Cyber Security SOC Analyst Training - SIEM (Splunk) -@udemyrip
File List
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/008 Understanding DNS Logs [email protected] 1.3 GB
- 07 - Introduction to threat Hunting -@udemyrip/002 hreat Hunting - Brute Force Attack [email protected] 1.2 GB
- 03 - Cyber Security Concepts -@udemyrip/008 OWASP Top 10 [email protected] 1.2 GB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/013 Understanding Antivirus Logs [email protected] 1.1 GB
- 07 - Introduction to threat Hunting -@udemyrip/001 Threat Hunting - Scanning attack on Web Server [email protected] 1.0 GB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/005 Incident Handling stages [email protected] 964.2 MB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/006 SIEM Architecture [email protected] 963.1 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/007 DNS Profiling Scenarios Part 2 [email protected] 941.5 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/012 Windows Sysmon Log Analysis [email protected] 919.8 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/003 Splunk Dashboard creation - Firewall Part 1 [email protected] 909.8 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/011 Understanding Windows Log [email protected] 891.4 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/006 DNS Profiling Scenarios Part 1 [email protected] 889.7 MB
- 02 - Networking Concepts -@udemyrip/007 Understanding HTTP protocol Part 1 [email protected] 853.4 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/002 SIEM Use cases Part 2 [email protected] 802.2 MB
- 03 - Cyber Security Concepts -@udemyrip/002 Defence InDeapth Approach [email protected] 770.1 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/001 Uploading Demo Logs to Splunk and firewall Log analysis [email protected] 759.3 MB
- 02 - Networking Concepts -@udemyrip/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services [email protected] 747.3 MB
- 08 - Discussion on Real Time Activities -@udemyrip/001 Discussion on Real Time Activities [email protected] 740.6 MB
- 02 - Networking Concepts -@udemyrip/012 Indept on Port Numbers - Part 1 [email protected] 711.6 MB
- 02 - Networking Concepts -@udemyrip/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1 [email protected] 711.6 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/002 Understanding Firewall Logs [email protected] 710.9 MB
- 03 - Cyber Security Concepts -@udemyrip/001 Introduction to Security CIA Encryption and Hashing [email protected] 698.0 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/004 Malware outbreak Analysis [email protected] 676.9 MB
- 02 - Networking Concepts -@udemyrip/005 ISO Model Recap AND Public_Private Address Range [email protected] 662.7 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/001 SIEM Use cases Part 1 [email protected] 655.1 MB
- 07 - Introduction to threat Hunting -@udemyrip/003 Email Header Analysis [email protected] 653.3 MB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/005 SOC Roles and Responsabilities [email protected] 639.1 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/010 Understanding HTTP Logs Part 2 [email protected] 615.0 MB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/001 Splunk installation [email protected] 600.1 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/005 IDS Log Analysis [email protected] 582.3 MB
- 02 - Networking Concepts -@udemyrip/001 Introduction to organization Network [email protected] 577.5 MB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/003 SIEM Use cases Part 3 [email protected] 567.2 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/004 Splunk Dashboard creation - Firewall Part 2 [email protected] 543.5 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/009 Understanding HTTP Logs Part 1 [email protected] 535.7 MB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/003 Introduction to Splunk [email protected] 522.8 MB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/004 SOC Process [email protected] 519.4 MB
- 09 - Course wrapup -@udemyrip/001 Course Wrapup [email protected] 513.6 MB
- 02 - Networking Concepts -@udemyrip/013 Indept on Port Numbers - Part 2 [email protected] 480.3 MB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/002 Splunk Universal Farward Installation [email protected] 475.7 MB
- 02 - Networking Concepts -@udemyrip/011 Windows OS - Computer Management, Utilities [email protected] 469.7 MB
- 03 - Cyber Security Concepts -@udemyrip/004 Brute Force Attack and Types [email protected] 469.4 MB
- 02 - Networking Concepts -@udemyrip/006 Introduction to web technology [email protected] 451.4 MB
- 02 - Networking Concepts -@udemyrip/010 Introduction to Windows - Types of Wiondows OS and Permissions [email protected] 445.9 MB
- 01 - Course Introduction -@udemyrip/001 1. Cyber Security Analyst - Intro to Course Content [email protected] 389.5 MB
- 03 - Cyber Security Concepts -@udemyrip/003 Cyber Kill chain OR Phases of Attack.mp4 [email protected] 386.5 MB
- 02 - Networking Concepts -@udemyrip/004 ISO Model - Session, Transport, Network and DataLink Layer Basics [email protected] 364.9 MB
- 02 - Networking Concepts -@udemyrip/003 ISO Model - Application and Presentation Layer Basics [email protected] 329.4 MB
- 03 - Cyber Security Concepts -@udemyrip/007 Malware and its Types [email protected] 309.4 MB
- 03 - Cyber Security Concepts -@udemyrip/006 DNS Tunneling Attack [email protected] 309.0 MB
- 03 - Cyber Security Concepts -@udemyrip/005 Phishing and Spoofing Attacks [email protected] 284.3 MB
- 02 - Networking Concepts -@udemyrip/002 Introduction to organization Network [email protected] 221.9 MB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/013 Understanding Antivirus Logs_en [email protected] 182.4 KB
- 03 - Cyber Security Concepts -@udemyrip/008 OWASP Top 10_en [email protected] 150.5 KB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/006 SIEM Architecture_en [email protected] 148.2 KB
- 03 - Cyber Security Concepts -@udemyrip/001 Introduction to Security CIA Encryption and Hashing_en [email protected] 127.6 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/008 Understanding DNS Logs_en [email protected] 120.1 KB
- 07 - Introduction to threat Hunting -@udemyrip/001 Threat Hunting - Scanning attack on Web Server_en [email protected] 119.5 KB
- 07 - Introduction to threat Hunting -@udemyrip/002 hreat Hunting - Brute Force Attack_en [email protected] 110.9 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/001 Uploading Demo Logs to Splunk and firewall Log analysis_en [email protected] 108.8 KB
- 02 - Networking Concepts -@udemyrip/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services_en [email protected] 106.4 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/011 Understanding Windows Log_en [email protected] 106.1 KB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/001 Splunk installation_en [email protected] 105.3 KB
- 03 - Cyber Security Concepts -@udemyrip/002 Defence InDeapth Approach_en [email protected] 102.7 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/003 Splunk Dashboard creation - Firewall Part 1_en [email protected] 102.1 KB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/005 SOC Roles and Responsabilities_en [email protected] 100.6 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/005 Incident Handling stages_en [email protected] 94.8 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/012 Windows Sysmon Log Analysis_en [email protected] 94.6 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/006 DNS Profiling Scenarios Part 1_en [email protected] 93.7 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/004 Malware outbreak Analysis_en [email protected] 93.7 KB
- 02 - Networking Concepts -@udemyrip/005 ISO Model Recap AND Public_Private Address Range_en [email protected] 92.0 KB
- 02 - Networking Concepts -@udemyrip/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1_en [email protected] 91.2 KB
- 02 - Networking Concepts -@udemyrip/012 Indept on Port Numbers - Part 1_en [email protected] 91.2 KB
- 08 - Discussion on Real Time Activities -@udemyrip/001 Discussion on Real Time Activities_en [email protected] 89.1 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/007 DNS Profiling Scenarios Part 2_en [email protected] 89.1 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/001 SIEM Use cases Part 1_en [email protected] 84.6 KB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/004 SOC Process_en [email protected] 83.3 KB
