 种子简介
种子简介
			
			
				种子名称:
				[FreeCoursesOnline.Me] [Packt] Cyber Threat Hunting [FCO]
				文件类型:
				视频
				文件数目:
				40个文件 
				文件大小:
				978.12 MB
				收录时间:
				2019-2-26 21:10
				已经下载:
				3次
				资源热度:
				209
 
				最近下载:
				2025-10-20 18:29
			
			
				 下载BT种子文件
下载BT种子文件
			
			
				 下载Torrent文件(.torrent)
下载Torrent文件(.torrent)
				 立即下载
立即下载
			
			
			
				 磁力链接下载
磁力链接下载
			
			
				 magnet:?xt=urn:btih:0f3e8ae8a4fea8233e5980de6a6d329a2bc98911&dn=[FreeCoursesOnline.Me] [Packt] Cyber Threat Hunting [FCO] 
                复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
magnet:?xt=urn:btih:0f3e8ae8a4fea8233e5980de6a6d329a2bc98911&dn=[FreeCoursesOnline.Me] [Packt] Cyber Threat Hunting [FCO] 
                复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
			
			
		
			
				 喜欢这个种子的人也喜欢
喜欢这个种子的人也喜欢
			
			
			
			
			
				 种子包含的文件
种子包含的文件
			
			
				
					 [FreeCoursesOnline.Me] [Packt] Cyber Threat Hunting [FCO].torrent
[FreeCoursesOnline.Me] [Packt] Cyber Threat Hunting [FCO].torrent
				 
                
                
				1 - Threat Hunting Introduction/01_Course Overview.mp410.44MB
1 - Threat Hunting Introduction/02_Introduction to Threat Hunting.mp417.84MB
1 - Threat Hunting Introduction/03_Incident Response and Incident Handling.mp412.81MB
1 - Threat Hunting Introduction/04_Hunting Mindset - Threat Intelligence.mp411.03MB
1 - Threat Hunting Introduction/05_Hunter Mindset - Forensics.mp413.7MB
1 - Threat Hunting Introduction/06_Threat Hunting Simulation.mp413.5MB
1 - Threat Hunting Introduction/07_Threat Hunting Terminologies.mp422.76MB
2 - Threat Hunting Methodology/01_Threat Reports and Research.mp420.25MB
2 - Threat Hunting Methodology/02_Threat Sharing and Exchanges.mp412.16MB
2 - Threat Hunting Methodology/03_Indicators of Compromise.mp415.52MB
2 - Threat Hunting Methodology/04_Threat Hunting Methods.mp410.11MB
2 - Threat Hunting Methodology/05_Report Writing.mp414.89MB
3 - Network Hunting/01_Network Hunting Overview.mp411.4MB
3 - Network Hunting/02_TCP_IP and Networking Primer.mp410.45MB
3 - Network Hunting/03_Network Hunting Tools.mp438.49MB
3 - Network Hunting/04_Network Hunting Summary.mp412.11MB
4 - Suspicious Network Traffic Hunting/01_ARP Analysis.mp419.21MB
4 - Suspicious Network Traffic Hunting/02_ICMP Analysis.mp415.19MB
4 - Suspicious Network Traffic Hunting/03_TCP Analysis.mp422.09MB
4 - Suspicious Network Traffic Hunting/04_DHCP Analysis.mp429.85MB
4 - Suspicious Network Traffic Hunting/05_DNS Analysis.mp418.19MB
4 - Suspicious Network Traffic Hunting/06_HTTP_HTTPS Analysis.mp414.78MB
4 - Suspicious Network Traffic Hunting/07_Unknown Traffic.mp420.33MB
5 - Hunting Web Shells/01_Web Shell Hunting Overview.mp411.05MB
5 - Hunting Web Shells/02_Web Shell Hunting Tools.mp432.86MB
5 - Hunting Web Shells/03_Hunting Web Shell – Part 1.mp436.69MB
5 - Hunting Web Shells/04_Hunting Web Shell – Part 2.mp442.15MB
6 - Endpoint Hunting/01_Endpoint Hunting Overview.mp410.76MB
6 - Endpoint Hunting/02_Windows Processes.mp463.74MB
6 - Endpoint Hunting/03_Endpoint Baselines.mp412.29MB
6 - Endpoint Hunting/04_Malware Classifications.mp495.14MB
6 - Endpoint Hunting/05_Malware Delivery.mp439.79MB
6 - Endpoint Hunting/06_Malware Evasion Techniques.mp444.43MB
6 - Endpoint Hunting/07_Malware Persistence.mp429.08MB
7 - Hunting Malware/01_Malware Hunting Overview.mp48.24MB
7 - Hunting Malware/02_Malware Detection Tools.mp422.2MB
7 - Hunting Malware/03_Malware Detection Techniques.mp445.97MB
7 - Hunting Malware/04_Memory Analysis.mp453.52MB
7 - Hunting Malware/05_Windows Event Logs.mp426.36MB
7 - Hunting Malware/06_Windows Event IDs.mp416.77MB