message

SEC503 - Network Monitoring and Threat Detection In-Depth

Likes 0 Dislikes 0
Seeders 3
Leechers 24
File Size 56.4 GB
Downloads 6
Uploaded Apr 29, 2024
Files
Trackers
More Info
FolderSEC503 - Network Monitoring and Threat Detection In-Depth
FolderUSB 2021
Filesec503.21.1.zip - 48.8 GB
FolderVoD 2021
Folder5. Modern and Future Monitoring Forensics Analytics and Machine Learning
Folder2. Modern and Future Monitoring
File43. Learning vs Understanding.mp4 - 599 MB
File63. Summary.mp4 - 327 MB
File42. Vectorization.mp4 - 284 MB
File51. Is It IP Take Two.mp4 - 66.6 MB
File21. Manipulate the Data.mp4 - 61.2 MB
File18. Our Laboratory.mp4 - 56.3 MB
File48. Is It IP.mp4 - 49.4 MB
File37. What Kind of Rules.mp4 - 32.7 MB
File61. Important Conclusion.mp4 - 18.2 MB
File11. IP IDs.mp4 - 16.3 MB
File8. Sequence Numbers.mp4 - 15.9 MB
File28. What About Machine Learning.mp4 - 14.3 MB
File4. Think About This.mp4 - 12.5 MB
File23. Bytes over Time.mp4 - 11.5 MB
File44. A Word on Learning.mp4 - 11.1 MB
File7. Handy Feature for Payload Similarities.mp4 - 9.92 MB
File17. Intuitive Understanding Linear Regression.mp4 - 8.82 MB
File45. What We KnowSuspect So Far 2.mp4 - 8.72 MB
File25. Linear Regression with Numpy.mp4 - 8.67 MB
File35. What We KnowSuspect So Far 1.mp4 - 8.17 MB
File62. Learning Over Time.mp4 - 7.54 MB
File13. Graphing SYNs Over Time.mp4 - 6.5 MB
File39. Lets Not Learn Linear Algebra.mp4 - 5.85 MB
File52. Something More Practical.mp4 - 5.37 MB
File29. Another Intuition Added Complexity.mp4 - 5.26 MB
File33. OverfittingOvertraining Intuition.mp4 - 5.21 MB
File24. Linear Regression.mp4 - 4.88 MB
File53. What Is It.mp4 - 4.52 MB
File12. IP Checksums.mp4 - 3.81 MB
File6. Handy Tool PAE.mp4 - 3.78 MB
File41. Multihot Encoding Vectorization.mp4 - 3.62 MB
File38. A Few Last Things.mp4 - 3.09 MB
File10. TCP Ports.mp4 - 2.84 MB
File40. A Bit More NotLinear Algebra.mp4 - 2.71 MB
File49. Thoughtful Discussion.mp4 - 2.5 MB
File22. Preparing to Plot.mp4 - 2.28 MB
File16. Our Approach.mp4 - 2.19 MB
File19. Getting Started.mp4 - 2.03 MB
File47. Practical Applications and Experiments.mp4 - 2.02 MB
File30. 2 nd Order Polynomial.mp4 - 1.92 MB
File26. Two Values.mp4 - 1.84 MB
File9. The Advantage of Developing Analysis Methods.mp4 - 1.84 MB
File2. AlertDriven versus DataDriven Sensor.mp4 - 1.8 MB
File3. Become Data Driven.mp4 - 1.7 MB
File5. Other Visualization Options.mp4 - 1.61 MB
File36. What Machine Learning Is Generally About Today.mp4 - 1.57 MB
File50. Improving That Model.mp4 - 1.51 MB
File20. Examine the Data.mp4 - 1.34 MB
File31. 3 rd Order Polynomial.mp4 - 1.05 MB
File59. Classifying the Unknown.mp4 - 733 kB
File32. 2 nd 3 rd are Better 15 th Must Be Awesome.mp4 - 662 kB
File34. Overfitting Destroys Predictive Ability.mp4 - 572 kB
File27. Heres How That Looks.mp4 - 192 kB
File14. Basic Analytics.mp4 - 161 kB
File55. What Is It Take Two.mp4 - 153 kB
File58. OS Classification Two Ways.mp4 - 151 kB
File54. Decision Trees.mp4 - 131 kB
File57. Going Further Classifying Operating Systems.mp4 - 126 kB
File56. Decision Trees Followup Discussion.mp4 - 114 kB
File46. Experiments with Analytics Machine Learning.mp4 - 90.2 kB
File15. What is Machine Learning.mp4 - 89.4 kB
File1. Being Data Driven.mp4 - 88.2 kB
Folder1. Practical NetFlow Applications
File1. SEC5035.mp4 - 132 MB
File28. SiLK Exercises.mp4 - 67.4 MB
File19. Flags vs initialFlags.mp4 - 18.5 MB
File15. Using a Repository The Most Typical Use.mp4 - 9.72 MB
File16. Statistics.mp4 - 8.01 MB
File20. Flow Continuation.mp4 - 7.32 MB
File6. NetFlow.mp4 - 6.4 MB
File14. rwfilter Input Sources.mp4 - 4.6 MB
File10. NetFlow SiLK Peculiarities.mp4 - 4.55 MB
File17. Quick Research Weird Protocol.mp4 - 4.1 MB
File9. What Is a Flow.mp4 - 3.81 MB
File13. Wrapping Your Head Around SiLK.mp4 - 3.36 MB
File8. Why Use SiLK.mp4 - 2.91 MB
File5. Network Flows.mp4 - 2.65 MB
File7. What Is SiLK.mp4 - 2.35 MB
File26. Output.mp4 - 1.95 MB
File18. Many Fields.mp4 - 1.37 MB
File21. rwp2yaf2silk.mp4 - 1.32 MB
File12. rwfilter.mp4 - 1.21 MB
File23. How to Use SiLK Commands to Process Output rwfilter Commands.mp4 - 1000 kB
File24. rwfilter Format.mp4 - 494 kB
File25. Partitioning Parameters.mp4 - 315 kB
File22. SiLK Conventional TCP Flows.mp4 - 294 kB
File2. Table of Contents 1.mp4 - 135 kB
File3. Table of Contents 2.mp4 - 133 kB
File27. SiLK WrapUp.mp4 - 81.3 kB
File4. What is NetFlow.mp4 - 78.2 kB
File11. Using SiLK.mp4 - 78.2 kB
Folder3. RealWorld Scenario
File3. Before Jumping In.mp4 - 70.9 MB
