Torrent details for "[Packt] Cyber Threat Hunting [FCO] TGx Exclusive"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
978.49 MB
Info Hash:
0f3e8ae8a4fea8233e5980de6a6d329a2bc98911
Added By:
Added:  
05-02-2019 14:18
Views:
1,119
Health:
Seeds:
1
Leechers:
0
Completed:
20
wide




Description
wide
Image error


By: Sunil Gupta
Released: Thursday, January 31, 2019 New Release!
Torrent Contains: 46 Files, 7 Folders
Course Source: https://www.packtpub.com/networking-and-servers/cyber-threat-hunting-video

Gain expertise in analyzing your network while tracking various security threats

Video Details

ISBN 9781838557812
Course Length 3 hours 7 minutes

Table of Contents


• THREAT HUNTING INTRODUCTION
• THREAT HUNTING METHODOLOGY
• NETWORK HUNTING
• SUSPICIOUS NETWORK TRAFFIC HUNTING
• HUNTING WEB SHELLS
• ENDPOINT HUNTING
• HUNTING MALWARE

Video Description

Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them.

In this course, you will get to know about the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to minimize incidents. You'll perform incident response and hunt across hundreds of unique systems using PowerShell and identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connection residues.
You will determine how the breach occurred by identifying the beachhead and spear phishing attack mechanisms. You will be able to use memory analysis, incident response, and threat hunting tools to detect malware, attacker command lines, network connections, and more.

Style and Approach

With extensive theoretical exploration on the subject in the initial half of the course, the concepts are demonstrated effectively with the help of detailed practical sessions in the second half of the course.

What You Will Learn

• Be vigilant and keep your systems secure before they’re infested
• Proactively hunt for threats in your organization’s network
• Use threat intelligence to hunt for known threats
• Analyze network traffic and identify malicious traffic with ease
• Perform memory analysis using Redline and Volatility to identify malware attacks

Authors

Sunil Gupta

A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of, many key organizations.
Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. His primary passion is cyber security, but he understands that, to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber-security expert, and always exceeds his clients' expectations.
Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.

For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/


Image error

Image error

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes