Torrent Info
Title Cyber Security - SOC Analyst Interview Question and Answers
Category XXX
Size 6.92GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 218B
001 Collection of Networking Interview Questions_en.vtt 57.70KB
001 Collection of Networking Interview Questions.mp4 463.43MB
001 How do you analyze if receive a Brute Force Attack Alert_en.vtt 22.89KB
001 How do you analyze if receive a Brute Force Attack Alert.mp4 194.83MB
001 Introduction_en.vtt 6.81KB
001 Introduction.mp4 19.97MB
001 SIEM related interview topics_en.vtt 77.78KB
001 SIEM related interview topics.mp4 499.07MB
001 what are networking devices_en.vtt 17.92KB
001 what are networking devices.mp4 83.57MB
001 What is Security Operation Center_en.vtt 11.19KB
001 What is Security Operation Center.mp4 45.23MB
002 Security Interview Questions - Part 1_en.vtt 72.18KB
002 Security Interview Questions - Part 1.mp4 484.71MB
002 SIEM Dashboard and Use cases_en.vtt 97.20KB
002 SIEM Dashboard and Use cases.mp4 717.87MB
002 What are various Security Devices used in your orrganization_en.vtt 42.65KB
002 What are various Security Devices used in your orrganization.mp4 185.64MB
002 what is P address and IP address classification_en.vtt 20.41KB
002 what is P address and IP address classification.mp4 123.66MB
002 what will you do if receive a Malware Attack Alert_en.vtt 35.26KB
002 what will you do if receive a Malware Attack Alert.mp4 296.01MB
003 How does a SOC Team manage or work in an Organization_en.vtt 30.73KB
003 How does a SOC Team manage or work in an Organization.mp4 103.40MB
003 How do you analyze Phishing email attack_en.vtt 43.88KB
003 How do you analyze Phishing email attack.mp4 357.37MB
003 Security Interview Questions - Part 2_en.vtt 25.88KB
003 Security Interview Questions - Part 2.mp4 136.94MB
003 What are different event logs you analyze_en.vtt 19.52KB
003 What are different event logs you analyze.mp4 163.71MB
003 What is NAT and PAT_en.vtt 13.93KB
003 What is NAT and PAT.mp4 62.93MB
004 How do you Analyze SQL Injection attack_en.vtt 21.92KB
004 How do you Analyze SQL Injection attack.mp4 208.80MB
004 Security Interview Questions - Part 3_en.vtt 64.01KB
004 Security Interview Questions - Part 3.mp4 437.97MB
004 Tell me few port numbers which you know_en.vtt 21.89KB
004 Tell me few port numbers which you know.mp4 93.10MB
004 What are the Roles and Responsibilities of SOC Engineer_en.vtt 34.48KB
004 What are the Roles and Responsibilities of SOC Engineer.mp4 150.63MB
005 How a Firewall Works_en.vtt 3.04KB
005 How a Firewall Works.mp4 10.65MB
005 How do you analyze DDOS Attack_en.vtt 18.62KB
005 How do you analyze DDOS Attack.mp4 169.05MB
005 Security Interview Questions - Part 4_en.vtt 60.96KB
005 Security Interview Questions - Part 4.mp4 409.45MB
005 what is your SOC Team Model_en.vtt 19.49KB
005 what is your SOC Team Model.mp4 98.67MB
006 How do you analyze if a suspicious IP detected in outbound traffic_en.vtt 4.86KB
006 How do you analyze if a suspicious IP detected in outbound traffic.mp4 50.16MB
006 How VPN works_en.vtt 5.67KB
006 How VPN works.mp4 18.47MB
006 What are the fields in Sample Incident Ticket - ServiceNow_en.vtt 26.59KB
006 What are the fields in Sample Incident Ticket - ServiceNow.mp4 162.21MB
007 what are Service level Agreements for the SOC Incidents_en.vtt 10.90KB
