BITCQ

TCM - SecurityOperations SOC101

Size: 5.2 GB
Magnet link

Name Size
TCM - SecurityOperations SOC101/01-Introduction/1. Course Introduction.mkv 25 MB
TCM - SecurityOperations SOC101/01-Introduction/2. Prerequisites and Course Resources.mkv 14.9 MB
TCM - SecurityOperations SOC101/01-Introduction/2. Prerequisites and Course Resources.txt 564 B
TCM - SecurityOperations SOC101/01-Introduction/3. Course Discord and Support.mkv 5.3 MB
TCM - SecurityOperations SOC101/02-Lab-Setup/1. Installing Oracle VM VirtualBox.mkv 30.4 MB
TCM - SecurityOperations SOC101/02-Lab-Setup/1. Installing Oracle VM VirtualBox.txt 303 B
TCM - SecurityOperations SOC101/02-Lab-Setup/2. Installing Windows.mkv 39 MB
TCM - SecurityOperations SOC101/02-Lab-Setup/3. Configuring Windows.mkv 30 MB
TCM - SecurityOperations SOC101/02-Lab-Setup/3. Configuring Windows.txt 753 B
TCM - SecurityOperations SOC101/02-Lab-Setup/4. Installing Ubuntu.mkv 37.3 MB
TCM - SecurityOperations SOC101/02-Lab-Setup/4. Installing Ubuntu.txt 503 B
TCM - SecurityOperations SOC101/02-Lab-Setup/5. Configuring Ubuntu.mkv 12.8 MB
TCM - SecurityOperations SOC101/02-Lab-Setup/5. Configuring Ubuntu.txt 432 B
TCM - SecurityOperations SOC101/02-Lab-Setup/6. Configuring the Lab Network.mkv 18.3 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/1. The SOC and Its Role.mkv 43.9 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/2. Day in the Life of a SOC Analyst.mkv 44.7 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/3. Information Security Refresher.mkv 57.5 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/4. SOC Models, Roles, and Organizational Structures.mkv 19 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/5. Incident and Event Management.mkv 13.4 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/6. SOC Metrics.mkv 21.5 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/7. SOC Tools.mkv 52.2 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/8. Common Threats and Attacks.mkv 46.4 MB
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/8. Common Threats and Attacks.txt 159 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/1. Introduction to Phishing.mkv 44.9 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/1. Introduction to Phishing.txt 346 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/2. Email Fundamentals.mkv 24.8 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/3. Phishing Analysis Configuration.mkv 16.4 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/3. Phishing Analysis Configuration.txt 562 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/4. Phishing Attack Types.mkv 39.4 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/5. Phishing Attack Techniques.mkv 36.2 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/5. Phishing Attack Techniques.txt 219 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/6. Email Analysis Methodology.mkv 14.9 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/7. Email Header and Sender Analysis.mkv 89.8 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/7. Email Header and Sender Analysis.txt 313 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/8. Email Authentication Methods.mkv 55.4 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/9. Email Content Analysis.mkv 53.6 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/10. The Anatomy of a URL.mkv 13.9 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/11. Email URL Analysis.mkv 66.8 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/11. Email URL Analysis.txt 409 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/12. Email Attachment Analysis.mkv 35.5 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/12. Email Attachment Analysis.txt 217 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/13. Dynamic Attachment Analysis and Sandboxing.mkv 63.2 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/13. Dynamic Attachment Analysis and Sandboxing.txt 289 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/14. Static MalDoc Analysis.mkv 18 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/14. Static MalDoc Analysis.txt 87 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/15. Static PDF Analysis.mkv 23.4 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/15. Static PDF Analysis.txt 164 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/16. Automated Email Analysis with PhishTool.mkv 21.6 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/17. Reactive Phishing Defense.mkv 60 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/17. Reactive Phishing Defense.txt 261 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/18. Proactive Phishing Defense.mkv 39.2 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/19. Documentation and Reporting.mkv 39.2 MB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/19. Documentation and Reporting.txt 643 B
TCM - SecurityOperations SOC101/04-Phishing-Analysis/20. Phishing Analysis Challenge 1.txt 2 KB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/21. Phishing Analysis Challenge 2.txt 2 KB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/22. Phishing Analysis Challenge 3.txt 2 KB
TCM - SecurityOperations SOC101/04-Phishing-Analysis/23. Additional Practice.mkv 16 MB
TCM - SecurityOperations SOC101/05-Network-Security/1. Introduction to Network Security.mkv 8.4 MB
TCM - SecurityOperations SOC101/05-Network-Security/2. Network Security Theory.mkv 59.2 MB
TCM - SecurityOperations SOC101/05-Network-Security/3. Packet Capture and Flow Analysis.mkv 25.1 MB
TCM - SecurityOperations SOC101/05-Network-Security/4. Introduction to tcpdump.mkv 31 MB
TCM - SecurityOperations SOC101/05-Network-Security/5. tcpdump - Capturing Network Traffic.mkv 33.3 MB
TCM - SecurityOperations SOC101/05-Network-Security/6. tcpdump - Analyzing Network Traffic.mkv 59.1 MB
TCM - SecurityOperations SOC101/05-Network-Security/7. tcpdump - Analyzing Network Traffic (Sample 2).mkv 59.5 MB
TCM - SecurityOperations SOC101/05-Network-Security/8. tcpdump Challenge 1.txt 2 KB
TCM - SecurityOperations SOC101/05-Network-Security/9. Introduction to Wireshark.mkv 50.1 MB
TCM - SecurityOperations SOC101/05-Network-Security/9. Introduction to Wireshark.txt 258 B
TCM - SecurityOperations SOC101/05-Network-Security/10. Wireshark - Capture and Display Filters.mkv 51 MB
TCM - SecurityOperations SOC101/05-Network-Security/10. Wireshark - Capture and Display Filters.txt 259 B
TCM - SecurityOperations SOC101/05-Network-Security/11. Wireshark - Statistics.mkv 69.2 MB
TCM - SecurityOperations SOC101/05-Network-Security/12. Wireshark - Analyzing Network Traffic.mkv 116.9 MB
TCM - SecurityOperations SOC101/05-Network-Security/13. Wireshark Challenge 1.txt 2 KB
TCM - SecurityOperations SOC101/05-Network-Security/14. Intrusion Detection and Prevention Systems.mkv 14.4 MB
TCM - SecurityOperations SOC101/05-Network-Security/15. Introduction to Snort.mkv 65 MB
TCM - SecurityOperations SOC101/05-Network-Security/16. Snort - Reading and Writing Rules hide01.ir.mkv 67.4 MB
TCM - SecurityOperations SOC101/05-Network-Security/16. Snort - Reading and Writing Rules hide01.ir.txt 120 B
TCM - SecurityOperations SOC101/05-Network-Security/17. Snort - Intrusion Detection and Prevention.mkv 63.3 MB
TCM - SecurityOperations SOC101/05-Network-Security/18. Snort Challenge 1.txt 3 KB
TCM - SecurityOperations SOC101/05-Network-Security/19. Additional Practice.mkv 12.1 MB
TCM - SecurityOperations SOC101/05-Network-Security/19. Additional Practice.txt 336 B
TCM - SecurityOperations SOC101/06-Endpoint-Security/1. Introduction to Endpoint Security.mkv 4.8 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/2. Endpoint Security Controls.mkv 30.3 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/3. Creating Our Malware.mkv 31.3 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/3. Creating Our Malware.txt 129 B
TCM - SecurityOperations SOC101/06-Endpoint-Security/4. Windows Network Analysis.mkv 65.9 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/5. Windows Process Analysis.mkv 77.6 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/6. Windows Core Processes (Part 1).mkv 71.4 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/7. Windows Core Processes (Part 2).mkv 39.1 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/8. The Windows Registry.mkv 34 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/9. Windows Autoruns (Part 1).mkv 33 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/9. Windows Autoruns (Part 1).txt 307 B
TCM - SecurityOperations SOC101/06-Endpoint-Security/10. Windows Autoruns (Part 2).mkv 59.4 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/10. Windows Autoruns (Part 2).txt 462 B
TCM - SecurityOperations SOC101/06-Endpoint-Security/11. Windows Service Analysis.mkv 39.2 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/12. Windows Scheduled Tasks.mkv 33.3 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/13. Windows Endpoint Analysis Challenge 1.txt 3 KB
TCM - SecurityOperations SOC101/06-Endpoint-Security/14. Windows Event Logs.mkv 75.4 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/14. Windows Event Logs.txt 463 B
TCM - SecurityOperations SOC101/06-Endpoint-Security/15. Windows Events Challenge 1.txt 1 KB
TCM - SecurityOperations SOC101/06-Endpoint-Security/16. Introduction to Sysmon.mkv 43.4 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/17. Sysmon Events.mkv 105.1 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/17. Sysmon Events.txt 2 KB
TCM - SecurityOperations SOC101/06-Endpoint-Security/18. Linux Network Analysis.mkv 39 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/19. Linux Process Analysis.mkv 84.2 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/20. Linux Cron Jobs.mkv 27.8 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/21. Linux Endpoint Analysis Challenge 1.txt 3 KB
TCM - SecurityOperations SOC101/06-Endpoint-Security/22. Introduction to LimaCharlie.mkv 17.7 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/23. LimaCharlie - Endpoint Detection and Response.mkv 99 MB
TCM - SecurityOperations SOC101/06-Endpoint-Security/24. LimaCharlie - Deploying Endpoint Agents.mkv 58.2 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/1. Introduction to SIEM and Log Management.mkv 13.7 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/2. SIEM Architecture.mkv 36.4 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/3. SIEM Deployment Models.mkv 15.3 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/4. Log Types.mkv 24.5 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/5. Log Formats.mkv 24.9 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/6. Common Attack Signatures - User Behavior.mkv 24.5 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/7. Common Attack Signatures - SQL Injection.mkv 14 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/8. Common Attack Signatures - Cross-Site Scripting.mkv 7.9 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/9. Common Attack Signatures - Command Injection.mkv 11.9 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/10. Common Attack Signatures - Path Traversal and Local File Inclusion.mkv 8.1 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/11. Command Line Log Analysis.mkv 70 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/12. Pattern Matching.mkv 