Torrent Info
Title Security Analyst Fundamentals Specialization
Category XXX
Size 1.56GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 2B
01_3rd-party-breach-overview.en.srt 10.13KB
01_3rd-party-breach-overview.en.txt 6.51KB
01_3rd-party-breach-overview.mp4 16.33MB
01_3rd-party-breach-quest-diagnostics.en.srt 13.49KB
01_3rd-party-breach-quest-diagnostics.en.txt 7.13KB
01_3rd-party-breach-quest-diagnostics.mp4 13.02MB
01_ai-and-siem.en.srt 7.75KB
01_ai-and-siem.en.txt 4.20KB
01_ai-and-siem.mp4 7.76MB
01_application-security-defects-writing-secure-code.en.srt 19.27KB
01_application-security-defects-writing-secure-code.en.txt 10.15KB
01_application-security-defects-writing-secure-code.mp4 20.01MB
01_application-security-overview.en.srt 14.17KB
01_application-security-overview.en.txt 7.44KB
01_application-security-overview.mp4 14.32MB
01_characteristics-of-a-security-architecture.en.srt 12.13KB
01_characteristics-of-a-security-architecture.en.txt 6.46KB
01_characteristics-of-a-security-architecture.mp4 13.08MB
01_data-collection-examination.en.srt 10.19KB
01_data-collection-examination.en.txt 5.45KB
01_data-collection-examination.mp4 23.80MB
01_data-files.en.srt 16.47KB
01_data-files.en.txt 8.61KB
01_data-files.mp4 41.02MB
01_devsecops-overview.en.srt 11.19KB
01_devsecops-overview.en.txt 7.16KB
01_devsecops-overview.mp4 12.62MB
01 fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting en srt 17.75KB
01 fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting en txt 9.24KB
01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.mp4 17.72MB
01_ibm-x-force-iris-cyberattack-framework.en.srt 20.03KB
01_ibm-x-force-iris-cyberattack-framework.en.txt 10.64KB
01_ibm-x-force-iris-cyberattack-framework.mp4 18.85MB
01_incident-response-demo-part-1.en.srt 12.11KB
01_incident-response-demo-part-1.en.txt 6.47KB
01_incident-response-demo-part-1.mp4 10.05MB
01_incident-response-overview.en.srt 890B
01_incident-response-overview.en.txt 560B
01_incident-response-overview.mp4 2.38MB
01_incident-response-preparation.en.srt 12.00KB
01_incident-response-preparation.en.txt 6.27KB
01_incident-response-preparation.mp4 30.29MB
01_introduction-to-penetration-testing.en.srt 823B
01_introduction-to-penetration-testing.en.txt 527B
01_introduction-to-penetration-testing.mp4 1.89MB
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.srt 6.01KB
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.txt 3.87KB
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.mp4 6.13MB
01_mobile-endpoint-protection.en.srt 19.65KB
01_mobile-endpoint-protection.en.txt 12.64KB
01_mobile-endpoint-protection.mp4 18.24MB
01_module-overview.en.srt 720B
01_module-overview.en.srt 428B
01_module-overview.en.txt 390B
01_module-overview.en.txt 264B
01_module-overview.mp4 1.80MB
01_module-overview.mp4 860.01KB
01_network-protocol-analyzers-overview.en.srt 7.42KB
01_network-protocol-analyzers-overview.en.txt 3.94KB
01_network-protocol-analyzers-overview.mp4 11.40MB
01_nist-incident-response-lifecycle-teams.en.srt 15.85KB
01_nist-incident-response-lifecycle-teams.en.txt 8.37KB
01_nist-incident-response-lifecycle-teams.mp4 12.51MB
01_penetration-testing-planning.en.srt 4.09KB
01_penetration-testing-planning.en.txt 2.21KB
01_penetration-testing-planning.mp4 13.79MB
01_phishing-case-study-google-facebook.en.srt 13.71KB
01_phishing-case-study-google-facebook.en.txt 7.29KB
01_phishing-case-study-google-facebook.mp4 12.85MB
01_phishing-scams-overview.en.srt 14.04KB
01_phishing-scams-overview.en.txt 7.34KB
01_phishing-scams-overview.mp4 17.60MB
01_point-of-sale-breach-overview.en.srt 9.59KB
01_point-of-sale-breach-overview.en.txt 5.93KB
01_point-of-sale-breach-overview.mp4 14.15MB
01_port-scanning.en.srt 9.38KB
01_port-scanning.en.txt 4.94KB
01_port-scanning.mp4 14.43MB
01_pos-case-study-home-depot.en.srt 13.00KB
01_pos-case-study-home-depot.en.txt 8.42KB
01_pos-case-study-home-depot.mp4 14.83MB
01_python-basics.en.srt 10.80KB
01_python-basics.en.txt 5.71KB
01_python-basics.mp4 8.74MB
01_qradar-siem-an-industry-example.en.srt 7.65KB
01_qradar-siem-an-industry-example.en.txt 4.94KB
01_qradar-siem-an-industry-example.mp4 9.75MB
01_ransomware-case-study-city-of-atlanta.en.srt 12.81KB
01_ransomware-case-study-city-of-atlanta.en.txt 8.31KB
01_ransomware-case-study-city-of-atlanta.mp4 15.94MB
01_ransomware-overview.en.srt 8.06KB
01_ransomware-overview.en.txt 5.18KB
01_ransomware-overview.mp4 11.03MB
01_siem-concepts-and-benefits.en.srt 21.44KB
01_siem-concepts-and-benefits.en.txt 11.26KB
01_siem-concepts-and-benefits.mp4 20.03MB
01_target-attack-timeline.en.srt 19.55KB
01_target-attack-timeline.en.txt 10.29KB
01_target-attack-timeline.mp4 17.43MB
01_threat-intelligence-frameworks.en.srt 15.64KB
01_threat-intelligence-frameworks.en.txt 8.23KB
01_threat-intelligence-frameworks.mp4 14.24MB
01_threat-intelligence-overview.en.srt 9.53KB
01_threat-intelligence-overview.en.txt 6.08KB
01_threat-intelligence-overview.mp4 12.72MB
01_tools.en.srt 6.21KB
01_tools.en.txt 3.76KB
01_tools.mp4 7.45MB
01_vulnerability-assessment-tools.en.srt 16.31KB
01_vulnerability-assessment-tools.en.txt 10.37KB
01_vulnerability-assessment-tools.mp4 26.13MB
01_what-is-data-security-and-protection.en.srt 15.82KB
01_what-is-data-security-and-protection.en.txt 8.51KB
01_what-is-data-security-and-protection.mp4 14.81MB
02_3rd-party-breach-impacts.en.srt 8.60KB
02_3rd-party-breach-impacts.en.txt 4.54KB
02_3rd-party-breach-impacts.mp4 10.35MB
02_ai-and-siem-an-industry-example.en.srt 5.29KB
02_ai-and-siem-an-industry-example.en.txt 2.88KB
02_ai-and-siem-an-industry-example.mp4 5.51MB
02_cross-site-scripting-common-attacks.en.srt 13.88KB
02_cross-site-scripting-common-attacks.en.txt 7.32KB
02_cross-site-scripting-common-attacks.mp4 12.68MB
02_data-security-top-challenges.en.srt 13.08KB
02_data-security-top-challenges.en.txt 8.33KB
02_data-security-top-challenges.mp4 11.80MB
02_devsecops-deployment.en.srt 6.55KB
02_devsecops-deployment.en.txt 3.53KB
02_devsecops-deployment.mp4 6.14MB
02_high-level-architectural-models.en.srt 11.35KB
02_high-level-architectural-models.en.txt 6.09KB
02_high-level-architectural-models.mp4 12.92MB
02_history-of-scripting.en.srt 8.48KB
02_history-of-scripting.en.txt 4.45KB
02_history-of-scripting.mp4 10.73MB
02_incident-response-demo-part-2.en.srt 13.33KB
02_incident-response-demo-part-2.en.txt 8.27KB
02_incident-response-demo-part-2.mp4 28.14MB
02_nist-incident-response-lifecycle.en.srt 13.59KB
02_nist-incident-response-lifecycle.en.txt 8.60KB
02_nist-incident-response-lifecycle.mp4 12.45MB
02_pos-malware.en.srt 8.69KB
02_pos-malware.en.txt 4.66KB
02_pos-malware.mp4 12.04MB
02_python-getting-started.en.srt 12.22KB
02_python-getting-started.en.txt 6.38KB
02_python-getting-started.mp4 11.59MB
02_security-intelligence.en.srt 8.73KB
02_security-intelligence.en.txt 4.71KB
02_security-intelligence.mp4 8.32MB
02_siem-deployment.en.srt 16.31KB
