Complete SOC Analyst Course with Splunk Enterprise - 2023
Language: English | Size:10.14 GB
Genre:eLearning
Files Included :
1 Kali Linux Setup.mp4 (124.48 MB)
MP4
10 cd command.mp4 (50.47 MB)
MP4
11 cmp diff command.mp4 (46.31 MB)
MP4
12 cp command.mp4 (50.06 MB)
MP4
13 egrep command.mp4 (59.04 MB)
MP4
14 File permissions command.mp4 (49 MB)
MP4
15 find files by names command.mp4 (39.53 MB)
MP4
16 grep command.mp4 (66.69 MB)
MP4
17 ls command.mp4 (48.05 MB)
MP4
18 mkdir command.mp4 (44.01 MB)
MP4
19 modes command.mp4 (45.78 MB)
MP4
2 Users management.mp4 (66.43 MB)
MP4
20 rm command.mp4 (42.54 MB)
MP4
21 sort command.mp4 (46.08 MB)
MP4
22 uname command.mp4 (49.37 MB)
MP4
23 uniq command.mp4 (49.42 MB)
MP4
24 Who-is-logged command.mp4 (34.13 MB)
MP4
3 Directories in Kali Linux.mp4 (89.77 MB)
MP4
4 Services in Kali Linux.mp4 (26.95 MB)
MP4
5 Servers in Kali Linux.mp4 (38.69 MB)
MP4
6 Metasploit Framework.mp4 (282.44 MB)
MP4
7 Important tools for Security Expert.mp4 (147.18 MB)
MP4
8 Cat command.mp4 (56.47 MB)
MP4
9 Cal command.mp4 (38.79 MB)
MP4
1 Qualys Web Application overview.mp4 (9.71 MB)
MP4
2 Qualys Knowledge base and search lists.mp4 (5.56 MB)
MP4
3 Basic Web application setup.mp4 (47.03 MB)
MP4
4 Scheduled Scans.mp4 (20.02 MB)
MP4
5 Web Application scans Sitemap.mp4 (6.93 MB)
MP4
1 Lab 1 - Cloud Agent deployment.mp4 (30.07 MB)
MP4
10 Lab 10 - Scan-On-Demand VMDR.mp4 (58.9 MB)
MP4
11 Lab 11 - De-Install (Activate, De-activate, Uninstall Agents).mp4 (22.67 MB)
MP4
12 Lab 1 - Account Setup & Application.mp4 (23.36 MB)
MP4
13 Knowledge base & Search Lists.mp4 (25.8 MB)
MP4
14 Lab 2 - Working with Knowledge base.mp4 (31.89 MB)
MP4
15 Lab 3 - Working with SeachLists.mp4 (25.5 MB)
MP4
16 Lab 4 - Working with Asset tags.mp4 (38.85 MB)
MP4
17 Lab 5 - Working with Asset Search.mp4 (34.15 MB)
MP4
18 Asset & Asset inventory.mp4 (25.23 MB)
MP4
19 Asset Groups.mp4 (20.74 MB)
MP4
2 Lab 2 - Agent Installation Components.mp4 (16.97 MB)
MP4
20 Asset Tagging.mp4 (27.75 MB)
MP4
21 Using Asset tags.mp4 (27.19 MB)
MP4
22 Using Asset groups.mp4 (26.74 MB)
MP4
23 Lab 6 - Working with Asset groups.mp4 (17.72 MB)
MP4
24 Scan by Hostname.mp4 (28.47 MB)
MP4
25 Vulnerability Assessment.mp4 (30.12 MB)
MP4
26 Benefits of Vulnerability Assessment and Scanning.mp4 (22.71 MB)
MP4
27 VM Life cycle and Sensors.mp4 (36.65 MB)
MP4
28 Lab 7 - Working with Vulnerability Assessment.mp4 (24.02 MB)
MP4
29 Lab 8 - Authentication Records.mp4 (27.54 MB)
MP4
3 Lab 3 - Command Line Installations Windows.mp4 (55.71 MB)
MP4
30 Lab 9 - Launch Scan.mp4 (43.86 MB)
MP4
31 Scan Configuration.mp4 (28.17 MB)
MP4
32 Scheduling Assessment Scans.mp4 (27.65 MB)
MP4
33 View Scan results.mp4 (18.89 MB)
MP4
34 Lab 10 - Scheduled Scans.mp4 (15.92 MB)
MP4
35 User management.mp4 (27.45 MB)
