589689.xyz

[] Pluralsight - Identify Common Cyber Network Attacks with Wireshark

  • 收录时间:2021-11-13 11:55:53
  • 文件大小:686MB
  • 下载次数:1
  • 最近下载:2021-11-13 11:55:53
  • 磁力链接:

文件列表

  1. 05. Identifying Common Malware Behavior/35. Lab 11 - Malware Analysis with Wireshark - Part 1.mp4 44MB
  2. 03. Analyzing Port Scans and Enumeration Methods/18. Lab 5 - Analyzing HTTP Path Enumeration with Wireshark.mp4 41MB
  3. 03. Analyzing Port Scans and Enumeration Methods/12. Lab 3 - Analyzing Malware for Network and Port Scans.mp4 40MB
  4. 04. Analyzing Common Attack Signatures of Suspect Traffic/28. Lab 9 - Analyzing HTTP Traffic and Unencrypted File Transfers.mp4 40MB
  5. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/42. Lab 13 - Identifying Botnet Traffic with Wireshark.mp4 38MB
  6. 03. Analyzing Port Scans and Enumeration Methods/15. Lab 4 - Detecting OS Fingerprinting with Wireshark.mp4 36MB
  7. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/45. Lab 14 - Analyzing Data Exfiltration with Wireshark.mp4 36MB
  8. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/43. Lab 13 - Identifying Botnet Traffic - Part 2.mp4 36MB
  9. 03. Analyzing Port Scans and Enumeration Methods/10. Lab 2 - Identifying Port Scans with Wireshark.mp4 32MB
  10. 04. Analyzing Common Attack Signatures of Suspect Traffic/25. Lab 7 - Spotting Suspect Country Codes with Wireshark.mp4 27MB
  11. 03. Analyzing Port Scans and Enumeration Methods/16. Lab 4 - Part 2 - Detecting OS Fingerprinting.mp4 27MB
  12. 04. Analyzing Common Attack Signatures of Suspect Traffic/30. Lab 10 - Analysis of a Brute Force Attack.mp4 26MB
  13. 03. Analyzing Port Scans and Enumeration Methods/09. Lab 1 - Detecting Network Discovery Scans with Wireshark.mp4 25MB
  14. 04. Analyzing Common Attack Signatures of Suspect Traffic/23. Lab 4 - Analyzing TCP SYN Attacks.mp4 21MB
  15. 03. Analyzing Port Scans and Enumeration Methods/11. Lab 2 - Part 2 - Detecting Port Scans.mp4 21MB
  16. 04. Analyzing Common Attack Signatures of Suspect Traffic/26. Lab 8 - Filtering for Unusual Domain Name Lookups.mp4 19MB
  17. 03. Analyzing Port Scans and Enumeration Methods/13. Lab 3 - Part 2 - Analyzing Malware for Network and Port Scans.mp4 16MB
  18. 05. Identifying Common Malware Behavior/36. Lab 11 - Malware Analysis with Wireshark - Part 2.mp4 15MB
  19. Exercise Files/04/demos/Lab9_HTTPTransfers.pcapng 13MB
  20. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/40. Lab 12 - Analyzing Reverse Shell Behavior .mp4 10MB
  21. Exercise Files/05/demos/Lab 11_MalwareAnalysis.pcapng 8MB
  22. Exercise Files/03/demos/Lab3_AnalyzinganAttack.zip 7MB
  23. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/41. How to Spot Botnet Traffic.mp4 6MB
  24. 03. Analyzing Port Scans and Enumeration Methods/14. How OS Fingerprinting Works.mp4 5MB
  25. 03. Analyzing Port Scans and Enumeration Methods/08. Network and Host Discovery Scans.mp4 5MB
  26. 02. When to Break Out Wireshark for Threat Hunting/04. Starting with IDS Alerts and Firewall Server Event Logs.mp4 5MB
  27. 04. Analyzing Common Attack Signatures of Suspect Traffic/27. Analyzing HTTP Traffic and File Transfers.mp4 5MB
  28. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/44. How to Identify Data Exfiltration.mp4 5MB
  29. 01. Course Overview/01. Course Overview.mp4 5MB
  30. 05. Identifying Common Malware Behavior/33. What Is Malware How Can I Spot It.mp4 5MB
