589689.xyz

[Pluralsight] Blue Team Tools (2022)

  • 收录时间:2022-06-03 20:26:24
  • 文件大小:1GB
  • 下载次数:1
  • 最近下载:2022-06-03 20:26:24
  • 磁力链接:

文件列表

  1. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/3. Identifying Malware Command and Control.mp4 50MB
  2. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/2. General OS Information.mp4 36MB
  3. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/4. Finding and Fixing Security Issues with Scout Suite.mp4 34MB
  4. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/2. Analyzing Phishing Traffic.mp4 32MB
  5. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/4. Hunting with with Apache Spark and Graphframes.mp4 31MB
  6. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/4. Developing Techniques for Detecting Data Exfiltration.mp4 31MB
  7. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/3. Analyzing Windows Services.mp4 31MB
  8. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/4. Detecting File Movement with osquery.mp4 30MB
  9. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/3. Setting Up a Decoy VPN Server.mp4 27MB
  10. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/2. Getting Started with osquery.mp4 26MB
  11. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/5. Blocking Malicious Domains with pfSense.mp4 24MB
  12. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/3. Installing Scout Suite with Minimal Privileges.mp4 24MB
  13. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/5. Demo 2_ Proactive Approach (Consumer View).mp4 22MB
  14. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/4. Preventing Exfiltration Over Alternate Protocols.mp4 21MB
  15. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/2. Installing and Configuring pfSense.mp4 20MB
  16. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/3. Detecting User Account Creation with osquery.mp4 17MB
  17. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/2. Demo_ Assessing Internet Exposed Services.mp4 17MB
  18. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/5. Detecting Malware Use of TLS Connections.mp4 17MB
  19. 5. File Analysis/1. File Analysis with TruffleHog/Module 2 - Identify, Assess, and Report Credential Leakage with TruffleHog/2. Assessing Repositories for Credentials Leakage.mp4 17MB
  20. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/4. Demo_ Monitoring Threats Using the Dashboard.mp4 17MB
  21. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/5. Analyzing USB Device Information.mp4 16MB
  22. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/9. Demo 3_ Docker Image Tampering Check.mp4 16MB
  23. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/5. Merlin Foothold.mp4 16MB
  24. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/4. Analyzing Regsitry Run Keys.mp4 16MB
  25. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/6. Foothold Alerts.mp4 15MB
  26. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/2. Creating a Vulnerable Cloud.mp4 15MB
  27. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/5. Investigating Anomalous Activity and Adversary Techniques.mp4 14MB
  28. 3. OS Analysis/4. OS Analysis with Volatility/Module 2 - Detect and Respond with Volatility/3. Suspect Process Investigation and Mitigation.mp4 14MB
  29. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/3. Collecting Windows Log Data Sources.mp4 14MB
  30. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/1. What Is TheHive_.mp4 14MB
  31. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/8. Demo 3_ Docker Image Tampering Script.mp4 13MB
  32. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/1. What Is a HELK Anyway_.mp4 13MB
  33. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/1. Getting Started with Arkime.mp4 13MB
  34. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 2 - Blue Team Tool’s Vital Role in Enterprise Security/2. Fulfilling Cybersecurity Framework Functions.mp4 13MB
  35. 3. OS Analysis/4. OS Analysis with Volatility/Module 2 - Detect and Respond with Volatility/1. Volatility Overview.mp4 13MB
  36. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/5. Demo_ Detect Authentication Bypass Using Accessibility Features.mp4 13MB
  37. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/1. Introduction to RegRipper.mp4 13MB
  38. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/1. pfSense Overview.mp4 13MB
  39. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/5. Demo_ Assess Server and Sensor Configurations.mp4 13MB
  40. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/3. Case Management.mp4 12MB
  41. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 2 - Blue Team Tool’s Vital Role in Enterprise Security/3. Aligning with MITRE Att&ck and Shield.mp4 12MB