File13. Attack Scenario Exercises.mp4 - 36.9 MB
File8. Perform ScenarioBased Network Forensics Analysis.mp4 - 7.12 MB
File12. From Packets to Timeline.mp4 - 6.75 MB
File10. LockheedMartin Cyber Kill Chain .mp4 - 2.72 MB
File7. Investigations Using Network Forensics.mp4 - 1.87 MB
File6. Data Collection Challenges.mp4 - 1.8 MB
File5. Forensic Analysis.mp4 - 1.58 MB
File2. Network Forensics Analysis.mp4 - 1.12 MB
File11. Phases of Exploitation.mp4 - 976 kB
File4. Indication of an Issue.mp4 - 570 kB
File9. Cyber Kill Chain and You.mp4 - 293 kB
File1. Network Traffic Forensics.mp4 - 82 kB
Folder4. Optional Extra Appendix
File8. Under the Hood Proxy.mp4 - 147 kB
File12. Tcpdump Output of File Download.mp4 - 143 kB
File11. Tcpdump Output of Command Execution.mp4 - 135 kB
File7. Under the Hood Client.mp4 - 120 kB
File17. Iodine Covert DNS Channel.mp4 - 115 kB
File9. dnscat2.mp4 - 115 kB
File10. Sample dnscat2 Session.mp4 - 113 kB
File22. Detection Strategies.mp4 - 108 kB
File18. The Onion Router Tor.mp4 - 108 kB
File21. Prevention Strategies for C2 Traffic.mp4 - 101 kB
File19. Unique Tor SSL Certificate Values.mp4 - 100 kB
File20. Zeek Detection of Tor.mp4 - 94 kB
File2. Introduction to CommandandControl Traffic.mp4 - 91 kB
File23. C2 Summary.mp4 - 87.8 kB
File15. Detection of dnscat2DNS Tunnel Using Zeek.mp4 - 87.4 kB
File6. On the Surface Client and Proxy Communication.mp4 - 84 kB
File14. Rule Not Optimal.mp4 - 80 kB
File13. Detection of dnscat2DNS Tunnel Using Snort.mp4 - 78.7 kB
File16. Detection of dnscat2DNS Tunnel Using SiLK.mp4 - 67.3 kB
File24. COURSE RESOURCES AND CONTACT INFORMATION.mp4 - 65 kB
File5. Next Start the Client.mp4 - 58 kB
File3. ICMP Covert Channel ptunnel.mp4 - 57.4 kB
File1. C2 Covert Channels.mp4 - 53.1 kB
File4. First Start the Proxy.mp4 - 44 kB
FolderZeek-2021
FolderZeek-2021
FileSEC503- SANS OnDemand_68.webm - 538 MB
FileSEC503- SANS OnDemand_61.webm - 154 MB
FileSEC503- SANS OnDemand_80.webm - 44.9 MB
FileSEC503- SANS OnDemand_38.webm - 43.9 MB
FileSEC503- SANS OnDemand_10.webm - 29 MB
FileSEC503- SANS OnDemand_11.webm - 19.2 MB
FileSEC503- SANS OnDemand_26.webm - 14.7 MB
FileSEC503- SANS OnDemand_4.webm - 13 MB
FileSEC503- SANS OnDemand_25.webm - 11.4 MB
FileSEC503- SANS OnDemand_18.webm - 11.2 MB
FileSEC503- SANS OnDemand_40.webm - 8.84 MB
FileSEC503- SANS OnDemand_31.webm - 8.63 MB
FileSEC503- SANS OnDemand_3.webm - 8.44 MB
FileSEC503- SANS OnDemand_30.webm - 8.12 MB
FileSEC503- SANS OnDemand_76.webm - 4.83 MB
FileSEC503- SANS OnDemand_23.webm - 4.79 MB
FileSEC503- SANS OnDemand_2.webm - 4.63 MB
FileSEC503- SANS OnDemand_50.webm - 4.58 MB
FileSEC503- SANS OnDemand_8.webm - 4.41 MB
FileSEC503- SANS OnDemand_9.webm - 4.12 MB
FileSEC503- SANS OnDemand_33.webm - 4.08 MB
FileSEC503- SANS OnDemand_24.webm - 4 MB
FileSEC503- SANS OnDemand_5.webm - 3.9 MB
FileSEC503- SANS OnDemand_69.webm - 3.64 MB
FileSEC503- SANS OnDemand_42.webm - 3.39 MB
FileSEC503- SANS OnDemand_75.webm - 3.16 MB
FileSEC503- SANS OnDemand_34.webm - 3.11 MB
FileSEC503- SANS OnDemand_29.webm - 3.04 MB
FileSEC503- SANS OnDemand_28.webm - 2.86 MB
FileSEC503- SANS OnDemand_19.webm - 2.85 MB
FileSEC503- SANS OnDemand_7.webm - 2.85 MB
FileSEC503- SANS OnDemand_77.webm - 2.58 MB
FileSEC503- SANS OnDemand_22.webm - 2.47 MB
FileSEC503- SANS OnDemand_1.webm - 2.43 MB
FileSEC503- SANS OnDemand_12.webm - 2.42 MB
FileSEC503- SANS OnDemand_39.webm - 2.34 MB
FileSEC503- SANS OnDemand_78.webm - 2.31 MB
FileSEC503- SANS OnDemand_71.webm - 2.1 MB
FileSEC503- SANS OnDemand_74.webm - 2.08 MB
FileSEC503- SANS OnDemand_57.webm - 1.73 MB
FileSEC503- SANS OnDemand_15.webm - 1.67 MB
FileSEC503- SANS OnDemand_17.webm - 1.65 MB
FileSEC503- SANS OnDemand_36.webm - 1.51 MB
FileSEC503- SANS OnDemand_73.webm - 1.38 MB
FileSEC503- SANS OnDemand_59.webm - 1.37 MB
FileSEC503- SANS OnDemand_27.webm - 1.36 MB
FileSEC503- SANS OnDemand_52.webm - 1.33 MB
FileSEC503- SANS OnDemand_16.webm - 1.15 MB
FileSEC503- SANS OnDemand_37.webm - 1.04 MB
FileSEC503- SANS OnDemand_41.webm - 997 kB
FileSEC503- SANS OnDemand_32.webm - 900 kB
FileSEC503- SANS OnDemand_58.webm - 897 kB
FileSEC503- SANS OnDemand_54.webm - 852 kB
FileSEC503- SANS OnDemand_49.webm - 799 kB
FileSEC503- SANS OnDemand_6.webm - 721 kB
FileSEC503- SANS OnDemand_53.webm - 687 kB
FileSEC503- SANS OnDemand_35.webm - 560 kB
FileSEC503- SANS OnDemand_45.webm - 522 kB
FileSEC503- SANS OnDemand_60.webm - 462 kB
FileSEC503- SANS OnDemand_51.webm - 445 kB
FileSEC503- SANS OnDemand_46.webm - 419 kB
FileSEC503- SANS OnDemand_72.webm - 387 kB
FileSEC503- SANS OnDemand_43.webm - 353 kB
FileSEC503- SANS OnDemand_21.webm - 297 kB
FileSEC503- SANS OnDemand_55.webm - 296 kB
FileSEC503- SANS OnDemand_20.webm - 295 kB
FileSEC503- SANS OnDemand_47.webm - 264 kB
FileSEC503- SANS OnDemand_56.webm - 238 kB
FileSEC503- SANS OnDemand_14.webm - 232 kB
FileSEC503- SANS OnDemand_48.webm - 213 kB
FileSEC503- SANS OnDemand_44.webm - 193 kB
FileSEC503- SANS OnDemand_79.webm - 125 kB
FileSEC503- SANS OnDemand_66.webm - 84.6 kB
FileSEC503- SANS OnDemand_63.webm - 79.5 kB
FileSEC503- SANS OnDemand_62.webm - 73.2 kB
FileSEC503- SANS OnDemand_70.webm - 71.9 kB
FileSEC503- SANS OnDemand_64.webm - 69.7 kB
FileSEC503- SANS OnDemand_67.webm - 68 kB
FileSEC503- SANS OnDemand_13.webm - 63.4 kB
FileSEC503- SANS OnDemand_65.webm - 59 kB
Folder6. IDS Capstone Challenge
Folder1. IDS Capstone Challenge
File14. WrapUp.mp4 - 366 MB
File1. IDS Capstone Challenge.mp4 - 122 MB
File12. Declaring a Winner.mp4 - 141 kB
File7. Game Design.mp4 - 114 kB
File6. Along the Way.mp4 - 107 kB
File4. Teams.mp4 - 102 kB
File5. Rules.mp4 - 102 kB
File8. Game Design Earning Points.mp4 - 101 kB
File11. Go.mp4 - 101 kB
File9. Game Design Losing Points.mp4 - 97.8 kB
File10. Location of Files.mp4 - 86.5 kB
File2. Gamification.mp4 - 74.5 kB
File13. Any Questions.mp4 - 71.7 kB
File3. The Challenge.mp4 - 70.3 kB
File15. COURSE RESOURCES AND CONTACT INFORMATION.mp4 - 66.7 kB
Folder1. Fundamentals of Traffic Analysis Part I
Folder3. Concepts of TCPIP
File30. Concepts of TCPIP Exercises.mp4 - 294 MB
File20. Your Turn.mp4 - 53.7 MB
File12. Making Sense of Bits and Bytes 2.mp4 - 16.2 MB
File11. Making Sense of Bits and Bytes 1.mp4 - 13.6 MB
File16. A Very Special Relationship.mp4 - 11.6 MB
File22. tcpdump Hexadecimal Output.mp4 - 11 MB
File2. TCPIP Model.mp4 - 10.9 MB
File10. Bits Nibbles Bytes and Hex Oh My.mp4 - 10.5 MB
File23. Find the IP Identification Field and Value in IPv4 Header.mp4 - 10 MB
File3. One Layers Header Is Another Layers Data Sending Traffic.mp4 - 8.82 MB
File26. What Is Normal.mp4 - 6.65 MB
File27. RFC Implementation Issues.mp4 - 6.02 MB
File18. Conversion of Hex Packet Data to Decimal.mp4 - 5.3 MB
File13. Making Sense of Bits and Bytes 3.mp4 - 5.19 MB
File28. RFC 2119 RFC Imperative Meanings.mp4 - 4.41 MB
File7. What Follows.mp4 - 4.06 MB
File17. From Binary to Hex.mp4 - 3.58 MB
File5. One Layers Header Is Another Layers Data Receiving Traffic.mp4 - 3.16 MB
File14. Hexadecimal Base 16 Representation.mp4 - 2.48 MB
File29. Concepts of TCPIP Review.mp4 - 2.45 MB
File15. DecimalBinaryHex Representations.mp4 - 2.25 MB
File4. Wireshark Display of Detailed Encapsulated Layer.mp4 - 2.15 MB
File8. Where Does It EndStart.mp4 - 1.38 MB
File24. Answer 2.mp4 - 1.01 MB
File21. Answer 1.mp4 - 958 kB
File9. Course Roadmap 2.mp4 - 923 kB
File19. Figuring Out Decimal Values for Hex Output.mp4 - 897 kB
File6. What Knowledge Is Required to DeEncapsulate Data.mp4 - 685 kB
File25. Course Roadmap 3.mp4 - 567 kB
File1. Course Roadmap 1.mp4 - 263 kB
Folder7. Day 1 Bootcamp
File22. Evening 1 Bootcamp Exercises.mp4 - 264 MB
File1. Course Roadmap 1.mp4 - 155 MB
File3. Command Pipelines.mp4 - 47.2 MB
File6. Cut 2.mp4 - 40.5 MB
File4. Less Is More.mp4 - 40.4 MB
File5. Cut 1.mp4 - 17.2 MB
File16. Metacharacters.mp4 - 10.6 MB
File2. Why the Command Line.mp4 - 10.1 MB
File19. Regex Examples 3.mp4 - 8.72 MB
File15. Regular Expressions Aside.mp4 - 7.29 MB
File21. Regex Examples 5.mp4 - 7.18 MB
File17. Regex Examples 1.mp4 - 5.06 MB
File20. Regex Examples 4.mp4 - 4.66 MB
File8. Awk.mp4 - 4.65 MB
File18. Regex Examples 2.mp4 - 4.23 MB
File11. Counting Things.mp4 - 4.14 MB
File12. GrepEgrep.mp4 - 2.03 MB
File13. Sed.mp4 - 1.39 MB
File10. Example.mp4 - 1.36 MB
File14. Course Roadmap 2.mp4 - 889 kB
File9. Sort and Uniq.mp4 - 227 kB
File7. Stacking Cuts.mp4 - 97.5 kB
File23. COURSE RESOURCES AND CONTACT INFORMATION.mp4 - 64 kB
Folder1. Introduction to Fundamentals of Traffic Analysis Part I
File1. Fundamentals of Traffic Analysis Part I.mp4 - 206 MB
File5. Our Roadmap for the Week.mp4 - 59.2 MB
File4. Course Resources and Materials.mp4 - 7.89 MB
File7. A Word on Bootcamps.mp4 - 6.39 MB
File6. Trust the Process.mp4 - 1.97 MB
File3. Table of Contents 2.mp4 - 133 kB
File2. Table of Contents 1.mp4 - 131 kB
Folder5. The Network AccessLink Layer
File20. The Network AccessLink Layer Review.mp4 - 123 MB
File3. Ethernet Specifications.mp4 - 40.6 MB
File4. Ethernet Standard Frame Length.mp4 - 19.4 MB
File17. Gratuitous ARP.mp4 - 17.8 MB
File18. Gratuitous ARP Gone Wrong.mp4 - 16 MB
