TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - Soc Analyst Course - Detect, Analyze, Respond
- Date: 2026-04-15
- Size: 3.2 GB
- Files: 58
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction To SOC/1 - Introduction To Security Operation Center.mp4
14 MB
~Get Your Files Here !/1 - Introduction To SOC/2 - SOC Tools You Need to Defend.mp4
55 MB
~Get Your Files Here !/1 - Introduction To SOC/3 - Threats Handled by SOC Analyst.mp4
52 MB
~Get Your Files Here !/1 - Introduction To SOC/4 - Cyber Kill Chain Framework.mp4
16 MB
~Get Your Files Here !/1 - Introduction To SOC/5 - SOC Analyst Roles Duties.mp4
62 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/10 - Phishing Email Analysis Lab2 Part1.mp4
117 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/11 - Phishing Email Analysis Lab2 Part2.mp4
76 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/12 - Phishing Email Indicator of Compromise IOCs.mp4
60 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/13 - Malicious Email AttachmentsAnalysis.mp4
101 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/14 - Automated IOC Extraction from Phishing Email Part1.mp4
67 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/15 - Automated IOC Extraction from Phishing Email Part2.mp4
41 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/16 - Automated Malicious Shortcut LNK File Analysis.mp4
117 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/17 - Manual Malicious Shortcut LNK File Analysis.mp4
54 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/6 - Email Fundamentals.mp4
14 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/7 - Types Of Phishing Attack.mp4
30 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/8 - Phishing Analysis Lab Setup.mp4
39 MB
~Get Your Files Here !/2 - Phishing Email Fundamentals/9 - Practical Phishing Email Analysis Lab1.mp4
125 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/18 - Traffic Analysis Network Devices.mp4
39 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/19 - Malicious Traffic Analysis Tools.mp4
50 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/20 - Wireshark Basics Filtering Methods.mp4
73 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/21 - Agent Tesla Background Infection Chain.mp4
38 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/22 - Agent Tesla Malicious Traffic Analysis Lab 1.mp4
72 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/23 - Agent Tesla Traffic Analysis In Network Minor.mp4
102 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/24 - GOZI Trojan Malicious Traffic Analysis Lab2 Part 1.mp4
106 MB
~Get Your Files Here !/3 - Malicious Traffic Analysis C2 Identification/25 - GOZI Trojan Malicious Traffic Analysis Lab2 Part 2.mp4
84 MB
~Get Your Files Here !/4 - Intrusion Detection Prevention System IDS/26 - Intro to Intrusion Detection Prevention System.mp4
50 MB
~Get Your Files Here !/4 - Intrusion Detection Prevention System IDS/27 - Snort Network Intrusion Detection Prevention System.mp4
26 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/28 - Introduction to EDR.mp4
31 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/29 - Endpoint Security Monitoring.mp4
48 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/30 - Important Windows Core Artifacts Part1.mp4
137 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/31 - Important Windows Core Artifacts Part2.mp4
54 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/32 - Windows Event Logs.mp4
36 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/33 - Windows Scheduled Task.mp4
50 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/34 - Windows Persistence.mp4
74 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/35 - Introduction to Sysmon.mp4
32 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/36 - Sysmon Installation.mp4
19 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/37 - Powershell Activity Sysmon Detetction Lab 1.mp4
78 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/38 - Wazuh For Endpoint Detection Response.mp4
35 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/39 - Wazuh EDR Setup Installation.mp4
41 MB
~Get Your Files Here !/5 - Endpoint Detection Response EDR/40 - Wazuh EDR Agent Installation on Endpoint.mp4
25 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/41 - Introduction to Threat Intelligence.mp4
18 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/42 - Cyber Threat Intelligence Framework.mp4
71 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/43 - Cyber Threat Intelligence Lifecycle.mp4
41 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/44 - Pyramid of Pain.mp4
40 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/45 - MITRE ATTCK Basic.mp4
41 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/46 - What is MITRE ATTCK Navigator.mp4
73 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/47 - MITRE ATTCK Navigator Lab 1.mp4
50 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/48 - Advanced Persistent Threat APT TTPs.mp4
126 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/49 - Yara Rules For Malware Detection.mp4
29 MB
~Get Your Files Here !/6 - Threat Intelligence Hunting/50 - Writing Yara Rule For WannaCry Ransomware Lab 1.mp4
70 MB
~Get Your Files Here !/7 - Security Information Event Management SIEM/51 - Intro to Security Information Event Management SIEM.mp4
25 MB
~Get Your Files Here !/7 - Security Information Event Management SIEM/52 - SIEM Capabilities.mp4
16 MB
~Get Your Files Here !/7 - Security Information Event Management SIEM/53 - Splunk Dashboard Basics.mp4
27 MB
~Get Your Files Here !/7 - Security Information Event Management SIEM/54 - Splunk Search Processing Language.mp4
40 MB
~Get Your Files Here !/7 - Security Information Event Management SIEM/55 - Ransomware Attack Investigation via Splunk Lab Part1.mp4
114 MB
~Get Your Files Here !/7 - Security Information Event Management SIEM/56 - Ransomware Attack Investigation via Splunk Lab Part2.mp4
112 MB
~Get Your Files Here !/Bonus Resources.txt
70 B