Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[CourserHub.com].url |
123B |
[CourserHub.com].url |
123B |
01__01-intro.html |
63.28KB |
01__16-software-updates.html |
25.52KB |
01__2-4-3.html |
8.64KB |
01__5.2 |
5.39KB |
01__55.html |
42.49KB |
01__5-signs-youve-been-hit-with-an-apt.html |
172.48KB |
01__7.1 |
11.66KB |
01__7.2 |
7.50KB |
01__7.5 |
8.17KB |
01__aa494182vexchg.140 |
33.94KB |
01__article.asp |
62.82KB |
01 Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf |
1.22MB |
01__bootup.html |
8.15KB |
01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf |
142.37KB |
01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf |
360.21KB |
01__cis-controls-and-the-hph.pdf |
1.49MB |
01__Course_1_glossary.docx |
858.74KB |
01__Course_2_glossary.docx |
858.52KB |
01__Course_3_glossary.docx |
857.56KB |
01__Course_4_glossary.docx |
1.12MB |
01__Course_5_glossary.docx |
862.38KB |
01__Course_6_glossary.docx |
859.78KB |
01__Course_7_glossary.docx |
869.87KB |
01__Course_8_glossary.docx |
1.11MB |
01__csos-guide-to-phishing-and-phishing-kits.html |
155.82KB |
01__Cyber-Incident-Response-Standard.docx |
63.29KB |
01__display.cfm |
37.04KB |
01__dod85.pdf |
239.72KB |
01__encryption-explained.html |
45.23KB |
01 Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 508C pdf |
1.09MB |
01__Format-Security-plus-Study-Guide.pdf |
16.83KB |
01__FULL_TEXT.pdf |
1.41MB |
01__functions.html |
269.11KB |
01__gcat_threathorizons_full_sept2022.pdf |
2.97MB |
01 gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations html |
155.44KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.15KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26KB |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26KB |
01__guidelines.html |
17.43KB |
01 hashing-explained-why-its-your-best-bet-to-protect-stored-passwords html |
159.54KB |
01__hipaa.html |
195.91KB |
01__hipaa.html |
195.91KB |
01__index.html |
32.52KB |
01__index.html |
1.60MB |
01__index.html |
21.33KB |
01__index.html |
22.90KB |
01__IntroToCybersecurityEthics.pdf |
578.32KB |
01__Linux-in-a-Nutshell-6th-Edition.pdf |
12.42MB |
01__malware.html |
211.67KB |
01__ncsam_eskimming_508.pdf |
780.84KB |
01__network-operations-center.html |
219.59KB |
01__nist_small_business_fundamentals_july_2019.pptx |
4.16MB |
01__NIST.FIPS.140-3.pdf |
303.35KB |
01__NIST.SP.800-218.pdf |
722.55KB |
01__NIST.SP.800-53r5.pdf |
5.79MB |
01__nist.sp.800-61r2.pdf |
1.47MB |
01__nist.sp.800-61r2.pdf |
1.47MB |
01__nistspecialpublication800-92.pdf |
1.68MB |
01__operating-system2.htm |
153.60KB |
01__overview.html |
636.47KB |
01__paper.pdf |
196.74KB |
01__physical-access-control.pdf |
6.95MB |
01__question525.htm |
170.30KB |
01__R0239.pdf |
220.58KB |
01__R46536.pdf |
1.29MB |
01__RAID4.pdf |
284.66KB |
01__resources.html |
18.57KB |
01__resources.html |
6.55KB |
01__resources.html |
108.50KB |
01__resources.html |
60.18KB |
01__resources.html |
6.49KB |
01__resources.html |
15.95KB |
01__resources.html |
8.76KB |
01__resources.html |
18.68KB |
01__resources.html |
6.55KB |
01__resources.html |
6.49KB |
01__resources.html |
6.99KB |
01__resources.html |
15.95KB |
01__resources.html |
8.76KB |
01__resources.html |
18.58KB |
01__resources.html |
6.55KB |
01__resources.html |
108.50KB |
01__resources.html |
6.49KB |
01__resources.html |
37.05KB |
01__resources.html |
15.95KB |
01__resources.html |
8.76KB |
01__resources.html |
19.42KB |
01__resources.html |
6.49KB |
01__resources.html |
28.11KB |
01__resources.html |
6.55KB |
01__resources.html |
15.95KB |
01__resources.html |
18.57KB |
01__resources.html |
6.55KB |
01__resources.html |
108.51KB |
01__resources.html |
108.50KB |
01__resources.html |
6.48KB |
01__resources.html |
19.77KB |
01__resources.html |
15.95KB |
01__resources.html |
8.76KB |
01__resources.html |
18.59KB |
01__resources.html |
6.55KB |
01__resources.html |
6.49KB |
01__resources.html |
33.05KB |
01__resources.html |
15.95KB |
01__resources.html |
8.76KB |
01__resources.html |
18.56KB |
01__resources.html |
6.55KB |
01__resources.html |
6.45KB |
01__resources.html |
17.59KB |
01__resources.html |
15.95KB |
01__resources.html |
8.76KB |
01__resources.html |
18.56KB |
01__resources.html |
6.43KB |
01__resources.html |
11.47KB |
01__resources.html |
6.55KB |
01__resources.html |
15.95KB |
01__resources.html |
8.75KB |
01__rules-and-security-requirements.html |
74.82KB |
01__ShellIntro.pdf |
124.26KB |
01__sp800-179r1-draft.pdf |
1.82MB |
01__sql_injection.asp |
110.14KB |
01__ssrf-attacks-explained-and-how-to-defend-against-them.html |
155.61KB |
01__subsection3.1.html |
4.33KB |
01__suricata-update.html |
23.48KB |
01__suricata-yaml.html |
236.66KB |
01__tcpdump.1.html |
72.58KB |
01__thegnuproject.html |
65.07KB |
01__the-pyramid-of-pain.html |
67.09KB |
01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf |
1.23MB |
01__vol01iss13.cfm |
45.52KB |
01__vulnerability-vs-threat-vs-risk.html |
76.72KB |
01__what-is-a-firewall.html |
61.35KB |
01__what-is-cve-its-definition-and-purpose.html |
169.18KB |
01__what-is-owasp-top-10.html |
247.53KB |
01__what-is-phishing-examples-types-and-techniques.html |
161.47KB |
01__why-splunk.html |
227.46KB |
01__why-splunk.html |
227.45KB |
01__xml_whatis.asp |
89.39KB |
01_access-a-text-file-in-python.en.srt |
4.03KB |
01_access-a-text-file-in-python.en.txt |
2.51KB |
01_access-a-text-file-in-python.mp4 |
10.51MB |
01_access-controls-and-authentication-systems.en.srt |
6.18KB |
01_access-controls-and-authentication-systems.en.txt |
3.93KB |
01_access-controls-and-authentication-systems.mp4 |
18.28MB |
01_a-proactive-approach-to-security.en.srt |
4.94KB |
01_a-proactive-approach-to-security.en.txt |
3.12KB |
01_a-proactive-approach-to-security.mp4 |
17.07MB |
01_assets-in-a-digital-world.en.srt |
6.62KB |
01_assets-in-a-digital-world.en.txt |
3.54KB |
01_assets-in-a-digital-world.mp4 |
17.96MB |
01_basic-queries.en.srt |
4.66KB |
01_basic-queries.en.txt |
2.48KB |
01_basic-queries.mp4 |
8.95MB |
01_clear-and-concise-communication.en.srt |
3.65KB |
01_clear-and-concise-communication.en.txt |
1.97KB |
01_clear-and-concise-communication.mp4 |
12.14MB |
01_conditional-statements-in-python.en.srt |
9.67KB |
01_conditional-statements-in-python.en.txt |
6.16KB |
01_conditional-statements-in-python.mp4 |
17.68MB |
01_core-skills-for-cybersecurity-professionals.en.srt |
7.63KB |
01_core-skills-for-cybersecurity-professionals.en.txt |
4.08KB |
01_core-skills-for-cybersecurity-professionals.mp4 |
19.32MB |
01_course-wrap-up.en.srt |
4.42KB |
01_course-wrap-up.en.srt |
3.55KB |
01_course-wrap-up.en.srt |
3.58KB |
01_course-wrap-up.en.srt |
2.98KB |
01_course-wrap-up.en.srt |
2.31KB |
01_course-wrap-up.en.srt |
1.92KB |
01_course-wrap-up.en.srt |
2.94KB |
01_course-wrap-up.en.txt |
2.73KB |
01_course-wrap-up.en.txt |
1.86KB |
01_course-wrap-up.en.txt |
1.86KB |
01_course-wrap-up.en.txt |
1.63KB |
01_course-wrap-up.en.txt |
1.25KB |
01_course-wrap-up.en.txt |
1.24KB |
01_course-wrap-up.en.txt |
1.86KB |
01_course-wrap-up.mp4 |
17.66MB |
01_course-wrap-up.mp4 |
11.84MB |
01_course-wrap-up.mp4 |
5.84MB |
01_course-wrap-up.mp4 |
7.71MB |
01_course-wrap-up.mp4 |
3.76MB |
01_course-wrap-up.mp4 |
5.22MB |
01_course-wrap-up.mp4 |
6.64MB |
01_cross-site-scripting.en.srt |
7.31KB |
01_cross-site-scripting.en.txt |
4.50KB |
01_cross-site-scripting.mp4 |
21.50MB |
01_damar-my-journey-into-linux-commands.en.srt |
3.69KB |
01_damar-my-journey-into-linux-commands.en.txt |
2.28KB |
01_damar-my-journey-into-linux-commands.mp4 |
13.58MB |
01_data-types-in-python.en.srt |
7.60KB |
01_data-types-in-python.en.txt |
3.91KB |
01_data-types-in-python.mp4 |
19.40MB |
01_debugging-strategies.en.srt |
8.46KB |
01_debugging-strategies.en.txt |
4.43KB |
01_debugging-strategies.mp4 |
23.10MB |
01_denial-of-service-dos-attacks.en.srt |
7.83KB |
01_denial-of-service-dos-attacks.en.txt |
4.21KB |
01_denial-of-service-dos-attacks.mp4 |
18.55MB |
01_detect-and-protect-without-neglect.en.srt |
5.74KB |
01_detect-and-protect-without-neglect.en.txt |
3.09KB |
01_detect-and-protect-without-neglect.mp4 |
18.60MB |
01_develop-an-elevator-pitch.en.srt |