File6. VLAN Header.mp4 - 11.4 MB
File5. Standard Ethernet Link Layer Header.mp4 - 10.8 MB
File14. MITM with ARP Part I 1.mp4 - 6.97 MB
File16. ARP Spoof.mp4 - 6.58 MB
File2. IEEE 802x Link Layer.mp4 - 6.49 MB
File11. ARP Request.mp4 - 3.69 MB
File8. Link Layer MAC Addresses.mp4 - 3.3 MB
File1. Course Roadmap 1.mp4 - 3.15 MB
File9. ARP 1.mp4 - 2.88 MB
File10. ARP 2.mp4 - 2.05 MB
File19. How Do You Protect Against ARP Spoof Attacks.mp4 - 1.94 MB
File7. Course Roadmap 2.mp4 - 1.82 MB
File15. MITM with ARP Part I 2.mp4 - 1.5 MB
File12. ARP Reply.mp4 - 1.39 MB
File13. ARP SpoofingCache Poisoning.mp4 - 359 kB
File21. Network AccessLink Layer Exercises.mp4 - 185 kB
Folder6. The IP Layer
File84. Review of Fundamentals of Traffic Analysis Part I.mp4 - 64.9 MB
File70. Neighbor Solicitation.mp4 - 31.8 MB
File18. IPv4 IP Addresses Source and Destination.mp4 - 27.3 MB
File4. IP Version.mp4 - 27.2 MB
File50. Accidental Fragmentation.mp4 - 22.5 MB
File37. Overlapping Fragments 1.mp4 - 21.1 MB
File28. Why a Multiple of 8.mp4 - 18.4 MB
File58. IPv6 Addresses Components.mp4 - 15.3 MB
File15. Checksums.mp4 - 14.1 MB
File24. Three IPv4 Header Fields Used for All Fragments.mp4 - 13.9 MB
File5. IP Header Length.mp4 - 12.7 MB
File32. Fragmentation Total Length First Fragment.mp4 - 12.4 MB
File3. IP Header.mp4 - 11.3 MB
File23. Fragmentation Theory.mp4 - 10.9 MB
File10. IP Identification Number.mp4 - 10.9 MB
File7. Type of Service.mp4 - 10.1 MB
File61. Other Address Types.mp4 - 8.86 MB
File59. IPv6 Unicast Addresses.mp4 - 8.1 MB
File81. IPv6 Fragmentation.mp4 - 8.05 MB
File83. IPv6 Review.mp4 - 7.7 MB
File48. Wireshark Display of Fragmentation.mp4 - 7.25 MB
File8. Differentiated Services Byte Formerly ToS.mp4 - 6.31 MB
File68. SolicitedNode Multicast.mp4 - 6.26 MB
File16. IP Checksum.mp4 - 5.63 MB
File62. IPv6 Length Field in Header.mp4 - 5.3 MB
File66. ARP Goes Away Neighbor Discovery Protocol.mp4 - 5.01 MB
File79. Chained Extension Headers.mp4 - 4.84 MB
File63. IPv6 Checksums.mp4 - 4.83 MB
File47. tcpdump Fragmentation Output.mp4 - 4.81 MB
File71. Neighbor Advertisement.mp4 - 4.77 MB
File27. Fragment Offset.mp4 - 4.67 MB
File14. IPv4 Protocol Number.mp4 - 4.63 MB
File39. Fragmentation Walkthrough.mp4 - 4.6 MB
File13. Wireshark Display of Time Exceeded in Transit.mp4 - 4.55 MB
File30. First Last or Middle 1.mp4 - 4.33 MB
File75. Privacy Extensions for Stateless Autoconfiguration Addresses.mp4 - 4.21 MB
File82. IPv6 and You.mp4 - 4.03 MB
File40. The Breakdown.mp4 - 3.98 MB
File76. DHCPv4 versus DHCPv6.mp4 - 3.78 MB
File80. IPv6 Fragmentation Theory.mp4 - 3.62 MB
File60. IPv6 IP Numbers.mp4 - 3.57 MB
File6. IP Header Length When IP Options Present.mp4 - 3.48 MB
File65. IPv6 and Common Protocols 2.mp4 - 3.47 MB
File35. What Is the IP Packet Length and Fragment Offset 1 .mp4 - 3.36 MB
File12. Time to Live.mp4 - 3.14 MB
File69. Interesting IP6 Multicast Addresses.mp4 - 2.99 MB
File34. Fragmentation Offset Position Where Does This Piece Go.mp4 - 2.77 MB
File55. Why IPv6.mp4 - 2.75 MB
File2. Internet IP.mp4 - 2.73 MB
File74. Neighbor Discovery Attacks.mp4 - 2.62 MB
File22. Does Fragmentation Still Matter.mp4 - 2.61 MB
File64. IPv6 and Common Protocols 1.mp4 - 2.27 MB
File26. More Fragments Flag.mp4 - 2.24 MB
File33. Fragmentation Total Length Last Fragment.mp4 - 2.23 MB
File57. IPv4 Versus IPv6.mp4 - 2.2 MB
File9. IP Packet Length.mp4 - 2.2 MB
File44. Composition of the Second Fragment.mp4 - 2.2 MB
File56. IPv6 Header.mp4 - 2.11 MB
File67. Router Assignment Discouraged Neighbor Discovery Protocol.mp4 - 2.03 MB
File41. The First Fragment.mp4 - 1.83 MB
File77. Dissecting an IPv6 Packet ICMPv6.mp4 - 1.67 MB
File38. Overlapping Fragments 2.mp4 - 1.58 MB
File78. Extension Headers.mp4 - 1.49 MB
File25. The Dont Fragment DF Flag.mp4 - 1.4 MB
File29. Dissecting Fragmentation Fields Bytes 67 of IP Header.mp4 - 1.36 MB
File72. Router Solicitation.mp4 - 1.23 MB
File43. The Second Fragment.mp4 - 1.11 MB
File17. How Is IP Checksum Used.mp4 - 986 kB
File42. Composition of the First Fragment.mp4 - 825 kB
File73. Router Advertisement.mp4 - 806 kB
File45. The Third Fragment.mp4 - 796 kB
File46. Composition of the Final Fragment.mp4 - 615 kB
File21. Course Roadmap 2.mp4 - 531 kB
File1. Course Roadmap 1.mp4 - 526 kB
File11. Fragmentation Stuff.mp4 - 524 kB
File36. What Is the IP Packet Length and Fragment Offset 2.mp4 - 508 kB
File31. First Last or Middle 2.mp4 - 256 kB
File19. IP Options.mp4 - 251 kB
File54. Course Roadmap 3.mp4 - 237 kB
File51. Fragmentation Review.mp4 - 122 kB
