Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[Tutorialsplanet.NET].url |
128б |
1.1 67 - Domain 3 - Cyber Incident Response.pdf.pdf |
1.39Мб |
1.1 CompTIA CySA+ (Study Notes).pdf.pdf |
7.01Мб |
1.1 Domain 1 - Threat Management.pdf.pdf |
60.03Мб |
1.1 Domain 2 - Vulnerability Management.pdf.pdf |
164.64Мб |
1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf |
85.15Мб |
1.2 40 - Domain 2 - Vulnerability Management.pdf.pdf |
1.39Мб |
1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf |
498.48Кб |
1.2 Domain 3 - Cyber Incident Response.pdf.pdf |
62.00Мб |
1. Domain 1 Threat Management.mp4 |
4.80Мб |
1. Domain 1 Threat Management.vtt |
2.28Кб |
1. Domain 2 Vulnerability Management.mp4 |
10.17Мб |
1. Domain 2 Vulnerability Management.vtt |
5.73Кб |
1. Domain 3 Cyber Incident Response.mp4 |
7.61Мб |
1. Domain 3 Cyber Incident Response.vtt |
3.46Кб |
1. Domain 4 Security Architecture and Tool Sets.mp4 |
2.88Мб |
1. Domain 4 Security Architecture and Tool Sets.vtt |
1.47Кб |
1. How to Schedule Your Exam.mp4 |
70.46Мб |
1. How to Schedule Your Exam.vtt |
7.12Кб |
1. Simulations and Performance-Based Questions (PBQs).mp4 |
323.95Мб |
1. Simulations and Performance-Based Questions (PBQs).vtt |
38.42Кб |
1. Welcome to the Course.mp4 |
15.01Мб |
1. Welcome to the Course.vtt |
8.40Кб |
10.1 100 - Layered Network Design.pdf.pdf |
2.23Мб |
10.1 13 - Network Perimeter Security.pdf.pdf |
3.14Мб |
10.1 49 - Maintaining Scanners.pdf.pdf |
1.87Мб |
10.1 75 - Network Monitoring Tools.pdf.pdf |
4.38Мб |
10. Layered Network Defense.mp4 |
21.87Мб |
10. Layered Network Defense.vtt |
9.80Кб |
10. Maintaining Scanners.mp4 |
9.15Мб |
10. Maintaining Scanners.vtt |
7.38Кб |
10. Network Monitoring Tools.mp4 |
22.28Мб |
10. Network Monitoring Tools.vtt |
10.53Кб |
10. Network Perimeter Security.mp4 |
35.87Мб |
10. Network Perimeter Security.vtt |
14.77Кб |
11.1 101 - Layered Host Security.pdf.pdf |
1.87Мб |
11.1 14 - Network Segmentation.pdf.pdf |
1.32Мб |
11.1 50 - Standardizing Vulnerabilities.pdf.pdf |
3.17Мб |
11.1 76 - Detecting Network Events.pdf.pdf |
2.04Мб |
11. Detecting Network Events.mp4 |
27.07Мб |
11. Detecting Network Events.vtt |
12.92Кб |
11. Layered Host Security.mp4 |
14.59Мб |
11. Layered Host Security.vtt |
6.77Кб |
11. Network Segmentation.mp4 |
11.51Мб |
11. Network Segmentation.vtt |
5.33Кб |
11. Standardizing Vulnerabilities.mp4 |
9.06Мб |
11. Standardizing Vulnerabilities.vtt |
6.65Кб |
12.1 102 - Data Analytics.pdf.pdf |
1.92Мб |
12.1 15 - Network Access Control.pdf.pdf |
1.77Мб |
12.1 51 - Workflow for Remediation.pdf.pdf |
1.41Мб |
12.1 77 - Network Probes and Attacks.pdf.pdf |
2.76Мб |
12. Data Analytics.mp4 |
18.85Мб |
12. Data Analytics.vtt |
8.97Кб |
12. Network Access Control.mp4 |
26.94Мб |
12. Network Access Control.vtt |
12.50Кб |
12. Network Probes and Attacks.mp4 |
25.43Мб |
12. Network Probes and Attacks.vtt |
13.75Кб |
12. Workflow for Remediation.mp4 |
