Torrent Info
Title [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
Category
Size 3.84GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[CourserHub.com].url 123B
[CourserHub.com].url 123B
01__01-intro.html 63.28KB
01__16-software-updates.html 25.52KB
01__2-4-3.html 8.64KB
01__5.2 5.39KB
01__55.html 42.49KB
01__5-signs-youve-been-hit-with-an-apt.html 172.48KB
01__7.1 11.66KB
01__7.2 7.50KB
01__7.5 8.17KB
01__aa494182vexchg.140 33.94KB
01__article.asp 62.82KB
01 Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf 1.22MB
01__bootup.html 8.15KB
01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf 142.37KB
01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf 360.21KB
01__cis-controls-and-the-hph.pdf 1.49MB
01__Course_1_glossary.docx 858.74KB
01__Course_2_glossary.docx 858.52KB
01__Course_3_glossary.docx 857.56KB
01__Course_4_glossary.docx 1.12MB
01__Course_5_glossary.docx 862.38KB
01__Course_6_glossary.docx 859.78KB
01__Course_7_glossary.docx 869.87KB
01__Course_8_glossary.docx 1.11MB
01__csos-guide-to-phishing-and-phishing-kits.html 155.82KB
01__Cyber-Incident-Response-Standard.docx 63.29KB
01__display.cfm 37.04KB
01__dod85.pdf 239.72KB
01__encryption-explained.html 45.23KB
01 Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 508C pdf 1.09MB
01__Format-Security-plus-Study-Guide.pdf 16.83KB
01__FULL_TEXT.pdf 1.41MB
01__functions.html 269.11KB
01__gcat_threathorizons_full_sept2022.pdf 2.97MB
01 gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations html 155.44KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.26KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.26KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.26KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.15KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.26KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.26KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.26KB
01__Google_Cybersecurity_Certificate_glossary.docx 879.26KB
01__guidelines.html 17.43KB
01 hashing-explained-why-its-your-best-bet-to-protect-stored-passwords html 159.54KB
01__hipaa.html 195.91KB
01__hipaa.html 195.91KB
01__index.html 32.52KB
01__index.html 1.60MB
01__index.html 21.33KB
01__index.html 22.90KB
01__IntroToCybersecurityEthics.pdf 578.32KB
01__Linux-in-a-Nutshell-6th-Edition.pdf 12.42MB
01__malware.html 211.67KB
01__ncsam_eskimming_508.pdf 780.84KB
01__network-operations-center.html 219.59KB
01__nist_small_business_fundamentals_july_2019.pptx 4.16MB
01__NIST.FIPS.140-3.pdf 303.35KB
01__NIST.SP.800-218.pdf 722.55KB
01__NIST.SP.800-53r5.pdf 5.79MB
01__nist.sp.800-61r2.pdf 1.47MB
01__nist.sp.800-61r2.pdf 1.47MB
01__nistspecialpublication800-92.pdf 1.68MB
01__operating-system2.htm 153.60KB
01__overview.html 636.47KB
01__paper.pdf 196.74KB
01__physical-access-control.pdf 6.95MB
01__question525.htm 170.30KB
01__R0239.pdf 220.58KB
01__R46536.pdf 1.29MB
01__RAID4.pdf 284.66KB
01__resources.html 18.57KB
01__resources.html 6.55KB
01__resources.html 108.50KB
01__resources.html 60.18KB
01__resources.html 6.49KB
01__resources.html 15.95KB
01__resources.html 8.76KB
01__resources.html 18.68KB
01__resources.html 6.55KB
01__resources.html 6.49KB
01__resources.html 6.99KB
01__resources.html 15.95KB
01__resources.html 8.76KB
01__resources.html 18.58KB
01__resources.html 6.55KB
01__resources.html 108.50KB
01__resources.html 6.49KB
01__resources.html 37.05KB
01__resources.html 15.95KB
01__resources.html 8.76KB
01__resources.html 19.42KB
01__resources.html 6.49KB
01__resources.html 28.11KB
01__resources.html 6.55KB
01__resources.html 15.95KB
01__resources.html 18.57KB
01__resources.html 6.55KB
01__resources.html 108.51KB
01__resources.html 108.50KB
01__resources.html 6.48KB
01__resources.html 19.77KB
01__resources.html 15.95KB
01__resources.html 8.76KB
01__resources.html 18.59KB
01__resources.html 6.55KB
01__resources.html 6.49KB
01__resources.html 33.05KB
01__resources.html 15.95KB
01__resources.html 8.76KB
01__resources.html 18.56KB
01__resources.html 6.55KB
01__resources.html 6.45KB
01__resources.html 17.59KB
01__resources.html 15.95KB
01__resources.html 8.76KB
01__resources.html 18.56KB
01__resources.html 6.43KB
01__resources.html 11.47KB
01__resources.html 6.55KB
01__resources.html 15.95KB
01__resources.html 8.75KB
01__rules-and-security-requirements.html 74.82KB
01__ShellIntro.pdf 124.26KB
01__sp800-179r1-draft.pdf 1.82MB
01__sql_injection.asp 110.14KB
01__ssrf-attacks-explained-and-how-to-defend-against-them.html 155.61KB
01__subsection3.1.html 4.33KB
01__suricata-update.html 23.48KB
01__suricata-yaml.html 236.66KB
01__tcpdump.1.html 72.58KB
01__thegnuproject.html 65.07KB
01__the-pyramid-of-pain.html 67.09KB
01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf 1.23MB
01__vol01iss13.cfm 45.52KB
01__vulnerability-vs-threat-vs-risk.html 76.72KB
01__what-is-a-firewall.html 61.35KB
01__what-is-cve-its-definition-and-purpose.html 169.18KB
01__what-is-owasp-top-10.html 247.53KB
01__what-is-phishing-examples-types-and-techniques.html 161.47KB
01__why-splunk.html 227.46KB
01__why-splunk.html 227.45KB
01__xml_whatis.asp 89.39KB
01_access-a-text-file-in-python.en.srt 4.03KB
01_access-a-text-file-in-python.en.txt 2.51KB
01_access-a-text-file-in-python.mp4 10.51MB
01_access-controls-and-authentication-systems.en.srt 6.18KB
01_access-controls-and-authentication-systems.en.txt 3.93KB
01_access-controls-and-authentication-systems.mp4 18.28MB
01_a-proactive-approach-to-security.en.srt 4.94KB
01_a-proactive-approach-to-security.en.txt 3.12KB
01_a-proactive-approach-to-security.mp4 17.07MB
01_assets-in-a-digital-world.en.srt 6.62KB
01_assets-in-a-digital-world.en.txt 3.54KB
01_assets-in-a-digital-world.mp4 17.96MB
01_basic-queries.en.srt 4.66KB
01_basic-queries.en.txt 2.48KB
01_basic-queries.mp4 8.95MB
01_clear-and-concise-communication.en.srt 3.65KB
01_clear-and-concise-communication.en.txt 1.97KB
01_clear-and-concise-communication.mp4 12.14MB
01_conditional-statements-in-python.en.srt 9.67KB
01_conditional-statements-in-python.en.txt 6.16KB
01_conditional-statements-in-python.mp4 17.68MB
01_core-skills-for-cybersecurity-professionals.en.srt 7.63KB
01_core-skills-for-cybersecurity-professionals.en.txt 4.08KB
01_core-skills-for-cybersecurity-professionals.mp4 19.32MB
01_course-wrap-up.en.srt 4.42KB
01_course-wrap-up.en.srt 3.55KB
01_course-wrap-up.en.srt 3.58KB
01_course-wrap-up.en.srt 2.98KB
01_course-wrap-up.en.srt 2.31KB
01_course-wrap-up.en.srt 1.92KB
01_course-wrap-up.en.srt 2.94KB
01_course-wrap-up.en.txt 2.73KB
01_course-wrap-up.en.txt 1.86KB
01_course-wrap-up.en.txt 1.86KB
01_course-wrap-up.en.txt 1.63KB
01_course-wrap-up.en.txt 1.25KB
01_course-wrap-up.en.txt 1.24KB
01_course-wrap-up.en.txt 1.86KB
01_course-wrap-up.mp4 17.66MB
01_course-wrap-up.mp4 11.84MB
01_course-wrap-up.mp4 5.84MB
01_course-wrap-up.mp4 7.71MB
01_course-wrap-up.mp4 3.76MB
01_course-wrap-up.mp4 5.22MB
01_course-wrap-up.mp4 6.64MB
01_cross-site-scripting.en.srt 7.31KB
01_cross-site-scripting.en.txt 4.50KB
01_cross-site-scripting.mp4 21.50MB
01_damar-my-journey-into-linux-commands.en.srt 3.69KB
01_damar-my-journey-into-linux-commands.en.txt 2.28KB
01_damar-my-journey-into-linux-commands.mp4 13.58MB
01_data-types-in-python.en.srt 7.60KB
01_data-types-in-python.en.txt 3.91KB
01_data-types-in-python.mp4 19.40MB
01_debugging-strategies.en.srt 8.46KB
01_debugging-strategies.en.txt 4.43KB
01_debugging-strategies.mp4 23.10MB
01_denial-of-service-dos-attacks.en.srt 7.83KB
01_denial-of-service-dos-attacks.en.txt 4.21KB
01_denial-of-service-dos-attacks.mp4 18.55MB
01_detect-and-protect-without-neglect.en.srt 5.74KB