  31. 04. Analyzing Common Attack Signatures of Suspect Traffic/29. Spotting Data Exfiltration Brute Force Password Behavior and Reverse Shell.mp4 4MB
  32. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/39. How to Identify Shells and Reverse Shells.mp4 4MB
  33. Exercise Files/03/analyzing-port-scans-and-enumeration-methods-slides.pdf 4MB
  34. Exercise Files/04/analyzing-common-attack-signatures-of-suspect-traffic-slides.pdf 4MB
  35. Exercise Files/05/identifying-common-malware-behavior-slides.pdf 4MB
  36. 04. Analyzing Common Attack Signatures of Suspect Traffic/24. Identifying Unusual Country Codes with GeoIP.mp4 4MB
  37. 04. Analyzing Common Attack Signatures of Suspect Traffic/22. Spotting Network Attacks - The Top 10 Things to Look For.mp4 4MB
  38. 04. Analyzing Common Attack Signatures of Suspect Traffic/21. How to Find Suspect Traffic Patterns.mp4 4MB
  39. Exercise Files/06/demos/Lab13_AnalyzingBotnet.pcapng 4MB
  40. 02. When to Break Out Wireshark for Threat Hunting/03. When to Break out Wireshark for Threat Hunting.mp4 3MB
  41. 03. Analyzing Port Scans and Enumeration Methods/17. How HTTP Path Enumeration Works.mp4 3MB
  42. Exercise Files/02/when-to-break-out-wireshark-for-threat-hunting-slides.pdf 3MB
  43. 02. When to Break Out Wireshark for Threat Hunting/02. Course Introduction.mp4 3MB
  44. 02. When to Break Out Wireshark for Threat Hunting/05. Packet Analysis and the MITRE ATTCK Framework Cyber Kill Chain.mp4 2MB
  45. 05. Identifying Common Malware Behavior/34. Indicators of Compromise in Malware Analysis.mp4 2MB
  46. Exercise Files/06/demos/Lab14_DataExfiltration.pcapng 2MB
  47. 03. Analyzing Port Scans and Enumeration Methods/07. Module Intro.mp4 2MB
  48. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/47. Course Review.mp4 2MB
  49. 05. Identifying Common Malware Behavior/37. Module Review.mp4 2MB
  50. Exercise Files/06/identify-shell-reverse-shell-botnet-and-ddos-attack-traffic-slides.pdf 1MB
  51. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/38. Module Intro.mp4 1019KB
  52. 04. Analyzing Common Attack Signatures of Suspect Traffic/31. Module Review.mp4 963KB
  53. 05. Identifying Common Malware Behavior/32. Module Intro.mp4 819KB
  54. 03. Analyzing Port Scans and Enumeration Methods/19. Module Review.mp4 786KB
  55. 04. Analyzing Common Attack Signatures of Suspect Traffic/20. Module Intro.mp4 765KB
  56. 02. When to Break Out Wireshark for Threat Hunting/06. Module Review.mp4 709KB
  57. Exercise Files/03/demos/Lab4_OSFingerprint.pcapng 677KB
  58. Exercise Files/04/demos/Lab7_CountryCodes.pcapng 543KB
  59. Exercise Files/04/demos/Lab6_TCPSYNs.pcapng 543KB
  60. Exercise Files/03/demos/Lab5_EnumeratingWeb.pcapng 499KB
  61. 06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/46. Module Review.mp4 498KB
  62. Exercise Files/03/demos/Lab2_Network_PortScan.pcapng 471KB
  63. Exercise Files/03/demos/Lab1_NetworkScan.pcapng 125KB
  64. Exercise Files/04/demos/Lab10_BruteForceFTP.pcapng 60KB
  65. Exercise Files/04/demos/Lab8_DomainNames.pcapng 13KB
  66. Exercise Files/03/demos/chriscoloringrules 4KB
  67. 0. Websites you may like/For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url 2KB
  68. 0. Websites you may like/0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377B
  69. 0. Websites you may like/1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286B
  70. 0. Websites you may like/3. FTUApps.com Download Cracked Developers Applications For Free.url 239B
  71. 0. Websites you may like/How you can help our Group!.txt 204B