Oreilly – Threat Intelligence and Threat Hunting, 2nd Edition 2024-4
Oreilly – Threat Intelligence and Threat Hunting, 2nd Edition 2024-4 Downloadly IRSpace

Threat Intelligence and Threat Hunting 2nd Edition course. This video training course contains 5 hours of training that will help you protect your sensitive data. A cybersecurity professional needs to have a good understanding of the threats, threat actors, and vulnerabilities that attackers intend to exploit. The Cyber Threats and Threat Hunting, Second Edition video course provides students with the knowledge and skills to strengthen systems, protect sensitive data, and ensure they comply with privacy laws. During the course, expert lecturer, author and cyber security expert Mr. Aamir Lakhani explores how to classify threats, work with vulnerabilities and use common assessment methods using hands-on demonstrations, in-depth discussions and whiteboard explanations. By the end of this course, you will be able to:
- Protect sensitive data and comply with privacy laws.
- Secure systems and applications to prevent data disclosure.
- Guide your organization on “Privacy First” principles.
What you will learn
- Concepts of cyber threats and threat hunting
- Analysis of indicators of potentially malicious activity
- Tools or techniques to detect malicious activity
- Concepts related to attack methodology frameworks
- Using threat intelligence to support organization security
- Analyzing the output of common vulnerability assessment tools
- Threats and vulnerabilities associated with certain technologies
This course is suitable for people who:
- Cyber security experts
- Anyone interested in learning the basics of cyber security
Course details
- Publisher: Oreilly
- Instructor: Aamir Lakhani
- Training level: beginner to advanced
- Training duration: 4 hours 58 minutes
Course headings
- Introduction
- Threat Intelligence and Threat Hunting: Introduction
- Lesson 1: Threat-Intelligence and Threat-Hunting Concepts
- Learning objectives
- 1.1 Threat actors—Part 1
- 1.2 Threat actors—Part 2
- 1.3 Confidence levels
- 1.4 Threat hunting
- Lesson 2: Analyze Indicators of Potentially Malicious Activity
- Learning objectives
- 2.1 Network-related
- 2.2 Host-related
- 2.3 Application-related
- 2.4 Malicious Activity Indicators
- Lesson 3: Tools or Techniques to Determine Malicious Activity
- Learning objectives
- 3.1 Tools–Part 1
- 3.2 Tools–Part 2
- 3.3 Common techniques–Part 1
- 3.4 Common techniques–Part 2
- 3.5 Common techniques–Part 3
- 3.6 Programming languages/scripting
- Lesson 4: Concepts Related to Attack Methodology Frameworks
- Learning objectives
- 4.1 Cyber kill chains
- 4.2 Diamond Model of Intrusion Analysis
- 4.3 MITER ATT–Part 1
- 4.4 MITER ATT–Part 2
- 4.5 Open Source Security Testing Methodology Manual (OSS TMM)
- 4.6 OWASP Testing Guide
- Lesson 5: Utilizing Threat Intelligence to Support Organization Security
- Learning objectives
- 5.1 Attack Frameworks—Part 1
- 5.2 Attack Frameworks—Part 2
- 5.3 Threat Research
- 5.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions
- 5.5 Wireless Analysis Techniques
- Lesson 6: Analyze Output from Common Vulnerability Assessment Tools
- Learning objectives
- 6.1 Understanding Results
- 6.2 Web Application Scanners
- 6.3 Infrastructure Vulnerability Scanner
- 6.4 Software Assessment Tools and Techniques
- 6.5 Wireless Assessment
- 6.6 Cloud Infrastructure Assessment
- Lesson 7: Threats and Vulnerabilities Associated with Specialized Technology
- Learning objectives
- 7.1 Mobile
- 7.2 Internet of Things (IoT) and Embedded Devices—Part 1
- 7.3 Internet of Things (IoT) and Embedded Devices—Part 2
- 7.4 APTs
- 7.5 Embedded and Real-Time Operating Systems (RTOS)
- 7.6 SOC and FPGA
- 7.7 Physical Access Control
- 7.8 Building Automation Systems, Vehicles, and Drones
- 7.9 Industrial Control Systems (ICS) and Process Automation
- 7.10 Defending Critical Infrastructure
- 7.11 Supervisory Control and Data Acquisition (SCADA)—Part 1
- 7.12 Supervisory Control and Data Acquisition (SCADA)—Part 2
- 7.13 Verifications and Quality Controls
- Summary
- Threat Intelligence and Threat Hunting: Summary
Images of Threat Intelligence and Threat Hunting 2nd Edition course
Sample video of the course
Installation guide
After Extract, view with your favorite Player.
English subtitle
Quality: 720p
download link
File(s) password: www.downloadly.ir
Size
1.0 GB