Welcome to Mobilarian Forum - Official Symbianize.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Sdf: Zero-Day Response

OP
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
42,643
Reaction score
1,062
Points
113
Age
36
Location
japanse
grants
₲67,093
2 years of service

d02bffaab07918db6a58bc505a0a2df7.jpeg

Sdf: Zero-Day Response
Published 3/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 896.81 MB | Duration: 1h 7m

Tactical Approaches for Zero-Day Response in Security Operations​

What you'll learn
Learn about handling zero-day vulnerabilities from a DFIR point-of-view
Learn to organize and carry out intel gathering and risk assessment
Learn to organize and carry out scoping and detection tasks
Learn to organize and implement containment and mitigation strategies
Learn to organize and carry out a fast triage for compromise validation
Requirements
A background in security is helpful but not necessary
Knowledge of common security tools is helpful, but not necessary
Knowledge of the incident response investigation lifecycle is helpful, but not necessary
Description
Are you ready to become a skilled responder against zero-day vulnerabilities? This course provides you with the essential skills and techniques needed to effectively organize, evaluate, and respond to these critical security threats. You will be guided through practical guidelines to aid you in the initial stages of gathering intel and assessing risks, preparing you for the crucial containment and mitigation tasks required to handle a zero-day vulnerability.But that's not all - this course goes beyond the basics by teaching you scoping and detection tasks to effectively respond to zero-day vulnerabilities. You will also learn how to develop and implement a rapid triage strategy, enabling you to detect potential compromise quickly and minimize damage to your organization, ultimately saving valuable time and money.The course also highlights the importance of organizing your security tasks for maximum effectiveness, ensuring that you take the right steps at the right time. You will see these principles in action through the log4j zero-day vulnerability response example, which provides you with a real-world perspective on these critical security procedures. By the end of this course, you will have gained the skills and knowledge needed to respond effectively to zero-day vulnerabilities, making you an asset to any organization in protecting against potential cyber threats.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Use Cases
Lecture 3 Class Topics
Lecture 4 Zero-Day Example
Section 2: About Zero-Days
Lecture 5 Zero-day criteria
Lecture 6 Zero-day phases
Lecture 7 More about phases
Lecture 8 Incident response preparedness
Section 3: Intel and Risk Assessment
Lecture 9 Intel and Risk Assessment Guidelines
Lecture 10 Intel and Risk Assessment Part 1
Lecture 11 Intel and Risk Assessment Part 2
Lecture 12 Intel and Risk Example Part 1
Lecture 13 Intel and Risk Example Part 2
Lecture 14 Intel and Risk Example Part 3
Lecture 15 Re-Evaluate the Risk
Section 4: Scoping and Detection
Lecture 16 Scoping and Detection guidelines
Lecture 17 Scoping and Detection Part 1
Lecture 18 Scoping and Detection Part 2
Lecture 19 Scoping and Detection Part 3
Lecture 20 Scoping and Detection Part 4
Lecture 21 Scoping and Detection Example Part 1
Lecture 22 Scoping and Detection Example Part 2
Lecture 23 Scoping and Detection Example Part 3
Lecture 24 Scoping and Detection Example Part 4
Lecture 25 Scoping and Detection Example Part 5
Lecture 26 Scoping and Detection Example Part 6
Lecture 27 Scoping and Detection Example Part 7
Lecture 28 Scoping and Detection Example Part 8
Section 5: Containment and Mitigation
Lecture 29 Containment and Mitigation Guidelines
Lecture 30 Containment and Mitigation Part 1
Lecture 31 Containment and Mitigation Part 2
Lecture 32 Containment and Mitigation Part 3
Lecture 33 Containment and Mitigation Part 3 - Resource
Lecture 34 Containment and Mitigation Part 4
Lecture 35 Containment and Mitigation Part 4 - Resource
Lecture 36 Containment and Mitigation Part 5
Lecture 37 Containment and Mitigation Part 6
Lecture 38 Containment and Mitigation Part 7
Lecture 39 Containment and Mitigation Example Part 1
Lecture 40 Containment and Mitigation Example Part 2
Section 6: Triage
Lecture 41 Triage guidelines
Lecture 42 Triage Part 1
Lecture 43 Triage Part 2 with Example
Lecture 44 Triage Part 3 with Example
Lecture 45 Triage Part 4 with Example
Lecture 46 Triage Part 5 with Example
Section 7: Conclusion
Lecture 47 Conclusion
This course is designed for newer DFIR and security incident response professionals, or anyone who wishes to become more proficient in zero-day response

8af34cedc2ad4d94229eb4a87a95b7ac.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

nitroflare.com:
You must reply in thread to view hidden text.

1dl.net:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
977,458
Reaction score
8,836
Points
83
grants
₲59,582
3 years of service
oaxino salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom