Udemy - Cyber Security SOC Analyst Training - SIEM (Splunk) (11.2024)
File List
- 05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs.mp4 1.2 GB
- 07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack.mp4 1.2 GB
- 05 - Understanding Various Logs, Dashboard and Alert creations/013 Understanding Windows Event IDs.mp4 1.1 GB
- 03 - Cyber Security Concepts/006 OWASP Top 10.mp4 1.1 GB
- 05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Antivirus Logs.mp4 1.0 GB
- 07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server.mp4 1001.6 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages.mp4 931.1 MB
- 04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture.mp4 903.7 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/014 Windows Sysmon Log Analysis.mp4 880.8 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1.mp4 867.4 MB
- 02 - Networking Concepts/007 Understanding HTTP protocol Part 1.mp4 853.4 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Log.mp4 852.3 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2.mp4 779.1 MB
- 03 - Cyber Security Concepts/002 Defence InDeapth Approach.mp4 730.3 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis.mp4 715.2 MB
- 12 - Discussion on Real Time Activities/001 Discussion on Real Time Activities.mp4 704.4 MB
- 02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.mp4 702.0 MB
- 03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing.mp4 698.0 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs.mp4 683.3 MB
- 02 - Networking Concepts/012 Indept on Port Numbers - Part 1.mp4 674.1 MB
- 02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1.mp4 674.0 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis.mp4 639.2 MB
- 07 - Introduction to threat Hunting/003 Email Header Analysis.mp4 630.0 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1.mp4 617.1 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1.mp4 589.4 MB
- 02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range.mp4 585.1 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2.mp4 583.7 MB
- 02 - Networking Concepts/001 Introduction to organization Network.mp4 577.5 MB
- 09 - SIEM Interview Questions and Answers/001 SIEM Dashboard and Use cases.mp4 564.3 MB
- 04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation.mp4 551.6 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis.mp4 546.0 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3.mp4 537.9 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1.mp4 525.6 MB
- 04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities.mp4 508.0 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2.mp4 506.1 MB
- 04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk.mp4 497.3 MB
- 13 - Course wrapup/001 Course Wrapup.mp4 490.8 MB
- 04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process.mp4 464.9 MB
- 02 - Networking Concepts/013 Indept on Port Numbers - Part 2.mp4 454.2 MB
- 02 - Networking Concepts/006 Introduction to web technology.mp4 451.4 MB
- 03 - Cyber Security Concepts/004 Brute Force Attack and Types.mp4 436.6 MB
- 02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions.mp4 419.9 MB
- 04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation.mp4 416.7 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2.mp4 395.8 MB
- 01 - Course Introduction/001 1. Cyber Security Analyst - Intro to Course Content.mp4 389.5 MB
- 02 - Networking Concepts/011 Windows OS - Computer Management, Utilities.mp4 374.2 MB
- 11 - SIEM Alert Analysis Interview Questions/004 How do you analyze Phishing email attack.mp4 358.0 MB
- 02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics.mp4 342.6 MB
- 02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics.mp4 329.4 MB
- 03 - Cyber Security Concepts/008 Malware and its Types.mp4 290.2 MB
- 11 - SIEM Alert Analysis Interview Questions/002 what will you do if receive a Malware Attack Alert.mp4 278.7 MB
- 03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks.mp4 260.2 MB
- 03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4.mp4 222.1 MB
- 02 - Networking Concepts/002 Introduction to organization Network.mp4 221.9 MB
- 11 - SIEM Alert Analysis Interview Questions/005 How do you Analyze SQL Injection attack.mp4 213.2 MB
- 08 - Networking and Security Interview Questions/015 SIEM related interview topics.mp4 182.2 MB
- 03 - Cyber Security Concepts/007 DNS Tunneling Attack.mp4 180.0 MB
- 09 - SIEM Interview Questions and Answers/002 What are different event logs you analyze.mp4 163.3 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/009 What are the steps in Incident Response Life Cycle.mp4 148.4 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/010 Can you please explain what you will do after getting an alert (Alert IR FLow).mp4 148.3 MB
- 08 - Networking and Security Interview Questions/007 What is Symmetric and Asymmetric Encryption.mp4 137.0 MB
- 08 - Networking and Security Interview Questions/010 How do you stay up to date on Cyber Security news and latest attacks.mp4 113.8 MB
- 08 - Networking and Security Interview Questions/014 What is Brute Force Attack.mp4 109.2 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/002 What are various Security Devices used in your orrganization.mp4 84.6 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/005 What are the fields in Sample Incident Ticket - ServiceNow.mp4 79.6 MB
- 11 - SIEM Alert Analysis Interview Questions/003 How do you analyze if receive a Brute Force Attack Alert.mp4 78.4 MB
- 11 - SIEM Alert Analysis Interview Questions/006 How do you analyze DDOS Attack.mp4 75.7 MB
