TorBT - Torrents and Magnet Links Search Engine
Udemy - Cyber Security SOC Analyst Training - SIEM (Splunk) (11.2024)
- Date: 2025-12-12
- Size: 35 GB
- Files: 196
File Name
Size
01 - Course Introduction/001 1. Cyber Security Analyst - Intro to Course Content.mp4
390 MB
01 - Course Introduction/001 1. Cyber Security Analyst - Intro to Course Content.srt
86 kB
02 - Networking Concepts/001 Introduction to organization Network.mp4
578 MB
02 - Networking Concepts/001 Introduction to organization Network.srt
102 kB
02 - Networking Concepts/002 Introduction to organization Network.mp4
222 MB
02 - Networking Concepts/002 Introduction to organization Network.srt
40 kB
02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics.mp4
329 MB
02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics.srt
62 kB
02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics.mp4
343 MB
02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics.srt
79 kB
02 - Networking Concepts/004 Resource-File.txt
126 B
02 - Networking Concepts/004 Resources-and-Notes.url
100 B
02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range.mp4
585 MB
02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range.srt
127 kB
02 - Networking Concepts/005 Resources-and-Notes.url
100 B
02 - Networking Concepts/006 Introduction to web technology.mp4
451 MB
02 - Networking Concepts/006 Introduction to web technology.srt
73 kB
02 - Networking Concepts/007 Understanding HTTP protocol Part 1.mp4
853 MB
02 - Networking Concepts/007 Understanding HTTP protocol Part 1.srt
118 kB
02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1.mp4
674 MB
02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1.srt
121 kB
02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.mp4
702 MB
02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.srt
151 kB
02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions.mp4
420 MB
02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions.srt
92 kB
02 - Networking Concepts/011 Windows OS - Computer Management, Utilities.mp4
374 MB
02 - Networking Concepts/011 Windows OS - Computer Management, Utilities.srt
99 kB
02 - Networking Concepts/012 Indept on Port Numbers - Part 1.mp4
674 MB
02 - Networking Concepts/012 Indept on Port Numbers - Part 1.srt
121 kB
02 - Networking Concepts/013 Indept on Port Numbers - Part 2.mp4
454 MB
02 - Networking Concepts/013 Indept on Port Numbers - Part 2.srt
88 kB
02 - Networking Concepts/external-links.txt
210 B
03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing.mp4
698 MB
03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing.srt
178 kB
03 - Cyber Security Concepts/002 Defence InDeapth Approach.mp4
730 MB
03 - Cyber Security Concepts/002 Defence InDeapth Approach.srt
141 kB
03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4.mp4
222 MB
03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4.srt
90 kB
03 - Cyber Security Concepts/004 Brute Force Attack and Types.mp4
437 MB
03 - Cyber Security Concepts/004 Brute Force Attack and Types.srt
100 kB
03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks.mp4
260 MB
03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks.srt
71 kB
03 - Cyber Security Concepts/006 OWASP Top 10.mp4
1.1 GB
03 - Cyber Security Concepts/006 OWASP Top 10.srt
204 kB
03 - Cyber Security Concepts/007 DNS Tunneling Attack.mp4
180 MB
03 - Cyber Security Concepts/007 DNS Tunneling Attack.srt
74 kB
03 - Cyber Security Concepts/008 Malware and its Types.mp4
290 MB
03 - Cyber Security Concepts/008 Malware and its Types.srt
62 kB
04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation.mp4
552 MB
04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation.srt
149 kB
04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation.mp4
417 MB
04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation.srt
113 kB
04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk.mp4
497 MB
04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk.srt
104 kB
04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process.mp4
465 MB
04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process.srt
116 kB
04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities.mp4
508 MB
04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities.srt
138 kB
04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture.mp4