  42. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/5. Demo 1_ Scanning a Kubernetes Cluster.mp4 12MB
  43. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/1. What Is Trivy_.mp4 12MB
  44. 5. File Analysis/1. File Analysis with TruffleHog/Module 2 - Identify, Assess, and Report Credential Leakage with TruffleHog/1. Getting Started with TruffleHog.mp4 12MB
  45. 3. OS Analysis/4. OS Analysis with Volatility/Module 2 - Detect and Respond with Volatility/2. Investigating User Command History.mp4 11MB
  46. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/1. Using osquery for OS Analysis.mp4 11MB
  47. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/4. Sleuth Kit Case Management.mp4 10MB
  48. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/2. Demo_ Detect User Account Creation in Windows.mp4 10MB
  49. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/5. Validating osquery Detections in Kibana.mp4 10MB
  50. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/3. Demo_ Performing an AWS Benchmark Assessment.mp4 10MB
  51. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/1. What Is kube-hunter_.mp4 10MB
  52. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/7. Demo 3_ Docker Image Tampering Github Workflow.mp4 10MB
  53. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/1. Getting Started with Prowler.mp4 10MB
  54. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/5. Customizing Rules.mp4 9MB
  55. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/4. Demo 1_ Trivy Scan.mp4 9MB
  56. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/1. Scout Suite Overview.mp4 9MB
  57. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/8. Demo 2_ Credential Scan.mp4 9MB
  58. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/10. Demo 4_ Kubernetes Hardening.mp4 9MB
  59. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/6. Demo 2_ Proactive Approach (Technical View).mp4 9MB
  60. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/1. What Is Wazuh_.mp4 9MB
  61. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/5. Reporting Dashboards and Tags.mp4 9MB
  62. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/11. Escalation Rule.mp4 8MB
  63. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/3. Demo_ Installation of Maltrail.mp4 8MB
  64. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/6. Destroying the Vulnerable Cloud.mp4 8MB
  65. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/2. Getting Started with HELK.mp4 8MB
  66. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 2 - Blue Team Tool’s Vital Role in Enterprise Security/1. Introducing Blue Team Tools for Enterprise Security.mp4 7MB
  67. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/6. Demo 2_ nmap and pods Scan.mp4 7MB
  68. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/2. Installation.mp4 7MB
  69. 2. Network Analysis/1. Network Analysis with Arkime/Exercise Files/network-analysis-arkime/course assets/samples.zip 7MB
  70. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/9. Demo 3_ Trivy and Docker History.mp4 7MB
  71. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/2. Tool Administration, Taxonomies, and MITRE ATT&CK Framework.mp4 6MB
  72. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/5. Defending with Endlessh – Part 1.mp4 6MB
  73. 5. File Analysis/1. File Analysis with TruffleHog/Module 2 - Identify, Assess, and Report Credential Leakage with TruffleHog/3. Creating Custom Assessments.mp4 6MB
  74. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 3 - Resources/1. Next Steps.mp4 6MB
  75. 3. OS Analysis/1. OS Analysis with HELK/Exercise Files/os-analysis-helk/02/demos/downloads/security-kerbroast-bits.evtx 6MB
  76. 3. OS Analysis/1. OS Analysis with HELK/Exercise Files/os-analysis-helk/02/demos/downloads/sysmon-kerbroast-bits.evtx 6MB
  77. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/2. Cybersecurity Frameworks.mp4 6MB
  78. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 3 - Resources/1. Resources and Motivation.mp4 6MB
  79. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/6. Defending with Endlessh – Part 2.mp4 6MB
  80. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/12. Demo 4_ Applying the Pod Security Policy.mp4 6MB
  81. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/2. Cybersecurity Frameworks.mp4 6MB
  82. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/6. Additional Resources and Information.mp4 6MB
  83. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/5. Demo_ Sleuth Kit.mp4 6MB
  84. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/6. Final Thoughts.mp4 5MB
  85. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/3. Demo Environment Overview.mp4 5MB
