Cyber Security SOC Analyst Training SIEM Splunk 2022 Udemy

File Type Create Time File Size Seeders Leechers Updated
Movie 2023-04-28 34.44GB 0 1 3 days ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
Cyber  Security  SOC  Analyst  Training  SIEM  Splunk  2022  Udemy  
Related Torrents
  1. Cyber Security - SOC Analyst Interview Question and Answers 6.92GB
  2. [ DevCourseWeb.com ] Udemy - Sc-200 - Microsoft Security Operations Analyst Training 606.75MB
  3. [ FreeCourseWeb.com ] Udemy - Security (SOC) Analyst Interview Questions and Answers.zip 635.86MB
  4. [ FreeCourseWeb com ] Udemy Security (SOC) Analyst Interview Questions and Answers - Downloader.exe 782.95KB
  5. [ DevCourseWeb.com ] Udemy - Cyber Security - Beginner's Training Guide to Online Safety! 529.61MB
  6. [FreeTutorials.Eu] [UDEMY] SOC Analyst Cyber Security Intrusion Training from Scratch - [FTU] 4.33GB
  7. [ DevCourseWeb.com ] Udemy - The Complete Cyber Security Awareness Training 2024 2.72GB
  8. SOC Analyst Cyber Security Intrusion Training from Scratch 4.28GB
  9. [ DevCourseWeb.com ] Udemy - SOC (Cyber Security) Analyst Interview Question - Answers 858.30MB
  10. Udemy - The Complete Cyber Security Course - Network Security 3.16GB
Files
  1. 01 - Course Introduction/1. Cyber Security Analyst - Intro to Course Content.mp4 389.50MB
  2. 01 - Course Introduction/1. Cyber Security Analyst - Intro to Course Content.vtt 66.58KB
  3. 02 - Networking Concepts/001 Introduction to organization Network.mp4 577.46MB
  4. 02 - Networking Concepts/001 Introduction to organization Network_en.vtt 71.78KB
  5. 02 - Networking Concepts/002 Introduction to organization Network.mp4 221.94MB
  6. 02 - Networking Concepts/002 Introduction to organization Network_en.vtt 28.32KB
  7. 02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics.mp4 329.43MB
  8. 02 - Networking Concepts/003 ISO Model - Application and Presentation Layer Basics_en.vtt 44.43KB
  9. 02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics.mp4 364.93MB
  10. 02 - Networking Concepts/004 ISO Model - Session, Transport, Network and DataLink Layer Basics_en.vtt 56.49KB
  11. 02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range.mp4 662.66MB
  12. 02 - Networking Concepts/005 ISO Model Recap AND PublicPrivate Address Range_en.vtt 92.02KB
  13. 02 - Networking Concepts/006 Introduction to web technology.mp4 451.38MB
  14. 02 - Networking Concepts/006 Introduction to web technology_en.vtt 52.05KB
  15. 02 - Networking Concepts/007 Understanding HTTP protocol Part 1.mp4 853.42MB
  16. 02 - Networking Concepts/007 Understanding HTTP protocol Part 1_en.vtt 81.97KB
  17. 02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1.mp4 711.57MB
  18. 02 - Networking Concepts/008 Understanding HTTP Part 2 and Understanding Service Ports Part 1_en.vtt 91.23KB
  19. 02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.mp4 747.33MB
  20. 02 - Networking Concepts/009 Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services_en.vtt 106.42KB
  21. 02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions.mp4 445.89MB
  22. 02 - Networking Concepts/010 Introduction to Windows - Types of Wiondows OS and Permissions_en.vtt 61.77KB
  23. 02 - Networking Concepts/011 Windows OS - Computer Management, Utilities.mp4 469.70MB
  24. 02 - Networking Concepts/011 Windows OS - Computer Management, Utilities_en.vtt 82.94KB
  25. 02 - Networking Concepts/012 Indept on Port Numbers - Part 1.mp4 711.60MB
  26. 02 - Networking Concepts/012 Indept on Port Numbers - Part 1_en.vtt 91.23KB
