TorBT - Torrents and Magnet Links Search Engine

TCM Security - Security Operations (SOC) 201

File Name
Size
01- Course Introduction/01-Course-Introduction-(5-13).mkv
17 MB
01- Course Introduction/02-About-the-Instructor-(2-30).mkv
8.9 MB
01- Course Introduction/03-The-Modern-Adversary-(10-17).mkv
41 MB
01- Course Introduction/04-The-SOC-201-Methodology-(4-23).mkv
10 MB
01- Course Introduction/05-Course-Support-(3-05).mkv
10 MB
02- Lab Setup/01-Lab-Setup-(3-31).mkv
12 MB
02- Lab Setup/02-Installing-a-Hypervisor-(7-26).mkv
23 MB
02- Lab Setup/03-Installing-Ubuntu-(13-20).mkv
29 MB
02- Lab Setup/04-Configuring-Ubuntu-(8-17).mkv
22 MB
02- Lab Setup/05-Installing-Windows-(11-15).mkv
43 MB
02- Lab Setup/06-Configuring-Windows-(7-52).mkv
25 MB
02- Lab Setup/07-Installing-Splunk-(16-16).mkv
38 MB
02- Lab Setup/08-Configuring-the-Lab-Network-(10-10).mkv
26 MB
03- Introduction to Incident Response/01-Introduction-to-Incident-Response-(5-59).mkv
20 MB
03- Introduction to Incident Response/02-The-Incident-Response-Process-(14-04).mkv
35 MB
03- Introduction to Incident Response/03-Incident-Response--Preparation-(14-44).mkv
53 MB
03- Introduction to Incident Response/04-Incident-Response--Identification-(5-39).mkv
20 MB
03- Introduction to Incident Response/05-Incident-Response--Containment-(10-45).mkv
39 MB
03- Introduction to Incident Response/06-Incident-Response--Eradication-(6-05).mkv
23 MB
03- Introduction to Incident Response/07-Incident-Response--Recovery-(7-43).mkv
28 MB
03- Introduction to Incident Response/08-Incident-Response--Lessons-Learned-(5-15).mkv
19 MB
03- Introduction to Incident Response/09-The-OODA-Loop-(18-32).mkv
67 MB
03- Introduction to Incident Response/10-Incident-Response-vs.-Threat-Hunting-(11-39).mkv
34 MB
04- Introduction to Threat Hunting/01-Introduction-to-Threat-Hunting-(8-58).mkv
34 MB
04- Introduction to Threat Hunting/02-The-Argument-for-Threat-Hunting-(13-14).mkv
40 MB
04- Introduction to Threat Hunting/03-Threat-Hunting-Teams-(16-55).mkv
54 MB
04- Introduction to Threat Hunting/04-Threat-Hunting-Data-Sources-(19-30).mkv
63 MB
04- Introduction to Threat Hunting/05-The-Hunting-Maturity-Model-(HMM)-(20-00).mkv
52 MB
04- Introduction to Threat Hunting/06-Cyber-Threat-Intelligence-(6-22).mkv
26 MB
04- Introduction to Threat Hunting/07-The-Cyber-Kill-Chain-(16-52).mkv
40 MB
04- Introduction to Threat Hunting/08-The-MITRE-ATT&CK-Framework-(15-05).mkv
110 MB
04- Introduction to Threat Hunting/09-Exploring-MITRE-ATT&CK-(12-37).mkv
91 MB
04- Introduction to Threat Hunting/10-Structured-Threat-Hunting-(16-01).mkv
62 MB
04- Introduction to Threat Hunting/11-Unstructured-Threat-Hunting-(9-21).mkv
34 MB
04- Introduction to Threat Hunting/12-MITRE-ATT&CK-Navigator-(21-48).mkv
130 MB
04- Introduction to Threat Hunting/13-MITRE-ATT&CK-Navigator--Gap-Analysis-and-Threat-Hunting-(19-02).mkv
136 MB
05- Data Transformation/01-Data-Transformation-(5-36).mkv
17 MB
05- Data Transformation/02-Data-Transformation--Searching-(14-16).mkv
48 MB
05- Data Transformation/03-Searching-in-the-Command-Line-(19-19).mkv
48 MB
05- Data Transformation/04-Searching-in-PowerShell-(27-29).mkv
77 MB
05- Data Transformation/05-Searching-in-Splunk-(21-54).mkv
82 MB
05- Data Transformation/06-Data-Transformation--Aggregations-(9-24).mkv
32 MB
05- Data Transformation/07-Aggregations-in-the-Command-Line-(25-36).mkv
51 MB
05- Data Transformation/08-Aggregations-in-PowerShell-(10-24).mkv
29 MB
05- Data Transformation/09-Aggregations-in-Splunk-(34-43).mkv
108 MB
05- Data Transformation/10-Data-Transformation--Statistics-(9-38).mkv
34 MB
05- Data Transformation/11-Statistics-in-the-Command-Line-(22-04).mkv
34 MB
05- Data Transformation/12-Statistics-in-PowerShell-(13-24).mkv
24 MB
05- Data Transformation/13-Statistics-in-Splunk-(15-23).mkv
48 MB
05- Data Transformation/14-Data-Transformation--Visualizations-(5-00).mkv
22 MB
05- Data Transformation/15-Visualizations-in-Splunk-(25-31).mkv
75 MB
06- Understanding Anomalies/01-Understanding-Anomalies-(20-33).mkv
84 MB
06- Understanding Anomalies/02-Categorizing-Anomalies-(1-11).mkv
4.4 MB
06- Understanding Anomalies/03-Masquerading-(10-39).mkv
55 MB
06- Understanding Anomalies/04-Ambiguous-Identifiers-(11-13).mkv
50 MB
06- Understanding Anomalies/05-Frequency-&-Volume-Anomalies-(16-14).mkv
56 MB
06- Understanding Anomalies/06-Temporal-Anomalies-(14-53).mkv
50 MB
06- Understanding Anomalies/07-Location-&-Environment-Anomalies-(14-25).mkv
61 MB
06- Understanding Anomalies/08-Structure-&-Format-Anomalies-(16-16).mkv
78 MB
06- Understanding Anomalies/09-Obfuscated-PowerShell-Analysis-(6-34).mkv
28 MB
06- Understanding Anomalies/10-Entropy-Analysis-(4-56).mkv
15 MB
06- Understanding Anomalies/11-Alternate-Data-Stream-(ADS)-Analysis-(19-26).mkv
42 MB
06- Understanding Anomalies/12-Absence-&-Suppression-Anomalies-(7-57).mkv
34 MB
07- Dissecting Threat Reports/01-Dissecting-Threat-Reports-(18-54).mkv
83 MB
07- Dissecting Threat Reports/02-Breaking-Down-Attack-Steps-(5-05).mkv
22 MB
07- Dissecting Threat Reports/03-Mapping-Steps-to-Artifacts-(4-40).mkv
18 MB
07- Dissecting Threat Reports/04-Mapping-Artifacts-to-Evidence-Sources-(7-51).mkv
31 MB
07- Dissecting Threat Reports/05-Visualizing-with-MITRE-ATT&CK-Navigator-(4-34).mkv
28 MB
07- Dissecting Threat Reports/06-Intrusion-Analysis-Resources-(5-56).mkv
57 MB
08- Threat Hunting Lab/01-Tracing-an-Attack-Chain-(27-04).mkv
77 MB
08- Threat Hunting Lab/02-Hunting-Execution-Artifacts-(9-46).mkv
39 MB
08- Threat Hunting Lab/03-Hunting-PowerShell-Execution-(36-09).mkv
148 MB
08- Threat Hunting Lab/04-Hunting-Cmd-Execution-(20-20).mkv
85 MB
08- Threat Hunting Lab/05-Hunting-Process-Trees-(9-26).mkv
42 MB
08- Threat Hunting Lab/06-Hunting-Persistence-Artifacts-(7-33).mkv
36 MB
08- Threat Hunting Lab/07-Hunting-Persistence--Registry-Run-Keys-(17-20).mkv
78 MB
08- Threat Hunting Lab/08-Hunting-Persistence--Lookup-Tables-(27-30).mkv
100 MB
08- Threat Hunting Lab/09-Hunting-Defense-Evasion-Artifacts-(16-39).mkv
54 MB
08- Threat Hunting Lab/10-Hunting-Command-and-Control-(C2)-Artifacts-(7-40).mkv
28 MB