  86. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/7. Demo_ Detect Persistence Using Scheduled Tasks.mp4 5MB
  87. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/9. Custom FIM Rule.mp4 5MB
  88. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/3. Demo_ Detect User Account Creation in Linux.mp4 5MB
  89. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/8. Rule Syntax.mp4 5MB
  90. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/4. Demo Environment Installation.mp4 5MB
  91. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/4. Demo_ Creating Reports.mp4 5MB
  92. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/6. Detect Persistence Using Scheduled Tasks.mp4 5MB
  93. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/1. Introduction to the Course.mp4 5MB
  94. 3. OS Analysis/3. OS Analysis with Wazuh/Module 3 - Resources/1. Next Steps.mp4 5MB
  95. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/3. Simulation Environment Overview.mp4 5MB
  96. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/3. Demo 1_ Reactive Integration Overview.mp4 5MB
  97. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/11. Demo 4_ Modifying the Pod Security Policy.mp4 5MB
  98. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/4. Alerts and Templates.mp4 4MB
  99. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/3. Sleuth Kit Tool Overview.mp4 4MB
  100. 3. OS Analysis/1. OS Analysis with HELK/Module 3 - Resources/1. Learning to Hunt Better.mp4 4MB
  101. 3. OS Analysis/4. OS Analysis with Volatility/Module 1 - Course Overview/1. Course Overview.mp4 4MB
  102. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/4. Simulation Environment Installation.mp4 4MB
  103. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 1 - Course Overview/1. Course Overview.mp4 4MB
  104. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/1. Detect User Account Creation.mp4 4MB
  105. 3. OS Analysis/1. OS Analysis with HELK/Module 1 - Course Overview/1. Course Overview.mp4 4MB
  106. 2. Network Analysis/1. Network Analysis with Arkime/Module 3 - Resources/1. Additional Resources and Recommendations.mp4 3MB
  107. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/4. Detect Authentication Bypass Using Accessibility Features.mp4 3MB
  108. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/7. FIM and Netstat Configuration.mp4 3MB
  109. 7. Incident Management/1. Incident Management with TheHive/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  110. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/7. Demo 2_ Recap.mp4 3MB
  111. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/10. Provoking FIM Active Response.mp4 3MB
  112. 5. File Analysis/1. File Analysis with TruffleHog/Module 3 - Resources/1. Resources.mp4 3MB
  113. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/1. Introduction.mp4 3MB
  114. 5. File Analysis/1. File Analysis with TruffleHog/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  115. 7. Incident Management/1. Incident Management with TheHive/Module 3 - Resources/1. Taking It to the Next Level.mp4 3MB
  116. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  117. 3. OS Analysis/2. OS Analysis with RegRipper/Module 1 - Course Overview (Tool Introduction)/1. Course Overview.mp4 3MB
  118. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 3 - Resources/1. Next Steps.mp4 3MB
  119. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 3 - Resources/1. Resources.mp4 3MB
  120. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Exercise Files/blue-team-tools-defense-adversary-activity-mitre/02/blue-team-tools-vital-role-in-enterprise-security-slides.pdf 3MB
  121. 2. Network Analysis/1. Network Analysis with Arkime/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  122. 2. Network Analysis/2. Network Analysis with pfSense/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  123. 3. OS Analysis/7. OS Analysis with OSSEC/Exercise Files/os-analysis-ossec/02/monitor-os-activity-with-ossec-slides.pdf 3MB
  124. 3. OS Analysis/3. OS Analysis with Wazuh/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  125. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 3 - Resources/1. Sleuth Kit Resources.mp4 3MB
  126. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  127. 6. Application Analysis/1. Application Analysis with Endlessh/Module 1 - Course Overview/1. Course Overview.mp4 3MB
  128. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 1 - Course Overview/1. Course Overview.mp4 2MB
  129. 6. Application Analysis/1. Application Analysis with Endlessh/Module 3 - Resources/1. Resources.mp4 2MB
  130. 3. OS Analysis/7. OS Analysis with OSSEC/Module 1 - Course Overview/1. Course Overview.mp4 2MB