- 08 - Networking and Security Interview Questions/002 what is P address and IP address classification.mp4 71.8 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/004 What are the Roles and Responsibilities of SOC Engineer.mp4 70.2 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/003 How does a SOC Team manage or work in an Organization.mp4 49.8 MB
- 08 - Networking and Security Interview Questions/003 What is NAT and PAT.mp4 49.0 MB
- 08 - Networking and Security Interview Questions/004 Tell me few port numbers which you know.mp4 40.4 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/007 What is False Positive Analysis or what are various outcomes of Analysis.mp4 39.1 MB
- 08 - Networking and Security Interview Questions/012 Explain SQL Injection Attack.mp4 38.0 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/011 How will you manage work in shifts.mp4 37.0 MB
- 11 - SIEM Alert Analysis Interview Questions/001 How do you handle P1, P2, P3 and P4 Incidents.mp4 31.8 MB
- 08 - Networking and Security Interview Questions/013 What is botnet.mp4 28.4 MB
- 08 - Networking and Security Interview Questions/008 Explain CIA triad.mp4 28.1 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/001 What is Security Operation Center.mp4 21.9 MB
- 11 - SIEM Alert Analysis Interview Questions/007 How do you analyze if a suspicious IP detected in outbound traffic.mp4 21.5 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/008 How many Logs sources are there in your organization.mp4 18.1 MB
- 08 - Networking and Security Interview Questions/009 What is the difference in between SSL and HTTPS.mp4 15.7 MB
- 10 - SOC Process Interview Questions and Day to Day Activities/006 what are Service level Agreements for the SOC Incidents.mp4 15.7 MB
- 08 - Networking and Security Interview Questions/001 what are networking devices.mp4 11.3 MB
- 08 - Networking and Security Interview Questions/011 What is the difference between Virus and Warm.mp4 9.0 MB
- 08 - Networking and Security Interview Questions/006 How VPN works.mp4 8.6 MB
- 08 - Networking and Security Interview Questions/005 How a Firewall Works.mp4 4.9 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Antivirus Logs.srt 250.0 KB
- 11 - SIEM Alert Analysis Interview Questions/003 Brute-Force-2-1.png 232.6 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/013 Understanding Windows Event IDs.srt 204.2 KB
- 03 - Cyber Security Concepts/006 OWASP Top 10.srt 203.8 KB
- 04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture.srt 202.3 KB
- 11 - SIEM Alert Analysis Interview Questions/002 15-Malware2.png 197.7 KB
- 03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing.srt 178.1 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/005 6-SOC-Incident-Document.png 176.2 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs.srt 175.2 KB
- 11 - SIEM Alert Analysis Interview Questions/005 sql-injection.png 174.6 KB
- 07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server.srt 165.7 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis.srt 160.9 KB
- 07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack.srt 157.5 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1.srt 156.0 KB
- 02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.srt 151.1 KB
- 04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation.srt 149.1 KB
- 11 - SIEM Alert Analysis Interview Questions/006 DDOS-Analysis.png 148.2 KB
- 11 - SIEM Alert Analysis Interview Questions/004 Phishing-Attack-Analysis.png 147.1 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Log.srt 146.9 KB
- 03 - Cyber Security Concepts/002 Defence InDeapth Approach.srt 141.2 KB
- 04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities.srt 137.9 KB
- 09 - SIEM Interview Questions and Answers/001 SIEM Dashboard and Use cases.srt 135.4 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1.srt 135.4 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/014 Windows Sysmon Log Analysis.srt 132.5 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages.srt 130.3 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2.srt 128.3 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis.srt 127.5 KB
- 02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range.srt 127.3 KB
- 12 - Discussion on Real Time Activities/001 Discussion on Real Time Activities.srt 125.5 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs.srt 123.7 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis.srt 122.3 KB
- 02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1.srt 120.9 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1.srt 120.9 KB
- 02 - Networking Concepts/012 Indept on Port Numbers - Part 1.srt 120.9 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2.srt 120.2 KB
- 02 - Networking Concepts/007 Understanding HTTP protocol Part 1.srt 118.2 KB
- 04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process.srt 115.5 KB
- 04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation.srt 113.3 KB
- 11 - SIEM Alert Analysis Interview Questions/007 Suspecious-IP-outbound.png 109.4 KB
- 08 - Networking and Security Interview Questions/015 SIEM related interview topics.srt 109.0 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2.srt 104.7 KB
- 04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk.srt 104.5 KB
- 02 - Networking Concepts/001 Introduction to organization Network.srt 101.6 KB
- 03 - Cyber Security Concepts/004 Brute Force Attack and Types.srt 100.5 KB
- 02 - Networking Concepts/011 Windows OS - Computer Management, Utilities.srt 99.1 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2.srt 99.0 KB
- 02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions.srt 92.0 KB
- 07 - Introduction to threat Hunting/003 Email Header Analysis.srt 90.3 KB
- 03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4.srt 89.9 KB