02_siem-deployment.en.txt 8.59KB
02_siem-deployment.mp4 14.81MB
02_soc-cyber-threat-hunting.en.srt 17.44KB
02_soc-cyber-threat-hunting.en.txt 11.09KB
02_soc-cyber-threat-hunting.mp4 17.52MB
02_target-attack-vulnerabilities.en.srt 4.83KB
02_target-attack-vulnerabilities.en.txt 3.18KB
02_target-attack-vulnerabilities.mp4 6.56MB
02_threat-intelligence-strategy-and-external-sources.en.srt 9.61KB
02_threat-intelligence-strategy-and-external-sources.en.txt 6.20KB
02_threat-intelligence-strategy-and-external-sources.mp4 11.92MB
02_user-behavior-analytics.en.srt 18.42KB
02_user-behavior-analytics.en.txt 9.67KB
02_user-behavior-analytics.mp4 17.21MB
02_what-are-forensics.en.srt 10.07KB
02_what-are-forensics.en.txt 6.42KB
02_what-are-forensics.mp4 24.39MB
02_what-is-a-breach.en.srt 8.93KB
02_what-is-a-breach.en.txt 4.73KB
02_what-is-a-breach.mp4 6.91MB
02_what-is-incident-response.en.srt 16.73KB
02_what-is-incident-response.en.txt 8.84KB
02_what-is-incident-response.mp4 33.23MB
02_what-is-penetration-testing.en.srt 11.51KB
02_what-is-penetration-testing.en.txt 6.19KB
02_what-is-penetration-testing.mp4 124.00MB
03_analysis-reporting.en.srt 9.49KB
03_analysis-reporting.en.txt 6.04KB
03_analysis-reporting.mp4 27.56MB
03_application-security-threats-and-attacks.en.srt 13.26KB
03_application-security-threats-and-attacks.en.txt 7.08KB
03_application-security-threats-and-attacks.mp4 14.08MB
03_cross-site-scripting-effective-defenses.en.srt 18.86KB
03_cross-site-scripting-effective-defenses.en.txt 9.74KB
03_cross-site-scripting-effective-defenses.mp4 17.28MB
03_cyber-threat-hunting-an-industry-example.en.srt 11.45KB
03_cyber-threat-hunting-an-industry-example.en.txt 7.35KB
03_cyber-threat-hunting-an-industry-example.mp4 13.17MB
03_data-security-common-pitfalls.en.srt 13.05KB
03_data-security-common-pitfalls.en.txt 8.31KB
03_data-security-common-pitfalls.mp4 13.17MB
03_data-structures.en.srt 6.78KB
03_data-structures.en.txt 3.57KB
03_data-structures.mp4 6.88MB
03_examples-of-ransomware.en.srt 9.61KB
03_examples-of-ransomware.en.txt 5.14KB
03_examples-of-ransomware.mp4 13.19MB
03_incident-response-demo-part-3.en.srt 9.68KB
03_incident-response-demo-part-3.en.txt 5.10KB
03_incident-response-demo-part-3.mp4 14.69MB
03_incident-response-detection-analysis.en.srt 18.56KB
03_incident-response-detection-analysis.en.txt 9.92KB
03_incident-response-detection-analysis.mp4 161.01MB
03_operating-system-data.en.srt 17.20KB
03_operating-system-data.en.txt 9.00KB
03_operating-system-data.mp4 34.05MB
03_penetration-testing-discovery.en.srt 6.60KB
03_penetration-testing-discovery.en.txt 3.52KB
03_penetration-testing-discovery.mp4 11.40MB
03_phishing-email-study.en.srt 9.07KB
03_phishing-email-study.en.txt 4.91KB
03_phishing-email-study.mp4 11.57MB
03_scripting-concepts.en.srt 7.36KB
03_scripting-concepts.en.txt 4.25KB
03_scripting-concepts.mp4 13.32MB
03_siem-solutions-vendors.en.srt 16.09KB
03_siem-solutions-vendors.en.txt 10.25KB
03_siem-solutions-vendors.mp4 19.27MB
03_solutions-architecture.en.srt 7.99KB
03_solutions-architecture.en.txt 5.04KB
03_solutions-architecture.mp4 11.01MB
03_threat-intelligence-platforms.en.srt 14.04KB
03_threat-intelligence-platforms.en.txt 8.95KB
03_threat-intelligence-platforms.mp4 14.54MB
03_watering-hole-attack.en.srt 11.37KB
03_watering-hole-attack.en.txt 7.21KB
03_watering-hole-attack.mp4 13.35MB
04_application-data.en.srt 16.25KB
04_application-data.en.txt 8.60KB
04_application-data.mp4 12.05MB