01_detect-and-protect-without-neglect.en.txt 3.09KB
01_detect-and-protect-without-neglect.mp4 18.60MB
01_develop-an-elevator-pitch.en.srt 4.48KB
01_develop-an-elevator-pitch.en.txt 2.86KB
01_develop-an-elevator-pitch.mp4 13.00MB
01_elements-of-a-security-plan.en.srt 6.19KB
01_elements-of-a-security-plan.en.txt 3.98KB
01_elements-of-a-security-plan.mp4 20.22MB
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt 4.72KB
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt 3.10KB
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 14.69MB
01_ethics-in-cybersecurity.en.srt 6.56KB
01_ethics-in-cybersecurity.en.txt 4.14KB
01_ethics-in-cybersecurity.mp4 22.54MB
01_explore-common-siem-tools.en.srt 4.35KB
01_explore-common-siem-tools.en.txt 2.83KB
01_explore-common-siem-tools.mp4 14.71MB
01_explore-the-cia-triad.en.srt 4.80KB
01_explore-the-cia-triad.en.txt 3.08KB
01_explore-the-cia-triad.mp4 14.74MB
01_explore-the-interview-process.en.srt 6.36KB
01_explore-the-interview-process.en.txt 3.42KB
01_explore-the-interview-process.mp4 14.00MB
01_file-permissions-and-ownership.en.srt 11.06KB
01_file-permissions-and-ownership.en.txt 5.80KB
01_file-permissions-and-ownership.mp4 16.73MB
01_filter-dates-and-numbers.en.srt 5.14KB
01_filter-dates-and-numbers.en.txt 3.19KB
01_filter-dates-and-numbers.mp4 10.99MB
01_find-what-you-need-with-linux.en.srt 7.57KB
01_find-what-you-need-with-linux.en.txt 3.91KB
01_find-what-you-need-with-linux.mp4 10.67MB
01_firewalls-and-network-security-measures.en.srt 7.40KB
01_firewalls-and-network-security-measures.en.txt 3.95KB
01_firewalls-and-network-security-measures.mp4 16.81MB
01_from-simple-activity-to-major-data-breach.en.srt 5.47KB
01_from-simple-activity-to-major-data-breach.en.txt 2.89KB
01_from-simple-activity-to-major-data-breach.mp4 18.28MB
01_fundamentals-of-cryptography.en.srt 5.94KB
01_fundamentals-of-cryptography.en.txt 3.76KB
01_fundamentals-of-cryptography.mp4 22.57MB
01_gui-versus-cli.en.srt 6.97KB
01_gui-versus-cli.en.txt 3.73KB
01_gui-versus-cli.mp4 14.08MB
01_incident-response-teams.en.srt 4.62KB
01_incident-response-teams.en.txt 2.91KB
01_incident-response-teams.mp4 12.44MB
01_incident-response-tools.en.srt 2.81KB
01_incident-response-tools.en.txt 1.53KB
01_incident-response-tools.mp4 5.42MB
01_inside-the-operating-system.en.srt 5.76KB
01_inside-the-operating-system.en.txt 3.11KB
01_inside-the-operating-system.mp4 10.46MB
01_introduction-to-course-2.en.srt 2.38KB
01_introduction-to-course-2.en.txt 1.49KB
01_introduction-to-course-2.mp4 7.91MB
01_introduction-to-course-3.en.srt 1.75KB
01_introduction-to-course-3.en.txt 1.10KB
01_introduction-to-course-3.mp4 3.60MB
01_introduction-to-course-4.en.srt 3.92KB
01_introduction-to-course-4.en.txt 2.07KB
01_introduction-to-course-4.mp4 8.66MB
01_introduction-to-course-5.en.srt 4.40KB
01_introduction-to-course-5.en.txt 2.78KB
01_introduction-to-course-5.mp4 16.06MB
01_introduction-to-course-6.en.srt 4.11KB
01_introduction-to-course-6.en.txt 2.20KB
01_introduction-to-course-6.mp4 7.20MB
01_introduction-to-course-7.en.srt 4.79KB
01_introduction-to-course-7.en.txt 3.01KB
01_introduction-to-course-7.mp4 18.04MB
01_introduction-to-course-8.en.srt 3.85KB
01_introduction-to-course-8.en.txt 2.40KB
01_introduction-to-course-8.mp4 13.12MB
01_introduction-to-cybersecurity.en.srt 7.14KB
01_introduction-to-cybersecurity.en.txt 3.83KB
01_introduction-to-cybersecurity.mp4 23.11MB
01_introduction-to-linux-sql-and-python.en.srt 5.13KB
01_introduction-to-linux-sql-and-python.en.txt 2.75KB
01_introduction-to-linux-sql-and-python.mp4 14.49MB
01_introduction-to-network-communication.en.srt 3.67KB
01_introduction-to-network-communication.en.txt 2.35KB
01_introduction-to-network-communication.mp4 7.25MB
01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt 5.27KB
01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt 3.32KB
01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 18.32MB
01_introduction-to-the-shell.en.srt 2.68KB
01_introduction-to-the-shell.en.txt 1.66KB
01_introduction-to-the-shell.mp4 5.98MB
01_ip-addresses-and-network-communication.en.srt 4.16KB
01_ip-addresses-and-network-communication.en.txt 2.21KB
01_ip-addresses-and-network-communication.mp4 7.31MB
01_join-tables-in-sql.en.srt 8.47KB
01_join-tables-in-sql.en.txt 4.54KB
01_join-tables-in-sql.mp4 12.29MB
01_linux-distributions.en.srt 4.25KB
01_linux-distributions.en.txt 2.63KB
01_linux-distributions.mp4 10.30MB
01_list-operations-in-python.en.srt 8.29KB
01_list-operations-in-python.en.txt 5.15KB
01_list-operations-in-python.mp4 19.31MB
01_malicious-packet-sniffing.en.srt 8.04KB
01_malicious-packet-sniffing.en.txt 4.29KB
01_malicious-packet-sniffing.mp4 19.32MB
01_malicious-software.en.srt 7.57KB
01_malicious-software.en.txt 4.06KB
01_malicious-software.mp4 24.52MB
01_modules-and-libraries.en.srt 3.25KB
01_modules-and-libraries.en.txt 2.04KB
01_modules-and-libraries.mp4 11.35MB
01_network-hardening-practices.en.srt 6.19KB
01_network-hardening-practices.en.txt 3.31KB
01_network-hardening-practices.mp4 16.90MB
01_network-security-in-the-cloud.en.srt 2.82KB
01_network-security-in-the-cloud.en.txt 1.84KB
01_network-security-in-the-cloud.mp4 9.73MB
01_nist-frameworks.en.srt 6.85KB
01_nist-frameworks.en.txt 3.64KB
01_nist-frameworks.mp4 18.00MB
01_os-hardening-practices.en.srt 7.52KB
01_os-hardening-practices.en.txt 3.97KB
01_os-hardening-practices.mp4 18.03MB
01_owasp-security-principles.en.srt 6.59KB
01_owasp-security-principles.en.txt 3.51KB
01_owasp-security-principles.mp4 19.09MB
01_packet-captures-with-tcpdump.en.srt 6.99KB
01_packet-captures-with-tcpdump.en.txt 3.68KB
01_packet-captures-with-tcpdump.mp4 9.30MB
01_packets-and-packet-captures.en.srt 5.11KB
01_packets-and-packet-captures.en.txt 2.76KB
01_packets-and-packet-captures.mp4 10.23MB
01_prepare-to-escalate-through-security-recognition.en.srt 5.55KB
01_prepare-to-escalate-through-security-recognition.en.txt 2.94KB
01_prepare-to-escalate-through-security-recognition.mp4 17.27MB
01_protect-all-entry-points.en.srt 5.74KB
01_protect-all-entry-points.en.txt 3.59KB
01_protect-all-entry-points.mp4 22.54MB
01_recap-of-the-google-cybersecurity-certificate-program.en.srt 3.91KB
01_recap-of-the-google-cybersecurity-certificate-program.en.txt 2.13KB
01_recap-of-the-google-cybersecurity-certificate-program.mp4 8.85MB
01_reexamine-siem-tools.en.srt 3.64KB
01_reexamine-siem-tools.en.txt 2.25KB
01_reexamine-siem-tools.mp4 9.10MB
01_regular-expressions-in-python.en.srt 10.37KB
01_regular-expressions-in-python.en.txt 6.45KB
01_regular-expressions-in-python.mp4 21.86MB
01_security-monitoring-with-detection-tools.en.srt 6.08KB
01_security-monitoring-with-detection-tools.en.txt 3.27KB
01_security-monitoring-with-detection-tools.mp4 14.69MB
01_the-benefits-of-documentation.en.srt 3.57KB
01_the-benefits-of-documentation.en.txt 2.29KB
01_the-benefits-of-documentation.mp4 9.32MB
01_the-post-incident-activity-phase-of-the-lifecycle.en.srt 3.54KB
01_the-post-incident-activity-phase-of-the-lifecycle.en.txt 2.22KB
01_the-post-incident-activity-phase-of-the-lifecycle.mp4 8.22MB
01_the-role-of-triage-in-incident-response.en.srt 6.03KB
01_the-role-of-triage-in-incident-response.en.txt 3.21KB
01_the-role-of-triage-in-incident-response.mp4 11.56MB
01_threats-risks-and-vulnerabilities.en.srt 5.90KB
01_threats-risks-and-vulnerabilities.en.txt 3.76KB
01_threats-risks-and-vulnerabilities.mp4 17.04MB
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt 5.86KB
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt 3.18KB
