TorBT - Torrents and Magnet Links Search Engine

TCM Security - Security Operations (SOC) 101

File Name
Size
01-Introduction/1. Course Introduction.mkv
25 MB
01-Introduction/2. Prerequisites and Course Resources.mkv
15 MB
01-Introduction/2. Prerequisites and Course Resources.txt
564 B
01-Introduction/3. Course Discord and Support.mkv
5.3 MB
02-Lab-Setup/1. Installing Oracle VM VirtualBox.mkv
30 MB
02-Lab-Setup/1. Installing Oracle VM VirtualBox.txt
303 B
02-Lab-Setup/2. Installing Windows.mkv
39 MB
02-Lab-Setup/3. Configuring Windows.mkv
30 MB
02-Lab-Setup/3. Configuring Windows.txt
753 B
02-Lab-Setup/4. Installing Ubuntu.mkv
37 MB
02-Lab-Setup/4. Installing Ubuntu.txt
503 B
02-Lab-Setup/5. Configuring Ubuntu.mkv
13 MB
02-Lab-Setup/5. Configuring Ubuntu.txt
432 B
02-Lab-Setup/6. Configuring the Lab Network.mkv
18 MB
03-Security-Operations-Fundamentals/1. The SOC and Its Role.mkv
44 MB
03-Security-Operations-Fundamentals/2. Day in the Life of a SOC Analyst.mkv
45 MB
03-Security-Operations-Fundamentals/3. Information Security Refresher.mkv
58 MB
03-Security-Operations-Fundamentals/4. SOC Models, Roles, and Organizational Structures.mkv
19 MB
03-Security-Operations-Fundamentals/5. Incident and Event Management.mkv
13 MB
03-Security-Operations-Fundamentals/6. SOC Metrics.mkv
22 MB
03-Security-Operations-Fundamentals/7. SOC Tools.mkv
52 MB
03-Security-Operations-Fundamentals/8. Common Threats and Attacks.mkv
46 MB
03-Security-Operations-Fundamentals/8. Common Threats and Attacks.txt
159 B
04-Phishing-Analysis/1. Introduction to Phishing.mkv
45 MB
04-Phishing-Analysis/1. Introduction to Phishing.txt
346 B
04-Phishing-Analysis/10. The Anatomy of a URL.mkv
14 MB
04-Phishing-Analysis/11. Email URL Analysis.mkv
67 MB
04-Phishing-Analysis/11. Email URL Analysis.txt
409 B
04-Phishing-Analysis/12. Email Attachment Analysis.mkv
36 MB
04-Phishing-Analysis/12. Email Attachment Analysis.txt
217 B
04-Phishing-Analysis/13. Dynamic Attachment Analysis and Sandboxing.mkv
63 MB
04-Phishing-Analysis/13. Dynamic Attachment Analysis and Sandboxing.txt
289 B
04-Phishing-Analysis/14. Static MalDoc Analysis.mkv
18 MB
04-Phishing-Analysis/14. Static MalDoc Analysis.txt
87 B
04-Phishing-Analysis/15. Static PDF Analysis.mkv
23 MB
04-Phishing-Analysis/15. Static PDF Analysis.txt
164 B
04-Phishing-Analysis/16. Automated Email Analysis with PhishTool.mkv
22 MB
04-Phishing-Analysis/17. Reactive Phishing Defense.mkv
60 MB
04-Phishing-Analysis/17. Reactive Phishing Defense.txt
261 B
04-Phishing-Analysis/18. Proactive Phishing Defense.mkv
39 MB
04-Phishing-Analysis/19. Documentation and Reporting.mkv
39 MB
04-Phishing-Analysis/19. Documentation and Reporting.txt
643 B
04-Phishing-Analysis/2. Email Fundamentals.mkv
25 MB
04-Phishing-Analysis/20. Phishing Analysis Challenge 1.txt
1.8 kB
04-Phishing-Analysis/21. Phishing Analysis Challenge 2.txt
2.1 kB
04-Phishing-Analysis/22. Phishing Analysis Challenge 3.txt
2.0 kB
04-Phishing-Analysis/23. Additional Practice.mkv
16 MB
04-Phishing-Analysis/3. Phishing Analysis Configuration.mkv
16 MB
