|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
4B |
| 1 |
77B |
| 1. Analyzing Application Assessments (OBJ. 2.1 & 2.2).mp4 |
22.82MB |
| 1. Analyzing Application Assessments (OBJ. 2.1 & 2.2).srt |
2.65KB |
| 1. Analyzing Application-related IOCs (OBJ. 1.2 & 3.2).mp4 |
31.59MB |
| 1. Analyzing Application-related IOCs (OBJ. 1.2 & 3.2).srt |
3.27KB |
| 1. Analyzing Host-related IOCs (OBJ. 1.2).mp4 |
27.89MB |
| 1. Analyzing Host-related IOCs (OBJ. 1.2).srt |
2.84KB |
| 1. Analyzing Lateral Movement and Pivoting IOCs (OBJ. 1.2).mp4 |
28.36MB |
| 1. Analyzing Lateral Movement and Pivoting IOCs (OBJ. 1.2).srt |
2.90KB |
| 1. Analyzing Network IOCs (OBJ. 1.2).mp4 |
40.12MB |
| 1. Analyzing Network IOCs (OBJ. 1.2).srt |
4.10KB |
| 1. Analyzing Output from Vulnerability Scanners (OBJ. 2.1, 2.3, & 4.1).mp4 |
44.78MB |
| 1. Analyzing Output from Vulnerability Scanners (OBJ. 2.1, 2.3, & 4.1).srt |
4.89KB |
| 1. Analyzing Your SIEM (OBJ. 1.3 & 4.1).mp4 |
41.69MB |
| 1. Analyzing Your SIEM (OBJ. 1.3 & 4.1).srt |
4.43KB |
| 1. Appliance Monitoring (OBJ. 1.1 & 1.3).mp4 |
33.20MB |
| 1. Appliance Monitoring (OBJ. 1.1 & 1.3).srt |
3.39KB |
| 1. Automation Concepts and Technologies (OBJ. 1.5).mp4 |
50.43MB |
| 1. Automation Concepts and Technologies (OBJ. 1.5).srt |
5.49KB |
| 1. CER and Post-incident Actions (OBJ. 3.2, 3.3, & 4.2).mp4 |
44.16MB |
| 1. CER and Post-incident Actions (OBJ. 3.2, 3.3, & 4.2).srt |
4.86KB |
| 1. Classifying Threats (OBJ. 1.3, 1.4, 2.3, & 3.1).mp4 |
41.11MB |
| 1. Classifying Threats (OBJ. 1.3, 1.4, 2.3, & 3.1).srt |
4.32KB |
| 1. Cloud and Automation (OBJ. 1.1).mp4 |
24.31MB |
| 1. Cloud and Automation (OBJ. 1.1).srt |
2.70KB |
| 1. Cloud Infrastructure Assessments (OBJ. 1.1 & 2.2).mp4 |
29.09MB |
| 1. Cloud Infrastructure Assessments (OBJ. 1.1 & 2.2).srt |
3.16KB |
| 1. Conclusion.mp4 |
271.77MB |
| 1. Conclusion.srt |
31.14KB |
| 1. Configuring Your SIEM (OBJ. 1.1 & 1.3).mp4 |
37.26MB |
| 1. Configuring Your SIEM (OBJ. 1.1 & 1.3).srt |
3.97KB |
| 1. Detection and Containment (OBJ. 3.2).mp4 |
32.26MB |
| 1. Detection and Containment (OBJ. 3.2).srt |
3.57KB |
| 1. Digital Forensics (OBJ. 3.2).mp4 |
70.29MB |
| 1. Digital Forensics (OBJ. 3.2).srt |
7.65KB |
| 1. Email Monitoring (OBJ. 1.3).mp4 |
37.66MB |
| 1. Email Monitoring (OBJ. 1.3).srt |
3.72KB |
| 1. Endpoint Monitoring (OBJ. 1.1 & 1.3).mp4 |
46.93MB |
| 1. Endpoint Monitoring (OBJ. 1.1 & 1.3).srt |
4.99KB |
| 1. Enumeration Tools (OBJ. 2.1 & 2.2).mp4 |
37.38MB |
| 1. Enumeration Tools (OBJ. 2.1 & 2.2).srt |
4.02KB |
| 1. Frameworks, Policies, and Procedures (OBJ. 2.1 & 3.1).mp4 |
27.44MB |
| 1. Frameworks, Policies, and Procedures (OBJ. 2.1 & 3.1).srt |
3.01KB |
| 1. Hardware Assurance Best Practices (OBJ. 1.4 & 2.4).mp4 |
39.17MB |
| 1. Hardware Assurance Best Practices (OBJ. 1.4 & 2.4).srt |
4.29KB |
| 1. Identify Security Control Types (OBJ. 2.5).mp4 |
31.05MB |
| 1. Identify Security Control Types (OBJ. 2.5).srt |
3.25KB |
| 1. Identity and Access Management Solutions (OBJ. 1.1).mp4 |
41.43MB |
| 1. Identity and Access Management Solutions (OBJ. 1.1).srt |
4.25KB |
| 1. Incident Response Preparation (OBJ. 3.3 & 4.2).mp4 |
60.13MB |
| 1. Incident Response Preparation (OBJ. 3.3 & 4.2).srt |
6.46KB |
| 1. Introduction.mp4 |
289.45MB |
| 1. Introduction.srt |
33.74KB |
| 1. Mitigate Software Vulnerabilities and Attacks (OBJ. 2.4 & 2.5).mp4 |
36.54MB |
| 1. Mitigate Software Vulnerabilities and Attacks (OBJ. 2.4 & 2.5).srt |
4.12KB |
| 1. Mitigate Web Application Vulnerabilities and Attacks (OBJ. 2.4 & 2.5).mp4 |
34.75MB |
| 1. Mitigate Web Application Vulnerabilities and Attacks (OBJ. 2.4 & 2.5).srt |
3.81KB |
| 1. Mitigating Vulnerabilities (OBJ. 2.1, 2.5, & 4.1).mp4 |
35.26MB |
| 1. Mitigating Vulnerabilities (OBJ. 2.1, 2.5, & 4.1).srt |
3.88KB |
| 1. Network Architecture and Segmentation (OBJ. 1.1, 1.4, & 2.5).mp4 |
44.79MB |
| 1. Network Architecture and Segmentation (OBJ. 1.1, 1.4, & 2.5).srt |
4.76KB |
| 1. Network Forensics (OBJ. 1.3).mp4 |
32.92MB |
| 1. Network Forensics (OBJ. 1.3).srt |
3.83KB |
| 1. Non-technical Data and Privacy Controls (OBJ. 1.1 & 2.5).mp4 |
60.87MB |
| 1. Non-technical Data and Privacy Controls (OBJ. 1.1 & 2.5).srt |
6.66KB |
| 1. Risk Mitigation (OBJ. 2.5 & 4.1).mp4 |
37.09MB |
| 1. Risk Mitigation (OBJ. 2.5 & 4.1).srt |
4.05KB |
| 1. Service-Oriented Architecture (OBJ. 1.1, 1.5, & 2.4).mp4 |
48.44MB |
| 1. Service-Oriented Architecture (OBJ. 1.1, 1.5, & 2.4).srt |
4.93KB |
| 1. Specialized Technology (OBJ. 2.1 & 2.4).mp4 |
36.39MB |
| 1. Specialized Technology (OBJ. 2.1 & 2.4).srt |
4.04KB |
| 1. Technical Data and Privacy Controls (OBJ. 1.1).mp4 |
30.14MB |
| 1. Technical Data and Privacy Controls (OBJ. 1.1).srt |
3.21KB |
| 1. Threat Hunting (OBJ. 1.3, 1.4, & 2.5).mp4 |
46.91MB |
| 1. Threat Hunting (OBJ. 1.3, 1.4, & 2.5).srt |
4.94KB |
| 1. Threat Intelligence Sharing (OBJ. 1.4).mp4 |
26.78MB |
| 1. Threat Intelligence Sharing (OBJ. 1.4).srt |
2.85KB |
| 1. Vulnerability Scanning (Introduction) (OBJ. 2.1 & 2.2).mp4 |
36.51MB |
| 1. Vulnerability Scanning (Introduction) (OBJ. 2.1 & 2.2).srt |
4.11KB |
| 10 |
771.90KB |
| 10. Analysis of Security Appliances (OBJ. 1.3).mp4 |
146.04MB |
| 10. Analysis of Security Appliances (OBJ. 1.3).srt |
33.90KB |
