Udemy – Cybersecurity Threat Hunting for SOC Analysts Author Vonnie Hudson
English | Tutorial | Size: 5.25 GB
Get modern blue team skills for finding covert threats in enterprise networks.
Zeek + Suricata.
Splunk.
Sysmon.
Microsoft Advanced Threat Analytics.
TCPdump + ngrep
Wireshark + tshark.
Wait, I’m not done.
capinfos.
RITA.
Bloodhound.
Bad Blood.
Detection Lab.
Metasploit + msfvenom + Meterpreter + Process Injection.
Mimikatz.
OS Query.
Velociraptor + Memory Forensics.
Taking a breath… one sec… okay..
Fleet.
MITRE ATT&CK.
MITRE Caldera.
Prelude Operator.
Atomic Red Team.
Purple Sharp.
Boss of the SOC???
Yup.
This is one course. One source. One resource that has the potential to change your professional life.
Check out the free content and level up your cyber skills by learning how to become a threat hunter…
Everything is step by step.
You will learn how to detect advanced threat actors on enterprise networks…
How will you learn this?
By building a modern lab replete with a Domain Controller, Windows 10 endpoint instrumented with Powershell logging, Sysmon, OS Query, Velociraptor and more.
You will attack and detect threats like a pro.
This was the dream course I wish I had when I was getting into cyber.
Everything is carefully, patiently and thoughtfully explained.
It took me two months to build this course and I’ve poured my heart and soul into every lecture.
If you’re trying to get into cybersecurity from another career or you’re curious how the bad guys breach and persist in networks then this course is for you. I’ve not held anything back. Everything you need to become a competent threat hunter is included in over 8 hours of content.
Are you ready?
I am! sign-up now and let’s get started!
Update 10/22/2022: Added new lecture explaining how to install Zeek on the latest Kali
RAPIDGATOR:
rapidgator.net/file/d775df1ed0deca39058cf1440871abb1/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part1.rar.html
rapidgator.net/file/24aff04f7a14044621a75fb1ceb52435/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part2.rar.html
rapidgator.net/file/7bc21ad3210c227e7118d275d6a5f75d/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part3.rar.html
rapidgator.net/file/85c4437878647a21343b175fbe8c833c/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part4.rar.html
rapidgator.net/file/3cba0b412848e7f5a29e5ed487225547/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part5.rar.html
TURBOBIT:
tbit.to/wnq6es3w56gz/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part1.rar.html
tbit.to/u7za3wmq9ms7/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part2.rar.html
tbit.to/w5tmzdd5p7l8/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part3.rar.html
tbit.to/mvnr0w08zw2u/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part4.rar.html
tbit.to/6hy359ntjn6g/Udemy_-_Cybersecurity_Threat_Hunting_for_SOC_Analysts_Author_Vonnie_Hudson.part5.rar.html