PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Cybrary - Become an Incident Handler

Category: Courses / Others
Author: AD-TEAM
Date added: 11.06.2023 :35:53
Views: 19
Comments: 0










Description material

Cybrary - Become an Incident Handler


Cybrary - Become an Incident Handler
Language: English | Size:3.75 GB
Genre:eLearning


Files Included :

1 1 Incident Response Steps Introduction.mp4 (21.79 MB)
MP4
1 2 Incident Response Steps.mp4 (21.11 MB)
MP4
1 3 Incident Response Steps Breakdown.mp4 (24.22 MB)
MP4
1 1 Incident Response Kits Introduction.mp4 (37.36 MB)
MP4
1 2 Incident Response Kits Hardware.mp4 (35.14 MB)
MP4
1 3 Incident Response Kits Software.mp4 (31.68 MB)
MP4
1 4 Incident Response Team Models.mp4 (37.2 MB)
MP4
1 5 Incident Response Team Members.mp4 (35.58 MB)
MP4
1 1 Incident Identification.mp4 (35.34 MB)
MP4
1 2 First Steps in Incident Response.mp4 (31.63 MB)
MP4
1 3 Chain of Custody Part 1.mp4 (37.45 MB)
MP4
1 4 Chain of Custody Part 2.mp4 (38.34 MB)
MP4
1 5 Incident Containment.mp4 (34.36 MB)
MP4
1 6 Recovery.mp4 (35.37 MB)
MP4
1 1 Incident Recovery.mp4 (33.56 MB)
MP4
1 2 Incident Documentation.mp4 (51.87 MB)
MP4
1 3 Legal Concerns.mp4 (33.7 MB)
MP4
1 4 Lessons Learned Part 1.mp4 (33.27 MB)
MP4
1 5 Lessons Learned Part 2.mp4 (66.16 MB)
MP4
1 1 Seeking the Truth.mp4 (33.45 MB)
MP4
1 2 Facts vs Expert Witness.mp4 (10.76 MB)
MP4
2 1 Evidence Identification.mp4 (14.03 MB)
MP4
2 2 Evidence Preservation.mp4 (9.99 MB)
MP4
2 3 Evidence Handling and Storage.mp4 (26.3 MB)
MP4
2 4 Chain of Custody.mp4 (13.72 MB)
MP4
2 5 Examination Notes and Analysis Documentation.mp4 (20.62 MB)
MP4
3 1 Investigation Planning.mp4 (21.51 MB)
MP4
3 2 Investigation Bias.mp4 (20.3 MB)
MP4
3 3 Checklists and Standard Procedure.mp4 (8.28 MB)
MP4
3 4 Drawing Conclusions.mp4 (6.27 MB)
MP4
4 1 Format of the Expert Report.mp4 (17.86 MB)
MP4
4 2 Importance of Every Word.mp4 (8.57 MB)
MP4
4 3 Drawing Conclusions Revisited.mp4 (4.7 MB)
MP4
4 4 The Importance of Peer Review.mp4 (4.36 MB)
MP4
4 5 Supplemental Reports.mp4 (7.05 MB)
MP4
5 1 US Constitution.mp4 (19.65 MB)
MP4
5 2 Original vs Appellate Jurisdiction.mp4 (4.54 MB)
MP4
5 3 State Courts and Federalism.mp4 (12.23 MB)
MP4
6 1 Judge vs Jury Trial.mp4 (5.52 MB)
MP4
6 2 Anatomy of a Trial.mp4 (10.11 MB)
MP4
7 1 Federal Rule of Evidence 702.mp4 (16.72 MB)
MP4
7 2 Federal Rule of Civil Procedure 26.mp4 (9.98 MB)
MP4
7 3 Federal Criminal Rule of Procedure 16.mp4 (3.82 MB)
MP4
7 4 State and Local Rules.mp4 (4.84 MB)
MP4
7 5 Work Product Doctrine.mp4 (12.86 MB)
MP4
8 1 Written vs Oral Testimony.mp4 (9.34 MB)
MP4
8 2 Affidavits vs Declarations.mp4 (6.31 MB)
MP4
9 1 Voire Dire of Experts.mp4 (31.34 MB)
MP4
9 2 Consulting vs Testifying.mp4 (6.87 MB)
MP4
9 3 Direct Examination.mp4 (6.48 MB)
MP4
9 4 Cross Examination.mp4 (8.01 MB)
MP4
9 5 Redirect Examination.mp4 (6.8 MB)
MP4
10 1 Expert Testimony Do's and Don'ts.mp4 (21.09 MB)
MP4
11 1 Course Wrap-Up and Next Steps.mp4 (13.49 MB)
MP4
1 1 Introduction to Memory Analysis.mp4 (33.86 MB)
MP4
1 2 Memory Analysis Explanation.mp4 (40.39 MB)
MP4
1 3 Using FTK for Memory Analysis.mp4 (35.01 MB)
MP4
1 4 Lab Introduction.mp4 (36.35 MB)
MP4
1 5 Redline Lab.mp4 (36.47 MB)
MP4
1 6 VM and Malware Lab.mp4 (50.3 MB)
MP4
1 7 Redline Analysis Lab Part 1.mp4 (58.24 MB)
MP4
1 8 Redline Analysis Lab Part 2.mp4 (92.61 MB)
MP4
1 1 Reconnaissance.mp4 (37 MB)
MP4
1 2 Job Boards, Certificates, and Company Websites.mp4 (60.11 MB)
MP4
1 3 Social Media Lab Part 1.mp4 (58.74 MB)
MP4
1 4 Social Media Lab Part 2.mp4 (49.87 MB)
MP4
1 5 Social Media Lab Part 3.mp4 (47.01 MB)
MP4
1 6 Whois Lab.mp4 (24.14 MB)
MP4
1 1 Scanning and Enumeration.mp4 (36.89 MB)
MP4
1 2 NMAP Lab Part 1.mp4 (55.44 MB)
MP4
1 3 NMAP Lab Part 2.mp4 (48.44 MB)
MP4
1 1 Course Overview.mp4 (6.73 MB)
MP4
1 2 What is the MITRE ATT&CK Framework.mp4 (23.6 MB)
MP4
1 3 Where is the MITRE ATT&CK Framework Being Used.mp4 (31.92 MB)
MP4
1 4 Navigation and Review.mp4 (93.48 MB)
MP4
2 1 What is Initial Access.mp4 (10.99 MB)
MP4
2 10 Module 2 Summary.mp4 (9.55 MB)
MP4
2 2 External Remote Services.mp4 (28.03 MB)
MP4
2 3 Spearphishing Link.mp4 (48.29 MB)
MP4
2 4 Supply Chain Compromise Part 1.mp4 (28.2 MB)
MP4
2 5 Supply Chain Compromise Part 2.mp4 (15.64 MB)
MP4
2 6 Trusted Relationship.mp4 (30.94 MB)
MP4
2 7 Valid Accounts Part 1.mp4 (20.35 MB)
MP4
2 8 Valid Accounts Part 2.mp4 (18.02 MB)
MP4
2 9 Initial Access Case Study.mp4 (16.49 MB)
MP4
3 1 What is Execution.mp4 (5.26 MB)
MP4
3 2 Command Line Interface.mp4 (40.25 MB)
MP4
3 3 Execution Through API.mp4 (14.23 MB)
MP4
3 4 Control Panel Items.mp4 (29.26 MB)
MP4
3 5 Powershell.mp4 (25.58 MB)
MP4
3 6 Scripting.mp4 (22.15 MB)
MP4
3 7 User Execution.mp4 (22.32 MB)
MP4
3 8 Execution Case Study.mp4 (17.7 MB)
MP4
3 9 Module 3 Summary.mp4 (10.1 MB)
MP4
4 1 What is Persistence.mp4 (4.42 MB)
MP4
4 10 Module 4 Summary.mp4 (4.86 MB)
MP4
4 2 Accessibility Features.mp4 (26.32 MB)
MP4
4 3 Bootkit.mp4 (18.74 MB)
MP4
4 4 Browser Extension.mp4 (25.22 MB)
MP4
4 5 Component Firmware.mp4 (21.29 MB)
MP4
4 6 Create Account.mp4 (24.1 MB)
MP4
4 7 Hooking.mp4 (8.06 MB)
MP4
4 8 New Service.mp4 (18.98 MB)
MP4
4 9 Persistence Case Study.mp4 (17.72 MB)
MP4
5 1 What is Privilege Escalation.mp4 (4.88 MB)
MP4
5 10 Module 5 Summary.mp4 (4.63 MB)
MP4
5 2 Access Token Manipulation.mp4 (19.15 MB)
MP4
5 3 Elevation Escalation with Prompt.mp4 (14.12 MB)
MP4
5 4 Exploitation for Privilege Escalation.mp4 (21.59 MB)
MP4
5 5 File System Permission Weakness.mp4 (15.45 MB)
MP4
5 6 Scheduled Task.mp4 (14.99 MB)
MP4
5 7 Sudo.mp4 (14.7 MB)
MP4
5 8 Web Shell.mp4 (23.41 MB)
MP4
5 9 Privilege Escalation Case Study.mp4 (48.58 MB)
MP4
6 1 What is Defense Evasion.mp4 (5.38 MB)
MP4
6 10 Module 6 Summary.mp4 (5.92 MB)
MP4
6 2 Clear Command History.mp4 (13.24 MB)
MP4
6 3 Compile After Delivery.mp4 (13.73 MB)
MP4
6 4 Disabling Security Tools.mp4 (7.9 MB)
MP4
6 5 Hidden Files and Directories.mp4 (11.44 MB)
MP4
6 6 Hidden Users.mp4 (6.9 MB)
MP4
6 7 Process Hollowing.mp4 (11.35 MB)
MP4
