TorBT - Torrents and Magnet Links Search Engine
O’REILLY - Threat Intelligence and Threat Hunting
- Date: 2026-03-16
- Size: 15 GB
- Files: 91
File Name
Size
00001 Threat_Intelligence_and_Threat_Hunting_-_Introduction.mp4
43 MB
00002 Learning_objectives.mp4
23 MB
00003 1.1_What_is_Threat_Intelligence.mp4
701 MB
00004 1.2_Threat_Sources_-_Part_1.mp4
334 MB
00005 1.3_Threat_Sources_-_Part_2.mp4
170 MB
00006 1.4_Threat_Classifications.mp4
390 MB
00007 1.5_Cyber_Threat_Investigation_-_Part_1.mp4
438 MB
00008 1.6_Cyber_Threat_Investigation_-_Part_2.mp4
318 MB
00009 1.7_Social_Media_Graphs_-_Part_1.mp4
356 MB
00010 1.8_Social_Media_Graphs_-_Part_2.mp4
315 MB
00011 1.9_Log_Challenges_-_Part_1.mp4
358 MB
00012 1.10_Log_Challenges_-_Part_2.mp4
323 MB
00013 1.11_Advanced_Threat_Hunting_-_Part_1.mp4
293 MB
00014 1.12_Advanced_Threat_Hunting_-_Part_2.mp4
439 MB
00015 1.13_Endpoint_Detection.mp4
306 MB
00016 Learning_objectives.mp4
29 MB
00017 2.1_Attack_Frameworks_-_Part_1.mp4
292 MB
00018 2.2_Attack_Frameworks_-_Part_2.mp4
195 MB
00019 2.3_Threat_Research.mp4
122 MB
00020 2.4_Threat_Modeling_Methodologies_and_Threat_Intelligence_Sharing_with_Support_Functions.mp4
79 MB
00021 2.5_Wireless_Analysis_Techniques.mp4
151 MB
00022 Learning_objectives.mp4
18 MB
00023 3.1_Vulnerability_Identification_-_Part_1.mp4
431 MB
00024 3.2_Vulnerability_Identification_-_Part_2.mp4
120 MB
00025 3.3_Validation.mp4
303 MB
00026 3.4_Remediation_and_Mitigation_and_Inhibitors.mp4
67 MB
00027 3.5_Scanning_Parameters_and_Criteria.mp4
524 MB
00028 3.6_Vulnerability_Scanning_-_Part_1.mp4
208 MB
00029 3.7_Vulnerability_Scanning_-_Part_2.mp4
115 MB
00030 3.8_Enumeration.mp4
686 MB
00031 Learning_objectives.mp4
18 MB
00032 4.1_Understanding_Results.mp4
147 MB
00033 4.2_Web_Application_Scanners.mp4
31 MB
00034 4.3_Infrastructure_Vulnerability_Scanner.mp4
58 MB
00035 4.4_Software_Assessment_Tools_and_Techniques.mp4
19 MB
00036 4.5_Wireless_Assessment.mp4
65 MB
00037 4.6_Cloud_Infrastructure_Assessment.mp4
30 MB
00038 Learning_objectives.mp4
16 MB
00039 5.1_Mobile.mp4
82 MB
00040 5.2_Internet_of_Things_IoT_and_Embedded_Devices_-_Part_1.mp4
161 MB
00041 5.3_Internet_of_Things_IoT_and_Embedded_Devices_-_Part_2.mp4
384 MB
00042 5.4_APTs.mp4
201 MB
00043 5.5_Embedded_and_Real-Time_Operating_Systems_RTOS.mp4
149 MB
00044 5.6_SOC_and_FPGA.mp4
276 MB
00045 5.7_Physical_Access_Control.mp4
34 MB
00046 5.8_Building_Automation_Systems_Vehicles_and_Drones.mp4
205 MB
00047 5.9_Industrial_Control_Systems_ICS_and_Process_Automation.mp4
408 MB
00048 5.10_Defending_Critical_Infrastructure.mp4
355 MB
00049 5.11_Supervisory_Control_and_Data_Acquisition_SCADA_-_Part_1.mp4
327 MB
00050 5.12_Supervisory_Control_and_Data_Acquisition_SCADA_-_Part_2.mp4
368 MB
00051 5.13_Verifications_and_Quality_Controls.mp4
239 MB
00052 Learning_objectives.mp4
18 MB
00053 6.1_Cloud_Service_FaaS_and_Deployment_Models.mp4
71 MB
00054 6.2_IaC_Insecure_Applications.mp4
56 MB
00055 6.3_Application_Programming_Interface.mp4
91 MB
00056 6.4_Improper_Key_Management.mp4
118 MB
00057 6.5_Logging_and_Monitoring.mp4
227 MB
00058 Learning_objectives.mp4
19 MB
00059 7.1_Attack_Types_and_XML_Types.mp4
20 MB
00060 7.2_SQL_Attacks.mp4
27 MB
00061 7.3_Overflow_Attacks.mp4
32 MB
00062 7.4_Cross-Site_Scripting.mp4
222 MB
00063 7.5_Remote_Code_Execution.mp4
44 MB
00064 7.6_Directory_Traversal.mp4
40 MB
00065 7.7_Privilege_Escalation.mp4
280 MB
00066 7.8_Password_Spraying.mp4
43 MB
00067 7.9_Credential_Stuffing.mp4
8.2 MB
00068 7.10_Impersonation.mp4
12 MB
00069 7.11_On-path_and_Man-in-the-Middle.mp4
29 MB
00070 7.12_Session_Hijacking.mp4
17 MB
00071 Learning_objectives.mp4
16 MB
00072 8.1_Vulnerabilities_Improper_Error_Handling.mp4
57 MB
00073 8.2_Dereferencing.mp4
72 MB
00074 8.3_Insecure_Object_Reference.mp4
64 MB
00075 8.4_Race_Condition.mp4
212 MB
00076 8.5_Broker_Authentication.mp4
64 MB
00077 8.6_Sensitive_Data_Exposure.mp4
55 MB
00078 8.7_Insecure_Components.mp4
50 MB
00079 8.8_Insufficient_Logging_and_Monitoring.mp4
39 MB
00080 8.9_Weak_or_Default_Configurations.mp4
117 MB
00081 Learning_objectives.mp4
15 MB
00082 9.1_Event_Logs.mp4
32 MB
00083 9.2_Syslogs.mp4
132 MB
00084 9.3_Firewall_Logs.mp4
193 MB
00085 9.4_Web_Application_Firewall_WAF.mp4
172 MB
00086 9.5_Proxy.mp4
315 MB
00087 9.6_Intrusion_Detection_and_Prevention_IDS_IPS.mp4
204 MB
00088 9.7_Impact_Analysis.mp4
461 MB
00089 9.8_Organizations_Impact_vs._Localized_Impact.mp4
24 MB
00090 9.9_Immediate_vs._Total.mp4
17 MB
00091 Threat_Intelligence_and_Threat_Hunting_-_Summary.mp4
22 MB