资源详情

返回首页 | 相关搜索
TCM Security - Security Operations (SOC) 201
大小 5.34 GB
文件数 119
Info Hash: 26706D85DAEFA0B665FD4D23D7BF019A33A1B430
收录时间 2026-01-01 13:09:28
更新时间 2026-01-01 13:09:28
文件列表 (119)
01- Course Introduction/01-Course-Introduction-(5-13).mkv
16.98 MB
01- Course Introduction/02-About-the-Instructor-(2-30).mkv
8.87 MB
01- Course Introduction/03-The-Modern-Adversary-(10-17).mkv
40.91 MB
01- Course Introduction/04-The-SOC-201-Methodology-(4-23).mkv
10.41 MB
01- Course Introduction/05-Course-Support-(3-05).mkv
10.14 MB
02- Lab Setup/01-Lab-Setup-(3-31).mkv
11.77 MB
02- Lab Setup/02-Installing-a-Hypervisor-(7-26).mkv
23 MB
02- Lab Setup/03-Installing-Ubuntu-(13-20).mkv
28.98 MB
02- Lab Setup/04-Configuring-Ubuntu-(8-17).mkv
22.5 MB
02- Lab Setup/05-Installing-Windows-(11-15).mkv
43.37 MB
02- Lab Setup/06-Configuring-Windows-(7-52).mkv
25.14 MB
02- Lab Setup/07-Installing-Splunk-(16-16).mkv
37.55 MB
02- Lab Setup/08-Configuring-the-Lab-Network-(10-10).mkv
25.54 MB
03- Introduction to Incident Response/01-Introduction-to-Incident-Response-(5-59).mkv
19.88 MB
03- Introduction to Incident Response/02-The-Incident-Response-Process-(14-04).mkv
35.13 MB
03- Introduction to Incident Response/03-Incident-Response--Preparation-(14-44).mkv
53.22 MB
03- Introduction to Incident Response/04-Incident-Response--Identification-(5-39).mkv
20.11 MB
03- Introduction to Incident Response/05-Incident-Response--Containment-(10-45).mkv
38.61 MB
03- Introduction to Incident Response/06-Incident-Response--Eradication-(6-05).mkv
23.16 MB
03- Introduction to Incident Response/07-Incident-Response--Recovery-(7-43).mkv
28.42 MB
03- Introduction to Incident Response/08-Incident-Response--Lessons-Learned-(5-15).mkv
19.38 MB
03- Introduction to Incident Response/09-The-OODA-Loop-(18-32).mkv
66.85 MB
03- Introduction to Incident Response/10-Incident-Response-vs.-Threat-Hunting-(11-39).mkv
34.16 MB
04- Introduction to Threat Hunting/01-Introduction-to-Threat-Hunting-(8-58).mkv
33.8 MB
04- Introduction to Threat Hunting/02-The-Argument-for-Threat-Hunting-(13-14).mkv
40.11 MB
04- Introduction to Threat Hunting/03-Threat-Hunting-Teams-(16-55).mkv
53.55 MB
04- Introduction to Threat Hunting/04-Threat-Hunting-Data-Sources-(19-30).mkv
63.3 MB
04- Introduction to Threat Hunting/05-The-Hunting-Maturity-Model-(HMM)-(20-00).mkv
51.61 MB
04- Introduction to Threat Hunting/06-Cyber-Threat-Intelligence-(6-22).mkv
25.78 MB
04- Introduction to Threat Hunting/07-The-Cyber-Kill-Chain-(16-52).mkv
39.58 MB
04- Introduction to Threat Hunting/08-The-MITRE-ATT&CK-Framework-(15-05).mkv
110.31 MB
04- Introduction to Threat Hunting/09-Exploring-MITRE-ATT&CK-(12-37).mkv
90.89 MB
04- Introduction to Threat Hunting/10-Structured-Threat-Hunting-(16-01).mkv
61.96 MB
04- Introduction to Threat Hunting/11-Unstructured-Threat-Hunting-(9-21).mkv
34.07 MB
04- Introduction to Threat Hunting/12-MITRE-ATT&CK-Navigator-(21-48).mkv
129.66 MB
04- Introduction to Threat Hunting/13-MITRE-ATT&CK-Navigator--Gap-Analysis-and-Threat-Hunting-(19-02).mkv
135.93 MB
05- Data Transformation/01-Data-Transformation-(5-36).mkv
16.98 MB
05- Data Transformation/02-Data-Transformation--Searching-(14-16).mkv
47.72 MB
