THPv2 - Threat Hunting Professional
Focused View
4:00:14
257 View
Creating IOCs with IOC editor.mp4
11:21
Module 1 - Introduction to Threat Hunting.pdf
Module 2 - Threat Hunting Terminology.pdf
Module 3 - Threat Intelligence.pdf
Module 4 - Threat Hunting Methodology.pdf
Open Threat Exchange and ICOs.mp4
11:21
Redline and ICOs.mp4
08:11
Yara and yara Rules.mp4
18:55
Log Parser studio.mp4
12:54
Module 1 - Introduction to Network Hunting.pdf
Module 2 - Suspicious Traffic Hunting.pdf
Module 3 - Hunting webshells.pdf
Network miner.mp4
16:13
Powershell help.mp4
05:21
THP002 NetWitnessInvestigator.mp4
08:08
Wireshark.mp4
04:51
packet hunting.mp4
09:20
Creating dashboards in ELK.mp4
06:24
Creating visualization in ELK.mp4
08:28
ELK Hunting - invoke Mimikatz.mp4
05:56
ELK Hunting - macros.mp4
07:13
ELK Hunting - mimikatz.mp4
10:30
ELK hunting - keylogger and remote threads.mp4
12:52
Hunting code injection with sysmon.mp4
04:59
Hunting macros with sysmon.mp4
08:38
Hunting mimikatz with sysmon.mp4
14:55
Introduction to ELK.mp4
07:02
Introduction to sysmon.mp4
07:46
Module 1 - Introduction to Endpoint Hunting.pdf
Module 2 - Malware Overview.pdf
Module 3 - Hunting Malware.pdf
Module 4 - Event IDs-Logging-SIEMs.pdf
Module 5 - Hunting with PowerShell.pdf
Redline Basic usage.mp4
10:50
Redline Create analysis file.mp4
04:03
Redline create a standard collector.mp4
06:30
Redline detecting code injection.mp4
07:40
Volatility basic usage.mp4
09:53
More details
User Reviews
Rating
average 0
Focused display

Elearnsecurity
View courses ElearnsecurityeLearnSecurity is an information technology security company that develops and provides certifications with a practical focus. eLearnSecurity deliver course material electronically through the distance learning model.
- language english
- Training sessions 26
- duration 4:00:14
- Release Date 2023/06/15