Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
218B |
001 Collection of Networking Interview Questions_en.vtt |
57.70KB |
001 Collection of Networking Interview Questions.mp4 |
463.43MB |
001 How do you analyze if receive a Brute Force Attack Alert_en.vtt |
22.89KB |
001 How do you analyze if receive a Brute Force Attack Alert.mp4 |
194.83MB |
001 Introduction_en.vtt |
6.81KB |
001 Introduction.mp4 |
19.97MB |
001 SIEM related interview topics_en.vtt |
77.78KB |
001 SIEM related interview topics.mp4 |
499.07MB |
001 what are networking devices_en.vtt |
17.92KB |
001 what are networking devices.mp4 |
83.57MB |
001 What is Security Operation Center_en.vtt |
11.19KB |
001 What is Security Operation Center.mp4 |
45.23MB |
002 Security Interview Questions - Part 1_en.vtt |
72.18KB |
002 Security Interview Questions - Part 1.mp4 |
484.71MB |
002 SIEM Dashboard and Use cases_en.vtt |
97.20KB |
002 SIEM Dashboard and Use cases.mp4 |
717.87MB |
002 What are various Security Devices used in your orrganization_en.vtt |
42.65KB |
002 What are various Security Devices used in your orrganization.mp4 |
185.64MB |
002 what is P address and IP address classification_en.vtt |
20.41KB |
002 what is P address and IP address classification.mp4 |
123.66MB |
002 what will you do if receive a Malware Attack Alert_en.vtt |
35.26KB |
002 what will you do if receive a Malware Attack Alert.mp4 |
296.01MB |
003 How does a SOC Team manage or work in an Organization_en.vtt |
30.73KB |
003 How does a SOC Team manage or work in an Organization.mp4 |
103.40MB |
003 How do you analyze Phishing email attack_en.vtt |
43.88KB |
003 How do you analyze Phishing email attack.mp4 |
357.37MB |
003 Security Interview Questions - Part 2_en.vtt |
25.88KB |
003 Security Interview Questions - Part 2.mp4 |
136.94MB |
003 What are different event logs you analyze_en.vtt |
19.52KB |
003 What are different event logs you analyze.mp4 |
163.71MB |
003 What is NAT and PAT_en.vtt |
13.93KB |
003 What is NAT and PAT.mp4 |
62.93MB |
004 How do you Analyze SQL Injection attack_en.vtt |
21.92KB |
004 How do you Analyze SQL Injection attack.mp4 |
208.80MB |
004 Security Interview Questions - Part 3_en.vtt |
64.01KB |
004 Security Interview Questions - Part 3.mp4 |
437.97MB |
004 Tell me few port numbers which you know_en.vtt |
21.89KB |
004 Tell me few port numbers which you know.mp4 |
93.10MB |
004 What are the Roles and Responsibilities of SOC Engineer_en.vtt |
34.48KB |
004 What are the Roles and Responsibilities of SOC Engineer.mp4 |
150.63MB |
005 How a Firewall Works_en.vtt |
3.04KB |
005 How a Firewall Works.mp4 |
10.65MB |
005 How do you analyze DDOS Attack_en.vtt |
18.62KB |
005 How do you analyze DDOS Attack.mp4 |
169.05MB |
005 Security Interview Questions - Part 4_en.vtt |
60.96KB |
005 Security Interview Questions - Part 4.mp4 |
409.45MB |
005 what is your SOC Team Model_en.vtt |
19.49KB |
005 what is your SOC Team Model.mp4 |
98.67MB |
006 How do you analyze if a suspicious IP detected in outbound traffic_en.vtt |
4.86KB |
006 How do you analyze if a suspicious IP detected in outbound traffic.mp4 |
50.16MB |
006 How VPN works_en.vtt |
5.67KB |
006 How VPN works.mp4 |
18.47MB |
006 What are the fields in Sample Incident Ticket - ServiceNow_en.vtt |
26.59KB |
006 What are the fields in Sample Incident Ticket - ServiceNow.mp4 |
162.21MB |
007 what are Service level Agreements for the SOC Incidents_en.vtt |
10.90KB |
