BITCQ

Getting Started Analyzing Malware Infections

Size: 249.2 MB
Magnet link

Name Size
Getting Started Analyzing Malware Infections/analyzing-malware-infections-getting-started/1-analyzing-malware-infections-getting-started-m1-slides.pdf 676 KB
Getting Started Analyzing Malware Infections/analyzing-malware-infections-getting-started/2-analyzing-malware-infections-getting-started-m2-slides.pdf 568 KB
Getting Started Analyzing Malware Infections/analyzing-malware-infections-getting-started/3-analyzing-malware-infections-getting-started-m3-slides.pdf 402 KB
Getting Started Analyzing Malware Infections/analyzing-malware-infections-getting-started/4-analyzing-malware-infections-getting-started-m4-slides.pdf 738 KB
Getting Started Analyzing Malware Infections/analyzing-malware-infections-getting-started/5-analyzing-malware-infections-getting-started-m5-slides.pdf 515 KB
Getting Started Analyzing Malware Infections/01 - Course Overview - Course Overview.mp4 6.9 MB
Getting Started Analyzing Malware Infections/02 - Investigating Malware Infections - Problem Statement.mp4 4.6 MB
Getting Started Analyzing Malware Infections/03 - Investigating Malware Infections - Understanding Phishing Tactics.mp4 6.2 MB
Getting Started Analyzing Malware Infections/04 - Investigating Malware Infections - Indicators of Compromise.mp4 4.4 MB
Getting Started Analyzing Malware Infections/05 - Investigating Malware Infections - Analyzing a Suspicious Mail.mp4 11.1 MB
Getting Started Analyzing Malware Infections/06 - Investigating Malware Infections - Setting up an Analysis Environment.mp4 4.3 MB
Getting Started Analyzing Malware Infections/07 - Investigating Malware Infections - Analyzing Malware Off Network.mp4 3.5 MB
Getting Started Analyzing Malware Infections/08 - Investigating Malware Infections - Snapshotting.mp4 2.3 MB
Getting Started Analyzing Malware Infections/09 - Investigating Malware Infections - Safe Handling Procedures.mp4 4.9 MB
Getting Started Analyzing Malware Infections/10 - Investigating Malware Infections - Safe Handling in Practice.mp4 12.1 MB
Getting Started Analyzing Malware Infections/11 - Investigating Malware Infections - Summary.mp4 2.2 MB
Getting Started Analyzing Malware Infections/12 - Analyzing Malicious Links - Classifying Malicious Links.mp4 4.6 MB
Getting Started Analyzing Malware Infections/13 - Analyzing Malicious Links - Exploit Kits.mp4 3.3 MB
Getting Started Analyzing Malware Infections/14 - Analyzing Malicious Links - Malicious Resources.mp4 3.4 MB
Getting Started Analyzing Malware Infections/15 - Analyzing Malicious Links - Victim's Perspective of an Infection.mp4 3.5 MB
Getting Started Analyzing Malware Infections/16 - Analyzing Malicious Links - Having the Right Approach.mp4 4.1 MB
Getting Started Analyzing Malware Infections/17 - Analyzing Malicious Links - Using the Right Tools.mp4 2.6 MB
Getting Started Analyzing Malware Infections/18 - Analyzing Malicious Links - Leveraging Open Source Intelligence.mp4 4 MB
Getting Started Analyzing Malware Infections/19 - Analyzing Malicious Links - Investigating Malicious Links.mp4 6.8 MB
Getting Started Analyzing Malware Infections/20 - Analyzing Malicious Links - Defending Against Future Threats.mp4 5.6 MB
Getting Started Analyzing Malware Infections/21 - Dissecting Infected Documents - Introduction.mp4 2.1 MB
Getting Started Analyzing Malware Infections/22 - Dissecting Infected Documents - How Infections Occur.mp4 4.6 MB
Getting Started Analyzing Malware Infections/23 - Dissecting Infected Documents - VBScript Primer.mp4 6.2 MB
Getting Started Analyzing Malware Infections/24 - Dissecting Infected Documents - Obfuscation Techniques.mp4 3 MB
Getting Started Analyzing Malware Infections/25 - Dissecting Infected Documents - Tackling Infected Documents.mp4 3.1 MB
Getting Started Analyzing Malware Infections/26 - Dissecting Infected Documents - Extracting Malicious Scripts from Documents.mp4 14.6 MB
Getting Started Analyzing Malware Infections/27 - Dissecting Infected Documents - Manual Code Inspection.mp4 10.6 MB
Getting Started Analyzing Malware Infections/28 - Dissecting Infected Documents - Identifying Indicators Through Debugging.mp4 12.3 MB
Getting Started Analyzing Malware Infections/29 - Dissecting Infected Documents - Wrapping Things Up.mp4 2.1 MB
Getting Started Analyzing Malware Infections/30 - Analyzing Malicious Archives - Introduction to Malicious Archives.mp4 2.6 MB
Getting Started Analyzing Malware Infections/31 - Analyzing Malicious Archives - Analyzing Self Extracting Archives.mp4 3.5 MB
Getting Started Analyzing Malware Infections/32 - Analyzing Malicious Archives - Dissecting Email Antivirus.mp4 1.9 MB
Getting Started Analyzing Malware Infections/33 - Analyzing Malicious Archives - Analyzing Password Protected Archives.mp4 3.9 MB
Getting Started Analyzing Malware Infections/34 - Analyzing Malicious Archives - Dynamic Analysis Overview.mp4 7.6 MB
Getting Started Analyzing Malware Infections/35 - Analyzing Malicious Archives - Introduction to Process Explorer.mp4 2.8 MB
Getting Started Analyzing Malware Infections/36 - Analyzing Malicious Archives - Introduction to TCPView.mp4 3 MB
Getting Started Analyzing Malware Infections/37 - Analyzing Malicious Archives - Analyzing Malicious Archives.mp4 25.3 MB
Getting Started Analyzing Malware Infections/38 - Analyzing Malicious Archives - Avoiding Common Pitfalls.mp4 4.6 MB
Getting Started Analyzing Malware Infections/39 - Designing the Process for Analyzing Malware - Introduction.mp4 1.7 MB
Getting Started Analyzing Malware Infections/40 - Designing the Process for Analyzing Malware - Reconstructing the Infection.mp4 4.3 MB
Getting Started Analyzing Malware Infections/41 - Designing the Process for Analyzing Malware - Triage Techniques for Malicious Activity.mp4 4.5 MB
Getting Started Analyzing Malware Infections/42 - Designing the Process for Analyzing Malware - Analysis Checklists.mp4 5.5 MB
Getting Started Analyzing Malware Infections/43 - Designing the Process for Analyzing Malware - Avoiding Common Pitfalls.mp4 3 MB
Getting Started Analyzing Malware Infections/44 - Designing the Process for Analyzing Malware - Allies in Combating Malware.mp4 2.8 MB
Getting Started Analyzing Malware Infections/45 - Designing the Process for Analyzing Malware - Where to Start.mp4 8.7 MB
Getting Started Analyzing Malware Infections/46 - Designing the Process for Analyzing Malware - Final Considerations.mp4 1.9 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...