22.4 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/13. Structured Log Analysis.mkv 21.2 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/14. Log Analysis Challenge 1.txt 2 KB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/15. Introduction to Splunk.mkv 23.7 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/16. Splunk - Initial Walkthrough.mkv 22.4 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/17. Splunk - Importing and Exploring Events.mkv 69.3 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/18. Splunk - Search Processing Language (SPL).mkv 62.3 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/19. Splunk - Search Commands.mkv 51.6 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/20. Splunk - Reports and Alerts.mkv 21.3 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/21. Splunk - Creating Dashboards.mkv 33.4 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/22. [Live] Splunk - Website Defacement Investigation.mkv 270.5 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/23. Splunk - Ransomware Challenge.txt 1 KB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/24. Splunk - Deploying a Forwarder and Generating Real-Time Alerts.mkv 41.8 MB
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/25. Section Cleanup.txt 545 B
TCM - SecurityOperations SOC101/08-Threat-Intelligence/1. Introduction to Threat Intelligence.mkv 7.8 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/2. Types of Threat Intelligence.mkv 33.3 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/3. The Threat Intelligence Cycle hide01.ir.mkv 33.6 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/3. The Threat Intelligence Cycle.txt 739 B
TCM - SecurityOperations SOC101/08-Threat-Intelligence/4. The Diamond Model of Intrusion Analysis.mkv 40.8 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/4. The Diamond Model of Intrusion Analysis.txt 197 B
TCM - SecurityOperations SOC101/08-Threat-Intelligence/5. The Cyber Kill Chain.mkv 41.9 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/5. The Cyber Kill Chain.txt 319 B
TCM - SecurityOperations SOC101/08-Threat-Intelligence/6. The Pyramid of Pain.mkv 31.1 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/6. The Pyramid of Pain.txt 169 B
TCM - SecurityOperations SOC101/08-Threat-Intelligence/7. MITRE ATT&CK.mkv 161 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/7. MITRE ATT&CK.txt 537 B
TCM - SecurityOperations SOC101/08-Threat-Intelligence/8. MITRE ATT&CK Challenge 1.txt 3 KB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/9. Introduction to YARA.mkv 25.8 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/10. YARA - Reading and Writing Rules (Part 1).mkv 40.7 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/11. YARA - Reading and Writing Rules (Part 2).mkv 39.2 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/12. YARA Challenge 1.txt 3 KB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/13. Introduction to MISP (Malware Information Sharing Platform).mkv 65 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/14. MISP - Event Management.mkv 75.8 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/14. MISP - Event Management.txt 1 KB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/15. MISP - Ingesting Threat Intelligence Feeds.mkv 72.8 MB
TCM - SecurityOperations SOC101/08-Threat-Intelligence/15. MISP - Ingesting Threat Intelligence Feeds.txt 239 B
TCM - SecurityOperations SOC101/09-Digital-Forensics/1. Introduction to Digital Forensics.mkv 11.9 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/2. The Digital Forensics Investigation Process.mkv 44.6 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/2. The Digital Forensics Investigation Process.txt 110 B
TCM - SecurityOperations SOC101/09-Digital-Forensics/3. Order of Volatility.mkv 37.5 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/4. Chain of Custody.mkv 24.6 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/4. Chain of Custody.pdf 63 KB
TCM - SecurityOperations SOC101/09-Digital-Forensics/5. Introduction to FTK Imager.mkv 49.8 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/6. FTK Imager - Forensic Image Acquisition.mkv 23.8 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/7. FTK Imager - Memory Acquisition.mkv 28.9 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/8. Common Windows Forensic Artifacts.mkv 59.6 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/8. Common Windows Forensic Artifacts.txt 317 B
TCM - SecurityOperations SOC101/09-Digital-Forensics/9. Windows Forensic Artifacts - User and System hide01.ir.mkv 63.2 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/9. Windows Forensic Artifacts - User and System.txt 182 B
TCM - SecurityOperations SOC101/09-Digital-Forensics/10. Windows Forensic Artifacts - Files.mkv 47.9 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/10. Windows Forensic Artifacts - Files.txt 182 B
TCM - SecurityOperations SOC101/09-Digital-Forensics/11. Windows Forensic Artifacts - Program Execution.mkv 50.7 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/11. Windows Forensic Artifacts - Program Execution.txt 149 B
TCM - SecurityOperations SOC101/09-Digital-Forensics/12. LNK Files, Prefetch Files, and Jump Lists.mkv 106.3 MB
TCM - SecurityOperations SOC101/09-Digital-Forensics/12. LNK Files, Prefetch Files, and Jump Lists.txt 227 B
TCM - SecurityOperations SOC101/09-Digital-Forensics/13. Windows Forensic Artifact Triage.mkv 84.9 MB
TCM - SecurityOperations SOC101/10-Conclusion/1. Course Wrap Up.mkv 6 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
TCM - SecurityOperations SOC101 Video 5.2 GB 9

Loading...