4.48KB |
01_develop-an-elevator-pitch.en.txt |
2.86KB |
01_develop-an-elevator-pitch.mp4 |
13.00MB |
01_elements-of-a-security-plan.en.srt |
6.19KB |
01_elements-of-a-security-plan.en.txt |
3.98KB |
01_elements-of-a-security-plan.mp4 |
20.22MB |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt |
4.72KB |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt |
3.10KB |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 |
14.69MB |
01_ethics-in-cybersecurity.en.srt |
6.56KB |
01_ethics-in-cybersecurity.en.txt |
4.14KB |
01_ethics-in-cybersecurity.mp4 |
22.54MB |
01_explore-common-siem-tools.en.srt |
4.35KB |
01_explore-common-siem-tools.en.txt |
2.83KB |
01_explore-common-siem-tools.mp4 |
14.71MB |
01_explore-the-cia-triad.en.srt |
4.80KB |
01_explore-the-cia-triad.en.txt |
3.08KB |
01_explore-the-cia-triad.mp4 |
14.74MB |
01_explore-the-interview-process.en.srt |
6.36KB |
01_explore-the-interview-process.en.txt |
3.42KB |
01_explore-the-interview-process.mp4 |
14.00MB |
01_file-permissions-and-ownership.en.srt |
11.06KB |
01_file-permissions-and-ownership.en.txt |
5.80KB |
01_file-permissions-and-ownership.mp4 |
16.73MB |
01_filter-dates-and-numbers.en.srt |
5.14KB |
01_filter-dates-and-numbers.en.txt |
3.19KB |
01_filter-dates-and-numbers.mp4 |
10.99MB |
01_find-what-you-need-with-linux.en.srt |
7.57KB |
01_find-what-you-need-with-linux.en.txt |
3.91KB |
01_find-what-you-need-with-linux.mp4 |
10.67MB |
01_firewalls-and-network-security-measures.en.srt |
7.40KB |
01_firewalls-and-network-security-measures.en.txt |
3.95KB |
01_firewalls-and-network-security-measures.mp4 |
16.81MB |
01_from-simple-activity-to-major-data-breach.en.srt |
5.47KB |
01_from-simple-activity-to-major-data-breach.en.txt |
2.89KB |
01_from-simple-activity-to-major-data-breach.mp4 |
18.28MB |
01_fundamentals-of-cryptography.en.srt |
5.94KB |
01_fundamentals-of-cryptography.en.txt |
3.76KB |
01_fundamentals-of-cryptography.mp4 |
22.57MB |
01_gui-versus-cli.en.srt |
6.97KB |
01_gui-versus-cli.en.txt |
3.73KB |
01_gui-versus-cli.mp4 |
14.08MB |
01_incident-response-teams.en.srt |
4.62KB |
01_incident-response-teams.en.txt |
2.91KB |
01_incident-response-teams.mp4 |
12.44MB |
01_incident-response-tools.en.srt |
2.81KB |
01_incident-response-tools.en.txt |
1.53KB |
01_incident-response-tools.mp4 |
5.42MB |
01_inside-the-operating-system.en.srt |
5.76KB |
01_inside-the-operating-system.en.txt |
3.11KB |
01_inside-the-operating-system.mp4 |
10.46MB |
01_introduction-to-course-2.en.srt |
2.38KB |
01_introduction-to-course-2.en.txt |
1.49KB |
01_introduction-to-course-2.mp4 |
7.91MB |
01_introduction-to-course-3.en.srt |
1.75KB |
01_introduction-to-course-3.en.txt |
1.10KB |
01_introduction-to-course-3.mp4 |
3.60MB |
01_introduction-to-course-4.en.srt |
3.92KB |
01_introduction-to-course-4.en.txt |
2.07KB |
01_introduction-to-course-4.mp4 |
8.66MB |
01_introduction-to-course-5.en.srt |
4.40KB |
01_introduction-to-course-5.en.txt |
2.78KB |
01_introduction-to-course-5.mp4 |
16.06MB |
01_introduction-to-course-6.en.srt |
4.11KB |
01_introduction-to-course-6.en.txt |
2.20KB |
01_introduction-to-course-6.mp4 |
7.20MB |
01_introduction-to-course-7.en.srt |
4.79KB |
01_introduction-to-course-7.en.txt |
3.01KB |
01_introduction-to-course-7.mp4 |
18.04MB |
01_introduction-to-course-8.en.srt |
3.85KB |
01_introduction-to-course-8.en.txt |
2.40KB |
01_introduction-to-course-8.mp4 |
13.12MB |
01_introduction-to-cybersecurity.en.srt |
7.14KB |
01_introduction-to-cybersecurity.en.txt |
3.83KB |
01_introduction-to-cybersecurity.mp4 |
23.11MB |
01_introduction-to-linux-sql-and-python.en.srt |
5.13KB |
01_introduction-to-linux-sql-and-python.en.txt |
2.75KB |
01_introduction-to-linux-sql-and-python.mp4 |
14.49MB |
01_introduction-to-network-communication.en.srt |
3.67KB |
01_introduction-to-network-communication.en.txt |
2.35KB |
01_introduction-to-network-communication.mp4 |
7.25MB |
01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt |
5.27KB |
01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt |
3.32KB |
01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 |
18.32MB |
01_introduction-to-the-shell.en.srt |
2.68KB |
01_introduction-to-the-shell.en.txt |
1.66KB |
01_introduction-to-the-shell.mp4 |
5.98MB |
01_ip-addresses-and-network-communication.en.srt |
4.16KB |
01_ip-addresses-and-network-communication.en.txt |
2.21KB |
01_ip-addresses-and-network-communication.mp4 |
7.31MB |
01_join-tables-in-sql.en.srt |
8.47KB |
01_join-tables-in-sql.en.txt |
4.54KB |
01_join-tables-in-sql.mp4 |
12.29MB |
01_linux-distributions.en.srt |
4.25KB |
01_linux-distributions.en.txt |
2.63KB |
01_linux-distributions.mp4 |
10.30MB |
01_list-operations-in-python.en.srt |
8.29KB |
01_list-operations-in-python.en.txt |
5.15KB |
01_list-operations-in-python.mp4 |
19.31MB |
01_malicious-packet-sniffing.en.srt |
8.04KB |
01_malicious-packet-sniffing.en.txt |
4.29KB |
01_malicious-packet-sniffing.mp4 |
19.32MB |
01_malicious-software.en.srt |
7.57KB |
01_malicious-software.en.txt |
4.06KB |
01_malicious-software.mp4 |
24.52MB |
01_modules-and-libraries.en.srt |
3.25KB |
01_modules-and-libraries.en.txt |
2.04KB |
01_modules-and-libraries.mp4 |
11.35MB |
01_network-hardening-practices.en.srt |
6.19KB |
01_network-hardening-practices.en.txt |
3.31KB |
01_network-hardening-practices.mp4 |
16.90MB |
01_network-security-in-the-cloud.en.srt |
2.82KB |
01_network-security-in-the-cloud.en.txt |
1.84KB |
01_network-security-in-the-cloud.mp4 |
9.73MB |
01_nist-frameworks.en.srt |
6.85KB |
01_nist-frameworks.en.txt |
3.64KB |
01_nist-frameworks.mp4 |
18.00MB |
01_os-hardening-practices.en.srt |
7.52KB |
01_os-hardening-practices.en.txt |
3.97KB |
01_os-hardening-practices.mp4 |
18.03MB |
01_owasp-security-principles.en.srt |
6.59KB |
01_owasp-security-principles.en.txt |
3.51KB |
01_owasp-security-principles.mp4 |
19.09MB |
01_packet-captures-with-tcpdump.en.srt |
6.99KB |
01_packet-captures-with-tcpdump.en.txt |
3.68KB |
01_packet-captures-with-tcpdump.mp4 |
9.30MB |
01_packets-and-packet-captures.en.srt |
5.11KB |
01_packets-and-packet-captures.en.txt |
2.76KB |
01_packets-and-packet-captures.mp4 |
10.23MB |
01_prepare-to-escalate-through-security-recognition.en.srt |
5.55KB |
01_prepare-to-escalate-through-security-recognition.en.txt |
2.94KB |
01_prepare-to-escalate-through-security-recognition.mp4 |
17.27MB |
01_protect-all-entry-points.en.srt |
5.74KB |
01_protect-all-entry-points.en.txt |
3.59KB |
01_protect-all-entry-points.mp4 |
22.54MB |
01_recap-of-the-google-cybersecurity-certificate-program.en.srt |
3.91KB |
01_recap-of-the-google-cybersecurity-certificate-program.en.txt |
2.13KB |
01_recap-of-the-google-cybersecurity-certificate-program.mp4 |
8.85MB |
01_reexamine-siem-tools.en.srt |
3.64KB |
01_reexamine-siem-tools.en.txt |
2.25KB |
01_reexamine-siem-tools.mp4 |
9.10MB |
01_regular-expressions-in-python.en.srt |
10.37KB |
01_regular-expressions-in-python.en.txt |
6.45KB |
01_regular-expressions-in-python.mp4 |
21.86MB |
01_security-monitoring-with-detection-tools.en.srt |
6.08KB |
01_security-monitoring-with-detection-tools.en.txt |
3.27KB |
01_security-monitoring-with-detection-tools.mp4 |
14.69MB |
01_the-benefits-of-documentation.en.srt |
3.57KB |
01_the-benefits-of-documentation.en.txt |
2.29KB |
01_the-benefits-of-documentation.mp4 |
9.32MB |
01_the-post-incident-activity-phase-of-the-lifecycle.en.srt |
3.54KB |
01_the-post-incident-activity-phase-of-the-lifecycle.en.txt |
2.22KB |
01_the-post-incident-activity-phase-of-the-lifecycle.mp4 |
8.22MB |
01_the-role-of-triage-in-incident-response.en.srt |
6.03KB |
01_the-role-of-triage-in-incident-response.en.txt |
3.21KB |
01_the-role-of-triage-in-incident-response.mp4 |
11.56MB |
01_threats-risks-and-vulnerabilities.en.srt |
5.90KB |
01_threats-risks-and-vulnerabilities.en.txt |
3.76KB |
01_threats-risks-and-vulnerabilities.mp4 |
17.04MB |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt |
5.86KB |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt |
3.18KB |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 |
19.05MB |
01_use-parameters-in-functions.en.srt |
