Companies Home Search Profile

Threat Intelligence and Threat Hunting

Focused View

8:58:08

18 View
  • 01-Threat Intelligence and Threat Hunting - Introduction.mp4
    00:56
  • 02-Learning objectives.mp4
    00:30
  • 03-1.1 What is Threat Intelligence.mp4
    19:16
  • 04-1.2 Threat Sources - Part 1.mp4
    12:15
  • 05-1.3 Threat Sources - Part 2.mp4
    05:59
  • 06-1.4 Threat Classifications.mp4
    12:59
  • 07-1.5 Cyber Threat Investigation - Part 1.mp4
    14:36
  • 08-1.6 Cyber Threat Investigation - Part 2.mp4
    13:00
  • 09-1.7 Social Media Graphs - Part 1.mp4
    13:24
  • 10-1.8 Social Media Graphs - Part 2.mp4
    06:58
  • 11-1.9 Log Challenges - Part 1.mp4
    12:05
  • 12-1.10 Log Challenges - Part 2.mp4
    07:08
  • 13-1.11 Advanced Threat Hunting - Part 1.mp4
    14:24
  • 14-1.12 Advanced Threat Hunting - Part 2.mp4
    14:53
  • 15-1.13 Endpoint Detection.mp4
    09:21
  • 16-Learning objectives.mp4
    00:38
  • 17-2.1 Attack Frameworks - Part 1.mp4
    12:30
  • 18-2.2 Attack Frameworks - Part 2.mp4
    04:17
  • 19-2.3 Threat Research.mp4
    03:36
  • 20-2.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions.mp4
    02:52
  • 21-2.5 Wireless Analysis Techniques.mp4
    06:22
  • 22-Learning objectives.mp4
    00:24
  • 23-3.1 Vulnerability Identification - Part 1.mp4
    17:47
  • 24-3.2 Vulnerability Identification - Part 2.mp4
    05:10
  • 25-3.3 Validation.mp4
    10:46
  • 26-3.4 Remediation and Mitigation and Inhibitors.mp4
    02:22
  • 27-3.5 Scanning Parameters and Criteria.mp4
    13:14
  • 28-3.6 Vulnerability Scanning - Part 1.mp4
    09:10
  • 29-3.7 Vulnerability Scanning - Part 2.mp4
    07:42
  • 30-3.8 Enumeration.mp4
    15:42
  • 31-Learning objectives.mp4
    00:23
  • 32-4.1 Understanding Results.mp4
    07:19
  • 33-4.2 Web Application Scanners.mp4
    01:46
  • 34-4.3 Infrastructure Vulnerability Scanner.mp4
    04:11
  • 35-4.4 Software Assessment Tools and Techniques.mp4
    01:17
  • 36-4.5 Wireless Assessment.mp4
    03:25
  • 37-4.6 Cloud Infrastructure Assessment.mp4
    01:26
  • 38-Learning objectives.mp4
    00:21
  • 39-5.1 Mobile.mp4
    04:14
  • 40-5.2 Internet of Things (IoT) and Embedded Devices - Part 1.mp4
    07:07
  • 41-5.3 Internet of Things (IoT) and Embedded Devices - Part 2.mp4
    13:37
  • 42-5.4 APTs.mp4
    08:54
  • 43-5.5 Embedded and Real-Time Operating Systems (RTOS).mp4
    05:29
  • 44-5.6 SOC and FPGA.mp4
    06:06
  • 45-5.7 Physical Access Control.mp4
    01:00
  • 46-5.8 Building Automation Systems, Vehicles, and Drones.mp4
    06:06
  • 47-5.9 Industrial Control Systems (ICS) and Process Automation.mp4
    13:28
  • 48-5.10 Defending Critical Infrastructure.mp4
    11:33
  • 49-5.11 Supervisory Control and Data Acquisition (SCADA) - Part 1.mp4
    12:20
  • 50-5.12 Supervisory Control and Data Acquisition (SCADA) - Part 2.mp4
    12:13
  • 51-5.13 Verifications and Quality Controls.mp4
    07:06
  • 52-Learning objectives.mp4
    00:23
  • 53-6.1 Cloud Service, FaaS, and Deployment Models.mp4
    02:59
  • 54-6.2 IaC, Insecure Applications.mp4
    02:08
  • 55-6.3 Application Programming Interface.mp4
    03:29
  • 56-6.4 Improper Key Management.mp4
    03:27
  • 57-6.5 Logging and Monitoring.mp4
    06:53
  • 58-Learning objectives.mp4
    00:24
  • 59-7.1 Attack Types and XML Types.mp4
    01:01
  • 60-7.2 SQL Attacks.mp4
    01:03
  • 61-7.3 Overflow Attacks.mp4
    01:45
  • 62-7.4 Cross-Site Scripting.mp4
    10:45
  • 63-7.5 Remote Code Execution.mp4
    01:51
  • 64-7.6 Directory Traversal.mp4
    02:28
  • 65-7.7 Privilege Escalation.mp4
    07:53
  • 66-7.8 Password Spraying.mp4
    03:29
  • 67-7.9 Credential Stuffing.mp4
    00:38
  • 68-7.10 Impersonation.mp4
    00:42
  • 69-7.11 On-path and Man-in-the-Middle.mp4
    01:47
  • 70-7.12 Session Hijacking.mp4
    01:18
  • 71-Learning objectives.mp4
    00:21
  • 72-8.1 Vulnerabilities & Improper Error Handling.mp4
    02:01
  • 73-8.2 Dereferencing.mp4
    01:36
  • 74-8.3 Insecure Object Reference.mp4
    01:39
  • 75-8.4 Race Condition.mp4
    04:41
  • 76-8.5 Broker Authentication.mp4
    02:17
  • 77-8.6 Sensitive Data Exposure.mp4
    01:13
  • 78-8.7 Insecure Components.mp4
    01:14
  • 79-8.8 Insufficient Logging and Monitoring.mp4
    01:30
  • 80-8.9 Weak or Default Configurations.mp4
    02:49
  • 81-Learning objectives.mp4
    00:19
  • 82-9.1 Event Logs.mp4
    03:44
  • 83-9.2 Syslogs.mp4
    09:04
  • 84-9.3 Firewall Logs.mp4
    08:23
  • 85-9.4 Web Application Firewall (WAF).mp4
    06:08
  • 86-9.5 Proxy.mp4
    12:54
  • 87-9.6 Intrusion Detection and Prevention (IDS IPS).mp4
    07:59
  • 88-9.7 Impact Analysis.mp4
    12:45
  • 89-9.8 Organizations Impact vs. Localized Impact.mp4
    01:37
  • 90-9.9 Immediate vs. Total.mp4
    01:25
  • 91-Threat Intelligence and Threat Hunting - Summary.mp4
    00:29
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 91
    • duration 8:58:08
    • English subtitles has
    • Release Date 2024/02/15