6 8 Software Packing.mp4 (10.27 MB)
MP4
6 9 Defense Evasion Case Study.mp4 (16.75 MB)
MP4
7 1 What is Credential Access.mp4 (2.96 MB)
MP4
7 2 Bash History.mp4 (8.53 MB)
MP4
7 3 Brute Forces.mp4 (15.75 MB)
MP4
7 4 Credential Dumping.mp4 (9.69 MB)
MP4
7 5 Steal Web Session Cookie.mp4 (9.97 MB)
MP4
7 6 Credential Access Case Study.mp4 (8.32 MB)
MP4
7 7 Module 7 Summary.mp4 (2.57 MB)
MP4
8 1 What is Discovery.mp4 (3.52 MB)
MP4
8 2 Account Discovery.mp4 (11.37 MB)
MP4
8 3 Browser Bookmark Discovery.mp4 (14.97 MB)
MP4
8 4 System Owner or User Discovery.mp4 (6.84 MB)
MP4
8 5 Discovery Case Study.mp4 (11.18 MB)
MP4
8 6 Module 8 Summary.mp4 (2.91 MB)
MP4
9 1 What is Lateral Movement.mp4 (2.88 MB)
MP4
9 2 Application Deployment Software.mp4 (12.63 MB)
MP4
9 3 Exploitation of Remote Services.mp4 (17.99 MB)
MP4
9 4 SSH Hijacking.mp4 (10.17 MB)
MP4
9 5 Lateral Movement Case Study.mp4 (18.61 MB)
MP4
9 6 Module 9 Summary.mp4 (2.72 MB)
MP4
10 1 What is Collection.mp4 (2.68 MB)
MP4
10 2 Audio Capture.mp4 (9.5 MB)
MP4
10 3 Clipboard Data.mp4 (18.61 MB)
MP4
10 4 Data from Local System.mp4 (7.62 MB)
MP4
10 5 Collection Case Study.mp4 (9.65 MB)
MP4
10 6 Module 10 Summary.mp4 (2.6 MB)
MP4
11 1 What is Command Control.mp4 (2.32 MB)
MP4
11 2 Commonly Used Port.mp4 (8.18 MB)
MP4
11 3 Custom Command and Control Protocol.mp4 (7.61 MB)
MP4
11 4 Uncommonly Used Ports.mp4 (9.1 MB)
MP4
11 5 Command and Control Case Study.mp4 (6.47 MB)
MP4
11 6 Module 11 Summary.mp4 (2.65 MB)
MP4
12 1 What is Exfiltration.mp4 (1.81 MB)
MP4
12 2 Automated Exfiltration.mp4 (8.55 MB)
MP4
12 3 Data Compressed.mp4 (6.19 MB)
MP4
12 4 Data Transfer Size or Limits.mp4 (6.08 MB)
MP4
12 5 Exfiltration Case Study.mp4 (6.99 MB)
MP4
12 6 Module 12 Summary.mp4 (2.98 MB)
MP4
13 1 What is Impact.mp4 (2.32 MB)
MP4
13 2 Account Access Removal.mp4 (7.08 MB)
MP4
13 3 Defacement.mp4 (4.94 MB)
MP4
13 4 Impact Case Study.mp4 (6.86 MB)
MP4
13 5 Module 13 Summary.mp4 (1.89 MB)
MP4
14 1 Course Summary.mp4 (7.7 MB)
MP4
1 2 Finding and Researching the Behavior.mp4 (37.83 MB)
MP4
1 3 Translating the Behavior into a Tactic.mp4 (56.86 MB)
MP4
1 4 Identifying Techniques or Sub-Techniques.mp4 (57.16 MB)
MP4
1 5 Mapping to a Narrative Point.mp4 (52.17 MB)
MP4
1 6 Hedging Your Biases.mp4 (42.33 MB)
MP4
2 1 The Process of Mapping from Raw Data.mp4 (28.54 MB)
MP4
2 2 Identify and Research Behaviors.mp4 (21.29 MB)
MP4
2 3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4 (18.97 MB)
MP4
2 4 Raw Data to Narrative Reporting.mp4 (39.69 MB)
MP4
3 1 Storing and Displaying ATT&CK®-Mapped Data.mp4 (13.17 MB)
MP4
3 2 Expressing and Storing ATT&CK®-Mapped Data.mp4 (18.79 MB)
MP4
3 3 Analyzing ATT&CK®-Mapped Data.mp4 (25.72 MB)
MP4
3 4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4 (8.38 MB)
MP4
4 1 The Defensive Recommendations Process.mp4 (21.24 MB)
MP4
4 4 Make Defensive Recommendations.mp4 (57.75 MB)
MP4
1 1 Evasion.mp4 (13.97 MB)
MP4
1 1 Being Stealthy.mp4 (43.02 MB)
MP4





Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: