[ CourseWikia.Com ] Linkedin - A Complete Guide To Kali Purple

Torrent Details


[ CourseWikia.com ] Linkedin - A Complete Guide to Kali Purple

NAME
[ CourseWikia.com ] Linkedin - A Complete Guide to Kali Purple.torrent
CATEGORY
Other
INFOHASH
c5a8cf0a23e14c85f146b0273f4846ab208225bb
SIZE
765 MB in 98 files
ADDED
Uploaded on 01-01-2024 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ CourseWikia.com ] A Complete Guide to Kali Purple



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com







Released 12/2023

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch

Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 4h 31m | Size: 730 MB



Kali Purple is the latest addition to the Kali Linux ecosystem. Designed specifically for cybersecurity professionals and ethical hackers tasked with implementing defensive security strategies, the innovative extension to the renowned Kali Linux platform helps to address the needs of a diverse user audience by leveraging the principles of the NIST Cybersecurity Framework.



In this course, join instructor Malcolm Shore as he provides an introduction to the range of open-source tools supported on the Kali Purple cyber defense platform. Explore the tools provided in the application menu aligning to the five NIST Cybersecurity Framework categories: Identify, Protect, Detect, Respond, and Recover. Malcolm shows you how to install and use some of the additional tools, and covers the deployment of the Kali Purple software as a cyber range tool on a mini-PC (NUC).



