eCTHPv2 Course

eCTHPv2 Course

‏389

دورة التحضير لشهادة eCTHPv2

(4)
34 Lesson
Course Trainer
eCTHPv2 Course

The Academy

Overview

دورة التحضير لشهادة  eCTHPv2

Course Content
Introduction
Intro Watch
مجموعة التلقرام || Telegram Group
Chapter 1
Introduction to Threat Hunting
Threat Hunting Terminology Part 1
Threat Hunting Terminology Part 2
Threat Intelligence
Lab - Hunting with IOCs
Threat Hunting Hypothesis
Chapter 2
Introduction to Network Hunting Part 1
Introduction to Network Hunting Part 2
Hunting for Suspicious Network traffic
Lab - Network Hunting & Forensics Part 1
Lab - Network Hunting & Forensics Part 2
Hunting Web Shells
Lab - Hunting Web Shells
Lab Hunting Web Shells Part 2
Chapter 3
Introduction to Endpoint Hunting
Malware Overview Part 1
Malware Overview Part 2
Malware Overview Part 3
Malware Overview Part 4
Malware Overview Part 5
Hunting Malware Part 1
Hunting Malware Part 2
Lab: Malware Hunting Part 1
Lab: Malware Hunting Part 2
Lab: Malware Hunting Part 3
Event IDs, Logging, & SIEMs Part 1
Event IDs, Logging, & SIEMs Part 2
Lab: ELK Part 1
Lab: ELK Part 2
Lab: Splunk Part 1
Lab: Splunk Part 2
Lab: Splunk Part 3
questions and answers
eCTHPv2 Course

تركي الورثان

26 يوليو 2025
السلام عليكم الله يعطيك العافيه النافذتين التيرمنال تبع يوبنتو هل هو عن طريق فيرتشوال مشين فتحتها ولا كيف
0 from questions
Attachments

Ch1 01 Introduction to Threat Hunting.pdf

pdf file 529.44 kB

Ch1 02 Threat Hunting Terminology.pdf

pdf file 1.37 MB

Ch1 02 Threat Hunting Terminology.pdf

pdf file 1.37 MB

Ch1 03 Threat Intelligence.pdf

pdf file 1.69 MB

Ch1 04 Threat Hunting Hypothesis.pdf

pdf file 1.13 MB

Ch2 01 Introduction to Network Hunting.pdf

pdf file 1.88 MB

Ch2 01 Introduction to Network Hunting.pdf

pdf file 1.88 MB

Ch2 02 Hunting for Suspicious Network Traffic.pdf

pdf file 11.39 MB

Ch2 03 Hunting Web Shells.pdf

pdf file 7.54 MB

Ch3 01 Introduction to Endpoint Hunting.pdf

pdf file 1.42 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 03 Hunting Malware.pdf

pdf file 4.88 MB

Ch3 03 Hunting Malware.pdf

pdf file 4.88 MB

Ch3 04 Event IDs, Logging, & SIEMs.pdf

pdf file 4.44 MB

Ch3 04 Event IDs, Logging, & SIEMs.pdf

pdf file 4.44 MB
Subscriber ratings and reviews
5 months ago
eCTHPv2 Course

سعود الحماد

الله يعطيك العافية مهندس سطام ماقصرت صراحة دورة جميلة جدا
10 months ago
eCTHPv2 Course

محمد عيبان

2 months ago
eCTHPv2 Course

manar thani

Similar الدورات الإلكترونية

eCIR Preparation Course

CBBH Preparation Course