshark, especially during incident response. But before we can do that, we first need to know how these common attack methods work and how to identify them at the packet level. So join me, and you'll get hands-on experience with pcap examples of common threats and learn how to spot them in Wireshark. In this course, you'll learn how to filter for network scans and OS fingerprinting, how to spot traffic exfiltration in the packets, you'll learn the top 10 attack patterns to search for, and how to identify common indicators of compromise in malware behavior. By the end of this course, you'll have the skills necessary to quickly spot cyber network attacks with Wireshark. Before beginning the course, you should have already viewed the first course in this path, Wireshark Configuration for Cybersecurity Analysis. I hope that you'll join me on this journey to learn how to threat hunt with Wireshark, here at Pluralsight.



Level



• Intermediate



About Author



Chris Greer is a network analyst for Packet Pioneer, delivering training and packet analysis consulting services to customers all over the world. He specializes in using Wireshark to combat network and application performance problems on networks of all sizes. Chris leverages his 20 years of practical experience in network monitoring, analysis, and troubleshooting to heighten the experience of any attendee to his interactive and energetic courses.






SIMILAR



TORRENT
 
UPLOADEDSIZESEEDS
LEECHS


Pluralsight | Cisco Enterprise Networks: Troubleshooting BGP and GRE Tunnels [FCO] by Prom3th3uS










