eCTHPv2 Course

‏389

دورة التحضير لشهادة eCTHPv2

(2)
34 Video
Course Trainer

The Academy

Overview

دورة التحضير لشهادة  eCTHPv2

Course Content
Introduction
مجموعة التلقرام || Telegram Group
Chapter 1
Introduction to Threat Hunting
Threat Hunting Terminology Part 1
Threat Hunting Terminology Part 2
Threat Intelligence
Lab - Hunting with IOCs
Threat Hunting Hypothesis
Chapter 2
Introduction to Network Hunting Part 1
Introduction to Network Hunting Part 2
Hunting for Suspicious Network traffic
Lab - Network Hunting & Forensics Part 1
Lab - Network Hunting & Forensics Part 2
Hunting Web Shells
Lab - Hunting Web Shells
Lab Hunting Web Shells Part 2
Chapter 3
Introduction to Endpoint Hunting
Malware Overview Part 1
Malware Overview Part 2
Malware Overview Part 3
Malware Overview Part 4
Malware Overview Part 5
Hunting Malware Part 1
Hunting Malware Part 2
Lab: Malware Hunting Part 1
Lab: Malware Hunting Part 2
Lab: Malware Hunting Part 3
Event IDs, Logging, & SIEMs Part 1
Event IDs, Logging, & SIEMs Part 2
Lab: ELK Part 1
Lab: ELK Part 2
Lab: Splunk Part 1
Lab: Splunk Part 2
Lab: Splunk Part 3
Attachments

Ch1 01 Introduction to Threat Hunting.pdf

pdf file 529.44 kB

Ch1 02 Threat Hunting Terminology.pdf

pdf file 1.37 MB

Ch1 02 Threat Hunting Terminology.pdf

pdf file 1.37 MB

Ch1 03 Threat Intelligence.pdf

pdf file 1.69 MB

Ch1 04 Threat Hunting Hypothesis.pdf

pdf file 1.13 MB

Ch2 01 Introduction to Network Hunting.pdf

pdf file 1.88 MB

Ch2 01 Introduction to Network Hunting.pdf

pdf file 1.88 MB

Ch2 02 Hunting for Suspicious Network Traffic.pdf

pdf file 11.39 MB

Ch2 03 Hunting Web Shells.pdf

pdf file 7.54 MB

Ch3 01 Introduction to Endpoint Hunting.pdf

pdf file 1.42 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 02 Introduction to Malware Hunting.pdf

pdf file 1.93 MB

Ch3 03 Hunting Malware.pdf

pdf file 4.88 MB

Ch3 03 Hunting Malware.pdf

pdf file 4.88 MB

Ch3 04 Event IDs, Logging, & SIEMs.pdf

pdf file 4.44 MB

Ch3 04 Event IDs, Logging, & SIEMs.pdf

pdf file 4.44 MB
Subscriber ratings and reviews
6 months ago

محمد عيبان

Similar الدورات الإلكترونية

eCIR Preparation Course

CRTP Course

CBBH Preparation Course