种子简介
种子名称:
Threat Intelligence- Cyber Threats and Kill Chain Methodology
文件类型:
视频
文件数目:
23个文件
文件大小:
274.74 MB
收录时间:
2021-7-20 15:52
已经下载:
3次
资源热度:
226
最近下载:
2024-11-26 16:25
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:f8a8825ecd33247d69b76dbc3b9fb62fe3ed0727&dn=Threat Intelligence- Cyber Threats and Kill Chain Methodology
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Threat Intelligence- Cyber Threats and Kill Chain Methodology.torrent
04. Advanced Persistent Threats (APTs)/04. Demo- The Mitre Att&ck Framework.mp430.71MB
01. Threat Vectors and Threat Actors/00. The Threat Based Approach.mp411.75MB
01. Threat Vectors and Threat Actors/01. Cyber Threats Overview.mp45.31MB
01. Threat Vectors and Threat Actors/02. Analyzing Main Threat Vectors.mp423.69MB
01. Threat Vectors and Threat Actors/03. Analyzing Threat Actors.mp413.93MB
01. Threat Vectors and Threat Actors/04. Real-World Analysis- Threat Actors.mp46.38MB
01. Threat Vectors and Threat Actors/05. Understanding Your Enemies.mp414.59MB
02. Indicators of Compromise (IoCs)/00. Threats and IoCs.mp414.63MB
02. Indicators of Compromise (IoCs)/01. Understanding Main Indicators of Compromise.mp416.57MB
02. Indicators of Compromise (IoCs)/02. Indicators of Compromise in the Real World.mp45.71MB
02. Indicators of Compromise (IoCs)/03. Demo- Investigating IoCs of a Ransomware Attack.mp422.99MB
03. The Kill Chain Methodology/00. Understanding the Kill Chain Methodology.mp44.07MB
03. The Kill Chain Methodology/01. The Kill Chain Process.mp418.31MB
03. The Kill Chain Methodology/02. Identifying Common Adversary Behavior.mp413.32MB
03. The Kill Chain Methodology/03. Fingerprinting an Adversary.mp44.62MB
03. The Kill Chain Methodology/04. Analyzing Real World Cyber Attacks.mp417.35MB
04. Advanced Persistent Threats (APTs)/00. Understanding Highly Skilled Attackers.mp42.7MB
04. Advanced Persistent Threats (APTs)/01. APT Objectives and Characteristics.mp412.83MB
04. Advanced Persistent Threats (APTs)/02. The APT Lifecycle.mp411.24MB
04. Advanced Persistent Threats (APTs)/03. Detecting and Preventing APTs.mp44.22MB
00. Course Overview/00. Course Overview.mp43.79MB
04. Advanced Persistent Threats (APTs)/05. Analyzing Real World APT Groups.mp49.5MB
04. Advanced Persistent Threats (APTs)/06. Course Closure and C-TIA Certification Tips.mp46.52MB