5.43KB |
01_use-parameters-in-functions.en.txt |
3.32KB |
01_use-parameters-in-functions.mp4 |
10.62MB |
01_use-strategies-to-answer-interview-questions.en.srt |
4.34KB |
01_use-strategies-to-answer-interview-questions.en.txt |
2.76KB |
01_use-strategies-to-answer-interview-questions.mp4 |
12.02MB |
01_visual-storytelling-in-cybersecurity.en.srt |
3.79KB |
01_visual-storytelling-in-cybersecurity.en.txt |
2.37KB |
01_visual-storytelling-in-cybersecurity.mp4 |
16.07MB |
01_vulnerability-assessments.en.srt |
5.86KB |
01_vulnerability-assessments.en.txt |
3.11KB |
01_vulnerability-assessments.mp4 |
19.46MB |
01_welcome-to-the-google-cybersecurity-certificate.en.srt |
15.24KB |
01_welcome-to-the-google-cybersecurity-certificate.en.txt |
8.04KB |
01_welcome-to-the-google-cybersecurity-certificate.mp4 |
47.29MB |
01_welcome-to-week-1.en.srt |
3.30KB |
01_welcome-to-week-1.en.srt |
2.86KB |
01_welcome-to-week-1.en.srt |
2.51KB |
01_welcome-to-week-1.en.srt |
1.54KB |
01_welcome-to-week-1.en.srt |
1.63KB |
01_welcome-to-week-1.en.srt |
863B |
01_welcome-to-week-1.en.srt |
1.02KB |
01_welcome-to-week-1.en.txt |
2.08KB |
01_welcome-to-week-1.en.txt |
1.48KB |
01_welcome-to-week-1.en.txt |
1.59KB |
01_welcome-to-week-1.en.txt |
878B |
01_welcome-to-week-1.en.txt |
1.04KB |
01_welcome-to-week-1.en.txt |
533B |
01_welcome-to-week-1.en.txt |
545B |
01_welcome-to-week-1.mp4 |
10.16MB |
01_welcome-to-week-1.mp4 |
7.80MB |
01_welcome-to-week-1.mp4 |
5.80MB |
01_welcome-to-week-1.mp4 |
2.94MB |
01_welcome-to-week-1.mp4 |
4.46MB |
01_welcome-to-week-1.mp4 |
2.30MB |
01_welcome-to-week-1.mp4 |
1.79MB |
01_welcome-to-week-2.en.srt |
3.12KB |
01_welcome-to-week-2.en.srt |
2.18KB |
01_welcome-to-week-2.en.srt |
1.85KB |
01_welcome-to-week-2.en.srt |
2.15KB |
01_welcome-to-week-2.en.srt |
1.59KB |
01_welcome-to-week-2.en.srt |
1.68KB |
01_welcome-to-week-2.en.srt |
1.98KB |
01_welcome-to-week-2.en.srt |
2.30KB |
01_welcome-to-week-2.en.txt |
1.70KB |
01_welcome-to-week-2.en.txt |
1.17KB |
01_welcome-to-week-2.en.txt |
1023B |
01_welcome-to-week-2.en.txt |
1.13KB |
01_welcome-to-week-2.en.txt |
889B |
01_welcome-to-week-2.en.txt |
950B |
01_welcome-to-week-2.en.txt |
1.09KB |
01_welcome-to-week-2.en.txt |
1.18KB |
01_welcome-to-week-2.mp4 |
9.84MB |
01_welcome-to-week-2.mp4 |
5.01MB |
01_welcome-to-week-2.mp4 |
3.69MB |
01_welcome-to-week-2.mp4 |
6.71MB |
01_welcome-to-week-2.mp4 |
3.23MB |
01_welcome-to-week-2.mp4 |
5.42MB |
01_welcome-to-week-2.mp4 |
4.60MB |
01_welcome-to-week-2.mp4 |
6.07MB |
01_welcome-to-week-3.en.srt |
2.84KB |
01_welcome-to-week-3.en.srt |
1.92KB |
01_welcome-to-week-3.en.srt |
1.55KB |
01_welcome-to-week-3.en.srt |
3.81KB |
01_welcome-to-week-3.en.srt |
2.66KB |
01_welcome-to-week-3.en.srt |
1.30KB |
01_welcome-to-week-3.en.srt |
710B |
01_welcome-to-week-3.en.srt |
1.15KB |
01_welcome-to-week-3.en.txt |
1.69KB |
01_welcome-to-week-3.en.txt |
1.03KB |
01_welcome-to-week-3.en.txt |
954B |
01_welcome-to-week-3.en.txt |
2.36KB |
01_welcome-to-week-3.en.txt |
1.41KB |
01_welcome-to-week-3.en.txt |
835B |
01_welcome-to-week-3.en.txt |
447B |
01_welcome-to-week-3.en.txt |
715B |
01_welcome-to-week-3.mp4 |
9.15MB |
01_welcome-to-week-3.mp4 |
4.89MB |
01_welcome-to-week-3.mp4 |
3.53MB |
01_welcome-to-week-3.mp4 |
14.48MB |
01_welcome-to-week-3.mp4 |
5.11MB |
01_welcome-to-week-3.mp4 |
4.27MB |
01_welcome-to-week-3.mp4 |
1.32MB |
01_welcome-to-week-3.mp4 |
3.69MB |
01_welcome-to-week-4.en.srt |
3.04KB |
01_welcome-to-week-4.en.srt |
1.95KB |
01_welcome-to-week-4.en.srt |
2.17KB |
01_welcome-to-week-4.en.srt |
2.56KB |
01_welcome-to-week-4.en.srt |
2.57KB |
01_welcome-to-week-4.en.srt |
912B |
01_welcome-to-week-4.en.srt |
1.50KB |
01_welcome-to-week-4.en.srt |
2.19KB |
01_welcome-to-week-4.en.txt |
1.62KB |
01_welcome-to-week-4.en.txt |
1.03KB |
01_welcome-to-week-4.en.txt |
1.32KB |
01_welcome-to-week-4.en.txt |
1.38KB |
01_welcome-to-week-4.en.txt |
1.38KB |
01_welcome-to-week-4.en.txt |
548B |
01_welcome-to-week-4.en.txt |
929B |
01_welcome-to-week-4.en.txt |
1.37KB |
01_welcome-to-week-4.mp4 |
8.59MB |
01_welcome-to-week-4.mp4 |
5.14MB |
01_welcome-to-week-4.mp4 |
5.00MB |
01_welcome-to-week-4.mp4 |
7.04MB |
01_welcome-to-week-4.mp4 |
5.29MB |
01_welcome-to-week-4.mp4 |
2.97MB |
01_welcome-to-week-4.mp4 |
3.84MB |
01_welcome-to-week-4.mp4 |
6.84MB |
01_welcome-to-week-5.en.srt |
2.64KB |
01_welcome-to-week-5.en.txt |
1.45KB |
01_welcome-to-week-5.mp4 |
7.55MB |
01_wrap-up.en.srt |
3.04KB |
01_wrap-up.en.srt |
2.36KB |
01_wrap-up.en.srt |
3.57KB |
01_wrap-up.en.srt |
2.79KB |
01_wrap-up.en.srt |
1.58KB |
01_wrap-up.en.srt |
1.75KB |
01_wrap-up.en.srt |
1.79KB |
01_wrap-up.en.srt |
1.47KB |
01_wrap-up.en.srt |
1.39KB |
01_wrap-up.en.srt |
1.61KB |
01_wrap-up.en.srt |
1.65KB |
01_wrap-up.en.srt |
1.83KB |
01_wrap-up.en.srt |
1.66KB |
01_wrap-up.en.srt |
2.21KB |
01_wrap-up.en.srt |
1.68KB |
01_wrap-up.en.srt |
1012B |
01_wrap-up.en.srt |
1.89KB |
01_wrap-up.en.srt |
1.41KB |
01_wrap-up.en.srt |
1.34KB |
01_wrap-up.en.srt |
2.25KB |
01_wrap-up.en.srt |
1.45KB |
01_wrap-up.en.srt |
2.82KB |
01_wrap-up.en.srt |
1.18KB |
01_wrap-up.en.srt |
1.24KB |
01_wrap-up.en.srt |
1.03KB |
01_wrap-up.en.srt |
1.10KB |
01_wrap-up.en.srt |
1.35KB |
01_wrap-up.en.srt |
1.58KB |
01_wrap-up.en.srt |
1.55KB |
01_wrap-up.en.srt |
1.60KB |
01_wrap-up.en.srt |
2.89KB |
01_wrap-up.en.srt |
1.36KB |
01_wrap-up.en.srt |
1.06KB |
01_wrap-up.en.txt |
1.62KB |
01_wrap-up.en.txt |
1.54KB |
01_wrap-up.en.txt |
1.92KB |
01_wrap-up.en.txt |
1.50KB |
01_wrap-up.en.txt |
949B |
01_wrap-up.en.txt |
952B |
01_wrap-up.en.txt |
992B |
01_wrap-up.en.txt |
806B |
01_wrap-up.en.txt |
788B |
01_wrap-up.en.txt |
872B |
01_wrap-up.en.txt |
1.06KB |
01_wrap-up.en.txt |
1.14KB |
01_wrap-up.en.txt |
925B |
01_wrap-up.en.txt |
1.45KB |
01_wrap-up.en.txt |
953B |
01_wrap-up.en.txt |
648B |
01_wrap-up.en.txt |
1.11KB |
01_wrap-up.en.txt |
735B |
01_wrap-up.en.txt |
876B |
01_wrap-up.en.txt |
1.20KB |
01_wrap-up.en.txt |
882B |
01_wrap-up.en.txt |
1.50KB |
01_wrap-up.en.txt |
780B |
01_wrap-up.en.txt |
836B |
01_wrap-up.en.txt |
620B |
01_wrap-up.en.txt |
727B |
01_wrap-up.en.txt |
747B |
01_wrap-up.en.txt |
909B |
01_wrap-up.en.txt |
1018B |
01_wrap-up.en.txt |
1.01KB |
01_wrap-up.en.txt |
1.51KB |
01_wrap-up.en.txt |
856B |
01_wrap-up.en.txt |
586B |
01_wrap-up.mp4 |
6.83MB |
01_wrap-up.mp4 |
8.23MB |
01_wrap-up.mp4 |
11.83MB |
01_wrap-up.mp4 |
8.07MB |
01_wrap-up.mp4 |
3.43MB |
01_wrap-up.mp4 |
3.75MB |
01_wrap-up.mp4 |
3.67MB |
01_wrap-up.mp4 |
2.89MB |
01_wrap-up.mp4 |
2.38MB |
01_wrap-up.mp4 |
3.20MB |
01_wrap-up.mp4 |
2.86MB |
01_wrap-up.mp4 |
3.44MB |
01_wrap-up.mp4 |
3.99MB |
01_wrap-up.mp4 |
7.36MB |
01_wrap-up.mp4 |
4.70MB |
01_wrap-up.mp4 |
2.06MB |
01_wrap-up.mp4 |
3.16MB |
01_wrap-up.mp4 |
2.83MB |
01_wrap-up.mp4 |
3.36MB |
01_wrap-up.mp4 |
3.38MB |
01_wrap-up.mp4 |
3.95MB |
01_wrap-up.mp4 |
7.07MB |
01_wrap-up.mp4 |
2.62MB |
01_wrap-up.mp4 |
4.37MB |
01_wrap-up.mp4 |
1.71MB |
01_wrap-up.mp4 |
2.77MB |
01_wrap-up.mp4 |
2.93MB |
01_wrap-up.mp4 |
3.14MB |
01_wrap-up.mp4 |
4.09MB |
01_wrap-up.mp4 |
4.50MB |
01_wrap-up.mp4 |
9.05MB |
01_wrap-up.mp4 |
3.85MB |
01_wrap-up.mp4 |
1.96MB |
02_an-introduction-to-malware_instructions.html |
163.88KB |
02_apply-debugging-strategies.en.srt |
7.90KB |
02_apply-debugging-strategies.en.txt |
4.18KB |
02_apply-debugging-strategies.mp4 |
13.56MB |
02_apply-the-star-method-during-interviews_instructions.html |
50.99KB |
02_approach-cybersecurity-with-an-attacker-mindset_instructions.html |
206.00KB |
02_approaches-to-vulnerability-scanning_instructions.html |
7.45KB |
02_automate-cybersecurity-tasks-with-python.en.srt |
5.73KB |
02_automate-cybersecurity-tasks-with-python.en.txt |
3.02KB |
02_automate-cybersecurity-tasks-with-python.mp4 |
19.07MB |
02_brute-force-attacks-and-os-hardening_instructions.html |
8.12KB |
02_building-blocks-of-cybersecurity-communications.en.srt |
5.82KB |
02_building-blocks-of-cybersecurity-communications.en.txt |
3.07KB |
02_building-blocks-of-cybersecurity-communications.mp4 |
17.00MB |
02_casey-apply-soft-skills-in-cybersecurity.en.srt |
2.75KB |