08- Threat Hunting Lab/11-Hunting-C2--Ingress-Tool-Transfer-(LOLBAS)-(7-35).mkv
19 MB
08- Threat Hunting Lab/12-Hunting-C2--Ingress-Tool-Transfer-(File-System-Events)-(12-57).mkv
51 MB
08- Threat Hunting Lab/13-Hunting-C2--Ingress-Tool-Transfer-(Network-Connection-Events)-(4-21).mkv
9.5 MB
08- Threat Hunting Lab/14-Hunting-Lateral-Movement-Artifacts-(8-27).mkv
27 MB
08- Threat Hunting Lab/15-Hunting-Lateral-Movement--PsExec-(Service-Creation)-(9-38).mkv
22 MB
08- Threat Hunting Lab/16-Hunting-Lateral-Movement--PsExec-(Reversing-Regex)-(14-25).mkv
32 MB
08- Threat Hunting Lab/17-Hunting-Lateral-Movement--PsExec-(Named-Pipes)-(4-12).mkv
14 MB
08- Threat Hunting Lab/18-Module-Recap-(5-46).mkv
18 MB
09- Collection at Scale/01-Introduction-to-Collection-(3-24).mkv
4.5 MB
09- Collection at Scale/02-Introduction-to-WMI-(11-11).mkv
46 MB
09- Collection at Scale/03-Collection-with-WMIC-(18-56).mkv
65 MB
09- Collection at Scale/04-WMIC-Collection-and-Filter-Examples-(5-51).mkv
16 MB
09- Collection at Scale/05-Remote-Collection-with-WMIC-(5-38).mkv
12 MB
09- Collection at Scale/06-Scripting-WMI-Collection-(10-31).mkv
27 MB
09- Collection at Scale/07-WMI-Automated-Collection-Frameworks-(6-57).mkv
24 MB
10- PowerShell 101/01-Introduction-to-PowerShell-(4-58).mkv
20 MB
10- PowerShell 101/02-PowerShell-101-(1-55).mkv
7.9 MB
10- PowerShell 101/03-PowerShell-101--Cmdlets-(6-09).mkv
18 MB
10- PowerShell 101/04-PowerShell-101--Aliases-(6-45).mkv
13 MB
10- PowerShell 101/05-PowerShell-101--Objects-and-the-Pipeline-(9-08).mkv
26 MB
10- PowerShell 101/06-PowerShell-101--Selecting,-Sorting,-and-Formatting-(17-35).mkv
47 MB
10- PowerShell 101/07 PowerShell 101 - Providers.mkv
40 MB
10- PowerShell 101/08 PowerShell 101 - Variables and Data Types.mkv
47 MB
10- PowerShell 101/09 PowerShell 101 - Control Flow.mkv
41 MB
10- PowerShell 101/10 Working with WMI and CIM.mkv
32 MB
11- PowerShell for Incident Response/01 Live Incident Response Using PowerShell.mkv
116 MB
11- PowerShell for Incident Response/02 PowerShell Remoting.mkv
24 MB
11- PowerShell for Incident Response/03 PS Remoting - One-to-One Remoting.mkv
26 MB
11- PowerShell for Incident Response/04 PS Remoting - One-to-Many Remoting.mkv
51 MB
11- PowerShell for Incident Response/05 PS Remoting - Script Execution at Scale.mkv
26 MB
11- PowerShell for Incident Response/06 PowerShell Authentication.mkv
34 MB
11- PowerShell for Incident Response/07 Malicious PowerShell Usage.mkv
43 MB
11- PowerShell for Incident Response/08 Introduction to the Kansa IR Framework.mkv
47 MB
11- PowerShell for Incident Response/09 Kansa - Modules.mkv
84 MB
11- PowerShell for Incident Response/10 Kansa - Remote Collection (Part 1).mkv
46 MB
11- PowerShell for Incident Response/11 Kansa - Remote Collection (Part 2).mkv
68 MB
11- PowerShell for Incident Response/12 Kansa - Collection Analysis.mkv
90 MB
11- PowerShell for Incident Response/13 Collection and Analysis Challenge.mkv
24 MB
11- PowerShell for Incident Response/14 Collection Analysis Challenge Walkthrough.mkv
362 MB
12- Conclusion/01 Course Wrap Up.mkv
16 MB