PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

CBTnuggets SEC503 NetWork Monitoring and Threat Detection In Depth

Category: Courses / Others
Author: AD-TEAM
Date added: 18.10.2024 :09:16
Views: 0
Comments: 0










Description material
CBTnuggets SEC503 NetWork Monitoring and Threat Detection In Depth
39.46 GB | 00:18:56 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English



Files Included :
1 Concepts of TCPIP (218.61 MB)
2 Part of the Bigger Picture (251 MB)
3 Different parts of TCPIP (176.82 MB)
4 Were do we Get These Packets From (326.2 MB)
5 Replay the Traffic (110.02 MB)
6 Learning Binary and Hex (136.76 MB)
supplemental files (455.56 KB)
1 IPv6 (34.13 MB)
2 Identifying IPv6 (149.85 MB)
3 IPv6 Communication (219.51 MB)
4 IPv6 Addressing (230.58 MB)
5 Where is IPv6 in our Packet (100.36 MB)
6 Packet Examples (459.06 MB)
1 IPv4 (55.22 MB)
2 Identifying IPv4 (132.48 MB)
3 IPv4 Communication (267.53 MB)
4 IPv4 Addressing (323.89 MB)
5 Where is IPv4 in our Packet (410.96 MB)
6 Packet Examples (164.34 MB)
1 Wireshark Display Filters (35.9 MB)
2 To the Boolean-Mobile! (279.41 MB)
3 Knowing the Basic Filters (170.87 MB)
4 Expanding on Basic Filters (293.25 MB)
5 Syntax is Everything (340.95 MB)
6 Apply Filtering to Live Capture (192.03 MB)
1 Layer 4 and Beyond (87.83 MB)
2 Pen to Paper (319.9 MB)
3 DNS (309.01 MB)
4 Microsoft Protocols (268.52 MB)
5 HTTP (316.55 MB)
1 Advanced Wireshark (38.21 MB)
2 Magic Numbers (344.55 MB)
3 Regular Expressions (251.26 MB)
4 BPF Filtering (283.52 MB)
5 Supplemental Material (409.25 MB)
1 Introduction to Suricata (99.66 MB)
2 Installing Suricata (299.44 MB)
3 Continuing our Install (210.59 MB)
4 Setting up Suricata (413.28 MB)
5 Rule Configuration (383.13 MB)
1 DNS (137.18 MB)
2 Identifying DNS (231.61 MB)
3 DNS Communication (261.63 MB)
4 DNS Addressing (193.85 MB)
5 Where is DNS in our packet (320.29 MB)
6 Packet Examples (183.35 MB)
1 Microsoft Protocols (110.35 MB)
2 NETBIOS (382.74 MB)
3 LDAP (203.5 MB)
4 RDP (223.26 MB)
5 Kerberos (268.37 MB)
6 SMB (342.32 MB)
7 RPC (244.24 MB)
1 Modern HTTP (42.18 MB)
2 HTTP Basics (146.62 MB)
3 HTTP Delivery (147.05 MB)
4 Understanding HTTP on the Network (363.84 MB)
5 Files From Within (390.95 MB)
6 Looking for Web Traffic (234.25 MB)
1 Real-world Applications (64.33 MB)
2 Solarwinds (291.01 MB)
3 Starting up our Solarwinds (380.84 MB)
4 Basic Configurations (385.45 MB)
5 Adding a Log Source (347.55 MB)
1 Introduction to Wireshark (30.63 MB)
2 Uses of Wireshark (198.93 MB)
3 Being Promiscuous (318.15 MB)
4 Saving our Work for Later (273.8 MB)
5 Exporting Things From Wireshark (390.9 MB)
6 Filtering Results (266.01 MB)
1 How to Research a Protocol (72.7 MB)
2 There's something strange, and it don't look good. (283.3 MB)
3 Requesting a comment (222.33 MB)
4 Tying in the Results to our Packets (388.75 MB)
5 What is this Protocol Used for (383.79 MB)
6 Other Protocols Moving Forward (100.35 MB)
1 Scapy (55.11 MB)
2 What is Scapy (174.96 MB)
3 Installing Scapy (335.7 MB)
4 Crafting with Scapy (256.89 MB)
5 Making Our Packets Look Legit (267.34 MB)
6 What's the real purpose of Scapy (204.7 MB)
1 Snort (140.76 MB)
2 What is Snort (272.61 MB)
