[FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks with Wireshark


[FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks with Wireshark
Category:
Date:
10/28/21 at 10:01pm GMT+1
Submitter:
Seeders:
12
Leechers:
0
File size:
686 MB in 67 files

Torrent Status:
  This torrent has been verified.

Infohash:
b69327bb89e4bf32a3aa5e9bb09a0c03dd5b5a3f


File list

  • [FreeCoursesOnline.Me] Pluralsight - Identify Common Cyber Network Attacks with Wireshark
  • icon 0. Websites you may like/How you can help our Group!.txt 204 B
    icon 01. Course Overview/01. Course Overview.mp4 4.6 MB
    icon 02. When to Break Out Wireshark for Threat Hunting/02. Course Introduction.mp4 2.5 MB
    icon 02. When to Break Out Wireshark for Threat Hunting/03. When to Break out Wireshark for Threat Hunting.mp4 3.1 MB
    icon 02. When to Break Out Wireshark for Threat Hunting/04. Starting with IDS Alerts and Firewall Server Event Logs.mp4 5.1 MB
    icon 02. When to Break Out Wireshark for Threat Hunting/05. Packet Analysis and the MITRE ATTCK Framework Cyber Kill Chain.mp4 2.1 MB
    icon 02. When to Break Out Wireshark for Threat Hunting/06. Module Review.mp4 709.5 KB
    icon 03. Analyzing Port Scans and Enumeration Methods/07. Module Intro.mp4 1.7 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/08. Network and Host Discovery Scans.mp4 5.2 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/09. Lab 1 - Detecting Network Discovery Scans with Wireshark.mp4 24.5 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/10. Lab 2 - Identifying Port Scans with Wireshark.mp4 31.9 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/11. Lab 2 - Part 2 - Detecting Port Scans.mp4 20.6 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/12. Lab 3 - Analyzing Malware for Network and Port Scans.mp4 40.4 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/13. Lab 3 - Part 2 - Analyzing Malware for Network and Port Scans.mp4 16 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/14. How OS Fingerprinting Works.mp4 5.5 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/15. Lab 4 - Detecting OS Fingerprinting with Wireshark.mp4 36.2 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/16. Lab 4 - Part 2 - Detecting OS Fingerprinting.mp4 26.7 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/17. How HTTP Path Enumeration Works.mp4 3.1 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/18. Lab 5 - Analyzing HTTP Path Enumeration with Wireshark.mp4 40.7 MB
    icon 03. Analyzing Port Scans and Enumeration Methods/19. Module Review.mp4 786.1 KB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/20. Module Intro.mp4 764.8 KB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/21. How to Find Suspect Traffic Patterns.mp4 3.8 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/22. Spotting Network Attacks - The Top 10 Things to Look For.mp4 4 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/23. Lab 4 - Analyzing TCP SYN Attacks.mp4 20.9 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/24. Identifying Unusual Country Codes with GeoIP.mp4 4 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/25. Lab 7 - Spotting Suspect Country Codes with Wireshark.mp4 27.3 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/26. Lab 8 - Filtering for Unusual Domain Name Lookups.mp4 19.4 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/27. Analyzing HTTP Traffic and File Transfers.mp4 5 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/28. Lab 9 - Analyzing HTTP Traffic and Unencrypted File Transfers.mp4 39.8 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/29. Spotting Data Exfiltration Brute Force Password Behavior and Reverse Shell.mp4 4.4 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/30. Lab 10 - Analysis of a Brute Force Attack.mp4 25.9 MB
    icon 04. Analyzing Common Attack Signatures of Suspect Traffic/31. Module Review.mp4 962.8 KB
    icon 05. Identifying Common Malware Behavior/32. Module Intro.mp4 819 KB
    icon 05. Identifying Common Malware Behavior/33. What Is Malware How Can I Spot It.mp4 4.5 MB
    icon 05. Identifying Common Malware Behavior/34. Indicators of Compromise in Malware Analysis.mp4 1.9 MB
    icon 05. Identifying Common Malware Behavior/35. Lab 11 - Malware Analysis with Wireshark - Part 1.mp4 43.7 MB
    icon 05. Identifying Common Malware Behavior/36. Lab 11 - Malware Analysis with Wireshark - Part 2.mp4 15.1 MB
    icon 05. Identifying Common Malware Behavior/37. Module Review.mp4 1.5 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/38. Module Intro.mp4 1018.7 KB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/39. How to Identify Shells and Reverse Shells.mp4 4.4 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/40. Lab 12 - Analyzing Reverse Shell Behavior .mp4 9.9 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/41. How to Spot Botnet Traffic.mp4 5.5 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/42. Lab 13 - Identifying Botnet Traffic with Wireshark.mp4 37.7 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/43. Lab 13 - Identifying Botnet Traffic - Part 2.mp4 35.6 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/44. How to Identify Data Exfiltration.mp4 4.9 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/45. Lab 14 - Analyzing Data Exfiltration with Wireshark.mp4 35.9 MB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/46. Module Review.mp4 497.6 KB
    icon 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/47. Course Review.mp4 1.7 MB
    icon Exercise Files/02/when-to-break-out-wireshark-for-threat-hunting-slides.pdf 2.9 MB
    icon Exercise Files/03/analyzing-port-scans-and-enumeration-methods-slides.pdf 4.3 MB
    icon Exercise Files/03/demos/chriscoloringrules 4.4 KB
    icon Exercise Files/03/demos/Lab1_NetworkScan.pcapng 124.7 KB
    icon Exercise Files/03/demos/Lab2_Network_PortScan.pcapng 470.7 KB
    icon Exercise Files/03/demos/Lab3_AnalyzinganAttack.zip 7.3 MB
    icon Exercise Files/03/demos/Lab4_OSFingerprint.pcapng 677.2 KB
    icon Exercise Files/03/demos/Lab5_EnumeratingWeb.pcapng 498.5 KB
    icon Exercise Files/04/analyzing-common-attack-signatures-of-suspect-traffic-slides.pdf 4.2 MB
    icon Exercise Files/04/demos/Lab10_BruteForceFTP.pcapng 60.4 KB
    icon Exercise Files/04/demos/Lab6_TCPSYNs.pcapng 543.2 KB
    icon Exercise Files/04/demos/Lab7_CountryCodes.pcapng 543.3 KB
    icon Exercise Files/04/demos/Lab8_DomainNames.pcapng 12.7 KB
    icon Exercise Files/04/demos/Lab9_HTTPTransfers.pcapng 13.1 MB
    icon Exercise Files/05/demos/Lab 11_MalwareAnalysis.pcapng 8.2 MB
    icon Exercise Files/05/identifying-common-malware-behavior-slides.pdf 4 MB
    icon Exercise Files/06/demos/Lab13_AnalyzingBotnet.pcapng 3.7 MB
    icon Exercise Files/06/demos/Lab14_DataExfiltration.pcapng 1.8 MB
    icon Exercise Files/06/identify-shell-reverse-shell-botnet-and-ddos-attack-traffic-slides.pdf 1.2 MB

Similar Torrents

Category
Name
Size
Date
 [FreeCoursesOnline.Me] Code With Mosh - The Ultimate Data Structures & Algorithms [3in1] 2.3 GB12/10/22466
 [FreeCoursesOnline.Me] Code With Mosh - The Ultimate HTML-CSS Mastery Series [3in1] 3.2 GB12/12/22443
 [FreeCoursesOnline.Me] Code With Mosh - The Ultimate JavaScript Series [2In1] 1.8 GB12/19/22434
 [FreeCoursesOnline.Me] Skillshare - Using ChatGPT to Improve Your YouTube Content A Ste ... 136 MB03/15/23401
 [FreeCoursesOnline.Me] Coursera - Google Data Analytics Professional Certificate 6.9 GB01/07/23396
 [FreeCoursesOnline.Me] Code With Mosh - The Ultimate Design Patterns [Series] 3 In 1 1.3 GB12/06/22374
 [FreeCoursesOnline.Me] MasterClass -DANIEL NEGREANU TEACHES POKER 6.7 GB11/12/18354
 [FreeCoursesOnline.Me] TechWorld - The Ultimate Course For IT Beginners 3.5 GB12/08/22359
 [FreeCoursesOnline.Me] Code With Mosh - Clean Coding and Refactoring 784 MB12/24/22342
 [FreeCoursesOnline.Me] MASTERCLASS - Ray Dalio Teaches Mastering The Markets - Make The ...839 MB07/13/23332
 [FreeCoursesOnline.Me] Complete AI Course ChatGPT, DALL-E, Midjourney and More Ai1.7 GB01/27/24335
 [FreeCoursesOnline.Me] SkillShare - Python 3 Object Oriented Programming - SkilledHares 1.8 GB12/29/22325
 [FreeCoursesOnline.Me] Coursera - Generative AI for Everyone 442 MB02/25/24321
 [FreeCoursesOnline.Me] PhotoshopEasy - The Ultimate Photoshop Course - Learn To Master ... 26.9 GB12/25/223013
 [FreeCoursesOnline.Me] Code With Mosh - The Ultimate Git Mastery Course 939 MB12/21/22292