  131. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/2. What Is Endlessh_.mp4 2MB
  132. 2. Network Analysis/3. Network Analysis with Maltrail/Module 1 - Course Overview/1. Course Overview.mp4 2MB
  133. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 1 - Course Overview/1. Course Overview.mp4 2MB
  134. 3. OS Analysis/6. OS Analysis with osquery/Module 1 - Course Overview/1. Course Overview.mp4 2MB
  135. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Exercise Files/cloud-infrastructure-analysis-scout-suite/02/discovering-unsafe-cloud-configurations-with-scout-suite-slides.pdf 2MB
  136. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/4. Installation and Configuration.mp4 2MB
  137. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 3 - Resources/1. Course Conclusion.mp4 2MB
  138. 2. Network Analysis/3. Network Analysis with Maltrail/Module 3 - Resources/1. Resources.mp4 2MB
  139. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/1. Introduction to Sleuth Kit and Autopsy.mp4 2MB
  140. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 1 - Course Overview/1. Course Overview.mp4 2MB
  141. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/2. Real Life Cases.mp4 2MB
  142. 3. OS Analysis/4. OS Analysis with Volatility/Module 3 - Resources/1. Resources.mp4 2MB
  143. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/2. Sleuth Kit Summary.mp4 2MB
  144. 3. OS Analysis/6. OS Analysis with osquery/Module 3 - Resources/1. Additional osquery Resources.mp4 2MB
  145. 3. OS Analysis/2. OS Analysis with RegRipper/Module 3 - Resources/1. Resources.mp4 2MB
  146. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/3. How Endlessh Works.mp4 2MB
  147. 3. OS Analysis/7. OS Analysis with OSSEC/Module 3 - Resources/1. OSSEC Resources.mp4 2MB
  148. 5. File Analysis/1. File Analysis with TruffleHog/Exercise Files/file-analysis-trufflehog/02/identify-assess-and-report-credential-leakage-with-trufflehog-slides.pdf 2MB
  149. 3. OS Analysis/2. OS Analysis with RegRipper/Exercise Files/os-analysis-regripper/02/analyzing-windows-registry-with-regripper-slides.pdf 2MB
  150. 3. OS Analysis/6. OS Analysis with osquery/Exercise Files/os-analysis-osquery/02/os-analysis-with-osquery-slides.pdf 1MB
  151. 3. OS Analysis/3. OS Analysis with Wazuh/Exercise Files/os-analysis-wazuh/02/detecting-process-level-and-file-level-attacks-with-wazuh-slides.pdf 1MB
  152. 2. Network Analysis/2. Network Analysis with pfSense/Exercise Files/network-analysis-pfsense/02/using-pfsense-to-block-malicious-network-activity-slides.pdf 1MB
  153. 3. OS Analysis/1. OS Analysis with HELK/Exercise Files/os-analysis-helk/02/using-windows-event-logs-with-helk-to-hunt-for-advanced-adversary-activity-slides.pdf 1MB
  154. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Exercise Files/cloud-infrastructure-analysis-prowler/Demo - Assessing Internet Exposed Services.pdf 1MB
  155. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Exercise Files/container-infrastructure-analysis-kube-hunter/02/detecting-and-preventing-kubernetes-attacks-with-kube-hunter-slides.pdf 1MB
  156. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Exercise Files/container-infrastructure-analysis-kube-hunter/03/resources-slides.pdf 1MB
  157. 3. OS Analysis/1. OS Analysis with HELK/Exercise Files/os-analysis-helk/02/demos/downloads/sysmon-logscleared.evtx 1MB
  158. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Exercise Files/container-infrastructure-analysis-trivy/02/automating-docker-security-scans-with-trivy-slides.pdf 1MB
  159. 2. Network Analysis/1. Network Analysis with Arkime/Exercise Files/network-analysis-arkime/02/identifying-initial-access-command-and-control-and-data-exfiltration-with-moloch-slides.pdf 944KB
  160. 6. Application Analysis/1. Application Analysis with Endlessh/Exercise Files/application-analysis-endlessh/02/application-analysis-with-endlessh-slides.pdf 927KB
  161. 3. OS Analysis/4. OS Analysis with Volatility/Exercise Files/os-analysis-volatility/02/detect-and-respond-with-volatility-slides.pdf 833KB
  162. 2. Network Analysis/3. Network Analysis with Maltrail/Exercise Files/network-analysis-maltrail.zip 695KB
  163. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Exercise Files/os-analysis-sleuth-kit-autopsy/02/os-analysis-with-sleuth-kit-and-autopsy-slides.pdf 536KB
  164. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Exercise Files/cloud-infrastructure-analysis-prowler/02/identify-assess-and-report-cloud-security-threats-with-prowler-slides.pdf 512KB
  165. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Exercise Files/container-infrastructure-analysis-trivy/03/resources-slides.pdf 485KB