MP4
36 Lab 11 - Creating user account.mp4 (18.06 MB)
MP4
37 Vulnerabilities Remediation.mp4 (30.3 MB)
MP4
38 Lab 12 - Assign Vulnerability to User.mp4 (18.36 MB)
MP4
39 Lab 13 - Ignore Vulnerabilities.mp4 (16.57 MB)
MP4
4 Lab 4 - Command Line installations - MSI.mp4 (12.07 MB)
MP4
40 Lab 14 - Create Remediation Report.mp4 (9.9 MB)
MP4
41 Report overview.mp4 (23.51 MB)
MP4
42 Report overview.mp4 (23.5 MB)
MP4
43 Lab 15 - Reporting.mp4 (20.93 MB)
MP4
44 Lab 16 - Scheduled Reports.mp4 (19.44 MB)
MP4
45 Lab 17 - Custom Report templates.mp4 (32.76 MB)
MP4
5 Lab 5 - Validate CA installation & Locate HOST ID.mp4 (10.86 MB)
MP4
6 Lab 6 - CA Log file & Troubleshoot.mp4 (11.95 MB)
MP4
7 Lab 7 - Asset Details & Queries.mp4 (28.9 MB)
MP4
8 Lab 8 - Windows Self-Protection feature.mp4 (9.63 MB)
MP4
9 Lab 9 - Configuration and Tunning the cloud agent.mp4 (80.12 MB)
MP4
1 TcpIP Model.mp4 (44.85 MB)
MP4
2 Types of Networks (LAN, WAN, MAN, WALN).mp4 (28.97 MB)
MP4
3 Application layer protocols (DNS, dns packet analysis, DNSSEC, how dns works).mp4 (107.41 MB)
MP4
4 Transport Layer Protocol (Tcp, UDP, SSL, TLS).mp4 (41.74 MB)
MP4
5 Internet layer (IP, IPv4 vs IPv6, IPsec, ARP, IGRP).mp4 (93.42 MB)
MP4
6 link layer Protocols (WEP, WPA, WPA2, CDP - CISCO, LEAPPEAP,).mp4 (61.08 MB)
MP4
7 Network Security devices (Firewall, hw Firewall, sw firewall, types, policie).mp4 (107.73 MB)
MP4
1 Security Management.mp4 (27.89 MB)
MP4
2 Capabilities of SOC.mp4 (32.26 MB)
MP4
3 Typical functions of Soc Operations.mp4 (23.79 MB)
MP4
4 SOC Workflow.mp4 (14.39 MB)
MP4
5 Components of SOC.mp4 (62.97 MB)
MP4
6 Types of SOC Models.mp4 (36.9 MB)
MP4
7 SOC Vs NOC.mp4 (28.12 MB)
MP4
8 Security Operations.mp4 (58.05 MB)
MP4
9 Need of SOC.mp4 (28.82 MB)
MP4
1 Nessus VA.mp4 (56.53 MB)
MP4
10 Bypassing Firewall rules using HTTPFTP Tunneling.mp4 (155.3 MB)
MP4
11 Cracking FTP credentials using Dictionary attack.mp4 (66.88 MB)
MP4
12 Exploiting parameter tampering and XSS Vulnerabilities.mp4 (61.3 MB)
MP4
13 Exploiting RCE - Remote code execution vulnerabilities.mp4 (71.31 MB)
MP4
14 Exploiting LFI&RFI Vulnerabilities.mp4 (116.55 MB)
MP4
15 Exploiting CSRF attacks.mp4 (102 MB)
MP4
16 Exploiting SQL injection attacks - Practical approach.mp4 (128.1 MB)
MP4
17 Exploiting MSSQL using webshell to extract databases (Exfiltration).mp4 (124.07 MB)
MP4
18 Wireless Packet analysis using Wireshark.mp4 (36.67 MB)
MP4
19 Cryptography - Calculate the hashes using the Hashcalc.mp4 (49.7 MB)
MP4
2 Dumping & Cracking SAM hashes to extract plaintext passwords.mp4 (61.97 MB)
MP4
20 Cryptography - calculate the hashes using MD5 hash calculator.mp4 (20.7 MB)
MP4
21 Cryptography - Basic Disk encryption using the Veracrypt.mp4 (68.37 MB)
MP4
3 Windows Registry entry monitoring for suspicious activities.mp4 (40.23 MB)