904 MB
04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture.srt
202 kB
05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis.mp4
715 MB
05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis.srt
161 kB
05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs.mp4
683 MB
05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs.srt
124 kB
05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1.mp4
867 MB
05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1.srt
156 kB
05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2.mp4
506 MB
05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2.srt
120 kB
05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis.mp4
546 MB
05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis.srt
122 kB
05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1.mp4
589 MB
05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1.srt
135 kB
05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2.mp4
396 MB
05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2.srt
128 kB
05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs.mp4
1.2 GB
05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs.srt
175 kB
05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1.mp4
526 MB
05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1.srt
66 kB
05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2.mp4
584 MB
05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2.srt
105 kB
05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Antivirus Logs.mp4
1.0 GB
05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Antivirus Logs.srt
250 kB
05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Log.mp4
852 MB
05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Log.srt
147 kB
05 - Understanding Various Logs, Dashboard and Alert creations/013 Understanding Windows Event IDs.mp4
1.1 GB
05 - Understanding Various Logs, Dashboard and Alert creations/013 Understanding Windows Event IDs.srt
204 kB
05 - Understanding Various Logs, Dashboard and Alert creations/013 Windows-Events.docx
8.1 kB
05 - Understanding Various Logs, Dashboard and Alert creations/014 Windows Sysmon Log Analysis.mp4
881 MB
05 - Understanding Various Logs, Dashboard and Alert creations/014 Windows Sysmon Log Analysis.srt
132 kB
06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1.mp4
617 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1.srt
121 kB
06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2.mp4
779 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2.srt
99 kB
06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3.mp4
538 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3.srt
87 kB
06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis.mp4
639 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis.srt
128 kB
06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages.mp4
931 MB
06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages.srt
130 kB
07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server.mp4
1002 MB
07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server.srt
166 kB
07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack.mp4
1.2 GB
07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack.srt
158 kB
07 - Introduction to threat Hunting/003 Email Header Analysis.mp4
630 MB
07 - Introduction to threat Hunting/003 Email Header Analysis.srt
90 kB
08 - Networking and Security Interview Questions/001 what are networking devices.mp4
11 MB
08 - Networking and Security Interview Questions/001 what are networking devices.srt
7.5 kB
08 - Networking and Security Interview Questions/002 what is P address and IP address classification.mp4
72 MB
08 - Networking and Security Interview Questions/002 what is P address and IP address classification.srt
26 kB
08 - Networking and Security Interview Questions/003 What is NAT and PAT.mp4
49 MB
08 - Networking and Security Interview Questions/003 What is NAT and PAT.srt
19 kB
08 - Networking and Security Interview Questions/004 Tell me few port numbers which you know.mp4
40 MB
08 - Networking and Security Interview Questions/004 Tell me few port numbers which you know.srt
27 kB
08 - Networking and Security Interview Questions/005 How a Firewall Works.mp4
4.9 MB
08 - Networking and Security Interview Questions/005 How a Firewall Works.srt
