https://img87.pixhost.to/images/599/359020115_tuto.jpg


Threat Intelligence Analysis (CTIA Prep)
Language: English | Size:1.26 GB
Genre:eLearning

Files Included :

01-Course Overview.mp4 (5.36 MB)
MP4
01-Module Intro.mp4 (4.05 MB)
MP4
02-Specific Types of Threats.mp4 (1.47 MB)
MP4
03-What Is Cyber Threat Intelligence.mp4 (2.28 MB)
MP4
04-Importance of Cyber Threat Intelligence.mp4 (1.34 MB)
MP4
05-Malware Is Evolving.mp4 (2.59 MB)
MP4
06-How Does CTIA Certification Fit within Other EC-Council Certifications.mp4 (3.89 MB)
MP4
07-Strategic, Operational, & Tactical Intelligence.mp4 (2.8 MB)
MP4
08-Mitigating the Gaps-Tactical.mp4 (3.56 MB)
MP4
09-Mitigating the Gaps-Operational.mp4 (2.32 MB)
MP4
10-Mitigating the Gaps-Strategic.mp4 (7.63 MB)
MP4
01-Module Intro.mp4 (1.22 MB)
MP4
02-Intelligence as a Differentiator.mp4 (3.3 MB)
MP4
03-Threat Intelligence Classifications.mp4 (2.44 MB)
MP4
04-Gathering & Correlating Information.mp4 (3.45 MB)
MP4
05-Enriching Data & Providing Value.mp4 (3.46 MB)
MP4
06-Intelligence Lifecycle.mp4 (6.24 MB)
MP4
07-Where & How Intelligence Adds Value.mp4 (2.89 MB)
MP4
08-Demo-Threat Intelligence Tool.mp4 (22.71 MB)
MP4
09-Module Review.mp4 (1.62 MB)
MP4
01-Module Intro.mp4 (1.66 MB)
MP4
02-Force Multiplier.mp4 (3.1 MB)
MP4
03-Empowering Executive Decision Making.mp4 (2.6 MB)
MP4
04-Stages of Risk Management.mp4 (5.05 MB)
MP4
05-Risk Management Data Sources.mp4 (4.07 MB)
MP4
06-Mapping out the Plan.mp4 (1.8 MB)
MP4
07-Mitigating the Gaps.mp4 (1.01 MB)
MP4
08-Sharpen Focus.mp4 (3.19 MB)
MP4
09-Filling in the Cybersecurity Skills Gap.mp4 (2.77 MB)
MP4
10-The Roll of Cyberthreat Intelligence.mp4 (2.32 MB)
MP4
01-Module Intro.mp4 (854.66 KB)
MP4
02-Intelligence Lifecycle.mp4 (976.2 KB)
MP4
03-Threat Intelligence Lifecycle.mp4 (2.48 MB)
MP4
04-Cyberthreat Intelligence Frameworks.mp4 (1.99 MB)
MP4
05-The Cyber Kill Chain.mp4 (3.77 MB)
MP4
06-Diamond Model.mp4 (3.17 MB)
MP4
07-MITRE ATT&CK.mp4 (6.58 MB)
MP4
08-NICE Framework.mp4 (7.31 MB)
MP4
09-CREST Framework.mp4 (1.99 MB)
MP4
01-Course Overview.mp4 (3.37 MB)
MP4
01-The Threat Based Approach.mp4 (11.3 MB)
MP4
02-Cyber Threats Overview.mp4 (5.31 MB)
MP4
03-Analyzing Main Threat Vectors.mp4 (23.69 MB)
MP4
04-Analyzing Threat Actors.mp4 (13.93 MB)
MP4
05-Real-World Analysis-Threat Actors.mp4 (6.38 MB)
MP4
06-Understanding Your Enemies.mp4 (14.59 MB)
MP4
01-Threats & IoCs.mp4 (14.63 MB)
MP4
02-Understanding Main Indicators of Compromise.mp4 (16.57 MB)
MP4
03-Indicators of Compromise in the Real World.mp4 (5.71 MB)
MP4
04-Demo-Investigating IoCs of a Ransomware Attack.mp4 (22.99 MB)
MP4
01-Understanding the Kill Chain Methodology.mp4 (4.07 MB)
MP4
02-The Kill Chain Process.mp4 (18.31 MB)
MP4
03-Identifying Common Adversary Behavior.mp4 (13.32 MB)
MP4
04-Fingerprinting an Adversary.mp4 (4.62 MB)
MP4
05-Analyzing Real World Cyber Attacks.mp4 (17.35 MB)
MP4
01-Understanding Highly Skilled Attackers.mp4 (2.7 MB)
MP4
02-APT Objectives & Characteristics.mp4 (12.83 MB)
MP4
03-The APT Lifecycle.mp4 (11.24 MB)
MP4
04-Detecting & Preventing APTs.mp4 (4.22 MB)
MP4
05-Demo-The Mitre ATT&CK Framework.mp4 (30.71 MB)
MP4
06-Analyzing Real World APT Groups.mp4 (9.5 MB)
MP4
07-Course Closure & CTIA Certification Tips.mp4 (6.52 MB)
MP4
1  Course Overview.mp4 (3.11 MB)
MP4
01-The Threat Intelligence Program.mp4 (11.1 MB)
MP4
02-Understanding the Threat Intelligence Approach.mp4 (14.67 MB)
MP4
03-Getting Management Buy-In.mp4 (18.73 MB)
MP4
04-Mapping Threats.mp4 (10.34 MB)
MP4
05-Prioritizing Threats.mp4 (5.55 MB)
MP4
01-Mapping the Ideal Target State.mp4 (6.45 MB)
MP4
02-Defining Threat Intelligence Requirements.mp4 (9.46 MB)
MP4
03-Defining Business Requirements.mp4 (10.7 MB)
MP4
04-Requirement Prioritization.mp4 (9.05 MB)
MP4
05-Defining the Scope of the Threat Intelligence Program.mp4 (9.26 MB)
MP4
01-A Holistic Approach for Threat Intelligence Design.mp4 (7.08 MB)
MP4
02-Setting up the Project Basics.mp4 (15.61 MB)
MP4
03-Designing Data Collection.mp4 (13.78 MB)
MP4
01-The Objectives of a Threat Intelligence Team.mp4 (6.6 MB)
MP4
02-The Team Roles.mp4 (10.84 MB)
MP4
03-The Team Structure.mp4 (12.5 MB)