04-Phishing-Analysis/3. Phishing Analysis Configuration.txt
562 B
04-Phishing-Analysis/4. Phishing Attack Types.mkv
39 MB
04-Phishing-Analysis/5. Phishing Attack Techniques.mkv
36 MB
04-Phishing-Analysis/5. Phishing Attack Techniques.txt
219 B
04-Phishing-Analysis/6. Email Analysis Methodology.mkv
15 MB
04-Phishing-Analysis/7. Email Header and Sender Analysis.mkv
90 MB
04-Phishing-Analysis/7. Email Header and Sender Analysis.txt
313 B
04-Phishing-Analysis/8. Email Authentication Methods.mkv
55 MB
04-Phishing-Analysis/9. Email Content Analysis.mkv
54 MB
05-Network-Security/1. Introduction to Network Security.mkv
8.4 MB
05-Network-Security/10. Wireshark - Capture and Display Filters.mkv
51 MB
05-Network-Security/10. Wireshark - Capture and Display Filters.txt
259 B
05-Network-Security/11. Wireshark - Statistics.mkv
69 MB
05-Network-Security/12. Wireshark - Analyzing Network Traffic.mkv
117 MB
05-Network-Security/13. Wireshark Challenge 1.txt
1.8 kB
05-Network-Security/14. Intrusion Detection and Prevention Systems.mkv
14 MB
05-Network-Security/15. Introduction to Snort.mkv
65 MB
05-Network-Security/16. Snort - Reading and Writing Rules hide01.ir.mkv
67 MB
05-Network-Security/16. Snort - Reading and Writing Rules hide01.ir.txt
120 B
05-Network-Security/17. Snort - Intrusion Detection and Prevention.mkv
63 MB
05-Network-Security/18. Snort Challenge 1.txt
2.6 kB
05-Network-Security/19. Additional Practice.mkv
12 MB
05-Network-Security/19. Additional Practice.txt
336 B
05-Network-Security/2. Network Security Theory.mkv
59 MB
05-Network-Security/3. Packet Capture and Flow Analysis.mkv
25 MB
05-Network-Security/4. Introduction to tcpdump.mkv
31 MB
05-Network-Security/5. tcpdump - Capturing Network Traffic.mkv
33 MB
05-Network-Security/6. tcpdump - Analyzing Network Traffic.mkv
59 MB
05-Network-Security/7. tcpdump - Analyzing Network Traffic (Sample 2).mkv
60 MB
05-Network-Security/8. tcpdump Challenge 1.txt
1.6 kB
05-Network-Security/9. Introduction to Wireshark.mkv
50 MB
05-Network-Security/9. Introduction to Wireshark.txt
258 B
06-Endpoint-Security/1. Introduction to Endpoint Security.mkv
4.8 MB
06-Endpoint-Security/10. Windows Autoruns (Part 2).mkv
59 MB
06-Endpoint-Security/10. Windows Autoruns (Part 2).txt
462 B
06-Endpoint-Security/11. Windows Service Analysis.mkv
39 MB
06-Endpoint-Security/12. Windows Scheduled Tasks.mkv
33 MB
06-Endpoint-Security/13. Windows Endpoint Analysis Challenge 1.txt
2.8 kB
06-Endpoint-Security/14. Windows Event Logs.mkv
75 MB
06-Endpoint-Security/14. Windows Event Logs.txt
463 B
06-Endpoint-Security/15. Windows Events Challenge 1.txt
1.2 kB
06-Endpoint-Security/16. Introduction to Sysmon.mkv
43 MB
06-Endpoint-Security/17. Sysmon Events.mkv
105 MB
06-Endpoint-Security/17. Sysmon Events.txt
1.8 kB
06-Endpoint-Security/18. Linux Network Analysis.mkv
39 MB
06-Endpoint-Security/19. Linux Process Analysis.mkv
84 MB
06-Endpoint-Security/2. Endpoint Security Controls.mkv
30 MB
06-Endpoint-Security/20. Linux Cron Jobs.mkv
28 MB
06-Endpoint-Security/21. Linux Endpoint Analysis Challenge 1.txt
2.9 kB