3.4 kB
08 - Networking and Security Interview Questions/006 How VPN works.mp4
8.6 MB
08 - Networking and Security Interview Questions/006 How VPN works.srt
6.7 kB
08 - Networking and Security Interview Questions/007 What is Symmetric and Asymmetric Encryption.mp4
137 MB
08 - Networking and Security Interview Questions/007 What is Symmetric and Asymmetric Encryption.srt
27 kB
08 - Networking and Security Interview Questions/008 Explain CIA triad.mp4
28 MB
08 - Networking and Security Interview Questions/008 Explain CIA triad.srt
18 kB
08 - Networking and Security Interview Questions/009 What is the difference in between SSL and HTTPS.mp4
16 MB
08 - Networking and Security Interview Questions/009 What is the difference in between SSL and HTTPS.srt
3.1 kB
08 - Networking and Security Interview Questions/010 How do you stay up to date on Cyber Security news and latest attacks.mp4
114 MB
08 - Networking and Security Interview Questions/010 How do you stay up to date on Cyber Security news and latest attacks.srt
15 kB
08 - Networking and Security Interview Questions/011 What is the difference between Virus and Warm.mp4
9.0 MB
08 - Networking and Security Interview Questions/011 What is the difference between Virus and Warm.srt
4.3 kB
08 - Networking and Security Interview Questions/012 Explain SQL Injection Attack.mp4
38 MB
08 - Networking and Security Interview Questions/012 Explain SQL Injection Attack.srt
12 kB
08 - Networking and Security Interview Questions/013 What is botnet.mp4
28 MB
08 - Networking and Security Interview Questions/013 What is botnet.srt
6.7 kB
08 - Networking and Security Interview Questions/014 What is Brute Force Attack.mp4
109 MB
08 - Networking and Security Interview Questions/014 What is Brute Force Attack.srt
29 kB
08 - Networking and Security Interview Questions/015 SIEM related interview topics.mp4
182 MB
08 - Networking and Security Interview Questions/015 SIEM related interview topics.srt
109 kB
09 - SIEM Interview Questions and Answers/001 SIEM Dashboard and Use cases.mp4
564 MB
09 - SIEM Interview Questions and Answers/001 SIEM Dashboard and Use cases.srt
135 kB
09 - SIEM Interview Questions and Answers/002 What are different event logs you analyze.mp4
163 MB
09 - SIEM Interview Questions and Answers/002 What are different event logs you analyze.srt
24 kB
10 - SOC Process Interview Questions and Day to Day Activities/001 What is Security Operation Center.mp4
22 MB
10 - SOC Process Interview Questions and Day to Day Activities/001 What is Security Operation Center.srt
14 kB
10 - SOC Process Interview Questions and Day to Day Activities/002 2-Org-Architecture.png
79 kB
10 - SOC Process Interview Questions and Day to Day Activities/002 What are various Security Devices used in your orrganization.mp4
85 MB
10 - SOC Process Interview Questions and Day to Day Activities/002 What are various Security Devices used in your orrganization.srt
56 kB
10 - SOC Process Interview Questions and Day to Day Activities/003 3-SOC-Team-Architecture.png
64 kB
10 - SOC Process Interview Questions and Day to Day Activities/003 How does a SOC Team manage or work in an Organization.mp4
50 MB
10 - SOC Process Interview Questions and Day to Day Activities/003 How does a SOC Team manage or work in an Organization.srt
39 kB
10 - SOC Process Interview Questions and Day to Day Activities/004 4-Roles-and-Responsibilities.png
61 kB
10 - SOC Process Interview Questions and Day to Day Activities/004 What are the Roles and Responsibilities of SOC Engineer.mp4
70 MB
10 - SOC Process Interview Questions and Day to Day Activities/004 What are the Roles and Responsibilities of SOC Engineer.srt
45 kB
10 - SOC Process Interview Questions and Day to Day Activities/005 6-SOC-Incident-Document.png
176 kB
10 - SOC Process Interview Questions and Day to Day Activities/005 What are the fields in Sample Incident Ticket - ServiceNow.mp4
80 MB
10 - SOC Process Interview Questions and Day to Day Activities/005 What are the fields in Sample Incident Ticket - ServiceNow.srt
34 kB
10 - SOC Process Interview Questions and Day to Day Activities/006 7-SLA-Service-Level-Agreements.png
24 kB
10 - SOC Process Interview Questions and Day to Day Activities/006 what are Service level Agreements for the SOC Incidents.mp4
16 MB