11.88Мб |
12. Workflow for Remediation.vtt |
6.17Кб |
13.1 103 - Personnel Security.pdf.pdf |
3.73Мб |
13.1 16 - Defense Deception Methods.pdf.pdf |
1.48Мб |
13.1 52 - Vulnerability Reporting.pdf.pdf |
2.75Мб |
13.1 78 - Server and Host Events.pdf.pdf |
2.52Мб |
13. Defense Deception Methods.mp4 |
16.01Мб |
13. Defense Deception Methods.vtt |
7.60Кб |
13. Personnel Security.mp4 |
27.37Мб |
13. Personnel Security.vtt |
13.05Кб |
13. Server and Host Events.mp4 |
22.79Мб |
13. Server and Host Events.vtt |
11.28Кб |
13. Vulnerability Reporting.mp4 |
18.72Мб |
13. Vulnerability Reporting.vtt |
8.82Кб |
14.1 104 - Outsourcing Concerns.pdf.pdf |
1.69Мб |
14.1 17 - Secure Endpoint Management.pdf.pdf |
2.30Мб |
14.1 53 - Remediation Reporting.pdf.pdf |
2.03Мб |
14.1 79 - Service and Application Events.pdf.pdf |
2.86Мб |
14. Outsourcing Concerns.mp4 |
13.93Мб |
14. Outsourcing Concerns.vtt |
7.30Кб |
14. Remediation Priority.mp4 |
18.97Мб |
14. Remediation Priority.vtt |
8.57Кб |
14. Secure Endpoint Management.mp4 |
32.66Мб |
14. Secure Endpoint Management.vtt |
15.03Кб |
14. Service and Application Events.mp4 |
23.04Мб |
14. Service and Application Events.vtt |
11.35Кб |
15.1 105 - User Awareness Training.pdf.pdf |
1.14Мб |
15.1 18 - Penetration Testing.pdf.pdf |
2.32Мб |
15.1 54 - Implementing and Testing.pdf.pdf |
1.69Мб |
15. Implementing and Testing.mp4 |
23.68Мб |
15. Implementing and Testing.vtt |
12.45Кб |
15. Penetration Testing.mp4 |
34.70Мб |
15. Penetration Testing.vtt |
16.26Кб |
15. Quiz Symptoms of Cyber Attacks.html |
121б |
15. User Awareness Training.mp4 |
10.22Мб |
15. User Awareness Training.vtt |
8.78Кб |
16.1 106 - Analyzing Secure Architectures.pdf.pdf |
2.73Мб |
16.1 19 - Security Exercises and Training.pdf.pdf |
1.39Мб |
16.1 55 - Nessus-Scan-Report-Example.pdf.pdf |
1.12Мб |
16.1 80 - Digital Forensics.pdf.pdf |
1.42Мб |
16. Analyzing Secure Architectures.mp4 |
43.19Мб |
16. Analyzing Secure Architectures.vtt |
18.25Кб |
16. Digital Forensics.mp4 |
11.50Мб |
16. Digital Forensics.vtt |
6.28Кб |
16. Nessus Vulnerability Scanner A Walkthrough.mp4 |
16.74Мб |
16. Nessus Vulnerability Scanner A Walkthrough.vtt |
18.12Кб |
16. Security Exercises and Training.mp4 |
13.41Мб |
16. Security Exercises and Training.vtt |
6.55Кб |
17.1 20 - Reverse Engineering.pdf.pdf |
1.39Мб |
17.1 81 - Forensic Toolkit Components.pdf.pdf |
6.02Мб |
17. Forensic Toolkit Components.mp4 |
36.22Мб |
17. Forensic Toolkit Components.vtt |
18.67Кб |
17. Quiz Defense in Depth.html |
121б |
17. Quiz Vulnerability Management Program.html |
121б |
17. Reverse Engineering.mp4 |
27.88Мб |
17. Reverse Engineering.vtt |
13.40Кб |
18.1 107 - What is Identity.pdf.pdf |
2.60Мб |
18.1 56 - Interpreting Scan Results.pdf.pdf |
4.43Мб |
18.1 82 - Mobile Forensic Toolkits.pdf.pdf |
2.18Мб |
18. Interpreting Scan Results.mp4 |
36.35Мб |
18. Interpreting Scan Results.vtt |
18.12Кб |
18. Mobile Forensic Toolkits.mp4 |