  166. 7. Incident Management/1. Incident Management with TheHive/Exercise Files/incident-management-thehive/02/incident-management-with-thehive-slides.pdf 347KB
  167. 3. OS Analysis/7. OS Analysis with OSSEC/Exercise Files/os-analysis-ossec/03/resources-slides.pdf 325KB
  168. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Exercise Files/os-analysis-sleuth-kit-autopsy/03/resources-slides.pdf 313KB
  169. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/6. Summary.mp4 288KB
  170. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Exercise Files/cloud-infrastructure-analysis-prowler/03/resources-slides.pdf 268KB
  171. 3. OS Analysis/4. OS Analysis with Volatility/Exercise Files/os-analysis-volatility/03/resources-slides.pdf 260KB
  172. 5. File Analysis/1. File Analysis with TruffleHog/Exercise Files/file-analysis-trufflehog/03/demos.pdf 260KB
  173. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Exercise Files/cloud-infrastructure-analysis-prowler/Demo - Performing an AWS Benchmark Assessment.pdf 200KB
  174. 6. Application Analysis/1. Application Analysis with Endlessh/Exercise Files/application-analysis-endlessh/03/resources-slides.pdf 166KB
  175. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Exercise Files/cloud-infrastructure-analysis-prowler/Demo - Creating Reports.pdf 124KB
  176. 3. OS Analysis/1. OS Analysis with HELK/Exercise Files/os-analysis-helk/02/demos/downloads/security-logscleared.evtx 68KB
  177. 3. OS Analysis/1. OS Analysis with HELK/Exercise Files/os-analysis-helk/02/demos/downloads/system-logscleared.evtx 68KB
  178. 2. Network Analysis/1. Network Analysis with Arkime/Exercise Files/network-analysis-arkime/03/resources-slides.pdf 51KB
  179. 7. Incident Management/1. Incident Management with TheHive/Exercise Files/incident-management-thehive/03/resources-slides.pdf 23KB
  180. 5. File Analysis/1. File Analysis with TruffleHog/Module 2 - Identify, Assess, and Report Credential Leakage with TruffleHog/2. Assessing Repositories for Credentials Leakage.vtt 18KB
  181. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/3. Identifying Malware Command and Control.vtt 17KB
  182. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/2. Analyzing Phishing Traffic.vtt 17KB
  183. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/4. Hunting with with Apache Spark and Graphframes.vtt 16KB
  184. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/4. Developing Techniques for Detecting Data Exfiltration.vtt 14KB
  185. 3. OS Analysis/4. OS Analysis with Volatility/Module 2 - Detect and Respond with Volatility/2. Investigating User Command History.vtt 14KB
  186. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/3. Setting Up a Decoy VPN Server.vtt 13KB
  187. 3. OS Analysis/4. OS Analysis with Volatility/Module 2 - Detect and Respond with Volatility/1. Volatility Overview.vtt 13KB
  188. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/4. Finding and Fixing Security Issues with Scout Suite.vtt 11KB
  189. 5. File Analysis/1. File Analysis with TruffleHog/Module 2 - Identify, Assess, and Report Credential Leakage with TruffleHog/1. Getting Started with TruffleHog.vtt 11KB
  190. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/1. Getting Started with Arkime.vtt 11KB
  191. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/5. Demo 2_ Proactive Approach (Consumer View).vtt 11KB
  192. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/1. What Is TheHive_.vtt 11KB
  193. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/2. General OS Information.vtt 11KB
  194. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/1. What Is Trivy_.vtt 11KB
  195. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/4. Detecting File Movement with osquery.vtt 10KB
  196. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/3. Demo_ Performing an AWS Benchmark Assessment.vtt 10KB
  197. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/2. Getting Started with osquery.vtt 10KB
  198. 3. OS Analysis/4. OS Analysis with Volatility/Module 2 - Detect and Respond with Volatility/3. Suspect Process Investigation and Mitigation.vtt 10KB
  199. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/2. Installing and Configuring pfSense.vtt 10KB
  200. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/4. Preventing Exfiltration Over Alternate Protocols.vtt 10KB
  201. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/9. Demo 3_ Docker Image Tampering Check.vtt 10KB
  202. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/1. What Is a HELK Anyway_.vtt 9KB
  203. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 2 - Blue Team Tool’s Vital Role in Enterprise Security/2. Fulfilling Cybersecurity Framework Functions.vtt 9KB
