TCM - SecurityOperations SOC101/01-Introduction/1. Course Introduction.mkv |
25 MB |
TCM - SecurityOperations SOC101/01-Introduction/2. Prerequisites and Course Resources.mkv |
14.9 MB |
TCM - SecurityOperations SOC101/01-Introduction/2. Prerequisites and Course Resources.txt |
564 B |
TCM - SecurityOperations SOC101/01-Introduction/3. Course Discord and Support.mkv |
5.3 MB |
TCM - SecurityOperations SOC101/02-Lab-Setup/1. Installing Oracle VM VirtualBox.mkv |
30.4 MB |
TCM - SecurityOperations SOC101/02-Lab-Setup/1. Installing Oracle VM VirtualBox.txt |
303 B |
TCM - SecurityOperations SOC101/02-Lab-Setup/2. Installing Windows.mkv |
39 MB |
TCM - SecurityOperations SOC101/02-Lab-Setup/3. Configuring Windows.mkv |
30 MB |
TCM - SecurityOperations SOC101/02-Lab-Setup/3. Configuring Windows.txt |
753 B |
TCM - SecurityOperations SOC101/02-Lab-Setup/4. Installing Ubuntu.mkv |
37.3 MB |
TCM - SecurityOperations SOC101/02-Lab-Setup/4. Installing Ubuntu.txt |
503 B |
TCM - SecurityOperations SOC101/02-Lab-Setup/5. Configuring Ubuntu.mkv |
12.8 MB |
TCM - SecurityOperations SOC101/02-Lab-Setup/5. Configuring Ubuntu.txt |
432 B |
TCM - SecurityOperations SOC101/02-Lab-Setup/6. Configuring the Lab Network.mkv |
18.3 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/1. The SOC and Its Role.mkv |
43.9 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/2. Day in the Life of a SOC Analyst.mkv |
44.7 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/3. Information Security Refresher.mkv |
57.5 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/4. SOC Models, Roles, and Organizational Structures.mkv |
19 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/5. Incident and Event Management.mkv |
13.4 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/6. SOC Metrics.mkv |
21.5 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/7. SOC Tools.mkv |
52.2 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/8. Common Threats and Attacks.mkv |
46.4 MB |
TCM - SecurityOperations SOC101/03-Security-Operations-Fundamentals/8. Common Threats and Attacks.txt |
159 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/1. Introduction to Phishing.mkv |
44.9 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/1. Introduction to Phishing.txt |
346 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/2. Email Fundamentals.mkv |
24.8 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/3. Phishing Analysis Configuration.mkv |
16.4 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/3. Phishing Analysis Configuration.txt |
562 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/4. Phishing Attack Types.mkv |
39.4 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/5. Phishing Attack Techniques.mkv |
36.2 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/5. Phishing Attack Techniques.txt |
219 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/6. Email Analysis Methodology.mkv |
14.9 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/7. Email Header and Sender Analysis.mkv |
89.8 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/7. Email Header and Sender Analysis.txt |
313 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/8. Email Authentication Methods.mkv |
55.4 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/9. Email Content Analysis.mkv |
53.6 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/10. The Anatomy of a URL.mkv |
13.9 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/11. Email URL Analysis.mkv |
66.8 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/11. Email URL Analysis.txt |
409 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/12. Email Attachment Analysis.mkv |
35.5 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/12. Email Attachment Analysis.txt |
217 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/13. Dynamic Attachment Analysis and Sandboxing.mkv |
63.2 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/13. Dynamic Attachment Analysis and Sandboxing.txt |
289 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/14. Static MalDoc Analysis.mkv |
18 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/14. Static MalDoc Analysis.txt |
87 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/15. Static PDF Analysis.mkv |
23.4 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/15. Static PDF Analysis.txt |
164 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/16. Automated Email Analysis with PhishTool.mkv |
21.6 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/17. Reactive Phishing Defense.mkv |
60 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/17. Reactive Phishing Defense.txt |
261 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/18. Proactive Phishing Defense.mkv |
39.2 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/19. Documentation and Reporting.mkv |
39.2 MB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/19. Documentation and Reporting.txt |
643 B |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/20. Phishing Analysis Challenge 1.txt |
2 KB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/21. Phishing Analysis Challenge 2.txt |
2 KB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/22. Phishing Analysis Challenge 3.txt |
2 KB |
TCM - SecurityOperations SOC101/04-Phishing-Analysis/23. Additional Practice.mkv |
16 MB |
TCM - SecurityOperations SOC101/05-Network-Security/1. Introduction to Network Security.mkv |
8.4 MB |
TCM - SecurityOperations SOC101/05-Network-Security/2. Network Security Theory.mkv |
59.2 MB |
TCM - SecurityOperations SOC101/05-Network-Security/3. Packet Capture and Flow Analysis.mkv |
25.1 MB |
TCM - SecurityOperations SOC101/05-Network-Security/4. Introduction to tcpdump.mkv |
31 MB |
TCM - SecurityOperations SOC101/05-Network-Security/5. tcpdump - Capturing Network Traffic.mkv |
33.3 MB |
TCM - SecurityOperations SOC101/05-Network-Security/6. tcpdump - Analyzing Network Traffic.mkv |
59.1 MB |
TCM - SecurityOperations SOC101/05-Network-Security/7. tcpdump - Analyzing Network Traffic (Sample 2).mkv |
59.5 MB |
TCM - SecurityOperations SOC101/05-Network-Security/8. tcpdump Challenge 1.txt |
2 KB |
TCM - SecurityOperations SOC101/05-Network-Security/9. Introduction to Wireshark.mkv |
50.1 MB |
TCM - SecurityOperations SOC101/05-Network-Security/9. Introduction to Wireshark.txt |
258 B |
TCM - SecurityOperations SOC101/05-Network-Security/10. Wireshark - Capture and Display Filters.mkv |
51 MB |
TCM - SecurityOperations SOC101/05-Network-Security/10. Wireshark - Capture and Display Filters.txt |
259 B |
TCM - SecurityOperations SOC101/05-Network-Security/11. Wireshark - Statistics.mkv |
69.2 MB |
TCM - SecurityOperations SOC101/05-Network-Security/12. Wireshark - Analyzing Network Traffic.mkv |
116.9 MB |
TCM - SecurityOperations SOC101/05-Network-Security/13. Wireshark Challenge 1.txt |
2 KB |
TCM - SecurityOperations SOC101/05-Network-Security/14. Intrusion Detection and Prevention Systems.mkv |
14.4 MB |
TCM - SecurityOperations SOC101/05-Network-Security/15. Introduction to Snort.mkv |
65 MB |
TCM - SecurityOperations SOC101/05-Network-Security/16. Snort - Reading and Writing Rules hide01.ir.mkv |
67.4 MB |
TCM - SecurityOperations SOC101/05-Network-Security/16. Snort - Reading and Writing Rules hide01.ir.txt |
120 B |
TCM - SecurityOperations SOC101/05-Network-Security/17. Snort - Intrusion Detection and Prevention.mkv |
63.3 MB |
TCM - SecurityOperations SOC101/05-Network-Security/18. Snort Challenge 1.txt |
3 KB |
TCM - SecurityOperations SOC101/05-Network-Security/19. Additional Practice.mkv |
12.1 MB |
TCM - SecurityOperations SOC101/05-Network-Security/19. Additional Practice.txt |
336 B |
TCM - SecurityOperations SOC101/06-Endpoint-Security/1. Introduction to Endpoint Security.mkv |
4.8 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/2. Endpoint Security Controls.mkv |
30.3 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/3. Creating Our Malware.mkv |
31.3 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/3. Creating Our Malware.txt |
129 B |
TCM - SecurityOperations SOC101/06-Endpoint-Security/4. Windows Network Analysis.mkv |
65.9 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/5. Windows Process Analysis.mkv |
77.6 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/6. Windows Core Processes (Part 1).mkv |
71.4 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/7. Windows Core Processes (Part 2).mkv |
39.1 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/8. The Windows Registry.mkv |
34 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/9. Windows Autoruns (Part 1).mkv |
33 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/9. Windows Autoruns (Part 1).txt |
307 B |
TCM - SecurityOperations SOC101/06-Endpoint-Security/10. Windows Autoruns (Part 2).mkv |
59.4 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/10. Windows Autoruns (Part 2).txt |
462 B |
TCM - SecurityOperations SOC101/06-Endpoint-Security/11. Windows Service Analysis.mkv |
39.2 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/12. Windows Scheduled Tasks.mkv |
33.3 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/13. Windows Endpoint Analysis Challenge 1.txt |
3 KB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/14. Windows Event Logs.mkv |
75.4 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/14. Windows Event Logs.txt |
463 B |
TCM - SecurityOperations SOC101/06-Endpoint-Security/15. Windows Events Challenge 1.txt |
1 KB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/16. Introduction to Sysmon.mkv |
43.4 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/17. Sysmon Events.mkv |
105.1 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/17. Sysmon Events.txt |
2 KB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/18. Linux Network Analysis.mkv |
39 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/19. Linux Process Analysis.mkv |
84.2 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/20. Linux Cron Jobs.mkv |
27.8 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/21. Linux Endpoint Analysis Challenge 1.txt |
3 KB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/22. Introduction to LimaCharlie.mkv |
17.7 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/23. LimaCharlie - Endpoint Detection and Response.mkv |
99 MB |
TCM - SecurityOperations SOC101/06-Endpoint-Security/24. LimaCharlie - Deploying Endpoint Agents.mkv |
58.2 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/1. Introduction to SIEM and Log Management.mkv |
13.7 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/2. SIEM Architecture.mkv |
36.4 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/3. SIEM Deployment Models.mkv |
15.3 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/4. Log Types.mkv |
24.5 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/5. Log Formats.mkv |
24.9 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/6. Common Attack Signatures - User Behavior.mkv |
24.5 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/7. Common Attack Signatures - SQL Injection.mkv |
14 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/8. Common Attack Signatures - Cross-Site Scripting.mkv |
7.9 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/9. Common Attack Signatures - Command Injection.mkv |
11.9 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/10. Common Attack Signatures - Path Traversal and Local File Inclusion.mkv |
8.1 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/11. Command Line Log Analysis.mkv |
70 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/12. Pattern Matching.mkv |
22.4 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/13. Structured Log Analysis.mkv |
21.2 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/14. Log Analysis Challenge 1.txt |
2 KB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/15. Introduction to Splunk.mkv |
23.7 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/16. Splunk - Initial Walkthrough.mkv |
22.4 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/17. Splunk - Importing and Exploring Events.mkv |
69.3 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/18. Splunk - Search Processing Language (SPL).mkv |
62.3 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/19. Splunk - Search Commands.mkv |
51.6 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/20. Splunk - Reports and Alerts.mkv |
21.3 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/21. Splunk - Creating Dashboards.mkv |
33.4 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/22. [Live] Splunk - Website Defacement Investigation.mkv |
270.5 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/23. Splunk - Ransomware Challenge.txt |
1 KB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/24. Splunk - Deploying a Forwarder and Generating Real-Time Alerts.mkv |
41.8 MB |
TCM - SecurityOperations SOC101/07-Security-Information-and-Event-Management-(SIEM)/25. Section Cleanup.txt |
545 B |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/1. Introduction to Threat Intelligence.mkv |
7.8 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/2. Types of Threat Intelligence.mkv |
33.3 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/3. The Threat Intelligence Cycle hide01.ir.mkv |
33.6 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/3. The Threat Intelligence Cycle.txt |
739 B |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/4. The Diamond Model of Intrusion Analysis.mkv |
40.8 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/4. The Diamond Model of Intrusion Analysis.txt |
197 B |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/5. The Cyber Kill Chain.mkv |
41.9 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/5. The Cyber Kill Chain.txt |
319 B |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/6. The Pyramid of Pain.mkv |
31.1 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/6. The Pyramid of Pain.txt |
169 B |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/7. MITRE ATT&CK.mkv |
161 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/7. MITRE ATT&CK.txt |
537 B |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/8. MITRE ATT&CK Challenge 1.txt |
3 KB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/9. Introduction to YARA.mkv |
25.8 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/10. YARA - Reading and Writing Rules (Part 1).mkv |
40.7 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/11. YARA - Reading and Writing Rules (Part 2).mkv |
39.2 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/12. YARA Challenge 1.txt |
3 KB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/13. Introduction to MISP (Malware Information Sharing Platform).mkv |
65 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/14. MISP - Event Management.mkv |
75.8 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/14. MISP - Event Management.txt |
1 KB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/15. MISP - Ingesting Threat Intelligence Feeds.mkv |
72.8 MB |
TCM - SecurityOperations SOC101/08-Threat-Intelligence/15. MISP - Ingesting Threat Intelligence Feeds.txt |
239 B |
TCM - SecurityOperations SOC101/09-Digital-Forensics/1. Introduction to Digital Forensics.mkv |
11.9 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/2. The Digital Forensics Investigation Process.mkv |
44.6 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/2. The Digital Forensics Investigation Process.txt |
110 B |
TCM - SecurityOperations SOC101/09-Digital-Forensics/3. Order of Volatility.mkv |
37.5 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/4. Chain of Custody.mkv |
24.6 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/4. Chain of Custody.pdf |
63 KB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/5. Introduction to FTK Imager.mkv |
49.8 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/6. FTK Imager - Forensic Image Acquisition.mkv |
23.8 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/7. FTK Imager - Memory Acquisition.mkv |
28.9 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/8. Common Windows Forensic Artifacts.mkv |
59.6 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/8. Common Windows Forensic Artifacts.txt |
317 B |
TCM - SecurityOperations SOC101/09-Digital-Forensics/9. Windows Forensic Artifacts - User and System hide01.ir.mkv |
63.2 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/9. Windows Forensic Artifacts - User and System.txt |
182 B |
TCM - SecurityOperations SOC101/09-Digital-Forensics/10. Windows Forensic Artifacts - Files.mkv |
47.9 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/10. Windows Forensic Artifacts - Files.txt |
182 B |
TCM - SecurityOperations SOC101/09-Digital-Forensics/11. Windows Forensic Artifacts - Program Execution.mkv |
50.7 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/11. Windows Forensic Artifacts - Program Execution.txt |
149 B |
TCM - SecurityOperations SOC101/09-Digital-Forensics/12. LNK Files, Prefetch Files, and Jump Lists.mkv |
106.3 MB |
TCM - SecurityOperations SOC101/09-Digital-Forensics/12. LNK Files, Prefetch Files, and Jump Lists.txt |
227 B |
TCM - SecurityOperations SOC101/09-Digital-Forensics/13. Windows Forensic Artifact Triage.mkv |
84.9 MB |
TCM - SecurityOperations SOC101/10-Conclusion/1. Course Wrap Up.mkv |
6 MB |