Cybrary - Become an Incident Handler
Language: English | Size:3.75 GB
Genre:eLearning
Files Included :
1 1 Incident Response Steps Introduction.mp4 (21.79 MB)
MP4
1 2 Incident Response Steps.mp4 (21.11 MB)
MP4
1 3 Incident Response Steps Breakdown.mp4 (24.22 MB)
MP4
1 1 Incident Response Kits Introduction.mp4 (37.36 MB)
MP4
1 2 Incident Response Kits Hardware.mp4 (35.14 MB)
MP4
1 3 Incident Response Kits Software.mp4 (31.68 MB)
MP4
1 4 Incident Response Team Models.mp4 (37.2 MB)
MP4
1 5 Incident Response Team Members.mp4 (35.58 MB)
MP4
1 1 Incident Identification.mp4 (35.34 MB)
MP4
1 2 First Steps in Incident Response.mp4 (31.63 MB)
MP4
1 3 Chain of Custody Part 1.mp4 (37.45 MB)
MP4
1 4 Chain of Custody Part 2.mp4 (38.34 MB)
MP4
1 5 Incident Containment.mp4 (34.36 MB)
MP4
1 6 Recovery.mp4 (35.37 MB)
MP4
1 1 Incident Recovery.mp4 (33.56 MB)
MP4
1 2 Incident Documentation.mp4 (51.87 MB)
MP4
1 3 Legal Concerns.mp4 (33.7 MB)
MP4
1 4 Lessons Learned Part 1.mp4 (33.27 MB)
MP4
1 5 Lessons Learned Part 2.mp4 (66.16 MB)
MP4
1 1 Seeking the Truth.mp4 (33.45 MB)
MP4
1 2 Facts vs Expert Witness.mp4 (10.76 MB)
MP4
2 1 Evidence Identification.mp4 (14.03 MB)
MP4
2 2 Evidence Preservation.mp4 (9.99 MB)
MP4
2 3 Evidence Handling and Storage.mp4 (26.3 MB)
MP4
2 4 Chain of Custody.mp4 (13.72 MB)
MP4
2 5 Examination Notes and Analysis Documentation.mp4 (20.62 MB)
MP4
3 1 Investigation Planning.mp4 (21.51 MB)
MP4
3 2 Investigation Bias.mp4 (20.3 MB)
MP4
3 3 Checklists and Standard Procedure.mp4 (8.28 MB)
MP4
3 4 Drawing Conclusions.mp4 (6.27 MB)
MP4
4 1 Format of the Expert Report.mp4 (17.86 MB)
MP4
4 2 Importance of Every Word.mp4 (8.57 MB)
MP4
4 3 Drawing Conclusions Revisited.mp4 (4.7 MB)
MP4
4 4 The Importance of Peer Review.mp4 (4.36 MB)
MP4
4 5 Supplemental Reports.mp4 (7.05 MB)
MP4
5 1 US Constitution.mp4 (19.65 MB)
MP4
5 2 Original vs Appellate Jurisdiction.mp4 (4.54 MB)
MP4
5 3 State Courts and Federalism.mp4 (12.23 MB)
MP4
6 1 Judge vs Jury Trial.mp4 (5.52 MB)
MP4
6 2 Anatomy of a Trial.mp4 (10.11 MB)
MP4
7 1 Federal Rule of Evidence 702.mp4 (16.72 MB)
MP4
7 2 Federal Rule of Civil Procedure 26.mp4 (9.98 MB)
MP4
7 3 Federal Criminal Rule of Procedure 16.mp4 (3.82 MB)
MP4
7 4 State and Local Rules.mp4 (4.84 MB)
MP4
7 5 Work Product Doctrine.mp4 (12.86 MB)
MP4
8 1 Written vs Oral Testimony.mp4 (9.34 MB)
MP4
8 2 Affidavits vs Declarations.mp4 (6.31 MB)
MP4
9 1 Voire Dire of Experts.mp4 (31.34 MB)
MP4
9 2 Consulting vs Testifying.mp4 (6.87 MB)
MP4
9 3 Direct Examination.mp4 (6.48 MB)
MP4
9 4 Cross Examination.mp4 (8.01 MB)
MP4
9 5 Redirect Examination.mp4 (6.8 MB)
MP4
10 1 Expert Testimony Do's and Don'ts.mp4 (21.09 MB)
MP4
11 1 Course Wrap-Up and Next Steps.mp4 (13.49 MB)
MP4
1 1 Introduction to Memory Analysis.mp4 (33.86 MB)
MP4
1 2 Memory Analysis Explanation.mp4 (40.39 MB)
MP4
1 3 Using FTK for Memory Analysis.mp4 (35.01 MB)
MP4
1 4 Lab Introduction.mp4 (36.35 MB)