MP4
04-Preparing & Training the Team.mp4 (10.64 MB)
MP4
01-Designing Data Sharing.mp4 (5.54 MB)
MP4
02-Internal Threat Intelligence Destinations.mp4 (12.68 MB)
MP4
03-External Threat Intelligence Destinations.mp4 (15.44 MB)
MP4
04-Creating Sharing Mechanisms.mp4 (9.98 MB)
MP4
05-Course Closure & CTIA Certification Tips.mp4 (6.89 MB)
MP4
01-Course Overview.mp4 (4.05 MB)
MP4
01-Course Introduction.mp4 (4.41 MB)
MP4
02-Understanding Data Collection Methods.mp4 (10.06 MB)
MP4
03-Understanding Threat Intelligence Collection Management.mp4 (12.89 MB)
MP4
04-Understanding Threat Intelligence Sources.mp4 (20.8 MB)
MP4
01-Collecting Data through Search Engines.mp4 (17.66 MB)
MP4
02-Collecting Data through Web Services.mp4 (12.43 MB)
MP4
03-Collecting Data through Social Media Sites.mp4 (9.87 MB)
MP4
04-Collecting Data through Website Footprinting.mp4 (16.23 MB)
MP4
05-Collecting Data of Public Documents.mp4 (9.15 MB)
MP4
06-Tracking Email Communications.mp4 (3.44 MB)
MP4
01-Using WHOIS Lookup.mp4 (5.53 MB)
MP4
02-Collecting Data using DNS Lookup.mp4 (20.4 MB)
MP4
03-Demonstration-Automating OSINT Collection-Part 01.mp4 (14.5 MB)
MP4
04-Demonstration-Automating OSINT Collection-Part 02.mp4 (27.6 MB)
MP4
05-Demonstration-Automating OSINT Collection-Part 03.mp4 (2.56 MB)
MP4
01-Collecting Data from HUMINT Sources.mp4 (4.73 MB)
MP4
02-Interviewing & Interrogation Techniques.mp4 (5.54 MB)
MP4
03-Using Social Engineering Tools.mp4 (15.38 MB)
MP4
01-Collecting Data Through Cyber Counterintelligence.mp4 (9.2 MB)
MP4
02-Understanding Indicators of Compromise.mp4 (9.29 MB)
MP4
03-Analyzing Malware for Data Collection.mp4 (12.94 MB)
MP4
04-Demonstration-Malware Analysis Tools.mp4 (13.28 MB)
MP4
01-Understanding Bulk Data Collection.mp4 (7.22 MB)
MP4
02-Understanding Data Processing & Exploitation.mp4 (10.77 MB)
MP4
01-Domain Summary.mp4 (11.47 MB)
MP4
01-Course Overview.mp4 (3.57 MB)
MP4
01-Course Introduction.mp4 (4.58 MB)
MP4
02-Introduction to Data Analysis.mp4 (7.16 MB)
MP4
03-Contextualization of Data.mp4 (4.66 MB)
MP4
01-Understanding Data Analysis Techniques.mp4 (6.53 MB)
MP4
02-Understanding Statistical Data Analysis.mp4 (9.37 MB)
MP4
03-Understanding Analysis of Competing Hypotheses.mp4 (8.8 MB)
MP4
01-Understanding Threat Analysis.mp4 (9.8 MB)
MP4
02-Understanding the Threat Analysis Process.mp4 (7.09 MB)
MP4
03-Cyber Kill Chain Methodology-Threat Analysis.mp4 (11.95 MB)
MP4
01-Understanding Threat Modeling.mp4 (13.11 MB)
MP4
02-Understanding Threat Modeling Methodologies.mp4 (11.94 MB)
MP4
03-Demonstration-Using Microsoft Threat Modeling Tool.mp4 (16.03 MB)
MP4
01-Understanding Fine-Tuning Threat Analysis.mp4 (5.73 MB)
MP4
02-Performing Fine-Tuning Threat Analysis.mp4 (17.34 MB)
MP4
03-Automating Threat Analysis Processes.mp4 (10.18 MB)
MP4
04-Understanding Threat Intelligence Evaluation.mp4 (8.42 MB)
MP4
01-Understanding & Developing Runbooks.mp4 (6.97 MB)
MP4
02-Creating a Threat Knowledge Base.mp4 (6.85 MB)
MP4
01-Domain Summary.mp4 (14.51 MB)
MP4
01-Course Trailer.mp4 (4.03 MB)
MP4
01-Course Introduction.mp4 (6.43 MB)
MP4
02-Understanding Threat Intelligence Reports.mp4 (6.87 MB)
MP4
03-Generating Concise Reports.mp4 (13.55 MB)
MP4
04-Maximizing Returns from Threat Intelligence Reports.mp4 (8.99 MB)
MP4
05-Understanding Report Writing Tools.mp4 (5.85 MB)
MP4
01-Disseminating Threat Intelligence.mp4 (9.36 MB)
MP4
02-Building Blocks for TI Sharing.mp4 (7.97 MB)
MP4
03-Sharing TI Information.mp4 (11.12 MB)
MP4
01-Sharing Communities for Threat Intelligence.mp4 (11.34 MB)
MP4
02-Consuming & Responding to Security Alerts.mp4 (7.82 MB)
MP4
03-Sharing External Threat Intelligence.mp4 (6.88 MB)
MP4
01-Sharing Threat Intelligence.mp4 (4.84 MB)
MP4
02-Employing YARA & IT-ISAC.mp4 (6.15 MB)
MP4
03-Intelligence Sharing Acts & Regulations.mp4 (5.05 MB)
MP4
01-Understanding Forms of Delivery.mp4 (6.62 MB)
MP4
02-Standards & Formats for Sharing TI.mp4 (12.4 MB)
MP4
03-Understanding Information & Collaboration Platforms.mp4 (6.48 MB)
MP4
01-Integrating Threat Intelligence.mp4 (5.91 MB)
MP4
02-Acting on Threat Intelligence.mp4 (8.12 MB)
MP4
01-Course Summary.mp4 (12.3 MB)
MP4

