TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Advanced Intrusion Detection by InfoSec
- Date: 2026-04-24
- Size: 848 MB
- Files: 62
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01 - Introduction/01 - Introduction to advanced intrusion detection.mp4
7.0 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to advanced intrusion detection.srt
7.6 kB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/01 - What is intrusion detection.mp4
25 MB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/01 - What is intrusion detection.srt
21 kB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/02 - Detection methodology.mp4
21 MB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/02 - Detection methodology.srt
21 kB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/03 - Types of intrusion detection.mp4
23 MB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/03 - Types of intrusion detection.srt
19 kB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/04 - Intrusion detection requirements.mp4
25 MB
~Get Your Files Here !/02 - 1. Intrusion Detection Techniques and Methods/04 - Intrusion detection requirements.srt
22 kB
~Get Your Files Here !/03 - 2. Home Lab Setup/01 - Detection lab overview.mp4
34 MB
~Get Your Files Here !/03 - 2. Home Lab Setup/01 - Detection lab overview.srt
37 kB
~Get Your Files Here !/03 - 2. Home Lab Setup/02 - Lab use cases.mp4
9.6 MB
~Get Your Files Here !/03 - 2. Home Lab Setup/02 - Lab use cases.srt
11 kB
~Get Your Files Here !/03 - 2. Home Lab Setup/03 - Tools and technology.mp4
32 MB
~Get Your Files Here !/03 - 2. Home Lab Setup/03 - Tools and technology.srt
20 kB
~Get Your Files Here !/03 - 2. Home Lab Setup/04 - Documentation.mp4
14 MB
~Get Your Files Here !/03 - 2. Home Lab Setup/04 - Documentation.srt
13 kB
~Get Your Files Here !/03 - 2. Home Lab Setup/05 - Intro to building a security lab.mp4
6.9 MB
~Get Your Files Here !/03 - 2. Home Lab Setup/05 - Intro to building a security lab.srt
8.2 kB
~Get Your Files Here !/03 - 2. Home Lab Setup/06 - VirtualBox installation.mp4
41 MB
~Get Your Files Here !/03 - 2. Home Lab Setup/06 - VirtualBox installation.srt
22 kB
~Get Your Files Here !/03 - 2. Home Lab Setup/07 - Set up and provision Security Onion.mp4
17 MB
~Get Your Files Here !/03 - 2. Home Lab Setup/07 - Set up and provision Security Onion.srt
16 kB
~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/01 - Network-based vs. host-based.mp4
28 MB
~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/01 - Network-based vs. host-based.srt
26 kB
~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/02 - IDS and IPS rules.mp4
34 MB
~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/02 - IDS and IPS rules.srt
30 kB
~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/03 - Wazuh (HIDS overview).mp4
19 MB
~Get Your Files Here !/04 - 3. Network-Based vs. Host-Based Detection/03 - Wazuh (HIDS overview).srt
12 kB
~Get Your Files Here !/05 - 4. Anomaly Detection/01 - Anomaly detection overview.mp4
22 MB
~Get Your Files Here !/05 - 4. Anomaly Detection/01 - Anomaly detection overview.srt
20 kB
~Get Your Files Here !/05 - 4. Anomaly Detection/02 - Anomaly detection techniques.mp4
32 MB
~Get Your Files Here !/05 - 4. Anomaly Detection/02 - Anomaly detection techniques.srt
27 kB
~Get Your Files Here !/05 - 4. Anomaly Detection/03 - Issues with anomaly detection.mp4
11 MB
~Get Your Files Here !/05 - 4. Anomaly Detection/03 - Issues with anomaly detection.srt
10 kB
~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/01 - What is the ATT&CK Matrix.mp4
26 MB
~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/01 - What is the ATT&CK Matrix.srt
26 kB
~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/02 - Adversary tactics, techniques, and procedures (TTPs).mp4
46 MB
~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/02 - Adversary tactics, techniques, and procedures (TTPs).srt
20 kB
~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/03 - Leveraging threat intelligence.mp4
40 MB
~Get Your Files Here !/06 - 5. The ATT&CK Matrix and Threat Intel/03 - Leveraging threat intelligence.srt
20 kB
~Get Your Files Here !/07 - 6. Data Management/01 - Data management overview.mp4
47 MB
~Get Your Files Here !/07 - 6. Data Management/01 - Data management overview.srt
49 kB
~Get Your Files Here !/07 - 6. Data Management/02 - Data collection methods.mp4
15 MB
~Get Your Files Here !/07 - 6. Data Management/02 - Data collection methods.srt
16 kB
~Get Your Files Here !/07 - 6. Data Management/03 - Data mover example.mp4
56 MB
~Get Your Files Here !/07 - 6. Data Management/03 - Data mover example.srt
39 kB
~Get Your Files Here !/07 - 6. Data Management/04 - Data science and cybersecurity.mp4
24 MB
~Get Your Files Here !/07 - 6. Data Management/04 - Data science and cybersecurity.srt
24 kB
~Get Your Files Here !/08 - 7. Tactical Data/01 - Detection life cycle.mp4
31 MB
~Get Your Files Here !/08 - 7. Tactical Data/01 - Detection life cycle.srt
34 kB
~Get Your Files Here !/08 - 7. Tactical Data/02 - Data dictionary and data models.mp4
30 MB
~Get Your Files Here !/08 - 7. Tactical Data/02 - Data dictionary and data models.srt
26 kB
~Get Your Files Here !/08 - 7. Tactical Data/03 - Crafting detections.mp4
55 MB
~Get Your Files Here !/08 - 7. Tactical Data/03 - Crafting detections.srt
42 kB
~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/01 - What is cyber deception.mp4
29 MB
~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/01 - What is cyber deception.srt
28 kB
~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/02 - Honeypot usage.mp4
47 MB
~Get Your Files Here !/09 - 8. Advanced Detection through Deception Technology/02 - Honeypot usage.srt
36 kB
~Get Your Files Here !/Bonus Resources.txt
70 B