Hands-On Incident Response Fundamentals

seeders: 17
leechers: 5
updated:
Added by Source1337 in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...

Files

Hands-On Incident Response Fundamentals 03. Common IR Tasks- An Overview
  • 04. Demo- Reviewing and Parsing Logs.mp4 (80.2 MB)
  • 00. Module Intro.mp4 (1.7 MB)
  • 00. Module Intro.srt (2.3 KB)
  • 01. The Groundwork- Terms and Definitions.mp4 (5.9 MB)
  • 01. The Groundwork- Terms and Definitions.srt (6.4 KB)
  • 02. Logs- Convenient Morsels of Evidence.mp4 (13.1 MB)
  • 02. Logs- Convenient Morsels of Evidence.srt (12.1 KB)
  • 03. Demo- Understanding and Fielding Alerts.mp4 (37.0 MB)
  • 03. Demo- Understanding and Fielding Alerts.srt (13.6 KB)
  • 04. Demo- Reviewing and Parsing Logs.srt (37.3 KB)
  • 05. Module Wrap-up.mp4 (1.5 MB)
  • 05. Module Wrap-up.srt (1.9 KB)
  • Linux Tails Operating System.html (0.1 KB)
00. Course Overview
  • 00. Course Overview.srt (2.5 KB)
  • 00. Course Overview.mp4 (4.4 MB)
01. Incident Response- Job Security at Its Best
  • 6 Simple Memory Techniques - All Hacker use.html (0.1 KB)
  • 00. Course Introduction.mp4 (10.5 MB)
  • 00. Course Introduction.srt (5.5 KB)
  • 01. Defining IR, Course Pre-reqs, and Demo Setup.mp4 (3.7 MB)
  • 01. Defining IR, Course Pre-reqs, and Demo Setup.srt (4.9 KB)
  • 02. The Talent Divide.mp4 (6.7 MB)
  • 02. The Talent Divide.srt (7.5 KB)
  • 03. Who Does the Things-.mp4 (6.9 MB)
  • 03. Who Does the Things-.srt (7.1 KB)
  • 04. Module Wrap-up.mp4 (1.5 MB)
  • 04. Module Wrap-up.srt (1.6 KB)
02. The Nature of the Threat- Why Are We Here
  • 00. Module Intro.mp4 (2.1 MB)
  • 00. Module Intro.srt (2.4 KB)
  • 01. The Threat Is Real.mp4 (7.4 MB)
  • 01. The Threat Is Real.srt (8.0 KB)
  • 02. Attackers- Commodity vs. APT.mp4 (7.4 MB)
  • 02. Attackers- Commodity vs. APT.srt (7.1 KB)
  • 03. APT Modus Operandi.mp4 (7.9 MB)
  • 03. APT Modus Operandi.srt (9.7 KB)
  • 04. APT Group Exposé- APT1 & APT28.mp4 (7.9 MB)
  • 04. APT Group Exposé- APT1 & APT28.srt (8.5 KB)
  • 05. The Importance of Operations Security.mp4 (9.2 MB)
  • 05. The Importance of Operations Security.srt (11.5 KB)
  • 06. Demo- VirusTotal and OpSec Considerations.mp4 (39.2 MB)
  • 06. Demo- VirusTotal and OpSec Considerations.srt (21.0 KB)
04. Analyzing Files- Character Encodings, Carrier Files, and Hex Editors
  • 00. Module Intro.mp4 (1.7 MB)
  • 00. Module Intro.srt (1.9 KB)
  • 01. Character Encodings Overview.mp4 (5.3 MB)
  • 01. Character Encodings Overview.srt (3.5 KB)
  • 02. ASCII and Unicode.mp4 (10.5 MB)
  • 02. ASCII and Unicode.srt (7.8 KB)
  • 03. Much Ado About Base64.mp4 (6.0 MB)
  • 03. Much Ado About Base64.srt (5.2 KB)
  • 04. Demo- Base64 Encoding & Decoding.mp4 (19.4 MB)
  • 04. Demo- Base64 Encoding & Decoding.srt (10.5 KB)
  • 05. Hexadecimal and Character Encodings Comparison.mp4 (4.1 MB)
  • 05. Hexadecimal and Character Encodings Comparison.srt (3.6 KB)
  • 06. Understanding Carrier Files & File Signatures.mp4 (5.8 MB)
  • 06. Understanding Carrier Files & File Signatures.srt (6.2 KB)
  • 07. An Introduction to Hex Editors.mp4 (20.6 MB)
  • 07. An Introduction to Hex Editors.srt (11.2 KB)
  • 08. Demo- Using a Hex Editor to Identify Files.mp4 (66.8 MB)
  • 08. Demo- Using a Hex Editor to Identify Files.srt (13.3 KB)
  • 09. Module Wrap-up.mp4 (1.9 MB)
  • 09. Module Wrap-up.srt (2.1 KB)
05. Proactive IR- Intelligence, Indicators of Compromise, and Hunting
  • 00. Module Intro.mp4 (1.2 MB)
  • 00. Module Intro.srt (1.3 KB)
  • 01. The Types of Cyber Threat Intelligence.mp4 (4.6 MB)
  • 01. The Types of Cyber Threat Intelligence.srt (6.8 KB)
  • 02. Indicators of Compromise.mp4 (13.2 MB)
  • 02. Indicators of Compromise.srt (14.6 KB)
  • 03. Intel Sharing- IOC File Formats.mp4 (3.6 MB)
  • 03. Intel Sharing- IOC File Formats.srt (3.2 KB)
  • 04. Demo- OpenIOC Creation.mp4 (18.4 MB)
  • 04. Demo- OpenIOC Creation.srt (11.4 KB)
  • 05. Becoming an Intel Shop.mp4 (3.3 MB)
  • 05. Becoming an Intel Shop.srt (5.1 KB)
  • 06. Demo- Intel Pivoting Tools.mp4 (30.9 MB)
  • 06. Demo- Intel Pivoting Tools.srt (17.7 KB)
  • 07. Module Wrap-up.mp4 (1.3 MB)
  • 07. Module Wrap-up.srt (1.5 KB)
  • Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html (0.1 KB)
06. Course Review & Next Steps
  • 00. Module Overview.mp4 (1.0 MB)
  • 00. Module Overview.srt (1.6 KB)
  • 01. What's Next-.mp4 (9.1 MB)
  • 01. What's Next-.srt (11.4 KB)
  • 02. Course Wrap-up.mp4 (688.2 KB)
  • 02. Course Wrap-up.srt (1.0 KB)
  • LIFX 1100-Lumen.html (0.1 KB)
  • Yubico - YubiKey 5 NFC.html (0.1 KB)