MP4
4 Startup program monitoring tool.mp4 (50.44 MB)
MP4
5 Spoofing MAC addresses using SMAC.mp4 (57.63 MB)
MP4
6 Detecting ARP attacks.mp4 (50.08 MB)
MP4
7 DOS attack - SYN flood attack using hping3.mp4 (58.81 MB)
MP4
8 Snort IDS - Detecting intrusions.mp4 (228.63 MB)
MP4
9 Bypass windows firewall using NMAP evasion techniques.mp4 (58.89 MB)
MP4
1 Cyber Threats.mp4 (65.63 MB)
MP4
10 Cyber Threat IoCs.mp4 (132.56 MB)
MP4
11 Malware Threats IOC - 2.mp4 (89.68 MB)
MP4
12 Hacking Methodologies.mp4 (79.15 MB)
MP4
13 CSA Brute Force demo.mp4 (52.49 MB)
MP4
14 CSA Proxy Switcher demo.mp4 (52.26 MB)
MP4
15 lab 1 - Understanding the Working of SQL Injection Attacks.mp4 (50.74 MB)
MP4
16 lab 2 - Understanding the Working of XSS Attacks.mp4 (38.38 MB)
MP4
17 lab 3 - Understanding the Working of Network Scanning Attacks.mp4 (48.98 MB)
MP4
18 lab 4 - Understanding the Working of Brute Force Attacks.mp4 (38.3 MB)
MP4
19 lab 5 - Detecting and Analyzing IoCs using Wireshark.mp4 (121.3 MB)
MP4
2 Intent-Motive-Goal.mp4 (15.84 MB)
MP4
3 Tactics-Techniques-Procedures.mp4 (16.83 MB)
MP4
4 Opportunity-Vulnerability-Weakness.mp4 (25.5 MB)
MP4
5 Network Level Attacks 1.mp4 (80.27 MB)
MP4
6 Network Level Attacks - 2.mp4 (54.92 MB)
MP4
7 Application Level Attacks.mp4 (88.84 MB)
MP4
8 Host,Application Level Attacks.mp4 (54.2 MB)
MP4
9 Network,Host,Application Level Attacks - 5.mp4 (23.77 MB)
MP4
1 Log , Event and Incident.mp4 (21.68 MB)
MP4
10 Local Logging - 3.mp4 (52.38 MB)
MP4
11 Local Logging - 4.mp4 (34.73 MB)
MP4
12 Local Logging - 5.mp4 (75.34 MB)
MP4
13 lab 1 - Configuring, Monitoring, and Analyzing Windows Logs.mp4 (74.74 MB)
MP4
14 lab 2 - Configuring, Monitoring, and Analyzing IIS Logs.mp4 (78.19 MB)
MP4
15 lab 3 - Configuring, Monitoring, and Analyzing Snort IDS Logs.mp4 (194.73 MB)
MP4
2 Centralized Logging challenges - 1.mp4 (47.47 MB)
MP4
3 Centralized Logging challenges - 2.mp4 (44.06 MB)
MP4
4 Typical Log Sources.mp4 (9.34 MB)
MP4
5 Need of Log.mp4 (31.64 MB)
MP4
6 Logging Requirements.mp4 (13.17 MB)
MP4
7 Typical Log Format.mp4 (22.69 MB)
MP4
8 Local Logging - 1.mp4 (55.66 MB)
MP4
9 Local Logging - 2.mp4 (84.03 MB)
MP4
1 Need of SIEM.mp4 (22.92 MB)
MP4
10 Use Case Examples For Network Level Incident Detection - 2.mp4 (75.6 MB)
MP4
11 Use Case Examples For Host Level Incident Detection.mp4 (56.09 MB)
MP4
12 Handling Alert Triaging and Analysis.mp4 (46.96 MB)
MP4
13 splunk deployment.mp4 (182.97 MB)
MP4
14 CSA SQL Injection Demo.mp4 (36.81 MB)
MP4
15 XSS Attack Demo.mp4 (24.84 MB)
MP4
16 Working with SPLUNK and SEARCH Demo.mp4 (121.73 MB)
MP4
17 lab 1 - Host Level Incident Detection Creating Splunk Use Case for Detecting an.mp4 (72.82 MB)
MP4
18 lab 2 - Application Level Incident Detection Creating Splunk Use Case for Detec.mp4 (47.15 MB)