02_casey-apply-soft-skills-in-cybersecurity.en.txt |
1.46KB |
02_casey-apply-soft-skills-in-cybersecurity.mp4 |
13.89MB |
02_change-permissions.en.srt |
7.17KB |
02_change-permissions.en.txt |
3.79KB |
02_change-permissions.mp4 |
9.40MB |
02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt |
3.69KB |
02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt |
1.97KB |
02_chantelle-the-value-of-diversity-in-cybersecurity.mp4 |
14.09MB |
02_chris-my-path-to-cybersecurity.en.srt |
4.91KB |
02_chris-my-path-to-cybersecurity.en.txt |
2.63KB |
02_chris-my-path-to-cybersecurity.mp4 |
18.89MB |
02_code-readability.en.srt |
6.10KB |
02_code-readability.en.txt |
3.86KB |
02_code-readability.mp4 |
19.05MB |
02_common-cybersecurity-tools.en.srt |
7.10KB |
02_common-cybersecurity-tools.en.txt |
3.79KB |
02_common-cybersecurity-tools.mp4 |
20.23MB |
02_components-of-network-layer-communication_instructions.html |
642.17KB |
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en srt |
2.82KB |
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en txt |
1.40KB |
02 congratulations-on-completing-the-google-cybersecurity-certificate-program mp4 |
9.41MB |
02_connect-with-other-cybersecurity-professionals_instructions.html |
4.24KB |
02_course-1-glossary_Course_1_glossary.docx |
858.91KB |
02_course-1-glossary_instructions.html |
6.49KB |
02_course-2-glossary_Course_2_glossary.docx |
858.52KB |
02_course-2-glossary_instructions.html |
6.49KB |
02_course-2-overview_instructions.html |
1.85MB |
02_course-3-glossary_Course_3_glossary.docx |
857.56KB |
02_course-3-glossary_instructions.html |
6.45KB |
02_course-3-overview_instructions.html |
1.22MB |
02_course-4-glossary_Course_4_glossary.docx |
1.12MB |
02_course-4-glossary_instructions.html |
6.48KB |
02_course-4-overview_instructions.html |
1.20MB |
02_course-5-glossary_Course_5_glossary.docx |
862.38KB |
02_course-5-glossary_instructions.html |
6.49KB |
02_course-5-overview_instructions.html |
1.26MB |
02_course-6-glossary_Course_6_glossary.docx |
859.70KB |
02_course-6-glossary_instructions.html |
6.49KB |
02_course-6-overview_instructions.html |
1.27MB |
02_course-7-glossary_Course_7_glossary.docx |
869.85KB |
02_course-7-glossary_instructions.html |
6.49KB |
02_course-7-overview_instructions.html |
1.21MB |
02_course-8-overview_instructions.html |
1.38MB |
02 create-visual-dashboards-for-impactful-cybersecurity-communications instructions html |
4.98KB |
02_detection-tools-and-techniques_instructions.html |
342.75KB |
02_disaster-recovery-and-business-continuity_instructions.html |
5.50KB |
02_document-evidence-with-chain-of-custody-forms.en.srt |
5.57KB |
02_document-evidence-with-chain-of-custody-forms.en.txt |
3.52KB |
02_document-evidence-with-chain-of-custody-forms.mp4 |
13.10MB |
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en srt |
4.40KB |
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en txt |
2.75KB |
02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 |
19.88MB |
02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html |
7.87KB |
02_exploitable-gaps-in-databases.en.srt |
5.10KB |
02_exploitable-gaps-in-databases.en.txt |
3.21KB |
02_exploitable-gaps-in-databases.mp4 |
17.35MB |
02_explore-the-cissp-security-domains-part-1.en.srt |
6.17KB |
02_explore-the-cissp-security-domains-part-1.en.txt |
3.99KB |
02_explore-the-cissp-security-domains-part-1.mp4 |
19.14MB |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt |
6.04KB |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt |
3.19KB |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 |
15.16MB |
02_fatima-the-importance-of-communication-during-incident-response.en.srt |
4.60KB |
02_fatima-the-importance-of-communication-during-incident-response.en.txt |
2.38KB |
02_fatima-the-importance-of-communication-during-incident-response.mp4 |
15.18MB |
02_filter-content-in-linux_instructions.html |
8.70KB |
02_find-cybersecurity-jobs.en.srt |
5.55KB |
02_find-cybersecurity-jobs.en.txt |
2.97KB |
02_find-cybersecurity-jobs.mp4 |
16.32MB |
02_frameworks.en.srt |
3.45KB |
02_frameworks.en.txt |
1.90KB |
02_frameworks.mp4 |
10.33MB |
02_glossary-terms-from-week-1_instructions.html |
3.42KB |
02_glossary-terms-from-week-1_instructions.html |
4.02KB |
02_glossary-terms-from-week-1_instructions.html |
4.14KB |
02_glossary-terms-from-week-1_instructions.html |
2.75KB |
02_glossary-terms-from-week-1_instructions.html |
2.47KB |
02_glossary-terms-from-week-1_instructions.html |
3.91KB |
02_glossary-terms-from-week-1_instructions.html |
4.49KB |
02_glossary-terms-from-week-1_instructions.html |
2.30KB |
02_glossary-terms-from-week-2_instructions.html |
7.07KB |
02_glossary-terms-from-week-2_instructions.html |
3.05KB |
02_glossary-terms-from-week-2_instructions.html |
4.03KB |
02_glossary-terms-from-week-2_instructions.html |
4.22KB |
02_glossary-terms-from-week-2_instructions.html |
4.96KB |
02_glossary-terms-from-week-2_instructions.html |
4.96KB |
02_glossary-terms-from-week-2_instructions.html |
5.09KB |
02_glossary-terms-from-week-2_instructions.html |
2.44KB |
02_glossary-terms-from-week-3_instructions.html |
3.63KB |
02_glossary-terms-from-week-3_instructions.html |
2.57KB |
02_glossary-terms-from-week-3_instructions.html |
4.82KB |
02_glossary-terms-from-week-3_instructions.html |
3.90KB |
02_glossary-terms-from-week-3_instructions.html |
3.20KB |
02_glossary-terms-from-week-3_instructions.html |
2.65KB |
02_glossary-terms-from-week-3_instructions.html |
3.75KB |
02_glossary-terms-from-week-3_instructions.html |
1.26KB |
02_glossary-terms-from-week-4_instructions.html |
7.93KB |
02_glossary-terms-from-week-4_instructions.html |
2.92KB |
02_glossary-terms-from-week-4_instructions.html |
4.50KB |
02_glossary-terms-from-week-4_instructions.html |
2.85KB |
02_glossary-terms-from-week-4_instructions.html |
3.00KB |
02_glossary-terms-from-week-4_instructions.html |
1.48KB |
02_glossary-terms-from-week-4_instructions.html |
2.83KB |
02_glossary-terms-from-week-4_instructions.html |
1.15KB |
02_glossary-terms-from-week-5_instructions.html |
1.41KB |
02_google-cybersecurity-certificate-overview_instructions.html |
500.47KB |
02_helpful-cybersecurity-resources.en.srt |
4.17KB |
02_helpful-cybersecurity-resources.en.txt |
2.19KB |
02_helpful-cybersecurity-resources.mp4 |
15.26MB |
02_import-files-into-python_instructions.html |
107.34KB |
02_input-and-output-in-the-shell.en.srt |
4.91KB |
02_input-and-output-in-the-shell.en.txt |
2.67KB |
02_input-and-output-in-the-shell.mp4 |
8.58MB |
02_introduction-to-databases.en.srt |
5.93KB |
02_introduction-to-databases.en.txt |
3.68KB |
02_introduction-to-databases.mp4 |
10.43MB |
02_introduction-to-functions.en.srt |
4.00KB |
02_introduction-to-functions.en.txt |
2.15KB |
02_introduction-to-functions.mp4 |
13.82MB |
02_introduction-to-linux.en.srt |
4.97KB |
02_introduction-to-linux.en.txt |
3.09KB |
02_introduction-to-linux.mp4 |
12.60MB |
02_introduction-to-security-frameworks-and-controls.en.srt |
7.47KB |
02_introduction-to-security-frameworks-and-controls.en.txt |
3.99KB |
02_introduction-to-security-frameworks-and-controls.mp4 |
23.41MB |
02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt |
5.67KB |
02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt |
3.03KB |
02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 |
17.31MB |
02_introduction-to-the-incident-response-lifecycle.en.srt |
6.44KB |
02_introduction-to-the-incident-response-lifecycle.en.txt |
4.02KB |
02_introduction-to-the-incident-response-lifecycle.mp4 |
16.02MB |
02_ip-spoofing.en.srt |
5.13KB |
02_ip-spoofing.en.txt |
2.72KB |
02_ip-spoofing.mp4 |
11.52MB |
02_kali-linux-tm.en.srt |
3.53KB |
02_kali-linux-tm.en.txt |
2.28KB |
02_kali-linux-tm.mp4 |
7.17MB |
02_kelsey-cloud-security-explained.en.srt |
3.79KB |
02_kelsey-cloud-security-explained.en.txt |
2.31KB |
02_kelsey-cloud-security-explained.mp4 |
21.94MB |
02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt |
5.20KB |
02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt |
3.38KB |
02_key-impacts-of-threats-risks-and-vulnerabilities.mp4 |
17.31MB |
02_kim-my-journey-into-computing.en.srt |
