Warez.Ge

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Threat Hunting with Wireshark for SecOps

voska89

Moderator
Staff member
Top Poster Of Month
135cba185c2203bb94cade9019efb535.jpeg

Chris Greer | Duration: 8 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 3,29 GB | Language: English
Learn to spot suspect traffic
• Learn how to analyze network traffic, a critical skillset for all cybersecurity professionals
• Don't wait for alerts from your IDS/IPS systems to hunt for threats in network traffic​

• Capture, analyze, and isolate suspect traffic and indicators of compromise with Wireshark
The field of cybersecurity has grown tremendously in the past few years. With every new breach, we realize just how important analysis skills have become in identifying, mitigating, and protecting networks. Wireshark is one of the most important tools in the toolbox for identifying threats, spotting unusual behavior, and analyzing malware behavior; you just need to know how to use it.
In this class, we dive deep into traffic flows to learn how Wireshark can be used to analyze different steps in the Cyber Kill Chain. This is a lab-driven course, with plenty of hands-on, to learn about
• Creating a security profile
• Filters to spot abnormal traffic patterns
• Analyzing scan activity
• Malware analysis
• How to spot data exfiltration
• Finding traffic from unusual sources with GeoIP
• Analyzing a brute-force attack
Homepage
Code:
https://www.oreilly.com/live-events/threat-hunting-with-wireshark-for-secops/0636920087438/0636920087437/

Free Download Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Links are Interchangeable - Single Extraction
 

Users who are viewing this thread

Top