[ WebToolTip.com ] Udemy - Mastering Basics of Cyber Threat Intelligence
File List
- ~Get Your Files Here !/11 - Mapping Attacker Tactics with MITRE ATT&CK/3 - Using ATT_CK for Detection and Response.mp4 87.0 MB
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/3 - Recommending and Communicating Response Actions.mp4 81.8 MB
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/2 - Identifying IOCs and Profiling Threat Actors.mp4 80.5 MB
- ~Get Your Files Here !/11 - Mapping Attacker Tactics with MITRE ATT&CK/2 - Mapping Threat Indicators to ATT_CK TTPs.mp4 80.1 MB
- ~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/3 - Aggregating and Enriching Threat Indicators.mp4 78.8 MB
- ~Get Your Files Here !/8 - Integration and Functionality of TIPs/1 - TIP Integration Flow.mp4 59.3 MB
- ~Get Your Files Here !/1 - What is Cyber Threat Intelligence/1 - Intro Video to Course.mp4 59.1 MB
- ~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/4 - TIP vs. Other Cyber Threat Intelligence Tools.mp4 55.3 MB
- ~Get Your Files Here !/6 - Applying Security Principles in Practice/3 - Sharing Intelligence to Improve and Adapt.mp4 54.0 MB
- ~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/2 - Introduction to Key CTI Tools.mp4 53.2 MB
- ~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/4 - Continuous Access and Business Resilience.mp4 52.1 MB
- ~Get Your Files Here !/1 - What is Cyber Threat Intelligence/4 - Roles and Responsibilities of CTI.mp4 51.9 MB
- ~Get Your Files Here !/6 - Applying Security Principles in Practice/2 - Processing and Analysis.mp4 51.7 MB
- ~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/3 - Delivering Actionable Intelligence.mp4 51.2 MB
- ~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/3 - The Future of TIPs.mp4 50.0 MB
- ~Get Your Files Here !/5 - Risk Management - Turning Intelligence into Action/2 - Threat and Vulnerability Assessment.mp4 49.9 MB
- ~Get Your Files Here !/11 - Mapping Attacker Tactics with MITRE ATT&CK/1 - MITRE ATT_CK Framework Fundamentals.mp4 48.2 MB
- ~Get Your Files Here !/5 - Risk Management - Turning Intelligence into Action/3 - Selecting and Actioning Control Strategies.mp4 47.4 MB
- ~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/2 - Defining Threat Intelligence Platform (TIP).mp4 47.4 MB
- ~Get Your Files Here !/6 - Applying Security Principles in Practice/1 - Direction_ Discovery_ and Collection.mp4 47.3 MB
- ~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/2 - Enhancing Cyber Defense with TIPs.mp4 47.0 MB
- ~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/2 - Best Practices for Confidentiality.mp4 45.8 MB
- ~Get Your Files Here !/2 - Types of Threat Intelligence/1 - Tactical Threat Intelligence.mp4 45.7 MB
- ~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/1 - Direction_ Discovery_ and Collection.mp4 45.3 MB
- ~Get Your Files Here !/2 - Types of Threat Intelligence/2 - Operational Threat Intelligence.mp4 45.2 MB
- ~Get Your Files Here !/5 - Risk Management - Turning Intelligence into Action/1 - Identifying Assets at Risk.mp4 45.0 MB
- ~Get Your Files Here !/8 - Integration and Functionality of TIPs/2 - Real-Time Monitoring and Feedback Loops.mp4 44.8 MB
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/7 - Course Wrap-up Video.mp4 43.8 MB
- ~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/1 - TIPs in Action.mp4 43.1 MB
- ~Get Your Files Here !/2 - Types of Threat Intelligence/3 - Strategic Threat Intelligence.mp4 43.1 MB
- ~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/1 - Introduction.mp4 42.1 MB
- ~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/3 - Principles of Data and Information Integrity.mp4 41.6 MB
- ~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/3 - Capabilities of a TIP.mp4 41.1 MB
- ~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/2 - Processing and Analysis.mp4 40.9 MB
- ~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/4 - Automating Threat Intelligence Workflows.mp4 39.9 MB
- ~Get Your Files Here !/8 - Integration and Functionality of TIPs/3 - Why a TIP Is Special.mp4 39.7 MB
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/1 - Simulating a Cyber Incident Scenario Setup.mp4 38.1 MB
- ~Get Your Files Here !/1 - What is Cyber Threat Intelligence/3 - What is Cyber Threat Intelligence.mp4 37.3 MB
- ~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/1 - Introduction.mp4 36.1 MB
- ~Get Your Files Here !/1 - What is Cyber Threat Intelligence/2 - Introduction.mp4 35.3 MB
- ~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/1 - Introduction.mp4 33.4 MB
- ~Get Your Files Here !/1 - What is Cyber Threat Intelligence/5 - CTI in Action.mp4 28.3 MB
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/6 - Project - Full-Spectrum Threat Response & Analysis - Course End Final Project.pdf 204.9 KB
- ~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms - Module 3_Operationalizing CTI - Threat Intelligence Platform (TIP) (1).pdf 204.2 KB
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/5 - HOL Bridging Intelligence and Response - Module 4_Cyber Threat Intelligence Tools and Incident Response (1).pdf 202.3 KB
- ~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle - Module 1_Foundations of Cyber Threat Intelligence (1).pdf 198.7 KB
- ~Get Your Files Here !/6 - Applying Security Principles in Practice/5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise - Module 2_Information Security Principles (1).pdf 197.7 KB
- ~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/4 - Threat Intelligence Complete Guide to Process and Technology.html 975 bytes
- ~Get Your Files Here !/6 - Applying Security Principles in Practice/4 - Data Integrity Detecting and Responding to Ransomware and Other Destructive.html 863 bytes
- ~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/4 - An introduction to threat intelligence.html 849 bytes
- ~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms.html 657 bytes
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/4 - Strengthening Cyber Defense with MISP.html 641 bytes
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/5 - HOL Bridging Intelligence and Response.html 515 bytes
- ~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle.html 431 bytes
- ~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/6 - Project - Full-Spectrum Threat Response & Analysis.html 414 bytes
- ~Get Your Files Here !/6 - Applying Security Principles in Practice/5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise.html 407 bytes
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.