12.25Мб |
18. Mobile Forensic Toolkits.vtt |
7.17Кб |
18. Quiz Defense Against Cyber Threats.html |
121б |
18. What Is Identity.mp4 |
22.05Мб |
18. What Is Identity.vtt |
10.75Кб |
19.1 108 - Identity Systems.pdf.pdf |
3.89Мб |
19.1 21 - Reconnaissance and Intelligence.pdf.pdf |
499.20Кб |
19.1 57 - Interpeting CVSS.pdf.pdf |
3.27Мб |
19.1 83 - Forensic Software.pdf.pdf |
3.06Мб |
19. Forensic Software.mp4 |
29.66Мб |
19. Forensic Software.vtt |
14.84Кб |
19. Identity Systems.mp4 |
50.49Мб |
19. Identity Systems.vtt |
24.85Кб |
19. Interpreting CVSS.mp4 |
27.48Мб |
19. Interpreting CVSS.vtt |
13.17Кб |
19. Reconnaissance and Intelligence.mp4 |
5.56Мб |
19. Reconnaissance and Intelligence.vtt |
2.42Кб |
2.1 02 - Exam Foundations.pdf.pdf |
1.83Мб |
2.1 05 - CIA Triad.pdf.pdf |
2.80Мб |
2.1 41 - Regulatory Requirements.pdf.pdf |
2.09Мб |
2.1 68 - Security Incidents.pdf.pdf |
1.82Мб |
2.1 93 - Policy Documents.pdf.pdf |
3.27Мб |
2.1 CompTIA CySA+ Course (Conclusion).pdf.pdf |
2.26Мб |
2. CIA Triad.mp4 |
36.25Мб |
2. CIA Triad.vtt |
16.72Кб |
2. CompTIA CSA+ Practice Certification Exam.html |
121б |
2. Conclusion.mp4 |
8.44Мб |
2. Conclusion.vtt |
4.42Кб |
2. Exam Foundations.mp4 |
18.77Мб |
2. Exam Foundations.vtt |
7.83Кб |
2. Policy Documents.mp4 |
29.69Мб |
2. Policy Documents.vtt |
16.58Кб |
2. Regulatory Requirements.mp4 |
19.54Мб |
2. Regulatory Requirements.vtt |
15.46Кб |
2. Security Incidents.mp4 |
15.93Мб |
2. Security Incidents.vtt |
9.00Кб |
20.1 109 - Threats to Identity Systems.pdf.pdf |
1.70Мб |
20.1 22 - Footprinting the Network.pdf.pdf |
808.03Кб |
20.1 58 - Calculating the CVSS Score.pdf.pdf |
2.10Мб |
20.1 84 - Training and Certification.pdf.pdf |
819.90Кб |
20. Calculating the CVSS Score.mp4 |
17.65Мб |
20. Calculating the CVSS Score.vtt |
7.52Кб |
20. Footprinting the Network.mp4 |
13.42Мб |
20. Footprinting the Network.vtt |
6.10Кб |
20. Threats to Identity Systems.mp4 |
14.19Мб |
20. Threats to Identity Systems.vtt |
7.55Кб |
20. Training and Certification.mp4 |
10.25Мб |
20. Training and Certification.vtt |
5.29Кб |
21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf |
2.74Мб |
21.1 23 - Network Mapping.pdf.pdf |
1.14Мб |
21.1 59 - CVSS Temporal Score.pdf.pdf |
2.59Мб |
21.1 85 - Forensic Investigation Process.pdf.pdf |
1.33Мб |
21. Attacking AAA Protocols and Systems.mp4 |
40.68Мб |
21. Attacking AAA Protocols and Systems.vtt |
20.42Кб |
21. CVSS Temporal Score.mp4 |
16.13Мб |
21. CVSS Temporal Score.vtt |
7.53Кб |
21. Forensic Investigation Process.mp4 |
21.89Мб |
21. Forensic Investigation Process.vtt |
12.03Кб |
21. Network Mapping.mp4 |
17.52Мб |
21. Network Mapping.vtt |
7.81Кб |
22.1 111 - Targeting Account Lifecycle.pdf.pdf |
1.47Мб |
22.1 24 - Port Scanning.pdf.pdf |
1.78Мб |
22.1 60 - Validation of Results.pdf.pdf |
2.51Мб |
22.1 86 - Disk Imaging.pdf.pdf |
2.62Мб |
22. Disk Imaging.mp4 |
21.07Мб |
22. Disk Imaging.vtt |
11.00Кб |