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 19.05MB
01_use-parameters-in-functions.en.srt 5.43KB
01_use-parameters-in-functions.en.txt 3.32KB
01_use-parameters-in-functions.mp4 10.62MB
01_use-strategies-to-answer-interview-questions.en.srt 4.34KB
01_use-strategies-to-answer-interview-questions.en.txt 2.76KB
01_use-strategies-to-answer-interview-questions.mp4 12.02MB
01_visual-storytelling-in-cybersecurity.en.srt 3.79KB
01_visual-storytelling-in-cybersecurity.en.txt 2.37KB
01_visual-storytelling-in-cybersecurity.mp4 16.07MB
01_vulnerability-assessments.en.srt 5.86KB
01_vulnerability-assessments.en.txt 3.11KB
01_vulnerability-assessments.mp4 19.46MB
01_welcome-to-the-google-cybersecurity-certificate.en.srt 15.24KB
01_welcome-to-the-google-cybersecurity-certificate.en.txt 8.04KB
01_welcome-to-the-google-cybersecurity-certificate.mp4 47.29MB
01_welcome-to-week-1.en.srt 3.30KB
01_welcome-to-week-1.en.srt 2.86KB
01_welcome-to-week-1.en.srt 2.51KB
01_welcome-to-week-1.en.srt 1.54KB
01_welcome-to-week-1.en.srt 1.63KB
01_welcome-to-week-1.en.srt 863B
01_welcome-to-week-1.en.srt 1.02KB
01_welcome-to-week-1.en.txt 2.08KB
01_welcome-to-week-1.en.txt 1.48KB
01_welcome-to-week-1.en.txt 1.59KB
01_welcome-to-week-1.en.txt 878B
01_welcome-to-week-1.en.txt 1.04KB
01_welcome-to-week-1.en.txt 533B
01_welcome-to-week-1.en.txt 545B
01_welcome-to-week-1.mp4 10.16MB
01_welcome-to-week-1.mp4 7.80MB
01_welcome-to-week-1.mp4 5.80MB
01_welcome-to-week-1.mp4 2.94MB
01_welcome-to-week-1.mp4 4.46MB
01_welcome-to-week-1.mp4 2.30MB
01_welcome-to-week-1.mp4 1.79MB
01_welcome-to-week-2.en.srt 3.12KB
01_welcome-to-week-2.en.srt 2.18KB
01_welcome-to-week-2.en.srt 1.85KB
01_welcome-to-week-2.en.srt 2.15KB
01_welcome-to-week-2.en.srt 1.59KB
01_welcome-to-week-2.en.srt 1.68KB
01_welcome-to-week-2.en.srt 1.98KB
01_welcome-to-week-2.en.srt 2.30KB
01_welcome-to-week-2.en.txt 1.70KB
01_welcome-to-week-2.en.txt 1.17KB
01_welcome-to-week-2.en.txt 1023B
01_welcome-to-week-2.en.txt 1.13KB
01_welcome-to-week-2.en.txt 889B
01_welcome-to-week-2.en.txt 950B
01_welcome-to-week-2.en.txt 1.09KB
01_welcome-to-week-2.en.txt 1.18KB
01_welcome-to-week-2.mp4 9.84MB
01_welcome-to-week-2.mp4 5.01MB
01_welcome-to-week-2.mp4 3.69MB
01_welcome-to-week-2.mp4 6.71MB
01_welcome-to-week-2.mp4 3.23MB
01_welcome-to-week-2.mp4 5.42MB
01_welcome-to-week-2.mp4 4.60MB
01_welcome-to-week-2.mp4 6.07MB
01_welcome-to-week-3.en.srt 2.84KB
01_welcome-to-week-3.en.srt 1.92KB
01_welcome-to-week-3.en.srt 1.55KB
01_welcome-to-week-3.en.srt 3.81KB
01_welcome-to-week-3.en.srt 2.66KB
01_welcome-to-week-3.en.srt 1.30KB
01_welcome-to-week-3.en.srt 710B
01_welcome-to-week-3.en.srt 1.15KB
01_welcome-to-week-3.en.txt 1.69KB
01_welcome-to-week-3.en.txt 1.03KB
01_welcome-to-week-3.en.txt 954B
01_welcome-to-week-3.en.txt 2.36KB
01_welcome-to-week-3.en.txt 1.41KB
01_welcome-to-week-3.en.txt 835B
01_welcome-to-week-3.en.txt 447B
01_welcome-to-week-3.en.txt 715B
01_welcome-to-week-3.mp4 9.15MB
01_welcome-to-week-3.mp4 4.89MB
01_welcome-to-week-3.mp4 3.53MB
01_welcome-to-week-3.mp4 14.48MB
01_welcome-to-week-3.mp4 5.11MB
01_welcome-to-week-3.mp4 4.27MB
01_welcome-to-week-3.mp4 1.32MB
01_welcome-to-week-3.mp4 3.69MB
01_welcome-to-week-4.en.srt 3.04KB
01_welcome-to-week-4.en.srt 1.95KB
01_welcome-to-week-4.en.srt 2.17KB
01_welcome-to-week-4.en.srt 2.56KB
01_welcome-to-week-4.en.srt 2.57KB
01_welcome-to-week-4.en.srt 912B
01_welcome-to-week-4.en.srt 1.50KB
01_welcome-to-week-4.en.srt 2.19KB
01_welcome-to-week-4.en.txt 1.62KB
01_welcome-to-week-4.en.txt 1.03KB
01_welcome-to-week-4.en.txt 1.32KB
01_welcome-to-week-4.en.txt 1.38KB
01_welcome-to-week-4.en.txt 1.38KB
01_welcome-to-week-4.en.txt 548B
01_welcome-to-week-4.en.txt 929B
01_welcome-to-week-4.en.txt 1.37KB
01_welcome-to-week-4.mp4 8.59MB
01_welcome-to-week-4.mp4 5.14MB
01_welcome-to-week-4.mp4 5.00MB
01_welcome-to-week-4.mp4 7.04MB
01_welcome-to-week-4.mp4 5.29MB
01_welcome-to-week-4.mp4 2.97MB
01_welcome-to-week-4.mp4 3.84MB
01_welcome-to-week-4.mp4 6.84MB
01_welcome-to-week-5.en.srt 2.64KB
01_welcome-to-week-5.en.txt 1.45KB
01_welcome-to-week-5.mp4 7.55MB
01_wrap-up.en.srt 3.04KB
01_wrap-up.en.srt 2.36KB
01_wrap-up.en.srt 3.57KB
01_wrap-up.en.srt 2.79KB
01_wrap-up.en.srt 1.58KB
01_wrap-up.en.srt 1.75KB
01_wrap-up.en.srt 1.79KB
01_wrap-up.en.srt 1.47KB
01_wrap-up.en.srt 1.39KB
01_wrap-up.en.srt 1.61KB
01_wrap-up.en.srt 1.65KB
01_wrap-up.en.srt 1.83KB
01_wrap-up.en.srt 1.66KB
01_wrap-up.en.srt 2.21KB
01_wrap-up.en.srt 1.68KB
01_wrap-up.en.srt 1012B
01_wrap-up.en.srt 1.89KB
01_wrap-up.en.srt 1.41KB
01_wrap-up.en.srt 1.34KB
01_wrap-up.en.srt 2.25KB
01_wrap-up.en.srt 1.45KB
01_wrap-up.en.srt 2.82KB
01_wrap-up.en.srt 1.18KB
01_wrap-up.en.srt 1.24KB
01_wrap-up.en.srt 1.03KB
01_wrap-up.en.srt 1.10KB
01_wrap-up.en.srt 1.35KB
01_wrap-up.en.srt 1.58KB
01_wrap-up.en.srt 1.55KB
01_wrap-up.en.srt 1.60KB
01_wrap-up.en.srt 2.89KB
01_wrap-up.en.srt 1.36KB
01_wrap-up.en.srt 1.06KB
01_wrap-up.en.txt 1.62KB
01_wrap-up.en.txt 1.54KB
01_wrap-up.en.txt 1.92KB
01_wrap-up.en.txt 1.50KB
01_wrap-up.en.txt 949B
01_wrap-up.en.txt 952B
01_wrap-up.en.txt 992B
01_wrap-up.en.txt 806B
01_wrap-up.en.txt 788B
01_wrap-up.en.txt 872B
01_wrap-up.en.txt 1.06KB
01_wrap-up.en.txt 1.14KB
01_wrap-up.en.txt 925B
01_wrap-up.en.txt 1.45KB
01_wrap-up.en.txt 953B
01_wrap-up.en.txt 648B
01_wrap-up.en.txt 1.11KB
01_wrap-up.en.txt 735B
01_wrap-up.en.txt 876B
01_wrap-up.en.txt 1.20KB
01_wrap-up.en.txt 882B
01_wrap-up.en.txt 1.50KB
01_wrap-up.en.txt 780B
01_wrap-up.en.txt 836B
01_wrap-up.en.txt 620B
01_wrap-up.en.txt 727B
01_wrap-up.en.txt 747B
01_wrap-up.en.txt 909B
01_wrap-up.en.txt 1018B
01_wrap-up.en.txt 1.01KB
01_wrap-up.en.txt 1.51KB
01_wrap-up.en.txt 856B
01_wrap-up.en.txt 586B
01_wrap-up.mp4 6.83MB
01_wrap-up.mp4 8.23MB
01_wrap-up.mp4 11.83MB
01_wrap-up.mp4 8.07MB
01_wrap-up.mp4 3.43MB
01_wrap-up.mp4 3.75MB
01_wrap-up.mp4 3.67MB
01_wrap-up.mp4 2.89MB
01_wrap-up.mp4 2.38MB
01_wrap-up.mp4 3.20MB
01_wrap-up.mp4 2.86MB
01_wrap-up.mp4 3.44MB
01_wrap-up.mp4 3.99MB
01_wrap-up.mp4 7.36MB
01_wrap-up.mp4 4.70MB
01_wrap-up.mp4 2.06MB
01_wrap-up.mp4 3.16MB
01_wrap-up.mp4 2.83MB
01_wrap-up.mp4 3.36MB
01_wrap-up.mp4 3.38MB
01_wrap-up.mp4 3.95MB
01_wrap-up.mp4 7.07MB
01_wrap-up.mp4 2.62MB
01_wrap-up.mp4 4.37MB
01_wrap-up.mp4 1.71MB
01_wrap-up.mp4 2.77MB
01_wrap-up.mp4 2.93MB
01_wrap-up.mp4 3.14MB
01_wrap-up.mp4 4.09MB
01_wrap-up.mp4 4.50MB
01_wrap-up.mp4 9.05MB
01_wrap-up.mp4 3.85MB
01_wrap-up.mp4 1.96MB
02_an-introduction-to-malware_instructions.html 163.88KB
02_apply-debugging-strategies.en.srt 7.90KB
02_apply-debugging-strategies.en.txt 4.18KB
02_apply-debugging-strategies.mp4 13.56MB
02_apply-the-star-method-during-interviews_instructions.html 50.99KB
02_approach-cybersecurity-with-an-attacker-mindset_instructions.html 206.00KB
02_approaches-to-vulnerability-scanning_instructions.html 7.45KB
02_automate-cybersecurity-tasks-with-python.en.srt 5.73KB
02_automate-cybersecurity-tasks-with-python.en.txt 3.02KB
02_automate-cybersecurity-tasks-with-python.mp4 19.07MB
02_brute-force-attacks-and-os-hardening_instructions.html 8.12KB
02_building-blocks-of-cybersecurity-communications.en.srt 5.82KB
02_building-blocks-of-cybersecurity-communications.en.txt 3.07KB
02_building-blocks-of-cybersecurity-communications.mp4 17.00MB
02_casey-apply-soft-skills-in-cybersecurity.en.srt 2.75KB
02_casey-apply-soft-skills-in-cybersecurity.en.txt 1.46KB
02_casey-apply-soft-skills-in-cybersecurity.mp4 13.89MB
02_change-permissions.en.srt 7.17KB
02_change-permissions.en.txt 3.79KB
02_change-permissions.mp4 9.40MB
02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt 3.69KB