| 10. Bug Bounty (OBJ. 1.4).mp4 |
25.27MB |
| 10. Bug Bounty (OBJ. 1.4).srt |
8.16KB |
| 10. Conduct and Use Policies (OBJ. 1.1).mp4 |
29.38MB |
| 10. Conduct and Use Policies (OBJ. 1.1).srt |
8.84KB |
| 10. Configuring Network Segmentation (OBJ. 1.1).mp4 |
62.99MB |
| 10. Configuring Network Segmentation (OBJ. 1.1).srt |
20.80KB |
| 10. Maltego (OBJ. 2.2).mp4 |
28.68MB |
| 10. Maltego (OBJ. 2.2).srt |
8.08KB |
| 10. Persistence (OBJ. 1.2).mp4 |
61.58MB |
| 10. Persistence (OBJ. 1.2).srt |
21.90KB |
| 10. Quiz Analyzing Output from Vulnerability Scanners.html |
167B |
| 10. Quiz Automation Concepts and Technologies.html |
167B |
| 10. Quiz Endpoint Monitoring.html |
167B |
| 10. Quiz Eradication, Recovery, and Post-incident Actions.html |
167B |
| 10. Quiz Incident Response Preparation.html |
167B |
| 10. Quiz Mitigate Software Vulnerabilities and Attacks.html |
167B |
| 10. Quiz Service-Oriented Architecture.html |
167B |
| 10. Quiz Technical Data and Privacy Controls.html |
167B |
| 10. Scanning Risks (OBJ. 2.1).mp4 |
22.30MB |
| 10. Scanning Risks (OBJ. 2.1).srt |
6.98KB |
| 10. Sensitive Data Exposure (OBJ. 2.5).mp4 |
24.51MB |
| 10. Sensitive Data Exposure (OBJ. 2.5).srt |
7.45KB |
| 10. Timeline Generation (OBJ. 3.2).mp4 |
34.95MB |
| 10. Timeline Generation (OBJ. 3.2).srt |
11.90KB |
| 10. UDP Ports (OBJ. 1.2).mp4 |
36.75MB |
| 10. UDP Ports (OBJ. 1.2).srt |
14.68KB |
| 100 |
985.19KB |
| 101 |
991.46KB |
| 102 |
1008.88KB |
| 103 |
1.45MB |
| 104 |
1.54MB |
| 105 |
411.43KB |
| 106 |
525.83KB |
| 107 |
593.17KB |
| 108 |
658.82KB |
| 109 |
684.99KB |
| 11 |
648.14KB |
| 11. Account and Permissions Audits (OBJ. 1.1).mp4 |
23.38MB |
| 11. Account and Permissions Audits (OBJ. 1.1).srt |
10.82KB |
| 11. Carving (OBJ. 3.2).mp4 |
42.12MB |
| 11. Carving (OBJ. 3.2).srt |
13.31KB |
| 11. Clickjacking (OBJ. 2.4 & 2.5).mp4 |
11.19MB |
| 11. Clickjacking (OBJ. 2.4 & 2.5).srt |
5.73KB |
| 11. Conducting Scans (OBJ. 2.1 & 2.2).mp4 |
158.40MB |
| 11. Conducting Scans (OBJ. 2.1 & 2.2).srt |
78.15KB |
| 11. Data Exfiltration (OBJ. 1.2).mp4 |
36.33MB |
| 11. Data Exfiltration (OBJ. 1.2).srt |
14.63KB |
| 11. Quiz Analyzing Host-related IOCs.html |
167B |
| 11. Quiz Application Monitoring.html |
167B |
| 11. Quiz Network Architecture and Segmentation.html |
167B |
| 11. Quiz Threat Hunting.html |
167B |
| 11. Responder (OBJ. 2.2).mp4 |
12.41MB |
| 11. Responder (OBJ. 2.2).srt |
3.51KB |
| 110 |
992.69KB |
| 111 |
1.51MB |
| 112 |
1.57MB |
| 113 |
1.82MB |
| 114 |
87.91KB |
| 115 |
289.68KB |
| 116 |
439.04KB |
| 117 |
632.57KB |
| 118 |
746.21KB |
| 119 |
1.16MB |
| 12 |
1.94MB |
| 12. Chain of Custody (OBJ. 3.2).mp4 |
48.14MB |
| 12. Chain of Custody (OBJ. 3.2).srt |
14.37KB |
| 12. Covert Channels (OBJ. 1.2).mp4 |
55.78MB |
| 12. Covert Channels (OBJ. 1.2).srt |
18.28KB |
| 12. Quiz Identity and Access Management Solutions.html |
167B |
| 12. Quiz Vulnerability Scanning.html |
167B |
| 12. Web Application Vulnerabilities (OBJ. 2.4 & 2.5).mp4 |
65.74MB |
| 12. Web Application Vulnerabilities (OBJ. 2.4 & 2.5).srt |
20.35KB |
| 12. Wireless Assessment Tools (OBJ. 2.2).mp4 |
34.13MB |
| 12. Wireless Assessment Tools (OBJ. 2.2).srt |
12.76KB |
| 120 |
1.19MB |
| 121 |
1.39MB |
| 122 |
1.56MB |
| 123 |
1.70MB |
| 124 |
1.82MB |
| 125 |
1.86MB |
| 126 |
386B |
| 127 |
147.29KB |
| 128 |
675.45KB |
| 129 |
1.07MB |
| 13 |
1009.29KB |
| 13. Analysis of Network IOCs (OBJ. 1.2).mp4 |
104.54MB |
| 13. Analysis of Network IOCs (OBJ. 1.2).srt |
27.04KB |
| 13. Collecting and Validating Evidence (OBJ. 3.2).mp4 |
103.10MB |
| 13. Collecting and Validating Evidence (OBJ. 3.2).srt |
19.66KB |
| 13. Quiz Mitigate Web Application Vulnerabilities and Attacks.html |
167B |
| 13. Recon-ng (OBJ. 2.2).mp4 |
193.20MB |
| 13. Recon-ng (OBJ. 2.2).srt |
53.46KB |
| 130 |
1.08MB |
| 131 |
1.09MB |
| 132 |
1.19MB |
| 133 |
1.21MB |
| 134 |
1.33MB |
| 135 |
1.47MB |
| 136 |
1.54MB |
| 137 |
1.62MB |
| 138 |
164.10KB |
| 139 |
181.76KB |
| 14 |
14.83KB |
| 14. Hashcat (OBJ. 2.2).mp4 |
30.66MB |
| 14. Hashcat (OBJ. 2.2).srt |
7.61KB |
| 14. Quiz Analyzing Network IOCs.html |
167B |
| 14. Quiz Digital Forensics.html |
167B |
| 140 |
206.09KB |
| 141 |
633.22KB |
| 142 |
916.48KB |
| 143 |
975.13KB |
| 144 |
1.03MB |
| 145 |
1.21MB |
| 146 |
1.22MB |
| 147 |
1.45MB |
| 148 |
1.71MB |
| 149 |
1.84MB |
| 15 |
1.26MB |
| 15. Testing Credential Security (OBJ. 2.2).mp4 |
30.57MB |
| 15. Testing Credential Security (OBJ. 2.2).srt |
5.35KB |
| 150 |
101.99KB |
| 151 |
478.18KB |
| 152 |
680.44KB |
| 153 |
1023.92KB |
| 154 |
1.30MB |
| 155 |
1.48MB |
| 156 |
1.58MB |
| 157 |
1.67MB |
| 158 |
1.73MB |
| 159 |
1.88MB |
| 16 |
242.82KB |
| 16. Quiz Enumeration Tools.html |
167B |
| 160 |
175.60KB |
| 161 |
251.46KB |
| 162 |
319.85KB |
| 163 |
583.81KB |
| 164 |
663.51KB |
| 165 |
915.09KB |
| 166 |
1009.54KB |
| 167 |
1.33MB |
| 168 |
1.39MB |
| 169 |
1.45MB |
| 17 |
1.67MB |
| 170 |
1.46MB |
| 171 |
1.53MB |
| 172 |
1.87MB |
| 173 |
1.88MB |
| 174 |
69.62KB |
| 175 |
337.04KB |
| 176 |
693.61KB |
| 177 |
849.31KB |
| 178 |
1.64MB |
| 179 |
1.64MB |
| 18 |
1.54MB |
| 180 |
1.76MB |
| 181 |
1.92MB |
| 182 |
274.21KB |
| 183 |
344.28KB |
| 184 |
631.08KB |
| 185 |
753.13KB |
| 186 |
871.47KB |
| 187 |
881.83KB |
| 188 |
936.06KB |