22. Port Scanning.mp4 |
24.37Мб |
22. Port Scanning.vtt |
10.80Кб |
22. Targeting Account Lifecycle.mp4 |
14.95Мб |
22. Targeting Account Lifecycle.vtt |
14.96Мб |
22. Validation of Results.mp4 |
28.81Мб |
22. Validation of Results.vtt |
14.71Кб |
23.1 112 - Identity Exploits.pdf.pdf |
1.85Мб |
23.1 25 - Other Port Scanners.pdf.pdf |
808.19Кб |
23.1 61 - Common Vulnerabilities.pdf.pdf |
1.16Мб |
23. Common Vulnerabilities.mp4 |
12.30Мб |
23. Common Vulnerabilities.vtt |
5.53Кб |
23. Disk Imaging Using dd.mp4 |
8.14Мб |
23. Disk Imaging Using dd.vtt |
5.30Кб |
23. Identity Exploits.mp4 |
13.48Мб |
23. Identity Exploits.vtt |
6.17Кб |
23. Other Port Scanners.mp4 |
9.40Мб |
23. Other Port Scanners.vtt |
3.95Кб |
24.1 113 - Credential Theft.pdf.pdf |
2.31Мб |
24.1 62 - Server and Host Vulnerabilities.pdf.pdf |
4.11Мб |
24. Credential Theft.mp4 |
15.44Мб |
24. Credential Theft.vtt |
7.43Кб |
24. Disk Imaging Using FTK Imager.mp4 |
17.80Мб |
24. Disk Imaging Using FTK Imager.vtt |
11.00Кб |
24. NMAP - Demonstration of the world's most popular port scanning tool.mp4 |
9.93Мб |
24. NMAP - Demonstration of the world's most popular port scanning tool.vtt |
11.25Кб |
24. Server and Host Vulnerabilities.mp4 |
18.53Мб |
24. Server and Host Vulnerabilities.vtt |
14.04Кб |
25.1 114 - Securing Authentication and Authorization.pdf.pdf |
2.13Мб |
25.1 27 - Passive Reconnaissance.pdf.pdf |
806.22Кб |
25.1 63 - Network Vulnerabilities.pdf.pdf |
4.40Мб |
25. Network Vulnerabilities.mp4 |
17.23Мб |
25. Network Vulnerabilities.vtt |
12.07Кб |
25. Passive Reconnaissance.mp4 |
12.27Мб |
25. Passive Reconnaissance.vtt |
5.77Кб |
25. Quiz Digital Forensics.html |
121б |
25. Securing Authentication and Authorization System.mp4 |
26.71Мб |
25. Securing Authentication and Authorization System.vtt |
13.13Кб |
26.1 115 - Identity as a Service (IDaaS).pdf.pdf |
1.09Мб |
26.1 28 - Passive Recon - Network Devices.pdf.pdf |
3.31Мб |
26.1 64 - Virtualization Vulnerabilities.pdf.pdf |
2.36Мб |
26.1 89 - Incident Containment.pdf.pdf |
2.56Мб |
26. Identity as a Service (IDaaS).mp4 |
9.70Мб |
26. Identity as a Service (IDaaS).vtt |
4.67Кб |
26. Incident Containment.mp4 |
30.61Мб |
26. Incident Containment.vtt |
14.92Кб |
26. Passive Recon - Network Devices.mp4 |
38.07Мб |
26. Passive Recon - Network Devices.vtt |
16.42Кб |
26. Virtualization Vulnerabilities.mp4 |
12.71Мб |
26. Virtualization Vulnerabilities.vtt |
9.30Кб |
27.1 116 - Detecting Identity Attacks.pdf.pdf |
807.09Кб |
27.1 29 - Passive Recon - Netstat.pdf.pdf |
1.99Мб |
27.1 65 - Web Application Vulnerabilities.pdf.pdf |
2.31Мб |
27.1 90 - Eradication and Recovery.pdf.pdf |
2.76Мб |
27. Detecting Identity Attacks.mp4 |
7.08Мб |
27. Detecting Identity Attacks.vtt |
3.37Кб |
27. Eradication and Recovery.mp4 |
28.99Мб |
27. Eradication and Recovery.vtt |
15.55Кб |
27. Passive Recon - Netstat.mp4 |
22.18Мб |
27. Passive Recon - Netstat.vtt |
9.38Кб |
27. Web Application Vulnerabilities.mp4 |
25.01Мб |
27. Web Application Vulnerabilities.vtt |
11.02Кб |
28.1 117 - Federated Identity Systems.pdf.pdf |
3.59Мб |
28.1 30 - DHCP Logs and Configs.pdf.pdf |
1.47Мб |
28.1 66 - Internet of Things (IoT) Vulnerabilities.pdf.pdf |
1.58Мб |
28.1 91 - Finishing the Response.pdf.pdf |
1.69Мб |
28. DHCP Logs and Configs.mp4 |
14.77Мб |
28. DHCP Logs and Configs.vtt |
5.85Кб |
28. Federated Identity Systems.mp4 |
46.82Мб |
28. Federated Identity Systems.vtt |
23.25Кб |
28. Finishing the Response.mp4 |
22.55Мб |
28. Finishing the Response.vtt |
11.56Кб |
28. Internet of Things (IoT) Vulnerabilities.mp4 |
16.43Мб |
28. Internet of Things (IoT) Vulnerabilities.vtt |
7.41Кб |
29.1 Example Firewall Logs from CISCO.html |
147б |
29.2 31 - Firewall Logs and Configs.pdf.pdf |
1.46Мб |
29. Firewall Logs and Configs.mp4 |
17.63Мб |
29. Firewall Logs and Configs.vtt |
7.19Кб |
29. Quiz Analyzing Vulnerability Reports.html |
121б |
29. Quiz Identity and Access Management.html |
121б |
29. Quiz Incident Containment and Eradication.html |
121б |
3.1 06 - Risk Considerations.pdf.pdf |
2.94Мб |
3.10 CompTIA Security+ (SY0-501) Complete Course & Practice Exam.html |
116б |
3.11 ITIL Foundation Complete ITIL Exam Preparation Course.html |
119б |
3.12 CompTIA Security+ (SY0-501) 5 Practice Exams & Simulations!.html |
135б |
3.13 PRINCE2 Foundation Practice Certification Exams (6 Exams).html |
122б |
3.1 42 - Corporate Requirements.pdf.pdf |
4.23Мб |
3.14 ITIL Foundation Cram to Pass the ITIL Exam in 7 Days!.html |
127б |
3.15 #UNOFFICIAL# Certified Ethical Hacker (CEH) Practice Exams.html |
117б |
3.1 69 - Incident Response Teams.pdf.pdf |
1.99Мб |
3.16 Risk Management for Cybersecurity and IT Managers.html |
137б |
3.17 PRINCE2 Agile Foundation (Get certified in the next 7 days!).html |
128б |
3.18 CompTIA Network+ (N10-007) 5 Practice Exams & Simulations.html |
121б |
3.1 94 - Standard Frameworks.pdf.pdf |
3.74Мб |
3.19 ITIL Foundation Practice Certification Exams (6 Exams).html |
123б |
3.1 CompTIA CySA+ (CS0-001) 5 Practice Certification Exams.html |
114б |
3.20 How to Pass Certification Exams with Strategic Test Taking!.html |
118б |
3.21 Introduction to Cloud Security with Microsoft Azure.html |
117б |
3.2 CompTIA Network+ Cert (N10-007) Full Course & Practice Exam.html |
115б |
3.3 Introduction to Malware Analysis for Incident Responders.html |
120б |
3.4 CompTIA CySA+ (CS0-001) Complete Course and Practice Exam.html |
118б |
3.5 PRINCE2 Foundation Cram to Pass the PRINCE2 Exam in 7 Days!.html |
116б |
3.6 WiFi Hacking Wireless Penetration Testing for Beginners.html |
119б |
3.7 CompTIA Pentest+ (PT0-001) Complete Course & Practice Exam.html |
115б |
3.8 Anatomy of a Cyber Attack Beginner Hacking with Metasploit.html |
124б |
3.9 Udemy Coupon Codes (Graduate).pdf.pdf |
2.76Мб |
3. A Special Message From Jason Dion.mp4 |
38.39Мб |
3. A Special Message From Jason Dion.vtt |