007 what are Service level Agreements for the SOC Incidents.mp4 29.29MB
007 What is Symmetric and Asymmetric Encryption_en.vtt 20.73KB
007 What is Symmetric and Asymmetric Encryption.mp4 172.94MB
008 Explain CIA triad_en.vtt 12.79KB
008 Explain CIA triad.mp4 67.26MB
008 What is False Positive Analysis or what are various outcomes of Analysis_en.vtt 17.41KB
008 What is False Positive Analysis or what are various outcomes of Analysis.mp4 81.49MB
009 How many Logs sources are there in your organization_en.vtt 8.42KB
009 How many Logs sources are there in your organization.mp4 36.31MB
009 What is the difference in between SSL and HTTPS_en.vtt 2.30KB
009 What is the difference in between SSL and HTTPS.mp4 15.43MB
010 How do you stay up to date on Cyber Security news and latest attacks_en.vtt 12.76KB
010 How do you stay up to date on Cyber Security news and latest attacks.mp4 111.82MB
010 What are the steps in Incident Response Life Cycle_en.vtt 26.87KB
010 What are the steps in Incident Response Life Cycle.mp4 196.85MB
011 Can you please explain what you will do after getting an alert (Alert IR FLow)_en.vtt 12.20KB
011 Can you please explain what you will do after getting an alert (Alert IR FLow).mp4 50.24MB
011 What is the difference between Virus and Warm_en.vtt 3.33KB
011 What is the difference between Virus and Warm.mp4 22.23MB
012 Explain SQL Injection Attack_en.vtt 9.59KB
012 Explain SQL Injection Attack.mp4 92.40MB
012 How will you manage work in shifts_en.vtt 12.34KB
012 How will you manage work in shifts.mp4 69.64MB
013 How do you handle P1, P2, P3 and P4 Incidents_en.vtt 16.04KB
013 How do you handle P1, P2, P3 and P4 Incidents.mp4 66.59MB
013 What is botnet_en.vtt 5.12KB
013 What is botnet.mp4 28.14MB
014 What is Brute Force Attack_en.vtt 22.18KB
014 What is Brute Force Attack.mp4 138.19MB
1 315B
10 173.66KB
11 366.72KB
12 62.60KB
13 977.13KB
14 297.03KB
15 809.20KB
16 374.61KB
17 831.82KB
18 640.08KB
19 57.64KB
2 1.13KB
20 353.11KB
21 184.95KB
22 614.40KB
23 338.88KB
24 921.19KB
25 612.88KB
26 444.13KB
27 518.91KB
28 366.96KB
29 753.27KB
3 2.27KB
30 421.69KB
31 68.43KB
32 774.62KB
33 857.00KB
34 788.80KB
35 710.47KB
36 725.18KB
37 877.23KB
38 791.09KB
38672384-2-Org-Architecture.png 79.10KB
38672698-3-SOC-Team-Architecture.png 63.71KB
38672760-4-Roles-and-Responsibilities.png 61.21KB
38673180-5-SOC-Models.png 106.00KB
38673182-6-SOC-Incident-Document.png 176.24KB
38673622-7-SLA-Service-Level-Agreements.png 23.88KB
38673678-8-False-Positive.png 26.12KB
38673766-9-No-of-Logs-Received.png 23.89KB
38674192-10-Incident-Life-cycle.png 11.81KB
38674208-10-Incident-Life-cycle.png 11.81KB
38674370-12-SOC-Shift-Handover-Document.png 22.26KB
38765424-Brute-Force-2.png 232.56KB
38765426-15-Malware2.png 197.67KB
38783204-GMT20220114-023122-Recording-1920x1080.mp4 137.37MB
38783224-Phishing-Attack-Analysis.png 147.11KB
38783226-sql-injection.png 174.55KB
38802934-Suspecious-IP-outbound.png 109.40KB
38802936-DDOS-Analysis.png 148.18KB
39 29.68KB
4 209B
40 539.77KB
41 585.24KB
5 142B
6 501.28KB
7 1018.27KB
8 205.90KB
9 148.68KB
external-assets-links.txt 69B
TutsNode.com.txt 63B
Distribution statistics by country
United Kingdom (GB) 1
Australia (AU) 1
Total 2
IP List List of IP addresses which were distributed this torrent