Threat Intelligence and Threat Hunting
Focused View
8:58:08
18 View
01-Threat Intelligence and Threat Hunting - Introduction.mp4
00:56
02-Learning objectives.mp4
00:30
03-1.1 What is Threat Intelligence.mp4
19:16
04-1.2 Threat Sources - Part 1.mp4
12:15
05-1.3 Threat Sources - Part 2.mp4
05:59
06-1.4 Threat Classifications.mp4
12:59
07-1.5 Cyber Threat Investigation - Part 1.mp4
14:36
08-1.6 Cyber Threat Investigation - Part 2.mp4
13:00
09-1.7 Social Media Graphs - Part 1.mp4
13:24
10-1.8 Social Media Graphs - Part 2.mp4
06:58
11-1.9 Log Challenges - Part 1.mp4
12:05
12-1.10 Log Challenges - Part 2.mp4
07:08
13-1.11 Advanced Threat Hunting - Part 1.mp4
14:24
14-1.12 Advanced Threat Hunting - Part 2.mp4
14:53
15-1.13 Endpoint Detection.mp4
09:21
16-Learning objectives.mp4
00:38
17-2.1 Attack Frameworks - Part 1.mp4
12:30
18-2.2 Attack Frameworks - Part 2.mp4
04:17
19-2.3 Threat Research.mp4
03:36
20-2.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions.mp4
02:52
21-2.5 Wireless Analysis Techniques.mp4
06:22
22-Learning objectives.mp4
00:24
23-3.1 Vulnerability Identification - Part 1.mp4
17:47
24-3.2 Vulnerability Identification - Part 2.mp4
05:10
25-3.3 Validation.mp4
10:46
26-3.4 Remediation and Mitigation and Inhibitors.mp4
02:22
27-3.5 Scanning Parameters and Criteria.mp4
13:14
28-3.6 Vulnerability Scanning - Part 1.mp4
09:10
29-3.7 Vulnerability Scanning - Part 2.mp4
07:42
30-3.8 Enumeration.mp4
15:42
31-Learning objectives.mp4
00:23
32-4.1 Understanding Results.mp4
07:19
33-4.2 Web Application Scanners.mp4
01:46
34-4.3 Infrastructure Vulnerability Scanner.mp4
04:11
35-4.4 Software Assessment Tools and Techniques.mp4
01:17
36-4.5 Wireless Assessment.mp4
03:25
37-4.6 Cloud Infrastructure Assessment.mp4
01:26
38-Learning objectives.mp4
00:21
39-5.1 Mobile.mp4
04:14
40-5.2 Internet of Things (IoT) and Embedded Devices - Part 1.mp4
07:07
41-5.3 Internet of Things (IoT) and Embedded Devices - Part 2.mp4
13:37
42-5.4 APTs.mp4
08:54
43-5.5 Embedded and Real-Time Operating Systems (RTOS).mp4
05:29
44-5.6 SOC and FPGA.mp4
06:06
45-5.7 Physical Access Control.mp4
01:00
46-5.8 Building Automation Systems, Vehicles, and Drones.mp4
06:06
47-5.9 Industrial Control Systems (ICS) and Process Automation.mp4
13:28
48-5.10 Defending Critical Infrastructure.mp4
11:33
49-5.11 Supervisory Control and Data Acquisition (SCADA) - Part 1.mp4
12:20
50-5.12 Supervisory Control and Data Acquisition (SCADA) - Part 2.mp4
12:13
51-5.13 Verifications and Quality Controls.mp4
07:06
52-Learning objectives.mp4
00:23
53-6.1 Cloud Service, FaaS, and Deployment Models.mp4
02:59
54-6.2 IaC, Insecure Applications.mp4
02:08
55-6.3 Application Programming Interface.mp4
03:29
56-6.4 Improper Key Management.mp4
03:27
57-6.5 Logging and Monitoring.mp4
06:53
58-Learning objectives.mp4
00:24
59-7.1 Attack Types and XML Types.mp4
01:01
60-7.2 SQL Attacks.mp4
01:03
61-7.3 Overflow Attacks.mp4
01:45
62-7.4 Cross-Site Scripting.mp4
10:45
63-7.5 Remote Code Execution.mp4
01:51
64-7.6 Directory Traversal.mp4
02:28
65-7.7 Privilege Escalation.mp4
07:53
66-7.8 Password Spraying.mp4
03:29
67-7.9 Credential Stuffing.mp4
00:38
68-7.10 Impersonation.mp4
00:42
69-7.11 On-path and Man-in-the-Middle.mp4
01:47
70-7.12 Session Hijacking.mp4
01:18
71-Learning objectives.mp4
00:21
72-8.1 Vulnerabilities & Improper Error Handling.mp4
02:01
73-8.2 Dereferencing.mp4
01:36
74-8.3 Insecure Object Reference.mp4
01:39
75-8.4 Race Condition.mp4
04:41
76-8.5 Broker Authentication.mp4
02:17
77-8.6 Sensitive Data Exposure.mp4
01:13
78-8.7 Insecure Components.mp4
01:14
79-8.8 Insufficient Logging and Monitoring.mp4
01:30
80-8.9 Weak or Default Configurations.mp4
02:49
81-Learning objectives.mp4
00:19
82-9.1 Event Logs.mp4
03:44
83-9.2 Syslogs.mp4
09:04
84-9.3 Firewall Logs.mp4
08:23
85-9.4 Web Application Firewall (WAF).mp4
06:08
86-9.5 Proxy.mp4
12:54
87-9.6 Intrusion Detection and Prevention (IDS IPS).mp4
07:59
88-9.7 Impact Analysis.mp4
12:45
89-9.8 Organizations Impact vs. Localized Impact.mp4
01:37
90-9.9 Immediate vs. Total.mp4
01:25
91-Threat Intelligence and Threat Hunting - Summary.mp4
00:29
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 91
- duration 8:58:08
- English subtitles has
- Release Date 2024/02/15