4.07Кб |
3. BONUS A Special Thank You Message From Jason.mp4 |
11.32Мб |
3. BONUS A Special Thank You Message From Jason.vtt |
1.74Кб |
3. Corporate Requirements.mp4 |
20.41Мб |
3. Corporate Requirements.vtt |
15.16Кб |
3. Incident Response Teams.mp4 |
36.25Мб |
3. Incident Response Teams.vtt |
19.99Кб |
3. Risk Consideration.mp4 |
25.14Мб |
3. Risk Consideration.vtt |
11.70Кб |
3. Standard Frameworks.mp4 |
34.46Мб |
3. Standard Frameworks.vtt |
16.96Кб |
30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf |
6.76Мб |
30.1 32 - System and Host Log Files.pdf.pdf |
1.09Мб |
30. Software Development Life Cycle (SDLC).mp4 |
36.79Мб |
30. Software Development Life Cycle (SDLC).vtt |
18.96Кб |
30. System and Host Log Files.mp4 |
11.78Мб |
30. System and Host Log Files.vtt |
5.16Кб |
31.1 119 - Software Development Models.pdf.pdf |
3.68Мб |
31.1 33 - DNS Harvesting.pdf.pdf |
1.92Мб |
31. DNS Harvesting.mp4 |
16.42Мб |
31. DNS Harvesting.vtt |
6.16Кб |
31. Software Development Models.mp4 |
48.88Мб |
31. Software Development Models.vtt |
25.64Кб |
32.1 120 - Coding for Security.pdf.pdf |
2.19Мб |
32.1 34 - Domain Names and IP Ranges.pdf.pdf |
807.90Кб |
32. Coding for Security.mp4 |
31.96Мб |
32. Coding for Security.vtt |
16.78Кб |
32. Domain Names and IP Ranges.mp4 |
12.01Мб |
32. Domain Names and IP Ranges.vtt |
5.22Кб |
33.1 121 - Testing Application Code.pdf.pdf |
3.49Мб |
33.1 35 - DNS Zone Transfers.pdf.pdf |
1.09Мб |
33. DNS Zone Transfers.mp4 |
15.88Мб |
33. DNS Zone Transfers.vtt |
6.97Кб |
33. Testing Application Security.mp4 |
26.29Мб |
33. Testing Application Security.vtt |
12.58Кб |
34.1 122 - Finding Security Flaws.pdf.pdf |
3.63Мб |
34.1 36 - Whois and Host Commands.pdf.pdf |
1.56Мб |
34. Finding Security Flaws.mp4 |
30.25Мб |
34. Finding Security Flaws.vtt |
14.66Кб |
34. Whois and Host Commands.mp4 |
14.15Мб |
34. Whois and Host Commands.vtt |
6.31Кб |
35.1 123 - Web Application Vulnerability Scanning.pdf.pdf |
3.10Мб |
35.1 37 - Information Gathering and Aggregation.pdf.pdf |
1.97Мб |
35. Information Gathering and Aggregation.mp4 |
19.39Мб |
35. Information Gathering and Aggregation.vtt |
8.70Кб |
35. Web Application Vulnerability Scanners.mp4 |
26.29Мб |
35. Web Application Vulnerability Scanners.vtt |
12.66Кб |
36.1 38 - Organizational Intelligence.pdf.pdf |
2.44Мб |
36. Organizational Intelligence.mp4 |
34.28Мб |
36. Organizational Intelligence.vtt |
17.00Кб |
36. Quiz Software Development and SDLC.html |
121б |
37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf |
2.00Мб |
37. Detecting, Preventing, and Responding to Reconnaissance.mp4 |
29.64Мб |
37. Detecting, Preventing, and Responding to Reconnaissance.vtt |
15.06Кб |
38. Quiz Reconnaissance and Intelligence Gathering.html |
121б |
4.1 07 - Risk Assessment.pdf.pdf |
1.44Мб |
4.1 43 - Scanning Tools.pdf.pdf |
4.59Мб |
4.1 70 - Incident Response Phases.pdf.pdf |
5.79Мб |