| 189 |
1.06MB |
| 19 |
1.95MB |
| 190 |
1.10MB |
| 191 |
1.16MB |
| 192 |
1.25MB |
| 193 |
1.25MB |
| 194 |
1.36MB |
| 195 |
1.41MB |
| 196 |
1.46MB |
| 197 |
1.49MB |
| 198 |
1.61MB |
| 199 |
1.65MB |
| 2 |
11B |
| 2.1 CompTIA CySA+ (CS0-003) Study Guide.pdf |
6.24MB |
| 2.2 CompTIA-CySA-cs0-003 objectives.pdf |
182.28KB |
| 2. Access Controls (OBJ. 1.1).mp4 |
24.52MB |
| 2. Access Controls (OBJ. 1.1).srt |
6.96KB |
| 2. Analyzing Network IOCs (OBJ. 1.2).mp4 |
9.49MB |
| 2. Analyzing Network IOCs (OBJ. 1.2).srt |
5.31KB |
| 2. Application-related IOCs (OBJ. 1.2).mp4 |
15.56MB |
| 2. Application-related IOCs (OBJ. 1.2).srt |
3.47KB |
| 2. Asset and Change Management (OBJ. 2.5).mp4 |
82.73MB |
| 2. Asset and Change Management (OBJ. 2.5).srt |
26.34KB |
| 2. BONUS What Comes Next.mp4 |
62.12MB |
| 2. BONUS What Comes Next.srt |
8.33KB |
| 2. CICD (OBJ. 1.5).mp4 |
42.42MB |
| 2. CICD (OBJ. 1.5).srt |
17.50KB |
| 2. Cloud Models (OBJ. 1.1).mp4 |
112.33MB |
| 2. Cloud Models (OBJ. 1.1).srt |
40.56KB |
| 2. Cloud Threats (OBJ. 1.1).mp4 |
43.53MB |
| 2. Cloud Threats (OBJ. 1.1).srt |
20.18KB |
| 2. Containment (OBJ. 3.2).mp4 |
49.57MB |
| 2. Containment (OBJ. 3.2).srt |
15.59KB |
| 2. Cybersecurity Roles and Responsibilities (OBJ. 2.5).mp4 |
41.01MB |
| 2. Cybersecurity Roles and Responsibilities (OBJ. 2.5).srt |
16.11KB |
| 2. Data Classification (OBJ. 2.5).mp4 |
64.16MB |
| 2. Data Classification (OBJ. 2.5).srt |
22.88KB |
| 2. Digital Forensic Analysts (OBJ. 3.2).mp4 |
30.78MB |
| 2. Digital Forensic Analysts (OBJ. 3.2).srt |
11.57KB |
| 2. Directory Traversal (OBJ. 2.4).mp4 |
46.53MB |
| 2. Directory Traversal (OBJ. 2.4).srt |
17.12KB |
| 2. Download the Study Guide.html |
131B |
| 2. Email IOCs (OBJ. 1.3).mp4 |
37.14MB |
| 2. Email IOCs (OBJ. 1.3).srt |
13.27KB |
| 2. Endpoint Analysis (OBJ. 1.3).mp4 |
42.27MB |
| 2. Endpoint Analysis (OBJ. 1.3).srt |
13.48KB |
| 2. Enterprise Security Architecture (OBJ. 2.1).mp4 |
15.86MB |
| 2. Enterprise Security Architecture (OBJ. 2.1).srt |
6.03KB |
| 2. Enumeration Tools (OBJ. 2.1 & 2.2).mp4 |
45.82MB |
| 2. Enumeration Tools (OBJ. 2.1 & 2.2).srt |
17.76KB |
| 2. Firewall Logs (OBJ. 1.1 & 1.3).mp4 |
99.43MB |
| 2. Firewall Logs (OBJ. 1.1 & 1.3).srt |
27.71KB |
| 2. Host-related IOCs (OBJ. 1.2).mp4 |
10.97MB |
| 2. Host-related IOCs (OBJ. 1.2).srt |
3.61KB |
| 2. Identifying Vulnerabilities (OBJ. 2.1).mp4 |
17.91MB |
| 2. Identifying Vulnerabilities (OBJ. 2.1).srt |
8.84KB |
| 2. Identity and Access Management (OBJ. 1.1).mp4 |
36.75MB |
| 2. Identity and Access Management (OBJ. 1.1).srt |
18.03KB |
| 2. Incident Response Phases (OBJ. 3.3).mp4 |
59.45MB |
| 2. Incident Response Phases (OBJ. 3.3).srt |
18.35KB |
| 2. Lateral Movement and Pivoting (OBJ. 1.2).mp4 |
24.96MB |
| 2. Lateral Movement and Pivoting (OBJ. 1.2).srt |
7.71KB |
| 2. Mobile Vulnerabilities (OBJ. 2.1 & 2.4).mp4 |
87.71MB |
| 2. Mobile Vulnerabilities (OBJ. 2.1 & 2.4).srt |
31.61KB |
| 2. Network Forensic Tools (OBJ. 1.3).mp4 |
25.40MB |
| 2. Network Forensic Tools (OBJ. 1.3).srt |
10.08KB |
| 2. OODA Loop (OBJ. 3.2).mp4 |
36.08MB |
| 2. OODA Loop (OBJ. 3.2).srt |
13.06KB |
| 2. Remediation and Mitigation (OBJ. 2.5).mp4 |
36.35MB |
| 2. Remediation and Mitigation (OBJ. 2.5).srt |
15.50KB |
| 2. Risk Identification Process (OBJ. 2.5 & 4.1).mp4 |
51.42MB |
| 2. Risk Identification Process (OBJ. 2.5 & 4.1).srt |
19.02KB |
| 2. Scan Reports (OBJ. 2.3 & 4.1).mp4 |
32.59MB |
| 2. Scan Reports (OBJ. 2.3 & 4.1).srt |
7.88KB |
| 2. SDLC Integration (OBJ. 2.5).mp4 |
72.26MB |
| 2. SDLC Integration (OBJ. 2.5).srt |
31.22KB |
| 2. Security and Threat Intelligence (OBJ. 1.4).mp4 |
45.84MB |
| 2. Security and Threat Intelligence (OBJ. 1.4).srt |
12.18KB |
| 2. SIEM (OBJ. 1.3).mp4 |
53.12MB |
| 2. SIEM (OBJ. 1.3).srt |
21.06KB |
| 2. SIEM Dashboards (OBJ. 1.3 & 4.1).mp4 |
95.56MB |
| 2. SIEM Dashboards (OBJ. 1.3 & 4.1).srt |
30.34KB |
| 2. SOA and Microservices (OBJ. 1.1).mp4 |
33.28MB |
| 2. SOA and Microservices (OBJ. 1.1).srt |
14.16KB |
| 2. Software Assessments (OBJ. 2.1).mp4 |
49.38MB |
| 2. Software Assessments (OBJ. 2.1).srt |
18.93KB |
| 2. Supply Chain Assessment (OBJ. 1.4).mp4 |
44.97MB |
| 2. Supply Chain Assessment (OBJ. 1.4).srt |
13.52KB |
| 2. Threat Classification (OBJ. 1.4).mp4 |
62.02MB |
| 2. Threat Classification (OBJ. 1.4).srt |
21.37KB |
| 2. Threat Modeling (OBJ. 1.4 & 2.5).mp4 |
48.00MB |
| 2. Threat Modeling (OBJ. 1.4 & 2.5).srt |
19.95KB |
| 20 |
1.46MB |
| 200 |
1.67MB |
| 201 |
1.90MB |
| 202 |
1.92MB |
| 203 |
698.71KB |
| 204 |
756.45KB |
| 205 |
787.41KB |
| 206 |
818.76KB |
| 207 |
977.93KB |
| 208 |
1.05MB |
| 209 |
1.07MB |
| 21 |
919.59KB |
| 210 |
1.11MB |
| 211 |
1.25MB |
| 212 |
1.58MB |
| 213 |
1.64MB |
| 214 |
1.87MB |
| 215 |
104.13KB |
| 216 |
118.84KB |
| 217 |
262.30KB |
| 218 |
405.17KB |
| 219 |
437.31KB |
| 22 |
46.00KB |
| 220 |
519.17KB |
| 221 |
679.39KB |
| 222 |
734.94KB |
| 223 |
798.40KB |
| 224 |
819.59KB |
| 225 |
828.31KB |
| 226 |
1.08MB |
| 227 |
1.12MB |
| 228 |
1.16MB |
| 229 |
1.23MB |
| 23 |
1.06MB |
| 230 |
1.41MB |
| 231 |
1.62MB |
| 232 |
1.74MB |
| 233 |
1.89MB |
| 234 |
1.92MB |
| 235 |
1.98MB |
| 236 |
160.26KB |
| 237 |
242.30KB |
| 238 |
322.90KB |
| 239 |
416.20KB |
| 24 |
581.66KB |
| 240 |
718.67KB |
| 241 |