10 - SOC Process Interview Questions and Day to Day Activities/006 what are Service level Agreements for the SOC Incidents.srt
14 kB
10 - SOC Process Interview Questions and Day to Day Activities/007 8-False-Positive.png
26 kB
10 - SOC Process Interview Questions and Day to Day Activities/007 What is False Positive Analysis or what are various outcomes of Analysis.mp4
39 MB
10 - SOC Process Interview Questions and Day to Day Activities/007 What is False Positive Analysis or what are various outcomes of Analysis.srt
22 kB
10 - SOC Process Interview Questions and Day to Day Activities/008 9-No-of-Logs-Received.png
24 kB
10 - SOC Process Interview Questions and Day to Day Activities/008 How many Logs sources are there in your organization.mp4
18 MB
10 - SOC Process Interview Questions and Day to Day Activities/008 How many Logs sources are there in your organization.srt
11 kB
10 - SOC Process Interview Questions and Day to Day Activities/009 10-Incident-Life-cycle.png
12 kB
10 - SOC Process Interview Questions and Day to Day Activities/009 What are the steps in Incident Response Life Cycle.mp4
148 MB
10 - SOC Process Interview Questions and Day to Day Activities/009 What are the steps in Incident Response Life Cycle.srt
32 kB
10 - SOC Process Interview Questions and Day to Day Activities/010 11-SOC-Analysis-IR-FlowChart.png
48 kB
10 - SOC Process Interview Questions and Day to Day Activities/010 Can you please explain what you will do after getting an alert (Alert IR FLow).mp4
148 MB
10 - SOC Process Interview Questions and Day to Day Activities/010 Can you please explain what you will do after getting an alert (Alert IR FLow).srt
32 kB
10 - SOC Process Interview Questions and Day to Day Activities/011 12-SOC-Shift-Handover-Document.png
22 kB
10 - SOC Process Interview Questions and Day to Day Activities/011 How will you manage work in shifts.mp4
37 MB
10 - SOC Process Interview Questions and Day to Day Activities/011 How will you manage work in shifts.srt
16 kB
11 - SIEM Alert Analysis Interview Questions/001 12-SOC-Shift-Handover-Document.png
22 kB
11 - SIEM Alert Analysis Interview Questions/001 How do you handle P1, P2, P3 and P4 Incidents.mp4
32 MB
11 - SIEM Alert Analysis Interview Questions/001 How do you handle P1, P2, P3 and P4 Incidents.srt
21 kB
11 - SIEM Alert Analysis Interview Questions/002 15-Malware2.png
198 kB
11 - SIEM Alert Analysis Interview Questions/002 what will you do if receive a Malware Attack Alert.mp4
279 MB
11 - SIEM Alert Analysis Interview Questions/002 what will you do if receive a Malware Attack Alert.srt
45 kB
11 - SIEM Alert Analysis Interview Questions/003 Brute-Force-2-1.png
233 kB
11 - SIEM Alert Analysis Interview Questions/003 How do you analyze if receive a Brute Force Attack Alert.mp4
78 MB
11 - SIEM Alert Analysis Interview Questions/003 How do you analyze if receive a Brute Force Attack Alert.srt
29 kB
11 - SIEM Alert Analysis Interview Questions/004 How do you analyze Phishing email attack.mp4
358 MB
11 - SIEM Alert Analysis Interview Questions/004 How do you analyze Phishing email attack.srt
54 kB
11 - SIEM Alert Analysis Interview Questions/004 Phishing-Attack-Analysis.png
147 kB
11 - SIEM Alert Analysis Interview Questions/005 How do you Analyze SQL Injection attack.mp4
213 MB
11 - SIEM Alert Analysis Interview Questions/005 How do you Analyze SQL Injection attack.srt
26 kB
11 - SIEM Alert Analysis Interview Questions/005 sql-injection.png
175 kB
11 - SIEM Alert Analysis Interview Questions/006 DDOS-Analysis.png
148 kB
11 - SIEM Alert Analysis Interview Questions/006 How do you analyze DDOS Attack.mp4
76 MB
11 - SIEM Alert Analysis Interview Questions/006 How do you analyze DDOS Attack.srt
23 kB
11 - SIEM Alert Analysis Interview Questions/007 How do you analyze if a suspicious IP detected in outbound traffic.mp4
22 MB
11 - SIEM Alert Analysis Interview Questions/007 How do you analyze if a suspicious IP detected in outbound traffic.srt
6.2 kB
11 - SIEM Alert Analysis Interview Questions/007 Suspecious-IP-outbound.png
109 kB
12 - Discussion on Real Time Activities/001 Discussion on Real Time Activities.mp4
704 MB
12 - Discussion on Real Time Activities/001 Discussion on Real Time Activities.srt
126 kB
13 - Course wrapup/001 Course Wrapup.mp4
491 MB
13 - Course wrapup/001 Course Wrapup.srt
85 kB