MP4
1 5 Redline Lab.mp4 (36.47 MB)
MP4
1 6 VM and Malware Lab.mp4 (50.3 MB)
MP4
1 7 Redline Analysis Lab Part 1.mp4 (58.24 MB)
MP4
1 8 Redline Analysis Lab Part 2.mp4 (92.61 MB)
MP4
1 1 Reconnaissance.mp4 (37 MB)
MP4
1 2 Job Boards, Certificates, and Company Websites.mp4 (60.11 MB)
MP4
1 3 Social Media Lab Part 1.mp4 (58.74 MB)
MP4
1 4 Social Media Lab Part 2.mp4 (49.87 MB)
MP4
1 5 Social Media Lab Part 3.mp4 (47.01 MB)
MP4
1 6 Whois Lab.mp4 (24.14 MB)
MP4
1 1 Scanning and Enumeration.mp4 (36.89 MB)
MP4
1 2 NMAP Lab Part 1.mp4 (55.44 MB)
MP4
1 3 NMAP Lab Part 2.mp4 (48.44 MB)
MP4
1 1 Course Overview.mp4 (6.73 MB)
MP4
1 2 What is the MITRE ATT&CK Framework.mp4 (23.6 MB)
MP4
1 3 Where is the MITRE ATT&CK Framework Being Used.mp4 (31.92 MB)
MP4
1 4 Navigation and Review.mp4 (93.48 MB)
MP4
2 1 What is Initial Access.mp4 (10.99 MB)
MP4
2 10 Module 2 Summary.mp4 (9.55 MB)
MP4
2 2 External Remote Services.mp4 (28.03 MB)
MP4
2 3 Spearphishing Link.mp4 (48.29 MB)
MP4
2 4 Supply Chain Compromise Part 1.mp4 (28.2 MB)
MP4
2 5 Supply Chain Compromise Part 2.mp4 (15.64 MB)
MP4
2 6 Trusted Relationship.mp4 (30.94 MB)
MP4
2 7 Valid Accounts Part 1.mp4 (20.35 MB)
MP4
2 8 Valid Accounts Part 2.mp4 (18.02 MB)
MP4
2 9 Initial Access Case Study.mp4 (16.49 MB)
MP4
3 1 What is Execution.mp4 (5.26 MB)
MP4
3 2 Command Line Interface.mp4 (40.25 MB)
MP4
3 3 Execution Through API.mp4 (14.23 MB)
MP4
3 4 Control Panel Items.mp4 (29.26 MB)
MP4
3 5 Powershell.mp4 (25.58 MB)
MP4
3 6 Scripting.mp4 (22.15 MB)
MP4
3 7 User Execution.mp4 (22.32 MB)
MP4
3 8 Execution Case Study.mp4 (17.7 MB)
MP4
3 9 Module 3 Summary.mp4 (10.1 MB)
MP4
4 1 What is Persistence.mp4 (4.42 MB)
MP4
4 10 Module 4 Summary.mp4 (4.86 MB)
MP4
4 2 Accessibility Features.mp4 (26.32 MB)
MP4
4 3 Bootkit.mp4 (18.74 MB)
MP4
4 4 Browser Extension.mp4 (25.22 MB)
MP4
4 5 Component Firmware.mp4 (21.29 MB)
MP4
4 6 Create Account.mp4 (24.1 MB)
MP4
4 7 Hooking.mp4 (8.06 MB)
MP4
4 8 New Service.mp4 (18.98 MB)
MP4
4 9 Persistence Case Study.mp4 (17.72 MB)
MP4
5 1 What is Privilege Escalation.mp4 (4.88 MB)
MP4
5 10 Module 5 Summary.mp4 (4.63 MB)
MP4
5 2 Access Token Manipulation.mp4 (19.15 MB)
MP4
5 3 Elevation Escalation with Prompt.mp4 (14.12 MB)
MP4
5 4 Exploitation for Privilege Escalation.mp4 (21.59 MB)
MP4
5 5 File System Permission Weakness.mp4 (15.45 MB)
MP4
5 6 Scheduled Task.mp4 (14.99 MB)
MP4
5 7 Sudo.mp4 (14.7 MB)
MP4
5 8 Web Shell.mp4 (23.41 MB)
MP4
5 9 Privilege Escalation Case Study.mp4 (48.58 MB)
MP4
6 1 What is Defense Evasion.mp4 (5.38 MB)
MP4
6 10 Module 6 Summary.mp4 (5.92 MB)
MP4
6 2 Clear Command History.mp4 (13.24 MB)
MP4
6 3 Compile After Delivery.mp4 (13.73 MB)
MP4
6 4 Disabling Security Tools.mp4 (7.9 MB)
MP4
6 5 Hidden Files and Directories.mp4 (11.44 MB)
MP4
6 6 Hidden Users.mp4 (6.9 MB)
MP4
6 7 Process Hollowing.mp4 (11.35 MB)
MP4
6 8 Software Packing.mp4 (10.27 MB)
MP4
