RAR-files |
jgt-poctip.rar |
15,000,000 |
7C42D707 |
jgt-poctip.r00 |
15,000,000 |
2C490520 |
jgt-poctip.r01 |
15,000,000 |
951E124E |
jgt-poctip.r02 |
15,000,000 |
D1097E39 |
jgt-poctip.r03 |
15,000,000 |
AE808BD8 |
jgt-poctip.r04 |
15,000,000 |
E9106C02 |
jgt-poctip.r05 |
15,000,000 |
FE51D732 |
jgt-poctip.r06 |
15,000,000 |
C85C8122 |
jgt-poctip.r07 |
15,000,000 |
14FB35EF |
jgt-poctip.r08 |
15,000,000 |
3232FE99 |
jgt-poctip.r09 |
15,000,000 |
4620DAEE |
jgt-poctip.r10 |
15,000,000 |
9F318D7A |
jgt-poctip.r11 |
15,000,000 |
EE028F79 |
jgt-poctip.r12 |
15,000,000 |
25FD5A4A |
jgt-poctip.r13 |
15,000,000 |
FCE5E045 |
jgt-poctip.r14 |
15,000,000 |
F0AF807F |
jgt-poctip.r15 |
15,000,000 |
5369ED81 |
jgt-poctip.r16 |
15,000,000 |
C2624C31 |
jgt-poctip.r17 |
15,000,000 |
4753DC1D |
jgt-poctip.r18 |
15,000,000 |
E9441CED |
jgt-poctip.r19 |
15,000,000 |
22E27141 |
jgt-poctip.r20 |
15,000,000 |
9EF5158B |
jgt-poctip.r21 |
15,000,000 |
3B42F4D8 |
jgt-poctip.r22 |
15,000,000 |
15A9576C |
jgt-poctip.r23 |
15,000,000 |
C3934D4D |
jgt-poctip.r24 |
15,000,000 |
D6CDD770 |
jgt-poctip.r25 |
15,000,000 |
D711C306 |
jgt-poctip.r26 |
6,495,049 |
259BE242 |
|
Total size: |
411,495,049 |
|
|
Archived
files |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\01.Course Overview\0101.Course Overview.mp4
[1ac4047a8b88c0a]
|
4,848,829 |
26190567 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\02.Introduction to Cyber Threat Intelligence (CTI)\0201.Introduction to Cyber Threat Intelligence (CTI).mp4
[3eddc4ce7844aa6f]
|
1,404,088 |
D38A904E |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\02.Introduction to Cyber Threat Intelligence (CTI)\0202.Course Expectations.mp4
[66e93009377609]
|
2,721,082 |
7C74F268 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\02.Introduction to Cyber Threat Intelligence (CTI)\0203.Course Modus Operandi.mp4
[251f5297cf8a4da2]
|
1,677,521 |
9F9FDD56 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\02.Introduction to Cyber Threat Intelligence (CTI)\0204.Pivoting and Hunting Explained.mp4
[3c91e32ebd02347f]
|
5,229,283 |
FCAF96ED |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\02.Introduction to Cyber Threat Intelligence (CTI)\0205.Demo Scenario and Wrap-up.mp4
[5564b11faa64ab41]
|
2,190,284 |
5DB4EED5 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\03.Generating, Obtaining, and Using CTI\0301.Identifying and Working with CTI.mp4
[3c7be14836c5d56f]
|
1,072,520 |
0E374F0F |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\03.Generating, Obtaining, and Using CTI\0302.Cyber Threat Intelligence Defined.mp4
[19bcff6310510f13]
|
2,880,415 |
E8AABD08 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\03.Generating, Obtaining, and Using CTI\0303.The Origins of CTI.mp4
[a5a782b3c5f82b5e]
|
5,353,728 |
4D361A16 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\03.Generating, Obtaining, and Using CTI\0304.CTI Handling Guidelines.mp4
[1c6fcb473db15d88]
|
8,105,940 |
B2EA7D39 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\03.Generating, Obtaining, and Using CTI\0305.Module Wrap-up.mp4
[825e3fc9aadbf9cf]
|
1,156,135 |
5C2B7B4A |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\04.Pivoting and Hunting IOC Extraction\0401.Module Overview.mp4
[39ed1780e36ee224]
|
821,372 |
8A398A1C |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\04.Pivoting and Hunting IOC Extraction\0402.IOC Refresher.mp4
[7ef2af6ed2951671]
|
4,154,121 |
678106EE |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\04.Pivoting and Hunting IOC Extraction\0403.Extraction Network-based IOCs.mp4
[8eae3e78889eca5]
|
34,053,577 |
C62E94E5 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\04.Pivoting and Hunting IOC Extraction\0404.Extraction Host-based IOCs.mp4
[aa0f233a5c698986]
|
17,988,745 |
A3E1B0C1 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\04.Pivoting and Hunting IOC Extraction\0405.Extraction Email-based IOCs.mp4
[7f3634b7181a4bee]
|
32,290,869 |
495E1EF4 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\04.Pivoting and Hunting IOC Extraction\0406.Module Wrap-up.mp4
[7ae7d37160a05a6c]
|
577,576 |
CD9A2335 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\05.Pivoting and Hunting IOC Pivoting\0501.Module Overview.mp4