4.1 95 - Policy-Based Controls.pdf.pdf |
2.56Мб |
4. Incident Response Phases.mp4 |
49.88Мб |
4. Incident Response Phases.vtt |
24.08Кб |
4. Policy-based Controls.mp4 |
16.09Мб |
4. Policy-based Controls.vtt |
7.52Кб |
4. Risk Assessment.mp4 |
15.50Мб |
4. Risk Assessment.vtt |
6.83Кб |
4. Scanning Tools.mp4 |
10.40Мб |
4. Scanning Tools.vtt |
7.73Кб |
5.1 08 - Identify Threats.pdf.pdf |
2.83Мб |
5.1 44 - Scoping Scans.pdf.pdf |
1.37Мб |
5.1 71 - Incident Response Policy & Procedures.pdf.pdf |
1.90Мб |
5.1 96 - Audits and Assessments.pdf.pdf |
1.14Мб |
5. Audits and Assessments.mp4 |
10.10Мб |
5. Audits and Assessments.vtt |
4.99Кб |
5. Identify Threats.mp4 |
29.40Мб |
5. Identify Threats.vtt |
13.64Кб |
5. Incident Response Policy and Procedures.mp4 |
20.79Мб |
5. Incident Response Policy and Procedures.vtt |
10.94Кб |
5. Scoping Scans.mp4 |
9.97Мб |
5. Scoping Scans.vtt |
7.43Кб |
6.1 09 - Identify Vulnerabilities.pdf.pdf |
1.62Мб |
6.1 45 - Configuring Scans.pdf.pdf |
498.62Кб |
6.1 72 - Communication and Information Sharing.pdf.pdf |
2.48Мб |
6.1 97 - Laws and Regulations.pdf.pdf |
4.82Мб |
6. Communication and Info Sharing.mp4 |
18.84Мб |
6. Communication and Info Sharing.vtt |
11.09Кб |
6. Configuring Scans.mp4 |
2.78Мб |
6. Configuring Scans.vtt |
1.19Кб |
6. Identify Vulnerabilities.mp4 |
10.82Мб |
6. Identify Vulnerabilities.vtt |
4.79Кб |
6. Laws and Regulations.mp4 |
24.36Мб |
6. Laws and Regulations.vtt |
11.18Кб |
7.1 10 - Likelihood, Impact, and Risk.pdf.pdf |
1.60Мб |
7.1 46 - Scanning Sensitivity.pdf.pdf |
2.22Мб |
7.1 73 - Incident Classification.pdf.pdf |
3.53Мб |
7. Incident Classification.mp4 |
35.20Мб |
7. Incident Classification.vtt |
18.41Кб |
7. Likelihood, Impact, and Risk.mp4 |
13.59Мб |
7. Likelihood, Impact, and Risk.vtt |
5.95Кб |
7. Quiz Policies, Standards, Procedures, and Frameworks.html |
121б |
7. Scanning Sensitivity.mp4 |
16.18Мб |
7. Scanning Sensitivity.vtt |
7.16Кб |
8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf |
2.19Мб |
8.1 47 - Scanning Perspective.pdf.pdf |
1.46Мб |
8.1 98 - Defense in Depth.pdf.pdf |
3.47Мб |
8. Defense in Depth.mp4 |
25.12Мб |
8. Defense in Depth.vtt |
11.54Кб |
8. Qualitative and Quantitative Assessments.mp4 |
18.60Мб |
8. Qualitative and Quantitative Assessments.vtt |
11.03Кб |
8. Quiz Cyber Incident Response Program.html |
121б |
8. Scanning Perspective.mp4 |
4.26Мб |
8. Scanning Perspective.vtt |
2.94Кб |
9.1 12 - Revieiwing Controls.pdf.pdf |
1.99Мб |
9.1 48 - Authenticated Scanning.pdf.pdf |
1.57Мб |
9.1 74 - Network Event Monitoring.pdf.pdf |
4.21Мб |
9.1 99 - Types of Controls.pdf.pdf |
3.48Мб |
9. Authenticated Scanning.mp4 |
9.69Мб |
9. Authenticated Scanning.vtt |
8.42Кб |
9. Network Event Monitoring.mp4 |
33.23Мб |
9. Network Event Monitoring.vtt |
16.43Кб |
9. Reviewing Controls.mp4 |
31.74Мб |
9. Reviewing Controls.vtt |
15.09Кб |
9. Types of Controls.mp4 |
21.79Мб |
9. Types of Controls.vtt |
10.38Кб |