BITCQ

TCM Security - Security Operations (SOC) 201

Size: 5.3 GB
Magnet link

Name Size
TCM Security - Security Operations (SOC) 201/01- Course Introduction/01-Course-Introduction-(5-13).mkv 17 MB
TCM Security - Security Operations (SOC) 201/01- Course Introduction/02-About-the-Instructor-(2-30).mkv 8.9 MB
TCM Security - Security Operations (SOC) 201/01- Course Introduction/03-The-Modern-Adversary-(10-17).mkv 40.9 MB
TCM Security - Security Operations (SOC) 201/01- Course Introduction/04-The-SOC-201-Methodology-(4-23).mkv 10.4 MB
TCM Security - Security Operations (SOC) 201/01- Course Introduction/05-Course-Support-(3-05).mkv 10.1 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/01-Lab-Setup-(3-31).mkv 11.8 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/02-Installing-a-Hypervisor-(7-26).mkv 23 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/03-Installing-Ubuntu-(13-20).mkv 29 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/04-Configuring-Ubuntu-(8-17).mkv 22.5 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/05-Installing-Windows-(11-15).mkv 43.4 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/06-Configuring-Windows-(7-52).mkv 25.1 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/07-Installing-Splunk-(16-16).mkv 37.6 MB
TCM Security - Security Operations (SOC) 201/02- Lab Setup/08-Configuring-the-Lab-Network-(10-10).mkv 25.5 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/01-Introduction-to-Incident-Response-(5-59).mkv 19.9 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/02-The-Incident-Response-Process-(14-04).mkv 35.1 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/03-Incident-Response--Preparation-(14-44).mkv 53.2 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/04-Incident-Response--Identification-(5-39).mkv 20.1 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/05-Incident-Response--Containment-(10-45).mkv 38.6 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/06-Incident-Response--Eradication-(6-05).mkv 23.2 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/07-Incident-Response--Recovery-(7-43).mkv 28.4 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/08-Incident-Response--Lessons-Learned-(5-15).mkv 19.4 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/09-The-OODA-Loop-(18-32).mkv 66.8 MB
TCM Security - Security Operations (SOC) 201/03- Introduction to Incident Response/10-Incident-Response-vs.-Threat-Hunting-(11-39).mkv 34.2 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/01-Introduction-to-Threat-Hunting-(8-58).mkv 33.8 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/02-The-Argument-for-Threat-Hunting-(13-14).mkv 40.1 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/03-Threat-Hunting-Teams-(16-55).mkv 53.6 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/04-Threat-Hunting-Data-Sources-(19-30).mkv 63.3 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/05-The-Hunting-Maturity-Model-(HMM)-(20-00).mkv 51.6 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/06-Cyber-Threat-Intelligence-(6-22).mkv 25.8 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/07-The-Cyber-Kill-Chain-(16-52).mkv 39.6 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/08-The-MITRE-ATT&CK-Framework-(15-05).mkv 110.3 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/09-Exploring-MITRE-ATT&CK-(12-37).mkv 90.9 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/10-Structured-Threat-Hunting-(16-01).mkv 62 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/11-Unstructured-Threat-Hunting-(9-21).mkv 34.1 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/12-MITRE-ATT&CK-Navigator-(21-48).mkv 129.7 MB
TCM Security - Security Operations (SOC) 201/04- Introduction to Threat Hunting/13-MITRE-ATT&CK-Navigator--Gap-Analysis-and-Threat-Hunting-(19-02).mkv 135.9 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/01-Data-Transformation-(5-36).mkv 17 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/02-Data-Transformation--Searching-(14-16).mkv 47.7 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/03-Searching-in-the-Command-Line-(19-19).mkv 48.1 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/04-Searching-in-PowerShell-(27-29).mkv 76.8 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/05-Searching-in-Splunk-(21-54).mkv 82.1 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/06-Data-Transformation--Aggregations-(9-24).mkv 32.1 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/07-Aggregations-in-the-Command-Line-(25-36).mkv 51.4 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/08-Aggregations-in-PowerShell-(10-24).mkv 29.2 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/09-Aggregations-in-Splunk-(34-43).mkv 107.9 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/10-Data-Transformation--Statistics-(9-38).mkv 33.6 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/11-Statistics-in-the-Command-Line-(22-04).mkv 33.5 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/12-Statistics-in-PowerShell-(13-24).mkv 23.5 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/13-Statistics-in-Splunk-(15-23).mkv 47.5 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/14-Data-Transformation--Visualizations-(5-00).mkv 22.4 MB
TCM Security - Security Operations (SOC) 201/05- Data Transformation/15-Visualizations-in-Splunk-(25-31).mkv 74.6 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/01-Understanding-Anomalies-(20-33).mkv 84 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/02-Categorizing-Anomalies-(1-11).mkv 4.4 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/03-Masquerading-(10-39).mkv 54.8 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/04-Ambiguous-Identifiers-(11-13).mkv 50.2 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/05-Frequency-&-Volume-Anomalies-(16-14).mkv 56 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/06-Temporal-Anomalies-(14-53).mkv 50 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/07-Location-&-Environment-Anomalies-(14-25).mkv 60.7 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/08-Structure-&-Format-Anomalies-(16-16).mkv 77.7 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/09-Obfuscated-PowerShell-Analysis-(6-34).mkv 27.9 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/10-Entropy-Analysis-(4-56).mkv 14.8 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/11-Alternate-Data-Stream-(ADS)-Analysis-(19-26).mkv 42.5 MB