05- Data Transformation/03-Searching-in-the-Command-Line-(19-19).mkv
48.09 MB
05- Data Transformation/04-Searching-in-PowerShell-(27-29).mkv
76.77 MB
05- Data Transformation/05-Searching-in-Splunk-(21-54).mkv
82.09 MB
05- Data Transformation/06-Data-Transformation--Aggregations-(9-24).mkv
32.1 MB
05- Data Transformation/07-Aggregations-in-the-Command-Line-(25-36).mkv
51.38 MB
05- Data Transformation/08-Aggregations-in-PowerShell-(10-24).mkv
29.2 MB
05- Data Transformation/09-Aggregations-in-Splunk-(34-43).mkv
107.88 MB
05- Data Transformation/10-Data-Transformation--Statistics-(9-38).mkv
33.6 MB
05- Data Transformation/11-Statistics-in-the-Command-Line-(22-04).mkv
33.46 MB
05- Data Transformation/12-Statistics-in-PowerShell-(13-24).mkv
23.53 MB
05- Data Transformation/13-Statistics-in-Splunk-(15-23).mkv
47.52 MB
05- Data Transformation/14-Data-Transformation--Visualizations-(5-00).mkv
22.41 MB
05- Data Transformation/15-Visualizations-in-Splunk-(25-31).mkv
74.62 MB
06- Understanding Anomalies/01-Understanding-Anomalies-(20-33).mkv
83.99 MB
06- Understanding Anomalies/02-Categorizing-Anomalies-(1-11).mkv
4.38 MB
06- Understanding Anomalies/03-Masquerading-(10-39).mkv
54.83 MB
06- Understanding Anomalies/04-Ambiguous-Identifiers-(11-13).mkv
50.25 MB
06- Understanding Anomalies/05-Frequency-&-Volume-Anomalies-(16-14).mkv
55.96 MB
06- Understanding Anomalies/06-Temporal-Anomalies-(14-53).mkv
49.95 MB
06- Understanding Anomalies/07-Location-&-Environment-Anomalies-(14-25).mkv
60.74 MB
06- Understanding Anomalies/08-Structure-&-Format-Anomalies-(16-16).mkv
77.7 MB
06- Understanding Anomalies/09-Obfuscated-PowerShell-Analysis-(6-34).mkv
27.93 MB
06- Understanding Anomalies/10-Entropy-Analysis-(4-56).mkv
14.79 MB
06- Understanding Anomalies/11-Alternate-Data-Stream-(ADS)-Analysis-(19-26).mkv
42.47 MB
06- Understanding Anomalies/12-Absence-&-Suppression-Anomalies-(7-57).mkv
34.1 MB
07- Dissecting Threat Reports/01-Dissecting-Threat-Reports-(18-54).mkv
83.32 MB
07- Dissecting Threat Reports/02-Breaking-Down-Attack-Steps-(5-05).mkv
22.19 MB
07- Dissecting Threat Reports/03-Mapping-Steps-to-Artifacts-(4-40).mkv
18.38 MB
07- Dissecting Threat Reports/04-Mapping-Artifacts-to-Evidence-Sources-(7-51).mkv
31.29 MB
07- Dissecting Threat Reports/05-Visualizing-with-MITRE-ATT&CK-Navigator-(4-34).mkv
28.41 MB
07- Dissecting Threat Reports/06-Intrusion-Analysis-Resources-(5-56).mkv
57.21 MB
08- Threat Hunting Lab/01-Tracing-an-Attack-Chain-(27-04).mkv
77.03 MB
08- Threat Hunting Lab/02-Hunting-Execution-Artifacts-(9-46).mkv
39.17 MB
08- Threat Hunting Lab/03-Hunting-PowerShell-Execution-(36-09).mkv
148.37 MB
08- Threat Hunting Lab/04-Hunting-Cmd-Execution-(20-20).mkv
84.58 MB
08- Threat Hunting Lab/05-Hunting-Process-Trees-(9-26).mkv
41.61 MB
08- Threat Hunting Lab/06-Hunting-Persistence-Artifacts-(7-33).mkv
36.53 MB
08- Threat Hunting Lab/07-Hunting-Persistence--Registry-Run-Keys-(17-20).mkv
78.09 MB
08- Threat Hunting Lab/08-Hunting-Persistence--Lookup-Tables-(27-30).mkv
100 MB
08- Threat Hunting Lab/09-Hunting-Defense-Evasion-Artifacts-(16-39).mkv
53.78 MB
08- Threat Hunting Lab/10-Hunting-Command-and-Control-(C2)-Artifacts-(7-40).mkv
28.13 MB
