eLearnSecurity Certified Incident Responder (eCIR)
Free

-
eLearnSecurity Certified Incident Responder (eCIR) | Eng-Ahmed Sultan
- 01-eCIR Course Introduction
- 02-Incident Handling Process – Part 1
- 03-Incident Handling Process – Part 2
- 04-Incident Handling Process – Part 3
- 05-Incident Handling Process – Part 4 (Enterprise Wide Incident Response GRR Lab)
- 06-Incident Handling Process – Part 5 (Enterprise Wide Incident Response Velociraptor Lab)
- 07-Intrusion Detection by Analyzing Traffic Module 1 – Part 1
- 08-Intrusion Detection by Analyzing Traffic Module 1 – Part 2
- 09-Intrusion Detection by Analyzing Traffic Module 1 – Part 3
- 10-Intrusion Detection by Analyzing Traffic Module 1 – Part 4
- 11-Intrusion Detection by Analyzing Traffic Module 2 – Part 1
- 12-Intrusion Detection by Analyzing Traffic Module 2 – Part 2
- 13-Intrusion Detection by Analyzing Traffic Module 2 – Part 3
- 14-Intrusion Detection by Analyzing Traffic Module 2 – Part 4
- 15-Intrusion Detection by Analyzing Traffic Module 2 – Part 5
- 16-Intrusion Detection by Analyzing Traffic Module 2 – Part 6
- 17-Intrusion Detection by Analyzing Traffic Module 2 – Part 7
- 18-Intrusion Detection by Analyzing Traffic Module 2 – Part 8
- 19-Intrusion Detection by Analyzing Flows – Part 1
- 20-Intrusion Detection by Analyzing Flows – Part 2
- 21-Preparing and Defending Against Reconnaissance and Information Gathering
- 22-[BONUS] Information Gathering
- 23-Preparing and Defending Against Scanning