| TCM Security - Security Operations (SOC) 201/01- Course Introduction/01-Course-Introduction-(5-13).mkv |
17 MB |
| TCM Security - Security Operations (SOC) 201/01- Course Introduction/02-About-the-Instructor-(2-30).mkv |
8.9 MB |
| TCM Security - Security Operations (SOC) 201/01- Course Introduction/03-The-Modern-Adversary-(10-17).mkv |
40.9 MB |
| TCM Security - Security Operations (SOC) 201/01- Course Introduction/04-The-SOC-201-Methodology-(4-23).mkv |
10.4 MB |
| TCM Security - Security Operations (SOC) 201/01- Course Introduction/05-Course-Support-(3-05).mkv |
10.1 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/01-Lab-Setup-(3-31).mkv |
11.8 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/02-Installing-a-Hypervisor-(7-26).mkv |
23 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/03-Installing-Ubuntu-(13-20).mkv |
29 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/04-Configuring-Ubuntu-(8-17).mkv |
22.5 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/05-Installing-Windows-(11-15).mkv |
43.4 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/06-Configuring-Windows-(7-52).mkv |
25.1 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/07-Installing-Splunk-(16-16).mkv |
37.6 MB |
| TCM Security - Security Operations (SOC) 201/02- Lab Setup/08-Configuring-the-Lab-Network-(10-10).mkv |
25.5 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/01-Introduction-to-Incident-Response-(5-59).mkv |
19.9 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/02-The-Incident-Response-Process-(14-04).mkv |
35.1 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/03-Incident-Response--Preparation-(14-44).mkv |
53.2 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/04-Incident-Response--Identification-(5-39).mkv |
20.1 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/05-Incident-Response--Containment-(10-45).mkv |
38.6 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/06-Incident-Response--Eradication-(6-05).mkv |
23.2 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/07-Incident-Response--Recovery-(7-43).mkv |
28.4 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/08-Incident-Response--Lessons-Learned-(5-15).mkv |
19.4 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/09-The-OODA-Loop-(18-32).mkv |
66.8 MB |
| TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/10-Incident-Response-vs.-Threat-Hunting-(11-39).mkv |
34.2 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/01-Introduction-to-Threat-Hunting-(8-58).mkv |
33.8 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/02-The-Argument-for-Threat-Hunting-(13-14).mkv |
40.1 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/03-Threat-Hunting-Teams-(16-55).mkv |
53.6 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/04-Threat-Hunting-Data-Sources-(19-30).mkv |
63.3 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/05-The-Hunting-Maturity-Model-(HMM)-(20-00).mkv |
51.6 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/06-Cyber-Threat-Intelligence-(6-22).mkv |
25.8 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/07-The-Cyber-Kill-Chain-(16-52).mkv |
39.6 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/08-The-MITRE-ATT&CK-Framework-(15-05).mkv |
110.3 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/09-Exploring-MITRE-ATT&CK-(12-37).mkv |
90.9 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/10-Structured-Threat-Hunting-(16-01).mkv |
62 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/11-Unstructured-Threat-Hunting-(9-21).mkv |
34.1 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/12-MITRE-ATT&CK-Navigator-(21-48).mkv |
129.7 MB |
| TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/13-MITRE-ATT&CK-Navigator--Gap-Analysis-and-Threat-Hunting-(19-02).mkv |
135.9 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/01-Data-Transformation-(5-36).mkv |
17 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/02-Data-Transformation--Searching-(14-16).mkv |
47.7 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/03-Searching-in-the-Command-Line-(19-19).mkv |
48.1 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/04-Searching-in-PowerShell-(27-29).mkv |
76.8 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/05-Searching-in-Splunk-(21-54).mkv |
82.1 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/06-Data-Transformation--Aggregations-(9-24).mkv |
32.1 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/07-Aggregations-in-the-Command-Line-(25-36).mkv |
51.4 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/08-Aggregations-in-PowerShell-(10-24).mkv |
29.2 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/09-Aggregations-in-Splunk-(34-43).mkv |
107.9 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/10-Data-Transformation--Statistics-(9-38).mkv |
33.6 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/11-Statistics-in-the-Command-Line-(22-04).mkv |
33.5 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/12-Statistics-in-PowerShell-(13-24).mkv |
23.5 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/13-Statistics-in-Splunk-(15-23).mkv |
47.5 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/14-Data-Transformation--Visualizations-(5-00).mkv |
22.4 MB |
| TCM Security - Security Operations (SOC) 201/05- Data Transformation/15-Visualizations-in-Splunk-(25-31).mkv |
74.6 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/01-Understanding-Anomalies-(20-33).mkv |
84 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/02-Categorizing-Anomalies-(1-11).mkv |
4.4 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/03-Masquerading-(10-39).mkv |
54.8 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/04-Ambiguous-Identifiers-(11-13).mkv |
50.2 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/05-Frequency-&-Volume-Anomalies-(16-14).mkv |
56 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/06-Temporal-Anomalies-(14-53).mkv |
50 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/07-Location-&-Environment-Anomalies-(14-25).mkv |
60.7 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/08-Structure-&-Format-Anomalies-(16-16).mkv |
77.7 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/09-Obfuscated-PowerShell-Analysis-(6-34).mkv |
27.9 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/10-Entropy-Analysis-(4-56).mkv |
