محتوى الدورة
Section 1: Incident Handling Overview (Completed)
0/6
00- Course Introduction
34:51
01.1- Incident Handling Process – Part 1
45:59
01.2- Incident Handling Process – Part 2
01:13:33
01.3- Incident Handling Process – Part 3
01:07:02
01.4- Incident Handling Process – Part 4 (Enterprise Wide Incident Response GRR Lab)
01:22:48
01.5- Incident Handling Process – Part 5 (Enterprise Wide Incident Response Velociraptor Lab)
26:11
Section 2: Network Traffic & Flow Analysis (Completed)
0/14
02.1- Intrusion Detection by Analyzing Traffic Module 1 – Part 1
39:32
02.2- Intrusion Detection by Analyzing Traffic Module 1 – Part 2
01:10:43
02.3- Intrusion Detection by Analyzing Traffic Module 1 – Part 3
01:31:13
02.4- Intrusion Detection by Analyzing Traffic Module 1 – Part 4
55:13
03.1- Intrusion Detection by Analyzing Traffic Module 2 – Part 1
45:40
03.2- Intrusion Detection by Analyzing Traffic Module 2 – Part 2
01:09:49
03.3- Intrusion Detection by Analyzing Traffic Module 2 – Part 3
01:14:48
03.4- Intrusion Detection by Analyzing Traffic Module 2 – Part 4
01:18:41
03.5- Intrusion Detection by Analyzing Traffic Module 2 – Part 5 (Suricata Fundamentals Lab)
02:11:36
03.6- Intrusion Detection by Analyzing Traffic Module 2 – Part 6 (Effectively Using Suricata Lab)
01:40:59
03.7- Intrusion Detection by Analyzing Traffic Module 2 – Part 7 (Effectively Using Bro Lab)
01:55:56
03.8- Intrusion Detection by Analyzing Traffic Module 2 – Part 8 (Effectively Using Snort Lab)
01:10:11
04.1- Intrusion Detection by Analyzing Flow – Part 1
01:05:49
04.2- Intrusion Detection by Analyzing Flow – Part 2
01:01:05
Section 3: Practical Incident Handling (Completed)
0/19
05.1- Preparing and Defending Against Reconnaissance and Information Gathering
01:27:14
05.2- [BONUS] Information Gathering
01:10:09
06.1- Preparing and Defending Against Scanning
39:02
06.2- [BONUS] Footprinting and Scanning
01:35:22
07.1- Preparing and Defending Against Exploitation
01:47:28
07.2- [BONUS] ARP Poisoning
22:06
07.3- [BONUS] ARP Poisoning Lab
18:49
07.4- [BONUS] Metasploit and Meterpreter
01:02:39
07.5- [BONUS] Metasploit and Meterpreter Lab
01:25:14
08.1- Preparing and Defending Against Post Exploitation – Part 1
01:20:07
08.2- Preparing and Defending Against Post Exploitation – Part 2
01:31:28
08.3- [BONUS] Post Exploitation – Part 1
35:39
08.4- [BONUS] Post Exploitation – Part 2
01:33:54
08.5- [BONUS] Post Exploitation – Part 3
27:06
08.6- [BONUS] Post Exploitation – Part 4
01:25:25
08.7- [BONUS] Post Exploitation – Part 5
51:57
08.8- [BONUS] Post Exploitation – Part 6
01:07:11
08.9- [BONUS] Post Exploitation – Part 7
01:24:03
08.10- [BONUS] – Post Exploitation – Part 8
08:04
Section 4: SOC 3.0 Operations & Analytics (Completed)
0/8
09.1- SIEM Fundamentals and Open Source Solutions – Part 1
56:14
09.2- SIEM Fundamentals and Open Source Solutions – Part 2 (Splunk Scenario 1 Lab)
02:11:25
09.3- SIEM Fundamentals and Open Source Solutions – Part 3 (Splunk Scenario 2 Lab)
01:13:46
09.4- SIEM Fundamentals and Open Source Solutions – Part 4 (Effectively Using ELK Lab)
01:15:11
10- Logging
38:04
11- SMTP, DNS and HTTPS Analytics
47:43
12- Endpoint Analytics
24:56
13- Creating a Baseline and Detecting Deviations
11:48
Exam Preparation (Completed)
0/1
14- Exam Prep Notes
12:41
Incident Response
مواد الدرس
التعليقات
مواد الدرس
1- Incident Handling Process.pdf
Size: 1.84 ميغابايت
انضم الى النقاش
إرسال
0%
مكتمل
وضع علامة مكتمل
Ask ChatGPT
Word Limit
Set ChatGPT API key
Find your Secret API key in your
ChatGPT User settings
and paste it here to connect ChatGPT with your Tutor LMS website.
Enable ChatGPT
أدرج/ حرر رابط
إغلاق
أدخل رابط التحويل
الرابط
نص الرابط
فتح الرابط في علامة تبويب جديدة
أو قم بالربط مع محتوى موجود
البحث
لم يتم تحديد كلمات البحث. جاري إظهار أحدث العناصر.
ابحث أو استخدم مفتاحي الأسهم للأعلى أو الأسفل لتحديد عنصر.
إلغاء