• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Courses SentinelOne - Threat Hunting course

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,859
Solutions
4
Reputation
27
Reaction score
45,545
Points
1,813
Credits
55,080
‎7 Years of Service‎
 
56%

Six Steps to Successful and Efficient Threat Hunting​

Rather than waiting for an alert, threat hunters proactively assume that an advanced adversary operates inside the network and operates to find their existence.


More info:
This link is hidden for visitors. Please Log in or register now.

Content:
Code:
+---SentinelOne û Threat Hunting course
    +---1. Introduction To Hunting
    ª       Launch.ts
    ª       Launch_2.ts
    ª       Launch_3.ts
    ª       Launch_4.ts
    ª       
    +---2. Deep Visibility
    ª       Launch.ts
    ª       Launch_10.ts
    ª       Launch_11.ts
    ª       Launch_2.ts
    ª       Launch_3.ts
    ª       Launch_4.ts
    ª       Launch_5.ts
    ª       Launch_6.ts
    ª       Launch_7.ts
    ª       Launch_8.ts
    ª       Launch_9.ts
    ª       
    +---3. Hunting for threats using deep visibility
    ª       Launch.ts
    ª       Launch_2.ts
    ª       Launch_3.ts
    ª       Launch_4.ts
    ª       Launch_5.ts
    ª       XZhBqwmB5aZ9wjaQ_wf6nHnmyi_MnDQrJ-Windows PDFXCView Malware Lab.pdf
    ª       
    +---4. Manual Discovery and Containment
            2fSZPwXy9HUb0uL9_UtDguD_aqHESts6Q-Linux Remote Trojan Lab.pdf
            a7a6feab-91e4-4090-be28-4734e3141647_Student_Enablement_Instructions.pdf
            ijq-TOT8a4avjfBE__0CqPwdxm1f-FHxk-K8 Command Injection Lab Instructions.pdf
            Launch.ts
            Launch_2.ts
            Launch_3.ts

DOWNLOAD:
 
Back
Top