3.46KB |
02_kim-my-journey-into-computing.en.txt |
1.84KB |
02_kim-my-journey-into-computing.mp4 |
10.92MB |
02_learn-more-about-developing-an-elevator-pitch_instructions.html |
5.02KB |
02_learn-more-about-packet-captures_instructions.html |
735.83KB |
02_linux-commands-via-the-bash-shell.en.srt |
5.10KB |
02_linux-commands-via-the-bash-shell.en.txt |
2.82KB |
02_linux-commands-via-the-bash-shell.mp4 |
10.20MB |
02_logs-and-siem-tools.en.srt |
4.02KB |
02_logs-and-siem-tools.en.txt |
2.14KB |
02_logs-and-siem-tools.mp4 |
8.88MB |
02_more-about-cybersecurity-tools_instructions.html |
5.50KB |
02_more-about-data-types_instructions.html |
12.18KB |
02_more-about-owasp-security-principles_instructions.html |
5.36KB |
02_more-about-regular-expressions_instructions.html |
11.41KB |
02_more-on-conditionals-in-python_instructions.html |
15.09KB |
02_network-protocols.en.srt |
6.01KB |
02_network-protocols.en.txt |
3.27KB |
02_network-protocols.mp4 |
11.29MB |
02_network-security-applications_instructions.html |
2.90MB |
02_operators-for-filtering-dates-and-numbers_instructions.html |
6.76KB |
02_overview-of-tcpdump_instructions.html |
132.48KB |
02_overview-of-tcpdump_tcpdump.1.html |
72.58KB |
02_past-cybersecurity-attacks.en.srt |
6.34KB |
02_past-cybersecurity-attacks.en.txt |
3.33KB |
02_past-cybersecurity-attacks.mp4 |
22.02MB |
02_phases-of-an-incident-response-playbook.en.srt |
7.86KB |
02_phases-of-an-incident-response-playbook.en.txt |
4.21KB |
02_phases-of-an-incident-response-playbook.mp4 |
24.30MB |
02_post-incident-review_instructions.html |
233.43KB |
02_public-key-infrastructure.en.srt |
8.70KB |
02_public-key-infrastructure.en.txt |
4.54KB |
02_public-key-infrastructure.mp4 |
21.15MB |
02_python-and-cybersecurity.en.srt |
5.21KB |
02_python-and-cybersecurity.en.txt |
3.29KB |
02_python-and-cybersecurity.mp4 |
20.08MB |
02_query-a-database_instructions.html |
8.81KB |
02_query-for-events-with-splunk.en.srt |
6.99KB |
02_query-for-events-with-splunk.en.txt |
3.78KB |
02_query-for-events-with-splunk.mp4 |
9.28MB |
02_read-tcpdump-logs_instructions.html |
146.64KB |
02_recognize-roles-and-responsibilities-during-escalation_instructions.html |
4.34KB |
02_requests-to-the-operating-system_instructions.html |
133.93KB |
02_return-statements.en.srt |
4.80KB |
02_return-statements.en.txt |
3.02KB |
02_return-statements.mp4 |
13.70MB |
02_robin-foster-cross-team-collaboration.en.srt |
3.80KB |
02_robin-foster-cross-team-collaboration.en.txt |
2.39KB |
02_robin-foster-cross-team-collaboration.mp4 |
14.14MB |
02_security-as-a-mindset.en.srt |
5.08KB |
02_security-as-a-mindset.en.txt |
2.70KB |
02_security-as-a-mindset.mp4 |
16.95MB |
02_security-controls.en.srt |
5.17KB |
02_security-controls.en.txt |
3.29KB |
02_security-controls.mp4 |
19.59MB |
02_security-hardening.en.srt |
4.62KB |
02_security-hardening.en.txt |
2.93KB |
02_security-hardening.mp4 |
12.25MB |
02_stakeholders-in-cybersecurity.en.srt |
6.76KB |
02_stakeholders-in-cybersecurity.en.txt |
3.58KB |
02_stakeholders-in-cybersecurity.mp4 |
15.13MB |
02_string-operations.en.srt |
7.78KB |
02_string-operations.en.txt |
4.10KB |
02_string-operations.mp4 |
21.28MB |
02_the-case-for-securing-networks.en.srt |
2.20KB |
02_the-case-for-securing-networks.en.txt |
1.41KB |
02_the-case-for-securing-networks.mp4 |
5.52MB |
02_the-command-line-in-use_instructions.html |
197.12KB |
02_the-criminal-art-of-persuasion.en.srt |
7.36KB |
02_the-criminal-art-of-persuasion.en.txt |
3.98KB |
02_the-criminal-art-of-persuasion.mp4 |
21.70MB |
02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt |
3.07KB |
02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt |
2.01KB |
02_the-detection-and-analysis-phase-of-the-lifecycle.mp4 |
8.54MB |
02_the-emergence-of-cloud-security_instructions.html |
141.30KB |
02_the-importance-of-escalation.en.srt |
6.63KB |
02_the-importance-of-escalation.en.txt |
3.55KB |
02_the-importance-of-escalation.mp4 |
18.97MB |
02_the-importance-of-logs.en.srt |
5.97KB |
02_the-importance-of-logs.en.txt |
3.75KB |
02_the-importance-of-logs.mp4 |
12.76MB |
02_the-interview-process_instructions.html |
5.26KB |
02_the-linux-community.en.srt |
2.51KB |
02_the-linux-community.en.txt |
1.35KB |
02_the-linux-community.mp4 |
5.99MB |
02_the-nist-cybersecurity-framework.en.srt |
5.77KB |
02_the-nist-cybersecurity-framework.en.txt |
3.63KB |
02_the-nist-cybersecurity-framework.mp4 |
20.35MB |
02_the-rise-of-sso-and-mfa_instructions.html |
369.55KB |
02_the-tcp-ip-model.en.srt |
4.42KB |
02_the-tcp-ip-model.en.txt |
2.37KB |
02_the-tcp-ip-model.mp4 |
8.96MB |
02_the-value-of-documentation.en.srt |
4.61KB |
02_the-value-of-documentation.en.txt |
2.96KB |
02_the-value-of-documentation.mp4 |
11.00MB |
02_the-what-why-and-how-of-asset-security.en.srt |
6.91KB |
02_the-what-why-and-how-of-asset-security.en.txt |
4.26KB |
02_the-what-why-and-how-of-asset-security.mp4 |
20.75MB |
02_toni-my-path-to-cybersecurity.en.srt |
5.53KB |
02_toni-my-path-to-cybersecurity.en.txt |
2.92KB |
02_toni-my-path-to-cybersecurity.mp4 |
20.00MB |
02_types-of-joins.en.srt |
5.05KB |
02_types-of-joins.en.txt |
2.70KB |
02_types-of-joins.mp4 |
7.97MB |
02_use-the-cia-triad-to-protect-organizations_instructions.html |
4.29KB |
02_use-tools-to-protect-business-operations_instructions.html |
6.58KB |
02_veronica-my-path-to-working-in-cybersecurity.en.srt |
3.08KB |
02_veronica-my-path-to-working-in-cybersecurity.en.txt |
1.59KB |
02_veronica-my-path-to-working-in-cybersecurity.mp4 |
11.01MB |
02_virtual-private-networks-vpns.en.srt |
4.30KB |
02_virtual-private-networks-vpns.en.txt |
2.28KB |
02_virtual-private-networks-vpns.mp4 |
8.06MB |
02_vulnerability-management.en.srt |
5.96KB |
02_vulnerability-management.en.txt |
3.81KB |
02_vulnerability-management.mp4 |
21.96MB |
02_when-and-how-to-escalate-a-security-incident.en.srt |
3.41KB |
02_when-and-how-to-escalate-a-security-incident.en.txt |
2.12KB |
02_when-and-how-to-escalate-a-security-incident.mp4 |
12.83MB |
02_write-a-simple-algorithm.en.srt |
8.38KB |
02_write-a-simple-algorithm.en.txt |
4.35KB |
02_write-a-simple-algorithm.mp4 |
17.58MB |
03_activity-analysis-of-network-hardening_quiz.html |
1.23KB |
03_activity-analyze-network-layer-communication_quiz.html |
1.26KB |
03_activity-apply-os-hardening-techniques_quiz.html |
1.26KB |
03_angel-my-personal-career-journey.en.srt |
4.84KB |
03_angel-my-personal-career-journey.en.txt |
2.62KB |
03_angel-my-personal-career-journey.mp4 |
16.51MB |
03_attacks-in-the-digital-age.en.srt |
6.52KB |
03_attacks-in-the-digital-age.en.txt |
4.17KB |
03_attacks-in-the-digital-age.mp4 |
25.52MB |
03_best-practices-for-effective-documentation_instructions.html |
5.85KB |
03_best-practices-for-log-collection-and-management_instructions.html |
8.33KB |
03_common-network-protocols_instructions.html |
8.69KB |
03_communicate-effectively-with-stakeholders_instructions.html |
5.04KB |
03_compare-types-of-joins_instructions.html |
1.51MB |
03_components-of-a-detection-signature.en.srt |
6.65KB |
03_components-of-a-detection-signature.en.txt |
3.50KB |
03_components-of-a-detection-signature.mp4 |
12.80MB |
03_controls.en.srt |
5.39KB |
03_controls.en.txt |
2.88KB |
03_controls.mp4 |
14.11MB |
03_core-commands-for-navigation-and-reading-files.en.srt |
7.62KB |
03_core-commands-for-navigation-and-reading-files.en.txt |
4.04KB |
03_core-commands-for-navigation-and-reading-files.mp4 |
11.26MB |
03_course-1-overview_instructions.html |
1.27MB |
03_course-wrap-up.en.srt |
1.75KB |
03_course-wrap-up.en.txt |
1.13KB |
03_course-wrap-up.mp4 |
2.75MB |
03_create-a-basic-function.en.srt |
3.67KB |
03_create-a-basic-function.en.txt |
1.88KB |
03_create-a-basic-function.mp4 |
7.14MB |
03_create-a-cybersecurity-portfolio_instructions.html |
8.73KB |
03_create-and-modify-directories-and-files.en.srt |
11.12KB |
03_create-and-modify-directories-and-files.en.txt |
5.82KB |
03_create-and-modify-directories-and-files.mp4 |
17.80MB |
03_create-a-resume.en.srt |
6.19KB |
03_create-a-resume.en.txt |
3.94KB |
03_create-a-resume.mp4 |
11.92MB |
03_cybersecurity-incident-detection-methods_instructions.html |
