May

21

2020

Practical Cyber Threat Hunting

supnatural 21 May 2020 08:15 LEARNING » e-learning - Tutorial

Practical Cyber Threat Hunting
Practical Cyber Threat Hunting
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz
Language: English | Size: 4.64 GB | Duration: 7.5 hours

What you'll learn
Students will gain abilities like Network forensic skills, Memory Forensic skills threat hunting over ELK incident response skills for APT analysis and more. In this course students will learn counducting threat hunting and compromise assessment. In the first module I created a real life attack scenerio as an adversary simulation in a demo lab. I lecture to my students about cyber threat intelligence sources and types, basic definition and terms like IOC, TTP, Cyber Kill Chain Model, Incident Response Steps. I critisize security devices capabilities for explaining why we need monitoring and SIEM infrastructure. In the second module I give you therotical knowledge about real attack techniques like SQL Injection, Buffer OverFlow Exploit Codes, SSH tunneling methods and more... I teach to my students how to collect full pcap traffic and which tools should be used for analysing. In module two I analysis tunnels, pivot points, web attacks, Remote Code Execution Exploits, Web Shells and Web attacks traffic from pcap files and I share my real world analysis experince with my students. In third module, First I present the fundamental windows processes and process injections, hollowing techniques and tools, pe injection and thread injection techniques and tools as theoritically. Then I teach you dumping memory samples for memory forensic and I analyze Stuxnet attack's memory image, Cridex, Zeus, Darkcomet Rat's Memory images and DLL injection event's memory image. In fourth module I perform therat hunting over ELK. First I explain the event id numbers which are used common for hunting and I analyze a real life scenerio. I detected malicious word documents, hta files, unsigned exe files, vbs files and more. I teach you how to detect and investigate tunneling methods, persistency methods like registeries, services, schedule tasks. Some techniques are used like lolbas in attack lab and we investigate and map them by using MITRE framework. Google Rapid Response And Osquery usage and labs are performed by me.

Download
http://alfafile.net/file/8vRwN/Practical_Cyber_Threat_Hunting.part1.rar
http://alfafile.net/file/8vRwi/Practical_Cyber_Threat_Hunting.part2.rar
http://alfafile.net/file/8vRwo/Practical_Cyber_Threat_Hunting.part3.rar
http://alfafile.net/file/8vRwh/Practical_Cyber_Threat_Hunting.part4.rar
http://alfafile.net/file/8vRwS/Practical_Cyber_Threat_Hunting.part5.rar

or
https://rapidgator.net/file/66c64d3d40d86ba7757e61bbf7b8f2e8/Practical_Cyber_Threat_Hunting.part1.rar
https://rapidgator.net/file/98bcfaf0ae87208a8cbb241d084fec6b/Practical_Cyber_Threat_Hunting.part2.rar
https://rapidgator.net/file/9e1fe9979f7cd8edbd80fc110f730efc/Practical_Cyber_Threat_Hunting.part3.rar
https://rapidgator.net/file/3d3672619c1db7f7b67b449f6fdb5588/Practical_Cyber_Threat_Hunting.part4.rar
https://rapidgator.net/file/6bfce091a57e3eff09691e1f652e58e2/Practical_Cyber_Threat_Hunting.part5.rar

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis