TorBT - Torrents and Magnet Links Search Engine

Blue Team Boot Camp Defending Against Hackers

File Name
Size
1. Introduction/1. Introduction.mp4
71 MB
1. Introduction/1. Introduction.srt
9.3 kB
1. Introduction/2. Security Principles.mp4
125 MB
1. Introduction/2. Security Principles.srt
18 kB
1. Introduction/3. DISCLAIMER.mp4
32 MB
2. Risk Analysis and Threat Intelligence/1. Risk Analysis.mp4
109 MB
2. Risk Analysis and Threat Intelligence/1. Risk Analysis.srt
14 kB
2. Risk Analysis and Threat Intelligence/2. Threat Intelligence.mp4
127 MB
2. Risk Analysis and Threat Intelligence/2. Threat Intelligence.srt
14 kB
2. Risk Analysis and Threat Intelligence/3. Asset Management.mp4
93 MB
2. Risk Analysis and Threat Intelligence/3. Asset Management.srt
13 kB
2. Risk Analysis and Threat Intelligence/4. Patch Management.mp4
60 MB
2. Risk Analysis and Threat Intelligence/4. Patch Management.srt
8.2 kB
2. Risk Analysis and Threat Intelligence/5. Security Policies.mp4
38 MB
2. Risk Analysis and Threat Intelligence/5. Security Policies.srt
5.1 kB
2. Risk Analysis and Threat Intelligence/6. Cyber Kill Chain.mp4
69 MB
2. Risk Analysis and Threat Intelligence/6. Cyber Kill Chain.srt
8.9 kB
3. Endpoint Security/1. Passwords.mp4
149 MB
3. Endpoint Security/1. Passwords.srt
18 kB
3. Endpoint Security/10. OSQuery.mp4
50 MB
3. Endpoint Security/10. OSQuery.srt
4.8 kB
3. Endpoint Security/11. PowerShell.mp4
181 MB
3. Endpoint Security/11. PowerShell.srt
20 kB
3. Endpoint Security/12. FIM in Windows.mp4
62 MB
3. Endpoint Security/12. FIM in Windows.srt
6.4 kB
3. Endpoint Security/13. HIDS in Windows.mp4
66 MB
3. Endpoint Security/13. HIDS in Windows.srt
6.1 kB
3. Endpoint Security/14. Quick Wins in Windows.mp4
73 MB
3. Endpoint Security/14. Quick Wins in Windows.srt
7.2 kB
3. Endpoint Security/15. Basic Linux Hardening.mp4
194 MB
3. Endpoint Security/15. Basic Linux Hardening.srt
26 kB
3. Endpoint Security/16. CIS Benchmarks (Linux).mp4
90 MB
3. Endpoint Security/16. CIS Benchmarks (Linux).srt
9.9 kB
3. Endpoint Security/17. Linux Fundamentals.mp4
186 MB
3. Endpoint Security/17. Linux Fundamentals.srt
25 kB
3. Endpoint Security/18. SELinux.mp4
156 MB
3. Endpoint Security/18. SELinux.srt
23 kB
3. Endpoint Security/19. ClamAV and Chkrootkit.mp4
46 MB
3. Endpoint Security/19. ClamAV and Chkrootkit.srt
6.1 kB
3. Endpoint Security/2. Application Whitelisting.mp4
204 MB
3. Endpoint Security/2. Application Whitelisting.srt
28 kB
3. Endpoint Security/20. Native Linux Firewalls.mp4
162 MB
3. Endpoint Security/20. Native Linux Firewalls.srt
30 kB
3. Endpoint Security/21. HIDS in Linux.mp4
19 MB
3. Endpoint Security/21. HIDS in Linux.srt
3.2 kB
3. Endpoint Security/22. FIM in Linux.mp4
178 MB
3. Endpoint Security/22. FIM in Linux.srt
26 kB
3. Endpoint Security/23. Lynis.mp4
29 MB
3. Endpoint Security/23. Lynis.srt
3.6 kB
3. Endpoint Security/24. MITRE ATT&CK.mp4
232 MB
3. Endpoint Security/24. MITRE ATT&CK.srt
25 kB
3. Endpoint Security/25. Golden Images.mp4
35 MB
3. Endpoint Security/25. Golden Images.srt
4.7 kB
3. Endpoint Security/26. Supply Chain Attacks.mp4
79 MB
3. Endpoint Security/26. Supply Chain Attacks.srt
9.5 kB
3. Endpoint Security/3. EDR.mp4
117 MB
3. Endpoint Security/3. EDR.srt
13 kB