MP4
19 Security Information and Event Management (SIEM).mp4 (17.41 MB)
MP4
2 Typical SIEM Capabilities.mp4 (29.52 MB)
MP4
20 lab 2 - Application Level Incident Detection Creating Splunk Use Case for Detec.mp4 (34.51 MB)
MP4
21 lab 3 - Network Level Incident Detection Creating Splunk Use Case for Detecting.mp4 (79.67 MB)
MP4
22 lab 4 - Host Level Incident Detection Creating ELK Use Case for Monitoring Trus.mp4 (127.18 MB)
MP4
23 Lab 5 - Host Level Incident Detection Creating ELK Use Case.mp4 (29.13 MB)
MP4
3 SIEM Architecture and its Components.mp4 (45.74 MB)
MP4
4 SIEM Solutions.mp4 (28.17 MB)
MP4
5 SIEM Deployment - 1.mp4 (37.12 MB)
MP4
6 SIEM Deployment - 2.mp4 (39.36 MB)
MP4
7 Incident Detection with SIEM and Use Case Examples For Application Level Inciden.mp4 (89.48 MB)
MP4
8 Use Case Examples For Insider Incident Detection.mp4 (41.21 MB)
MP4
9 Use Case Examples For Network Level Incident Detection - 1.mp4 (47.96 MB)
MP4
1 Cyber Threat Intelligence (CTI).mp4 (23.86 MB)
MP4
10 lab 1 - Enhanced Incident Detection with Threat Intelligence.mp4 (213.89 MB)
MP4
11 lab 2 - Integrating OTX Threat Data in OSSIM.mp4 (55.09 MB)
MP4
2 Types of Threat Intelligence - 1.mp4 (54.79 MB)
MP4
3 Types of Threat Intelligence - 2.mp4 (47.61 MB)
MP4
4 Threat Intelligence-driven SOC.mp4 (18.04 MB)
MP4
5 Benefit of Threat Intelligence to SOC Analyst.mp4 (11.96 MB)
MP4
6 Threat Intelligence Use Cases for SOC Analyst.mp4 (17.01 MB)
MP4
7 Integration of Threat Intelligence into SIEM.mp4 (17.07 MB)
MP4
8 Threat Intelligence Use Cases for Enhanced Incident Response.mp4 (23.72 MB)
MP4
9 Enhancing Incident Response by Establishing SOPs for Threat Intelligence.mp4 (26.17 MB)
MP4
1 Incident response.mp4 (25.97 MB)
MP4
10 Responding to Email Security Incidents.mp4 (48.26 MB)
MP4
11 Responding to an Insider Incidents.mp4 (70.79 MB)
MP4
12 Responding to an Malware Incidents.mp4 (44.63 MB)
MP4
13 CSA eradicating SQL and XSS Injection demo.mp4 (65.22 MB)
MP4
14 lab 1 - Generating Tickets for Incidents.mp4 (180.67 MB)
MP4
15 lab 2 - Eradicating SQL Injection and XSS Incidents.mp4 (79.12 MB)
MP4
16 lab 3 - Recovering from Data Loss Incidents.mp4 (120.14 MB)
MP4
17 lab 4 - Creating Incident Reports using OSSIM.mp4 (37.87 MB)
MP4
2 SOC and IRT Collaboration.mp4 (11.21 MB)
MP4
3 Incident Response (IR) Process Overview - 1.mp4 (66.02 MB)
MP4
4 Incident Response (IR) Process Overview - 2.mp4 (42.76 MB)
MP4
5 Incident Response (IR) Process Overview - 3.mp4 (89.1 MB)
MP4
6 Incident Response (IR) Process Overview - 4.mp4 (50.69 MB)
MP4
7 Incident Response (IR) Process Overview - 5.mp4 (82.28 MB)
MP4
8 Responding to Network Security Incidents.mp4 (89.5 MB)
MP4
9 Responding to Application Security Incidents.mp4 (113.44 MB)
MP4