007 what are Service level Agreements for the SOC Incidents.mp4 |
29.29MB |
007 What is Symmetric and Asymmetric Encryption_en.vtt |
20.73KB |
007 What is Symmetric and Asymmetric Encryption.mp4 |
172.94MB |
008 Explain CIA triad_en.vtt |
12.79KB |
008 Explain CIA triad.mp4 |
67.26MB |
008 What is False Positive Analysis or what are various outcomes of Analysis_en.vtt |
17.41KB |
008 What is False Positive Analysis or what are various outcomes of Analysis.mp4 |
81.49MB |
009 How many Logs sources are there in your organization_en.vtt |
8.42KB |
009 How many Logs sources are there in your organization.mp4 |
36.31MB |
009 What is the difference in between SSL and HTTPS_en.vtt |
2.30KB |
009 What is the difference in between SSL and HTTPS.mp4 |
15.43MB |
010 How do you stay up to date on Cyber Security news and latest attacks_en.vtt |
12.76KB |
010 How do you stay up to date on Cyber Security news and latest attacks.mp4 |
111.82MB |
010 What are the steps in Incident Response Life Cycle_en.vtt |
26.87KB |
010 What are the steps in Incident Response Life Cycle.mp4 |
196.85MB |
011 Can you please explain what you will do after getting an alert (Alert IR FLow)_en.vtt |
12.20KB |
011 Can you please explain what you will do after getting an alert (Alert IR FLow).mp4 |
50.24MB |
011 What is the difference between Virus and Warm_en.vtt |
3.33KB |
011 What is the difference between Virus and Warm.mp4 |
22.23MB |
012 Explain SQL Injection Attack_en.vtt |
9.59KB |
012 Explain SQL Injection Attack.mp4 |
92.40MB |
012 How will you manage work in shifts_en.vtt |
12.34KB |
012 How will you manage work in shifts.mp4 |
69.64MB |
013 How do you handle P1, P2, P3 and P4 Incidents_en.vtt |
16.04KB |
013 How do you handle P1, P2, P3 and P4 Incidents.mp4 |
66.59MB |
013 What is botnet_en.vtt |
5.12KB |
013 What is botnet.mp4 |
28.14MB |
014 What is Brute Force Attack_en.vtt |
22.18KB |
014 What is Brute Force Attack.mp4 |
138.19MB |
1 |
315B |
10 |
173.66KB |
11 |
366.72KB |
12 |
62.60KB |
13 |
977.13KB |
14 |
297.03KB |
15 |
809.20KB |
16 |
374.61KB |
17 |
831.82KB |
18 |
640.08KB |
19 |
57.64KB |
2 |
1.13KB |
20 |
353.11KB |
21 |
184.95KB |
22 |
614.40KB |
23 |
338.88KB |
24 |
921.19KB |
25 |
612.88KB |
26 |
444.13KB |
27 |
518.91KB |
28 |
366.96KB |
29 |
753.27KB |
3 |
2.27KB |
30 |
421.69KB |
31 |
68.43KB |
32 |
774.62KB |
33 |
857.00KB |
34 |
788.80KB |
35 |
710.47KB |
36 |
725.18KB |
37 |
877.23KB |
38 |
791.09KB |
38672384-2-Org-Architecture.png |
79.10KB |
38672698-3-SOC-Team-Architecture.png |
63.71KB |
38672760-4-Roles-and-Responsibilities.png |
61.21KB |
38673180-5-SOC-Models.png |
106.00KB |
38673182-6-SOC-Incident-Document.png |
176.24KB |
38673622-7-SLA-Service-Level-Agreements.png |
23.88KB |
38673678-8-False-Positive.png |
26.12KB |
38673766-9-No-of-Logs-Received.png |
23.89KB |
38674192-10-Incident-Life-cycle.png |
11.81KB |
38674208-10-Incident-Life-cycle.png |
11.81KB |
38674370-12-SOC-Shift-Handover-Document.png |
22.26KB |
38765424-Brute-Force-2.png |
232.56KB |
38765426-15-Malware2.png |
197.67KB |
38783204-GMT20220114-023122-Recording-1920x1080.mp4 |
137.37MB |
38783224-Phishing-Attack-Analysis.png |
147.11KB |
38783226-sql-injection.png |
174.55KB |
38802934-Suspecious-IP-outbound.png |
109.40KB |
38802936-DDOS-Analysis.png |
148.18KB |
39 |
29.68KB |
4 |
209B |
40 |
539.77KB |
41 |
585.24KB |
5 |
142B |
6 |
501.28KB |
7 |
1018.27KB |
8 |
205.90KB |
9 |
148.68KB |
external-assets-links.txt |
69B |
TutsNode.com.txt |
63B |