02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt 1.97KB
02_chantelle-the-value-of-diversity-in-cybersecurity.mp4 14.09MB
02_chris-my-path-to-cybersecurity.en.srt 4.91KB
02_chris-my-path-to-cybersecurity.en.txt 2.63KB
02_chris-my-path-to-cybersecurity.mp4 18.89MB
02_code-readability.en.srt 6.10KB
02_code-readability.en.txt 3.86KB
02_code-readability.mp4 19.05MB
02_common-cybersecurity-tools.en.srt 7.10KB
02_common-cybersecurity-tools.en.txt 3.79KB
02_common-cybersecurity-tools.mp4 20.23MB
02_components-of-network-layer-communication_instructions.html 642.17KB
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en srt 2.82KB
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en txt 1.40KB
02 congratulations-on-completing-the-google-cybersecurity-certificate-program mp4 9.41MB
02_connect-with-other-cybersecurity-professionals_instructions.html 4.24KB
02_course-1-glossary_Course_1_glossary.docx 858.91KB
02_course-1-glossary_instructions.html 6.49KB
02_course-2-glossary_Course_2_glossary.docx 858.52KB
02_course-2-glossary_instructions.html 6.49KB
02_course-2-overview_instructions.html 1.85MB
02_course-3-glossary_Course_3_glossary.docx 857.56KB
02_course-3-glossary_instructions.html 6.45KB
02_course-3-overview_instructions.html 1.22MB
02_course-4-glossary_Course_4_glossary.docx 1.12MB
02_course-4-glossary_instructions.html 6.48KB
02_course-4-overview_instructions.html 1.20MB
02_course-5-glossary_Course_5_glossary.docx 862.38KB
02_course-5-glossary_instructions.html 6.49KB
02_course-5-overview_instructions.html 1.26MB
02_course-6-glossary_Course_6_glossary.docx 859.70KB
02_course-6-glossary_instructions.html 6.49KB
02_course-6-overview_instructions.html 1.27MB
02_course-7-glossary_Course_7_glossary.docx 869.85KB
02_course-7-glossary_instructions.html 6.49KB
02_course-7-overview_instructions.html 1.21MB
02_course-8-overview_instructions.html 1.38MB
02 create-visual-dashboards-for-impactful-cybersecurity-communications instructions html 4.98KB
02_detection-tools-and-techniques_instructions.html 342.75KB
02_disaster-recovery-and-business-continuity_instructions.html 5.50KB
02_document-evidence-with-chain-of-custody-forms.en.srt 5.57KB
02_document-evidence-with-chain-of-custody-forms.en.txt 3.52KB
02_document-evidence-with-chain-of-custody-forms.mp4 13.10MB
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en srt 4.40KB
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en txt 2.75KB
02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 19.88MB
02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html 7.87KB
02_exploitable-gaps-in-databases.en.srt 5.10KB
02_exploitable-gaps-in-databases.en.txt 3.21KB
02_exploitable-gaps-in-databases.mp4 17.35MB
02_explore-the-cissp-security-domains-part-1.en.srt 6.17KB
02_explore-the-cissp-security-domains-part-1.en.txt 3.99KB
02_explore-the-cissp-security-domains-part-1.mp4 19.14MB
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt 6.04KB
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt 3.19KB
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 15.16MB
02_fatima-the-importance-of-communication-during-incident-response.en.srt 4.60KB
02_fatima-the-importance-of-communication-during-incident-response.en.txt 2.38KB
02_fatima-the-importance-of-communication-during-incident-response.mp4 15.18MB
02_filter-content-in-linux_instructions.html 8.70KB
02_find-cybersecurity-jobs.en.srt 5.55KB
02_find-cybersecurity-jobs.en.txt 2.97KB
02_find-cybersecurity-jobs.mp4 16.32MB
02_frameworks.en.srt 3.45KB
02_frameworks.en.txt 1.90KB
02_frameworks.mp4 10.33MB
02_glossary-terms-from-week-1_instructions.html 3.42KB
02_glossary-terms-from-week-1_instructions.html 4.02KB
02_glossary-terms-from-week-1_instructions.html 4.14KB
02_glossary-terms-from-week-1_instructions.html 2.75KB
02_glossary-terms-from-week-1_instructions.html 2.47KB
02_glossary-terms-from-week-1_instructions.html 3.91KB
02_glossary-terms-from-week-1_instructions.html 4.49KB
02_glossary-terms-from-week-1_instructions.html 2.30KB
02_glossary-terms-from-week-2_instructions.html 7.07KB
02_glossary-terms-from-week-2_instructions.html 3.05KB
02_glossary-terms-from-week-2_instructions.html 4.03KB
02_glossary-terms-from-week-2_instructions.html 4.22KB
02_glossary-terms-from-week-2_instructions.html 4.96KB
02_glossary-terms-from-week-2_instructions.html 4.96KB
02_glossary-terms-from-week-2_instructions.html 5.09KB
02_glossary-terms-from-week-2_instructions.html 2.44KB
02_glossary-terms-from-week-3_instructions.html 3.63KB
02_glossary-terms-from-week-3_instructions.html 2.57KB
02_glossary-terms-from-week-3_instructions.html 4.82KB
02_glossary-terms-from-week-3_instructions.html 3.90KB
02_glossary-terms-from-week-3_instructions.html 3.20KB
02_glossary-terms-from-week-3_instructions.html 2.65KB
02_glossary-terms-from-week-3_instructions.html 3.75KB
02_glossary-terms-from-week-3_instructions.html 1.26KB
02_glossary-terms-from-week-4_instructions.html 7.93KB
02_glossary-terms-from-week-4_instructions.html 2.92KB
02_glossary-terms-from-week-4_instructions.html 4.50KB
02_glossary-terms-from-week-4_instructions.html 2.85KB
02_glossary-terms-from-week-4_instructions.html 3.00KB
02_glossary-terms-from-week-4_instructions.html 1.48KB
02_glossary-terms-from-week-4_instructions.html 2.83KB
02_glossary-terms-from-week-4_instructions.html 1.15KB
02_glossary-terms-from-week-5_instructions.html 1.41KB
02_google-cybersecurity-certificate-overview_instructions.html 500.47KB
02_helpful-cybersecurity-resources.en.srt 4.17KB
02_helpful-cybersecurity-resources.en.txt 2.19KB
02_helpful-cybersecurity-resources.mp4 15.26MB
02_import-files-into-python_instructions.html 107.34KB
02_input-and-output-in-the-shell.en.srt 4.91KB
02_input-and-output-in-the-shell.en.txt 2.67KB
02_input-and-output-in-the-shell.mp4 8.58MB
02_introduction-to-databases.en.srt 5.93KB
02_introduction-to-databases.en.txt 3.68KB
02_introduction-to-databases.mp4 10.43MB
02_introduction-to-functions.en.srt 4.00KB
02_introduction-to-functions.en.txt 2.15KB
02_introduction-to-functions.mp4 13.82MB
02_introduction-to-linux.en.srt 4.97KB
02_introduction-to-linux.en.txt 3.09KB
02_introduction-to-linux.mp4 12.60MB
02_introduction-to-security-frameworks-and-controls.en.srt 7.47KB
02_introduction-to-security-frameworks-and-controls.en.txt 3.99KB
02_introduction-to-security-frameworks-and-controls.mp4 23.41MB
02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt 5.67KB
02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt 3.03KB
02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 17.31MB
02_introduction-to-the-incident-response-lifecycle.en.srt 6.44KB
02_introduction-to-the-incident-response-lifecycle.en.txt 4.02KB
02_introduction-to-the-incident-response-lifecycle.mp4 16.02MB
02_ip-spoofing.en.srt 5.13KB
02_ip-spoofing.en.txt 2.72KB
02_ip-spoofing.mp4 11.52MB
02_kali-linux-tm.en.srt 3.53KB
02_kali-linux-tm.en.txt 2.28KB
02_kali-linux-tm.mp4 7.17MB
02_kelsey-cloud-security-explained.en.srt 3.79KB
02_kelsey-cloud-security-explained.en.txt 2.31KB
02_kelsey-cloud-security-explained.mp4 21.94MB
02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt 5.20KB
02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt 3.38KB
02_key-impacts-of-threats-risks-and-vulnerabilities.mp4 17.31MB
02_kim-my-journey-into-computing.en.srt 3.46KB
02_kim-my-journey-into-computing.en.txt 1.84KB
02_kim-my-journey-into-computing.mp4 10.92MB
02_learn-more-about-developing-an-elevator-pitch_instructions.html 5.02KB
02_learn-more-about-packet-captures_instructions.html 735.83KB
