[ WebToolTip.com ] Advanced Intrusion Detection by InfoSec
File List
- ~Get Your Files Here !/07 - 6. Data Management/03 - Data mover example.mp4 55.5 MB
- ~Get Your Files Here !/08 - 7. Tactical Data/03 - Crafting detections.mp4 55.4 MB
- ~Get Your Files Here !/07 - 6. Data Management/01 - Data management overview.mp4 47.4 MB
- ~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/02 - Honeypot usage.mp4 47.0 MB
- ~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/02 - Adversary tactics, techniques, and procedures (TTPs).mp4 46.0 MB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/06 - VirtualBox installation.mp4 40.6 MB
- ~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/03 - Leveraging threat intelligence.mp4 40.5 MB
- ~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/02 - IDS and IPS rules.mp4 33.7 MB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/01 - Detection lab overview.mp4 33.7 MB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/03 - Tools and technology.mp4 32.4 MB
- ~Get Your Files Here !/05 - 4. Anomaly Detection/02 - Anomaly detection techniques.mp4 31.7 MB
- ~Get Your Files Here !/08 - 7. Tactical Data/01 - Detection life cycle.mp4 31.1 MB
- ~Get Your Files Here !/08 - 7. Tactical Data/02 - Data dictionary and data models.mp4 30.3 MB
- ~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/01 - What is cyber deception.mp4 28.6 MB
- ~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/01 - Network-based vs. host-based.mp4 27.7 MB
- ~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/01 - What is the ATT&CK Matrix.mp4 25.7 MB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/01 - What is intrusion detection.mp4 25.2 MB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/04 - Intrusion detection requirements.mp4 25.1 MB
- ~Get Your Files Here !/07 - 6. Data Management/04 - Data science and cybersecurity.mp4 23.8 MB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/03 - Types of intrusion detection.mp4 22.7 MB
- ~Get Your Files Here !/05 - 4. Anomaly Detection/01 - Anomaly detection overview.mp4 22.1 MB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/02 - Detection methodology.mp4 20.9 MB
- ~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/03 - Wazuh (HIDS overview).mp4 19.3 MB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/07 - Set up and provision Security Onion.mp4 17.0 MB
- ~Get Your Files Here !/07 - 6. Data Management/02 - Data collection methods.mp4 15.3 MB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/04 - Documentation.mp4 14.1 MB
- ~Get Your Files Here !/05 - 4. Anomaly Detection/03 - Issues with anomaly detection.mp4 11.3 MB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/02 - Lab use cases.mp4 9.6 MB
- ~Get Your Files Here !/01 - Introduction/01 - Introduction to advanced intrusion detection.mp4 7.0 MB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/05 - Intro to building a security lab.mp4 6.9 MB
- ~Get Your Files Here !/07 - 6. Data Management/01 - Data management overview.srt 48.9 KB
- ~Get Your Files Here !/08 - 7. Tactical Data/03 - Crafting detections.srt 41.8 KB
- ~Get Your Files Here !/07 - 6. Data Management/03 - Data mover example.srt 39.3 KB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/01 - Detection lab overview.srt 37.4 KB
- ~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/02 - Honeypot usage.srt 36.1 KB
- ~Get Your Files Here !/08 - 7. Tactical Data/01 - Detection life cycle.srt 34.5 KB
- ~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/02 - IDS and IPS rules.srt 29.9 KB
- ~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/01 - What is cyber deception.srt 28.0 KB
- ~Get Your Files Here !/05 - 4. Anomaly Detection/02 - Anomaly detection techniques.srt 27.4 KB
- ~Get Your Files Here !/08 - 7. Tactical Data/02 - Data dictionary and data models.srt 26.2 KB
- ~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/01 - What is the ATT&CK Matrix.srt 26.0 KB
- ~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/01 - Network-based vs. host-based.srt 25.5 KB
- ~Get Your Files Here !/07 - 6. Data Management/04 - Data science and cybersecurity.srt 24.0 KB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/04 - Intrusion detection requirements.srt 22.2 KB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/06 - VirtualBox installation.srt 22.0 KB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/01 - What is intrusion detection.srt 21.1 KB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/02 - Detection methodology.srt 21.1 KB
- ~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/03 - Leveraging threat intelligence.srt 20.5 KB
- ~Get Your Files Here !/05 - 4. Anomaly Detection/01 - Anomaly detection overview.srt 20.3 KB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/03 - Tools and technology.srt 19.8 KB
- ~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/02 - Adversary tactics, techniques, and procedures (TTPs).srt 19.8 KB
- ~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/03 - Types of intrusion detection.srt 18.7 KB
- ~Get Your Files Here !/07 - 6. Data Management/02 - Data collection methods.srt 16.2 KB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/07 - Set up and provision Security Onion.srt 15.9 KB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/04 - Documentation.srt 13.1 KB
- ~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/03 - Wazuh (HIDS overview).srt 12.2 KB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/02 - Lab use cases.srt 10.8 KB
- ~Get Your Files Here !/05 - 4. Anomaly Detection/03 - Issues with anomaly detection.srt 10.0 KB
- ~Get Your Files Here !/03 - 2. Home Lab Setup/05 - Intro to building a security lab.srt 8.2 KB
- ~Get Your Files Here !/01 - Introduction/01 - Introduction to advanced intrusion detection.srt 7.6 KB
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.