- 02 - Networking Concepts/013 Indept on Port Numbers - Part 2.srt 87.7 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3.srt 87.2 KB
- 01 - Course Introduction/001 1. Cyber Security Analyst - Intro to Course Content.srt 85.5 KB
- 13 - Course wrapup/001 Course Wrapup.srt 84.8 KB
- 02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics.srt 79.4 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/002 2-Org-Architecture.png 79.1 KB
- 03 - Cyber Security Concepts/007 DNS Tunneling Attack.srt 74.2 KB
- 02 - Networking Concepts/006 Introduction to web technology.srt 73.1 KB
- 03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks.srt 71.0 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1.srt 65.6 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/003 3-SOC-Team-Architecture.png 63.7 KB
- 03 - Cyber Security Concepts/008 Malware and its Types.srt 62.1 KB
- 02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics.srt 61.9 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/004 4-Roles-and-Responsibilities.png 61.2 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/002 What are various Security Devices used in your orrganization.srt 56.3 KB
- 11 - SIEM Alert Analysis Interview Questions/004 How do you analyze Phishing email attack.srt 54.0 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/010 11-SOC-Analysis-IR-FlowChart.png 48.4 KB
- 11 - SIEM Alert Analysis Interview Questions/002 what will you do if receive a Malware Attack Alert.srt 45.1 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/004 What are the Roles and Responsibilities of SOC Engineer.srt 44.6 KB
- 02 - Networking Concepts/002 Introduction to organization Network.srt 40.4 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/003 How does a SOC Team manage or work in an Organization.srt 38.6 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/005 What are the fields in Sample Incident Ticket - ServiceNow.srt 33.8 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/009 What are the steps in Incident Response Life Cycle.srt 31.8 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/010 Can you please explain what you will do after getting an alert (Alert IR FLow).srt 31.8 KB
- 08 - Networking and Security Interview Questions/014 What is Brute Force Attack.srt 28.8 KB
- 11 - SIEM Alert Analysis Interview Questions/003 How do you analyze if receive a Brute Force Attack Alert.srt 28.8 KB
- 08 - Networking and Security Interview Questions/007 What is Symmetric and Asymmetric Encryption.srt 27.1 KB
- 08 - Networking and Security Interview Questions/004 Tell me few port numbers which you know.srt 27.0 KB
- 11 - SIEM Alert Analysis Interview Questions/005 How do you Analyze SQL Injection attack.srt 26.4 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/007 8-False-Positive.png 26.1 KB
- 08 - Networking and Security Interview Questions/002 what is P address and IP address classification.srt 26.0 KB
- 09 - SIEM Interview Questions and Answers/002 What are different event logs you analyze.srt 24.5 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/008 9-No-of-Logs-Received.png 23.9 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/006 7-SLA-Service-Level-Agreements.png 23.9 KB
- 11 - SIEM Alert Analysis Interview Questions/006 How do you analyze DDOS Attack.srt 22.9 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/011 12-SOC-Shift-Handover-Document.png 22.3 KB
- 11 - SIEM Alert Analysis Interview Questions/001 12-SOC-Shift-Handover-Document.png 22.3 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/007 What is False Positive Analysis or what are various outcomes of Analysis.srt 22.3 KB
- 11 - SIEM Alert Analysis Interview Questions/001 How do you handle P1, P2, P3 and P4 Incidents.srt 21.1 KB
- 08 - Networking and Security Interview Questions/003 What is NAT and PAT.srt 18.6 KB
- 08 - Networking and Security Interview Questions/008 Explain CIA triad.srt 17.5 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/011 How will you manage work in shifts.srt 15.9 KB
- 08 - Networking and Security Interview Questions/010 How do you stay up to date on Cyber Security news and latest attacks.srt 14.7 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/001 What is Security Operation Center.srt 14.2 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/006 what are Service level Agreements for the SOC Incidents.srt 13.8 KB
- 08 - Networking and Security Interview Questions/012 Explain SQL Injection Attack.srt 12.2 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/009 10-Incident-Life-cycle.png 11.8 KB
- 10 - SOC Process Interview Questions and Day to Day Activities/008 How many Logs sources are there in your organization.srt 10.9 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations/013 Windows-Events.docx 8.1 KB
- 08 - Networking and Security Interview Questions/001 what are networking devices.srt 7.5 KB
- 08 - Networking and Security Interview Questions/006 How VPN works.srt 6.7 KB
- 08 - Networking and Security Interview Questions/013 What is botnet.srt 6.7 KB
- 11 - SIEM Alert Analysis Interview Questions/007 How do you analyze if a suspicious IP detected in outbound traffic.srt 6.2 KB
- 08 - Networking and Security Interview Questions/011 What is the difference between Virus and Warm.srt 4.3 KB
- 08 - Networking and Security Interview Questions/005 How a Firewall Works.srt 3.4 KB
- 08 - Networking and Security Interview Questions/009 What is the difference in between SSL and HTTPS.srt 3.1 KB
- 02 - Networking Concepts/external-links.txt 210 bytes
- 02 - Networking Concepts/004 Resource-File.txt 126 bytes
- 02 - Networking Concepts/004 Resources-and-Notes.url 100 bytes
- 02 - Networking Concepts/005 Resources-and-Notes.url 100 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.