02_linux-commands-via-the-bash-shell.en.srt 5.10KB
02_linux-commands-via-the-bash-shell.en.txt 2.82KB
02_linux-commands-via-the-bash-shell.mp4 10.20MB
02_logs-and-siem-tools.en.srt 4.02KB
02_logs-and-siem-tools.en.txt 2.14KB
02_logs-and-siem-tools.mp4 8.88MB
02_more-about-cybersecurity-tools_instructions.html 5.50KB
02_more-about-data-types_instructions.html 12.18KB
02_more-about-owasp-security-principles_instructions.html 5.36KB
02_more-about-regular-expressions_instructions.html 11.41KB
02_more-on-conditionals-in-python_instructions.html 15.09KB
02_network-protocols.en.srt 6.01KB
02_network-protocols.en.txt 3.27KB
02_network-protocols.mp4 11.29MB
02_network-security-applications_instructions.html 2.90MB
02_operators-for-filtering-dates-and-numbers_instructions.html 6.76KB
02_overview-of-tcpdump_instructions.html 132.48KB
02_overview-of-tcpdump_tcpdump.1.html 72.58KB
02_past-cybersecurity-attacks.en.srt 6.34KB
02_past-cybersecurity-attacks.en.txt 3.33KB
02_past-cybersecurity-attacks.mp4 22.02MB
02_phases-of-an-incident-response-playbook.en.srt 7.86KB
02_phases-of-an-incident-response-playbook.en.txt 4.21KB
02_phases-of-an-incident-response-playbook.mp4 24.30MB
02_post-incident-review_instructions.html 233.43KB
02_public-key-infrastructure.en.srt 8.70KB
02_public-key-infrastructure.en.txt 4.54KB
02_public-key-infrastructure.mp4 21.15MB
02_python-and-cybersecurity.en.srt 5.21KB
02_python-and-cybersecurity.en.txt 3.29KB
02_python-and-cybersecurity.mp4 20.08MB
02_query-a-database_instructions.html 8.81KB
02_query-for-events-with-splunk.en.srt 6.99KB
02_query-for-events-with-splunk.en.txt 3.78KB
02_query-for-events-with-splunk.mp4 9.28MB
02_read-tcpdump-logs_instructions.html 146.64KB
02_recognize-roles-and-responsibilities-during-escalation_instructions.html 4.34KB
02_requests-to-the-operating-system_instructions.html 133.93KB
02_return-statements.en.srt 4.80KB
02_return-statements.en.txt 3.02KB
02_return-statements.mp4 13.70MB
02_robin-foster-cross-team-collaboration.en.srt 3.80KB
02_robin-foster-cross-team-collaboration.en.txt 2.39KB
02_robin-foster-cross-team-collaboration.mp4 14.14MB
02_security-as-a-mindset.en.srt 5.08KB
02_security-as-a-mindset.en.txt 2.70KB
02_security-as-a-mindset.mp4 16.95MB
02_security-controls.en.srt 5.17KB
02_security-controls.en.txt 3.29KB
02_security-controls.mp4 19.59MB
02_security-hardening.en.srt 4.62KB
02_security-hardening.en.txt 2.93KB
02_security-hardening.mp4 12.25MB
02_stakeholders-in-cybersecurity.en.srt 6.76KB
02_stakeholders-in-cybersecurity.en.txt 3.58KB
02_stakeholders-in-cybersecurity.mp4 15.13MB
02_string-operations.en.srt 7.78KB
02_string-operations.en.txt 4.10KB
02_string-operations.mp4 21.28MB
02_the-case-for-securing-networks.en.srt 2.20KB
02_the-case-for-securing-networks.en.txt 1.41KB
02_the-case-for-securing-networks.mp4 5.52MB
02_the-command-line-in-use_instructions.html 197.12KB
02_the-criminal-art-of-persuasion.en.srt 7.36KB
02_the-criminal-art-of-persuasion.en.txt 3.98KB
02_the-criminal-art-of-persuasion.mp4 21.70MB
02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt 3.07KB
02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt 2.01KB
02_the-detection-and-analysis-phase-of-the-lifecycle.mp4 8.54MB
02_the-emergence-of-cloud-security_instructions.html 141.30KB
02_the-importance-of-escalation.en.srt 6.63KB
02_the-importance-of-escalation.en.txt 3.55KB
02_the-importance-of-escalation.mp4 18.97MB
02_the-importance-of-logs.en.srt 5.97KB
02_the-importance-of-logs.en.txt 3.75KB
02_the-importance-of-logs.mp4 12.76MB
02_the-interview-process_instructions.html 5.26KB
02_the-linux-community.en.srt 2.51KB
02_the-linux-community.en.txt 1.35KB
02_the-linux-community.mp4 5.99MB
02_the-nist-cybersecurity-framework.en.srt 5.77KB
02_the-nist-cybersecurity-framework.en.txt 3.63KB
02_the-nist-cybersecurity-framework.mp4 20.35MB
02_the-rise-of-sso-and-mfa_instructions.html 369.55KB
02_the-tcp-ip-model.en.srt 4.42KB
02_the-tcp-ip-model.en.txt 2.37KB
02_the-tcp-ip-model.mp4 8.96MB
02_the-value-of-documentation.en.srt 4.61KB
02_the-value-of-documentation.en.txt 2.96KB
02_the-value-of-documentation.mp4 11.00MB
02_the-what-why-and-how-of-asset-security.en.srt 6.91KB
02_the-what-why-and-how-of-asset-security.en.txt 4.26KB
02_the-what-why-and-how-of-asset-security.mp4 20.75MB
02_toni-my-path-to-cybersecurity.en.srt 5.53KB
02_toni-my-path-to-cybersecurity.en.txt 2.92KB
02_toni-my-path-to-cybersecurity.mp4 20.00MB
02_types-of-joins.en.srt 5.05KB
02_types-of-joins.en.txt 2.70KB
02_types-of-joins.mp4 7.97MB
02_use-the-cia-triad-to-protect-organizations_instructions.html 4.29KB
02_use-tools-to-protect-business-operations_instructions.html 6.58KB
02_veronica-my-path-to-working-in-cybersecurity.en.srt 3.08KB
02_veronica-my-path-to-working-in-cybersecurity.en.txt 1.59KB
02_veronica-my-path-to-working-in-cybersecurity.mp4 11.01MB
02_virtual-private-networks-vpns.en.srt 4.30KB
02_virtual-private-networks-vpns.en.txt 2.28KB
02_virtual-private-networks-vpns.mp4 8.06MB
02_vulnerability-management.en.srt 5.96KB
02_vulnerability-management.en.txt 3.81KB
02_vulnerability-management.mp4 21.96MB
02_when-and-how-to-escalate-a-security-incident.en.srt 3.41KB
02_when-and-how-to-escalate-a-security-incident.en.txt 2.12KB
02_when-and-how-to-escalate-a-security-incident.mp4 12.83MB
02_write-a-simple-algorithm.en.srt 8.38KB
02_write-a-simple-algorithm.en.txt 4.35KB
02_write-a-simple-algorithm.mp4 17.58MB
03_activity-analysis-of-network-hardening_quiz.html 1.23KB
03_activity-analyze-network-layer-communication_quiz.html 1.26KB
03_activity-apply-os-hardening-techniques_quiz.html 1.26KB
03_angel-my-personal-career-journey.en.srt 4.84KB
03_angel-my-personal-career-journey.en.txt 2.62KB
03_angel-my-personal-career-journey.mp4 16.51MB
03_attacks-in-the-digital-age.en.srt 6.52KB
03_attacks-in-the-digital-age.en.txt 4.17KB
03_attacks-in-the-digital-age.mp4 25.52MB
03_best-practices-for-effective-documentation_instructions.html 5.85KB
03_best-practices-for-log-collection-and-management_instructions.html 8.33KB
03_common-network-protocols_instructions.html 8.69KB
03_communicate-effectively-with-stakeholders_instructions.html 5.04KB
03_compare-types-of-joins_instructions.html 1.51MB
03_components-of-a-detection-signature.en.srt 6.65KB
03_components-of-a-detection-signature.en.txt 3.50KB
03_components-of-a-detection-signature.mp4 12.80MB
03_controls.en.srt 5.39KB
03_controls.en.txt 2.88KB
03_controls.mp4 14.11MB
03_core-commands-for-navigation-and-reading-files.en.srt 7.62KB
03_core-commands-for-navigation-and-reading-files.en.txt 4.04KB
03_core-commands-for-navigation-and-reading-files.mp4 11.26MB
03_course-1-overview_instructions.html 1.27MB
03_course-wrap-up.en.srt 1.75KB
03_course-wrap-up.en.txt 1.13KB
03_course-wrap-up.mp4 2.75MB
03_create-a-basic-function.en.srt 3.67KB
03_create-a-basic-function.en.txt 1.88KB
03_create-a-basic-function.mp4 7.14MB
03_create-a-cybersecurity-portfolio_instructions.html 8.73KB
03_create-and-modify-directories-and-files.en.srt 11.12KB
03_create-and-modify-directories-and-files.en.txt 5.82KB
03_create-and-modify-directories-and-files.mp4 17.80MB
03_create-a-resume.en.srt 6.19KB
03_create-a-resume.en.txt 3.94KB
03_create-a-resume.mp4 11.92MB
03_cybersecurity-incident-detection-methods_instructions.html 7.73KB
03_data-and-asset-classification_instructions.html 5.74KB
03_defense-in-depth-strategy.en.srt 6.22KB
03_defense-in-depth-strategy.en.txt 3.34KB
03_defense-in-depth-strategy.mp4 19.92MB
03_determine-the-type-of-attack_instructions.html 225.01KB
03_dion-my-personal-career-journey.en.srt 3.70KB