06-Endpoint-Security/22. Introduction to LimaCharlie.mkv
18 MB
06-Endpoint-Security/23. LimaCharlie - Endpoint Detection and Response.mkv
99 MB
06-Endpoint-Security/24. LimaCharlie - Deploying Endpoint Agents.mkv
58 MB
06-Endpoint-Security/3. Creating Our Malware.mkv
31 MB
06-Endpoint-Security/3. Creating Our Malware.txt
129 B
06-Endpoint-Security/4. Windows Network Analysis.mkv
66 MB
06-Endpoint-Security/5. Windows Process Analysis.mkv
78 MB
06-Endpoint-Security/6. Windows Core Processes (Part 1).mkv
71 MB
06-Endpoint-Security/7. Windows Core Processes (Part 2).mkv
39 MB
06-Endpoint-Security/8. The Windows Registry.mkv
34 MB
06-Endpoint-Security/9. Windows Autoruns (Part 1).mkv
33 MB
06-Endpoint-Security/9. Windows Autoruns (Part 1).txt
307 B
07-Security-Information-and-Event-Management-(SIEM)/1. Introduction to SIEM and Log Management.mkv
14 MB
07-Security-Information-and-Event-Management-(SIEM)/10. Common Attack Signatures - Path Traversal and Local File Inclusion.mkv
8.1 MB
07-Security-Information-and-Event-Management-(SIEM)/11. Command Line Log Analysis.mkv
70 MB
07-Security-Information-and-Event-Management-(SIEM)/12. Pattern Matching.mkv
22 MB
07-Security-Information-and-Event-Management-(SIEM)/13. Structured Log Analysis.mkv
21 MB
07-Security-Information-and-Event-Management-(SIEM)/14. Log Analysis Challenge 1.txt
1.6 kB
07-Security-Information-and-Event-Management-(SIEM)/15. Introduction to Splunk.mkv
24 MB
07-Security-Information-and-Event-Management-(SIEM)/16. Splunk - Initial Walkthrough.mkv
22 MB
07-Security-Information-and-Event-Management-(SIEM)/17. Splunk - Importing and Exploring Events.mkv
69 MB
07-Security-Information-and-Event-Management-(SIEM)/18. Splunk - Search Processing Language (SPL).mkv
62 MB
07-Security-Information-and-Event-Management-(SIEM)/19. Splunk - Search Commands.mkv
52 MB
07-Security-Information-and-Event-Management-(SIEM)/2. SIEM Architecture.mkv
36 MB
07-Security-Information-and-Event-Management-(SIEM)/20. Splunk - Reports and Alerts.mkv
21 MB
07-Security-Information-and-Event-Management-(SIEM)/21. Splunk - Creating Dashboards.mkv
33 MB
07-Security-Information-and-Event-Management-(SIEM)/22. [Live] Splunk - Website Defacement Investigation.mkv
270 MB
07-Security-Information-and-Event-Management-(SIEM)/23. Splunk - Ransomware Challenge.txt
1.3 kB
07-Security-Information-and-Event-Management-(SIEM)/24. Splunk - Deploying a Forwarder and Generating Real-Time Alerts.mkv
42 MB
07-Security-Information-and-Event-Management-(SIEM)/25. Section Cleanup.txt
545 B
07-Security-Information-and-Event-Management-(SIEM)/3. SIEM Deployment Models.mkv
15 MB
07-Security-Information-and-Event-Management-(SIEM)/4. Log Types.mkv
24 MB
07-Security-Information-and-Event-Management-(SIEM)/5. Log Formats.mkv
25 MB
07-Security-Information-and-Event-Management-(SIEM)/6. Common Attack Signatures - User Behavior.mkv
24 MB
07-Security-Information-and-Event-Management-(SIEM)/7. Common Attack Signatures - SQL Injection.mkv
14 MB
07-Security-Information-and-Event-Management-(SIEM)/8. Common Attack Signatures - Cross-Site Scripting.mkv
7.9 MB
07-Security-Information-and-Event-Management-(SIEM)/9. Common Attack Signatures - Command Injection.mkv
12 MB
08-Threat-Intelligence/1. Introduction to Threat Intelligence.mkv
7.8 MB
08-Threat-Intelligence/10. YARA - Reading and Writing Rules (Part 1).mkv
41 MB
08-Threat-Intelligence/11. YARA - Reading and Writing Rules (Part 2).mkv
39 MB
08-Threat-Intelligence/12. YARA Challenge 1.txt
3.5 kB
08-Threat-Intelligence/13. Introduction to MISP (Malware Information Sharing Platform).mkv
65 MB
08-Threat-Intelligence/14. MISP - Event Management.mkv
76 MB
08-Threat-Intelligence/14. MISP - Event Management.txt
1.4 kB
08-Threat-Intelligence/15. MISP - Ingesting Threat Intelligence Feeds.mkv
73 MB
08-Threat-Intelligence/15. MISP - Ingesting Threat Intelligence Feeds.txt
239 B
08-Threat-Intelligence/2. Types of Threat Intelligence.mkv
33 MB
08-Threat-Intelligence/3. The Threat Intelligence Cycle hide01.ir.mkv
34 MB
08-Threat-Intelligence/3. The Threat Intelligence Cycle.txt
739 B
08-Threat-Intelligence/4. The Diamond Model of Intrusion Analysis.mkv
41 MB
08-Threat-Intelligence/4. The Diamond Model of Intrusion Analysis.txt
197 B
08-Threat-Intelligence/5. The Cyber Kill Chain.mkv
42 MB
08-Threat-Intelligence/5. The Cyber Kill Chain.txt
319 B
08-Threat-Intelligence/6. The Pyramid of Pain.mkv
31 MB
08-Threat-Intelligence/6. The Pyramid of Pain.txt
169 B
08-Threat-Intelligence/7. MITRE ATT&CK.mkv
161 MB
08-Threat-Intelligence/7. MITRE ATT&CK.txt
537 B
08-Threat-Intelligence/8. MITRE ATT&CK Challenge 1.txt
3.1 kB
08-Threat-Intelligence/9. Introduction to YARA.mkv
26 MB
09-Digital-Forensics/1. Introduction to Digital Forensics.mkv
12 MB
09-Digital-Forensics/10. Windows Forensic Artifacts - Files.mkv
48 MB
09-Digital-Forensics/10. Windows Forensic Artifacts - Files.txt
182 B
09-Digital-Forensics/11. Windows Forensic Artifacts - Program Execution.mkv
51 MB
09-Digital-Forensics/11. Windows Forensic Artifacts - Program Execution.txt
149 B
09-Digital-Forensics/12. LNK Files, Prefetch Files, and Jump Lists.mkv
106 MB
09-Digital-Forensics/12. LNK Files, Prefetch Files, and Jump Lists.txt
227 B
09-Digital-Forensics/13. Windows Forensic Artifact Triage.mkv
85 MB
09-Digital-Forensics/2. The Digital Forensics Investigation Process.mkv
45 MB
09-Digital-Forensics/2. The Digital Forensics Investigation Process.txt
110 B
09-Digital-Forensics/3. Order of Volatility.mkv
38 MB
09-Digital-Forensics/4. Chain of Custody.mkv
25 MB
09-Digital-Forensics/4. Chain of Custody.pdf
63 kB
09-Digital-Forensics/5. Introduction to FTK Imager.mkv
50 MB
09-Digital-Forensics/6. FTK Imager - Forensic Image Acquisition.mkv
24 MB
09-Digital-Forensics/7. FTK Imager - Memory Acquisition.mkv
29 MB
09-Digital-Forensics/8. Common Windows Forensic Artifacts.mkv
60 MB
09-Digital-Forensics/8. Common Windows Forensic Artifacts.txt
317 B
09-Digital-Forensics/9. Windows Forensic Artifacts - User and System hide01.ir.mkv
63 MB
09-Digital-Forensics/9. Windows Forensic Artifacts - User and System.txt
182 B
10-Conclusion/1. Course Wrap Up.mkv
6.0 MB