Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Sdf: Zero-Day Response

    Posted By: ELK1nG
    Sdf: Zero-Day Response

    Sdf: Zero-Day Response
    Published 3/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 896.81 MB | Duration: 1h 7m

    Tactical Approaches for Zero-Day Response in Security Operations

    What you'll learn

    Learn about handling zero-day vulnerabilities from a DFIR point-of-view

    Learn to organize and carry out intel gathering and risk assessment

    Learn to organize and carry out scoping and detection tasks

    Learn to organize and implement containment and mitigation strategies

    Learn to organize and carry out a fast triage for compromise validation

    Requirements

    A background in security is helpful but not necessary

    Knowledge of common security tools is helpful, but not necessary

    Knowledge of the incident response investigation lifecycle is helpful, but not necessary

    Description

    Are you ready to become a skilled responder against zero-day vulnerabilities? This course provides you with the essential skills and techniques needed to effectively organize, evaluate, and respond to these critical security threats. You will be guided through practical guidelines to aid you in the initial stages of gathering intel and assessing risks, preparing you for the crucial containment and mitigation tasks required to handle a zero-day vulnerability.But that's not all - this course goes beyond the basics by teaching you scoping and detection tasks to effectively respond to zero-day vulnerabilities. You will also learn how to develop and implement a rapid triage strategy, enabling you to detect potential compromise quickly and minimize damage to your organization, ultimately saving valuable time and money.The course also highlights the importance of organizing your security tasks for maximum effectiveness, ensuring that you take the right steps at the right time. You will see these principles in action through the log4j zero-day vulnerability response example, which provides you with a real-world perspective on these critical security procedures. By the end of this course, you will have gained the skills and knowledge needed to respond effectively to zero-day vulnerabilities, making you an asset to any organization in protecting against potential cyber threats.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Use Cases

    Lecture 3 Class Topics

    Lecture 4 Zero-Day Example

    Section 2: About Zero-Days

    Lecture 5 Zero-day criteria

    Lecture 6 Zero-day phases

    Lecture 7 More about phases

    Lecture 8 Incident response preparedness

    Section 3: Intel and Risk Assessment

    Lecture 9 Intel and Risk Assessment Guidelines

    Lecture 10 Intel and Risk Assessment Part 1

    Lecture 11 Intel and Risk Assessment Part 2

    Lecture 12 Intel and Risk Example Part 1

    Lecture 13 Intel and Risk Example Part 2

    Lecture 14 Intel and Risk Example Part 3

    Lecture 15 Re-Evaluate the Risk

    Section 4: Scoping and Detection

    Lecture 16 Scoping and Detection guidelines

    Lecture 17 Scoping and Detection Part 1

    Lecture 18 Scoping and Detection Part 2

    Lecture 19 Scoping and Detection Part 3

    Lecture 20 Scoping and Detection Part 4

    Lecture 21 Scoping and Detection Example Part 1

    Lecture 22 Scoping and Detection Example Part 2

    Lecture 23 Scoping and Detection Example Part 3

    Lecture 24 Scoping and Detection Example Part 4

    Lecture 25 Scoping and Detection Example Part 5

    Lecture 26 Scoping and Detection Example Part 6

    Lecture 27 Scoping and Detection Example Part 7

    Lecture 28 Scoping and Detection Example Part 8

    Section 5: Containment and Mitigation

    Lecture 29 Containment and Mitigation Guidelines

    Lecture 30 Containment and Mitigation Part 1

    Lecture 31 Containment and Mitigation Part 2

    Lecture 32 Containment and Mitigation Part 3

    Lecture 33 Containment and Mitigation Part 3 - Resource

    Lecture 34 Containment and Mitigation Part 4

    Lecture 35 Containment and Mitigation Part 4 - Resource

    Lecture 36 Containment and Mitigation Part 5

    Lecture 37 Containment and Mitigation Part 6

    Lecture 38 Containment and Mitigation Part 7

    Lecture 39 Containment and Mitigation Example Part 1

    Lecture 40 Containment and Mitigation Example Part 2

    Section 6: Triage

    Lecture 41 Triage guidelines

    Lecture 42 Triage Part 1

    Lecture 43 Triage Part 2 with Example

    Lecture 44 Triage Part 3 with Example

    Lecture 45 Triage Part 4 with Example

    Lecture 46 Triage Part 5 with Example

    Section 7: Conclusion

    Lecture 47 Conclusion

    This course is designed for newer DFIR and security incident response professionals, or anyone who wishes to become more proficient in zero-day response