PluralSight - Wireshark Configuration for Cyber Security Analysis

seeders: 11
leechers: 11
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 177
  • Language: English

Files

[ FreeCourseWeb.com ] PluralSight - Wireshark Configuration for Cyber Security Analysis
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01. Course Overview
    • 01. Course Overview.mp4 (3.4 MB)
    • 01. Course Overview.mp4.jpg (156.3 KB)
    02. Top Five Wireshark Features for Forensic Analysis
    • 02. Introduction to Cyber Security Analysis with Wireshark.mp4 (5.2 MB)
    • 03. Lab 1 - Creating a Security Profile.mp4 (26.3 MB)
    • 04. Lab 2 - The Statistics View.mp4 (22.1 MB)
    • 05. Lab 3 - Configuring GeoIP Location Resolution.mp4 (17.4 MB)
    • 06. Lab 4 - Configuring Custom Columns.mp4 (20.8 MB)
    • 07. Lab 5 - Configuring Name Resolution.mp4 (23.3 MB)
    • 08. Lab 6 - Exporting HTTP Objects and Files.mp4 (13.6 MB)
    • 09. Lab 7 - Reassembling and Exporting FTP Files.mp4 (18.3 MB)
    • 10. Module Summary.mp4 (832.6 KB)
    03. Filters and Coloring Rules for Spotting Suspect Traffic
    • 11. Intro to Filters and Coloring Rules in Wireshark.mp4 (2.4 MB)
    • 12. Analyzing Unusual DNS Activity.mp4 (2.6 MB)
    • 13. Lab 7 - Part 1 - Filtering for Unusual DNS Activity.mp4 (34.5 MB)
    • 14. Lab 7 - Part 2 - Filtering for Unusual DNS Activity.mp4 (8.0 MB)
    • 15. Analyzing Traffic from Unusual Country Codes.mp4 (1.5 MB)
    • 16. Lab 8 - Filtering for Traffic Based on Country Location.mp4 (25.5 MB)
    • 17. Analyzing Suspect TCP Behavior and Flags.mp4 (3.6 MB)
    • 18. Lab 9 - Part 1 - Filtering for Suspect TCP Behavior.mp4 (24.5 MB)
    • 19. Lab 9 - Part 2 - Filtering for Suspect SSH Traffic.mp4 (5.4 MB)
    • 20. Lab 10 - Filtering for Executable Files.mp4 (18.8 MB)
    • 21. Lab 11 - Analyzing Traffic over Non-standard Ports.mp4 (25.8 MB)
    • 22. Summary.mp4 (745.7 KB)
    04. Configuring Wireshark for Decrypting Traffic
    • 23. Module Introduction.mp4 (2.0 MB)
    • 24. Capturing the TLS Session Keys.mp4 (3.7 MB)
    • 25. Lab 12 - Decrypting TLS Traffic in Wireshark.mp4 (8.0 MB)
    • 26. Course Summary.mp4 (1.5 MB)
    • Bonus Resources.txt (0.3 KB)
    • Exercise Files 02 demos
      • GeoLite2-ASN.mmdb (6.3 MB)
      • GeoLite2-City.mmdb (60.9 MB)
      • GeoLite2-Country.mmdb (3.8 MB)
      • Lab 1 and 2_Profiles and Stats.pcapng (470.7 KB)
      • Lab 3 and 4_GeoIP and Columns.pcapng (32.3 MB)
      • Lab 5_Name Resolution.pcapng (2.6 MB)
      • Lab 6_Part 1_Export Objects.pcapng (51.6 KB)
      • Lab 6_Part 2_Objects FTP.pcapng (13.3 KB)
      • __MACOSX
        • _GeoLite2-ASN.mmdb (0.2 KB)
        • _GeoLite2-City.mmdb (0.2 KB)
        • _GeoLite2-Country.mmdb (0.2 KB)
        • top-five-wireshark-features-for-forensic-analysis-slides.pdf (935.7 KB)
        • 03 demos
          • Lab 7_DNSActivity.pcapng (105.4 KB)
          • filters-and-coloring-rules-for-spotting-suspect-traffic-slides.pdf (3.9 MB)
          • 04
            • configuring-wireshark-for-decrypting-traffic-slides.pdf (4.7 MB)
            • demos
              • Lab 12 - Decrypting Traffic.pcapng (72.9 KB)
              • sslkeylog.log (0.8 KB)

Description

Wireshark Configuration for Cyber Security Analysis



Duration: 1h 28m | Video: .MP4 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | Size: 399 MB
Level: Intermediate | Genre: eLearning | Language: English
This course will teach you the best settings and filters to use in Wireshark for quickly spotting malware behavior, enumeration and scans, and other suspect traffic.
Properly configuring Wireshark can greatly help to track down IoCs and can reduce the time required for Cyber Security professionals to perform network forensics. In this course, Wireshark Configuration for Cyber Security Analysis, you'll learn to quickly spot suspect traffic with Wireshark. First, you'll explore the top five Wireshark settings that all Security Professionals should implement when analyzing traffic. Next, you'll discover how to create filters and coloring rules that will make suspect traffic stand out. Finally, you'll learn how to decrypt TLS traffic for analyzing secure communications. When you're finished with this course, you'll have the skills and knowledge of Wireshark needed to speed up traffic analysis and incident response.



Download torrent
436.1 MB
seeders:11
leechers:11
PluralSight - Wireshark Configuration for Cyber Security Analysis


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
436.1 MB
seeders:11
leechers:11
PluralSight - Wireshark Configuration for Cyber Security Analysis


Torrent hash: 96C99FCF8AF750104B241CEB78A88C4EBE9C18B6