Packt Cyber Threat Hunting Jan 2019

Packt | Cyber Threat Hunting | Jan 2019
English | Size: 978.12 MB
Category: Tutorial

Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them. [Read more…]

PLURALSIGHT HUNTING FOR FILELESS MALWARE

PLURALSIGHT HUNTING FOR FILELESS MALWARE
English | Size: 841.38 MB
Category: Tutorial

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations
from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI)
and the types of defenses you can use. By the end of this course, you ll have a solid understanding of the various types of fileless malware and how best to defend against it [Read more…]

Hunting for Fileless Malware

Hunting for Fileless Malware
English | Size: 833.05 MB
Category: HACKING | Networking | Security

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is, why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI), and the types of defenses you can use. By the end of this course, you’ll have a solid understanding of the various types of fileless malware and how best to defend against it. [Read more…]

Skip to toolbar