https://thumbs2.imgbox.com/fa/81/9ywEpfek_t.jpg

https://img87.pixhost.to/images/1010/363506399_rg.png
Threat Intelligence Analysis (CTIA Prep).z01

Код:
https://rapidgator.net/file/5ca8[цензура]30c5f88006b7f00bad4e69ac2/Threat_Intelligence_Analysis_CTIA_Prep.z01

Threat Intelligence Analysis (CTIA Prep).z02

Код:
https://rapidgator.net/file/399c214a506e5fe4d8f5bf47218acef9/Threat_Intelligence_Analysis_CTIA_Prep.z02

Threat Intelligence Analysis (CTIA Prep).zip

Код:
https://rapidgator.net/file/83a78d06dd726aa8d045c9d0a2895c8b/Threat_Intelligence_Analysis_CTIA_Prep.zip

https://ddownload.com/images/promo/banner_240-32.png
Threat Intelligence Analysis (CTIA Prep).z01

Код:
https://ddownload.com/n18vr2lhcsi2/Threat_Intelligence_Analysis_CTIA_Prep.z01

Threat Intelligence Analysis (CTIA Prep).z02

Код:
https://ddownload.com/fi0hufe3hcy6/Threat_Intelligence_Analysis_CTIA_Prep.z02

Threat Intelligence Analysis (CTIA Prep).zip

Код:
https://ddownload.com/kbgh4rqv6bxf/Threat_Intelligence_Analysis_CTIA_Prep.zip