  204. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/4. Demo_ Monitoring Threats Using the Dashboard.vtt 9KB
  205. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/1. Getting Started with Prowler.vtt 9KB
  206. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/2. Demo_ Assessing Internet Exposed Services.vtt 9KB
  207. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 2 - Blue Team Tool’s Vital Role in Enterprise Security/3. Aligning with MITRE Att&ck and Shield.vtt 9KB
  208. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/1. Introduction to RegRipper.vtt 8KB
  209. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/5. Demo_ Detect Authentication Bypass Using Accessibility Features.vtt 8KB
  210. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/5. Blocking Malicious Domains with pfSense.vtt 8KB
  211. 2. Network Analysis/1. Network Analysis with Arkime/Module 2 - Identifying Initial Access, Command and Control, and Data Exfiltration with Arkime/5. Detecting Malware Use of TLS Connections.vtt 8KB
  212. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/3. Case Management.vtt 8KB
  213. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/5. Demo 1_ Scanning a Kubernetes Cluster.vtt 8KB
  214. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/1. Using osquery for OS Analysis.vtt 8KB
  215. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/3. Installing Scout Suite with Minimal Privileges.vtt 8KB
  216. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/8. Demo 3_ Docker Image Tampering Script.vtt 7KB
  217. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/3. Analyzing Windows Services.vtt 7KB
  218. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/5. Investigating Anomalous Activity and Adversary Techniques.vtt 7KB
  219. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/1. pfSense Overview.vtt 7KB
  220. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 2 - Blue Team Tool’s Vital Role in Enterprise Security/1. Introducing Blue Team Tools for Enterprise Security.vtt 7KB
  221. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/1. Scout Suite Overview.vtt 7KB
  222. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/1. What Is Wazuh_.vtt 7KB
  223. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/8. Demo 2_ Credential Scan.vtt 7KB
  224. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/3. Detecting User Account Creation with osquery.vtt 7KB
  225. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/2. Creating a Vulnerable Cloud.vtt 7KB
  226. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/6. Demo 2_ Proactive Approach (Technical View).vtt 7KB
  227. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/5. Analyzing USB Device Information.vtt 6KB
  228. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/7. Demo 3_ Docker Image Tampering Github Workflow.vtt 6KB
  229. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/1. What Is kube-hunter_.vtt 6KB
  230. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/4. Sleuth Kit Case Management.vtt 6KB
  231. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/5. Merlin Foothold.vtt 6KB
  232. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/4. Demo 1_ Trivy Scan.vtt 6KB
  233. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/2. Demo_ Detect User Account Creation in Windows.vtt 6KB
  234. 5. File Analysis/1. File Analysis with TruffleHog/Module 2 - Identify, Assess, and Report Credential Leakage with TruffleHog/3. Creating Custom Assessments.vtt 5KB
  235. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/5. Defending with Endlessh – Part 1.vtt 5KB
  236. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/5. Demo_ Assess Server and Sensor Configurations.vtt 5KB
  237. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/5. Reporting Dashboards and Tags.vtt 5KB
  238. 3. OS Analysis/2. OS Analysis with RegRipper/Module 2 - Analyzing Windows Registry with RegRipper/4. Analyzing Regsitry Run Keys.vtt 5KB
  239. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/6. Demo 2_ nmap and pods Scan.vtt 5KB
  240. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/5. Demo_ Sleuth Kit.vtt 5KB
  241. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/10. Demo 4_ Kubernetes Hardening.vtt 5KB
  242. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/6. Defending with Endlessh – Part 2.vtt 5KB
  243. 3. OS Analysis/6. OS Analysis with osquery/Module 2 - OS Analysis with osquery/5. Validating osquery Detections in Kibana.vtt 5KB
  244. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 2 - Identify, Assess, and Report Cloud Security Threats with Prowler/4. Demo_ Creating Reports.vtt 5KB
  245. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/11. Escalation Rule.vtt 5KB
