Download link
File List
-
01 - Course Introduction/1. Cyber Security Analyst - Intro to Course Content.mp4 389.5 MB
01 - Course Introduction/1. Cyber Security Analyst - Intro to Course Content.vtt 66.58 KB
02 - Networking Concepts/001 Introduction to organization Network.mp4 577.46 MB
02 - Networking Concepts/001 Introduction to organization Network_en.vtt 71.78 KB
02 - Networking Concepts/002 Introduction to organization Network.mp4 221.94 MB
02 - Networking Concepts/002 Introduction to organization Network_en.vtt 28.32 KB
02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics.mp4 329.43 MB
02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics_en.vtt 44.43 KB
02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics.mp4 364.93 MB
02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics_en.vtt 56.49 KB
02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range.mp4 662.66 MB
02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range_en.vtt 92.02 KB
02 - Networking Concepts/006 Introduction to web technology.mp4 451.38 MB
02 - Networking Concepts/006 Introduction to web technology_en.vtt 52.05 KB
02 - Networking Concepts/007 Understanding HTTP protocol Part 1.mp4 853.42 MB
02 - Networking Concepts/007 Understanding HTTP protocol Part 1_en.vtt 81.97 KB
02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1.mp4 711.57 MB
02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1_en.vtt 91.23 KB
02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.mp4 747.33 MB
02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services_en.vtt 106.42 KB
02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions.mp4 445.89 MB
02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions_en.vtt 61.77 KB
02 - Networking Concepts/011 Windows OS - Computer Management, Utilities.mp4 469.7 MB
02 - Networking Concepts/011 Windows OS - Computer Management, Utilities_en.vtt 82.94 KB
02 - Networking Concepts/012 Indept on Port Numbers - Part 1.mp4 711.6 MB
02 - Networking Concepts/012 Indept on Port Numbers - Part 1_en.vtt 91.23 KB
02 - Networking Concepts/013 Indept on Port Numbers - Part 2.mp4 480.32 MB
02 - Networking Concepts/013 Indept on Port Numbers - Part 2_en.vtt 63.34 KB
03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing.mp4 698.04 MB
03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing_en.vtt 127.62 KB
03 - Cyber Security Concepts/002 Defence InDeapth Approach.mp4 770.13 MB
03 - Cyber Security Concepts/002 Defence InDeapth Approach_en.vtt 102.66 KB
03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4.mp4 386.53 MB
03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4_en.vtt 62.63 KB
03 - Cyber Security Concepts/004 Brute Force Attack and Types.mp4 469.38 MB
03 - Cyber Security Concepts/004 Brute Force Attack and Types_en.vtt 71.06 KB
03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks.mp4 284.32 MB
03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks_en.vtt 51.67 KB
03 - Cyber Security Concepts/006 DNS Tunneling Attack.mp4 309 MB
03 - Cyber Security Concepts/006 DNS Tunneling Attack_en.vtt 53.68 KB
03 - Cyber Security Concepts/007 Malware and its Types.mp4 309.38 MB
03 - Cyber Security Concepts/007 Malware and its Types_en.vtt 44.58 KB
03 - Cyber Security Concepts/008 OWASP Top 10.mp4 1.16 GB
03 - Cyber Security Concepts/008 OWASP Top 10_en.vtt 150.46 KB
04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation.mp4 600.13 MB
04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation_en.vtt 105.34 KB
04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation.mp4 475.67 MB
04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation_en.vtt 80.65 KB
04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk.mp4 522.79 MB
04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk_en.vtt 70.32 KB
04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process.mp4 519.37 MB
04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process_en.vtt 83.26 KB
04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities.mp4 639.12 MB
04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities_en.vtt 100.58 KB
04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture.mp4 963.14 MB
04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture_en.vtt 148.16 KB
05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis.mp4 759.33 MB
05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis_en.vtt 108.8 KB
05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs.mp4 710.86 MB
05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs_en.vtt 81.16 KB
05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1.mp4 909.8 MB
05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1_en.vtt 102.08 KB
05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2.mp4 543.55 MB
05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2_en.vtt 82.16 KB
05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis.mp4 582.35 MB
05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis_en.vtt 78.61 KB
05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1.mp4 889.69 MB
05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1_en.vtt 93.73 KB
05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2.mp4 941.54 MB
05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2_en.vtt 89.09 KB
05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs.mp4 1.25 GB
05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs_en.vtt 120.11 KB
05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1.mp4 535.66 MB
05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1_en.vtt 44.45 KB
05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2.mp4 614.99 MB
05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2_en.vtt 70.5 KB
05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Windows Log.mp4 891.37 MB
05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Windows Log_en.vtt 106.13 KB
05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Event IDs.mp4 1.13 GB
05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Event IDs_en.vtt 137.32 KB
05 - Understanding Various Logs, Dashboard and Alert creations/013 Windows Sysmon Log Analysis.mp4 919.8 MB
05 - Understanding Various Logs, Dashboard and Alert creations/013 Windows Sysmon Log Analysis_en.vtt 94.63 KB
05 - Understanding Various Logs, Dashboard and Alert creations/014 Understanding Antivirus Logs.mp4 1.11 GB
05 - Understanding Various Logs, Dashboard and Alert creations/014 Understanding Antivirus Logs_en.vtt 182.35 KB
05 - Understanding Various Logs, Dashboard and Alert creations/38398938-Windows-Events.docx 8.11 KB
06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1.mp4 655.1 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1_en.vtt 84.62 KB
06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2.mp4 802.21 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2_en.vtt 67.59 KB
06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3.mp4 567.18 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3_en.vtt 63.05 KB
06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis.mp4 676.85 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis_en.vtt 93.72 KB
06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages.mp4 964.2 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages_en.vtt 94.78 KB
07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server.mp4 1.02 GB
07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server_en.vtt 119.51 KB
07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack.mp4 1.19 GB
07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack_en.vtt 110.95 KB
07 - Introduction to threat Hunting/003 Email Header Analysis.mp4 653.29 MB
07 - Introduction to threat Hunting/003 Email Header Analysis_en.vtt 63.59 KB
08 - Discussion on Real Time Activities/001 Discussion on Real Time Activities.mp4 740.61 MB
08 - Discussion on Real Time Activities/001 Discussion on Real Time Activities_en.vtt 89.12 KB
09 - Course wrapup/001 Course Wrapup.mp4 513.61 MB
09 - Course wrapup/001 Course Wrapup_en.vtt 58.11 KB
Download Info
-
Tips
“Cyber Security SOC Analyst Training SIEM Splunk 2022 Udemy” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.