952.58KB |
| 242 |
971.79KB |
| 243 |
1.03MB |
| 244 |
1.07MB |
| 245 |
1.22MB |
| 246 |
1.34MB |
| 247 |
1.43MB |
| 248 |
1.61MB |
| 249 |
1.86MB |
| 25 |
1.12MB |
| 250 |
1.86MB |
| 251 |
1.94MB |
| 252 |
23.79KB |
| 253 |
277.66KB |
| 254 |
316.31KB |
| 255 |
634.26KB |
| 256 |
926.99KB |
| 257 |
1.03MB |
| 258 |
1.03MB |
| 259 |
1.32MB |
| 26 |
1.44MB |
| 260 |
1.55MB |
| 261 |
1.55MB |
| 262 |
1.64MB |
| 263 |
1.68MB |
| 264 |
1.82MB |
| 265 |
124B |
| 266 |
117.29KB |
| 267 |
334.75KB |
| 268 |
573.18KB |
| 269 |
583.01KB |
| 27 |
912.61KB |
| 270 |
609.31KB |
| 271 |
943.85KB |
| 272 |
1.13MB |
| 273 |
1.21MB |
| 274 |
1.22MB |
| 275 |
1.57MB |
| 276 |
283.54KB |
| 277 |
352.22KB |
| 278 |
612.92KB |
| 279 |
743.74KB |
| 28 |
454.63KB |
| 280 |
1.04MB |
| 281 |
1.24MB |
| 282 |
1.48MB |
| 283 |
1.49MB |
| 284 |
1.69MB |
| 285 |
1.93MB |
| 286 |
71.50KB |
| 287 |
218.78KB |
| 288 |
265.43KB |
| 289 |
328.78KB |
| 29 |
1.46MB |
| 290 |
381.03KB |
| 291 |
630.52KB |
| 292 |
1.07MB |
| 293 |
1.18MB |
| 294 |
1.27MB |
| 295 |
1.30MB |
| 296 |
1.67MB |
| 297 |
1.70MB |
| 298 |
1.88MB |
| 299 |
174.93KB |
| 3 |
33B |
| 3. Analysis and Detection (OBJ. 1.3).mp4 |
45.11MB |
| 3. Analysis and Detection (OBJ. 1.3).srt |
17.77KB |
| 3. Anomalous Activity (OBJ. 1.2).mp4 |
27.40MB |
| 3. Anomalous Activity (OBJ. 1.2).srt |
8.89KB |
| 3. Cloud Forensics (OBJ. 1.1).mp4 |
34.42MB |
| 3. Cloud Forensics (OBJ. 1.1).srt |
9.68KB |
| 3. Common Identifiers (OBJ. 2.3).mp4 |
44.55MB |
| 3. Common Identifiers (OBJ. 2.3).srt |
14.26KB |
| 3. CompTIA CySA+ (CS0-003).html |
167B |
| 3. Conducting an Assessment (OBJ. 2.5).mp4 |
63.35MB |
| 3. Conducting an Assessment (OBJ. 2.5).srt |
21.21KB |
| 3. Configuration Baselines (OBJ. 2.1 & 2.5).mp4 |
23.68MB |
| 3. Configuration Baselines (OBJ. 2.1 & 2.5).srt |
10.55KB |
| 3. Cross-site Scripting (OBJ. 2.4).mp4 |
46.38MB |
| 3. Cross-site Scripting (OBJ. 2.4).srt |
19.89KB |
| 3. Data Types (OBJ. 1.1 & 2.5).mp4 |
14.59MB |
| 3. Data Types (OBJ. 1.1 & 2.5).srt |
7.17KB |
| 3. Defensive Capabilities (OBJ. 3.2).mp4 |
21.83MB |
| 3. Defensive Capabilities (OBJ. 3.2).srt |
11.03KB |
| 3. DevSecOps (OBJ. 1.5).mp4 |
23.93MB |
| 3. DevSecOps (OBJ. 1.5).srt |
12.32KB |
| 3. Documenting Procedures (OBJ. 3.3).mp4 |
56.31MB |
| 3. Documenting Procedures (OBJ. 3.3).srt |
18.35KB |
| 3. Email Header Analysis (OBJ. 1.3).mp4 |
71.35MB |
| 3. Email Header Analysis (OBJ. 1.3).srt |
27.65KB |
| 3. Eradication (OBJ. 3.2).mp4 |
48.81MB |
| 3. Eradication (OBJ. 3.2).srt |
13.91KB |
| 3. Exam Tips.mp4 |
97.11MB |
| 3. Exam Tips.srt |
11.21KB |
| 3. Execution and Escalation (OBJ. 2.4).mp4 |
35.20MB |
| 3. Execution and Escalation (OBJ. 2.4).srt |
15.93KB |
| 3. File System Permissions (OBJ. 1.1).mp4 |
47.34MB |
| 3. File System Permissions (OBJ. 1.1).srt |
23.59KB |
| 3. Firewall Configurations (OBJ. 1.1).mp4 |
145.25MB |
| 3. Firewall Configurations (OBJ. 1.1).srt |
45.27KB |
| 3. Forensics Procedures (OBJ. 3.2).mp4 |
68.59MB |
| 3. Forensics Procedures (OBJ. 3.2).srt |
23.51KB |
| 3. Intelligence Cycle (OBJ. 1.4).mp4 |
82.70MB |
| 3. Intelligence Cycle (OBJ. 1.4).srt |
23.70KB |
| 3. IoT Vulnerabilities (OBJ. 2.1 & 2.4).mp4 |
34.93MB |
| 3. IoT Vulnerabilities (OBJ. 2.1 & 2.4).srt |
8.82KB |
| 3. Malicious Processes (OBJ. 1.2).mp4 |
60.70MB |
| 3. Malicious Processes (OBJ. 1.2).srt |
22.07KB |
| 3. Network Architecture (OBJ. 1.1).mp4 |
92.83MB |
| 3. Network Architecture (OBJ. 1.1).srt |
27.86KB |
| 3. Nmap Discovery Scans (OBJ. 2.2).mp4 |
57.64MB |
| 3. Nmap Discovery Scans (OBJ. 2.2).srt |
19.07KB |
| 3. Pass the Hash (OBJ. 1.2).mp4 |
69.51MB |
| 3. Pass the Hash (OBJ. 1.2).srt |
24.02KB |
| 3. Password Policies (OBJ. 1.1).mp4 |
37.15MB |
| 3. Password Policies (OBJ. 1.1).srt |
15.05KB |
| 3. Prescriptive Frameworks (OBJ. 2.1).mp4 |
32.11MB |
| 3. Prescriptive Frameworks (OBJ. 2.1).srt |
10.58KB |
| 3. Reverse Engineering (OBJ. 2.1).mp4 |
54.19MB |
| 3. Reverse Engineering (OBJ. 2.1).srt |
21.19KB |
| 3. Root of Trust (OBJ. 2.4).mp4 |
30.06MB |
| 3. Root of Trust (OBJ. 2.4).srt |
12.54KB |
| 3. Sandboxing (OBJ. 1.3).mp4 |
45.38MB |
| 3. Sandboxing (OBJ. 1.3).srt |
18.54KB |
| 3. Scanning Workflow (OBJ. 2.1).mp4 |
39.67MB |
| 3. Scanning Workflow (OBJ. 2.1).srt |
16.74KB |
| 3. Security Data Collection (OBJ. 1.1 & 1.3).mp4 |
25.66MB |
| 3. Security Data Collection (OBJ. 1.1 & 1.3).srt |
12.61KB |
| 3. Security Operations Center (SOC) (OBJ. 2.5).mp4 |
24.76MB |
| 3. Security Operations Center (SOC) (OBJ. 2.5).srt |
11.59KB |
| 3. Service Models (OBJ. 1.1).mp4 |
81.56MB |
| 3. Service Models (OBJ. 1.1).srt |
26.27KB |
| 3. SOAP (OBJ. 1.5 & 2.5).mp4 |
24.07MB |
| 3. SOAP (OBJ. 1.5 & 2.5).srt |
11.29KB |
| 3. tcpdump (OBJ. 1.3).mp4 |
75.69MB |
| 3. tcpdump (OBJ. 1.3).srt |
17.67KB |
| 3. Threat Actors (OBJ. 1.4).mp4 |
106.46MB |
| 3. Threat Actors (OBJ. 1.4).srt |
37.36KB |
| 3. Threat Hunting (OBJ. 1.4 & 2.5).mp4 |
48.61MB |
| 3. Threat Hunting (OBJ. 1.4 & 2.5).srt |
16.97KB |
| 3. Traffic Spikes (OBJ. 1.2).mp4 |
100.94MB |
| 3. Traffic Spikes (OBJ. 1.2).srt |
42.40KB |
| 30 |
79.09KB |
| 300 |
1.16MB |
| 301 |
1.66MB |
| 302 |
596.63KB |
| 303 |
739.68KB |
| 304 |
827.72KB |
| 305 |
1.23MB |
| 306 |
1.55MB |
| 307 |
88.61KB |
| 308 |
96.18KB |
| 309 |
378.27KB |