04_application-security-standards-and-regulations.en.srt 12.12KB
04_application-security-standards-and-regulations.en.txt 7.89KB
04_application-security-standards-and-regulations.mp4 12.84MB
04_containment-eradication-recovery.en.srt 9.51KB
04_containment-eradication-recovery.en.txt 6.13KB
04_containment-eradication-recovery.mp4 27.81MB
04_functions-and-methods.en.srt 2.82KB
04_functions-and-methods.en.txt 1.77KB
04_functions-and-methods.mp4 3.53MB
04_industry-specific-data-security-challenges.en.srt 13.42KB
04_industry-specific-data-security-challenges.en.txt 7.03KB
04_industry-specific-data-security-challenges.mp4 13.25MB
04_scripting-languages.en.srt 9.37KB
04_scripting-languages.en.txt 4.97KB
04_scripting-languages.mp4 17.38MB
04_security-patterns.en.srt 4.73KB
04_security-patterns.en.txt 2.55KB
04_security-patterns.mp4 5.65MB
05_capabilities-of-data-protection.en.srt 13.51KB
05_capabilities-of-data-protection.en.txt 7.12KB
05_capabilities-of-data-protection.mp4 12.59MB
05_impact-of-phishing.en.srt 7.84KB
05_impact-of-phishing.en.txt 4.12KB
05_impact-of-phishing.mp4 10.90MB
05_network-data.en.srt 19.33KB
05_network-data.en.txt 10.28KB
05_network-data.mp4 21.88MB
05_penetration-testing-additional-discovery-details.en.srt 4.32KB
05_penetration-testing-additional-discovery-details.en.txt 2.57KB
05_penetration-testing-additional-discovery-details.mp4 10.61MB
05_python-libraries.en.srt 3.11KB
05_python-libraries.en.txt 1.62KB
05_python-libraries.mp4 3.33MB
06_critical-data-protection-capabilities.en.srt 15.32KB
06_critical-data-protection-capabilities.en.txt 8.07KB
06_critical-data-protection-capabilities.mp4 14.43MB
06_post-incident-activities.en.srt 7.14KB
06_post-incident-activities.en.txt 3.79KB
06_post-incident-activities.mp4 12.00MB
07_data-protection-industry-example.en.srt 13.63KB
07_data-protection-industry-example.en.txt 7.07KB
07_data-protection-industry-example.mp4 15.64MB
08_penetration-testing-attack.en.srt 9.25KB
08_penetration-testing-attack.en.txt 5.76KB
08_penetration-testing-attack.mp4 19.77MB
09_penetration-testing-reporting.en.srt 9.30KB
09_penetration-testing-reporting.en.txt 4.96KB
09_penetration-testing-reporting.mp4 14.43MB
1 24B
10 108.88KB
11 208.16KB
12 119.39KB
13 478.30KB
14 500.48KB
15 233.64KB
16 235.83KB
17 157.16KB
18 263.70KB
19 291.65KB
2 100B
20 407.78KB
21 493.46KB
22 67.50KB
23 120.73KB
24 228.26KB
25 296.92KB
26 170.63KB
27 56.60KB
28 373.45KB
29 169.76KB
3 51B
30 194.06KB
31 196.02KB
32 317.55KB
33 474.90KB
34 69.46KB
35 69.83KB
36 75.33KB
37 189.28KB
38 262.47KB
39 353.98KB
4 92.14KB
40 433.59KB
41 219.88KB
42 151.94KB
43 179.38KB
44 257.01KB
45 318.68KB
46 337.30KB
47 340.43KB
48 428.64KB
49 493.79KB
5 219.17KB
50 82.41KB
51 151.90KB
52 167.22KB
53 282.55KB
54 323.18KB
55 386.64KB
56 418.86KB
57 502.29KB
58 47.35KB
59 460.11KB
6 373.30KB
60 474.83KB
61 508.45KB
62 80.27KB
63 202.56KB
64 416.44KB
65 437.21KB
66 104.49KB
67 105.41KB
68 480.13KB
69 503.76KB
7 196.56KB
70 106.88KB
71 278.19KB
72 395.08KB
73 152.18KB
74 460.24KB
75 257.14KB
76 266.51KB
77 182.18KB
78 245.68KB
79 53.56KB
8 445.58KB
80 93.49KB
81 119.21KB
82 450.97KB
83 371.21KB
84 381.56KB
85 358.45KB
86 499.63KB
87 480.92KB
88 175.04KB
89 125.06KB
9 379.67KB
90 112.52KB
91 206.82KB
TutsNode.net.txt 63B
Distribution statistics by country
Australia (AU) 1
India (IN) 1
Russia (RU) 1
Turkey (TR) 1
Total 4
IP List List of IP addresses which were distributed this torrent