7.73KB |
03_data-and-asset-classification_instructions.html |
5.74KB |
03_defense-in-depth-strategy.en.srt |
6.22KB |
03_defense-in-depth-strategy.en.txt |
3.34KB |
03_defense-in-depth-strategy.mp4 |
19.92MB |
03_determine-the-type-of-attack_instructions.html |
225.01KB |
03_dion-my-personal-career-journey.en.srt |
3.70KB |
03_dion-my-personal-career-journey.en.txt |
2.29KB |
03_dion-my-personal-career-journey.mp4 |
16.87MB |
03_ellen-my-path-into-cybersecurity.en.srt |
3.76KB |
03_ellen-my-path-into-cybersecurity.en.txt |
2.41KB |
03_ellen-my-path-into-cybersecurity.mp4 |
12.42MB |
03_ensure-proper-syntax-and-readability-in-python_instructions.html |
9.57KB |
03_escalate-with-a-purpose_instructions.html |
4.83KB |
03_escalation-timing_instructions.html |
5.54KB |
03_essential-python-components-for-automation_instructions.html |
8.20KB |
03_explore-debugging-techniques_instructions.html |
13.02KB |
03_explore-the-cissp-security-domains-part-2.en.srt |
6.73KB |
03_explore-the-cissp-security-domains-part-2.en.txt |
4.38KB |
03_explore-the-cissp-security-domains-part-2.mp4 |
18.20MB |
03_filters-with-and-or-and-not.en.srt |
8.17KB |
03_filters-with-and-or-and-not.en.txt |
4.38KB |
03_filters-with-and-or-and-not.mp4 |
16.09MB |
03_for-loops.en.srt |
7.58KB |
03_for-loops.en.txt |
4.03KB |
03_for-loops.mp4 |
12.20MB |
03_functions-and-variables_instructions.html |
10.79KB |
03_garvey-technical-interview-tips.en.srt |
4.65KB |
03_garvey-technical-interview-tips.en.txt |
2.93KB |
03_garvey-technical-interview-tips.mp4 |
11.21MB |
03_get-started-on-the-next-course_instructions.html |
794.71KB |
03_get-started-on-the-next-course_instructions.html |
806.10KB |
03_get-started-on-the-next-course_instructions.html |
789.45KB |
03_get-started-on-the-next-course_instructions.html |
796.16KB |
03_get-started-on-the-next-course_instructions.html |
784.18KB |
03_get-started-on-the-next-course_instructions.html |
793.15KB |
03_get-started-on-the-next-course_instructions.html |
786.47KB |
03_get-to-know-python_instructions.html |
4.28KB |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
03_helpful-resources-and-tips_instructions.html |
11.26KB |
03_helpful-resources-and-tips_instructions.html |
11.26KB |
03_helpful-resources-and-tips_instructions.html |
11.17KB |
03_helpful-resources-and-tips_instructions.html |
11.26KB |
03_helpful-resources-and-tips_instructions.html |
11.21KB |
03_herbert-manage-threats-risks-and-vulnerabilities.en.srt |
3.05KB |
03_herbert-manage-threats-risks-and-vulnerabilities.en.txt |
1.93KB |
03_herbert-manage-threats-risks-and-vulnerabilities.mp4 |
9.61MB |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt |
4.10KB |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt |
2.25KB |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 |
14.62MB |
03_how-intrusions-compromise-your-system_instructions.html |
6.62KB |
03_how-to-create-a-visual-dashboard.en.srt |
5.24KB |
03_how-to-create-a-visual-dashboard.en.txt |
3.13KB |
03_how-to-create-a-visual-dashboard.mp4 |
18.13MB |
03_interpret-network-communications-with-packets.en.srt |
2.71KB |
03_interpret-network-communications-with-packets.en.txt |
1.69KB |
03_interpret-network-communications-with-packets.mp4 |
7.65MB |
03_introduction-to-operating-systems.en.srt |
4.34KB |
03_introduction-to-operating-systems.en.txt |
2.79KB |
03_introduction-to-operating-systems.mp4 |
11.51MB |
03_intrusion-detection-systems.en.srt |
3.15KB |
03_intrusion-detection-systems.en.txt |
1.70KB |
03_intrusion-detection-systems.mp4 |
5.36MB |
03_julianas-story-asset-protection_instructions.html |
5.03KB |
03_lists-and-the-security-analyst_instructions.html |
13.07KB |
03_man-pages-within-the-shell.en.srt |
3.99KB |
03_man-pages-within-the-shell.en.txt |
2.10KB |
03_man-pages-within-the-shell.mp4 |
6.58MB |
03_more-about-playbooks_guidelines.html |
17.43KB |
03_more-about-playbooks_instructions.html |
200.44KB |
03_more-linux-distributions_instructions.html |
4.39KB |
03_overview-of-interception-tactics_instructions.html |
7.19KB |
03_parse-a-text-file-in-python.en.srt |
3.53KB |
03_parse-a-text-file-in-python.en.txt |
1.88KB |
03_parse-a-text-file-in-python.mp4 |
10.01MB |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt |
6.09KB |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt |
3.81KB |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 |
17.80MB |
03_permission-commands_instructions.html |
15.50KB |
03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt |
4.08KB |
03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt |
2.20KB |
03_phil-learn-and-grow-in-the-cybersecurity-field.mp4 |
12.59MB |
03_playbooks-siem-tools-and-soar-tools_instructions.html |
3.10KB |
03_prepare-for-interviews_instructions.html |
5.48KB |
03_prepare-for-interviews_vol01iss13.cfm |
45.52KB |
03_principle-of-least-privilege_instructions.html |
7.70KB |
03_query-databases-with-sql.en.srt |
3.88KB |
03_query-databases-with-sql.en.txt |
2.46KB |
03_query-databases-with-sql.mp4 |
8.50MB |
03_query-for-events-with-chronicle.en.srt |
6.65KB |
03_query-for-events-with-chronicle.en.txt |
3.54KB |
03_query-for-events-with-chronicle.mp4 |
8.22MB |
03_resource-allocation-via-the-os.en.srt |
3.91KB |
03_resource-allocation-via-the-os.en.txt |
2.09KB |
03_resource-allocation-via-the-os.mp4 |
9.46MB |
03_resources-for-completing-sql-labs_instructions.html |
108.50KB |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt |
4.53KB |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt |
2.45KB |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 |
14.50MB |
03_roles-in-response_instructions.html |
84.34KB |
03_sarah-network-in-the-cybersecurity-community.en.srt |
3.52KB |
03_sarah-network-in-the-cybersecurity-community.en.txt |
2.24KB |
03_sarah-network-in-the-cybersecurity-community.mp4 |
10.28MB |
03_secure-design.en.srt |
6.79KB |
03_secure-design.en.txt |
3.61KB |
03_secure-design.mp4 |
19.14MB |
03_secure-the-cloud_instructions.html |
8.98KB |
03 security-guidelines-in-action Commercial Facilities Sector Cybersecurity Framework Implementation Guidance FINAL 508 pdf |
1.53MB |
03_security-guidelines-in-action_instructions.html |
472.50KB |
03_security-zones.en.srt |
6.05KB |
03_security-zones.en.txt |
3.20KB |
03_security-zones.mp4 |
12.00MB |
03_showcase-your-work_instructions.html |
899.17KB |
03_showcase-your-work_overview.html |
636.47KB |
03_siem-dashboards.en.srt |
4.42KB |
03_siem-dashboards.en.txt |
2.34KB |
03_siem-dashboards.mp4 |
10.76MB |
03_social-engineering-tactics_instructions.html |
175.25KB |
03 strategies-for-engaging-with-the-cybersecurity-community instructions html |
5.48KB |
03_string-indices-and-slices.en.srt |
8.50KB |
03_string-indices-and-slices.en.txt |
4.54KB |
03_string-indices-and-slices.mp4 |
20.29MB |
03_symmetric-and-asymmetric-encryption_instructions.html |
9.23KB |
03_talya-myths-about-the-cybersecurity-field.en.srt |
3.08KB |
03_talya-myths-about-the-cybersecurity-field.en.txt |
1.59KB |
03_talya-myths-about-the-cybersecurity-field.mp4 |
9.58MB |
03_test-your-knowledge-local-and-wide-network-communication_quiz.html |
3.67KB |
03_the-four-layers-of-the-tcp-ip-model.en.srt |
3.41KB |
03_the-four-layers-of-the-tcp-ip-model.en.txt |
1.83KB |
03_the-four-layers-of-the-tcp-ip-model.mp4 |
6.47MB |
03_the-importance-of-network-traffic-flows.en.srt |
4.53KB |
03_the-importance-of-network-traffic-flows.en.txt |
2.88KB |
03_the-importance-of-network-traffic-flows.mp4 |
12.76MB |
03_the-importance-of-updates_instructions.html |
7.16KB |
03_the-mechanisms-of-authorization.en.srt |
8.11KB |
03_the-mechanisms-of-authorization.en.txt |
4.32KB |
03_the-mechanisms-of-authorization.mp4 |
25.17MB |
03_the-purpose-and-impact-of-stakeholders_instructions.html |
5.65KB |
03_the-rise-of-cryptojacking.en.srt |
6.65KB |
03_the-rise-of-cryptojacking.en.txt |
3.57KB |
03_the-rise-of-cryptojacking.mp4 |
23.67MB |
03_the-triage-process_instructions.html |
8.28KB |
03_tips-for-interviewing-remotely_instructions.html |
5.57KB |
03 tools-for-protecting-business-operations gcat threathorizons full sept2022 pdf |
2.97MB |