| 31 |
632.08KB |
| 310 |
1004.34KB |
| 311 |
146.96KB |
| 312 |
450.92KB |
| 313 |
733.53KB |
| 314 |
1.41MB |
| 315 |
1.59MB |
| 316 |
826.41KB |
| 317 |
1.03MB |
| 318 |
518.37KB |
| 32 |
1.04MB |
| 33 |
1.17MB |
| 34 |
1.69MB |
| 35 |
575.57KB |
| 36 |
136.25KB |
| 37 |
299.69KB |
| 38 |
763.14KB |
| 39 |
1.58MB |
| 4 |
1.08MB |
| 4. Auditing the Cloud (OBJ. 2.2).mp4 |
30.93MB |
| 4. Auditing the Cloud (OBJ. 2.2).srt |
10.48KB |
| 4. Beaconing (OBJ. 1.2).mp4 |
82.71MB |
| 4. Beaconing (OBJ. 1.2).srt |
29.88KB |
| 4. Cloud-based Infrastructure (OBJ. 1.1).mp4 |
53.03MB |
| 4. Cloud-based Infrastructure (OBJ. 1.1).srt |
18.13KB |
| 4. CVSS (OBJ. 2.3).mp4 |
38.24MB |
| 4. CVSS (OBJ. 2.3).srt |
20.14KB |
| 4. Data Criticality (OBJ. 3.3).mp4 |
123.99MB |
| 4. Data Criticality (OBJ. 3.3).srt |
32.05KB |
| 4. Data Normalization (OBJ. 1.1).mp4 |
49.27MB |
| 4. Data Normalization (OBJ. 1.1).srt |
17.89KB |
| 4. Detection and Analysis (OBJ. 3.2).mp4 |
35.32MB |
| 4. Detection and Analysis (OBJ. 3.2).srt |
15.98KB |
| 4. Dynamic Analysis (OBJ. 2.1).mp4 |
40.54MB |
| 4. Dynamic Analysis (OBJ. 2.1).srt |
19.82KB |
| 4. Email Content Analysis (OBJ. 1.3).mp4 |
19.28MB |
| 4. Email Content Analysis (OBJ. 1.3).srt |
8.88KB |
| 4. Embedded System Vulnerabilities (OBJ. 2.1 & 2.4).mp4 |
59.07MB |
| 4. Embedded System Vulnerabilities (OBJ. 2.1 & 2.4).srt |
17.07KB |
| 4. Encryption (OBJ. 1.1).mp4 |
20.34MB |
| 4. Encryption (OBJ. 1.1).srt |
7.78KB |
| 4. Eradication Actions (OBJ. 3.2).mp4 |
22.93MB |
| 4. Eradication Actions (OBJ. 3.2).srt |
10.21KB |
| 4. Golden Ticket (OBJ. 1.2).mp4 |
38.36MB |
| 4. Golden Ticket (OBJ. 1.2).srt |
15.83KB |
| 4. Hardening and Patching (OBJ. 2.5).mp4 |
62.13MB |
| 4. Hardening and Patching (OBJ. 2.5).srt |
29.11KB |
| 4. IAC (OBJ. 1.5).mp4 |
30.39MB |
| 4. IAC (OBJ. 1.5).srt |
10.58KB |
| 4. Intelligence Sources (OBJ. 1.4).mp4 |
47.86MB |
| 4. Intelligence Sources (OBJ. 1.4).srt |
22.45KB |
| 4. Legal Requirements (OBJ. 1.1 & 2.5).mp4 |
69.42MB |
| 4. Legal Requirements (OBJ. 1.1 & 2.5).srt |
22.82KB |
| 4. Malware (OBJ. 1.4 & 2.3).mp4 |
60.53MB |
| 4. Malware (OBJ. 1.4 & 2.3).srt |
17.48KB |
| 4. Memory Forensics (OBJ. 1.2).mp4 |
77.61MB |
| 4. Memory Forensics (OBJ. 1.2).srt |
15.93KB |
| 4. Nmap Port Scans (OBJ. 2.2).mp4 |
33.60MB |
| 4. Nmap Port Scans (OBJ. 2.2).srt |
13.97KB |
| 4. Open-source Intelligence (OBJ. 1.4).mp4 |
33.74MB |
| 4. Open-source Intelligence (OBJ. 1.4).srt |
7.70KB |
| 4. Overflow Attacks (OBJ. 2.4).mp4 |
93.38MB |
| 4. Overflow Attacks (OBJ. 2.4).srt |
32.80KB |
| 4. Proxy Logs (OBJ. 1.3).mp4 |
58.55MB |
| 4. Proxy Logs (OBJ. 1.3).srt |
14.54KB |
| 4. Quiz Introduction.html |
167B |
| 4. Reverse Engineering (OBJ. 1.3).mp4 |
73.63MB |
| 4. Reverse Engineering (OBJ. 1.3).srt |
27.07KB |
| 4. Risk-based Frameworks (OBJ. 2.1).mp4 |
36.59MB |
| 4. Risk-based Frameworks (OBJ. 2.1).srt |
10.80KB |
| 4. Risk Calculation (OBJ. 2.5).mp4 |
86.42MB |
| 4. Risk Calculation (OBJ. 2.5).srt |
40.96KB |
| 4. SAML (OBJ. 1.5).mp4 |
33.88MB |
| 4. SAML (OBJ. 1.5).srt |
15.98KB |
| 4. Scope Considerations (OBJ. 2.1).mp4 |
42.33MB |
| 4. Scope Considerations (OBJ. 2.1).srt |
20.84KB |
| 4. Security Control Categories (OBJ. 2.5).mp4 |
155.00MB |
| 4. Security Control Categories (OBJ. 2.5).srt |
47.04KB |
| 4. Segmentation (OBJ. 1.1).mp4 |
53.01MB |
| 4. Segmentation (OBJ. 1.1).srt |
14.66KB |
| 4. Service Interruptions (OBJ. 1.2).mp4 |
33.34MB |
| 4. Service Interruptions (OBJ. 1.2).srt |
11.81KB |
| 4. SQL Injection (OBJ. 2.4).mp4 |
48.84MB |
| 4. SQL Injection (OBJ. 2.4).srt |
17.50KB |
| 4. SSO and MFA (OBJ. 1.1).mp4 |
46.92MB |
| 4. SSO and MFA (OBJ. 1.1).srt |
15.06KB |
| 4. Trend Analysis (OBJ. 1.3).mp4 |
62.40MB |
| 4. Trend Analysis (OBJ. 1.3).srt |
25.94KB |
| 4. Trusted Firmware (OBJ. 2.4).mp4 |
28.45MB |
| 4. Trusted Firmware (OBJ. 2.4).srt |
12.15KB |
| 4. Wireshark (OBJ. 1.3).mp4 |
101.96MB |
| 4. Wireshark (OBJ. 1.3).srt |
25.74KB |
| 4. Work Product Retention (OBJ. 3.2).mp4 |
15.28MB |
| 4. Work Product Retention (OBJ. 3.2).srt |
6.98KB |
| 40 |
1.91MB |
| 41 |
1.27MB |
| 42 |
1.29MB |
| 43 |
1.30MB |
| 44 |
1.80MB |
| 45 |
454.81KB |
| 46 |
46.07KB |
| 47 |
793.99KB |
| 48 |
403.86KB |
| 49 |
319.71KB |
| 5 |
1022.50KB |
| 5. Application Logs (OBJ. 1.2).mp4 |
87.25MB |
| 5. Application Logs (OBJ. 1.2).srt |
26.31KB |
| 5. Business Impact Analysis (OBJ. 2.5).mp4 |
125.01MB |
| 5. Business Impact Analysis (OBJ. 2.5).srt |
30.11KB |
| 5. CASB (OBJ. 1.1).mp4 |
25.72MB |
| 5. CASB (OBJ. 1.1).srt |
11.04KB |
| 5. Certificate Management (OBJ. 1.1).mp4 |
17.91MB |
| 5. Certificate Management (OBJ. 1.1).srt |
9.61KB |
| 5. Communication Plan (OBJ. 3.3 & 4.2).mp4 |
57.49MB |
| 5. Communication Plan (OBJ. 3.3 & 4.2).srt |
17.40KB |
| 5. Conducting Cloud Audits (OBJ. 2.2).mp4 |
118.74MB |
| 5. Conducting Cloud Audits (OBJ. 2.2).srt |
30.34KB |
| 5. Consumption (OBJ. 1.2).mp4 |
61.46MB |
| 5. Consumption (OBJ. 1.2).srt |
21.67KB |
| 5. Data Acquisition (OBJ. 3.2).mp4 |
33.22MB |
| 5. Data Acquisition (OBJ. 3.2).srt |
12.84KB |
| 5. Data Loss Prevention (OBJ. 1.1).mp4 |
17.63MB |
| 5. Data Loss Prevention (OBJ. 1.1).srt |
10.89KB |
| 5. Data Policies (OBJ. 2.5).mp4 |
33.49MB |
| 5. Data Policies (OBJ. 2.5).srt |
14.16KB |
| 5. Email Server Security (OBJ. 1.3).mp4 |