14.8 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/11-Alternate-Data-Stream-(ADS)-Analysis-(19-26).mkv |
42.5 MB |
| TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/12-Absence-&-Suppression-Anomalies-(7-57).mkv |
34.1 MB |
| TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/01-Dissecting-Threat-Reports-(18-54).mkv |
83.3 MB |
| TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/02-Breaking-Down-Attack-Steps-(5-05).mkv |
22.2 MB |
| TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/03-Mapping-Steps-to-Artifacts-(4-40).mkv |
18.4 MB |
| TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/04-Mapping-Artifacts-to-Evidence-Sources-(7-51).mkv |
31.3 MB |
| TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/05-Visualizing-with-MITRE-ATT&CK-Navigator-(4-34).mkv |
28.4 MB |
| TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/06-Intrusion-Analysis-Resources-(5-56).mkv |
57.2 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/01-Tracing-an-Attack-Chain-(27-04).mkv |
77 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/02-Hunting-Execution-Artifacts-(9-46).mkv |
39.2 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/03-Hunting-PowerShell-Execution-(36-09).mkv |
148.4 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/04-Hunting-Cmd-Execution-(20-20).mkv |
84.6 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/05-Hunting-Process-Trees-(9-26).mkv |
41.6 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/06-Hunting-Persistence-Artifacts-(7-33).mkv |
36.5 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/07-Hunting-Persistence--Registry-Run-Keys-(17-20).mkv |
78.1 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/08-Hunting-Persistence--Lookup-Tables-(27-30).mkv |
100 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/09-Hunting-Defense-Evasion-Artifacts-(16-39).mkv |
53.8 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/10-Hunting-Command-and-Control-(C2)-Artifacts-(7-40).mkv |
28.1 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/11-Hunting-C2--Ingress-Tool-Transfer-(LOLBAS)-(7-35).mkv |
19.4 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/12-Hunting-C2--Ingress-Tool-Transfer-(File-System-Events)-(12-57).mkv |
51.1 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/13-Hunting-C2--Ingress-Tool-Transfer-(Network-Connection-Events)-(4-21).mkv |
9.5 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/14-Hunting-Lateral-Movement-Artifacts-(8-27).mkv |
27.1 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/15-Hunting-Lateral-Movement--PsExec-(Service-Creation)-(9-38).mkv |
22 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/16-Hunting-Lateral-Movement--PsExec-(Reversing-Regex)-(14-25).mkv |
32.4 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/17-Hunting-Lateral-Movement--PsExec-(Named-Pipes)-(4-12).mkv |
14.3 MB |
| TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/18-Module-Recap-(5-46).mkv |
18.2 MB |
| TCM Security - Security Operations (SOC) 201/09- Collection at Scale/01-Introduction-to-Collection-(3-24).mkv |
4.5 MB |
| TCM Security - Security Operations (SOC) 201/09- Collection at Scale/02-Introduction-to-WMI-(11-11).mkv |
46.3 MB |
| TCM Security - Security Operations (SOC) 201/09- Collection at Scale/03-Collection-with-WMIC-(18-56).mkv |
65.3 MB |
| TCM Security - Security Operations (SOC) 201/09- Collection at Scale/04-WMIC-Collection-and-Filter-Examples-(5-51).mkv |
16 MB |
| TCM Security - Security Operations (SOC) 201/09- Collection at Scale/05-Remote-Collection-with-WMIC-(5-38).mkv |
11.9 MB |
| TCM Security - Security Operations (SOC) 201/09- Collection at Scale/06-Scripting-WMI-Collection-(10-31).mkv |
27.2 MB |
| TCM Security - Security Operations (SOC) 201/09- Collection at Scale/07-WMI-Automated-Collection-Frameworks-(6-57).mkv |
23.5 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/01-Introduction-to-PowerShell-(4-58).mkv |
20.2 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/02-PowerShell-101-(1-55).mkv |
7.9 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/03-PowerShell-101--Cmdlets-(6-09).mkv |
17.7 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/04-PowerShell-101--Aliases-(6-45).mkv |
12.7 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/05-PowerShell-101--Objects-and-the-Pipeline-(9-08).mkv |
25.8 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/06-PowerShell-101--Selecting,-Sorting,-and-Formatting-(17-35).mkv |
47.4 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/07 PowerShell 101 - Providers.mkv |
40.5 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/08 PowerShell 101 - Variables and Data Types.mkv |
47.3 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/09 PowerShell 101 - Control Flow.mkv |
41.2 MB |
| TCM Security - Security Operations (SOC) 201/10- PowerShell 101/10 Working with WMI and CIM.mkv |
31.9 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/01 Live Incident Response Using PowerShell.mkv |
116.2 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/02 PowerShell Remoting.mkv |
23.8 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/03 PS Remoting - One-to-One Remoting.mkv |
25.8 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/04 PS Remoting - One-to-Many Remoting.mkv |
50.7 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/05 PS Remoting - Script Execution at Scale.mkv |
26 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/06 PowerShell Authentication.mkv |
34.2 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/07 Malicious PowerShell Usage.mkv |
42.6 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/08 Introduction to the Kansa IR Framework.mkv |
47.2 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/09 Kansa - Modules.mkv |
84.3 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/10 Kansa - Remote Collection (Part 1).mkv |
45.7 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/11 Kansa - Remote Collection (Part 2).mkv |
67.9 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/12 Kansa - Collection Analysis.mkv |
90 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/13 Collection and Analysis Challenge.mkv |
24.5 MB |
| TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/14 Collection Analysis Challenge Walkthrough.mkv |
362.2 MB |
| TCM Security - Security Operations (SOC) 201/12- Conclusion/01 Course Wrap Up.mkv |
15.8 MB |