  246. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/3. Collecting Windows Log Data Sources.vtt 5KB
  247. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/3. Demo Environment Overview.vtt 5KB
  248. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 3 - Resources/1. Next Steps.vtt 5KB
  249. 3. OS Analysis/1. OS Analysis with HELK/Module 2 - Using Windows Event Logs with HELK to Hunt for Advanced Adversary Activity/2. Getting Started with HELK.vtt 5KB
  250. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/6. Foothold Alerts.vtt 5KB
  251. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 3 - Resources/1. Resources and Motivation.vtt 4KB
  252. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/2. Cybersecurity Frameworks.vtt 4KB
  253. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/9. Demo 3_ Trivy and Docker History.vtt 4KB
  254. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/3. Demo_ Installation of Maltrail.vtt 4KB
  255. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/3. Sleuth Kit Tool Overview.vtt 4KB
  256. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/9. Custom FIM Rule.vtt 4KB
  257. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/3. Demo_ Detect User Account Creation in Linux.vtt 4KB
  258. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/3. Demo 1_ Reactive Integration Overview.vtt 4KB
  259. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/4. Demo Environment Installation.vtt 4KB
  260. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 2 - Automating Docker Security Scans with Trivy/2. Installation.vtt 4KB
  261. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/2. Tool Administration, Taxonomies, and MITRE ATT&CK Framework.vtt 4KB
  262. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/1. Detect User Account Creation.vtt 4KB
  263. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/7.Demo_ Detect Persistence Using Scheduled Tasks.vtt 4KB
  264. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/1. Introduction to the Course.vtt 4KB
  265. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/6. Detect Persistence Using Scheduled Tasks.vtt 3KB
  266. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/2. Cybersecurity Frameworks.vtt 3KB
  267. 2. Network Analysis/2. Network Analysis with pfSense/Module 2 - Using pfSense to Block Malicious Network Activity/6. Additional Resources and Information.vtt 3KB
  268. 3. OS Analysis/3. OS Analysis with Wazuh/Module 3 - Resources/1. Next Steps.vtt 3KB
  269. 3. OS Analysis/4. OS Analysis with Volatility/Module 1 - Course Overview/1. Course Overview.vtt 3KB
  270. 3. OS Analysis/1. OS Analysis with HELK/Module 3 - Resources/1. Learning to Hunt Better.vtt 3KB
  271. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/7. Demo 2_ Recap.vtt 3KB
  272. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/3. Simulation Environment Overview.vtt 3KB
  273. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/11. Demo 4_ Modifying the Pod Security Policy.vtt 3KB
  274. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 2 - Detecting and Preventing Kubernetes Attacks with kube-hunter/12. Demo 4_ Applying the Pod Security Policy.vtt 3KB
  275. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/4. Alerts and Templates.vtt 3KB
  276. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 3 - Resources/1. Next Steps.vtt 3KB
  277. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 3 - Resources/1. Sleuth Kit Resources.vtt 3KB
  278. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/1. Introduction.vtt 3KB
  279. 7. Incident Management/1. Incident Management with TheHive/Module 2 - Incident Management with TheHive/6. Final Thoughts.vtt 3KB
  280. 5. File Analysis/1. File Analysis with TruffleHog/Module 1 - Course Overview/1. Course Overview.vtt 3KB
  281. 7. Incident Management/1. Incident Management with TheHive/Module 1 - Course Overview/1. Course Overview.vtt 3KB
  282. 2. Network Analysis/1. Network Analysis with Arkime/Module 3 - Resources/1. Additional Resources and Recommendations.vtt 3KB
  283. 3. OS Analysis/1. OS Analysis with HELK/Module 1 - Course Overview/1. Course Overview.vtt 3KB
  284. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/8. Rule Syntax.vtt 3KB
  285. 5. File Analysis/1. File Analysis with TruffleHog/Module 3 - Resources/1. Resources.vtt 3KB
  286. 1. Introduction/1. Blue Team Tools_ Defense against Adversary Activity Using MITRE Techniques/Module 1 - Course Overview/1. Course Overview.vtt 2KB
  287. 3. OS Analysis/7. OS Analysis with OSSEC/Module 2 - Monitor OS Activity with OSSEC/4. Detect Authentication Bypass Using Accessibility Features.vtt 2KB
  288. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/4. Simulation Environment Installation.vtt 2KB