40.61MB |
| 5. Email Server Security (OBJ. 1.3).srt |
18.84KB |
| 5. Event Log (OBJ. 1.1 & 1.3).mp4 |
18.77MB |
| 5. Event Log (OBJ. 1.1 & 1.3).srt |
8.23KB |
| 5. Flow Analysis (OBJ. 1.3).mp4 |
53.04MB |
| 5. Flow Analysis (OBJ. 1.3).srt |
14.91KB |
| 5. Google Hacking (OBJ. 1.4).mp4 |
46.46MB |
| 5. Google Hacking (OBJ. 1.4).srt |
16.68KB |
| 5. ICS & SCADA Vulnerabilities (OBJ. 2.1 & 2.4).mp4 |
52.55MB |
| 5. ICS & SCADA Vulnerabilities (OBJ. 2.1 & 2.4).srt |
19.79KB |
| 5. Impact Analysis (OBJ. 3.2).mp4 |
55.16MB |
| 5. Impact Analysis (OBJ. 3.2).srt |
18.40KB |
| 5. Industry Frameworks (OBJ. 2.1 & 3.1).mp4 |
106.05MB |
| 5. Industry Frameworks (OBJ. 2.1 & 3.1).srt |
35.97KB |
| 5. Information Sharing and Analysis Centers (ISACS) (OBJ. 1.4).mp4 |
30.14MB |
| 5. Information Sharing and Analysis Centers (ISACS) (OBJ. 1.4).srt |
9.63KB |
| 5. Interpreting CVSS (OBJ. 2.3).mp4 |
79.96MB |
| 5. Interpreting CVSS (OBJ. 2.3).srt |
23.14KB |
| 5. Irregular P2P Communications (OBJ. 1.2).mp4 |
87.87MB |
| 5. Irregular P2P Communications (OBJ. 1.2).srt |
17.15KB |
| 5. Jumpbox (OBJ. 1.1).mp4 |
27.08MB |
| 5. Jumpbox (OBJ. 1.1).srt |
13.12KB |
| 5. Lateral Movement (OBJ. 1.2).mp4 |
49.72MB |
| 5. Lateral Movement (OBJ. 1.2).srt |
15.45KB |
| 5. Machine Learning (OBJ. 1.5).mp4 |
72.67MB |
| 5. Machine Learning (OBJ. 1.5).srt |
21.50KB |
| 5. Malware Exploitation (OBJ. 1.3).mp4 |
41.75MB |
| 5. Malware Exploitation (OBJ. 1.3).srt |
19.29KB |
| 5. Nmap Port States (OBJ. 2.2).mp4 |
18.45MB |
| 5. Nmap Port States (OBJ. 2.2).srt |
8.77KB |
| 5. Race Conditions (OBJ. 2.5).mp4 |
45.05MB |
| 5. Race Conditions (OBJ. 2.5).srt |
14.44KB |
| 5. Recovery (OBJ. 3.2).mp4 |
22.70MB |
| 5. Recovery (OBJ. 3.2).srt |
6.29KB |
| 5. Remediation Issues (OBJ. 2.5 & 4.1).mp4 |
84.09MB |
| 5. Remediation Issues (OBJ. 2.5 & 4.1).srt |
22.29KB |
| 5. REST (OBJ. 1.5).mp4 |
57.50MB |
| 5. REST (OBJ. 1.5).srt |
24.04KB |
| 5. Rule and Query Writing (OBJ. 1.3).mp4 |
32.02MB |
| 5. Rule and Query Writing (OBJ. 1.3).srt |
10.46KB |
| 5. Scanner Types (OBJ. 2.1).mp4 |
65.55MB |
| 5. Scanner Types (OBJ. 2.1).srt |
22.88KB |
| 5. Secure Processing (OBJ. 2.4).mp4 |
20.84MB |
| 5. Secure Processing (OBJ. 2.4).srt |
9.39KB |
| 5. Selecting Security Controls (OBJ. 2.5).mp4 |
54.69MB |
| 5. Selecting Security Controls (OBJ. 2.5).srt |
11.83KB |
| 5. Threat Research (OBJ. 1.4).mp4 |
93.92MB |
| 5. Threat Research (OBJ. 1.4).srt |
25.35KB |
| 5. Web Application Firewall Logs (OBJ. 1.3).mp4 |
23.63MB |
| 5. Web Application Firewall Logs (OBJ. 1.3).srt |
6.39KB |
| 5. Web Application Scanners (OBJ. 2.2).mp4 |
26.43MB |
| 5. Web Application Scanners (OBJ. 2.2).srt |
7.62KB |
| 5. XML Vulnerabilities (OBJ. 2.4).mp4 |
40.13MB |
| 5. XML Vulnerabilities (OBJ. 2.4).srt |
11.96KB |
| 50 |
1.01MB |
| 51 |
380.82KB |
| 52 |
1.33MB |
| 53 |
1.74MB |
| 54 |
664.69KB |
| 55 |
1.37MB |
| 56 |
1.71MB |
| 57 |
297.97KB |
| 58 |
499.72KB |
| 59 |
591.15KB |
| 6 |
840.57KB |
| 6. APIs, Webhooks, and Plugins (OBJ. 1.5).mp4 |
92.96MB |
| 6. APIs, Webhooks, and Plugins (OBJ. 1.5).srt |
31.03KB |
| 6. Attack Frameworks (OBJ. 3.1).mp4 |
69.33MB |
| 6. Attack Frameworks (OBJ. 3.1).srt |
26.93KB |
| 6. Audits and Assessments (OBJ. 2.1).mp4 |
45.80MB |
| 6. Audits and Assessments (OBJ. 2.1).srt |
17.40KB |
| 6. Behavior Analysis (OBJ. 1.1 & 1.3).mp4 |
68.49MB |
| 6. Behavior Analysis (OBJ. 1.1 & 1.3).srt |
27.89KB |
| 6. Burp Suite (OBJ. 2.2).mp4 |
117.76MB |
| 6. Burp Suite (OBJ. 2.2).srt |
22.45KB |
| 6. Data Enrichment (OBJ. 1.5).mp4 |
26.79MB |
| 6. Data Enrichment (OBJ. 1.5).srt |
9.08KB |
| 6. Data Retention (OBJ. 2.5).mp4 |
50.49MB |
| 6. Data Retention (OBJ. 2.5).srt |
16.92KB |
| 6. Disk and File System (OBJ. 1.2).mp4 |
59.28MB |
| 6. Disk and File System (OBJ. 1.2).srt |
24.80KB |
| 6. DLP Discovery and Classification (OBJ. 1.1).mp4 |
19.42MB |
| 6. DLP Discovery and Classification (OBJ. 1.1).srt |
9.61KB |
| 6. Federation (OBJ. 1.1).mp4 |
22.73MB |
| 6. Federation (OBJ. 1.1).srt |
13.27KB |
| 6. Forensics Tools (OBJ. 3.2).mp4 |
46.81MB |
| 6. Forensics Tools (OBJ. 3.2).srt |
17.76KB |
| 6. IDS and IPS Configuration (OBJ. 1.3).mp4 |
43.34MB |
| 6. IDS and IPS Configuration (OBJ. 1.3).srt |
15.21KB |
| 6. Improper Error Handling (OBJ. 2.5).mp4 |
28.97MB |
| 6. Improper Error Handling (OBJ. 2.5).srt |
13.25KB |
| 6. Incident Classification (OBJ. 3.2).mp4 |
38.36MB |
| 6. Incident Classification (OBJ. 3.2).srt |
14.19KB |
| 6. IP and DNS Analysis (OBJ. 1.3).mp4 |
39.32MB |
| 6. IP and DNS Analysis (OBJ. 1.3).srt |
15.64KB |
| 6. Mitigating Vulnerabilities (OBJ. 2.1 & 2.4).mp4 |
19.19MB |
| 6. Mitigating Vulnerabilities (OBJ. 2.1 & 2.4).srt |
9.13KB |
| 6. New Accounts (OBJ. 1.2).mp4 |
36.10MB |
| 6. New Accounts (OBJ. 1.2).srt |
12.37KB |
| 6. Nmap Fingerprinting Scans (OBJ. 2.2).mp4 |
30.97MB |
| 6. Nmap Fingerprinting Scans (OBJ. 2.2).srt |
10.18KB |
| 6. Pivoting (OBJ. 1.2).mp4 |
31.07MB |
| 6. Pivoting (OBJ. 1.2).srt |
13.85KB |
| 6. Profiling Techniques (OBJ. 1.4).mp4 |
32.38MB |
| 6. Profiling Techniques (OBJ. 1.4).srt |
12.96KB |
| 6. Quiz Cloud and Automation.html |
167B |
| 6. Quiz Cloud Infrastructure Assessments.html |
167B |
| 6. Quiz Hardware Assurance Best Practices.html |
167B |
| 6. Quiz Identify Security Control Types.html |