7 months
280.31 MB15
2


Python for Data Analysis, 2nd Edition By Wes McKinney (2017) [AhLaN] by abidmail










1 year
8.98 MB14
2


O’REILLY | Go for Python Developers [FCO] by Prom3th3uS










4 months
392.94 MB17
1

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Websites you may like/How you can help our Group!.txt204 B
01. Course Overview/01. Course Overview.mp44.6 MB
02. When to Break Out Wireshark for Threat Hunting/02. Course Introduction.mp42.5 MB
02. When to Break Out Wireshark for Threat Hunting/03. When to Break out Wireshark for Threat Hunting.mp43.1 MB
02. When to Break Out Wireshark for Threat Hunting/04. Starting with IDS Alerts and Firewall Server Event Logs.mp45.1 MB
02. When to Break Out Wireshark for Threat Hunting/05. Packet Analysis and the MITRE ATTCK Framework Cyber Kill Chain.mp42.1 MB
02. When to Break Out Wireshark for Threat Hunting/06. Module Review.mp4709.5 KB
03. Analyzing Port Scans and Enumeration Methods/07. Module Intro.mp41.7 MB
03. Analyzing Port Scans and Enumeration Methods/08. Network and Host Discovery Scans.mp45.2 MB
03. Analyzing Port Scans and Enumeration Methods/09. Lab 1 - Detecting Network Discovery Scans with Wireshark.mp424.5 MB
03. Analyzing Port Scans and Enumeration Methods/10. Lab 2 - Identifying Port Scans with Wireshark.mp431.9 MB
03. Analyzing Port Scans and Enumeration Methods/11. Lab 2 - Part 2 - Detecting Port Scans.mp420.6 MB
03. Analyzing Port Scans and Enumeration Methods/12. Lab 3 - Analyzing Malware for Network and Port Scans.mp440.4 MB
03. Analyzing Port Scans and Enumeration Methods/13. Lab 3 - Part 2 - Analyzing Malware for Network and Port Scans.mp416 MB
03. Analyzing Port Scans and Enumeration Methods/14. How OS Fingerprinting Works.mp45.5 MB
03. Analyzing Port Scans and Enumeration Methods/15. Lab 4 - Detecting OS Fingerprinting with Wireshark.mp436.2 MB
03. Analyzing Port Scans and Enumeration Methods/16. Lab 4 - Part 2 - Detecting OS Fingerprinting.mp426.7 MB
03. Analyzing Port Scans and Enumeration Methods/17. How HTTP Path Enumeration Works.mp43.1 MB
03. Analyzing Port Scans and Enumeration Methods/18. Lab 5 - Analyzing HTTP Path Enumeration with Wireshark.mp440.7 MB
03. Analyzing Port Scans and Enumeration Methods/19. Module Review.mp4786.1 KB
04. Analyzing Common Attack Signatures of Suspect Traffic/20. Module Intro.mp4764.8 KB
04. Analyzing Common Attack Signatures of Suspect Traffic/21. How to Find Suspect Traffic Patterns.mp43.8 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/22. Spotting Network Attacks - The Top 10 Things to Look For.mp44 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/23. Lab 4 - Analyzing TCP SYN Attacks.mp420.9 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/24. Identifying Unusual Country Codes with GeoIP.mp44 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/25. Lab 7 - Spotting Suspect Country Codes with Wireshark.mp427.3 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/26. Lab 8 - Filtering for Unusual Domain Name Lookups.mp419.4 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/27. Analyzing HTTP Traffic and File Transfers.mp45 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/28. Lab 9 - Analyzing HTTP Traffic and Unencrypted File Transfers.mp439.8 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/29. Spotting Data Exfiltration Brute Force Password Behavior and Reverse Shell.mp44.4 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/30. Lab 10 - Analysis of a Brute Force Attack.mp425.9 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/31. Module Review.mp4962.8 KB
05. Identifying Common Malware Behavior/32. Module Intro.mp4819 KB
05. Identifying Common Malware Behavior/33. What Is Malware How Can I Spot It.mp44.5 MB
05. Identifying Common Malware Behavior/34. Indicators of Compromise in Malware Analysis.mp41.9 MB
05. Identifying Common Malware Behavior/35. Lab 11 - Malware Analysis with Wireshark - Part 1.mp443.7 MB
05. Identifying Common Malware Behavior/36. Lab 11 - Malware Analysis with Wireshark - Part 2.mp415.1 MB
05. Identifying Common Malware Behavior/37. Module Review.mp41.5 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/38. Module Intro.mp41018.7 KB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/39. How to Identify Shells and Reverse Shells.mp44.4 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/40. Lab 12 - Analyzing Reverse Shell Behavior .mp49.9 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/41. How to Spot Botnet Traffic.mp45.5 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/42. Lab 13 - Identifying Botnet Traffic with Wireshark.mp437.7 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/43. Lab 13 - Identifying Botnet Traffic - Part 2.mp435.6 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/44. How to Identify Data Exfiltration.mp44.9 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/45. Lab 14 - Analyzing Data Exfiltration with Wireshark.mp435.9 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/46. Module Review.mp4497.6 KB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/47. Course Review.mp41.7 MB
Exercise Files/02/when-to-break-out-wireshark-for-threat-hunting-slides.pdf2.9 MB
Exercise Files/03/analyzing-port-scans-and-enumeration-methods-slides.pdf4.3 MB
Exercise Files/03/demos/chriscoloringrules4.4 KB
Exercise Files/03/demos/Lab1_NetworkScan.pcapng124.7 KB
Exercise Files/03/demos/Lab2_Network_PortScan.pcapng470.7 KB
Exercise Files/03/demos/Lab3_AnalyzinganAttack.zip7.3 MB
Exercise Files/03/demos/Lab4_OSFingerprint.pcapng677.2 KB
Exercise Files/03/demos/Lab5_EnumeratingWeb.pcapng498.5 KB
Exercise Files/04/analyzing-common-attack-signatures-of-suspect-traffic-slides.pdf4.2 MB
Exercise Files/04/demos/Lab10_BruteForceFTP.pcapng60.4 KB
Exercise Files/04/demos/Lab6_TCPSYNs.pcapng543.2 KB
Exercise Files/04/demos/Lab7_CountryCodes.pcapng543.3 KB
Exercise Files/04/demos/Lab8_DomainNames.pcapng12.7 KB
Exercise Files/04/demos/Lab9_HTTPTransfers.pcapng13.1 MB
Exercise Files/05/demos/Lab 11_MalwareAnalysis.pcapng8.2 MB
Exercise Files/05/identifying-common-malware-behavior-slides.pdf4 MB
Exercise Files/06/demos/Lab13_AnalyzingBotnet.pcapng3.7 MB
Exercise Files/06/demos/Lab14_DataExfiltration.pcapng1.8 MB
Exercise Files/06/identify-shell-reverse-shell-botnet-and-ddos-attack-traffic-slides.pdf1.2 MB

Alternative Torrents for 'FreeCoursesOnline.Me Pluralsight Identify Common Cyber Network Attacks with Wireshark'.

There are no alternative torrents found.