Threat Hunting - Endpoint Hunting

Torrent Details


Threat Hunting - Endpoint Hunting

NAME
Threat Hunting - Endpoint Hunting.torrent
CATEGORY
Other
INFOHASH
f62d087e870f4e7177c72b83acc24915d8792926
SIZE
562 MB in 69 files
ADDED
Uploaded on 24-03-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description



Description



Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.



Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Endpoint Hunting, you’ll learn to hunt for specific APT techniques found in endpoint data. First, you’ll explore the various endpoint data sets and how to take advantage of correlation. Next, you’ll discover how to find artifacts related to initial access, implants, and persistence. Finally, you’ll learn how to detect behaviors related to privilege escalation and credential stealing. When you’re finished with this course, you’ll have the skills and knowledge of endpoint hunting needed to provide the proactive approach to security analytics.



Released 2/2023

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
.pad/0145.4 KB
.pad/1229.1 KB
.pad/1040 KB
.pad/11174.5 KB
.pad/12181.5 KB
.pad/13177.7 KB
.pad/14221.6 KB
.pad/1518.1 KB
.pad/16208 KB
.pad/17183.3 KB
.pad/18187.4 KB
.pad/1967 KB
.pad/2105.7 KB
.pad/20127 KB
.pad/2159.8 KB
.pad/33.2 KB
.pad/4201.5 KB
.pad/532.6 KB
.pad/6177.4 KB
.pad/7229.8 KB
.pad/8151.9 KB
.pad/9214.4 KB
TutsNode.net.txt63 B
[TutsNode.net] - Threat Hunting - Endpoint Hunting/1. Course Overview/1. Course Overview.mp419.3 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/1. Course Overview/1. Course Overview.vtt2.1 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/1. Who Are You and Where Are We Now.mp421.8 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/1. Who Are You and Where Are We Now.vtt2.4 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/2. Approaching an Intel Based Threat Hunt.mp426.4 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/2. Approaching an Intel Based Threat Hunt.vtt4.2 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/3. Demo - MITRE ATT&CK.mp435.7 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/3. Demo - MITRE ATT&CK.vtt8.2 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/4. Where’s the Data Come From.mp435.8 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/4. Where’s the Data Come From.vtt5.9 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/5. Scaling and Obfuscation.mp418.8 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/2. Endpoint Data Sets/5. Scaling and Obfuscation.vtt2.2 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/1. Gaining Access.mp438.7 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/1. Gaining Access.vtt6.1 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/2. Demo - Process Execution.mp426.8 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/2. Demo - Process Execution.vtt7.1 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/3. LNK Parser.mp419 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/3. LNK Parser.vtt2.2 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/4. Demo - LNK Analysis.mp421.3 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/4. Demo - LNK Analysis.vtt5.4 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/5. User Behavior.mp410.1 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/3. Access and Implants/5. User Behavior.vtt1.1 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/1. Digging In.mp423.5 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/1. Digging In.vtt3.7 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/2. Demo - Hunting for Registry Keys.mp419.3 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/2. Demo - Hunting for Registry Keys.vtt6.2 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/3. More Holes.mp413.2 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/3. More Holes.vtt1.8 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/4. Demo - Hunting for Scheduled Tasks.mp443.8 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/4. Demo - Hunting for Scheduled Tasks.vtt11.1 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/5. Looking Harder.mp48.4 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/4. Persistence/5. Looking Harder.vtt1019 B
[TutsNode.net] - Threat Hunting - Endpoint Hunting/5. Privilege Escalation and Credential Stealing/1. Elevating Status.mp445.8 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/5. Privilege Escalation and Credential Stealing/1. Elevating Status.vtt6.7 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/5. Privilege Escalation and Credential Stealing/2. Demo - Mimikatz Execution.mp424.5 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/5. Privilege Escalation and Credential Stealing/2. Demo - Mimikatz Execution.vtt7.3 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/5. Privilege Escalation and Credential Stealing/3. Hunting with Expertise.mp415.3 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/5. Privilege Escalation and Credential Stealing/3. Hunting with Expertise.vtt1.7 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/1. What Are They up To.mp439.1 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/1. What Are They up To.vtt5.5 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/2. Demo - Detecting Impossible Travel.mp414.3 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/2. Demo - Detecting Impossible Travel.vtt4.2 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/3. Caveats and Additional Metrics.mp429.3 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/3. Caveats and Additional Metrics.vtt5.3 KB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/4. Conclusion.mp48.9 MB
[TutsNode.net] - Threat Hunting - Endpoint Hunting/6. Impossible Login/4. Conclusion.vtt1 KB

Alternative Torrents for 'Threat Hunting Endpoint Hunting'.

There are no alternative torrents found.