Description

Quote:

We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️



Code:

Course info
Rating (105)
LevelBeginner
UpdatedJan 20, 2017
Duration3h 22m
Description
Most companies have a difficult time finding and hiring qualified Incident Response (IR) analysts. For that matter, many whom make their way into this hands-on security profession lack a solid foundation. In this course, Hands-On Incident Response Fundamentals, you'll be prepared to take on the task of IR by being presented with the core principles associated with the field. First, you'll learn to differentiate between commodity and Advanced Persistent Threat attack groups. Next, you'll discover how to review alerts, log files, and recognize common character encodings and carrier files. Finally, you'll cover how to use a hex editor effectively and work with indicators of compromise. By the end of this course, you'll be ready to take on the task of responding to events and incidents alike. Strong IR analysts must have a strong foundation, and that's exactly what this course intends to provide you.



Download torrent
483.9 MB
seeders:17
leechers:5
Hands-On Incident Response Fundamentals


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.moeking.me:6969/announce
http://tracker-cdn.moeking.me:2095/announce
udp://wassermann.online:6969/announce
udp://vibe.community:6969/announce
udp://valakas.rollo.dnsabr.com:2710/announce
udp://udp-tracker.shittyurl.org:6969/announce
udp://tracker1.bt.moack.co.kr:80/announce
udp://tracker0.ufibox.com:6969/announce
udp://tracker.zerobytes.xyz:1337/announce
udp://tracker.zemoj.com:6969/announce
udp://tracker.v6speed.org:6969/announce
udp://tracker.uw0.xyz:6969/announce
µTorrent compatible trackers list

Download torrent
483.9 MB
seeders:17
leechers:5
Hands-On Incident Response Fundamentals


Torrent hash: A93B607C3DD605164AE69DC1D63F3CCA853FE26E