File20. IPv4 Exercises.mp4 - 111 kB
File49. Miscellaneous Questions about Fragments.mp4 - 99.5 kB
File52. IPv4 Review.mp4 - 88.9 kB
File53. Fragmentation Exercises.mp4 - 36.8 kB
Folder4. Introduction to Wireshark
File10. Statistics Capture Properties and Protocol Hierarchy.mp4 - 24 MB
File11. Statistics Conversations.mp4 - 10.5 MB
File8. Pcap File for Analysis.mp4 - 7.61 MB
File16. Find Packet.mp4 - 6.32 MB
File6. Packet Display Menu.mp4 - 4.3 MB
File3. Wireshark Plus tcpdump.mp4 - 4.06 MB
File12. Analyze a TCP Session.mp4 - 4.06 MB
File2. Very Powerful Tool.mp4 - 3.74 MB
File17. Found the Packet Follow the Session.mp4 - 2.64 MB
File14. Make All Packets Available Again.mp4 - 2.64 MB
File13. TCP Session.mp4 - 2.25 MB
File5. Wireshark.mp4 - 1.46 MB
File18. Session Reconstruction.mp4 - 1.3 MB
File9. Statistics.mp4 - 1.15 MB
File15. Find a Packet.mp4 - 494 kB
File1. Course Roadmap 1.mp4 - 285 kB
File19. Introduction to Wireshark Review.mp4 - 90 kB
File7. Course Roadmap 3.mp4 - 82.3 kB
File4. Course Roadmap 2.mp4 - 81.5 kB
File20. Introduction to Wireshark Exercises.mp4 - 57.2 kB
Folder2. Why Packets
File12. ICMP Tunnel Payload.mp4 - 17.8 MB
File7. Look Again.mp4 - 14.9 MB
File6. A Closer Look.mp4 - 11.1 MB
File11. ICMP Tunnel Why Is This More Dangerous Than ICMP Ping Sweep.mp4 - 8.67 MB
File13. From Packets to Timeline.mp4 - 7.69 MB
File8. Is This Nmap.mp4 - 7.13 MB
File14. Why Packets Why Yes Indeed Packets.mp4 - 6.43 MB
File4. Assess What Happened and Adversary Skill.mp4 - 6.09 MB
File3. The Knowledgeable Traffic Analyst.mp4 - 5.23 MB
File5. ICMP Ping Sweep.mp4 - 4.3 MB
File9. Quick Aside Profiling the Sender.mp4 - 2.68 MB
File2. Course Goal.mp4 - 1.79 MB
File10. SYN Scan Is This More Dangerous Than ICMP Ping Sweep.mp4 - 1.46 MB
File1. Course Roadmap 1.mp4 - 232 kB
Folder4. Anomalies and Behaviors
Folder1. Architecture
File1. Anomalies and Behaviors.mp4 - 202 MB
File24. Show Me the Packets.mp4 - 12.3 MB
File10. Special Purpose Versus Generic Sensor.mp4 - 10.7 MB
File26. HighEnd Tap Required.mp4 - 9.37 MB
File22. IDS Load Balancer.mp4 - 6.96 MB
File12. Instrumenting Your Network for Traffic Collection and Monitoring.mp4 - 6.36 MB
File7. Intrusion Prevention System.mp4 - 5.42 MB
File21. Aggregating Tap.mp4 - 4.83 MB
File16. Channel Bonding Small Office Home Solution.mp4 - 4.11 MB
File17. Need to Collect Traffic at a Given Choke Point 4.mp4 - 3.72 MB
File15. Need to Collect Traffic at a Given Choke Point 3.mp4 - 3.46 MB
File5. Deployment Passive Versus Inline Sensor.mp4 - 3.24 MB
File8. IPS Sensor Configuration.mp4 - 3.19 MB
File18. Switches.mp4 - 2.47 MB
File6. IDS Sensor Configuration.mp4 - 2.46 MB
File25. Commercial Packet Capture.mp4 - 2.25 MB
File13. Need to Collect Traffic at a Given Choke Point 1.mp4 - 1.83 MB
File14. Need to Collect Traffic at a Given Choke Point 2.mp4 - 1.77 MB
File20. What Differentiates Taps 2.mp4 - 1.08 MB
File19. What Differentiates Taps 1.mp4 - 952 kB
File9. Sample IPS Configuration.mp4 - 782 kB
File4. Course Roadmap 1.mp4 - 685 kB
File2. Table of Contents 1.mp4 - 133 kB
File3. Table of Contents 2.mp4 - 118 kB
File23. Course Roadmap 3.mp4 - 61 kB
File11. Course Roadmap 2.mp4 - 60.5 kB
Folder2. TLS
File20. Revisit the Issue of RFC Interpretation Using Heartbeat.mp4 - 14.9 MB
File16. Can We Profile Traffic.mp4 - 12.4 MB
File13. Terminating Proxy.mp4 - 12 MB
File9. STARTTLS Downgrade Attack.mp4 - 9.8 MB
File19. Heartbeat Message Processing.mp4 - 9.3 MB
File4. TLS 13 1.mp4 - 8.25 MB
File14. Decryption Solutions.mp4 - 6.98 MB
File15. TLS 13 2.mp4 - 4.2 MB
File3. Understanding TLS.mp4 - 1.91 MB
File12. Encrypted Data.mp4 - 1.9 MB
File8. STARTTLS SMTP Session.mp4 - 1.29 MB
File2. Transport Layer Security TLS Protocol.mp4 - 1.23 MB
File18. Heartbleed Heartbeat OpenSSL Vulnerability.mp4 - 1.04 MB
File7. STARTTLS with SMTP.mp4 - 952 kB
File6. STARTTLS.mp4 - 704 kB
File10. STARTTLS Not Just for SMTP STARTTLS LDAP Session.mp4 - 530 kB
File17. Course Roadmap 3.mp4 - 61.5 kB
File1. Course Roadmap 1.mp4 - 61.4 kB
File11. Course Roadmap 2.mp4 - 61.2 kB
File21. TLS Decryption.mp4 - 61.1 kB
Folder3. Zeek
File25. Would This Be Harder in Wireshark.mp4 - 13.1 MB
File18. Signature for Windows Command Line Using Regular Expression.mp4 - 7.92 MB
File30. Inform about a New Connection.mp4 - 6.18 MB
File5. Clustering for Collection.mp4 - 3.17 MB
File1. Course Roadmap 1.mp4 - 2.34 MB
File77. Large Data Flows.mp4 - 2.07 MB
File16. Zeek Signatures.mp4 - 1.04 MB
File37. This Looks Hard.mp4 - 993 kB
File32. Lets Examine the Script.mp4 - 819 kB
File58. How Does This Help.mp4 - 805 kB
File54. Threat Analysis Phishing 4.mp4 - 719 kB
File49. Threat Modeling Bob Our Fearless Analyst.mp4 - 711 kB
File53. Threat Analysis Phishing 3.mp4 - 611 kB
File8. Zeek Process Flow.mp4 - 585 kB
File60. Course Roadmap 4.mp4 - 502 kB
File45. Threat Modeling Sam the Salesperson.mp4 - 457 kB
File51. Threat Analysis Phishing 1.mp4 - 404 kB
File35. State Data Structure.mp4 - 397 kB
File46. Threat Modeling Wally a Coopted Web Server.mp4 - 379 kB
File43. Threat Modeling Mary the Mail Server.mp4 - 327 kB
File72. Simple Behaviors.mp4 - 324 kB
File20. Zeek and Zeek Signatures Exercise.mp4 - 324 kB
File21. Course Roadmap 3.mp4 - 304 kB
File55. Threat Analysis Phishing 5.mp4 - 247 kB
File47. Threat Modeling Doug a DNS Server.mp4 - 228 kB
File14. Course Roadmap 2.mp4 - 225 kB
File56. Threat Analysis Phishing 6.mp4 - 185 kB
File48. Threat Modeling Dan Our DNS Server.mp4 - 168 kB
File44. Threat Modeling Evil Eddy Gone Phishin.mp4 - 156 kB
File79. This Next Lab.mp4 - 114 kB
File70. Course Roadmap 5.mp4 - 73.3 kB
File66. Scripting Correlation Find Outbound Connections.mp4 - 72.6 kB
File13. Zeek and Zeek Output Exercises.mp4 - 69 kB
File63. Scripting Correlation Find URLs in Emails.mp4 - 68.9 kB
File62. Scripting Correlation Selecting a Zeek Event.mp4 - 61.9 kB
File67. Results.mp4 - 61.8 kB
File64. Scripting Correlation Global Variables.mp4 - 57 kB
File65. Scripting Correlation Find DNS Resolutions for URLs.mp4 - 47 kB
Folder4. Day 4 Bootcamp
File2. Applying Zeek and Your Scripts.mp4 - 111 kB
File3. Evening 4 Bootcamp Exercises.mp4 - 68 kB
File4. COURSE RESOURCES AND CONTACT INFORMATION.mp4 - 66.7 kB
File1. Course Roadmap 1.mp4 - 50.5 kB
Folder2. Fundamentals of Traffic Analysis Part II
Folder5. ICMP
File20. Review Fundamentals of Traffic Analysis Part II.mp4 - 101 MB
File14. Using ICMP Responses to Discover Routers.mp4 - 12.7 MB
File3. Conditions When ICMP Should Not Be Sent.mp4 - 11.1 MB
File7. Sample IPv4 ICMP Message.mp4 - 9.05 MB
File9. Sample IPv4 ICMP Error Message.mp4 - 8.02 MB
File10. Windows tracert.mp4 - 5.32 MB
File16. ICMP Redirect.mp4 - 3.53 MB
File4. Message TypeCode.mp4 - 3.52 MB
File13. Using ICMP Responses to Map Live Hosts.mp4 - 2.59 MB
File17. Fragmentation Needed and Dont Fragment Set.mp4 - 1.69 MB
File18. ICMPv6.mp4 - 1.33 MB
File5. ICMP IDSequence Numbers.mp4 - 1.15 MB
File8. ICMP Echo RequestReply aka Ping.mp4 - 1.12 MB
File2. ICMP.mp4 - 1.1 MB
File6. Checksums.mp4 - 925 kB
File12. Mapping Live Hosts.mp4 - 769 kB
File11. Course Roadmap 2.mp4 - 570 kB
File15. Course Roadmap 3.mp4 - 76 kB
File1. Course Roadmap 1.mp4 - 75.8 kB
File19. UDPICMP Exercises.mp4 - 57.4 kB
Folder1. Wireshark Display Filters
File1. Fundamentals of Traffic Analysis Part II.mp4 - 65.6 MB
File11. Not Operator.mp4 - 19.3 MB
File8. Contains Operator.mp4 - 15.1 MB
File28. Extract Relevant Packets Export Marked Packets.mp4 - 8.49 MB
File19. AutoComplete Function.mp4 - 6.63 MB
File25. Extracting Evidence.mp4 - 6.09 MB
File6. Display Filter Format.mp4 - 5.17 MB
File20. Apply as Filter by Packet Pane Record Column.mp4 - 4.83 MB
File17. Expression Menu.mp4 - 4.04 MB
File24. Retrieve Previous Filters.mp4 - 3.81 MB
File9. Matches Operator.mp4 - 3.74 MB
File10. Whats the Difference Between Contains and Find Packet.mp4 - 3.58 MB
File7. Comparison Operators.mp4 - 3.56 MB
File22. Apply as Filter on Statistics Output.mp4 - 3.44 MB
File26. Extract Relevant Packets Phishing Email.mp4 - 3.33 MB
File23. Prepare as Filter.mp4 - 3.33 MB
File18. Filter Expression Menu.mp4 - 3.22 MB
File14. Sample Canned Display Filters.mp4 - 2.7 MB
File21. Apply as Filter by Field and Value.mp4 - 2.03 MB
File15. Alternative Canned Filters.mp4 - 1.92 MB
File5. Capability to Select Traffic to Display.mp4 - 1.77 MB
File13. Selecting One of Wiresharks Canned Filters.mp4 - 1.36 MB
File27. Extract Relevant Packets The DNS Query.mp4 - 1.34 MB
File16. Supply Your Own Filter.mp4 - 1.1 MB
File30. Wireshark Display Filters Exercises.mp4 - 567 kB
File4. Course Roadmap 1.mp4 - 218 kB
File2. Table of Contents 1.mp4 - 125 kB
File3. Table of Contents 2.mp4 - 112 kB
File29. WrapUp of Wireshark Display Filters.mp4 - 88.6 kB
File12. Course Roadmap 2.mp4 - 70.5 kB
Folder6. Day 2 Bootcamp
File4. Looking at ICMP.mp4 - 55.3 MB
File6. TCP Services.mp4 - 30.4 MB
File2. Leveraging Our Knowledge.mp4 - 8.67 MB
File8. ECN and BPF.mp4 - 4.65 MB
File7. BPF and TCP Connections.mp4 - 2.78 MB
File9. Evening 2 Bootcamp Exercises.mp4 - 1.39 MB
File1. Course Roadmap 1.mp4 - 813 kB