03_tools-for-protecting-business-operations_instructions.html |
651.52KB |
03_transferable-and-technical-cybersecurity-skills_instructions.html |
7.33KB |
03_types-of-threat-actors_instructions.html |
493.37KB |
03_understand-risks-threats-and-vulnerabilities_instructions.html |
6.41KB |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt |
3.05KB |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt |
1.90KB |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 |
9.96MB |
03_weekly-challenge-1_exam.html |
8.39KB |
03_weekly-challenge-2_exam.html |
8.45KB |
03_weekly-challenge-3_exam.html |
9.31KB |
03_weekly-challenge-4_exam.html |
9.52KB |
03_what-are-networks.en.srt |
2.66KB |
03_what-are-networks.en.txt |
1.64KB |
03_what-are-networks.mp4 |
6.22MB |
03_work-with-variables-in-python.en.srt |
9.99KB |
03_work-with-variables-in-python.en.txt |
5.24KB |
03_work-with-variables-in-python.mp4 |
21.69MB |
04_activity-analyze-network-attacks_quiz.html |
1.25KB |
04_add-and-delete-users.en.srt |
8.85KB |
04_add-and-delete-users.en.txt |
4.72KB |
04_add-and-delete-users.mp4 |
14.68MB |
04_additional-network-protocols_instructions.html |
11.08KB |
04_ask-the-interviewer-questions.en.srt |
2.47KB |
04_ask-the-interviewer-questions.en.txt |
1.62KB |
04_ask-the-interviewer-questions.mp4 |
7.91MB |
04_assign-and-reassign-variables-in-python_instructions.html |
8.17KB |
04_basic-filters-on-sql-queries.en.srt |
6.43KB |
04_basic-filters-on-sql-queries.en.txt |
4.05KB |
04_basic-filters-on-sql-queries.mp4 |
14.77MB |
04_claim-your-google-cybersecurity-certificate-badge_instructions.html |
4.48KB |
04_clancy-continual-learning-and-python.en.srt |
3.58KB |
04_clancy-continual-learning-and-python.en.txt |
1.89KB |
04_clancy-continual-learning-and-python.mp4 |
11.33MB |
04_common-attacks-and-their-effectiveness_instructions.html |
8.41KB |
04_common-vulnerabilities-and-exposures.en.srt |
8.07KB |
04_common-vulnerabilities-and-exposures.en.txt |
4.31KB |
04_common-vulnerabilities-and-exposures.mp4 |
27.86MB |
04_compare-operating-systems_instructions.html |
6.27KB |
04_continuous-learning-in-sql_instructions.html |
5.33KB |
04_controls-frameworks-and-compliance_instructions.html |
151.83KB |
04_course-8-glossary_Course_8_glossary.docx |
1.11MB |
04_course-8-glossary_instructions.html |
6.43KB |
04_create-a-basic-python-script.en.srt |
3.68KB |
04_create-a-basic-python-script.en.txt |
1.96KB |
04_create-a-basic-python-script.mp4 |
8.44MB |
04_da-queshia-my-path-to-cybersecurity.en.srt |
4.43KB |
04_da-queshia-my-path-to-cybersecurity.en.txt |
2.28KB |
04_da-queshia-my-path-to-cybersecurity.mp4 |
13.90MB |
04_dave-grow-your-cybersecurity-career-with-mentors.en.srt |
4.34KB |
04_dave-grow-your-cybersecurity-career-with-mentors.en.txt |
2.33KB |
04_dave-grow-your-cybersecurity-career-with-mentors.mp4 |
13.90MB |
04_develop-a-parsing-algorithm-in-python.en.srt |
6.88KB |
04_develop-a-parsing-algorithm-in-python.en.txt |
4.33KB |
04_develop-a-parsing-algorithm-in-python.mp4 |
15.23MB |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt |
4.28KB |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt |
2.26KB |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 |
11.39MB |
04_emily-overcome-imposter-syndrome.en.srt |
4.71KB |
04_emily-overcome-imposter-syndrome.en.txt |
2.56KB |
04_emily-overcome-imposter-syndrome.mp4 |
13.95MB |
04_examine-signatures-with-suricata.en.srt |
5.95KB |
04_examine-signatures-with-suricata.en.txt |
3.76KB |
04_examine-signatures-with-suricata.mp4 |
8.40MB |
04_explore-built-in-functions.en.srt |
8.50KB |
04_explore-built-in-functions.en.txt |
4.51KB |
04_explore-built-in-functions.mp4 |
21.00MB |
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
04_helpful-resources-and-tips_instructions.html |
11.26KB |
04_helpful-resources-and-tips_instructions.html |
11.22KB |
04_incident-response-plans.en.srt |
3.59KB |
04_incident-response-plans.en.txt |
2.28KB |
04_incident-response-plans.mp4 |
9.30MB |
04_information-privacy-regulations-and-compliance_instructions.html |
129.20KB |
04_julianas-story-attention-to-detail_instructions.html |
4.83KB |
04_julianas-story-effective-communication_instructions.html |
4.46KB |
04_learn-more-about-the-tcp-ip-model_instructions.html |
1.53MB |
04_linux-architecture.en.srt |
5.77KB |
04_linux-architecture.en.txt |
3.02KB |
04_linux-architecture.mp4 |
11.81MB |
04_linux-resources_instructions.html |
5.10KB |
04_maintain-awareness-with-network-monitoring_instructions.html |
293.74KB |
04_manage-directories-and-files_instructions.html |
9.62KB |
04_mk-changes-in-the-cybersecurity-industry.en.srt |
4.33KB |
04_mk-changes-in-the-cybersecurity-industry.en.txt |
2.77KB |
04_mk-changes-in-the-cybersecurity-industry.mp4 |
13.39MB |
04_more-on-filters-with-and-or-and-not_instructions.html |
6.39KB |
04_navigate-linux-and-read-file-content_instructions.html |
104.91KB |
04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt |
3.77KB |
04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt |
2.45KB |
04_nikki-a-day-in-the-life-of-a-security-engineer.mp4 |
16.05MB |
04_niru-adopt-an-attacker-mindset.en.srt |
4.63KB |
04_niru-adopt-an-attacker-mindset.en.txt |
2.94KB |
04_niru-adopt-an-attacker-mindset.mp4 |
18.08MB |
04_nist-s-risk-management-framework.en.srt |
6.41KB |
04_nist-s-risk-management-framework.en.txt |
3.43KB |
04_nist-s-risk-management-framework.mp4 |
16.35MB |
04_omad-my-learning-journey-into-cybersecurity.en.srt |
4.44KB |
04_omad-my-learning-journey-into-cybersecurity.en.txt |
2.75KB |
04_omad-my-learning-journey-into-cybersecurity.mp4 |
9.89MB |
04_overview-of-detection-tools_instructions.html |
9.42KB |
04_phishing-for-information.en.srt |
6.80KB |
04_phishing-for-information.en.txt |
4.32KB |
04_phishing-for-information.mp4 |
24.02MB |
04_plan-a-security-audit.en.srt |
6.92KB |
04_plan-a-security-audit.en.txt |
3.60KB |
04_plan-a-security-audit.mp4 |
16.69MB |
04 portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security exam html |
3.46KB |
04_prepare-for-technical-interviews_instructions.html |
5.62KB |
04_python-functions-in-cybersecurity_instructions.html |
6.84KB |
04_real-life-ddos-attack_instructions.html |
5.12KB |
04_rebecca-learn-new-tools-and-technologies.en.srt |
2.98KB |
04_rebecca-learn-new-tools-and-technologies.en.txt |
1.83KB |
04_rebecca-learn-new-tools-and-technologies.mp4 |
9.32MB |
04_reexamine-the-fields-of-a-packet-header.en.srt |
7.77KB |
04_reexamine-the-fields-of-a-packet-header.en.txt |
4.15KB |
04_reexamine-the-fields-of-a-packet-header.mp4 |
13.61MB |
04_resources-for-completing-labs_instructions.html |
108.52KB |
04_resources-for-completing-linux-labs_instructions.html |
108.51KB |
04_search-methods-with-siem-tools_instructions.html |
415.57KB |
04_security-domains-cybersecurity-analysts-need-to-know_instructions.html |
195.32KB |
04_sql-filtering-versus-linux-filtering_instructions.html |
4.19KB |
04_strings-and-the-security-analyst_instructions.html |
13.46KB |
04_subnetting-and-cidr_instructions.html |
133.92KB |
04_test-your-knowledge-cloud-hardening_quiz.html |
3.62KB |
04_test-your-knowledge-network-hardening_quiz.html |
3.78KB |
04_test-your-knowledge-os-hardening_quiz.html |
3.69KB |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt |
4.39KB |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt |
2.40KB |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 |
9.87MB |
04_the-future-of-siem-tools_instructions.html |
5.06KB |
04_the-importance-of-cybersecurity.en.srt |
4.05KB |
04_the-importance-of-cybersecurity.en.txt |
2.57KB |
04_the-importance-of-cybersecurity.mp4 |
17.84MB |
04_the-relationship-between-frameworks-and-controls_instructions.html |
6.56KB |
04 the-relationship-between-frameworks-and-controls physical-access-control pdf |
6.95MB |
04_the-value-of-cybersecurity-playbooks.en.srt |
6.08KB |
04_the-value-of-cybersecurity-playbooks.en.txt |
3.20KB |
04_the-value-of-cybersecurity-playbooks.mp4 |
13.00MB |
04_tina-working-in-network-security.en.srt |
3.06KB |
04_tina-working-in-network-security.en.txt |
1.64KB |
04_tina-working-in-network-security.mp4 |
11.31MB |