3. Endpoint Security/4. Basic Windows Hardening.mp4
123 MB
3. Endpoint Security/4. Basic Windows Hardening.srt
17 kB
3. Endpoint Security/5. Windows Fundamentals.mp4
184 MB
3. Endpoint Security/5. Windows Fundamentals.srt
20 kB
3. Endpoint Security/6. Additional Windows Security Measures.mp4
156 MB
3. Endpoint Security/6. Additional Windows Security Measures.srt
18 kB
3. Endpoint Security/7. CIS Benchmarks (Windows 10).mp4
97 MB
3. Endpoint Security/7. CIS Benchmarks (Windows 10).srt
9.3 kB
3. Endpoint Security/8. Persistence.mp4
74 MB
3. Endpoint Security/8. Persistence.srt
8.0 kB
3. Endpoint Security/9. Basic WMI.mp4
78 MB
3. Endpoint Security/9. Basic WMI.srt
8.1 kB
4. Network Security/1. Firewalls.mp4
61 MB
4. Network Security/1. Firewalls.srt
6.9 kB
4. Network Security/10. DNS.mp4
164 MB
4. Network Security/10. DNS.srt
19 kB
4. Network Security/11. Password Spraying.mp4
98 MB
4. Network Security/11. Password Spraying.srt
9.1 kB
4. Network Security/12. Pass The Hash.mp4
92 MB
4. Network Security/12. Pass The Hash.srt
9.0 kB
4. Network Security/13. Critical Thinking Question.mp4
39 MB
4. Network Security/13. Critical Thinking Question.srt
4.5 kB
4. Network Security/2. Encryption.mp4
83 MB
4. Network Security/2. Encryption.srt
10 kB
4. Network Security/3. VLAN.mp4
50 MB
4. Network Security/3. VLAN.srt
5.8 kB
4. Network Security/4. IDS.mp4
412 MB
4. Network Security/4. IDS.srt
59 kB
4. Network Security/5. Packet Sniffer.mp4
46 MB
4. Network Security/5. Packet Sniffer.srt
5.4 kB
4. Network Security/6. Active Directory.mp4
321 MB
4. Network Security/6. Active Directory.srt
37 kB
4. Network Security/7. Proxy Servers.mp4
68 MB
4. Network Security/7. Proxy Servers.srt
8.4 kB
4. Network Security/8. Lateral Movement.mp4
131 MB
4. Network Security/8. Lateral Movement.srt
16 kB
4. Network Security/9. Command and Control.mp4
127 MB
4. Network Security/9. Command and Control.srt
12 kB
5. Log Aggregation and Correlation/1. Log Aggregation.mp4
73 MB
5. Log Aggregation and Correlation/1. Log Aggregation.srt
8.7 kB
5. Log Aggregation and Correlation/10. Additional Information.mp4
76 MB
5. Log Aggregation and Correlation/10. Additional Information.srt
9.1 kB
5. Log Aggregation and Correlation/2. Windows Logs.mp4
66 MB
5. Log Aggregation and Correlation/2. Windows Logs.srt
8.0 kB
5. Log Aggregation and Correlation/3. Linux Logs.mp4
52 MB
5. Log Aggregation and Correlation/3. Linux Logs.srt
6.3 kB
5. Log Aggregation and Correlation/4. Agent vs. Agentless.mp4
81 MB
5. Log Aggregation and Correlation/4. Agent vs. Agentless.srt
9.5 kB
5. Log Aggregation and Correlation/5. Shipping Logs.mp4
70 MB
5. Log Aggregation and Correlation/5. Shipping Logs.srt
7.5 kB
5. Log Aggregation and Correlation/6. Log Correlation.mp4
98 MB
5. Log Aggregation and Correlation/6. Log Correlation.srt
11 kB
5. Log Aggregation and Correlation/7. Incident Manager.mp4
22 MB
5. Log Aggregation and Correlation/7. Incident Manager.srt
2.3 kB
5. Log Aggregation and Correlation/8. General Workflow Example.mp4
14 MB
5. Log Aggregation and Correlation/8. General Workflow Example.srt
1.9 kB
5. Log Aggregation and Correlation/9. Aggregation and Correlation.mp4
49 MB
5. Log Aggregation and Correlation/9. Aggregation and Correlation.srt
5.4 kB