08- Threat Hunting Lab/11-Hunting-C2--Ingress-Tool-Transfer-(LOLBAS)-(7-35).mkv
19.43 MB
08- Threat Hunting Lab/12-Hunting-C2--Ingress-Tool-Transfer-(File-System-Events)-(12-57).mkv
51.08 MB
08- Threat Hunting Lab/13-Hunting-C2--Ingress-Tool-Transfer-(Network-Connection-Events)-(4-21).mkv
9.48 MB
08- Threat Hunting Lab/14-Hunting-Lateral-Movement-Artifacts-(8-27).mkv
27.11 MB
08- Threat Hunting Lab/15-Hunting-Lateral-Movement--PsExec-(Service-Creation)-(9-38).mkv
21.95 MB
08- Threat Hunting Lab/16-Hunting-Lateral-Movement--PsExec-(Reversing-Regex)-(14-25).mkv
32.38 MB
08- Threat Hunting Lab/17-Hunting-Lateral-Movement--PsExec-(Named-Pipes)-(4-12).mkv
14.29 MB
08- Threat Hunting Lab/18-Module-Recap-(5-46).mkv
18.18 MB
09- Collection at Scale/01-Introduction-to-Collection-(3-24).mkv
4.46 MB
09- Collection at Scale/02-Introduction-to-WMI-(11-11).mkv
46.25 MB
09- Collection at Scale/03-Collection-with-WMIC-(18-56).mkv
65.27 MB
09- Collection at Scale/04-WMIC-Collection-and-Filter-Examples-(5-51).mkv
16.01 MB
09- Collection at Scale/05-Remote-Collection-with-WMIC-(5-38).mkv
11.94 MB
09- Collection at Scale/06-Scripting-WMI-Collection-(10-31).mkv
27.19 MB
09- Collection at Scale/07-WMI-Automated-Collection-Frameworks-(6-57).mkv
23.47 MB
10- PowerShell 101/01-Introduction-to-PowerShell-(4-58).mkv
20.21 MB
10- PowerShell 101/02-PowerShell-101-(1-55).mkv
7.92 MB
10- PowerShell 101/03-PowerShell-101--Cmdlets-(6-09).mkv
17.66 MB
10- PowerShell 101/04-PowerShell-101--Aliases-(6-45).mkv
12.69 MB
10- PowerShell 101/05-PowerShell-101--Objects-and-the-Pipeline-(9-08).mkv
25.85 MB
10- PowerShell 101/06-PowerShell-101--Selecting,-Sorting,-and-Formatting-(17-35).mkv
47.38 MB
10- PowerShell 101/07 PowerShell 101 - Providers.mkv
40.47 MB
10- PowerShell 101/08 PowerShell 101 - Variables and Data Types.mkv
47.33 MB
10- PowerShell 101/09 PowerShell 101 - Control Flow.mkv
41.18 MB
10- PowerShell 101/10 Working with WMI and CIM.mkv
31.9 MB
11- PowerShell for Incident Response/01 Live Incident Response Using PowerShell.mkv
116.24 MB
11- PowerShell for Incident Response/02 PowerShell Remoting.mkv
23.76 MB
11- PowerShell for Incident Response/03 PS Remoting - One-to-One Remoting.mkv
25.84 MB
11- PowerShell for Incident Response/04 PS Remoting - One-to-Many Remoting.mkv
50.68 MB
11- PowerShell for Incident Response/05 PS Remoting - Script Execution at Scale.mkv
26 MB
11- PowerShell for Incident Response/06 PowerShell Authentication.mkv
34.16 MB
11- PowerShell for Incident Response/07 Malicious PowerShell Usage.mkv
42.61 MB
11- PowerShell for Incident Response/08 Introduction to the Kansa IR Framework.mkv
47.19 MB
11- PowerShell for Incident Response/09 Kansa - Modules.mkv
84.25 MB
11- PowerShell for Incident Response/10 Kansa - Remote Collection (Part 1).mkv
45.67 MB
11- PowerShell for Incident Response/11 Kansa - Remote Collection (Part 2).mkv
67.87 MB
11- PowerShell for Incident Response/12 Kansa - Collection Analysis.mkv
89.97 MB
11- PowerShell for Incident Response/13 Collection and Analysis Challenge.mkv
24.52 MB
11- PowerShell for Incident Response/14 Collection Analysis Challenge Walkthrough.mkv
362.22 MB
12- Conclusion/01 Course Wrap Up.mkv
15.85 MB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。