04_tips-for-finding-and-applying-for-a-job_instructions.html |
4.24KB |
04_traits-of-an-effective-threat-model_instructions.html |
120.94KB |
04_tri-life-in-asset-security.en.srt |
3.80KB |
04_tri-life-in-asset-security.en.txt |
2.32KB |
04_tri-life-in-asset-security.mp4 |
16.96MB |
04_understand-attackers_instructions.html |
313.26KB |
04_use-siem-tools-to-protect-organizations_instructions.html |
8.57KB |
04_victoria-continue-your-learning-journey.en.srt |
3.93KB |
04_victoria-continue-your-learning-journey.en.txt |
2.48KB |
04_victoria-continue-your-learning-journey.mp4 |
15.43MB |
04_welcome-to-week-1.en.srt |
1.95KB |
04_welcome-to-week-1.en.txt |
1.03KB |
04_welcome-to-week-1.mp4 |
4.67MB |
04_while-loops.en.srt |
8.08KB |
04_while-loops.en.txt |
4.25KB |
04_while-loops.mp4 |
10.19MB |
04_why-we-audit-user-activity.en.srt |
5.47KB |
04_why-we-audit-user-activity.en.txt |
2.92KB |
04_why-we-audit-user-activity.mp4 |
16.24MB |
05_adedayo-sql-in-cybersecurity.en.srt |
3.81KB |
05_adedayo-sql-in-cybersecurity.en.txt |
2.06KB |
05_adedayo-sql-in-cybersecurity.mp4 |
13.70MB |
05_alert-and-event-management-with-siem-and-soar-tools.en.srt |
5.97KB |
05_alert-and-event-management-with-siem-and-soar-tools.en.txt |
3.72KB |
05_alert-and-event-management-with-siem-and-soar-tools.mp4 |
14.47MB |
05_ashley-my-path-to-cybersecurity.en.srt |
5.72KB |
05_ashley-my-path-to-cybersecurity.en.txt |
3.04KB |
05_ashley-my-path-to-cybersecurity.mp4 |
19.83MB |
05_business-continuity-considerations_instructions.html |
6.20KB |
05_common-cybersecurity-terminology_instructions.html |
5.55KB |
05_complete-a-security-audit.en.srt |
5.29KB |
05_complete-a-security-audit.en.txt |
3.41KB |
05_complete-a-security-audit.mp4 |
16.98MB |
05_conduct-pre-interview-research.en.srt |
5.04KB |
05_conduct-pre-interview-research.en.txt |
2.73KB |
05_conduct-pre-interview-research.mp4 |
12.58MB |
05_data-exfiltration-attacks.en.srt |
7.21KB |
05_data-exfiltration-attacks.en.txt |
3.90KB |
05_data-exfiltration-attacks.mp4 |
15.53MB |
05_emmanuel-useful-skills-for-network-security.en.srt |
4.86KB |
05_emmanuel-useful-skills-for-network-security.en.txt |
2.51KB |
05_emmanuel-useful-skills-for-network-security.mp4 |
13.44MB |
05_examine-suricata-logs.en.srt |
3.26KB |
05_examine-suricata-logs.en.txt |
2.04KB |
05_examine-suricata-logs.mp4 |
7.37MB |
05_garvey-cover-letter-tips.en.srt |
5.02KB |
05_garvey-cover-letter-tips.en.txt |
3.01KB |
05_garvey-cover-letter-tips.mp4 |
11.61MB |
05 google-cybersecurity-certificate-glossary Google Cybersecurity Certificate glossary docx |
879.26KB |
05_google-cybersecurity-certificate-glossary_instructions.html |
6.55KB |
05_heather-protect-sensitive-data-and-information.en.srt |
3.12KB |
05_heather-protect-sensitive-data-and-information.en.txt |
1.97KB |
05_heather-protect-sensitive-data-and-information.mp4 |
16.82MB |
05_heather-the-importance-of-protecting-pii.en.srt |
3.28KB |
05_heather-the-importance-of-protecting-pii.en.txt |
1.76KB |
05_heather-the-importance-of-protecting-pii.mp4 |
14.55MB |
05 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26KB |
05_helpful-resources-and-tips_instructions.html |
11.20KB |
05_indicators-of-compromise_instructions.html |
127.71KB |
05_indicators-of-compromise_the-pyramid-of-pain.html |
67.09KB |
05_investigate-packet-details_instructions.html |
3.64MB |
05_karan-interview-tips-from-a-hiring-manager.en.srt |
4.92KB |
05_karan-interview-tips-from-a-hiring-manager.en.txt |
2.64KB |
05_karan-interview-tips-from-a-hiring-manager.mp4 |
18.50MB |
05_linux-architecture-explained_instructions.html |
6.51KB |
05_manage-common-threats-risks-and-vulnerabilities_instructions.html |
779.07KB |
05_more-on-loops-in-python_instructions.html |
15.64KB |
05_non-repudiation-and-hashing.en.srt |
4.96KB |
05_non-repudiation-and-hashing.en.txt |
3.08KB |
05_non-repudiation-and-hashing.mp4 |
13.51MB |
05_parisa-the-parallels-of-accessibility-and-security.en.srt |
3.80KB |
05_parisa-the-parallels-of-accessibility-and-security.en.txt |
2.45KB |
05_parisa-the-parallels-of-accessibility-and-security.mp4 |
16.41MB |
05_pathways-through-defenses.en.srt |
7.40KB |
05_pathways-through-defenses.en.txt |
3.95KB |
05_pathways-through-defenses.mp4 |
22.40MB |
05_proxy-servers.en.srt |
4.94KB |
05_proxy-servers.en.txt |
3.12KB |
05_proxy-servers.mp4 |
11.21MB |
05_python-environments_instructions.html |
4.16KB |
05_responsible-use-of-sudo_instructions.html |
11.15KB |
05_sean-keep-your-cool-during-a-data-breach.en.srt |
2.85KB |
05_sean-keep-your-cool-during-a-data-breach.en.txt |
1.47KB |
05_sean-keep-your-cool-during-a-data-breach.mp4 |
13.88MB |
05_security-starts-with-asset-classification.en.srt |
6.62KB |
05_security-starts-with-asset-classification.en.txt |
3.57KB |
05_security-starts-with-asset-classification.mp4 |
16.89MB |
05_test-your-knowledge-network-interception-attack-tactics_quiz.html |
4.01KB |
05_test-your-knowledge-recognize-different-network-protocols_quiz.html |
3.44KB |
05 test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks quiz html |
3.84KB |
05_the-osi-model_instructions.html |
302.88KB |
05_the-owasp-top-10_instructions.html |
141.88KB |
05_the-where-clause-and-basic-operators_instructions.html |
8.07KB |
05_tim-finding-purpose-in-protecting-assets.en.srt |
2.02KB |
05_tim-finding-purpose-in-protecting-assets.en.txt |
1.23KB |
05_tim-finding-purpose-in-protecting-assets.mp4 |
6.95MB |
05_types-of-phishing_instructions.html |
339.37KB |
05_variations-of-logs.en.srt |
6.77KB |
05_variations-of-logs.en.txt |
3.59KB |
05_variations-of-logs.mp4 |
11.91MB |
05_work-with-built-in-functions_functions.html |
269.11KB |
05_work-with-built-in-functions_instructions.html |
7.43KB |
06_akash-python-and-the-cybersecurity-professional.en.srt |
2.00KB |
06_akash-python-and-the-cybersecurity-professional.en.txt |
1.28KB |
06_akash-python-and-the-cybersecurity-professional.mp4 |
5.72MB |
06 analyze-indicators-of-compromise-with-investigative-tools instructions html |
1.46MB |
06_build-rapport-with-interviewers.en.srt |
5.95KB |
06_build-rapport-with-interviewers.en.txt |
3.17KB |
06_build-rapport-with-interviewers.mp4 |
13.60MB |
06_common-classification-requirements_instructions.html |
106.29KB |
06_fortify-against-brute-force-cyber-attacks_instructions.html |
153.11KB |
06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf |
1.21MB |
06_identity-and-access-management_instructions.html |
302.88KB |
06 more-about-security-audits Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf |
1.22MB |
06_more-about-security-audits_Control_categories.docx |
837.97KB |
06_more-about-security-audits_instructions.html |
8.82KB |
06_network-tools.en.srt |
4.48KB |
06_network-tools.en.txt |
2.44KB |
06_network-tools.mp4 |
7.03MB |
06_overview-of-log-file-formats_instructions.html |
16.37KB |
06_overview-of-suricata_eve-json-examplesjq.html |
22.98KB |
06_overview-of-suricata_index.html |
32.52KB |
06_overview-of-suricata_instructions.html |
124.41KB |
06_overview-of-suricata_suricata-update.html |
23.48KB |
06_overview-of-suricata_suricata-yaml.html |
236.66KB |
06_participate-in-program-surveys_instructions.html |
3.71KB |
06_prepare-for-interviews-with-interview-warmup_instructions.html |
183.12KB |
06_resources-for-completing-labs_instructions.html |
108.52KB |
06_test-your-knowledge-network-communication_quiz.html |
4.89KB |
06_the-evolution-of-hash-functions_instructions.html |
585.39KB |
06_virtual-networks-and-privacy_instructions.html |
8.43KB |
06_wireless-protocols.en.srt |
2.12KB |
06_wireless-protocols.en.txt |
1.10KB |
06_wireless-protocols.mp4 |
5.11MB |
07_network-components-devices-and-diagrams_instructions.html |
1.68MB |
07_test-your-knowledge-system-identification_quiz.html |
4.29KB |
07_the-evolution-of-wireless-security-protocols_instructions.html |
159.17KB |
08_cloud-networks.en.srt |
3.58KB |
08_cloud-networks.en.txt |
2.33KB |
08_cloud-networks.mp4 |
8.77MB |
09_cloud-computing-and-software-defined-networks_instructions.html |
694.11KB |
10_test-your-knowledge-introduction-to-networks_quiz.html |
3.51KB |
Readme.txt |
51B |
Readme.txt |
51B |