08-28-2018, 12:01 AM
PDF
Videos
https://www.thunix.org/~xkern/
Code:
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/2018-07-18 19:02 -
FOR500 - Windows Forensic Analysis/2018-07-18 19:02 -
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/2018-07-18 19:02 -
FOR518 - Mac and iOS Forensic Analysis and Incident Response/2018-07-18 19:02 -
FOR526 - Memory Forensics In-Depth/2018-07-18 19:02 -
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/2018-07-18 19:02 -
FOR585 - Advanced Smartphone Forensics/2018-07-18 19:02 -
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/2018-07-18 19:02 -
ICS410 - ICS SCADA Security Essentials/2018-07-18 19:02 -
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/2018-07-18 19:02 -
MGT514 - Security Strategic Planning, Policy, and Leadership/2018-07-18 19:02 -
MGT517 - Managing Security Operations Detection, Response, and Intelligence/2018-07-18 19:02 -
SEC201 - Computing & Technology Essentials/2018-07-18 19:02 -
SEC401 - Security Essentials Bootcamp Style/2018-07-18 19:02 -
SEC501 - Advanced Security Essentials - Enterprise Defender/2018-07-18 19:02 -
SEC503 - Intrusion Detection In-Depth/2018-07-18 19:02 -
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/2018-07-18 19:02 -
SEC505 - Securing Windows and PowerShell Automation/2018-07-18 19:02 -
SEC506 - Securing Linux-Unix/2018-07-18 19:02 -
SEC511 - Continuous Monitoring and Security Operations/2018-07-18 19:02 -
SEC524 - Cloud Security Fundamentals/2018-07-18 19:02 -
SEC542 - Web App Penetration Testing and Ethical Hacking/2018-07-18 19:02 -
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception/2018-07-18 19:02 -
SEC555 - SIEM with Tactical Analytics/2018-07-18 19:02 -
SEC560 - Network Penetration Testing and Ethical Hacking/2018-07-18 19:02 -
SEC561 - Immersive Hands-on Hacking Techniques/2018-07-18 19:02 -
SEC564 - Red Team Operations and Threat Emulation/2018-07-18 19:02 -
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/2018-07-18 19:02 -
SEC573 - Automating Information Security with Python/2018-07-18 19:02 -
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/2018-07-18 19:02 -
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2018-07-18 19:02 -
SEC617 - Wireless Penetration Testing and Ethical Hacking/2018-07-18 19:02 -
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/2018-07-18 19:02 -
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/2018-07-18 19:02 -
SEC760 - Advanced Exploit Development for Penetration Testers/2018-07-18 19:02 -
Videos
Code:
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/2018-07-18 19:06 -
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/2018-07-18 19:06 -
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/2018-07-18 19:06 -
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/2018-07-18 19:06 -
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/2018-07-18 19:06 -
SEC505 - Securing Windows and PowerShell Automation/2018-07-18 19:06 -
SEC506 - Securing Linux-Unix/2018-07-18 19:06 -
SEC542 - Web App Penetration Testing and Ethical Hacking/2018-07-18 19:06 -
SEC560 - Network Penetration Testing and Ethical Hacking/2018-07-18 19:06 -
SEC575 - Mobile Device Security and Ethical Hacking/2018-07-18 19:06 -
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/2018-07-18 19:06 -
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/2018-07-18 19:06 -
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/2018-07-18 19:06 -
https://www.thunix.org/~xkern/