Threat Hunting: Endpoint Hunting

seeders: 29
leechers: 23
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 40
  • Language: English

Files

Threat Hunting - Endpoint Hunting [TutsNode.net] - Threat Hunting - Endpoint Hunting 5. Privilege Escalation and Credential Stealing
  • 1. Elevating Status.mp4 (45.8 MB)
  • 2. Demo - Mimikatz Execution.vtt (7.3 KB)
  • 1. Elevating Status.vtt (6.7 KB)
  • 3. Hunting with Expertise.vtt (1.7 KB)
  • 2. Demo - Mimikatz Execution.mp4 (24.5 MB)
  • 3. Hunting with Expertise.mp4 (15.3 MB)
4. Persistence
  • 4. Demo - Hunting for Scheduled Tasks.vtt (11.1 KB)
  • 2. Demo - Hunting for Registry Keys.vtt (6.2 KB)
  • 1. Digging In.vtt (3.7 KB)
  • 3. More Holes.vtt (1.8 KB)
  • 5. Looking Harder.vtt (1.0 KB)
  • 4. Demo - Hunting for Scheduled Tasks.mp4 (43.8 MB)
  • 1. Digging In.mp4 (23.5 MB)
  • 2. Demo - Hunting for Registry Keys.mp4 (19.3 MB)
  • 3. More Holes.mp4 (13.2 MB)
  • 5. Looking Harder.mp4 (8.4 MB)
1. Course Overview
  • 1. Course Overview.vtt (2.1 KB)
  • 1. Course Overview.mp4 (19.3 MB)
2. Endpoint Data Sets
  • 3. Demo - MITRE ATT&CK.vtt (8.2 KB)
  • 1. Who Are You and Where Are We Now.vtt (2.4 KB)
  • 4. Where’s the Data Come From.vtt (5.9 KB)
  • 5. Scaling and Obfuscation.vtt (2.2 KB)
  • 2. Approaching an Intel Based Threat Hunt.vtt (4.2 KB)
  • 4. Where’s the Data Come From.mp4 (35.8 MB)
  • 3. Demo - MITRE ATT&CK.mp4 (35.7 MB)
  • 2. Approaching an Intel Based Threat Hunt.mp4 (26.4 MB)
  • 1. Who Are You and Where Are We Now.mp4 (21.8 MB)
  • 5. Scaling and Obfuscation.mp4 (18.8 MB)
3. Access and Implants
  • 2. Demo - Process Execution.vtt (7.1 KB)
  • 1. Gaining Access.vtt (6.1 KB)
  • 4. Demo - LNK Analysis.vtt (5.4 KB)
  • 3. LNK Parser.vtt (2.2 KB)
  • 5. User Behavior.vtt (1.1 KB)
  • 1. Gaining Access.mp4 (38.7 MB)
  • 2. Demo - Process Execution.mp4 (26.8 MB)
  • 4. Demo - LNK Analysis.mp4 (21.3 MB)
  • 3. LNK Parser.mp4 (19.0 MB)
  • 5. User Behavior.mp4 (10.1 MB)
6. Impossible Login
  • 1. What Are They up To.vtt (5.5 KB)
  • 3. Caveats and Additional Metrics.vtt (5.3 KB)
  • 2. Demo - Detecting Impossible Travel.vtt (4.2 KB)
  • 4. Conclusion.vtt (1.0 KB)
  • 1. What Are They up To.mp4 (39.1 MB)
  • 3. Caveats and Additional Metrics.mp4 (29.3 MB)
  • 2. Demo - Detecting Impossible Travel.mp4 (14.3 MB)
  • 4. Conclusion.mp4 (8.9 MB)
  • TutsNode.net.txt (0.1 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
  • .pad
    • 0 (145.4 KB)
    • 1 (229.1 KB)
    • 2 (105.7 KB)
    • 3 (3.2 KB)
    • 4 (201.5 KB)
    • 5 (32.6 KB)
    • 6 (177.4 KB)
    • 7 (229.8 KB)
    • 8 (151.9 KB)
    • 9 (214.4 KB)
    • 10 (40.0 KB)
    • 11 (174.5 KB)
    • 12 (181.5 KB)
    • 13 (177.7 KB)
    • 14 (221.6 KB)
    • 15 (18.1 KB)
    • 16 (208.0 KB)
    • 17 (183.3 KB)
    • 18 (187.4 KB)
    • 19 (67.0 KB)
    • 20 (127.0 KB)
    • 21 (59.8 KB)

Description


Description

Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.

Finding anomalies or malicious artifacts without the help of alerts or defensive mechanisms can be very challenging. In this course, Threat Hunting: Endpoint Hunting, you’ll learn to hunt for specific APT techniques found in endpoint data. First, you’ll explore the various endpoint data sets and how to take advantage of correlation. Next, you’ll discover how to find artifacts related to initial access, implants, and persistence. Finally, you’ll learn how to detect behaviors related to privilege escalation and credential stealing. When you’re finished with this course, you’ll have the skills and knowledge of endpoint hunting needed to provide the proactive approach to security analytics.

Released 2/2023



Download torrent
562.4 MB
seeders:29
leechers:23
Threat Hunting: Endpoint Hunting


Trackers

tracker name
udp://open.stealth.si:80/announce
udp://tracker.tiny-vps.com:6969/announce
udp://fasttracker.foreverpirates.co:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://explodie.org:6969/announce
udp://tracker.cyberia.is:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.uw0.xyz:6969/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.dler.org:6969/announce
udp://9.rarbg.me:2970/announce
µTorrent compatible trackers list

Download torrent
562.4 MB
seeders:29
leechers:23
Threat Hunting: Endpoint Hunting


Torrent hash: F62D087E870F4E7177C72B83ACC24915D8792926