3 Installing Snort (272.36 MB)
4 Setting up Snort (390.34 MB)
5 Configuring Some Rules (200.8 MB)
6 Security Considerations (228.71 MB)
1 Burp Suite (89.06 MB)
2 Getting the Software (261.12 MB)
3 Configuration of Burp Suite (288.52 MB)
4 Crawling Around (389.9 MB)
5 Burp Suite Detection (339.96 MB)
1 Introduction to Network Forensic Analysis (84.81 MB)
2 Who Owns What (313.46 MB)
3 Finding Our Practice (288.29 MB)
4 Starting Our Practice (571.47 MB)
5 Checking Our Results (110.95 MB)
1 Zeek (Bro) (63.01 MB)
2 Zeek Installation (271.86 MB)
3 Some of the Basics (276.91 MB)
4 Running Zeek (277.3 MB)
5 Examining the Results (499.77 MB)
6 Practice at Home (160.46 MB)
1 Network Architecture (84.77 MB)
2 The Internal Network (168.19 MB)
3 The External Network (282.14 MB)
4 Mapping out the Cloud (263.27 MB)
5 Putting Pen to Paper (348.81 MB)
6 Let's Review (205.51 MB)
1 Introduction to Network Monitoring at Scale (131.67 MB)
2 Understanding the Network (224.52 MB)
3 Solarwinds (Again) (424.33 MB)
4 Monitoring with Solarwinds (469.9 MB)
5 Other Network Monitoring Options (414.3 MB)
1 IDS and IPS Evasion Theory (72.26 MB)
2 Understanding What Evasion Actually Is (282.7 MB)
3 Fragmentation (304.76 MB)
4 Spoofing (309.44 MB)
5 Sledding Past the IDSIPS (345.71 MB)
6 Forging a Signature (270.44 MB)
1 Threat Hunting and Visualization (57.62 MB)
2 What is a Netflow (134.55 MB)
3 Examining a Netflow (210.43 MB)
4 Replaying the Traffic (368.48 MB)
5 Is It Something Bad (284.73 MB)
6 Stress Testing Our Packet Captures (210.76 MB)
7 Let's Review (110.62 MB)
1 UNIX Command Line Processing (83.59 MB)
2 Why UNIX (328.74 MB)
3 Network Analysis on POSIX-based Systems (274.93 MB)
4 Burpsuite (315.02 MB)
5 sslstrip (247.61 MB)
6 Back to the Field. Manual (154.84 MB)
1 Network Access Link Layer 2 (37.71 MB)
2 Identifying Layer 2 (207.15 MB)
3 Layer 2 Communication (350.59 MB)
4 Using Layer 2 as a Forwarding Address (326.55 MB)
5 Where is Layer 2 in our Packet (201.96 MB)
6 Packet Examples (189.04 MB)
1 IP Link Layer 3 (37.05 MB)
2 Identifying Layer 3 (223.54 MB)
3 Layer 3 Communication (315.66 MB)
4 Using Layer 3 as a Forwarding Address (278.68 MB)
5 Where is Layer 3 in our Packet (204.78 MB)
6 Packet Examples (283.14 MB)
1 Real-world Application (79.69 MB)
2 Knowing the Packet (330.37 MB)
3 Quirks in IP Addressing (238.85 MB)
4 Layer 3 Protocols (302.54 MB)
5 Encryption Issues (331.49 MB)
6 Capturing Those Packets (218.11 MB)
1 ICMP (53.25 MB)
2 Identifying ICMP (129.13 MB)
3 ICMP Communication (294.1 MB)
4 ICMP Addressing (206.34 MB)
5 Where is ICMP in our Packet (442.9 MB)
6 Packet Examples (318.25 MB)
1 UDP (33.03 MB)
2 Identifying UDP (189.87 MB)
3 UDP Communication (249.79 MB)
4 UDP Addressing (191.08 MB)
5 Where is UDP in our Packet (193.33 MB)
6 Packet Examples (278.59 MB)
1 TCP (30.73 MB)
2 Identifying TCP (222.43 MB)
3 TCP Communication (244.26 MB)
4 TCP Addressing (292.01 MB)
5 Where is TCP in our Packet (213.38 MB)
6 Packet Examples (258.94 MB)
[center]
Screenshot


[/center]

Warning! You are not allowed to view this text.

Warning! You are not allowed to view this text.

Warning! You are not allowed to view this text.

Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: