TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - The Complete SOC Analyst Interview Guide - Get Hired in 2026

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction/1. 1. SOC Analyst Interview - Course Orientation - CyberSaints.pdf
1.1 MB
~Get Your Files Here !/1 - Introduction/1. 2. SOC Analyst Interview Mindset - CyberSaints.pdf
578 kB
~Get Your Files Here !/1 - Introduction/1. SOC Interview Mindset (Description).html
774 B
~Get Your Files Here !/1 - Introduction/1. SOC Interview Mindset.mp4
43 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/139. 11. MITRE ATT&CK Framework for SOC Interviews - CyberSaints.pdf
538 kB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/139. Section Introduction - MITRE ATT&CK Framework (Description).html
1.1 kB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/139. Section Introduction - MITRE ATT&CK Framework.mp4
6.9 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/140. What is MITRE ATT&CK Framework (Description).html
1.0 kB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/140. What is MITRE ATT&CK Framework.mp4
9.5 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/141. Explain Tactics & Techniques in ATT&CK Framework (Description).html
1.0 kB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/141. Explain Tactics & Techniques in ATT&CK Framework.mp4
6.4 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/142. How is MITRE ATT&CK used in day-to-day SOC operations (Description).html
986 B
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/142. How is MITRE ATT&CK used in day-to-day SOC operations.mp4
7.5 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/143. How does MITRE ATT&CK help identify detection gaps (Description).html
1019 B
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/143. How does MITRE ATT&CK help identify detection gaps.mp4
9.0 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/144. How does an attacker achieve Initial Access (Description).html
1.0 kB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/144. How does an attacker achieve Initial Access.mp4
5.3 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/145. How does an attacker achieve Persistence (Description).html
975 B
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/145. How does an attacker achieve Persistence.mp4
5.2 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/146. How does an attacker achieve Defense Evasion (Description).html
1.0 kB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/146. How does an attacker achieve Defense Evasion.mp4
5.4 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/147. How does an attacker achieve Lateral Movement (Description).html
1004 B
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/147. How does an attacker achieve Lateral Movement.mp4
5.0 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/148. How does an attacker achieve Privilege Escalation (Description).html
995 B
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/148. How does an attacker achieve Privilege Escalation.mp4
4.8 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/149. How does an attacker achieve Exfiltration (Description).html
975 B
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/149. How does an attacker achieve Exfiltration.mp4
4.6 MB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/150. Section Recap & Key Takeaways (Description).html
1.0 kB
~Get Your Files Here !/10 - MITRE ATT&CK for SOC Interviews/150. Section Recap & Key Takeaways.mp4
12 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/151. 12a. SOC Interview Scenario Based Questions - Malware and Intrusion Scenarios.pdf
1.6 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/151. Section Introduction - Endpoint & Malware Intrusion Scenarios (Description).html
1.3 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/151. Section Introduction - Endpoint & Malware Intrusion Scenarios.mp4
7.8 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/152. Malware Alert from EDR. What are your first 5 steps (Description).html
1.1 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/152. Malware Alert from EDR. What are your first 5 steps.mp4
11 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/153. EDR alert for PowerShell Execution with Encoded Command. What do you check (Description).html
1.1 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/153. EDR alert for PowerShell Execution with Encoded Command. What do you check.mp4
12 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/154. EDR flags Credential Dumping (LSASS access). How do you validate (Description).html
1.1 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/154. EDR flags Credential Dumping (LSASS access). How do you validate.mp4
11 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/155. EDR detects suspicious Process Injection. How do you investigate (Description).html
1.1 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/155. EDR detects suspicious Process Injection. How do you investigate.mp4
12 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/156. User complains system is slow. You find crypto-miner activity. What do you do (Description).html
1.1 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/156. User complains system is slow. You find crypto-miner activity. What do you do.mp4
9.4 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/157. Malware beaconing to an external IP every 5 minutes. How do you confirm (Description).html
1.1 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/157. Malware beaconing to an external IP every 5 minutes. How do you confirm.mp4
9.4 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/158. User reports ransom note on desktop. Immediate action & how would you respond (Description).html
1.1 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/158. User reports ransom note on desktop. Immediate action & how would you respond.mp4
17 MB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/159. Section Recap & Key Takeaways (Description).html
1.0 kB
~Get Your Files Here !/11 - Scenario Questions & Answers - Endpoint & Malware Intrusion/159. Section Recap & Key Takeaways.mp4
11 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/160. 12b. SOC Interview Scenario Based Questions - Phishing Scenarios.pdf
1.4 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/160. Section Introduction - Phishing Social Engineering Attack Scenarios (Description).html
1.2 kB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/160. Section Introduction - Phishing Social Engineering Attack Scenarios.mp4
4.0 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/161. User reports a phishing email. Walk me through your response (Description).html
1.1 kB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/161. User reports a phishing email. Walk me through your response.mp4
14 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/162. User clicked a phishing link & entered credentials. What actions do you take (Description).html
1.1 kB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/162. User clicked a phishing link & entered credentials. What actions do you take.mp4
12 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/163. How do you investigate Business Email Compromise (BEC) attempt (Description).html
1.1 kB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/163. How do you investigate Business Email Compromise (BEC) attempt.mp4
13 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/164. How do you analyse email headers during phishing investigation (Description).html
1023 B
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/164. How do you analyse email headers during phishing investigation.mp4
11 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/165. Email contains attachment detected as HTML ISO ZIP. What do you do (Description).html
1.1 kB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/165. Email contains attachment detected as HTML ISO ZIP. What do you do.mp4
13 MB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/166. Section Recap & Key Takeaways (Description).html
1.0 kB
~Get Your Files Here !/12 - Scenario Questions & Answers - Phishing Social Engineering/166. Section Recap & Key Takeaways.mp4
11 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/167. 12c. SOC Interview Scenario Based Questions - Network Attack Scenarios.pdf
1.6 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/167. Section Introduction - Network Based Attack Scenarios (Description).html
1.2 kB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/167. Section Introduction - Network Based Attack Scenarios.mp4
6.5 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/168. Firewall logs show repeated outbound traffic to suspicious IPs. What do you do (Description).html
1.1 kB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/168. Firewall logs show repeated outbound traffic to suspicious IPs. What do you do.mp4
14 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/169. DNS logs show long, random-looking domain queries. What does it indicate (Description).html
1.1 kB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/169. DNS logs show long, random-looking domain queries. What does it indicate.mp4
14 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/170. IDS alerts on possible data exfiltration. How do you verify (Description).html
1.1 kB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/170. IDS alerts on possible data exfiltration. How do you verify.mp4
13 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/171. You see port scanning from an internal host. What could it mean (Description).html
1.0 kB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/171. You see port scanning from an internal host. What could it mean.mp4
14 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/172. How do you investigate a suspected DDoS attack (Description).html
1.0 kB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/172. How do you investigate a suspected DDoS attack.mp4
17 MB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/173. Section Recap & Key Takeaways (Description).html
1.0 kB
~Get Your Files Here !/13 - Scenario Questions & Answers - Network Based Attacks/173. Section Recap & Key Takeaways.mp4
18 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/174. 12d. SOC Interview Scenario Based Questions - Cloud and Identity Attack Scenarios.pdf
1.6 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/174. Section Introduction - Cloud & Identity Attack Scenarios (Description).html
1.2 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/174. Section Introduction - Cloud & Identity Attack Scenarios.mp4
3.7 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/175. Cloud logs show login from impossible travel location. What do you do (Description).html
1.1 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/175. Cloud logs show login from impossible travel location. What do you do.mp4
16 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/176. You see multiple failed logins followed by success. How do you respond (Description).html
1.1 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/176. You see multiple failed logins followed by success. How do you respond.mp4
13 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/177. How do you investigate a cloud account takeover (Description).html
1.0 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/177. How do you investigate a cloud account takeover.mp4
16 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/178. You see excessive API calls from a service account. What could it mean (Description).html
1.0 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/178. You see excessive API calls from a service account. What could it mean.mp4
15 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/179. What steps do you take after OAuth abuse in SaaS application (Description).html
1.1 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/179. What steps do you take after OAuth abuse in SaaS application.mp4
13 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/180. Cloud storage bucket becomes publicly accessible. How would you investigate (Description).html
1.1 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/180. Cloud storage bucket becomes publicly accessible. How would you investigate.mp4
17 MB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/181. Section Recap & Key Takeaways (Description).html
1.0 kB
~Get Your Files Here !/14 - Scenario Questions & Answers - Cloud & Identity Attacks/181. Section Recap & Key Takeaways.mp4
21 MB
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/182. 13. Recent High-Profile Cyber Attacks & Lessons for SOC Analysts - CyberSaints.pdf
804 kB
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/182. Salesforce OAuth Supply Chain Attack Explained (Description).html
867 B
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/182. Salesforce OAuth Supply Chain Attack Explained.mp4
14 MB
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/183. Marks & Spencer Cyber Attack Retail Disruption Case Study (Description).html
884 B
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/183. Marks & Spencer Cyber Attack Retail Disruption Case Study.mp4
14 MB
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/184. Jaguar Land Rover Ransomware UK’s Costliest Attack (Description).html
874 B
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/184. Jaguar Land Rover Ransomware UK’s Costliest Attack.mp4
11 MB
~Get Your Files Here !/15 - Recent High-Profile Cyber Attacks & Lessons for SOC Analysts/185. Section Recap - Key Takeaways.mp4
7.0 MB
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/186. 14. SOC Interview Opening Questions - CyberSaints.pdf
841 kB
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/186. Common Interview Openers (Description).html
825 B
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/186. Common Interview Openers.mp4
8.7 MB
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/187. Tell Me About Yourself (Description).html
757 B
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/187. Tell Me About Yourself.mp4
58 MB
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/188. How Does Your Day Look Like As a SOC Analyst (Description).html
790 B
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/188. How Does Your Day Look Like As a SOC Analyst.mp4
53 MB
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/189. Describe a Recent Incident You Handled (Description).html
772 B
~Get Your Files Here !/16 - Common Cybersecurity SOC Interview Opening Questions/189. Describe a Recent Incident You Handled.mp4
64 MB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/190. 15. SOC Interview - Behavioral Questions & Answers - CyberSaints.pdf
468 kB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/190. How to answer behavioral questions in SOC interview (Description).html
884 B
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/190. How to answer behavioral questions in SOC interview.mp4
12 MB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/191. Tell me about a time you handled a high-pressure incident (Description).html
820 B
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/191. Tell me about a time you handled a high-pressure incident.mp4
3.8 MB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/192. Tell me about a mistake you made and what you learned (Description).html
812 B
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/192. Tell me about a mistake you made and what you learned.mp4
4.4 MB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/193. How do you handle disagreements within your team (Description).html
807 B
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/193. How do you handle disagreements within your team.mp4
4.2 MB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/194. Tell me about a time you improved a process (Description).html
787 B
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/194. Tell me about a time you improved a process.mp4
5.8 MB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/195. How do you stay updated in cybersecurity (Description).html
783 B
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/195. How do you stay updated in cybersecurity.mp4
6.7 MB
~Get Your Files Here !/17 - Common Behavioral Questions Asked During SOC Interviews/196. Section Recap & Key Takeaways.mp4
6.5 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/197. 16. The SOC Analyst LinkedIn Visibility Playbook - CyberSaints.pdf
1.0 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/197. LinkedIn Profile Visibility Playbook (Description).html
798 B
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/197. LinkedIn Profile Visibility Playbook.mp4
70 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/198. 17. The Naukri Profile Optimisation Guide for SOC Interviews - CyberSaints.pdf
957 kB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/198. Naukri Profile Optimisation Guide (Description).html
784 B
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/198. Naukri Profile Optimisation Guide.mp4
66 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/199. 19. SOC Interview Questions - Quick Reference Sheet - CyberSaints.pdf
1.3 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/199. Comprehensive, Downloadable, Print-Ready Q&A Sheets (Description).html
827 B
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/199. Comprehensive, Downloadable, Print-Ready Q&A Sheets.mp4
11 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/200. How to access SOC Interview AI Simulator (Description).html
863 B
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/200. How to access SOC Interview AI Simulator.mp4
8.0 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/200. SOC Interview AI Simulator.url
103 B
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/201. 18. SOC Interview Day Tips - CyberSaints.pdf
1.3 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/201. Interview Day - Cybersecurity SOC Analyst Interview Tips (Description).html
870 B
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/201. Interview Day - Cybersecurity SOC Analyst Interview Tips.mp4
54 MB
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/202. Thank You! Now Go Make it Happen! (Description).html
845 B
~Get Your Files Here !/18 - Valuable Resources for SOC Interviews/202. Thank You! Now Go Make it Happen!.mp4
8.4 MB
~Get Your Files Here !/2 - Understanding the SOC/2. 3. Understanding SOC Ecosystem - Security Operations Basics - CyberSaints.pdf
1.8 MB