Homepage



If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com



Get More Tutorials and Support Us -->> https://DevCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/01 - Introduction/01 - Learning how to use Kali Purple.mp42 MB
~Get Your Files Here !/01 - Introduction/01 - Learning how to use Kali Purple.srt1.1 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4935 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt993 B
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp41.8 MB
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt1.8 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/01 - Introduction to Kali Purple.mp48.1 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/01 - Introduction to Kali Purple.srt8.4 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/02 - Introduction to virtualization.mp45.4 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/02 - Introduction to virtualization.srt5.4 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/03 - Virtualization using Proxmox.mp46.2 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/03 - Virtualization using Proxmox.srt5.2 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/04 - A first look at Proxmox.mp411.6 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/04 - A first look at Proxmox.srt7.8 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/05 - Installing Kali Linux.mp414.6 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/05 - Installing Kali Linux.srt8 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/06 - A quick tour of Kali Linux.mp415.6 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/06 - A quick tour of Kali Linux.srt11 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/07 - Installing the Kali Purple workstation.mp411 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/07 - Installing the Kali Purple workstation.srt6.7 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/08 - A quick tour of Kali Purple.mp46.6 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/08 - A quick tour of Kali Purple.srt4.8 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/09 - A first look at the Kali Purple servers.mp44.5 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/09 - A first look at the Kali Purple servers.srt3.9 KB
~Get Your Files Here !/02 - 1. Building a Cyber Range/10 - Creating a Kali Purple server template.mp412.1 MB
~Get Your Files Here !/02 - 1. Building a Cyber Range/10 - Creating a Kali Purple server template.srt5.7 KB
~Get Your Files Here !/03 - 2. ProxyIDS/01 - Setting up NGINX as a proxy server.mp414.2 MB
~Get Your Files Here !/03 - 2. ProxyIDS/01 - Setting up NGINX as a proxy server.srt6.2 KB
~Get Your Files Here !/03 - 2. ProxyIDS/02 - Adding Suricata IDS to the proxy.mp46.8 MB
~Get Your Files Here !/03 - 2. ProxyIDS/02 - Adding Suricata IDS to the proxy.srt2.5 KB
~Get Your Files Here !/03 - 2. ProxyIDS/03 - Setting up a public web server.mp48.9 MB
~Get Your Files Here !/03 - 2. ProxyIDS/03 - Setting up a public web server.srt3.1 KB
~Get Your Files Here !/03 - 2. ProxyIDS/04 - Creating a Linux application server.mp411 MB
~Get Your Files Here !/03 - 2. ProxyIDS/04 - Creating a Linux application server.srt6.1 KB
~Get Your Files Here !/03 - 2. ProxyIDS/05 - Creating a Windows application server.mp410.4 MB
~Get Your Files Here !/03 - 2. ProxyIDS/05 - Creating a Windows application server.srt5.2 KB
~Get Your Files Here !/03 - 2. ProxyIDS/06 - Installing the juice shop.mp48.3 MB
~Get Your Files Here !/03 - 2. ProxyIDS/06 - Installing the juice shop.srt3.5 KB
~Get Your Files Here !/03 - 2. ProxyIDS/07 - Installing virtual machines in the lab.mp411.4 MB
~Get Your Files Here !/03 - 2. ProxyIDS/07 - Installing virtual machines in the lab.srt5.8 KB
~Get Your Files Here !/03 - 2. ProxyIDS/08 - Using kali-autopilot to generate attack scripts.mp415.9 MB
~Get Your Files Here !/03 - 2. ProxyIDS/08 - Using kali-autopilot to generate attack scripts.srt13.3 KB
~Get Your Files Here !/03 - 2. ProxyIDS/09 - Running an attack on autopilot.mp47.6 MB
~Get Your Files Here !/03 - 2. ProxyIDS/09 - Running an attack on autopilot.srt4.7 KB
~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/01 - Web scanning with ZAP.mp45.8 MB
~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/01 - Web scanning with ZAP.srt3 KB
~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/02 - Installing GVM.mp48.6 MB
~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/02 - Installing GVM.srt4.2 KB
~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/03 - Running a vulnerabilitty scan with GVM.mp48.7 MB
~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/03 - Running a vulnerabilitty scan with GVM.srt5.3 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/01 - Installing the ELKStack SIEM.mp420.1 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/01 - Installing the ELKStack SIEM.srt8.6 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/02 - Upgrading Kibana to HTTPS.mp413.5 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/02 - Upgrading Kibana to HTTPS.srt5.3 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/03 - Configuring log integrations.mp48.9 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/03 - Configuring log integrations.srt4.6 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/04 - Installing the Fleet server.mp46.4 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/04 - Installing the Fleet server.srt3.1 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/05 - Enrolling hosts into the Fleet server.mp414.1 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/05 - Enrolling hosts into the Fleet server.srt6.9 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/06 - Enhancing our logs.mp418 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/06 - Enhancing our logs.srt8.5 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/07 - Detecting reconnaissance with ELKStack.mp418.3 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/07 - Detecting reconnaissance with ELKStack.srt8.4 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/08 - Detecting exploitation with ELKStack.mp411.3 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/08 - Detecting exploitation with ELKStack.srt5.4 KB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/09 - Monitoring alerts with ELKStack.mp49.9 MB
~Get Your Files Here !/05 - 4. Security Monitoring with ELK/09 - Monitoring alerts with ELKStack.srt5 KB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/01 - Installing the Wazuh SIEM.mp412.2 MB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/01 - Installing the Wazuh SIEM.srt5.9 KB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/02 - Installing a Wazuh Linux agent.mp48.3 MB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/02 - Installing a Wazuh Linux agent.srt3.8 KB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/03 - Installing a Wazuh Windows agent.mp43.1 MB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/03 - Installing a Wazuh Windows agent.srt1.4 KB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/04 - Collecting NGINX logs in Wazuh.mp412.2 MB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/04 - Collecting NGINX logs in Wazuh.srt6.2 KB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/05 - Monitoring an attack with Wazuh.mp49.6 MB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/05 - Monitoring an attack with Wazuh.srt5.9 KB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/06 - Detecting webshells with Wazuh.mp417.2 MB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/06 - Detecting webshells with Wazuh.srt8.5 KB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/07 - Activating vulnerability scanning.mp49.7 MB
~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/07 - Activating vulnerability scanning.srt3.8 KB
~Get Your Files Here !/07 - 6. Threat Hunting/01 - Understanding Malcolm for threat hunting.mp43.1 MB
~Get Your Files Here !/07 - 6. Threat Hunting/01 - Understanding Malcolm for threat hunting.srt2.2 KB
~Get Your Files Here !/07 - 6. Threat Hunting/02 - Installing Malcolm.mp45 MB
~Get Your Files Here !/07 - 6. Threat Hunting/02 - Installing Malcolm.srt3.8 KB
~Get Your Files Here !/07 - 6. Threat Hunting/03 - A tour of Cyberville with Malcolm.mp414.2 MB
~Get Your Files Here !/07 - 6. Threat Hunting/03 - A tour of Cyberville with Malcolm.srt7.8 KB
~Get Your Files Here !/07 - 6. Threat Hunting/04 - Threat hunting with Malcolm.mp420.6 MB
~Get Your Files Here !/07 - 6. Threat Hunting/04 - Threat hunting with Malcolm.srt8.1 KB
~Get Your Files Here !/07 - 6. Threat Hunting/05 - Deep diving with Malcolm's Arkime.mp415.7 MB
~Get Your Files Here !/07 - 6. Threat Hunting/05 - Deep diving with Malcolm's Arkime.srt5.6 KB
~Get Your Files Here !/08 - 7. Threat Intelligence/01 - Exchanging threat intelligence.mp44.3 MB
~Get Your Files Here !/08 - 7. Threat Intelligence/01 - Exchanging threat intelligence.srt2.9 KB
~Get Your Files Here !/08 - 7. Threat Intelligence/02 - Installing OpenTaxii.mp417.2 MB
~Get Your Files Here !/08 - 7. Threat Intelligence/02 - Installing OpenTaxii.srt7.6 KB
~Get Your Files Here !/08 - 7. Threat Intelligence/03 - Working with the cabby client library.mp415.8 MB
~Get Your Files Here !/08 - 7. Threat Intelligence/03 - Working with the cabby client library.srt6.8 KB

Alternative Torrents for 'CourseWikia.com Linkedin Complete Guide to Kali Purple'.

There are no alternative torrents found.