File5. What About Services.mp4 - 602 kB
File3. Last Question First ICMP Activity and ProbingScanning.mp4 - 116 kB
File10. COURSE RESOURCES AND CONTACT INFORMATION.mp4 - 67 kB
Folder4. UDP
File9. Traceroute Part 1.mp4 - 46 MB
File3. Many Transactional Protocols are UDP.mp4 - 13.5 MB
File2. UDP.mp4 - 2.99 MB
File13. Host Not Listening Port 53.mp4 - 2.62 MB
File12. UDP Stimulus Response.mp4 - 2.18 MB
File5. UDP Length.mp4 - 2.11 MB
File10. Traceroute Part 2.mp4 - 1.74 MB
File8. Traceroute Output.mp4 - 1.5 MB
File4. Sample UDP Packet.mp4 - 1.09 MB
File6. Checksum.mp4 - 899 kB
File7. Traceroute.mp4 - 822 kB
File1. Course Roadmap 1.mp4 - 784 kB
File11. Course Roadmap 2.mp4 - 69.7 kB
Folder3. TCP
File7. TCP Ports.mp4 - 45.8 MB
File64. Backscatter See Response after Your IP Was Spoofed.mp4 - 27.6 MB
File24. ECN Flags.mp4 - 26.5 MB
File48. Modernized LaBrea in Action.mp4 - 26.3 MB
File21. Weird Lengths TCP Segmentation Offload TSO.mp4 - 20.2 MB
File29. Pcap of FourWay Handshake Session.mp4 - 13.7 MB
File9. Destination Port Mutation.mp4 - 13.1 MB
File46. Window Size and Throughput.mp4 - 13 MB
File10. More about TCP Sequence Numbers.mp4 - 12.7 MB
File55. Multipath TCP One Session Multiple Paths.mp4 - 12.2 MB
File63. Duplicate Acknowledgements.mp4 - 11.9 MB
File53. TCP Timestamp Option.mp4 - 11.2 MB
File14. TCP Header Length Field.mp4 - 10.8 MB
File19. Your Turn.mp4 - 10 MB
File15. TCP Header Length.mp4 - 9.53 MB
File4. Thinking About TCP.mp4 - 8.86 MB
File22. TCP Flags.mp4 - 8.17 MB
File42. TCP Retries 1.mp4 - 7.97 MB
File13. Relative SequenceAcknowledgement Numbers.mp4 - 7.67 MB
File30. TCP Fast Open.mp4 - 7.14 MB
File3. What Is Reliability.mp4 - 7.14 MB
File51. PseudoHeader Protection.mp4 - 6.96 MB
File34. Start New SYN Session with Returned Cookie.mp4 - 6.39 MB
File31. TCP Fast Open Two Successive Sessions.mp4 - 5.6 MB
File45. Dynamic Window Size.mp4 - 5.57 MB
File18. TCP Header and Data How Many Bytes of Data.mp4 - 5.42 MB
File52. TCP Options.mp4 - 5.37 MB
File27. ThreeWay Handshake Keys to the Connection.mp4 - 5.03 MB
File39. TCP Flags and Payload Allowed.mp4 - 4.41 MB
File12. 3whs TCP SequenceAcknowledgment numbers.mp4 - 4.41 MB
File38. Sample Urgent Data.mp4 - 4.24 MB
File44. TCP Window Size.mp4 - 3.96 MB
File36. Aborted Session.mp4 - 3.8 MB
File37. Urgent FlagData.mp4 - 3.67 MB
File54. Fingerprinting with TCP Options.mp4 - 3.21 MB
File35. Gracefully Terminating a TCP Connection.mp4 - 3.17 MB
File8. Source Port Mutation.mp4 - 2.98 MB
File28. TCP Simultaneous Open 4whs.mp4 - 2.74 MB
File23. Explicit Congestion Notification ECN.mp4 - 2.5 MB
File2. TCP.mp4 - 2.43 MB
File16. TCP Header Length with TCP Options.mp4 - 2.29 MB
File6. The TCP Header.mp4 - 2.02 MB
File41. TCP Connection Retransmissions.mp4 - 1.72 MB
File49. TCP Checksum.mp4 - 1.66 MB
File50. Destination Host TCP Checksum Processing.mp4 - 1.64 MB
File59. Host Not Listening on Port 80.mp4 - 1.59 MB
File32. SYN Fast Open Cookie Request.mp4 - 1.49 MB
File61. Port 80 Blocked RouterFirewall Silenced.mp4 - 1.49 MB
File47. Manipulation of TCP Window Size LaBrea.mp4 - 1.19 MB
File33. SYNACK Fast Open Cookie Returned.mp4 - 949 kB
File25. The ThreeWay Handshake.mp4 - 928 kB
File57. TCP Stimulus Response.mp4 - 904 kB
File60. Destination Host Doesnt Exist.mp4 - 897 kB
File40. TCP Flag Combinations.mp4 - 769 kB
File62. TCP Delivery Failures.mp4 - 573 kB
File1. Course Roadmap 1.mp4 - 568 kB
File58. Listening HTTP Server.mp4 - 488 kB
File11. More about TCP Acknowledgement Numbers.mp4 - 335 kB
File65. Who Is the Victim.mp4 - 311 kB
File43. TCP Retries 2.mp4 - 305 kB
File66. TCP Reassembly by IDSIPS.mp4 - 297 kB
File67. TCP Stream Reassembly AmbiguitiesIssues.mp4 - 256 kB
File69. TCP Exercises.mp4 - 212 kB
File26. ThreeWay Handshake tcpdump Output.mp4 - 193 kB
File17. Packet Dissection Revisited.mp4 - 157 kB
File20. Answer.mp4 - 94.9 kB
File68. WrapUp of TCP.mp4 - 87.8 kB
File5. Course Roadmap 2.mp4 - 70.9 kB
File56. Course Roadmap 3.mp4 - 70.4 kB
Folder2. Writing tcpdump Filters
File3. Specifying Fields.mp4 - 9.56 MB
File21. A Couple More Practice Cases.mp4 - 8.27 MB
File20. Find SYN FIN Least Exclusive.mp4 - 6.45 MB
File2. Why Use Berkeley Filters.mp4 - 5.04 MB
File5. BPF BitByte Refresher.mp4 - 5.03 MB
File24. A Potpourri of Options Find TCP Header Length Greater Than 5.mp4 - 4.88 MB
File7. The Solution Nullify the IP Version Value.mp4 - 3.82 MB
File15. Is a Mask Byte Always Needed.mp4 - 3.8 MB
File28. One Final Mask Test.mp4 - 3.38 MB
File19. Find SYN FIN Less Exclusive.mp4 - 3.23 MB
