Advanced Endpoint Investigations w/ Alissa Torres | Antisyphon
English | Tutorial | Size: 5.90 GB
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint data. This course focuses on four core investigative competencies: endpoint data collection, investigative triage, incident response pivots, and root cause analysis.
After learning about key endpoint artifact and memory analysis techniques for Windows and Linux, attendees will work through real-world scenarios in hands-on labs. We’ll pivot from initial detection into host triage analysis to discern attackers’ discovery, defense evasion and lateral movement techniques. Attendees will learn to identify key indicators for the generation of high-fidelity detections.
RAPIDGATOR
rapidgator.net/file/67c0600c4d59d2849772d9daae102100/Advanced-Endpoint-Investigation-Videos.part01.rar.html
rapidgator.net/file/89d0741702fb22a3879360455109b4f4/Advanced-Endpoint-Investigation-Videos.part02.rar.html
rapidgator.net/file/161643131408dc0ef21836063e962432/Advanced-Endpoint-Investigation-Videos.part03.rar.html
rapidgator.net/file/ca4fc4803324d9d99c9683bdd07e401c/Advanced-Endpoint-Investigation-Videos.part04.rar.html
rapidgator.net/file/422aa45d6ccee12a7802c10e74363ece/Advanced-Endpoint-Investigation-Videos.part05.rar.html
rapidgator.net/file/18dc3121a0ae98c6ae4b4f4d06ce4aca/Advanced-Endpoint-Investigation-Videos.part06.rar.html
rapidgator.net/file/7fe2c61b2ff21bceeb95a7cc5d336ca6/Advanced-Endpoint-Investigation-Videos.part07.rar.html
rapidgator.net/file/261a2c103edde3ee79b74db03146590f/Advanced-Endpoint-Investigation-Videos.part08.rar.html
rapidgator.net/file/25b1e5bab0620024bdb4fef644ba92fd/Advanced-Endpoint-Investigation-Videos.part09.rar.html
NITROFLARE
nitroflare.com/view/0E9E20EF4C829B1/Advanced-Endpoint-Investigation-Videos.part01.rar
nitroflare.com/view/B64891E1FD20E1F/Advanced-Endpoint-Investigation-Videos.part02.rar
nitroflare.com/view/793CBB8B715F00F/Advanced-Endpoint-Investigation-Videos.part03.rar
nitroflare.com/view/CEBA2B8C2B0BDD9/Advanced-Endpoint-Investigation-Videos.part04.rar
nitroflare.com/view/8CD0BF30AF804C8/Advanced-Endpoint-Investigation-Videos.part05.rar
nitroflare.com/view/D814F6F98E1771A/Advanced-Endpoint-Investigation-Videos.part06.rar
nitroflare.com/view/F8279AEADF40C40/Advanced-Endpoint-Investigation-Videos.part07.rar
nitroflare.com/view/69C2B878A4A839F/Advanced-Endpoint-Investigation-Videos.part08.rar
nitroflare.com/view/AA03A5A1AA025D3/Advanced-Endpoint-Investigation-Videos.part09.rar