167B |
| 6. Quiz Mitigating Vulnerabilities.html |
167B |
| 6. Recovery Actions (OBJ. 3.2).mp4 |
54.63MB |
| 6. Recovery Actions (OBJ. 3.2).srt |
15.67KB |
| 6. Reporting Requirements (OBJ. 3.3).mp4 |
33.57MB |
| 6. Reporting Requirements (OBJ. 3.3).srt |
11.67KB |
| 6. Risk Prioritization (OBJ. 2.5).mp4 |
153.18MB |
| 6. Risk Prioritization (OBJ. 2.5).srt |
42.91KB |
| 6. Rogue Devices (OBJ. 1.2).mp4 |
98.56MB |
| 6. Rogue Devices (OBJ. 1.2).srt |
27.71KB |
| 6. Scanning Parameters (OBJ. 2.1).mp4 |
33.19MB |
| 6. Scanning Parameters (OBJ. 2.1).srt |
16.93KB |
| 6. Searching and Piping Commands (OBJ. 1.3).mp4 |
91.44MB |
| 6. Searching and Piping Commands (OBJ. 1.3).srt |
40.98KB |
| 6. Secure Coding (OBJ. 2.5).mp4 |
56.52MB |
| 6. Secure Coding (OBJ. 2.5).srt |
21.52KB |
| 6. SMTP Log Analysis (OBJ. 1.3).mp4 |
33.90MB |
| 6. SMTP Log Analysis (OBJ. 1.3).srt |
12.82KB |
| 6. Syslog (OBJ. 1.1 & 1.3).mp4 |
34.36MB |
| 6. Syslog (OBJ. 1.1 & 1.3).srt |
15.02KB |
| 6. Threat Intelligence Sharing (OBJ. 1.4).mp4 |
36.94MB |
| 6. Threat Intelligence Sharing (OBJ. 1.4).srt |
11.99KB |
| 6. Virtualization (OBJ. 1.1).mp4 |
31.76MB |
| 6. Virtualization (OBJ. 1.1).srt |
15.11KB |
| 6. Vulnerability Reports (OBJ. 2.1 & 2.3).mp4 |
63.99MB |
| 6. Vulnerability Reports (OBJ. 2.1 & 2.3).srt |
29.01KB |
| 60 |
688.65KB |
| 61 |
1.41MB |
| 62 |
1.51MB |
| 63 |
1.00MB |
| 64 |
266.91KB |
| 65 |
464.99KB |
| 66 |
1.84MB |
| 67 |
13.36KB |
| 68 |
661.87KB |
| 69 |
969.76KB |
| 7 |
1.10MB |
| 7. Authentication Attacks (OBJ. 2.4 & 2.5).mp4 |
43.90MB |
| 7. Authentication Attacks (OBJ. 2.4 & 2.5).srt |
18.21KB |
| 7. Communicating Risk (OBJ. 2.5 & 4.1).mp4 |
51.49MB |
| 7. Communicating Risk (OBJ. 2.5 & 4.1).srt |
21.44KB |
| 7. Configuring a SIEM Agent (OBJ. 1.3).mp4 |
152.90MB |
| 7. Configuring a SIEM Agent (OBJ. 1.3).srt |
41.54KB |
| 7. Continuous Monitoring (OBJ. 2.1).mp4 |
40.47MB |
| 7. Continuous Monitoring (OBJ. 2.1).srt |
12.38KB |
| 7. Data Ownership (OBJ. 2.5).mp4 |
28.32MB |
| 7. Data Ownership (OBJ. 2.5).srt |
9.61KB |
| 7. Deidentification Controls (OBJ. 1.1).mp4 |
52.46MB |
| 7. Deidentification Controls (OBJ. 1.1).srt |
15.87KB |
| 7. Design Vulnerabilities (OBJ. 2.4).mp4 |
22.12MB |
| 7. Design Vulnerabilities (OBJ. 2.4).srt |
10.32KB |
| 7. Email Message Security (OBJ. 1.3).mp4 |
35.23MB |
| 7. Email Message Security (OBJ. 1.3).srt |
15.06KB |
| 7. Harvesting Techniques (OBJ. 1.3).mp4 |
23.74MB |
| 7. Harvesting Techniques (OBJ. 1.3).srt |
7.94KB |
| 7. IDS and IPS Logs (OBJ. 1.3).mp4 |
61.64MB |
| 7. IDS and IPS Logs (OBJ. 1.3).srt |
21.57KB |
| 7. Indicator Management (OBJ. 1.4).mp4 |
41.83MB |
| 7. Indicator Management (OBJ. 1.4).srt |
15.95KB |
| 7. Malware Analysis (demo) (OBJ. 1.3).mp4 |
200.88MB |
| 7. Malware Analysis (demo) (OBJ. 1.3).srt |
51.91KB |
| 7. Memory Acquisition (OBJ. 3.2).mp4 |
27.43MB |
| 7. Memory Acquisition (OBJ. 3.2).srt |
12.82KB |
| 7. Nessus (OBJ. 2.2).mp4 |
42.52MB |
| 7. Nessus (OBJ. 2.2).srt |
17.09KB |
| 7. OWASP ZAP (OBJ. 2.2).mp4 |
28.00MB |
| 7. OWASP ZAP (OBJ. 2.2).srt |
6.46KB |
| 7. Passwordless Authentication (OBJ. 1.1).mp4 |
39.93MB |
| 7. Passwordless Authentication (OBJ. 1.1).srt |
12.26KB |
| 7. Post-Incident Activities (OBJ. 3.3 & 4.2).mp4 |
49.91MB |
| 7. Post-Incident Activities (OBJ. 3.3 & 4.2).srt |
13.95KB |
| 7. Premise System Vulnerabilities (OBJ. 2.1 & 2.4).mp4 |
51.60MB |
| 7. Premise System Vulnerabilities (OBJ. 2.1 & 2.4).srt |
15.62KB |
| 7. Quiz Analyzing Lateral Movement and Pivoting IOCs.html |
167B |
| 7. Quiz Detection and Containment.html |
167B |
| 7. Quiz Threat Intelligence.html |
167B |
| 7. Response Coordination (OBJ. 3.3).mp4 |
51.33MB |
| 7. Response Coordination (OBJ. 3.3).srt |
18.33KB |
| 7. Scans and Sweeps (OBJ. 1.2).mp4 |
34.89MB |
| 7. Scans and Sweeps (OBJ. 1.2).srt |
13.57KB |
| 7. Scheduling and Constraints (OBJ. 2.1).mp4 |
69.71MB |
| 7. Scheduling and Constraints (OBJ. 2.1).srt |
22.84KB |
| 7. Scripting (OBJ. 1.3 & 1.5).mp4 |
32.08MB |
| 7. Scripting (OBJ. 1.3 & 1.5).srt |
10.97KB |
| 7. Scripting Tools (OBJ. 1.3).mp4 |
46.79MB |
| 7. Scripting Tools (OBJ. 1.3).srt |
20.89KB |
| 7. SOAR (OBJ. 1.5).mp4 |
28.18MB |
| 7. SOAR (OBJ. 1.5).srt |
8.09KB |
| 7. Unauthorized Privilege (OBJ. 1.2).mp4 |
36.90MB |
| 7. Unauthorized Privilege (OBJ. 1.2).srt |
12.23KB |
| 7. URL Analysis (OBJ. 1.3).mp4 |
74.99MB |
| 7. URL Analysis (OBJ. 1.3).srt |
38.79KB |
| 7. Using Nmap (OBJ. 2.2).mp4 |
92.31MB |
| 7. Using Nmap (OBJ. 2.2).srt |
21.94KB |
| 7. Virtualization Forensics (OBJ. 3.2).mp4 |
31.68MB |
| 7. Virtualization Forensics (OBJ. 3.2).srt |
12.93KB |
| 7. Virtualized Infrastructure (OBJ. 1.1).mp4 |
36.84MB |
| 7. Virtualized Infrastructure (OBJ. 1.1).srt |
17.62KB |
| 70 |
1.01MB |
| 71 |
1.60MB |
| 72 |
1.87MB |
| 73 |
1.88MB |
| 74 |
1.98MB |
| 75 |
370.66KB |
| 76 |
434.78KB |
| 77 |
523.90KB |
| 78 |
554.39KB |
| 79 |
1.13MB |
| 8 |
1.44MB |
| 8. AbuseIPDB (OBJ. 1.3).mp4 |
23.79MB |
| 8. AbuseIPDB (OBJ. 1.3).srt |
8.66KB |
| 8. Analyzing, Filtering, and Searching Logs (OBJ. 1.3).mp4 |
79.22MB |
| 8. Analyzing, Filtering, and Searching Logs (OBJ. 1.3).srt |
17.60KB |
| 8. Analyzing Email Headers (OBJ. 1.3).mp4 |
32.77MB |
| 8. Analyzing Email Headers (OBJ. 1.3).srt |
9.56KB |