  289. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/6. Destroying the Vulnerable Cloud.vtt 2KB
  290. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/7. FIM and Netstat Configuration.vtt 2KB
  291. 3. OS Analysis/3. OS Analysis with Wazuh/Module 2 - Detecting Process-level and File-level Attacks with Wazuh/10. Provoking FIM Active Response.vtt 2KB
  292. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/1. Introduction to Sleuth Kit and Autopsy.vtt 2KB
  293. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 1 - Course Overview/1. Course Overview.vtt 2KB
  294. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 2 - Discovering Unsafe Cloud Configurations with Scout Suite/5. Customizing Rules.vtt 2KB
  295. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/2. What Is Endlessh_.vtt 2KB
  296. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/3. How Endlessh Works.vtt 2KB
  297. 4. Infrastructure Analysis/2. Cloud Infrastructure Analysis with Prowler/Module 3 - Resources/1. Resources.vtt 2KB
  298. 6. Application Analysis/1. Application Analysis with Endlessh/Module 3 - Resources/1. Resources.vtt 2KB
  299. 2. Network Analysis/1. Network Analysis with Arkime/Module 1 - Course Overview/1. Course Overview.vtt 2KB
  300. 3. OS Analysis/4. OS Analysis with Volatility/Module 3 - Resources/1. Resources.vtt 2KB
  301. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Module 1 - Course Overview/1. Course Overview.vtt 2KB
  302. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Module 1 - Course Overview/1. Course Overview.vtt 2KB
  303. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 3 - Resources/1. Course Conclusion.vtt 2KB
  304. 6. Application Analysis/1. Application Analysis with Endlessh/Module 2 - Application Analysis with Endlessh/4. Installation and Configuration.vtt 2KB
  305. 3. OS Analysis/6. OS Analysis with osquery/Module 3 - Resources/1. Additional osquery Resources.vtt 2KB
  306. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 1 - Course Overview/1. Course Overview.vtt 2KB
  307. 3. OS Analysis/5. OS Analysis with The Sleuth Kit & Autopsy/Module 2 - OS Analysis with Sleuth Kit and Autopsy/2. Sleuth Kit Summary.vtt 2KB
  308. 3. OS Analysis/7. OS Analysis with OSSEC/Module 3 - Resources/1. OSSEC Resources.vtt 2KB
  309. 3. OS Analysis/3. OS Analysis with Wazuh/Module 1 - Course Overview/1. Course Overview.vtt 1KB
  310. 2. Network Analysis/2. Network Analysis with pfSense/Module 1 - Course Overview/1. Course Overview.vtt 1KB
  311. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/2. Real Life Cases.vtt 1KB
  312. 7. Incident Management/1. Incident Management with TheHive/Module 3 - Resources/1. Taking It to the Next Level.vtt 1KB
  313. 3. OS Analysis/2. OS Analysis with RegRipper/Module 3 - Resources/1. Resources.vtt 1KB
  314. 3. OS Analysis/7. OS Analysis with OSSEC/Module 1 - Course Overview/1. Course Overview.vtt 1KB
  315. 2. Network Analysis/3. Network Analysis with Maltrail/Module 1 - Course Overview/1. Course Overview.vtt 1KB
  316. 6. Application Analysis/1. Application Analysis with Endlessh/Module 1 - Course Overview/1. Course Overview.vtt 1KB
  317. 3. OS Analysis/2. OS Analysis with RegRipper/Module 1 - Course Overview (Tool Introduction)/1. Course Overview.vtt 1KB
  318. 3. OS Analysis/6. OS Analysis with osquery/Module 1 - Course Overview/1. Course Overview.vtt 1KB
  319. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Module 1 - Course Overview/1. Course Overview.vtt 1KB
  320. 2. Network Analysis/3. Network Analysis with Maltrail/Module 3 - Resources/1. Resources.vtt 879B
  321. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Exercise Files/cloud-infrastructure-analysis-scout-suite/02/demos/M2-files/links.txt 878B
  322. 3. OS Analysis/1. OS Analysis with HELK/Exercise Files/os-analysis-helk/02/demos/downloads/README.txt 633B
  323. 3. OS Analysis/3. OS Analysis with Wazuh/Exercise Files/os-analysis-wazuh/03/demos.txt 516B
  324. 4. Infrastructure Analysis/1. Cloud Infrastructure Analysis with Scout Suite/Exercise Files/cloud-infrastructure-analysis-scout-suite/02/demos/M2-files/dependencies.txt 389B
  325. 2. Network Analysis/1. Network Analysis with Arkime/Exercise Files/network-analysis-arkime/course assets/README.txt 255B
  326. 2. Network Analysis/3. Network Analysis with Maltrail/Module 2 - Analyzing Network Trail Logs with Maltrail/6. Summary.vtt 253B
  327. 4. Infrastructure Analysis/3. Container Infrastructure Analysis with kube-hunter/Exercise Files/container-infrastructure-analysis-kube-hunter/03/demos.txt 64B
  328. 4. Infrastructure Analysis/4. Container Infrastructure Analysis with Trivy/Exercise Files/container-infrastructure-analysis-trivy/03/demos.txt 62B