-
05.1- Introduction to Network Hunting – Part 1
34:03
-
05.2- Introduction to Network Hunting – Part 2
01:16:52
-
05.3- Introduction to Network Hunting – Part 3
01:00:17
-
05.4 – [BONUS] Intrusion Detection by Analyzing Traffic Module 1 – Part 1
39:32
-
05.5 – [BONUS] Intrusion Detection by Analyzing Traffic Module 1 – Part 2
01:10:43
-
05.6 – [BONUS] Intrusion Detection by Analyzing Traffic Module 1 – Part 3
01:31:13
-
05.7 – [BONUS] Intrusion Detection by Analyzing Traffic Module 1 – Part 4
55:13
-
05.8 – [BONUS] Intrusion Detection by Analyzing Traffic Module 2 – Part 1
45:40
-
05.9 – [BONUS] Intrusion Detection by Analyzing Traffic Module 2 – Part 2
01:09:49
-
05.10 – [BONUS] Intrusion Detection by Analyzing Traffic Module 2 – Part 3
01:14:48
-
05.11 – [BONUS] Intrusion Detection by Analyzing Traffic Module 2 – Part 4
01:18:41
-
06.1- Suspicious Traffic Hunting – Part 1
52:24
-
06.2- Suspicious Traffic Hunting – Part 2
01:17:07
-
06.3- [BONUS] Scanning – Part 1
55:46
-
06.4- [BONUS] Scanning – Part 2
01:01:41
-
06.5- [BONUS] Scanning – Part 3
01:13:49
-
06.6- Suspicious Traffic Hunting – Part 3
58:21
-
06.7- Suspicious Traffic Hunting – Part 4
53:10
-
06.8- Suspicious Traffic Hunting – Part 5
01:05:04
-
06.9- Suspicious Traffic Hunting – Part 6
33:43
-
07.1- Hunting Webshells – Part 1
34:55
-
07.2- Hunting Webshells – Part 2
36:48
-
07.3- Hunting Webshells – Part 3
37:57
-
07.4- [Lab] Hunting Web Shells Part 1
01:16:17
-
07.5- [Lab] Hunting Web Shells Part 2
01:06:43