03_dion-my-personal-career-journey.en.txt 2.29KB
03_dion-my-personal-career-journey.mp4 16.87MB
03_ellen-my-path-into-cybersecurity.en.srt 3.76KB
03_ellen-my-path-into-cybersecurity.en.txt 2.41KB
03_ellen-my-path-into-cybersecurity.mp4 12.42MB
03_ensure-proper-syntax-and-readability-in-python_instructions.html 9.57KB
03_escalate-with-a-purpose_instructions.html 4.83KB
03_escalation-timing_instructions.html 5.54KB
03_essential-python-components-for-automation_instructions.html 8.20KB
03_explore-debugging-techniques_instructions.html 13.02KB
03_explore-the-cissp-security-domains-part-2.en.srt 6.73KB
03_explore-the-cissp-security-domains-part-2.en.txt 4.38KB
03_explore-the-cissp-security-domains-part-2.mp4 18.20MB
03_filters-with-and-or-and-not.en.srt 8.17KB
03_filters-with-and-or-and-not.en.txt 4.38KB
03_filters-with-and-or-and-not.mp4 16.09MB
03_for-loops.en.srt 7.58KB
03_for-loops.en.txt 4.03KB
03_for-loops.mp4 12.20MB
03_functions-and-variables_instructions.html 10.79KB
03_garvey-technical-interview-tips.en.srt 4.65KB
03_garvey-technical-interview-tips.en.txt 2.93KB
03_garvey-technical-interview-tips.mp4 11.21MB
03_get-started-on-the-next-course_instructions.html 794.71KB
03_get-started-on-the-next-course_instructions.html 806.10KB
03_get-started-on-the-next-course_instructions.html 789.45KB
03_get-started-on-the-next-course_instructions.html 796.16KB
03_get-started-on-the-next-course_instructions.html 784.18KB
03_get-started-on-the-next-course_instructions.html 793.15KB
03_get-started-on-the-next-course_instructions.html 786.47KB
03_get-to-know-python_instructions.html 4.28KB
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
03_helpful-resources-and-tips_instructions.html 11.26KB
03_helpful-resources-and-tips_instructions.html 11.26KB
03_helpful-resources-and-tips_instructions.html 11.17KB
03_helpful-resources-and-tips_instructions.html 11.26KB
03_helpful-resources-and-tips_instructions.html 11.21KB
03_herbert-manage-threats-risks-and-vulnerabilities.en.srt 3.05KB
03_herbert-manage-threats-risks-and-vulnerabilities.en.txt 1.93KB
03_herbert-manage-threats-risks-and-vulnerabilities.mp4 9.61MB
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt 4.10KB
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt 2.25KB
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 14.62MB
03_how-intrusions-compromise-your-system_instructions.html 6.62KB
03_how-to-create-a-visual-dashboard.en.srt 5.24KB
03_how-to-create-a-visual-dashboard.en.txt 3.13KB
03_how-to-create-a-visual-dashboard.mp4 18.13MB
03_interpret-network-communications-with-packets.en.srt 2.71KB
03_interpret-network-communications-with-packets.en.txt 1.69KB
03_interpret-network-communications-with-packets.mp4 7.65MB
03_introduction-to-operating-systems.en.srt 4.34KB
03_introduction-to-operating-systems.en.txt 2.79KB
03_introduction-to-operating-systems.mp4 11.51MB
03_intrusion-detection-systems.en.srt 3.15KB
03_intrusion-detection-systems.en.txt 1.70KB
03_intrusion-detection-systems.mp4 5.36MB
03_julianas-story-asset-protection_instructions.html 5.03KB
03_lists-and-the-security-analyst_instructions.html 13.07KB
03_man-pages-within-the-shell.en.srt 3.99KB
03_man-pages-within-the-shell.en.txt 2.10KB
03_man-pages-within-the-shell.mp4 6.58MB
03_more-about-playbooks_guidelines.html 17.43KB
03_more-about-playbooks_instructions.html 200.44KB
03_more-linux-distributions_instructions.html 4.39KB
03_overview-of-interception-tactics_instructions.html 7.19KB
03_parse-a-text-file-in-python.en.srt 3.53KB
03_parse-a-text-file-in-python.en.txt 1.88KB
03_parse-a-text-file-in-python.mp4 10.01MB
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt 6.09KB
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt 3.81KB
03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 17.80MB
03_permission-commands_instructions.html 15.50KB
03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt 4.08KB
03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt 2.20KB
03_phil-learn-and-grow-in-the-cybersecurity-field.mp4 12.59MB
03_playbooks-siem-tools-and-soar-tools_instructions.html 3.10KB
03_prepare-for-interviews_instructions.html 5.48KB
03_prepare-for-interviews_vol01iss13.cfm 45.52KB
03_principle-of-least-privilege_instructions.html 7.70KB
03_query-databases-with-sql.en.srt 3.88KB
03_query-databases-with-sql.en.txt 2.46KB
03_query-databases-with-sql.mp4 8.50MB
03_query-for-events-with-chronicle.en.srt 6.65KB
03_query-for-events-with-chronicle.en.txt 3.54KB
03_query-for-events-with-chronicle.mp4 8.22MB
03_resource-allocation-via-the-os.en.srt 3.91KB
03_resource-allocation-via-the-os.en.txt 2.09KB
03_resource-allocation-via-the-os.mp4 9.46MB
03_resources-for-completing-sql-labs_instructions.html 108.50KB
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt 4.53KB
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt 2.45KB
03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 14.50MB
03_roles-in-response_instructions.html 84.34KB
03_sarah-network-in-the-cybersecurity-community.en.srt 3.52KB
03_sarah-network-in-the-cybersecurity-community.en.txt 2.24KB
03_sarah-network-in-the-cybersecurity-community.mp4 10.28MB
03_secure-design.en.srt 6.79KB
03_secure-design.en.txt 3.61KB
03_secure-design.mp4 19.14MB
03_secure-the-cloud_instructions.html 8.98KB
03 security-guidelines-in-action Commercial Facilities Sector Cybersecurity Framework Implementation Guidance FINAL 508 pdf 1.53MB
03_security-guidelines-in-action_instructions.html 472.50KB
03_security-zones.en.srt 6.05KB
03_security-zones.en.txt 3.20KB
03_security-zones.mp4 12.00MB
03_showcase-your-work_instructions.html 899.17KB
03_showcase-your-work_overview.html 636.47KB
03_siem-dashboards.en.srt 4.42KB
03_siem-dashboards.en.txt 2.34KB
03_siem-dashboards.mp4 10.76MB
03_social-engineering-tactics_instructions.html 175.25KB
03 strategies-for-engaging-with-the-cybersecurity-community instructions html 5.48KB
03_string-indices-and-slices.en.srt 8.50KB
03_string-indices-and-slices.en.txt 4.54KB
03_string-indices-and-slices.mp4 20.29MB
03_symmetric-and-asymmetric-encryption_instructions.html 9.23KB
03_talya-myths-about-the-cybersecurity-field.en.srt 3.08KB
03_talya-myths-about-the-cybersecurity-field.en.txt 1.59KB
03_talya-myths-about-the-cybersecurity-field.mp4 9.58MB
03_test-your-knowledge-local-and-wide-network-communication_quiz.html 3.67KB
03_the-four-layers-of-the-tcp-ip-model.en.srt 3.41KB
03_the-four-layers-of-the-tcp-ip-model.en.txt 1.83KB
03_the-four-layers-of-the-tcp-ip-model.mp4 6.47MB
03_the-importance-of-network-traffic-flows.en.srt 4.53KB
03_the-importance-of-network-traffic-flows.en.txt 2.88KB
03_the-importance-of-network-traffic-flows.mp4 12.76MB
03_the-importance-of-updates_instructions.html 7.16KB
03_the-mechanisms-of-authorization.en.srt 8.11KB
03_the-mechanisms-of-authorization.en.txt 4.32KB
03_the-mechanisms-of-authorization.mp4 25.17MB
03_the-purpose-and-impact-of-stakeholders_instructions.html 5.65KB
03_the-rise-of-cryptojacking.en.srt 6.65KB
03_the-rise-of-cryptojacking.en.txt 3.57KB
03_the-rise-of-cryptojacking.mp4 23.67MB
03_the-triage-process_instructions.html 8.28KB
03_tips-for-interviewing-remotely_instructions.html 5.57KB
03 tools-for-protecting-business-operations gcat threathorizons full sept2022 pdf 2.97MB
03_tools-for-protecting-business-operations_instructions.html 651.52KB
03_transferable-and-technical-cybersecurity-skills_instructions.html 7.33KB
03_types-of-threat-actors_instructions.html 493.37KB
03_understand-risks-threats-and-vulnerabilities_instructions.html 6.41KB
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt 3.05KB