TCM Security - Security Operations (SOC) 201/06- Understanding Anomalies/12-Absence-&-Suppression-Anomalies-(7-57).mkv 34.1 MB
TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/01-Dissecting-Threat-Reports-(18-54).mkv 83.3 MB
TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/02-Breaking-Down-Attack-Steps-(5-05).mkv 22.2 MB
TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/03-Mapping-Steps-to-Artifacts-(4-40).mkv 18.4 MB
TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/04-Mapping-Artifacts-to-Evidence-Sources-(7-51).mkv 31.3 MB
TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/05-Visualizing-with-MITRE-ATT&CK-Navigator-(4-34).mkv 28.4 MB
TCM Security - Security Operations (SOC) 201/07- Dissecting Threat Reports/06-Intrusion-Analysis-Resources-(5-56).mkv 57.2 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/01-Tracing-an-Attack-Chain-(27-04).mkv 77 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/02-Hunting-Execution-Artifacts-(9-46).mkv 39.2 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/03-Hunting-PowerShell-Execution-(36-09).mkv 148.4 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/04-Hunting-Cmd-Execution-(20-20).mkv 84.6 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/05-Hunting-Process-Trees-(9-26).mkv 41.6 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/06-Hunting-Persistence-Artifacts-(7-33).mkv 36.5 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/07-Hunting-Persistence--Registry-Run-Keys-(17-20).mkv 78.1 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/08-Hunting-Persistence--Lookup-Tables-(27-30).mkv 100 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/09-Hunting-Defense-Evasion-Artifacts-(16-39).mkv 53.8 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/10-Hunting-Command-and-Control-(C2)-Artifacts-(7-40).mkv 28.1 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/11-Hunting-C2--Ingress-Tool-Transfer-(LOLBAS)-(7-35).mkv 19.4 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/12-Hunting-C2--Ingress-Tool-Transfer-(File-System-Events)-(12-57).mkv 51.1 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/13-Hunting-C2--Ingress-Tool-Transfer-(Network-Connection-Events)-(4-21).mkv 9.5 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/14-Hunting-Lateral-Movement-Artifacts-(8-27).mkv 27.1 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/15-Hunting-Lateral-Movement--PsExec-(Service-Creation)-(9-38).mkv 22 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/16-Hunting-Lateral-Movement--PsExec-(Reversing-Regex)-(14-25).mkv 32.4 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/17-Hunting-Lateral-Movement--PsExec-(Named-Pipes)-(4-12).mkv 14.3 MB
TCM Security - Security Operations (SOC) 201/08- Threat Hunting Lab/18-Module-Recap-(5-46).mkv 18.2 MB
TCM Security - Security Operations (SOC) 201/09- Collection at Scale/01-Introduction-to-Collection-(3-24).mkv 4.5 MB
TCM Security - Security Operations (SOC) 201/09- Collection at Scale/02-Introduction-to-WMI-(11-11).mkv 46.3 MB
TCM Security - Security Operations (SOC) 201/09- Collection at Scale/03-Collection-with-WMIC-(18-56).mkv 65.3 MB
TCM Security - Security Operations (SOC) 201/09- Collection at Scale/04-WMIC-Collection-and-Filter-Examples-(5-51).mkv 16 MB
TCM Security - Security Operations (SOC) 201/09- Collection at Scale/05-Remote-Collection-with-WMIC-(5-38).mkv 11.9 MB
TCM Security - Security Operations (SOC) 201/09- Collection at Scale/06-Scripting-WMI-Collection-(10-31).mkv 27.2 MB
TCM Security - Security Operations (SOC) 201/09- Collection at Scale/07-WMI-Automated-Collection-Frameworks-(6-57).mkv 23.5 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/01-Introduction-to-PowerShell-(4-58).mkv 20.2 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/02-PowerShell-101-(1-55).mkv 7.9 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/03-PowerShell-101--Cmdlets-(6-09).mkv 17.7 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/04-PowerShell-101--Aliases-(6-45).mkv 12.7 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/05-PowerShell-101--Objects-and-the-Pipeline-(9-08).mkv 25.8 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/06-PowerShell-101--Selecting,-Sorting,-and-Formatting-(17-35).mkv 47.4 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/07 PowerShell 101 - Providers.mkv 40.5 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/08 PowerShell 101 - Variables and Data Types.mkv 47.3 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/09 PowerShell 101 - Control Flow.mkv 41.2 MB
TCM Security - Security Operations (SOC) 201/10- PowerShell 101/10 Working with WMI and CIM.mkv 31.9 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/01 Live Incident Response Using PowerShell.mkv 116.2 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/02 PowerShell Remoting.mkv 23.8 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/03 PS Remoting - One-to-One Remoting.mkv 25.8 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/04 PS Remoting - One-to-Many Remoting.mkv 50.7 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/05 PS Remoting - Script Execution at Scale.mkv 26 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/06 PowerShell Authentication.mkv 34.2 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/07 Malicious PowerShell Usage.mkv 42.6 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/08 Introduction to the Kansa IR Framework.mkv 47.2 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/09 Kansa - Modules.mkv 84.3 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/10 Kansa - Remote Collection (Part 1).mkv 45.7 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/11 Kansa - Remote Collection (Part 2).mkv 67.9 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/12 Kansa - Collection Analysis.mkv 90 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/13 Collection and Analysis Challenge.mkv 24.5 MB
TCM Security - Security Operations (SOC) 201/11- PowerShell for Incident Response/14 Collection Analysis Challenge Walkthrough.mkv 362.2 MB
TCM Security - Security Operations (SOC) 201/12- Conclusion/01 Course Wrap Up.mkv 15.8 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
TCM Security - Security Operations (SOC) 201 Video 5.3 GB 20

Loading...