资源详情

返回首页 | 相关搜索
[ WebToolTip.com ] Udemy - Mastering Basics of Cyber Threat Intelligence
大小 2.04 GB
文件数 58
Info Hash: 6129D0C41E81164708502E642A3E3B65A11D3763
收录时间 2026-01-08 11:29:02
更新时间 2026-01-08 11:29:02
文件列表 (58)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - What is Cyber Threat Intelligence/1 - Intro Video to Course.mp4
59.15 MB
~Get Your Files Here !/1 - What is Cyber Threat Intelligence/2 - Introduction.mp4
35.31 MB
~Get Your Files Here !/1 - What is Cyber Threat Intelligence/3 - What is Cyber Threat Intelligence.mp4
37.34 MB
~Get Your Files Here !/1 - What is Cyber Threat Intelligence/4 - Roles and Responsibilities of CTI.mp4
51.88 MB
~Get Your Files Here !/1 - What is Cyber Threat Intelligence/5 - CTI in Action.mp4
28.32 MB
~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/1 - Introduction.mp4
36.13 MB
~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/2 - Introduction to Key CTI Tools.mp4
53.22 MB
~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/3 - Aggregating and Enriching Threat Indicators.mp4
78.84 MB
~Get Your Files Here !/10 - Using CTI Tools to Analyze Threat Indicators/4 - Automating Threat Intelligence Workflows.mp4
39.9 MB
~Get Your Files Here !/11 - Mapping Attacker Tactics with MITRE ATT&CK/1 - MITRE ATT_CK Framework Fundamentals.mp4
48.24 MB
~Get Your Files Here !/11 - Mapping Attacker Tactics with MITRE ATT&CK/2 - Mapping Threat Indicators to ATT_CK TTPs.mp4
80.11 MB
~Get Your Files Here !/11 - Mapping Attacker Tactics with MITRE ATT&CK/3 - Using ATT_CK for Detection and Response.mp4
87 MB
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/1 - Simulating a Cyber Incident Scenario Setup.mp4
38.08 MB
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/2 - Identifying IOCs and Profiling Threat Actors.mp4
80.52 MB
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/3 - Recommending and Communicating Response Actions.mp4
81.82 MB
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/4 - Strengthening Cyber Defense with MISP.html
641 B
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/5 - HOL Bridging Intelligence and Response - Module 4_Cyber Threat Intelligence Tools and Incident Response (1).pdf
202.3 KB
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/5 - HOL Bridging Intelligence and Response.html
515 B
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/6 - Project - Full-Spectrum Threat Response & Analysis - Course End Final Project.pdf
204.94 KB
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/6 - Project - Full-Spectrum Threat Response & Analysis.html
414 B
~Get Your Files Here !/12 - Simulated Incident Response from IOC to Action/7 - Course Wrap-up Video.mp4
43.76 MB
~Get Your Files Here !/2 - Types of Threat Intelligence/1 - Tactical Threat Intelligence.mp4
45.67 MB
~Get Your Files Here !/2 - Types of Threat Intelligence/2 - Operational Threat Intelligence.mp4
45.16 MB
~Get Your Files Here !/2 - Types of Threat Intelligence/3 - Strategic Threat Intelligence.mp4
43.08 MB
~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/1 - Direction_ Discovery_ and Collection.mp4
45.28 MB
~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/2 - Processing and Analysis.mp4
40.9 MB
~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/3 - Delivering Actionable Intelligence.mp4
51.23 MB
~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/4 - An introduction to threat intelligence.html
849 B
~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle - Module 1_Foundations of Cyber Threat Intelligence (1).pdf
198.7 KB
~Get Your Files Here !/3 - The Threat Intelligence Lifecycle/5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle.html
431 B
~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/1 - Introduction.mp4
33.42 MB
~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/2 - Best Practices for Confidentiality.mp4
45.78 MB
~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/3 - Principles of Data and Information Integrity.mp4
41.61 MB
~Get Your Files Here !/4 - CIA Triad - Confidentiality, Integrity, and Availability/4 - Continuous Access and Business Resilience.mp4
52.1 MB
~Get Your Files Here !/5 - Risk Management - Turning Intelligence into Action/1 - Identifying Assets at Risk.mp4
45.02 MB
~Get Your Files Here !/5 - Risk Management - Turning Intelligence into Action/2 - Threat and Vulnerability Assessment.mp4
49.86 MB
~Get Your Files Here !/5 - Risk Management - Turning Intelligence into Action/3 - Selecting and Actioning Control Strategies.mp4
47.39 MB
~Get Your Files Here !/6 - Applying Security Principles in Practice/1 - Direction_ Discovery_ and Collection.mp4
47.34 MB
~Get Your Files Here !/6 - Applying Security Principles in Practice/2 - Processing and Analysis.mp4
51.67 MB
~Get Your Files Here !/6 - Applying Security Principles in Practice/3 - Sharing Intelligence to Improve and Adapt.mp4
54.02 MB
~Get Your Files Here !/6 - Applying Security Principles in Practice/4 - Data Integrity Detecting and Responding to Ransomware and Other Destructive.html
863 B
~Get Your Files Here !/6 - Applying Security Principles in Practice/5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise - Module 2_Information Security Principles (1).pdf
197.72 KB
~Get Your Files Here !/6 - Applying Security Principles in Practice/5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise.html
407 B
~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/1 - Introduction.mp4
42.12 MB
~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/2 - Defining Threat Intelligence Platform (TIP).mp4
47.37 MB
~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/3 - Capabilities of a TIP.mp4
41.1 MB
~Get Your Files Here !/7 - Introduction to Threat Intelligence Platforms (TIP)/4 - TIP vs. Other Cyber Threat Intelligence Tools.mp4
55.29 MB
~Get Your Files Here !/8 - Integration and Functionality of TIPs/1 - TIP Integration Flow.mp4
59.34 MB
~Get Your Files Here !/8 - Integration and Functionality of TIPs/2 - Real-Time Monitoring and Feedback Loops.mp4
44.77 MB
~Get Your Files Here !/8 - Integration and Functionality of TIPs/3 - Why a TIP Is Special.mp4
39.65 MB
~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/1 - TIPs in Action.mp4
43.1 MB
~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/2 - Enhancing Cyber Defense with TIPs.mp4
47.02 MB
~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/3 - The Future of TIPs.mp4
50.02 MB
~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/4 - Threat Intelligence Complete Guide to Process and Technology.html
975 B
~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms - Module 3_Operationalizing CTI - Threat Intelligence Platform (TIP) (1).pdf
204.25 KB
~Get Your Files Here !/9 - Practical Applications and Benefits of TIPs/5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms.html
657 B
~Get Your Files Here !/Bonus Resources.txt
70 B

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。