Malware Prevention Detection and Response
Language: English | Size:2.9 GB
Genre:eLearning
Files Included :
1 Course Overview.mp4 (6.82 MB)
MP4
1 Why Build Your Own Lab.mp4 (20.38 MB)
MP4
2 Who Needs to Do This.mp4 (12.35 MB)
MP4
3 What Skills Are Required.mp4 (13.05 MB)
MP4
4 Creating a Safe Environment.mp4 (42.98 MB)
MP4
5 Choosing a Hypervisor.mp4 (27.24 MB)
MP4
6 Escaping VMs.mp4 (23.69 MB)
MP4
7 Choosing Operating Systems.mp4 (35.12 MB)
MP4
8 Evading Intelligent Malware.mp4 (15.25 MB)
MP4
9 Choosing Hardware to Use.mp4 (38.89 MB)
MP4
1 Convincing Malware Hardware Is Real.mp4 (30.14 MB)
MP4
2 Setting Up the Virtual Machine Networking.mp4 (121.22 MB)
MP4
3 Configuring the Virtual Machine Hardware Settings.mp4 (62.06 MB)
MP4
1 Adjusting to the Situation.mp4 (10.11 MB)
MP4
2 Creating a Realistic Operating System.mp4 (26.53 MB)
MP4
3 Knowing the Malware.mp4 (29.65 MB)
MP4
4 Simulating User Activity.mp4 (43.42 MB)
MP4
5 Working Around VMware Tools.mp4 (41.58 MB)
MP4
1 Deciding on Tools.mp4 (33.69 MB)
MP4
2 Using Process Explorer.mp4 (17.38 MB)
MP4
3 Using Process Monitor.mp4 (9.1 MB)
MP4
4 Using Regshot and Autoruns.mp4 (12.65 MB)
MP4
5 Using Fakenet.mp4 (15.9 MB)
MP4
1 Pivoting to Alternative Tools.mp4 (8.5 MB)
MP4
2 Preparing to Analyze Malware.mp4 (18.49 MB)
MP4
1 Course Overview.mp4 (8.11 MB)
MP4
1 Introduction.mp4 (2.97 MB)
MP4
2 What is Fileless Malware.mp4 (35.04 MB)
MP4
1 PowerShell.mp4 (39.26 MB)
MP4
2 C Sharp Compilers.mp4 (47.3 MB)
MP4
3 WMI.mp4 (79.48 MB)
MP4
4 What if the Attacker is Not Worried About Persistence.mp4 (32.2 MB)
MP4
5 How to Catch Malware.mp4 (25.57 MB)
MP4
6 Cyberchef.mp4 (32.15 MB)
MP4
1 Why Do Attackers Use These Techniques.mp4 (19.81 MB)
MP4
2 Logging and Anomaly Detection.mp4 (99.27 MB)
MP4
3 Which Tools to Look for.mp4 (26.7 MB)
MP4
1 What Do We Need to Be Logging.mp4 (54.32 MB)
MP4
2 Demo - Setting up Event and PowerShell Logging.mp4 (76.65 MB)
MP4
3 Sysmon.mp4 (18 MB)
MP4
4 Logmd.mp4 (10.9 MB)
MP4
1 Event Log Explorer.mp4 (73.66 MB)
MP4
2 DeepBluCLI.mp4 (23.83 MB)
MP4
3 Alternative Detection Tools.mp4 (44.62 MB)
MP4
1 Wrap Up.mp4 (63.77 MB)
MP4
1 Course Overview.mp4 (8.41 MB)
MP4
1 Introduction.mp4 (16.65 MB)
MP4
2 What TrickBot Leads To.mp4 (16.22 MB)
MP4
3 TrickBot Initial Foothold and Lateral Movement.mp4 (12.99 MB)
MP4
4 Who Is Running TrickBot and What Do They Do.mp4 (48.7 MB)
MP4
5 TrickBot Defenses.mp4 (46.69 MB)
MP4
1 Analysis Preparation.mp4 (22.16 MB)
MP4
2 Running TrickBot.mp4 (16.59 MB)
MP4
3 Analyzing TrickBot Changes with RegShot.mp4 (14.79 MB)
MP4
4 Analyzing TrickBot Behavior with Process Monitor.mp4 (26.11 MB)
MP4
5 TrickBot Persistence.mp4 (36.79 MB)
MP4
6 TrickBot Files.mp4 (3.94 MB)
MP4
1 TrickBot Plugins.mp4 (31.7 MB)
MP4
2 Decrypting TrickBot Plugins.mp4 (24.8 MB)
MP4
3 Detecting TrickBot Compromised Systems.mp4 (27.4 MB)
MP4
1 Network Monitoring Considerations.mp4 (34.22 MB)
MP4
2 Analyzing TrickBot Network Traffic with Zeek.mp4 (24.2 MB)
MP4
3 Utilizing Zeek and JA3 to Analyze SSL Network Traffic.mp4 (25.63 MB)
MP4
4 Network Detection and Protection Techniques.mp4 (30.41 MB)
MP4
5 Utilizing Wireshark for TrickBot Network Analysis.mp4 (30.22 MB)
MP4
1 Summary.mp4 (29.65 MB)
MP4
1 Course Overview.mp4 (4.79 MB)
MP4
1 Business Email Compromises.mp4 (97.32 MB)
MP4
2 BEC Prevention.mp4 (134.6 MB)
MP4
3 Detection.mp4 (127 MB)
MP4
4 BEC Response.mp4 (89.91 MB)
MP4
5 Summary.mp4 (53.5 MB)
MP4
1 Course Overview.mp4 (9.3 MB)
MP4
1 An Introduction to Dridex.mp4 (39.46 MB)
MP4
2 Preventing Dridex.mp4 (99.81 MB)
MP4
3 Detection.mp4 (91.4 MB)
MP4
4 Response.mp4 (110.14 MB)
MP4
5 Summary.mp4 (20.42 MB)
MP4
fakenet1 4 3.zip (5.72 MB)
ZIP
inetsim-1 3 1.zip (321.87 KB)
ZIP
pafish-0 5 8.zip (621.84 KB)
ZIP
ProcessExplorer-16 26.zip (1.93 MB)
ZIP
processhacker-2 39.zip (2.12 MB)
ZIP
ProcessMonitor-3 52.zip (1.01 MB)
ZIP
Regshot-1 9 0.zip (290.93 KB)
ZIP