6 9 Defense Evasion Case Study.mp4 (16.75 MB)
MP4
7 1 What is Credential Access.mp4 (2.96 MB)
MP4
7 2 Bash History.mp4 (8.53 MB)
MP4
7 3 Brute Forces.mp4 (15.75 MB)
MP4
7 4 Credential Dumping.mp4 (9.69 MB)
MP4
7 5 Steal Web Session Cookie.mp4 (9.97 MB)
MP4
7 6 Credential Access Case Study.mp4 (8.32 MB)
MP4
7 7 Module 7 Summary.mp4 (2.57 MB)
MP4
8 1 What is Discovery.mp4 (3.52 MB)
MP4
8 2 Account Discovery.mp4 (11.37 MB)
MP4
8 3 Browser Bookmark Discovery.mp4 (14.97 MB)
MP4
8 4 System Owner or User Discovery.mp4 (6.84 MB)
MP4
8 5 Discovery Case Study.mp4 (11.18 MB)
MP4
8 6 Module 8 Summary.mp4 (2.91 MB)
MP4
9 1 What is Lateral Movement.mp4 (2.88 MB)
MP4
9 2 Application Deployment Software.mp4 (12.63 MB)
MP4
9 3 Exploitation of Remote Services.mp4 (17.99 MB)
MP4
9 4 SSH Hijacking.mp4 (10.17 MB)
MP4
9 5 Lateral Movement Case Study.mp4 (18.61 MB)
MP4
9 6 Module 9 Summary.mp4 (2.72 MB)
MP4
10 1 What is Collection.mp4 (2.68 MB)
MP4
10 2 Audio Capture.mp4 (9.5 MB)
MP4
10 3 Clipboard Data.mp4 (18.61 MB)
MP4
10 4 Data from Local System.mp4 (7.62 MB)
MP4
10 5 Collection Case Study.mp4 (9.65 MB)
MP4
10 6 Module 10 Summary.mp4 (2.6 MB)
MP4
11 1 What is Command Control.mp4 (2.32 MB)
MP4
11 2 Commonly Used Port.mp4 (8.18 MB)
MP4
11 3 Custom Command and Control Protocol.mp4 (7.61 MB)
MP4
11 4 Uncommonly Used Ports.mp4 (9.1 MB)
MP4
11 5 Command and Control Case Study.mp4 (6.47 MB)
MP4
11 6 Module 11 Summary.mp4 (2.65 MB)
MP4
12 1 What is Exfiltration.mp4 (1.81 MB)
MP4
12 2 Automated Exfiltration.mp4 (8.55 MB)
MP4
12 3 Data Compressed.mp4 (6.19 MB)
MP4
12 4 Data Transfer Size or Limits.mp4 (6.08 MB)
MP4
12 5 Exfiltration Case Study.mp4 (6.99 MB)
MP4
12 6 Module 12 Summary.mp4 (2.98 MB)
MP4
13 1 What is Impact.mp4 (2.32 MB)
MP4
13 2 Account Access Removal.mp4 (7.08 MB)
MP4
13 3 Defacement.mp4 (4.94 MB)
MP4
13 4 Impact Case Study.mp4 (6.86 MB)
MP4
13 5 Module 13 Summary.mp4 (1.89 MB)
MP4
14 1 Course Summary.mp4 (7.7 MB)
MP4
1 2 Finding and Researching the Behavior.mp4 (37.83 MB)
MP4
1 3 Translating the Behavior into a Tactic.mp4 (56.86 MB)
MP4
1 4 Identifying Techniques or Sub-Techniques.mp4 (57.16 MB)
MP4
1 5 Mapping to a Narrative Point.mp4 (52.17 MB)
MP4
1 6 Hedging Your Biases.mp4 (42.33 MB)
MP4
2 1 The Process of Mapping from Raw Data.mp4 (28.54 MB)
MP4
2 2 Identify and Research Behaviors.mp4 (21.29 MB)
MP4
2 3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4 (18.97 MB)
MP4
2 4 Raw Data to Narrative Reporting.mp4 (39.69 MB)
MP4
3 1 Storing and Displaying ATT&CK®-Mapped Data.mp4 (13.17 MB)
MP4
3 2 Expressing and Storing ATT&CK®-Mapped Data.mp4 (18.79 MB)
MP4
3 3 Analyzing ATT&CK®-Mapped Data.mp4 (25.72 MB)
MP4
3 4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4 (8.38 MB)
MP4
4 1 The Defensive Recommendations Process.mp4 (21.24 MB)
MP4
4 4 Make Defensive Recommendations.mp4 (57.75 MB)
MP4
1 1 Evasion.mp4 (13.97 MB)
MP4
1 1 Being Stealthy.mp4 (43.02 MB)
MP4