~Get Your Files Here !/2 - Understanding the SOC/2. What, Why, & How of Security Operation Center (SOC) (Description).html
847 B
~Get Your Files Here !/2 - Understanding the SOC/2. What, Why, & How of Security Operation Center (SOC).mp4
57 MB
~Get Your Files Here !/2 - Understanding the SOC/3. SOC Types, Roles & Responsibilities (Description).html
796 B
~Get Your Files Here !/2 - Understanding the SOC/3. SOC Types, Roles & Responsibilities.mp4
72 MB
~Get Your Files Here !/2 - Understanding the SOC/4. SOC Tools & Technologies (Description).html
804 B
~Get Your Files Here !/2 - Understanding the SOC/4. SOC Tools & Technologies.mp4
79 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/10. What is Encryption, Decryption, & Encoding (Description).html
989 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/10. What is Encryption, Decryption, & Encoding.mp4
5.7 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/11. What is Symmetric & Asymmetric Encryption (Description).html
984 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/11. What is Symmetric & Asymmetric Encryption.mp4
5.5 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/12. Explain the difference between SSL & TLS (Description).html
923 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/12. Explain the difference between SSL & TLS.mp4
4.0 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/13. What is Hashing (Description).html
936 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/13. What is Hashing.mp4
4.1 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/14. What is Hash Collision (Description).html
911 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/14. What is Hash Collision.mp4
4.0 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/15. Explain MD5, SHA1, & SHA256 (Description).html
974 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/15. Explain MD5, SHA1, & SHA256.mp4
6.3 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/16. Explain the difference between Event, Alert, & Incident (Description).html
977 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/16. Explain the difference between Event, Alert, & Incident.mp4
5.8 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/17. What is an Incident (Description).html
944 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/17. What is an Incident.mp4
4.3 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/18. What is True Positive, False Positive, & False Negative (Description).html
999 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/18. What is True Positive, False Positive, & False Negative.mp4
5.5 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/19. Explain Incident Response Lifecycle Incident Handling Process (Description).html
1.0 kB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/19. Explain Incident Response Lifecycle Incident Handling Process.mp4
8.3 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/20. How do you prioritise incidents (Description).html
935 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/20. How do you prioritise incidents.mp4
5.3 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/21. What is Root Cause Analysis (RCA) (Description).html
961 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/21. What is Root Cause Analysis (RCA).mp4
3.8 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/22. What is CVE & CVSS (Description).html
904 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/22. What is CVE & CVSS.mp4
10 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/23. Section Recap & Key Takeaways.mp4
7.1 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/5. 4. Cybersecurity Fundamentals for SOC Analyst Interview - CyberSaints.pdf
999 kB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/5. Section Introduction - Cybersecurity Fundamentals (Description).html
1.0 kB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/5. Section Introduction - Cybersecurity Fundamentals.mp4
6.4 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/6. What is the CIA triad (Description).html
992 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/6. What is the CIA triad.mp4
6.7 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/7. What is Threat, Vulnerability, & Risk (Description).html
969 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/7. What is Threat, Vulnerability, & Risk.mp4
6.0 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/8. What is Cyber Kill Chain (Description).html
972 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/8. What is Cyber Kill Chain.mp4
11 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/9. What is Pyramid of Pain (Description).html
990 B
~Get Your Files Here !/3 - Cybersecurity Fundamentals for SOC Interviews/9. What is Pyramid of Pain.mp4
6.1 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/24. 5. Networking Concepts for SOC Analyst Interview - CyberSaints.pdf
1.9 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/24. Section Introduction - Networking Concepts for SOC (Description).html
998 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/24. Section Introduction - Networking Concepts for SOC.mp4
12 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/25. Explain OSI Model (Description).html
930 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/25. Explain OSI Model.mp4
7.5 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/26. What is the TCP IP Model (Description).html
930 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/26. What is the TCP IP Model.mp4
8.0 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/27. What is the difference between TCP & UDP (Description).html
964 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/27. What is the difference between TCP & UDP.mp4
11 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/28. Explain the TCP 3-Way Handshake (Description).html
969 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/28. Explain the TCP 3-Way Handshake.mp4
8.6 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/29. What is an IPv4 Address & What are different IPv4 Classes (Description).html
942 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/29. What is an IPv4 Address & What are different IPv4 Classes.mp4
12 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/30. Explain Public vs Private IP Addresses (Description).html
924 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/30. Explain Public vs Private IP Addresses.mp4
9.9 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/31. What is Network Address Translation (NAT) (Description).html
931 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/31. What is Network Address Translation (NAT).mp4
7.0 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/32. What is Port Address Translation (PAT) (Description).html
951 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/32. What is Port Address Translation (PAT).mp4
6.4 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/33. What is a Port (Description).html
901 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/33. What is a Port.mp4
6.7 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/34. What is Port Scanning (Description).html
893 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/34. What is Port Scanning.mp4
4.3 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/35. What is a Firewall (Description).html
913 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/35. What is a Firewall.mp4
9.0 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/36. What is a Proxy Server (Description).html
883 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/36. What is a Proxy Server.mp4
4.3 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/37. What is the difference between IDS & IPS (Description).html
967 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/37. What is the difference between IDS & IPS.mp4
5.8 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/38. What is a VPN (Description).html
867 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/38. What is a VPN.mp4
5.0 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/39. What is DNS (Description).html
860 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/39. What is DNS.mp4
6.5 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/40. What is ARP & how does it work (Description).html
919 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/40. What is ARP & how does it work.mp4
6.3 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/41. What is DHCP & how does it work (Description).html
893 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/41. What is DHCP & how does it work.mp4
14 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/42. What is ICMP (Description).html
881 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/42. What is ICMP.mp4
5.6 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/43. Explain the difference between GET & POST HTTP methods (Description).html
919 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/43. Explain the difference between GET & POST HTTP methods.mp4
6.4 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/44. What are HTTP response codes (Description).html
905 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/44. What are HTTP response codes.mp4
8.9 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/45. What do you mean by Stateful & Stateless in Computer Networking (Description).html
978 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/45. What do you mean by Stateful & Stateless in Computer Networking.mp4
5.8 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/46. What is Ping How does it work (Description).html
891 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/46. What is Ping How does it work.mp4
7.3 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/47. Tell me a few common Networking commands (Description).html
939 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/47. Tell me a few common Networking commands.mp4
12 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/48. What is Network Segmentation (Description).html
834 B
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/48. What is Network Segmentation.mp4
9.1 MB
~Get Your Files Here !/4 - Networking Concepts for SOC Interviews/49. Section Recap - Key Takeaways.mp4
6.2 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/50. 6. Windows Security Fundamentals for SOC Analyst Interview - CyberSaints.pdf
2.1 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/50. Section Introduction - Windows Security Fundamentals (Description).html
1.1 kB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/50. Section Introduction - Windows Security Fundamentals.mp4
8.1 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/51. Explain Local User and Domain User (Description).html
985 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/51. Explain Local User and Domain User.mp4
8.1 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/52. What is SID (Security Identifier) in Windows (Description).html
956 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/52. What is SID (Security Identifier) in Windows.mp4
4.8 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/53. What is the difference between NTFS & FAT32 File System (Description).html
983 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/53. What is the difference between NTFS & FAT32 File System.mp4
5.0 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/54. What is an ADS (Alternate Data Stream) in Windows (Description).html
951 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/54. What is an ADS (Alternate Data Stream) in Windows.mp4
5.6 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/55. How can attackers abuse ADS (Description).html
843 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/55. How can attackers abuse ADS.mp4
5.5 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/56. What is Windows Registry (Description).html
898 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/56. What is Windows Registry.mp4
4.7 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/57. Why Windows Registry is important (Description).html
857 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/57. Why Windows Registry is important.mp4
6.4 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/58. What are common Windows Registry Hives (Description).html
859 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/58. What are common Windows Registry Hives.mp4
6.0 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/59. What are Registry locations commonly used by malware (Description).html
951 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/59. What are Registry locations commonly used by malware.mp4
4.8 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/60. What is BitLocker (Description).html
895 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/60. What is BitLocker.mp4
3.9 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/61. What is an Event log What are common log types (Description).html
928 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/61. What is an Event log What are common log types.mp4
6.5 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/62. Important & commonly asked security event IDs (Description).html
951 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/62. Important & commonly asked security event IDs.mp4
6.0 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/63. What is PowerShell Logging (Description).html
904 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/63. What is PowerShell Logging.mp4
3.9 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/64. What is Script Block Logging in Windows (Description).html
853 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/64. What is Script Block Logging in Windows.mp4
3.9 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/65. What are common persistence techniques used in Windows (Description).html
980 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/65. What are common persistence techniques used in Windows.mp4
2.9 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/66. What is WMI (Description).html
856 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/66. What is WMI.mp4
4.4 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/67. What are Windows Logon Types (Description).html
930 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/67. What are Windows Logon Types.mp4
6.2 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/68. Explain Authentication & Authorisation (Description).html
914 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/68. Explain Authentication & Authorisation.mp4
7.5 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/69. How does the Windows logon process work internally (Description).html
951 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/69. How does the Windows logon process work internally.mp4
8.5 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/70. What is LSASS & why it is a high-value target (Description).html
965 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/70. What is LSASS & why it is a high-value target.mp4
6.8 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/71. What authentication protocols does Windows use (Description).html
915 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/71. What authentication protocols does Windows use.mp4
5.6 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/72. Explain the difference between NTLM & Kerberos (Description).html
930 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/72. Explain the difference between NTLM & Kerberos.mp4
6.5 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/73. What are Cached Credentials (Description).html
894 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/73. What are Cached Credentials.mp4
6.8 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/74. How does NTLM authentication work (Description).html
876 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/74. How does NTLM authentication work.mp4
14 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/75. How does Kerberos authentication work (Description).html
929 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/75. How does Kerberos authentication work.mp4
19 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/76. How does SSO (Single Sign-On) work (Description).html
913 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/76. How does SSO (Single Sign-On) work.mp4
13 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/77. Common Windows Commands (Description).html
930 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/77. Common Windows Commands.mp4
13 MB
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/78. Section Recap - Key Takeaways (Description).html
970 B
~Get Your Files Here !/5 - Windows Security Fundamentals for SOC Interviews/78. Section Recap - Key Takeaways.mp4
11 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/79. 7. Common Cyber Attacks Explained - CyberSaints.pdf
5.6 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/79. Section Introduction - Common Cyber Attacks Explained (Description).html
888 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/79. Section Introduction - Common Cyber Attacks Explained.mp4
10 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/80. Malware Intrusion Attacks (Description).html
779 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/80. Malware Intrusion Attacks.mp4
72 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/81. Ransomware Attacks (Description).html
740 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/81. Ransomware Attacks.mp4
50 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/82. Phishing & Social Engineering Attacks (Description).html
796 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/82. Phishing & Social Engineering Attacks.mp4
34 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/83. Credential & Identity Attacks (Description).html
872 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/83. Credential & Identity Attacks.mp4
43 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/84. Network Attacks (Description).html
739 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/84. Network Attacks.mp4
48 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/85. Denial-of-Service Attacks (Description).html
760 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/85. Denial-of-Service Attacks.mp4
40 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/86. Web Application Attacks (Description).html
747 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/86. Web Application Attacks.mp4
110 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/87. Cloud & SaaS Attacks (Description).html
756 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/87. Cloud & SaaS Attacks.mp4
94 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/88. Endpoint & OS-Level Attacks (Description).html
769 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/88. Endpoint & OS-Level Attacks.mp4
79 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/89. Supply Chain Attacks (Description).html
749 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/89. Supply Chain Attacks.mp4
58 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/90. Insider Threat Attacks (Description).html
754 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/90. Insider Threat Attacks.mp4
65 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/91. Data Exfiltration & Espionage Attacks (Description).html
788 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/91. Data Exfiltration & Espionage Attacks.mp4
61 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/92. Wireless & IOT Attacks (Description).html
749 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/92. Wireless & IOT Attacks.mp4
60 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/93. Advanced Persistent Threats (APTs) (Description).html
778 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/93. Advanced Persistent Threats (APTs).mp4
46 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/94. Active Directory Attacks (Description).html
759 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/94. Active Directory Attacks.mp4
57 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/95. Emerging & Modern Day Attacks (Description).html
780 B
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/95. Emerging & Modern Day Attacks.mp4
58 MB
~Get Your Files Here !/6 - Common Cyber Attacks & Mitigation Strategies/96. Section Recap & Key Takeaways.mp4
8.2 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/100. How do you perform static malware analysis (Description).html
883 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/100. How do you perform static malware analysis.mp4
20 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/101. What are the advantages of Static Malware Analysis (Description).html
1.1 kB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/101. What are the advantages of Static Malware Analysis.mp4
5.7 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/102. What are the advantages of Dynamic Malware Analysis (Description).html
1.0 kB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/102. What are the advantages of Dynamic Malware Analysis.mp4
5.6 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/103. What is Sandbox Analysis (Description).html
1000 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/103. What is Sandbox Analysis.mp4
4.5 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/104. What artefacts do you look for during Dynamic Malware Analysis (Description).html
1.1 kB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/104. What artefacts do you look for during Dynamic Malware Analysis.mp4
7.6 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/105. What is Code Obfuscation (Description).html
980 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/105. What is Code Obfuscation.mp4
4.7 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/106. What is Packing How can you identify Packed Malware (Description).html
1.0 kB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/106. What is Packing How can you identify Packed Malware.mp4
6.8 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/107. What is Anti-Debugging (Description).html
948 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/107. What is Anti-Debugging.mp4
5.0 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/108. What is Anti-VM or Sandbox Evasion (Description).html
1006 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/108. What is Anti-VM or Sandbox Evasion.mp4
4.5 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/109. What tools are commonly used for Malware Analysis (Description).html
952 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/109. What tools are commonly used for Malware Analysis.mp4
10 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/110. How do you safely analyse malware (Description).html
991 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/110. How do you safely analyse malware.mp4
5.8 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/111. What challenges do SOC teams face with Malware Analysis (Description).html
970 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/111. What challenges do SOC teams face with Malware Analysis.mp4
5.4 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/112. What is Malware Attribution (Description).html
1014 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/112. What is Malware Attribution.mp4
4.9 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/113. What is YARA How are YARA rules used in SOC (Description).html
962 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/113. What is YARA How are YARA rules used in SOC.mp4
5.9 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/114. Section Recap & Key Takeaways (Description).html
982 B
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/114. Section Recap & Key Takeaways.mp4
6.3 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/97. 8. Malware Analysis for SOC Interviews - CyberSaints.pptx.pdf
1.1 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/97. Section Introduction - Malware Analysis (Description).html
1.1 kB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/97. Section Introduction - Malware Analysis.mp4
8.2 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/98. What is Malware Analysis (Description).html
1.0 kB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/98. What is Malware Analysis.mp4
5.3 MB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/99. Explain Static vs Dynamic Malware Analysis (Description).html
1.0 kB
~Get Your Files Here !/7 - Malware Analysis for SOC Interviews/99. Explain Static vs Dynamic Malware Analysis.mp4
8.5 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/115. 9. Cyber Threat Intelligence for SOC Interviews - CyberSaints.pdf
549 kB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/115. Section Introduction - Cyber Threat Intelligence (Description).html
1.1 kB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/115. Section Introduction - Cyber Threat Intelligence.mp4
8.4 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/116. What is Cyber Threat Intelligence Why is it important for SOC (Description).html
1.1 kB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/116. What is Cyber Threat Intelligence Why is it important for SOC.mp4
8.9 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/117. What is the difference between Data, Information, & Intelligence (Description).html
1.1 kB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/117. What is the difference between Data, Information, & Intelligence.mp4
6.1 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/118. What are Indicators of Compromise What are common IOC types (Description).html
1.0 kB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/118. What are Indicators of Compromise What are common IOC types.mp4
13 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/119. What is the difference between Threat Intelligence & Threat Hunting (Description).html
1.0 kB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/119. What is the difference between Threat Intelligence & Threat Hunting.mp4
5.6 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/120. What is Tactical, Operational, & Strategic Threat Intelligence (Description).html
1.0 kB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/120. What is Tactical, Operational, & Strategic Threat Intelligence.mp4
8.8 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/121. What is Open-Source Intelligence (OSINT) (Description).html
982 B
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/121. What is Open-Source Intelligence (OSINT).mp4
4.7 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/122. What are common sources of Threat Intelligence (Description).html
998 B
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/122. What are common sources of Threat Intelligence.mp4
4.2 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/123. What are Threat Intelligence Feeds (Description).html
961 B
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/123. What are Threat Intelligence Feeds.mp4
3.5 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/124. What is Threat Intelligence Platform (TIP) (Description).html
986 B
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/124. What is Threat Intelligence Platform (TIP).mp4
4.4 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/125. What is STIX & TAXII (Description).html
953 B
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/125. What is STIX & TAXII.mp4
3.8 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/126. What is TLP (Traffic Light Protocol) & What are TLP levels (Description).html
985 B
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/126. What is TLP (Traffic Light Protocol) & What are TLP levels.mp4
11 MB
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/127. Section Recap & Key Takeaways (Description).html
1000 B
~Get Your Files Here !/8 - Cyber Threat Intelligence for SOC Interviews/127. Section Recap & Key Takeaways.mp4
9.9 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/128. 10. Threat Hunting for SOC Interviews - CyberSaints.pdf
543 kB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/128. Section Introduction - Threat Hunting (Description).html
1016 B
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/128. Section Introduction - Threat Hunting.mp4
8.3 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/129. What is Threat Hunting (Description).html
977 B
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/129. What is Threat Hunting.mp4
5.1 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/130. How is Threat Hunting different from traditional SOC monitoring (Description).html
1.1 kB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/130. How is Threat Hunting different from traditional SOC monitoring.mp4
7.0 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/131. Why do organisations need Threat Hunting if they already have a SOC (Description).html
1.0 kB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/131. Why do organisations need Threat Hunting if they already have a SOC.mp4
8.1 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/132. What are key phases of Threat Hunting process (Description).html
985 B
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/132. What are key phases of Threat Hunting process.mp4
9.0 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/133. What are common Threat Hunting techniques (Description).html
1008 B
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/133. What are common Threat Hunting techniques.mp4
5.3 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/134. How is MITRE ATT&CK Framework used in Threat Hunting (Description).html
1.0 kB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/134. How is MITRE ATT&CK Framework used in Threat Hunting.mp4
6.7 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/135. How do you hunt for Lateral Movement (Description).html
957 B
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/135. How do you hunt for Lateral Movement.mp4
6.7 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/136. How do you hunt for Persistence mechanisms (Description).html
1.0 kB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/136. How do you hunt for Persistence mechanisms.mp4
7.5 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/137. Tell me about a Threat Hunting use case you created (Description).html
1.1 kB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/137. Tell me about a Threat Hunting use case you created.mp4
8.4 MB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/138. Section Recap & Key Takeaways (Description).html
1.0 kB
~Get Your Files Here !/9 - Threat Hunting for SOC Interviews/138. Section Recap & Key Takeaways.mp4
9.0 MB
~Get Your Files Here !/Bonus Resources.txt
70 B