- 02 - Networking Concepts -@udemyrip/011 Windows OS - Computer Management, Utilities_en [email protected] 82.9 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/004 Splunk Dashboard creation - Firewall Part 2_en [email protected] 82.2 KB
- 02 - Networking Concepts -@udemyrip/007 Understanding HTTP protocol Part 1_en [email protected] 82.0 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/002 Understanding Firewall Logs_en [email protected] 81.2 KB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/002 Splunk Universal Farward Installation_en [email protected] 80.6 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/005 IDS Log Analysis_en [email protected] 78.6 KB
- 02 - Networking Concepts -@udemyrip/001 Introduction to organization Network_en [email protected] 71.8 KB
- 03 - Cyber Security Concepts -@udemyrip/004 Brute Force Attack and Types_en [email protected] 71.1 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/010 Understanding HTTP Logs Part 2_en [email protected] 70.5 KB
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/003 Introduction to Splunk_en [email protected] 70.3 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/002 SIEM Use cases Part 2_en [email protected] 67.6 KB
- 01 - Course Introduction -@udemyrip/001 1. Cyber Security Analyst - Intro to Course Content_en [email protected] 66.6 KB
- 07 - Introduction to threat Hunting -@udemyrip/003 Email Header Analysis_en [email protected] 63.6 KB
- 02 - Networking Concepts -@udemyrip/013 Indept on Port Numbers - Part 2_en [email protected] 63.3 KB
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/003 SIEM Use cases Part 3_en [email protected] 63.1 KB
- 03 - Cyber Security Concepts -@udemyrip/003 Cyber Kill chain OR Phases of Attack.mp4_en [email protected] 62.6 KB
- 02 - Networking Concepts -@udemyrip/010 Introduction to Windows - Types of Wiondows OS and Permissions_en [email protected] 61.8 KB
- 09 - Course wrapup -@udemyrip/001 Course Wrapup_en [email protected] 58.1 KB
- 02 - Networking Concepts -@udemyrip/004 ISO Model - Session, Transport, Network and DataLink Layer Basics_en [email protected] 56.5 KB
- 03 - Cyber Security Concepts -@udemyrip/006 DNS Tunneling Attack_en [email protected] 53.7 KB
- 02 - Networking Concepts -@udemyrip/006 Introduction to web technology_en [email protected] 52.0 KB
- 03 - Cyber Security Concepts -@udemyrip/005 Phishing and Spoofing Attacks_en [email protected] 51.7 KB
- 03 - Cyber Security Concepts -@udemyrip/007 Malware and its Types_en [email protected] 44.6 KB
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/009 Understanding HTTP Logs Part 1_en [email protected] 44.5 KB
- 02 - Networking Concepts -@udemyrip/003 ISO Model - Application and Presentation Layer Basics_en [email protected] 44.4 KB
- 02 - Networking Concepts -@udemyrip/002 Introduction to organization Network_en [email protected] 28.3 KB
- Credits.txt 99 bytes
- 01 - Course Introduction -@udemyrip/@udemyrip.txt 99 bytes
- 01 - Course Introduction -@udemyrip/Credits.txt 99 bytes
- 02 - Networking Concepts -@udemyrip/@udemyrip.txt 99 bytes
- 02 - Networking Concepts -@udemyrip/Credits.txt 99 bytes
- 03 - Cyber Security Concepts -@udemyrip/@udemyrip.txt 99 bytes
- 03 - Cyber Security Concepts -@udemyrip/Credits.txt 99 bytes
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/@udemyrip.txt 99 bytes
- 04 - Understanding Splunk, SIEM and SOC Process -@udemyrip/Credits.txt 99 bytes
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/@udemyrip.txt 99 bytes
- @udemyrip.txt 99 bytes
- 05 - Understanding Various Logs, Dashboard and Alert creations -@udemyrip/Credits.txt 99 bytes
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/@udemyrip.txt 99 bytes
- 06 - Walkthrough SIEM usecases and Incident Handling Stages -@udemyrip/Credits.txt 99 bytes
- 07 - Introduction to threat Hunting -@udemyrip/@udemyrip.txt 99 bytes
- 07 - Introduction to threat Hunting -@udemyrip/Credits.txt 99 bytes
- 08 - Discussion on Real Time Activities -@udemyrip/@udemyrip.txt 99 bytes
- 08 - Discussion on Real Time Activities -@udemyrip/Credits.txt 99 bytes
- 09 - Course wrapup -@udemyrip/@udemyrip.txt 99 bytes
- 09 - Course wrapup -@udemyrip/Credits.txt 99 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.