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt 1.90KB
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 9.96MB
03_weekly-challenge-1_exam.html 8.39KB
03_weekly-challenge-2_exam.html 8.45KB
03_weekly-challenge-3_exam.html 9.31KB
03_weekly-challenge-4_exam.html 9.52KB
03_what-are-networks.en.srt 2.66KB
03_what-are-networks.en.txt 1.64KB
03_what-are-networks.mp4 6.22MB
03_work-with-variables-in-python.en.srt 9.99KB
03_work-with-variables-in-python.en.txt 5.24KB
03_work-with-variables-in-python.mp4 21.69MB
04_activity-analyze-network-attacks_quiz.html 1.25KB
04_add-and-delete-users.en.srt 8.85KB
04_add-and-delete-users.en.txt 4.72KB
04_add-and-delete-users.mp4 14.68MB
04_additional-network-protocols_instructions.html 11.08KB
04_ask-the-interviewer-questions.en.srt 2.47KB
04_ask-the-interviewer-questions.en.txt 1.62KB
04_ask-the-interviewer-questions.mp4 7.91MB
04_assign-and-reassign-variables-in-python_instructions.html 8.17KB
04_basic-filters-on-sql-queries.en.srt 6.43KB
04_basic-filters-on-sql-queries.en.txt 4.05KB
04_basic-filters-on-sql-queries.mp4 14.77MB
04_claim-your-google-cybersecurity-certificate-badge_instructions.html 4.48KB
04_clancy-continual-learning-and-python.en.srt 3.58KB
04_clancy-continual-learning-and-python.en.txt 1.89KB
04_clancy-continual-learning-and-python.mp4 11.33MB
04_common-attacks-and-their-effectiveness_instructions.html 8.41KB
04_common-vulnerabilities-and-exposures.en.srt 8.07KB
04_common-vulnerabilities-and-exposures.en.txt 4.31KB
04_common-vulnerabilities-and-exposures.mp4 27.86MB
04_compare-operating-systems_instructions.html 6.27KB
04_continuous-learning-in-sql_instructions.html 5.33KB
04_controls-frameworks-and-compliance_instructions.html 151.83KB
04_course-8-glossary_Course_8_glossary.docx 1.11MB
04_course-8-glossary_instructions.html 6.43KB
04_create-a-basic-python-script.en.srt 3.68KB
04_create-a-basic-python-script.en.txt 1.96KB
04_create-a-basic-python-script.mp4 8.44MB
04_da-queshia-my-path-to-cybersecurity.en.srt 4.43KB
04_da-queshia-my-path-to-cybersecurity.en.txt 2.28KB
04_da-queshia-my-path-to-cybersecurity.mp4 13.90MB
04_dave-grow-your-cybersecurity-career-with-mentors.en.srt 4.34KB
04_dave-grow-your-cybersecurity-career-with-mentors.en.txt 2.33KB
04_dave-grow-your-cybersecurity-career-with-mentors.mp4 13.90MB
04_develop-a-parsing-algorithm-in-python.en.srt 6.88KB
04_develop-a-parsing-algorithm-in-python.en.txt 4.33KB
04_develop-a-parsing-algorithm-in-python.mp4 15.23MB
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt 4.28KB
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt 2.26KB
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 11.39MB
04_emily-overcome-imposter-syndrome.en.srt 4.71KB
04_emily-overcome-imposter-syndrome.en.txt 2.56KB
04_emily-overcome-imposter-syndrome.mp4 13.95MB
04_examine-signatures-with-suricata.en.srt 5.95KB
04_examine-signatures-with-suricata.en.txt 3.76KB
04_examine-signatures-with-suricata.mp4 8.40MB
04_explore-built-in-functions.en.srt 8.50KB
04_explore-built-in-functions.en.txt 4.51KB
04_explore-built-in-functions.mp4 21.00MB
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
04_helpful-resources-and-tips_instructions.html 11.26KB
04_helpful-resources-and-tips_instructions.html 11.22KB
04_incident-response-plans.en.srt 3.59KB
04_incident-response-plans.en.txt 2.28KB
04_incident-response-plans.mp4 9.30MB
04_information-privacy-regulations-and-compliance_instructions.html 129.20KB
04_julianas-story-attention-to-detail_instructions.html 4.83KB
04_julianas-story-effective-communication_instructions.html 4.46KB
04_learn-more-about-the-tcp-ip-model_instructions.html 1.53MB
04_linux-architecture.en.srt 5.77KB
04_linux-architecture.en.txt 3.02KB
04_linux-architecture.mp4 11.81MB
04_linux-resources_instructions.html 5.10KB
04_maintain-awareness-with-network-monitoring_instructions.html 293.74KB
04_manage-directories-and-files_instructions.html 9.62KB
04_mk-changes-in-the-cybersecurity-industry.en.srt 4.33KB
04_mk-changes-in-the-cybersecurity-industry.en.txt 2.77KB
04_mk-changes-in-the-cybersecurity-industry.mp4 13.39MB
04_more-on-filters-with-and-or-and-not_instructions.html 6.39KB
04_navigate-linux-and-read-file-content_instructions.html 104.91KB
04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt 3.77KB
04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt 2.45KB
04_nikki-a-day-in-the-life-of-a-security-engineer.mp4 16.05MB
04_niru-adopt-an-attacker-mindset.en.srt 4.63KB
04_niru-adopt-an-attacker-mindset.en.txt 2.94KB
04_niru-adopt-an-attacker-mindset.mp4 18.08MB
04_nist-s-risk-management-framework.en.srt 6.41KB
04_nist-s-risk-management-framework.en.txt 3.43KB
04_nist-s-risk-management-framework.mp4 16.35MB
04_omad-my-learning-journey-into-cybersecurity.en.srt 4.44KB
04_omad-my-learning-journey-into-cybersecurity.en.txt 2.75KB
04_omad-my-learning-journey-into-cybersecurity.mp4 9.89MB
04_overview-of-detection-tools_instructions.html 9.42KB
04_phishing-for-information.en.srt 6.80KB
04_phishing-for-information.en.txt 4.32KB
04_phishing-for-information.mp4 24.02MB
04_plan-a-security-audit.en.srt 6.92KB
04_plan-a-security-audit.en.txt 3.60KB
04_plan-a-security-audit.mp4 16.69MB
04 portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security exam html 3.46KB
04_prepare-for-technical-interviews_instructions.html 5.62KB
04_python-functions-in-cybersecurity_instructions.html 6.84KB
04_real-life-ddos-attack_instructions.html 5.12KB
04_rebecca-learn-new-tools-and-technologies.en.srt 2.98KB
04_rebecca-learn-new-tools-and-technologies.en.txt 1.83KB
04_rebecca-learn-new-tools-and-technologies.mp4 9.32MB
04_reexamine-the-fields-of-a-packet-header.en.srt 7.77KB
04_reexamine-the-fields-of-a-packet-header.en.txt 4.15KB
04_reexamine-the-fields-of-a-packet-header.mp4 13.61MB
04_resources-for-completing-labs_instructions.html 108.52KB
04_resources-for-completing-linux-labs_instructions.html 108.51KB
04_search-methods-with-siem-tools_instructions.html 415.57KB
04_security-domains-cybersecurity-analysts-need-to-know_instructions.html 195.32KB
04_sql-filtering-versus-linux-filtering_instructions.html 4.19KB
04_strings-and-the-security-analyst_instructions.html 13.46KB
04_subnetting-and-cidr_instructions.html 133.92KB
04_test-your-knowledge-cloud-hardening_quiz.html 3.62KB
04_test-your-knowledge-network-hardening_quiz.html 3.78KB
04_test-your-knowledge-os-hardening_quiz.html 3.69KB
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt 4.39KB
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt 2.40KB
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 9.87MB
04_the-future-of-siem-tools_instructions.html 5.06KB
04_the-importance-of-cybersecurity.en.srt 4.05KB
04_the-importance-of-cybersecurity.en.txt 2.57KB
04_the-importance-of-cybersecurity.mp4 17.84MB
04_the-relationship-between-frameworks-and-controls_instructions.html 6.56KB
04 the-relationship-between-frameworks-and-controls physical-access-control pdf 6.95MB
04_the-value-of-cybersecurity-playbooks.en.srt 6.08KB
04_the-value-of-cybersecurity-playbooks.en.txt 3.20KB
04_the-value-of-cybersecurity-playbooks.mp4 13.00MB
04_tina-working-in-network-security.en.srt 3.06KB
04_tina-working-in-network-security.en.txt 1.64KB
04_tina-working-in-network-security.mp4 11.31MB
04_tips-for-finding-and-applying-for-a-job_instructions.html 4.24KB
04_traits-of-an-effective-threat-model_instructions.html 120.94KB
04_tri-life-in-asset-security.en.srt 3.80KB
04_tri-life-in-asset-security.en.txt 2.32KB
04_tri-life-in-asset-security.mp4 16.96MB
04_understand-attackers_instructions.html 313.26KB
04_use-siem-tools-to-protect-organizations_instructions.html 8.57KB
04_victoria-continue-your-learning-journey.en.srt 3.93KB
04_victoria-continue-your-learning-journey.en.txt 2.48KB
04_victoria-continue-your-learning-journey.mp4 15.43MB
04_welcome-to-week-1.en.srt 1.95KB
04_welcome-to-week-1.en.txt 1.03KB
04_welcome-to-week-1.mp4 4.67MB
04_while-loops.en.srt 8.08KB
04_while-loops.en.txt 4.25KB
04_while-loops.mp4 10.19MB
04_why-we-audit-user-activity.en.srt 5.47KB
04_why-we-audit-user-activity.en.txt 2.92KB
04_why-we-audit-user-activity.mp4 16.24MB
05_adedayo-sql-in-cybersecurity.en.srt 3.81KB
05_adedayo-sql-in-cybersecurity.en.txt 2.06KB
05_adedayo-sql-in-cybersecurity.mp4 13.70MB
05_alert-and-event-management-with-siem-and-soar-tools.en.srt 5.97KB
05_alert-and-event-management-with-siem-and-soar-tools.en.txt 3.72KB
05_alert-and-event-management-with-siem-and-soar-tools.mp4 14.47MB
05_ashley-my-path-to-cybersecurity.en.srt 5.72KB
05_ashley-my-path-to-cybersecurity.en.txt 3.04KB
05_ashley-my-path-to-cybersecurity.mp4 19.83MB
05_business-continuity-considerations_instructions.html 6.20KB
05_common-cybersecurity-terminology_instructions.html 5.55KB
05_complete-a-security-audit.en.srt 5.29KB
05_complete-a-security-audit.en.txt 3.41KB
05_complete-a-security-audit.mp4 16.98MB
05_conduct-pre-interview-research.en.srt 5.04KB
05_conduct-pre-interview-research.en.txt 2.73KB
05_conduct-pre-interview-research.mp4 12.58MB
05_data-exfiltration-attacks.en.srt 7.21KB
05_data-exfiltration-attacks.en.txt 3.90KB
05_data-exfiltration-attacks.mp4 15.53MB
05_emmanuel-useful-skills-for-network-security.en.srt 4.86KB
05_emmanuel-useful-skills-for-network-security.en.txt 2.51KB
05_emmanuel-useful-skills-for-network-security.mp4 13.44MB
05_examine-suricata-logs.en.srt 3.26KB
05_examine-suricata-logs.en.txt 2.04KB
05_examine-suricata-logs.mp4 7.37MB
05_garvey-cover-letter-tips.en.srt 5.02KB
05_garvey-cover-letter-tips.en.txt 3.01KB
05_garvey-cover-letter-tips.mp4 11.61MB
05 google-cybersecurity-certificate-glossary Google Cybersecurity Certificate glossary docx 879.26KB
05_google-cybersecurity-certificate-glossary_instructions.html 6.55KB
05_heather-protect-sensitive-data-and-information.en.srt 3.12KB
05_heather-protect-sensitive-data-and-information.en.txt 1.97KB
05_heather-protect-sensitive-data-and-information.mp4 16.82MB
05_heather-the-importance-of-protecting-pii.en.srt 3.28KB
05_heather-the-importance-of-protecting-pii.en.txt 1.76KB
05_heather-the-importance-of-protecting-pii.mp4 14.55MB
05 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26KB
05_helpful-resources-and-tips_instructions.html 11.20KB
05_indicators-of-compromise_instructions.html 127.71KB
05_indicators-of-compromise_the-pyramid-of-pain.html 67.09KB
05_investigate-packet-details_instructions.html 3.64MB
05_karan-interview-tips-from-a-hiring-manager.en.srt 4.92KB
05_karan-interview-tips-from-a-hiring-manager.en.txt 2.64KB
05_karan-interview-tips-from-a-hiring-manager.mp4 18.50MB
05_linux-architecture-explained_instructions.html 6.51KB
05_manage-common-threats-risks-and-vulnerabilities_instructions.html 779.07KB
05_more-on-loops-in-python_instructions.html 15.64KB
05_non-repudiation-and-hashing.en.srt 4.96KB
05_non-repudiation-and-hashing.en.txt 3.08KB
05_non-repudiation-and-hashing.mp4 13.51MB
05_parisa-the-parallels-of-accessibility-and-security.en.srt 3.80KB
05_parisa-the-parallels-of-accessibility-and-security.en.txt 2.45KB
05_parisa-the-parallels-of-accessibility-and-security.mp4 16.41MB
05_pathways-through-defenses.en.srt 7.40KB
05_pathways-through-defenses.en.txt 3.95KB
05_pathways-through-defenses.mp4 22.40MB
05_proxy-servers.en.srt 4.94KB
05_proxy-servers.en.txt 3.12KB
05_proxy-servers.mp4 11.21MB
05_python-environments_instructions.html 4.16KB
05_responsible-use-of-sudo_instructions.html 11.15KB
05_sean-keep-your-cool-during-a-data-breach.en.srt 2.85KB
05_sean-keep-your-cool-during-a-data-breach.en.txt 1.47KB
05_sean-keep-your-cool-during-a-data-breach.mp4 13.88MB
05_security-starts-with-asset-classification.en.srt 6.62KB
05_security-starts-with-asset-classification.en.txt 3.57KB
05_security-starts-with-asset-classification.mp4 16.89MB
05_test-your-knowledge-network-interception-attack-tactics_quiz.html 4.01KB
05_test-your-knowledge-recognize-different-network-protocols_quiz.html 3.44KB
05 test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks quiz html 3.84KB
05_the-osi-model_instructions.html 302.88KB
05_the-owasp-top-10_instructions.html 141.88KB
05_the-where-clause-and-basic-operators_instructions.html 8.07KB
05_tim-finding-purpose-in-protecting-assets.en.srt 2.02KB
05_tim-finding-purpose-in-protecting-assets.en.txt 1.23KB
05_tim-finding-purpose-in-protecting-assets.mp4 6.95MB
05_types-of-phishing_instructions.html 339.37KB
05_variations-of-logs.en.srt 6.77KB
05_variations-of-logs.en.txt 3.59KB
05_variations-of-logs.mp4 11.91MB
05_work-with-built-in-functions_functions.html 269.11KB
05_work-with-built-in-functions_instructions.html 7.43KB
06_akash-python-and-the-cybersecurity-professional.en.srt 2.00KB
06_akash-python-and-the-cybersecurity-professional.en.txt 1.28KB
06_akash-python-and-the-cybersecurity-professional.mp4 5.72MB
06 analyze-indicators-of-compromise-with-investigative-tools instructions html 1.46MB
06_build-rapport-with-interviewers.en.srt 5.95KB
06_build-rapport-with-interviewers.en.txt 3.17KB
06_build-rapport-with-interviewers.mp4 13.60MB
06_common-classification-requirements_instructions.html 106.29KB
06_fortify-against-brute-force-cyber-attacks_instructions.html 153.11KB
06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf 1.21MB
06_identity-and-access-management_instructions.html 302.88KB
06 more-about-security-audits Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf 1.22MB
06_more-about-security-audits_Control_categories.docx 837.97KB
06_more-about-security-audits_instructions.html 8.82KB
06_network-tools.en.srt 4.48KB
06_network-tools.en.txt 2.44KB
06_network-tools.mp4 7.03MB
06_overview-of-log-file-formats_instructions.html 16.37KB
06_overview-of-suricata_eve-json-examplesjq.html 22.98KB
06_overview-of-suricata_index.html 32.52KB
06_overview-of-suricata_instructions.html 124.41KB
06_overview-of-suricata_suricata-update.html 23.48KB
06_overview-of-suricata_suricata-yaml.html 236.66KB
06_participate-in-program-surveys_instructions.html 3.71KB
06_prepare-for-interviews-with-interview-warmup_instructions.html 183.12KB
06_resources-for-completing-labs_instructions.html 108.52KB
06_test-your-knowledge-network-communication_quiz.html 4.89KB
06_the-evolution-of-hash-functions_instructions.html 585.39KB
06_virtual-networks-and-privacy_instructions.html 8.43KB
06_wireless-protocols.en.srt 2.12KB
06_wireless-protocols.en.txt 1.10KB
06_wireless-protocols.mp4 5.11MB
07_network-components-devices-and-diagrams_instructions.html 1.68MB
07_test-your-knowledge-system-identification_quiz.html 4.29KB
07_the-evolution-of-wireless-security-protocols_instructions.html 159.17KB
08_cloud-networks.en.srt 3.58KB
08_cloud-networks.en.txt 2.33KB
08_cloud-networks.mp4 8.77MB
09_cloud-computing-and-software-defined-networks_instructions.html 694.11KB
10_test-your-knowledge-introduction-to-networks_quiz.html 3.51KB
Readme.txt 51B
Readme.txt 51B
Distribution statistics by country
India (IN) 4
Morocco (MA) 3
Greece (GR) 3
Australia (AU) 2
Republic of Korea (KR) 1
Bulgaria (BG) 1
United States (US) 1
Ukraine (UA) 1
Senegal (SN) 1
Mozambique (MZ) 1
Canada (CA) 1
Total 19
IP List List of IP addresses which were distributed this torrent