| 8. Analyzing Web Applications (OBJ. 2.2).mp4 |
150.56MB |
| 8. Analyzing Web Applications (OBJ. 2.2).srt |
34.39KB |
| 8. Business Continuity Plan (OBJ. 3.3).mp4 |
130.06MB |
| 8. Business Continuity Plan (OBJ. 3.3).srt |
34.17KB |
| 8. Conduct Packet Analysis (OBJ. 1.3).mp4 |
82.20MB |
| 8. Conduct Packet Analysis (OBJ. 1.3).srt |
12.11KB |
| 8. Data Sharing (OBJ. 2.5).mp4 |
51.36MB |
| 8. Data Sharing (OBJ. 2.5).srt |
13.97KB |
| 8. Disk Image Acquisition (OBJ. 3.2).mp4 |
67.00MB |
| 8. Disk Image Acquisition (OBJ. 3.2).srt |
28.91KB |
| 8. DRM and Watermarking (OBJ. 1.1).mp4 |
32.88MB |
| 8. DRM and Watermarking (OBJ. 1.1).srt |
10.50KB |
| 8. EDR Configuration (OBJ. 1.3).mp4 |
40.67MB |
| 8. EDR Configuration (OBJ. 1.3).srt |
11.45KB |
| 8. Honeypots (OBJ. 1.4).mp4 |
48.18MB |
| 8. Honeypots (OBJ. 1.4).srt |
16.49KB |
| 8. Hping (OBJ. 2.2).mp4 |
27.67MB |
| 8. Hping (OBJ. 2.2).srt |
12.96KB |
| 8. Lessons Learned (OBJ. 3.3 & 4.2).mp4 |
61.49MB |
| 8. Lessons Learned (OBJ. 3.3 & 4.2).srt |
17.07KB |
| 8. Mobile Forensics (OBJ. 3.2).mp4 |
98.88MB |
| 8. Mobile Forensics (OBJ. 3.2).srt |
26.23KB |
| 8. Nonstandard Port Usage (OBJ. 1.2).mp4 |
51.03MB |
| 8. Nonstandard Port Usage (OBJ. 1.2).srt |
25.79KB |
| 8. OpenVAS and Qualys (OBJ. 2.2).mp4 |
29.73MB |
| 8. OpenVAS and Qualys (OBJ. 2.2).srt |
7.78KB |
| 8. Platform Best Practices (OBJ. 2.5).mp4 |
43.00MB |
| 8. Platform Best Practices (OBJ. 2.5).srt |
16.23KB |
| 8. Port Security Configuration (OBJ. 1.1).mp4 |
44.29MB |
| 8. Port Security Configuration (OBJ. 1.1).srt |
13.70KB |
| 8. Privilege Management (OBJ. 1.1).mp4 |
41.35MB |
| 8. Privilege Management (OBJ. 1.1).srt |
14.47KB |
| 8. Quiz Classifying Threat.html |
167B |
| 8. Quiz Configuring Your SIEM.html |
167B |
| 8. Quiz Frameworks, Policies, and Procedures.html |
167B |
| 8. Session Hijacking (OBJ. 2.4 & 2.5).mp4 |
60.42MB |
| 8. Session Hijacking (OBJ. 2.4 & 2.5).srt |
17.14KB |
| 8. Standardized Processes (OBJ. 1.5).mp4 |
28.45MB |
| 8. Standardized Processes (OBJ. 1.5).srt |
9.52KB |
| 8. Training and Exercises (OBJ. 2.5).mp4 |
35.04MB |
| 8. Training and Exercises (OBJ. 2.5).srt |
12.59KB |
| 8. Unauthorized Software (OBJ. 1.2).mp4 |
37.73MB |
| 8. Unauthorized Software (OBJ. 1.2).srt |
12.60KB |
| 8. Vehicular Vulnerabilities (OBJ. 2.1 & 2.4).mp4 |
48.30MB |
| 8. Vehicular Vulnerabilities (OBJ. 2.1 & 2.4).srt |
17.68KB |
| 8. Vulnerability Feeds (OBJ. 2.1).mp4 |
28.97MB |
| 8. Vulnerability Feeds (OBJ. 2.1).srt |
8.39KB |
| 8. Workflow Orchestration (OBJ. 1.5).mp4 |
32.84MB |
| 8. Workflow Orchestration (OBJ. 1.5).srt |
16.02KB |
| 80 |
1.30MB |
| 81 |
1.47MB |
| 82 |
1.58MB |
| 83 |
1.87MB |
| 84 |
566.98KB |
| 85 |
734.13KB |
| 86 |
954.38KB |
| 87 |
1.45MB |
| 88 |
372.11KB |
| 89 |
514.30KB |
| 9 |
1.96MB |
| 9. Analyzing Share Permissions (OBJ. 1.1).mp4 |
22.33MB |
| 9. Analyzing Share Permissions (OBJ. 1.1).srt |
6.73KB |
| 9. Angry IP Scanner (OBJ. 2.2).mp4 |
29.98MB |
| 9. Angry IP Scanner (OBJ. 2.2).srt |
8.72KB |
| 9. Assessing Scan Outputs (OBJ. 2.2 & 2.3).mp4 |
94.54MB |
| 9. Assessing Scan Outputs (OBJ. 2.2 & 2.3).srt |
31.17KB |
| 9. Block Lists and Allow Lists (OBJ. 1.1).mp4 |
70.63MB |
| 9. Block Lists and Allow Lists (OBJ. 1.1).srt |
27.11KB |
| 9. Deep Web and Dark Web (OBJ. 1.4).mp4 |
29.69MB |
| 9. Deep Web and Dark Web (OBJ. 1.4).srt |
10.52KB |
| 9. FAAS and Serverless (OBJ. 1.1).mp4 |
50.18MB |
| 9. FAAS and Serverless (OBJ. 1.1).srt |
20.13KB |
| 9. Hashing (OBJ. 1.3 & 3.2).mp4 |
31.84MB |
| 9. Hashing (OBJ. 1.3 & 3.2).srt |
10.56KB |
| 9. IAM Auditing (OBJ. 1.1).mp4 |
31.30MB |
| 9. IAM Auditing (OBJ. 1.1).srt |
15.42KB |
| 9. Metasploit Framework (OBJ. 2.2).mp4 |
137.37MB |
| 9. Metasploit Framework (OBJ. 2.2).srt |
37.12KB |
| 9. NAC Configuration (OBJ. 1.1).mp4 |
38.08MB |
| 9. NAC Configuration (OBJ. 1.1).srt |
16.91KB |
| 9. Quiz Analyzing Application Assessments.html |
167B |
| 9. Quiz Analyzing Application-related IOCs.html |
167B |
| 9. Quiz Analyzing Your SIEM.html |
167B |
| 9. Quiz Email Monitoring.html |
167B |
| 9. Quiz Network Forensics.html |
167B |
| 9. Quiz Non-technical Data and Privacy Controls.html |
167B |
| 9. Quiz Risk Mitigation.html |
167B |
| 9. Quiz Specialized Technology.html |
167B |
| 9. Root Cause Analysis (OBJ. 3.3 & 4.2).mp4 |
36.64MB |
| 9. Root Cause Analysis (OBJ. 3.3 & 4.2).srt |
10.50KB |
| 9. Scan Sensitivity (OBJ. 2.1).mp4 |
26.87MB |
| 9. Scan Sensitivity (OBJ. 2.1).srt |
12.97KB |
| 9. Server-Side Request Forgery (OBJ. 2.4).mp4 |
53.88MB |
| 9. Server-Side Request Forgery (OBJ. 2.4).srt |
9.87KB |
| 9. Single Pane of Glass (OBJ. 1.5).mp4 |
40.55MB |
| 9. Single Pane of Glass (OBJ. 1.5).srt |
14.39KB |
| 9. TCP Ports (OBJ. 1.2).mp4 |
46.67MB |
| 9. TCP Ports (OBJ. 1.2).srt |
16.87KB |
| 9. Training and Testing (OBJ. 3.3).mp4 |
42.70MB |
| 9. Training and Testing (OBJ. 3.3).srt |
16.10KB |
| 9. Unauthorized ChangeHardware (OBJ. 1.2).mp4 |
17.02MB |
| 9. Unauthorized ChangeHardware (OBJ. 1.2).srt |
6.67KB |
| 9. Zero Trust (OBJ. 1.1).mp4 |
63.05MB |
| 9. Zero Trust (OBJ. 1.1).srt |
15.78KB |
| 90 |
525.87KB |
| 91 |
1.48MB |
| 92 |
1.69MB |
| 93 |
222.92KB |
| 94 |
855.92KB |
| 95 |
1.31MB |
| 96 |
1.37MB |
| 97 |
1.81MB |
| 98 |
125.73KB |
| 99 |
901.21KB |
| TutsNode.net.txt |
63B |