  27. 02 - Networking Concepts/013 Indept on Port Numbers - Part 2.mp4 480.32MB
  28. 02 - Networking Concepts/013 Indept on Port Numbers - Part 2_en.vtt 63.34KB
  29. 03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing.mp4 698.04MB
  30. 03 - Cyber Security Concepts/001 Introduction to Security CIA Encryption and Hashing_en.vtt 127.62KB
  31. 03 - Cyber Security Concepts/002 Defence InDeapth Approach.mp4 770.13MB
  32. 03 - Cyber Security Concepts/002 Defence InDeapth Approach_en.vtt 102.66KB
  33. 03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4.mp4 386.53MB
  34. 03 - Cyber Security Concepts/003 Cyber Kill chain OR Phases of Attack.mp4_en.vtt 62.63KB
  35. 03 - Cyber Security Concepts/004 Brute Force Attack and Types.mp4 469.38MB
  36. 03 - Cyber Security Concepts/004 Brute Force Attack and Types_en.vtt 71.06KB
  37. 03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks.mp4 284.32MB
  38. 03 - Cyber Security Concepts/005 Phishing and Spoofing Attacks_en.vtt 51.67KB
  39. 03 - Cyber Security Concepts/006 DNS Tunneling Attack.mp4 309.00MB
  40. 03 - Cyber Security Concepts/006 DNS Tunneling Attack_en.vtt 53.68KB
  41. 03 - Cyber Security Concepts/007 Malware and its Types.mp4 309.38MB
  42. 03 - Cyber Security Concepts/007 Malware and its Types_en.vtt 44.58KB
  43. 03 - Cyber Security Concepts/008 OWASP Top 10.mp4 1.16GB
  44. 03 - Cyber Security Concepts/008 OWASP Top 10_en.vtt 150.46KB
  45. 04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation.mp4 600.13MB
  46. 04 - Understanding Splunk, SIEM and SOC Process/001 Splunk installation_en.vtt 105.34KB
  47. 04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation.mp4 475.67MB
  48. 04 - Understanding Splunk, SIEM and SOC Process/002 Splunk Universal Farward Installation_en.vtt 80.65KB
  49. 04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk.mp4 522.79MB
  50. 04 - Understanding Splunk, SIEM and SOC Process/003 Introduction to Splunk_en.vtt 70.32KB
  51. 04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process.mp4 519.37MB
  52. 04 - Understanding Splunk, SIEM and SOC Process/004 SOC Process_en.vtt 83.26KB
  53. 04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities.mp4 639.12MB
  54. 04 - Understanding Splunk, SIEM and SOC Process/005 SOC Roles and Responsabilities_en.vtt 100.58KB
  55. 04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture.mp4 963.14MB
  56. 04 - Understanding Splunk, SIEM and SOC Process/006 SIEM Architecture_en.vtt 148.16KB
  57. 05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis.mp4 759.33MB
  58. 05 - Understanding Various Logs, Dashboard and Alert creations/001 Uploading Demo Logs to Splunk and firewall Log analysis_en.vtt 108.80KB
  59. 05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs.mp4 710.86MB
  60. 05 - Understanding Various Logs, Dashboard and Alert creations/002 Understanding Firewall Logs_en.vtt 81.16KB
  61. 05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1.mp4 909.80MB
  62. 05 - Understanding Various Logs, Dashboard and Alert creations/003 Splunk Dashboard creation - Firewall Part 1_en.vtt 102.08KB
  63. 05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2.mp4 543.55MB
  64. 05 - Understanding Various Logs, Dashboard and Alert creations/004 Splunk Dashboard creation - Firewall Part 2_en.vtt 82.16KB
  65. 05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis.mp4 582.35MB
  66. 05 - Understanding Various Logs, Dashboard and Alert creations/005 IDS Log Analysis_en.vtt 78.61KB
  67. 05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1.mp4 889.69MB
  68. 05 - Understanding Various Logs, Dashboard and Alert creations/006 DNS Profiling Scenarios Part 1_en.vtt 93.73KB
  69. 05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2.mp4 941.54MB
  70. 05 - Understanding Various Logs, Dashboard and Alert creations/007 DNS Profiling Scenarios Part 2_en.vtt 89.09KB
  71. 05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs.mp4 1.25GB
  72. 05 - Understanding Various Logs, Dashboard and Alert creations/008 Understanding DNS Logs_en.vtt 120.11KB
  73. 05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1.mp4 535.66MB
  74. 05 - Understanding Various Logs, Dashboard and Alert creations/009 Understanding HTTP Logs Part 1_en.vtt 44.45KB
  75. 05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2.mp4 614.99MB
  76. 05 - Understanding Various Logs, Dashboard and Alert creations/010 Understanding HTTP Logs Part 2_en.vtt 70.50KB
  77. 05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Windows Log.mp4 891.37MB
  78. 05 - Understanding Various Logs, Dashboard and Alert creations/011 Understanding Windows Log_en.vtt 106.13KB
  79. 05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Event IDs.mp4 1.13GB
  80. 05 - Understanding Various Logs, Dashboard and Alert creations/012 Understanding Windows Event IDs_en.vtt 137.32KB
  81. 05 - Understanding Various Logs, Dashboard and Alert creations/013 Windows Sysmon Log Analysis.mp4 919.80MB
  82. 05 - Understanding Various Logs, Dashboard and Alert creations/013 Windows Sysmon Log Analysis_en.vtt 94.63KB
  83. 05 - Understanding Various Logs, Dashboard and Alert creations/014 Understanding Antivirus Logs.mp4 1.11GB
  84. 05 - Understanding Various Logs, Dashboard and Alert creations/014 Understanding Antivirus Logs_en.vtt 182.35KB
  85. 05 - Understanding Various Logs, Dashboard and Alert creations/38398938-Windows-Events.docx 8.11KB
  86. 06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1.mp4 655.10MB
  87. 06 - Walkthrough SIEM usecases and Incident Handling Stages/001 SIEM Use cases Part 1_en.vtt 84.62KB
  88. 06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2.mp4 802.21MB
  89. 06 - Walkthrough SIEM usecases and Incident Handling Stages/002 SIEM Use cases Part 2_en.vtt 67.59KB
  90. 06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3.mp4 567.18MB
  91. 06 - Walkthrough SIEM usecases and Incident Handling Stages/003 SIEM Use cases Part 3_en.vtt 63.05KB
  92. 06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis.mp4 676.85MB
  93. 06 - Walkthrough SIEM usecases and Incident Handling Stages/004 Malware outbreak Analysis_en.vtt 93.72KB
  94. 06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages.mp4 964.20MB
  95. 06 - Walkthrough SIEM usecases and Incident Handling Stages/005 Incident Handling stages_en.vtt 94.78KB
  96. 07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server.mp4 1.02GB
  97. 07 - Introduction to threat Hunting/001 Threat Hunting - Scanning attack on Web Server_en.vtt 119.51KB
  98. 07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack.mp4 1.19GB
  99. 07 - Introduction to threat Hunting/002 hreat Hunting - Brute Force Attack_en.vtt 110.95KB
  100. 07 - Introduction to threat Hunting/003 Email Header Analysis.mp4 653.29MB
  101. 07 - Introduction to threat Hunting/003 Email Header Analysis_en.vtt 63.59KB
  102. 08 - Discussion on Real Time Activities/001 Discussion on Real Time Activities.mp4 740.61MB
  103. 08 - Discussion on Real Time Activities/001 Discussion on Real Time Activities_en.vtt 89.12KB
  104. 09 - Course wrapup/001 Course Wrapup.mp4 513.61MB
  105. 09 - Course wrapup/001 Course Wrapup_en.vtt 58.11KB