File8. More Fundamentals.mp4 - 3.19 MB
File6. The Problem Looking at Fields Less Than a Byte Long.mp4 - 2.8 MB
File13. Finishing the Filter.mp4 - 2.42 MB
File18. Find SYN FIN Most Exclusive.mp4 - 2.38 MB
File29. IPv6 BPF Use.mp4 - 1.96 MB
File17. Three Categories of Filters.mp4 - 1.92 MB
File11. The Mask Byte.mp4 - 1.87 MB
File4. The tcpdump Filter Format Examples.mp4 - 1.86 MB
File23. Extract TCP Header Length.mp4 - 1.69 MB
File14. Bit Masking TCP Flag Byte.mp4 - 1.62 MB
File27. Right Shift LowOrder Nibble into Bit Oblivion.mp4 - 1.61 MB
File10. Solution AND Wanted Bits with 1s.mp4 - 1.21 MB
File12. Begin Putting It All Together.mp4 - 1.19 MB
File25. Option 1 Mask and Alter Comparison Value.mp4 - 980 kB
File9. Solution AND Unwanted Bits with 0s.mp4 - 918 kB
File16. Course Roadmap 2.mp4 - 495 kB
File30. WrapUp of Writing tcpdump Filters.mp4 - 89.2 kB
File22. Course Roadmap 3.mp4 - 76.2 kB
File1. Course Roadmap 1.mp4 - 75.6 kB
File31. Writing tcpdump Filters Exercises.mp4 - 64.3 kB
Folder3. Signature Based Detection
Folder2. Wireshark Part III
File3. The Scenario.mp4 - 1.02 MB
File11. Why Did Our Host Look Up wickedsecuritycom.mp4 - 735 kB
File15. Wireshark Part III Exercises.mp4 - 179 kB
File14. Wireshark III Summary.mp4 - 99.4 kB
File1. Course Roadmap 1.mp4 - 73.4 kB
Folder3. Application Protocols with Snort and Suricata
File50. Protocol Decode.mp4 - 963 kB
File32. More Efficient Search from Payload Beginning Offset and Depth.mp4 - 945 kB
File38. Course Roadmap 4.mp4 - 646 kB
File83. Course Roadmap 7.mp4 - 543 kB
File64. Course Roadmap 6.mp4 - 429 kB
File88. Caching Been There Done That.mp4 - 336 kB
File13. What Are Rules.mp4 - 298 kB
File6. What We Will Not Cover.mp4 - 293 kB
File110. DNS Review.mp4 - 278 kB
File63. HTTP and HTTP Rule Options.mp4 - 269 kB
File15. Course Roadmap 2.mp4 - 257 kB
File101. IPv6 DNS.mp4 - 228 kB
File82. SMB SMB Rules.mp4 - 209 kB
File1. Course Roadmap 1.mp4 - 196 kB
File47. Stream5 and Thresholds.mp4 - 176 kB
File51. HTTPS.mp4 - 161 kB
File21. Rule Options.mp4 - 106 kB
File81. Microsoft Protocols Review.mp4 - 106 kB
File46. Writing Good Rules.mp4 - 91.2 kB
File26. Course Roadmap 3.mp4 - 86 kB
File22. Rule Options Syntax.mp4 - 80.9 kB
File14. Running Snort and Snort Output Exercises.mp4 - 72.3 kB
File37. Writing Better Content Rules.mp4 - 63.3 kB
File111. DNS Byte Test.mp4 - 56.9 kB
Folder5. Day 3 Bootcamp
File1. Evening 3 Bootcamp.mp4 - 811 kB
File3. SnortFirePOWERSuricata Logs.mp4 - 648 kB
File11. Researching a Protocol.mp4 - 339 kB
File12. Evening 3 Bootcamp Exercises.mp4 - 219 kB
File9. Using BPF to Identify ProtocolsServicesPorts.mp4 - 120 kB
File7. Identifying Connections.mp4 - 113 kB
File8. How to Identify Protocols in Use.mp4 - 90.9 kB
File13. COURSE RESOURCES AND CONTACT INFORMATION.mp4 - 67.1 kB
File6. Course Roadmap 1.mp4 - 54.6 kB
File2. Day 3 Bootcamp.mp4 - 54.5 kB
Folder4. IDSIPS Evasion
File22. Defense Against IDSIPS Attacks Evasion and Insertion Attacks.mp4 - 777 kB
File6. Data on SYN Sample.mp4 - 653 kB
File1. Course Roadmap 1.mp4 - 73.7 kB
Folder1. Packet Crafting for IDSIPS
File20. Invoke Scapy from Python Program.mp4 - 446 kB
File23. Course Roadmap 3.mp4 - 396 kB
File13. Course Roadmap 2.mp4 - 216 kB
File2. Table of Contents 1.mp4 - 187 kB
File3. Table of Contents 2.mp4 - 154 kB
File21. Packet Crafting for IDSIPS WrapUp.mp4 - 124 kB
File4. Course Roadmap 1.mp4 - 80.7 kB
FolderPDF 2021
FileSEC503 - Book 1 .pdf - 49.3 MB
FileSEC503 - Book 3.pdf - 18.5 MB
FileSEC503 - Book 4.pdf - 8.71 MB
FileSEC503 - Book 2.pdf - 8.24 MB
FileSEC503 - Book 5.pdf - 7.18 MB
Tracker Seeder Leecher
udp://tracker.breizh.pm:6969/announce 0 0
udp://tracker.moeking.me:6969/announce 0 2
udp://tracker.torrent.eu.org:451/announce 1 8
udp://www.torrent.eu.org:451/announce 1 8
udp://tracker.opentrackr.org:1337/announce 1 14
udp://pow7.com:80/announce 0 3
udp://bubu.mapfactor.com:6969/announce 1 6
udp://open.stealth.si:80/announce 1 7
udp://tracker.ololosh.space:6969/announce 0 2
udp://exodus.desync.com:6969/announce 1 2
udp://bt2.archive.org:6969/announce 0 0
udp://bt1.archive.org:6969/announce 0 0
udp://explodie.org:6969/announce 1 2
udp://tracker1.bt.moack.co.kr:80/announce 0 0
udp://tracker2.dler.com:80/announce 0 0
udp://tracker.dler.com:6969/announce 0 0
  • InfoHash: 54519BF5036A96D3DA50C0EAE6FA174EFACFFC11
  • Last Updated: Apr 29, 2024
  • File Count: 736
  • File Category: 1
  • Tags: sec503, network, monitoring, threat, detection, depth
Comments (0)
 

Write your comment

Did you like this torrent? [Optional]