[2638ce041f4adfdf]
|
884,648 |
30ABC050 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\05.Pivoting and Hunting IOC Pivoting\0502.Pivoting Overview.mp4
[293e808ed250dc66]
|
2,807,122 |
2725CA35 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\05.Pivoting and Hunting IOC Pivoting\0503.Pivoting Network-based IOCs.mp4
[34d8c5fd364be895]
|
43,144,389 |
04A5D557 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\05.Pivoting and Hunting IOC Pivoting\0504.Pivoting Host-based IOCs.mp4
[dfaad75f8c169916]
|
45,203,410 |
8EA4A39C |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\05.Pivoting and Hunting IOC Pivoting\0505.Pivoting Email-based IOCs.mp4
[9eb890d78dca4414]
|
17,594,987 |
3576C9C6 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\06.Pivoting and Hunting IOC Hunting\0601.Module Overview.mp4
[f4ddd2756bb6f4d9]
|
1,003,806 |
B7C1475C |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\06.Pivoting and Hunting IOC Hunting\0602.Hunting Overview.mp4
[7e641de5425bd82d]
|
4,367,935 |
3C082814 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\06.Pivoting and Hunting IOC Hunting\0603.Hunting Network-based IOCs.mp4
[e86bba920dfc9466]
|
53,446,794 |
BD3E0945 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\06.Pivoting and Hunting IOC Hunting\0604.Hunting Host-based IOCs.mp4
[3e7e68280c4ef20a]
|
17,051,753 |
A18D3C80 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\06.Pivoting and Hunting IOC Hunting\0605.Hunting Email-based IOCs.mp4
[370e5f61e6ab6ffc]
|
18,064,729 |
EE2782BF |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\06.Pivoting and Hunting IOC Hunting\0606.Module Wrap-up.mp4
[3aa71ae4a9ec48ae]
|
801,018 |
B0928C69 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\07.Intel Management Storing, Correlating, and Sharing\0701.Module Overview.mp4
[7c42adde5f91ee8d]
|
1,028,395 |
8F8247DD |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\07.Intel Management Storing, Correlating, and Sharing\0702.Intro Threat Intelligence Platforms.mp4
[8b148cf286e61bb2]
|
3,988,188 |
CA3F1502 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\07.Intel Management Storing, Correlating, and Sharing\0703.MISP Adding IOCs.mp4
[6db5b6e513b7ea32]
|
33,404,022 |
E5E9AF97 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\07.Intel Management Storing, Correlating, and Sharing\0704.MISP Sharing IOCs.mp4
[ccaa65364469cd72]
|
22,409,961 |
3FFA9F15 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\07.Intel Management Storing, Correlating, and Sharing\0705.Module Wrap-up.mp4
[8dc030a88fb07bcd]
|
515,455 |
551BDC08 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\08.Course Review and Next Steps\0801.Module Overview.mp4
[a22dcac06bea36e7]
|
867,528 |
3DFF1AA6 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\08.Course Review and Next Steps\0802.What's Next.mp4
[6af461142d0d6fb2]
|
4,045,059 |
6D39B52D |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\08.Course Review and Next Steps\0803.Module Wrap-up.mp4
[93a85c372647d135]
|
784,774 |
3789A63A |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\Exercise Files\operationalizing-cyber-threat-intel-pivoting-hunting.zip |
9,461,961 |
0D80575A |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\01.Course Overview |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\02.Introduction to Cyber Threat Intelligence (CTI) |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\03.Generating, Obtaining, and Using CTI |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\04.Pivoting and Hunting IOC Extraction |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\05.Pivoting and Hunting IOC Pivoting |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\06.Pivoting and Hunting IOC Hunting |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\07.Intel Management Storing, Correlating, and Sharing |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\08.Course Review and Next Steps |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting\Exercise Files |
0 |
00000000 |
Pluralsight Operationalizing Cyber Threat Intel Pivoting & Hunting |
0 |
00000000 |
|
Total size: |
407,402,019 |
|
|