Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Advanced Persistent Threat Analyst
1.UNDERSTANDING APTS
1. Advanced Persistent Threat Defender Course Intro (5:14)
2. APT Overview Part 1 (5:43)
3. APT Overview Part 2 (4:49)
4. APT Overview Part 3 (6:32)
5. APT Overview Part 4 (7:51)
6. APT Overview Part 5 (7:25)
8. Cyber Kill Chain & APT Lifecycle Part 1 (9:33)
9. Cyber Kill Chain & APT Lifecycle Part 2 (8:59)
10. Cyber Kill Chain & APT Lifecycle Part 3 (8:51)
11. Cyber Kill Chain & APT Lifecycle Part 4 (11:40)
12. Cyber Kill Chain & APT Lifecycle Part 5 (10:17)
14. Cyber Kill Chain & APT Lifecycle Part 6 (6:44)
15. Cyber Kill Chain & APT Lifecycle Part 7 (10:13)
16. Cyber Kill Chain & APT Lifecycle Part 8 (5:33)
17. Stuxnet Overview Part 1 (9:37)
18. Stuxnet Overview Part 2 (10:14)
19. Stuxnet Overview Part 3 (5:53)
20. Cyberwar New Domain of Warfare (10:38)
2.EQUATION GROUP
21. Equation Group Overview Part 1 (7:03)
22. Equation Group Overview Part 2 (9:35)
23. APT_Course 2_Class 2 Equation Group Components_Part 1 (5:25)
24. APT_Course 2_Class 2 Equation Group Components_Part 2 (6:24)
25. APT_Course 2_Class 2 Equation Group Components_Part 3 (5:37)
26. DoubleFantasy (5:48)
27. EquationDrug (7:33)
28. GrayFish (10:15)
29. Fanny Part 1 (5:58)
30. Fanny Part 2 (6:53)
31. Infection Mechanism (7:53)
3.ADVANCED DISSECTING TECHNIQUES
33. Advanced Dissecting Techniques Overview Part 1 (7:02)
34. Advanced Dissecting Techniques Overview Part 2 (7:50)
35. Binary Instrumentation Part 1 (7:54)
36. Binary Instrumentation Part 2 (6:08)
37. Binary Instrumentation Part 3 (7:29)
38. Automated String Decoding Part 1 (7:33)
39. Automated String Decoding Part 2 (6:45)
40. Automated String Decoding Part 3 (8:04)
41. Automated String Decoding Part 4 (4:19)
42. Immunity Debugger PyCommands Part 1 (5:55)
43. Immunity Debugger PyCommands Part 2 (7:30)
44. Immunity Debugger PyCommands Part 3 (6:16)
45. Immunity Debugger PyCommands Part 4 (8:17)
46. Windows Kernel Drivers Analysis Part 1 (5:16)
47. Windows Kernel Drivers Analysis Part 2 (6:09)
48. Windows Kernel Drivers Analysis Part 3 (6:16)
49. Windows Kernel Drivers Analysis Part 4 (6:01)
50. Windows Kernel Drivers Analysis Part 5 (8:13)
4.FIGHTING ATPS
51. The Challenge Part 1 (6:39)
52. The Challenge Part 2 (5:38)
53. The Challenge Part 3 (5:42)
54. Callback detection strategy Part 1 (6:36)
55. Callback detection strategy Part 2 (7:07)
56. Application Crashing Monitoring (7:50)
57. Behavior-based Analysis (5:29)
58. Machine Learning (8:30)
Teach online with
12. Cyber Kill Chain & APT Lifecycle Part 5
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock