Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[CourserHub.com].url |
123б |
[CourserHub.com].url |
123б |
01__01-intro.html |
63.28Кб |
01__16-software-updates.html |
25.52Кб |
01__2-4-3.html |
8.64Кб |
01__5.2 |
5.39Кб |
01__55.html |
42.49Кб |
01__5-signs-youve-been-hit-with-an-apt.html |
172.48Кб |
01__7.1 |
11.66Кб |
01__7.2 |
7.50Кб |
01__7.5 |
8.17Кб |
01__aa494182vexchg.140 |
33.94Кб |
01__article.asp |
62.82Кб |
01 Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf |
1.22Мб |
01__bootup.html |
8.15Кб |
01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf |
142.37Кб |
01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf |
360.21Кб |
01__cis-controls-and-the-hph.pdf |
1.49Мб |
01__Course_1_glossary.docx |
858.74Кб |
01__Course_2_glossary.docx |
858.52Кб |
01__Course_3_glossary.docx |
857.56Кб |
01__Course_4_glossary.docx |
1.12Мб |
01__Course_5_glossary.docx |
862.38Кб |
01__Course_6_glossary.docx |
859.78Кб |
01__Course_7_glossary.docx |
869.87Кб |
01__Course_8_glossary.docx |
1.11Мб |
01__csos-guide-to-phishing-and-phishing-kits.html |
155.82Кб |
01__Cyber-Incident-Response-Standard.docx |
63.29Кб |
01__display.cfm |
37.04Кб |
01__dod85.pdf |
239.72Кб |
01__encryption-explained.html |
45.23Кб |
01 Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 508C pdf |
1.09Мб |
01__Format-Security-plus-Study-Guide.pdf |
16.83Кб |
01__FULL_TEXT.pdf |
1.41Мб |
01__functions.html |
269.11Кб |
01__gcat_threathorizons_full_sept2022.pdf |
2.97Мб |
01 gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations html |
155.44Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.15Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26Кб |
01__Google_Cybersecurity_Certificate_glossary.docx |
879.26Кб |
01__guidelines.html |
17.43Кб |
01 hashing-explained-why-its-your-best-bet-to-protect-stored-passwords html |
159.54Кб |
01__hipaa.html |
195.91Кб |
01__hipaa.html |
195.91Кб |
01__index.html |
32.52Кб |
01__index.html |
1.60Мб |
01__index.html |
21.33Кб |
01__index.html |
22.90Кб |
01__IntroToCybersecurityEthics.pdf |
578.32Кб |
01__Linux-in-a-Nutshell-6th-Edition.pdf |
12.42Мб |
01__malware.html |
211.67Кб |
01__ncsam_eskimming_508.pdf |
780.84Кб |
01__network-operations-center.html |
219.59Кб |
01__nist_small_business_fundamentals_july_2019.pptx |
4.16Мб |
01__NIST.FIPS.140-3.pdf |
303.35Кб |
01__NIST.SP.800-218.pdf |
722.55Кб |
01__NIST.SP.800-53r5.pdf |
5.79Мб |
01__nist.sp.800-61r2.pdf |
1.47Мб |
01__nist.sp.800-61r2.pdf |
1.47Мб |
01__nistspecialpublication800-92.pdf |
1.68Мб |
01__operating-system2.htm |
153.60Кб |
01__overview.html |
636.47Кб |
01__paper.pdf |
196.74Кб |
01__physical-access-control.pdf |
6.95Мб |
01__question525.htm |
170.30Кб |
01__R0239.pdf |
220.58Кб |
01__R46536.pdf |
1.29Мб |
01__RAID4.pdf |
284.66Кб |
01__resources.html |
18.57Кб |
01__resources.html |
6.55Кб |
01__resources.html |
108.50Кб |
01__resources.html |
60.18Кб |
01__resources.html |
6.49Кб |
01__resources.html |
15.95Кб |
01__resources.html |
8.76Кб |
01__resources.html |
18.68Кб |
01__resources.html |
6.55Кб |
01__resources.html |
6.49Кб |
01__resources.html |
6.99Кб |
01__resources.html |
15.95Кб |
01__resources.html |
8.76Кб |
01__resources.html |
18.58Кб |
01__resources.html |
6.55Кб |
01__resources.html |
108.50Кб |
01__resources.html |
6.49Кб |
01__resources.html |
37.05Кб |
01__resources.html |
15.95Кб |
01__resources.html |
8.76Кб |
01__resources.html |
19.42Кб |
01__resources.html |
6.49Кб |
01__resources.html |
28.11Кб |
01__resources.html |
6.55Кб |
01__resources.html |
15.95Кб |
01__resources.html |
18.57Кб |
01__resources.html |
6.55Кб |
01__resources.html |
108.51Кб |
01__resources.html |
108.50Кб |
01__resources.html |
6.48Кб |
01__resources.html |
19.77Кб |
01__resources.html |
15.95Кб |
01__resources.html |
8.76Кб |
01__resources.html |
18.59Кб |
01__resources.html |
6.55Кб |
01__resources.html |
6.49Кб |
01__resources.html |
33.05Кб |
01__resources.html |
15.95Кб |
01__resources.html |
8.76Кб |
01__resources.html |
18.56Кб |
01__resources.html |
6.55Кб |
01__resources.html |
6.45Кб |
01__resources.html |
17.59Кб |
01__resources.html |
15.95Кб |
01__resources.html |
8.76Кб |
01__resources.html |
18.56Кб |
01__resources.html |
6.43Кб |
01__resources.html |
11.47Кб |
01__resources.html |
6.55Кб |
01__resources.html |
15.95Кб |
01__resources.html |
8.75Кб |
01__rules-and-security-requirements.html |
74.82Кб |
01__ShellIntro.pdf |
124.26Кб |
01__sp800-179r1-draft.pdf |
1.82Мб |
01__sql_injection.asp |
110.14Кб |
01__ssrf-attacks-explained-and-how-to-defend-against-them.html |
155.61Кб |
01__subsection3.1.html |
4.33Кб |
01__suricata-update.html |
23.48Кб |
01__suricata-yaml.html |
236.66Кб |
01__tcpdump.1.html |
72.58Кб |
01__thegnuproject.html |
65.07Кб |
01__the-pyramid-of-pain.html |
67.09Кб |
01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf |
1.23Мб |
01__vol01iss13.cfm |
45.52Кб |
01__vulnerability-vs-threat-vs-risk.html |
76.72Кб |
01__what-is-a-firewall.html |
61.35Кб |
01__what-is-cve-its-definition-and-purpose.html |
169.18Кб |
01__what-is-owasp-top-10.html |
247.53Кб |
01__what-is-phishing-examples-types-and-techniques.html |
161.47Кб |
01__why-splunk.html |
227.46Кб |
01__why-splunk.html |
227.45Кб |
01__xml_whatis.asp |
89.39Кб |
01_access-a-text-file-in-python.en.srt |
4.03Кб |
01_access-a-text-file-in-python.en.txt |
2.51Кб |
01_access-a-text-file-in-python.mp4 |
10.51Мб |
01_access-controls-and-authentication-systems.en.srt |
6.18Кб |
01_access-controls-and-authentication-systems.en.txt |
3.93Кб |
01_access-controls-and-authentication-systems.mp4 |
18.28Мб |
01_a-proactive-approach-to-security.en.srt |
4.94Кб |
01_a-proactive-approach-to-security.en.txt |
3.12Кб |
01_a-proactive-approach-to-security.mp4 |
17.07Мб |
01_assets-in-a-digital-world.en.srt |
6.62Кб |
01_assets-in-a-digital-world.en.txt |
3.54Кб |
01_assets-in-a-digital-world.mp4 |
17.96Мб |
01_basic-queries.en.srt |
4.66Кб |
01_basic-queries.en.txt |
2.48Кб |
01_basic-queries.mp4 |
8.95Мб |
01_clear-and-concise-communication.en.srt |
3.65Кб |
01_clear-and-concise-communication.en.txt |
1.97Кб |
01_clear-and-concise-communication.mp4 |
12.14Мб |
01_conditional-statements-in-python.en.srt |
9.67Кб |
01_conditional-statements-in-python.en.txt |
6.16Кб |
01_conditional-statements-in-python.mp4 |
17.68Мб |
01_core-skills-for-cybersecurity-professionals.en.srt |
7.63Кб |
01_core-skills-for-cybersecurity-professionals.en.txt |
4.08Кб |
01_core-skills-for-cybersecurity-professionals.mp4 |
19.32Мб |
01_course-wrap-up.en.srt |
4.42Кб |
01_course-wrap-up.en.srt |
3.55Кб |
01_course-wrap-up.en.srt |
3.58Кб |
01_course-wrap-up.en.srt |
2.98Кб |
01_course-wrap-up.en.srt |
2.31Кб |
01_course-wrap-up.en.srt |
1.92Кб |
01_course-wrap-up.en.srt |
2.94Кб |
01_course-wrap-up.en.txt |
2.73Кб |
01_course-wrap-up.en.txt |
1.86Кб |
01_course-wrap-up.en.txt |
1.86Кб |
01_course-wrap-up.en.txt |
1.63Кб |
01_course-wrap-up.en.txt |
1.25Кб |
01_course-wrap-up.en.txt |
1.24Кб |
01_course-wrap-up.en.txt |
1.86Кб |
01_course-wrap-up.mp4 |
17.66Мб |
01_course-wrap-up.mp4 |
11.84Мб |
01_course-wrap-up.mp4 |
5.84Мб |
01_course-wrap-up.mp4 |
7.71Мб |
01_course-wrap-up.mp4 |
3.76Мб |
01_course-wrap-up.mp4 |
5.22Мб |
01_course-wrap-up.mp4 |
6.64Мб |
01_cross-site-scripting.en.srt |
7.31Кб |
01_cross-site-scripting.en.txt |
4.50Кб |
01_cross-site-scripting.mp4 |
21.50Мб |
01_damar-my-journey-into-linux-commands.en.srt |
3.69Кб |
01_damar-my-journey-into-linux-commands.en.txt |
2.28Кб |
01_damar-my-journey-into-linux-commands.mp4 |
13.58Мб |
01_data-types-in-python.en.srt |
7.60Кб |
01_data-types-in-python.en.txt |
3.91Кб |
01_data-types-in-python.mp4 |
19.40Мб |
01_debugging-strategies.en.srt |
8.46Кб |
01_debugging-strategies.en.txt |
4.43Кб |
01_debugging-strategies.mp4 |
23.10Мб |
01_denial-of-service-dos-attacks.en.srt |
7.83Кб |
01_denial-of-service-dos-attacks.en.txt |
4.21Кб |
01_denial-of-service-dos-attacks.mp4 |
18.55Мб |
01_detect-and-protect-without-neglect.en.srt |
5.74Кб |
01_detect-and-protect-without-neglect.en.txt |
3.09Кб |
01_detect-and-protect-without-neglect.mp4 |
18.60Мб |
01_develop-an-elevator-pitch.en.srt |
4.48Кб |
01_develop-an-elevator-pitch.en.txt |
2.86Кб |
01_develop-an-elevator-pitch.mp4 |
13.00Мб |
01_elements-of-a-security-plan.en.srt |
6.19Кб |
01_elements-of-a-security-plan.en.txt |
3.98Кб |
01_elements-of-a-security-plan.mp4 |
20.22Мб |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt |
4.72Кб |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt |
3.10Кб |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 |
14.69Мб |
01_ethics-in-cybersecurity.en.srt |
6.56Кб |
01_ethics-in-cybersecurity.en.txt |
4.14Кб |
01_ethics-in-cybersecurity.mp4 |
22.54Мб |
01_explore-common-siem-tools.en.srt |
4.35Кб |
01_explore-common-siem-tools.en.txt |
2.83Кб |
01_explore-common-siem-tools.mp4 |
14.71Мб |
01_explore-the-cia-triad.en.srt |
4.80Кб |
01_explore-the-cia-triad.en.txt |
3.08Кб |
01_explore-the-cia-triad.mp4 |
14.74Мб |
01_explore-the-interview-process.en.srt |
6.36Кб |
01_explore-the-interview-process.en.txt |
3.42Кб |
01_explore-the-interview-process.mp4 |
14.00Мб |
01_file-permissions-and-ownership.en.srt |
11.06Кб |
01_file-permissions-and-ownership.en.txt |
5.80Кб |
01_file-permissions-and-ownership.mp4 |
16.73Мб |
01_filter-dates-and-numbers.en.srt |
5.14Кб |
01_filter-dates-and-numbers.en.txt |
3.19Кб |
01_filter-dates-and-numbers.mp4 |
10.99Мб |
01_find-what-you-need-with-linux.en.srt |
7.57Кб |
01_find-what-you-need-with-linux.en.txt |
3.91Кб |
01_find-what-you-need-with-linux.mp4 |
10.67Мб |
01_firewalls-and-network-security-measures.en.srt |
7.40Кб |
01_firewalls-and-network-security-measures.en.txt |
3.95Кб |
01_firewalls-and-network-security-measures.mp4 |
16.81Мб |
01_from-simple-activity-to-major-data-breach.en.srt |
5.47Кб |
01_from-simple-activity-to-major-data-breach.en.txt |
2.89Кб |
01_from-simple-activity-to-major-data-breach.mp4 |
18.28Мб |
01_fundamentals-of-cryptography.en.srt |
5.94Кб |
01_fundamentals-of-cryptography.en.txt |
3.76Кб |
01_fundamentals-of-cryptography.mp4 |
22.57Мб |
01_gui-versus-cli.en.srt |
6.97Кб |
01_gui-versus-cli.en.txt |
3.73Кб |
01_gui-versus-cli.mp4 |
14.08Мб |
01_incident-response-teams.en.srt |
4.62Кб |
01_incident-response-teams.en.txt |
2.91Кб |
01_incident-response-teams.mp4 |
12.44Мб |
01_incident-response-tools.en.srt |
2.81Кб |
01_incident-response-tools.en.txt |
1.53Кб |
01_incident-response-tools.mp4 |
5.42Мб |
01_inside-the-operating-system.en.srt |
5.76Кб |
01_inside-the-operating-system.en.txt |
3.11Кб |
01_inside-the-operating-system.mp4 |
10.46Мб |
01_introduction-to-course-2.en.srt |
2.38Кб |
01_introduction-to-course-2.en.txt |
1.49Кб |
01_introduction-to-course-2.mp4 |
7.91Мб |
01_introduction-to-course-3.en.srt |
1.75Кб |
01_introduction-to-course-3.en.txt |
1.10Кб |
01_introduction-to-course-3.mp4 |
3.60Мб |
01_introduction-to-course-4.en.srt |
3.92Кб |
01_introduction-to-course-4.en.txt |
2.07Кб |
01_introduction-to-course-4.mp4 |
8.66Мб |
01_introduction-to-course-5.en.srt |
4.40Кб |
01_introduction-to-course-5.en.txt |
2.78Кб |
01_introduction-to-course-5.mp4 |
16.06Мб |
01_introduction-to-course-6.en.srt |
4.11Кб |
01_introduction-to-course-6.en.txt |
2.20Кб |
01_introduction-to-course-6.mp4 |
7.20Мб |
01_introduction-to-course-7.en.srt |
4.79Кб |
01_introduction-to-course-7.en.txt |
3.01Кб |
01_introduction-to-course-7.mp4 |
18.04Мб |
01_introduction-to-course-8.en.srt |
3.85Кб |
01_introduction-to-course-8.en.txt |
2.40Кб |
01_introduction-to-course-8.mp4 |
13.12Мб |
01_introduction-to-cybersecurity.en.srt |
7.14Кб |
01_introduction-to-cybersecurity.en.txt |
3.83Кб |
01_introduction-to-cybersecurity.mp4 |
23.11Мб |
01_introduction-to-linux-sql-and-python.en.srt |
5.13Кб |
01_introduction-to-linux-sql-and-python.en.txt |
2.75Кб |
01_introduction-to-linux-sql-and-python.mp4 |
14.49Мб |
01_introduction-to-network-communication.en.srt |
3.67Кб |
01_introduction-to-network-communication.en.txt |
2.35Кб |
01_introduction-to-network-communication.mp4 |
7.25Мб |
01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt |
5.27Кб |
01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt |
3.32Кб |
01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 |
18.32Мб |
01_introduction-to-the-shell.en.srt |
2.68Кб |
01_introduction-to-the-shell.en.txt |
1.66Кб |
01_introduction-to-the-shell.mp4 |
5.98Мб |
01_ip-addresses-and-network-communication.en.srt |
4.16Кб |
01_ip-addresses-and-network-communication.en.txt |
2.21Кб |
01_ip-addresses-and-network-communication.mp4 |
7.31Мб |
01_join-tables-in-sql.en.srt |
8.47Кб |
01_join-tables-in-sql.en.txt |
4.54Кб |
01_join-tables-in-sql.mp4 |
12.29Мб |
01_linux-distributions.en.srt |
4.25Кб |
01_linux-distributions.en.txt |
2.63Кб |
01_linux-distributions.mp4 |
10.30Мб |
01_list-operations-in-python.en.srt |
8.29Кб |
01_list-operations-in-python.en.txt |
5.15Кб |
01_list-operations-in-python.mp4 |
19.31Мб |
01_malicious-packet-sniffing.en.srt |
8.04Кб |
01_malicious-packet-sniffing.en.txt |
4.29Кб |
01_malicious-packet-sniffing.mp4 |
19.32Мб |
01_malicious-software.en.srt |
7.57Кб |
01_malicious-software.en.txt |
4.06Кб |
01_malicious-software.mp4 |
24.52Мб |
01_modules-and-libraries.en.srt |
3.25Кб |
01_modules-and-libraries.en.txt |
2.04Кб |
01_modules-and-libraries.mp4 |
11.35Мб |
01_network-hardening-practices.en.srt |
6.19Кб |
01_network-hardening-practices.en.txt |
3.31Кб |
01_network-hardening-practices.mp4 |
16.90Мб |
01_network-security-in-the-cloud.en.srt |
2.82Кб |
01_network-security-in-the-cloud.en.txt |
1.84Кб |
01_network-security-in-the-cloud.mp4 |
9.73Мб |
01_nist-frameworks.en.srt |
6.85Кб |
01_nist-frameworks.en.txt |
3.64Кб |
01_nist-frameworks.mp4 |
18.00Мб |
01_os-hardening-practices.en.srt |
7.52Кб |
01_os-hardening-practices.en.txt |
3.97Кб |
01_os-hardening-practices.mp4 |
18.03Мб |
01_owasp-security-principles.en.srt |
6.59Кб |
01_owasp-security-principles.en.txt |
3.51Кб |
01_owasp-security-principles.mp4 |
19.09Мб |
01_packet-captures-with-tcpdump.en.srt |
6.99Кб |
01_packet-captures-with-tcpdump.en.txt |
3.68Кб |
01_packet-captures-with-tcpdump.mp4 |
9.30Мб |
01_packets-and-packet-captures.en.srt |
5.11Кб |
01_packets-and-packet-captures.en.txt |
2.76Кб |
01_packets-and-packet-captures.mp4 |
10.23Мб |
01_prepare-to-escalate-through-security-recognition.en.srt |
5.55Кб |
01_prepare-to-escalate-through-security-recognition.en.txt |
2.94Кб |
01_prepare-to-escalate-through-security-recognition.mp4 |
17.27Мб |
01_protect-all-entry-points.en.srt |
5.74Кб |
01_protect-all-entry-points.en.txt |
3.59Кб |
01_protect-all-entry-points.mp4 |
22.54Мб |
01_recap-of-the-google-cybersecurity-certificate-program.en.srt |
3.91Кб |
01_recap-of-the-google-cybersecurity-certificate-program.en.txt |
2.13Кб |
01_recap-of-the-google-cybersecurity-certificate-program.mp4 |
8.85Мб |
01_reexamine-siem-tools.en.srt |
3.64Кб |
01_reexamine-siem-tools.en.txt |
2.25Кб |
01_reexamine-siem-tools.mp4 |
9.10Мб |
01_regular-expressions-in-python.en.srt |
10.37Кб |
01_regular-expressions-in-python.en.txt |
6.45Кб |
01_regular-expressions-in-python.mp4 |
21.86Мб |
01_security-monitoring-with-detection-tools.en.srt |
6.08Кб |
01_security-monitoring-with-detection-tools.en.txt |
3.27Кб |
01_security-monitoring-with-detection-tools.mp4 |
14.69Мб |
01_the-benefits-of-documentation.en.srt |
3.57Кб |
01_the-benefits-of-documentation.en.txt |
2.29Кб |
01_the-benefits-of-documentation.mp4 |
9.32Мб |
01_the-post-incident-activity-phase-of-the-lifecycle.en.srt |
3.54Кб |
01_the-post-incident-activity-phase-of-the-lifecycle.en.txt |
2.22Кб |
01_the-post-incident-activity-phase-of-the-lifecycle.mp4 |
8.22Мб |
01_the-role-of-triage-in-incident-response.en.srt |
6.03Кб |
01_the-role-of-triage-in-incident-response.en.txt |
3.21Кб |
01_the-role-of-triage-in-incident-response.mp4 |
11.56Мб |
01_threats-risks-and-vulnerabilities.en.srt |
5.90Кб |
01_threats-risks-and-vulnerabilities.en.txt |
3.76Кб |
01_threats-risks-and-vulnerabilities.mp4 |
17.04Мб |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt |
5.86Кб |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt |
3.18Кб |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 |
19.05Мб |
01_use-parameters-in-functions.en.srt |
5.43Кб |
01_use-parameters-in-functions.en.txt |
3.32Кб |
01_use-parameters-in-functions.mp4 |
10.62Мб |
01_use-strategies-to-answer-interview-questions.en.srt |
4.34Кб |
01_use-strategies-to-answer-interview-questions.en.txt |
2.76Кб |
01_use-strategies-to-answer-interview-questions.mp4 |
12.02Мб |
01_visual-storytelling-in-cybersecurity.en.srt |
3.79Кб |
01_visual-storytelling-in-cybersecurity.en.txt |
2.37Кб |
01_visual-storytelling-in-cybersecurity.mp4 |
16.07Мб |
01_vulnerability-assessments.en.srt |
5.86Кб |
01_vulnerability-assessments.en.txt |
3.11Кб |
01_vulnerability-assessments.mp4 |
19.46Мб |
01_welcome-to-the-google-cybersecurity-certificate.en.srt |
15.24Кб |
01_welcome-to-the-google-cybersecurity-certificate.en.txt |
8.04Кб |
01_welcome-to-the-google-cybersecurity-certificate.mp4 |
47.29Мб |
01_welcome-to-week-1.en.srt |
3.30Кб |
01_welcome-to-week-1.en.srt |
2.86Кб |
01_welcome-to-week-1.en.srt |
2.51Кб |
01_welcome-to-week-1.en.srt |
1.54Кб |
01_welcome-to-week-1.en.srt |
1.63Кб |
01_welcome-to-week-1.en.srt |
863б |
01_welcome-to-week-1.en.srt |
1.02Кб |
01_welcome-to-week-1.en.txt |
2.08Кб |
01_welcome-to-week-1.en.txt |
1.48Кб |
01_welcome-to-week-1.en.txt |
1.59Кб |
01_welcome-to-week-1.en.txt |
878б |
01_welcome-to-week-1.en.txt |
1.04Кб |
01_welcome-to-week-1.en.txt |
533б |
01_welcome-to-week-1.en.txt |
545б |
01_welcome-to-week-1.mp4 |
10.16Мб |
01_welcome-to-week-1.mp4 |
7.80Мб |
01_welcome-to-week-1.mp4 |
5.80Мб |
01_welcome-to-week-1.mp4 |
2.94Мб |
01_welcome-to-week-1.mp4 |
4.46Мб |
01_welcome-to-week-1.mp4 |
2.30Мб |
01_welcome-to-week-1.mp4 |
1.79Мб |
01_welcome-to-week-2.en.srt |
3.12Кб |
01_welcome-to-week-2.en.srt |
2.18Кб |
01_welcome-to-week-2.en.srt |
1.85Кб |
01_welcome-to-week-2.en.srt |
2.15Кб |
01_welcome-to-week-2.en.srt |
1.59Кб |
01_welcome-to-week-2.en.srt |
1.68Кб |
01_welcome-to-week-2.en.srt |
1.98Кб |
01_welcome-to-week-2.en.srt |
2.30Кб |
01_welcome-to-week-2.en.txt |
1.70Кб |
01_welcome-to-week-2.en.txt |
1.17Кб |
01_welcome-to-week-2.en.txt |
1023б |
01_welcome-to-week-2.en.txt |
1.13Кб |
01_welcome-to-week-2.en.txt |
889б |
01_welcome-to-week-2.en.txt |
950б |
01_welcome-to-week-2.en.txt |
1.09Кб |
01_welcome-to-week-2.en.txt |
1.18Кб |
01_welcome-to-week-2.mp4 |
9.84Мб |
01_welcome-to-week-2.mp4 |
5.01Мб |
01_welcome-to-week-2.mp4 |
3.69Мб |
01_welcome-to-week-2.mp4 |
6.71Мб |
01_welcome-to-week-2.mp4 |
3.23Мб |
01_welcome-to-week-2.mp4 |
5.42Мб |
01_welcome-to-week-2.mp4 |
4.60Мб |
01_welcome-to-week-2.mp4 |
6.07Мб |
01_welcome-to-week-3.en.srt |
2.84Кб |
01_welcome-to-week-3.en.srt |
1.92Кб |
01_welcome-to-week-3.en.srt |
1.55Кб |
01_welcome-to-week-3.en.srt |
3.81Кб |
01_welcome-to-week-3.en.srt |
2.66Кб |
01_welcome-to-week-3.en.srt |
1.30Кб |
01_welcome-to-week-3.en.srt |
710б |
01_welcome-to-week-3.en.srt |
1.15Кб |
01_welcome-to-week-3.en.txt |
1.69Кб |
01_welcome-to-week-3.en.txt |
1.03Кб |
01_welcome-to-week-3.en.txt |
954б |
01_welcome-to-week-3.en.txt |
2.36Кб |
01_welcome-to-week-3.en.txt |
1.41Кб |
01_welcome-to-week-3.en.txt |
835б |
01_welcome-to-week-3.en.txt |
447б |
01_welcome-to-week-3.en.txt |
715б |
01_welcome-to-week-3.mp4 |
9.15Мб |
01_welcome-to-week-3.mp4 |
4.89Мб |
01_welcome-to-week-3.mp4 |
3.53Мб |
01_welcome-to-week-3.mp4 |
14.48Мб |
01_welcome-to-week-3.mp4 |
5.11Мб |
01_welcome-to-week-3.mp4 |
4.27Мб |
01_welcome-to-week-3.mp4 |
1.32Мб |
01_welcome-to-week-3.mp4 |
3.69Мб |
01_welcome-to-week-4.en.srt |
3.04Кб |
01_welcome-to-week-4.en.srt |
1.95Кб |
01_welcome-to-week-4.en.srt |
2.17Кб |
01_welcome-to-week-4.en.srt |
2.56Кб |
01_welcome-to-week-4.en.srt |
2.57Кб |
01_welcome-to-week-4.en.srt |
912б |
01_welcome-to-week-4.en.srt |
1.50Кб |
01_welcome-to-week-4.en.srt |
2.19Кб |
01_welcome-to-week-4.en.txt |
1.62Кб |
01_welcome-to-week-4.en.txt |
1.03Кб |
01_welcome-to-week-4.en.txt |
1.32Кб |
01_welcome-to-week-4.en.txt |
1.38Кб |
01_welcome-to-week-4.en.txt |
1.38Кб |
01_welcome-to-week-4.en.txt |
548б |
01_welcome-to-week-4.en.txt |
929б |
01_welcome-to-week-4.en.txt |
1.37Кб |
01_welcome-to-week-4.mp4 |
8.59Мб |
01_welcome-to-week-4.mp4 |
5.14Мб |
01_welcome-to-week-4.mp4 |
5.00Мб |
01_welcome-to-week-4.mp4 |
7.04Мб |
01_welcome-to-week-4.mp4 |
5.29Мб |
01_welcome-to-week-4.mp4 |
2.97Мб |
01_welcome-to-week-4.mp4 |
3.84Мб |
01_welcome-to-week-4.mp4 |
6.84Мб |
01_welcome-to-week-5.en.srt |
2.64Кб |
01_welcome-to-week-5.en.txt |
1.45Кб |
01_welcome-to-week-5.mp4 |
7.55Мб |
01_wrap-up.en.srt |
3.04Кб |
01_wrap-up.en.srt |
2.36Кб |
01_wrap-up.en.srt |
3.57Кб |
01_wrap-up.en.srt |
2.79Кб |
01_wrap-up.en.srt |
1.58Кб |
01_wrap-up.en.srt |
1.75Кб |
01_wrap-up.en.srt |
1.79Кб |
01_wrap-up.en.srt |
1.47Кб |
01_wrap-up.en.srt |
1.39Кб |
01_wrap-up.en.srt |
1.61Кб |
01_wrap-up.en.srt |
1.65Кб |
01_wrap-up.en.srt |
1.83Кб |
01_wrap-up.en.srt |
1.66Кб |
01_wrap-up.en.srt |
2.21Кб |
01_wrap-up.en.srt |
1.68Кб |
01_wrap-up.en.srt |
1012б |
01_wrap-up.en.srt |
1.89Кб |
01_wrap-up.en.srt |
1.41Кб |
01_wrap-up.en.srt |
1.34Кб |
01_wrap-up.en.srt |
2.25Кб |
01_wrap-up.en.srt |
1.45Кб |
01_wrap-up.en.srt |
2.82Кб |
01_wrap-up.en.srt |
1.18Кб |
01_wrap-up.en.srt |
1.24Кб |
01_wrap-up.en.srt |
1.03Кб |
01_wrap-up.en.srt |
1.10Кб |
01_wrap-up.en.srt |
1.35Кб |
01_wrap-up.en.srt |
1.58Кб |
01_wrap-up.en.srt |
1.55Кб |
01_wrap-up.en.srt |
1.60Кб |
01_wrap-up.en.srt |
2.89Кб |
01_wrap-up.en.srt |
1.36Кб |
01_wrap-up.en.srt |
1.06Кб |
01_wrap-up.en.txt |
1.62Кб |
01_wrap-up.en.txt |
1.54Кб |
01_wrap-up.en.txt |
1.92Кб |
01_wrap-up.en.txt |
1.50Кб |
01_wrap-up.en.txt |
949б |
01_wrap-up.en.txt |
952б |
01_wrap-up.en.txt |
992б |
01_wrap-up.en.txt |
806б |
01_wrap-up.en.txt |
788б |
01_wrap-up.en.txt |
872б |
01_wrap-up.en.txt |
1.06Кб |
01_wrap-up.en.txt |
1.14Кб |
01_wrap-up.en.txt |
925б |
01_wrap-up.en.txt |
1.45Кб |
01_wrap-up.en.txt |
953б |
01_wrap-up.en.txt |
648б |
01_wrap-up.en.txt |
1.11Кб |
01_wrap-up.en.txt |
735б |
01_wrap-up.en.txt |
876б |
01_wrap-up.en.txt |
1.20Кб |
01_wrap-up.en.txt |
882б |
01_wrap-up.en.txt |
1.50Кб |
01_wrap-up.en.txt |
780б |
01_wrap-up.en.txt |
836б |
01_wrap-up.en.txt |
620б |
01_wrap-up.en.txt |
727б |
01_wrap-up.en.txt |
747б |
01_wrap-up.en.txt |
909б |
01_wrap-up.en.txt |
1018б |
01_wrap-up.en.txt |
1.01Кб |
01_wrap-up.en.txt |
1.51Кб |
01_wrap-up.en.txt |
856б |
01_wrap-up.en.txt |
586б |
01_wrap-up.mp4 |
6.83Мб |
01_wrap-up.mp4 |
8.23Мб |
01_wrap-up.mp4 |
11.83Мб |
01_wrap-up.mp4 |
8.07Мб |
01_wrap-up.mp4 |
3.43Мб |
01_wrap-up.mp4 |
3.75Мб |
01_wrap-up.mp4 |
3.67Мб |
01_wrap-up.mp4 |
2.89Мб |
01_wrap-up.mp4 |
2.38Мб |
01_wrap-up.mp4 |
3.20Мб |
01_wrap-up.mp4 |
2.86Мб |
01_wrap-up.mp4 |
3.44Мб |
01_wrap-up.mp4 |
3.99Мб |
01_wrap-up.mp4 |
7.36Мб |
01_wrap-up.mp4 |
4.70Мб |
01_wrap-up.mp4 |
2.06Мб |
01_wrap-up.mp4 |
3.16Мб |
01_wrap-up.mp4 |
2.83Мб |
01_wrap-up.mp4 |
3.36Мб |
01_wrap-up.mp4 |
3.38Мб |
01_wrap-up.mp4 |
3.95Мб |
01_wrap-up.mp4 |
7.07Мб |
01_wrap-up.mp4 |
2.62Мб |
01_wrap-up.mp4 |
4.37Мб |
01_wrap-up.mp4 |
1.71Мб |
01_wrap-up.mp4 |
2.77Мб |
01_wrap-up.mp4 |
2.93Мб |
01_wrap-up.mp4 |
3.14Мб |
01_wrap-up.mp4 |
4.09Мб |
01_wrap-up.mp4 |
4.50Мб |
01_wrap-up.mp4 |
9.05Мб |
01_wrap-up.mp4 |
3.85Мб |
01_wrap-up.mp4 |
1.96Мб |
02_an-introduction-to-malware_instructions.html |
163.88Кб |
02_apply-debugging-strategies.en.srt |
7.90Кб |
02_apply-debugging-strategies.en.txt |
4.18Кб |
02_apply-debugging-strategies.mp4 |
13.56Мб |
02_apply-the-star-method-during-interviews_instructions.html |
50.99Кб |
02_approach-cybersecurity-with-an-attacker-mindset_instructions.html |
206.00Кб |
02_approaches-to-vulnerability-scanning_instructions.html |
7.45Кб |
02_automate-cybersecurity-tasks-with-python.en.srt |
5.73Кб |
02_automate-cybersecurity-tasks-with-python.en.txt |
3.02Кб |
02_automate-cybersecurity-tasks-with-python.mp4 |
19.07Мб |
02_brute-force-attacks-and-os-hardening_instructions.html |
8.12Кб |
02_building-blocks-of-cybersecurity-communications.en.srt |
5.82Кб |
02_building-blocks-of-cybersecurity-communications.en.txt |
3.07Кб |
02_building-blocks-of-cybersecurity-communications.mp4 |
17.00Мб |
02_casey-apply-soft-skills-in-cybersecurity.en.srt |
2.75Кб |
02_casey-apply-soft-skills-in-cybersecurity.en.txt |
1.46Кб |
02_casey-apply-soft-skills-in-cybersecurity.mp4 |
13.89Мб |
02_change-permissions.en.srt |
7.17Кб |
02_change-permissions.en.txt |
3.79Кб |
02_change-permissions.mp4 |
9.40Мб |
02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt |
3.69Кб |
02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt |
1.97Кб |
02_chantelle-the-value-of-diversity-in-cybersecurity.mp4 |
14.09Мб |
02_chris-my-path-to-cybersecurity.en.srt |
4.91Кб |
02_chris-my-path-to-cybersecurity.en.txt |
2.63Кб |
02_chris-my-path-to-cybersecurity.mp4 |
18.89Мб |
02_code-readability.en.srt |
6.10Кб |
02_code-readability.en.txt |
3.86Кб |
02_code-readability.mp4 |
19.05Мб |
02_common-cybersecurity-tools.en.srt |
7.10Кб |
02_common-cybersecurity-tools.en.txt |
3.79Кб |
02_common-cybersecurity-tools.mp4 |
20.23Мб |
02_components-of-network-layer-communication_instructions.html |
642.17Кб |
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en srt |
2.82Кб |
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en txt |
1.40Кб |
02 congratulations-on-completing-the-google-cybersecurity-certificate-program mp4 |
9.41Мб |
02_connect-with-other-cybersecurity-professionals_instructions.html |
4.24Кб |
02_course-1-glossary_Course_1_glossary.docx |
858.91Кб |
02_course-1-glossary_instructions.html |
6.49Кб |
02_course-2-glossary_Course_2_glossary.docx |
858.52Кб |
02_course-2-glossary_instructions.html |
6.49Кб |
02_course-2-overview_instructions.html |
1.85Мб |
02_course-3-glossary_Course_3_glossary.docx |
857.56Кб |
02_course-3-glossary_instructions.html |
6.45Кб |
02_course-3-overview_instructions.html |
1.22Мб |
02_course-4-glossary_Course_4_glossary.docx |
1.12Мб |
02_course-4-glossary_instructions.html |
6.48Кб |
02_course-4-overview_instructions.html |
1.20Мб |
02_course-5-glossary_Course_5_glossary.docx |
862.38Кб |
02_course-5-glossary_instructions.html |
6.49Кб |
02_course-5-overview_instructions.html |
1.26Мб |
02_course-6-glossary_Course_6_glossary.docx |
859.70Кб |
02_course-6-glossary_instructions.html |
6.49Кб |
02_course-6-overview_instructions.html |
1.27Мб |
02_course-7-glossary_Course_7_glossary.docx |
869.85Кб |
02_course-7-glossary_instructions.html |
6.49Кб |
02_course-7-overview_instructions.html |
1.21Мб |
02_course-8-overview_instructions.html |
1.38Мб |
02 create-visual-dashboards-for-impactful-cybersecurity-communications instructions html |
4.98Кб |
02_detection-tools-and-techniques_instructions.html |
342.75Кб |
02_disaster-recovery-and-business-continuity_instructions.html |
5.50Кб |
02_document-evidence-with-chain-of-custody-forms.en.srt |
5.57Кб |
02_document-evidence-with-chain-of-custody-forms.en.txt |
3.52Кб |
02_document-evidence-with-chain-of-custody-forms.mp4 |
13.10Мб |
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en srt |
4.40Кб |
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en txt |
2.75Кб |
02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 |
19.88Мб |
02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html |
7.87Кб |
02_exploitable-gaps-in-databases.en.srt |
5.10Кб |
02_exploitable-gaps-in-databases.en.txt |
3.21Кб |
02_exploitable-gaps-in-databases.mp4 |
17.35Мб |
02_explore-the-cissp-security-domains-part-1.en.srt |
6.17Кб |
02_explore-the-cissp-security-domains-part-1.en.txt |
3.99Кб |
02_explore-the-cissp-security-domains-part-1.mp4 |
19.14Мб |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt |
6.04Кб |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt |
3.19Кб |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 |
15.16Мб |
02_fatima-the-importance-of-communication-during-incident-response.en.srt |
4.60Кб |
02_fatima-the-importance-of-communication-during-incident-response.en.txt |
2.38Кб |
02_fatima-the-importance-of-communication-during-incident-response.mp4 |
15.18Мб |
02_filter-content-in-linux_instructions.html |
8.70Кб |
02_find-cybersecurity-jobs.en.srt |
5.55Кб |
02_find-cybersecurity-jobs.en.txt |
2.97Кб |
02_find-cybersecurity-jobs.mp4 |
16.32Мб |
02_frameworks.en.srt |
3.45Кб |
02_frameworks.en.txt |
1.90Кб |
02_frameworks.mp4 |
10.33Мб |
02_glossary-terms-from-week-1_instructions.html |
3.42Кб |
02_glossary-terms-from-week-1_instructions.html |
4.02Кб |
02_glossary-terms-from-week-1_instructions.html |
4.14Кб |
02_glossary-terms-from-week-1_instructions.html |
2.75Кб |
02_glossary-terms-from-week-1_instructions.html |
2.47Кб |
02_glossary-terms-from-week-1_instructions.html |
3.91Кб |
02_glossary-terms-from-week-1_instructions.html |
4.49Кб |
02_glossary-terms-from-week-1_instructions.html |
2.30Кб |
02_glossary-terms-from-week-2_instructions.html |
7.07Кб |
02_glossary-terms-from-week-2_instructions.html |
3.05Кб |
02_glossary-terms-from-week-2_instructions.html |
4.03Кб |
02_glossary-terms-from-week-2_instructions.html |
4.22Кб |
02_glossary-terms-from-week-2_instructions.html |
4.96Кб |
02_glossary-terms-from-week-2_instructions.html |
4.96Кб |
02_glossary-terms-from-week-2_instructions.html |
5.09Кб |
02_glossary-terms-from-week-2_instructions.html |
2.44Кб |
02_glossary-terms-from-week-3_instructions.html |
3.63Кб |
02_glossary-terms-from-week-3_instructions.html |
2.57Кб |
02_glossary-terms-from-week-3_instructions.html |
4.82Кб |
02_glossary-terms-from-week-3_instructions.html |
3.90Кб |
02_glossary-terms-from-week-3_instructions.html |
3.20Кб |
02_glossary-terms-from-week-3_instructions.html |
2.65Кб |
02_glossary-terms-from-week-3_instructions.html |
3.75Кб |
02_glossary-terms-from-week-3_instructions.html |
1.26Кб |
02_glossary-terms-from-week-4_instructions.html |
7.93Кб |
02_glossary-terms-from-week-4_instructions.html |
2.92Кб |
02_glossary-terms-from-week-4_instructions.html |
4.50Кб |
02_glossary-terms-from-week-4_instructions.html |
2.85Кб |
02_glossary-terms-from-week-4_instructions.html |
3.00Кб |
02_glossary-terms-from-week-4_instructions.html |
1.48Кб |
02_glossary-terms-from-week-4_instructions.html |
2.83Кб |
02_glossary-terms-from-week-4_instructions.html |
1.15Кб |
02_glossary-terms-from-week-5_instructions.html |
1.41Кб |
02_google-cybersecurity-certificate-overview_instructions.html |
500.47Кб |
02_helpful-cybersecurity-resources.en.srt |
4.17Кб |
02_helpful-cybersecurity-resources.en.txt |
2.19Кб |
02_helpful-cybersecurity-resources.mp4 |
15.26Мб |
02_import-files-into-python_instructions.html |
107.34Кб |
02_input-and-output-in-the-shell.en.srt |
4.91Кб |
02_input-and-output-in-the-shell.en.txt |
2.67Кб |
02_input-and-output-in-the-shell.mp4 |
8.58Мб |
02_introduction-to-databases.en.srt |
5.93Кб |
02_introduction-to-databases.en.txt |
3.68Кб |
02_introduction-to-databases.mp4 |
10.43Мб |
02_introduction-to-functions.en.srt |
4.00Кб |
02_introduction-to-functions.en.txt |
2.15Кб |
02_introduction-to-functions.mp4 |
13.82Мб |
02_introduction-to-linux.en.srt |
4.97Кб |
02_introduction-to-linux.en.txt |
3.09Кб |
02_introduction-to-linux.mp4 |
12.60Мб |
02_introduction-to-security-frameworks-and-controls.en.srt |
7.47Кб |
02_introduction-to-security-frameworks-and-controls.en.txt |
3.99Кб |
02_introduction-to-security-frameworks-and-controls.mp4 |
23.41Мб |
02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt |
5.67Кб |
02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt |
3.03Кб |
02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 |
17.31Мб |
02_introduction-to-the-incident-response-lifecycle.en.srt |
6.44Кб |
02_introduction-to-the-incident-response-lifecycle.en.txt |
4.02Кб |
02_introduction-to-the-incident-response-lifecycle.mp4 |
16.02Мб |
02_ip-spoofing.en.srt |
5.13Кб |
02_ip-spoofing.en.txt |
2.72Кб |
02_ip-spoofing.mp4 |
11.52Мб |
02_kali-linux-tm.en.srt |
3.53Кб |
02_kali-linux-tm.en.txt |
2.28Кб |
02_kali-linux-tm.mp4 |
7.17Мб |
02_kelsey-cloud-security-explained.en.srt |
3.79Кб |
02_kelsey-cloud-security-explained.en.txt |
2.31Кб |
02_kelsey-cloud-security-explained.mp4 |
21.94Мб |
02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt |
5.20Кб |
02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt |
3.38Кб |
02_key-impacts-of-threats-risks-and-vulnerabilities.mp4 |
17.31Мб |
02_kim-my-journey-into-computing.en.srt |
3.46Кб |
02_kim-my-journey-into-computing.en.txt |
1.84Кб |
02_kim-my-journey-into-computing.mp4 |
10.92Мб |
02_learn-more-about-developing-an-elevator-pitch_instructions.html |
5.02Кб |
02_learn-more-about-packet-captures_instructions.html |
735.83Кб |
02_linux-commands-via-the-bash-shell.en.srt |
5.10Кб |
02_linux-commands-via-the-bash-shell.en.txt |
2.82Кб |
02_linux-commands-via-the-bash-shell.mp4 |
10.20Мб |
02_logs-and-siem-tools.en.srt |
4.02Кб |
02_logs-and-siem-tools.en.txt |
2.14Кб |
02_logs-and-siem-tools.mp4 |
8.88Мб |
02_more-about-cybersecurity-tools_instructions.html |
5.50Кб |
02_more-about-data-types_instructions.html |
12.18Кб |
02_more-about-owasp-security-principles_instructions.html |
5.36Кб |
02_more-about-regular-expressions_instructions.html |
11.41Кб |
02_more-on-conditionals-in-python_instructions.html |
15.09Кб |
02_network-protocols.en.srt |
6.01Кб |
02_network-protocols.en.txt |
3.27Кб |
02_network-protocols.mp4 |
11.29Мб |
02_network-security-applications_instructions.html |
2.90Мб |
02_operators-for-filtering-dates-and-numbers_instructions.html |
6.76Кб |
02_overview-of-tcpdump_instructions.html |
132.48Кб |
02_overview-of-tcpdump_tcpdump.1.html |
72.58Кб |
02_past-cybersecurity-attacks.en.srt |
6.34Кб |
02_past-cybersecurity-attacks.en.txt |
3.33Кб |
02_past-cybersecurity-attacks.mp4 |
22.02Мб |
02_phases-of-an-incident-response-playbook.en.srt |
7.86Кб |
02_phases-of-an-incident-response-playbook.en.txt |
4.21Кб |
02_phases-of-an-incident-response-playbook.mp4 |
24.30Мб |
02_post-incident-review_instructions.html |
233.43Кб |
02_public-key-infrastructure.en.srt |
8.70Кб |
02_public-key-infrastructure.en.txt |
4.54Кб |
02_public-key-infrastructure.mp4 |
21.15Мб |
02_python-and-cybersecurity.en.srt |
5.21Кб |
02_python-and-cybersecurity.en.txt |
3.29Кб |
02_python-and-cybersecurity.mp4 |
20.08Мб |
02_query-a-database_instructions.html |
8.81Кб |
02_query-for-events-with-splunk.en.srt |
6.99Кб |
02_query-for-events-with-splunk.en.txt |
3.78Кб |
02_query-for-events-with-splunk.mp4 |
9.28Мб |
02_read-tcpdump-logs_instructions.html |
146.64Кб |
02_recognize-roles-and-responsibilities-during-escalation_instructions.html |
4.34Кб |
02_requests-to-the-operating-system_instructions.html |
133.93Кб |
02_return-statements.en.srt |
4.80Кб |
02_return-statements.en.txt |
3.02Кб |
02_return-statements.mp4 |
13.70Мб |
02_robin-foster-cross-team-collaboration.en.srt |
3.80Кб |
02_robin-foster-cross-team-collaboration.en.txt |
2.39Кб |
02_robin-foster-cross-team-collaboration.mp4 |
14.14Мб |
02_security-as-a-mindset.en.srt |
5.08Кб |
02_security-as-a-mindset.en.txt |
2.70Кб |
02_security-as-a-mindset.mp4 |
16.95Мб |
02_security-controls.en.srt |
5.17Кб |
02_security-controls.en.txt |
3.29Кб |
02_security-controls.mp4 |
19.59Мб |
02_security-hardening.en.srt |
4.62Кб |
02_security-hardening.en.txt |
2.93Кб |
02_security-hardening.mp4 |
12.25Мб |
02_stakeholders-in-cybersecurity.en.srt |
6.76Кб |
02_stakeholders-in-cybersecurity.en.txt |
3.58Кб |
02_stakeholders-in-cybersecurity.mp4 |
15.13Мб |
02_string-operations.en.srt |
7.78Кб |
02_string-operations.en.txt |
4.10Кб |
02_string-operations.mp4 |
21.28Мб |
02_the-case-for-securing-networks.en.srt |
2.20Кб |
02_the-case-for-securing-networks.en.txt |
1.41Кб |
02_the-case-for-securing-networks.mp4 |
5.52Мб |
02_the-command-line-in-use_instructions.html |
197.12Кб |
02_the-criminal-art-of-persuasion.en.srt |
7.36Кб |
02_the-criminal-art-of-persuasion.en.txt |
3.98Кб |
02_the-criminal-art-of-persuasion.mp4 |
21.70Мб |
02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt |
3.07Кб |
02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt |
2.01Кб |
02_the-detection-and-analysis-phase-of-the-lifecycle.mp4 |
8.54Мб |
02_the-emergence-of-cloud-security_instructions.html |
141.30Кб |
02_the-importance-of-escalation.en.srt |
6.63Кб |
02_the-importance-of-escalation.en.txt |
3.55Кб |
02_the-importance-of-escalation.mp4 |
18.97Мб |
02_the-importance-of-logs.en.srt |
5.97Кб |
02_the-importance-of-logs.en.txt |
3.75Кб |
02_the-importance-of-logs.mp4 |
12.76Мб |
02_the-interview-process_instructions.html |
5.26Кб |
02_the-linux-community.en.srt |
2.51Кб |
02_the-linux-community.en.txt |
1.35Кб |
02_the-linux-community.mp4 |
5.99Мб |
02_the-nist-cybersecurity-framework.en.srt |
5.77Кб |
02_the-nist-cybersecurity-framework.en.txt |
3.63Кб |
02_the-nist-cybersecurity-framework.mp4 |
20.35Мб |
02_the-rise-of-sso-and-mfa_instructions.html |
369.55Кб |
02_the-tcp-ip-model.en.srt |
4.42Кб |
02_the-tcp-ip-model.en.txt |
2.37Кб |
02_the-tcp-ip-model.mp4 |
8.96Мб |
02_the-value-of-documentation.en.srt |
4.61Кб |
02_the-value-of-documentation.en.txt |
2.96Кб |
02_the-value-of-documentation.mp4 |
11.00Мб |
02_the-what-why-and-how-of-asset-security.en.srt |
6.91Кб |
02_the-what-why-and-how-of-asset-security.en.txt |
4.26Кб |
02_the-what-why-and-how-of-asset-security.mp4 |
20.75Мб |
02_toni-my-path-to-cybersecurity.en.srt |
5.53Кб |
02_toni-my-path-to-cybersecurity.en.txt |
2.92Кб |
02_toni-my-path-to-cybersecurity.mp4 |
20.00Мб |
02_types-of-joins.en.srt |
5.05Кб |
02_types-of-joins.en.txt |
2.70Кб |
02_types-of-joins.mp4 |
7.97Мб |
02_use-the-cia-triad-to-protect-organizations_instructions.html |
4.29Кб |
02_use-tools-to-protect-business-operations_instructions.html |
6.58Кб |
02_veronica-my-path-to-working-in-cybersecurity.en.srt |
3.08Кб |
02_veronica-my-path-to-working-in-cybersecurity.en.txt |
1.59Кб |
02_veronica-my-path-to-working-in-cybersecurity.mp4 |
11.01Мб |
02_virtual-private-networks-vpns.en.srt |
4.30Кб |
02_virtual-private-networks-vpns.en.txt |
2.28Кб |
02_virtual-private-networks-vpns.mp4 |
8.06Мб |
02_vulnerability-management.en.srt |
5.96Кб |
02_vulnerability-management.en.txt |
3.81Кб |
02_vulnerability-management.mp4 |
21.96Мб |
02_when-and-how-to-escalate-a-security-incident.en.srt |
3.41Кб |
02_when-and-how-to-escalate-a-security-incident.en.txt |
2.12Кб |
02_when-and-how-to-escalate-a-security-incident.mp4 |
12.83Мб |
02_write-a-simple-algorithm.en.srt |
8.38Кб |
02_write-a-simple-algorithm.en.txt |
4.35Кб |
02_write-a-simple-algorithm.mp4 |
17.58Мб |
03_activity-analysis-of-network-hardening_quiz.html |
1.23Кб |
03_activity-analyze-network-layer-communication_quiz.html |
1.26Кб |
03_activity-apply-os-hardening-techniques_quiz.html |
1.26Кб |
03_angel-my-personal-career-journey.en.srt |
4.84Кб |
03_angel-my-personal-career-journey.en.txt |
2.62Кб |
03_angel-my-personal-career-journey.mp4 |
16.51Мб |
03_attacks-in-the-digital-age.en.srt |
6.52Кб |
03_attacks-in-the-digital-age.en.txt |
4.17Кб |
03_attacks-in-the-digital-age.mp4 |
25.52Мб |
03_best-practices-for-effective-documentation_instructions.html |
5.85Кб |
03_best-practices-for-log-collection-and-management_instructions.html |
8.33Кб |
03_common-network-protocols_instructions.html |
8.69Кб |
03_communicate-effectively-with-stakeholders_instructions.html |
5.04Кб |
03_compare-types-of-joins_instructions.html |
1.51Мб |
03_components-of-a-detection-signature.en.srt |
6.65Кб |
03_components-of-a-detection-signature.en.txt |
3.50Кб |
03_components-of-a-detection-signature.mp4 |
12.80Мб |
03_controls.en.srt |
5.39Кб |
03_controls.en.txt |
2.88Кб |
03_controls.mp4 |
14.11Мб |
03_core-commands-for-navigation-and-reading-files.en.srt |
7.62Кб |
03_core-commands-for-navigation-and-reading-files.en.txt |
4.04Кб |
03_core-commands-for-navigation-and-reading-files.mp4 |
11.26Мб |
03_course-1-overview_instructions.html |
1.27Мб |
03_course-wrap-up.en.srt |
1.75Кб |
03_course-wrap-up.en.txt |
1.13Кб |
03_course-wrap-up.mp4 |
2.75Мб |
03_create-a-basic-function.en.srt |
3.67Кб |
03_create-a-basic-function.en.txt |
1.88Кб |
03_create-a-basic-function.mp4 |
7.14Мб |
03_create-a-cybersecurity-portfolio_instructions.html |
8.73Кб |
03_create-and-modify-directories-and-files.en.srt |
11.12Кб |
03_create-and-modify-directories-and-files.en.txt |
5.82Кб |
03_create-and-modify-directories-and-files.mp4 |
17.80Мб |
03_create-a-resume.en.srt |
6.19Кб |
03_create-a-resume.en.txt |
3.94Кб |
03_create-a-resume.mp4 |
11.92Мб |
03_cybersecurity-incident-detection-methods_instructions.html |
7.73Кб |
03_data-and-asset-classification_instructions.html |
5.74Кб |
03_defense-in-depth-strategy.en.srt |
6.22Кб |
03_defense-in-depth-strategy.en.txt |
3.34Кб |
03_defense-in-depth-strategy.mp4 |
19.92Мб |
03_determine-the-type-of-attack_instructions.html |
225.01Кб |
03_dion-my-personal-career-journey.en.srt |
3.70Кб |
03_dion-my-personal-career-journey.en.txt |
2.29Кб |
03_dion-my-personal-career-journey.mp4 |
16.87Мб |
03_ellen-my-path-into-cybersecurity.en.srt |
3.76Кб |
03_ellen-my-path-into-cybersecurity.en.txt |
2.41Кб |
03_ellen-my-path-into-cybersecurity.mp4 |
12.42Мб |
03_ensure-proper-syntax-and-readability-in-python_instructions.html |
9.57Кб |
03_escalate-with-a-purpose_instructions.html |
4.83Кб |
03_escalation-timing_instructions.html |
5.54Кб |
03_essential-python-components-for-automation_instructions.html |
8.20Кб |
03_explore-debugging-techniques_instructions.html |
13.02Кб |
03_explore-the-cissp-security-domains-part-2.en.srt |
6.73Кб |
03_explore-the-cissp-security-domains-part-2.en.txt |
4.38Кб |
03_explore-the-cissp-security-domains-part-2.mp4 |
18.20Мб |
03_filters-with-and-or-and-not.en.srt |
8.17Кб |
03_filters-with-and-or-and-not.en.txt |
4.38Кб |
03_filters-with-and-or-and-not.mp4 |
16.09Мб |
03_for-loops.en.srt |
7.58Кб |
03_for-loops.en.txt |
4.03Кб |
03_for-loops.mp4 |
12.20Мб |
03_functions-and-variables_instructions.html |
10.79Кб |
03_garvey-technical-interview-tips.en.srt |
4.65Кб |
03_garvey-technical-interview-tips.en.txt |
2.93Кб |
03_garvey-technical-interview-tips.mp4 |
11.21Мб |
03_get-started-on-the-next-course_instructions.html |
794.71Кб |
03_get-started-on-the-next-course_instructions.html |
806.10Кб |
03_get-started-on-the-next-course_instructions.html |
789.45Кб |
03_get-started-on-the-next-course_instructions.html |
796.16Кб |
03_get-started-on-the-next-course_instructions.html |
784.18Кб |
03_get-started-on-the-next-course_instructions.html |
793.15Кб |
03_get-started-on-the-next-course_instructions.html |
786.47Кб |
03_get-to-know-python_instructions.html |
4.28Кб |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
03_helpful-resources-and-tips_instructions.html |
11.26Кб |
03_helpful-resources-and-tips_instructions.html |
11.26Кб |
03_helpful-resources-and-tips_instructions.html |
11.17Кб |
03_helpful-resources-and-tips_instructions.html |
11.26Кб |
03_helpful-resources-and-tips_instructions.html |
11.21Кб |
03_herbert-manage-threats-risks-and-vulnerabilities.en.srt |
3.05Кб |
03_herbert-manage-threats-risks-and-vulnerabilities.en.txt |
1.93Кб |
03_herbert-manage-threats-risks-and-vulnerabilities.mp4 |
9.61Мб |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt |
4.10Кб |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt |
2.25Кб |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 |
14.62Мб |
03_how-intrusions-compromise-your-system_instructions.html |
6.62Кб |
03_how-to-create-a-visual-dashboard.en.srt |
5.24Кб |
03_how-to-create-a-visual-dashboard.en.txt |
3.13Кб |
03_how-to-create-a-visual-dashboard.mp4 |
18.13Мб |
03_interpret-network-communications-with-packets.en.srt |
2.71Кб |
03_interpret-network-communications-with-packets.en.txt |
1.69Кб |
03_interpret-network-communications-with-packets.mp4 |
7.65Мб |
03_introduction-to-operating-systems.en.srt |
4.34Кб |
03_introduction-to-operating-systems.en.txt |
2.79Кб |
03_introduction-to-operating-systems.mp4 |
11.51Мб |
03_intrusion-detection-systems.en.srt |
3.15Кб |
03_intrusion-detection-systems.en.txt |
1.70Кб |
03_intrusion-detection-systems.mp4 |
5.36Мб |
03_julianas-story-asset-protection_instructions.html |
5.03Кб |
03_lists-and-the-security-analyst_instructions.html |
13.07Кб |
03_man-pages-within-the-shell.en.srt |
3.99Кб |
03_man-pages-within-the-shell.en.txt |
2.10Кб |
03_man-pages-within-the-shell.mp4 |
6.58Мб |
03_more-about-playbooks_guidelines.html |
17.43Кб |
03_more-about-playbooks_instructions.html |
200.44Кб |
03_more-linux-distributions_instructions.html |
4.39Кб |
03_overview-of-interception-tactics_instructions.html |
7.19Кб |
03_parse-a-text-file-in-python.en.srt |
3.53Кб |
03_parse-a-text-file-in-python.en.txt |
1.88Кб |
03_parse-a-text-file-in-python.mp4 |
10.01Мб |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt |
6.09Кб |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt |
3.81Кб |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 |
17.80Мб |
03_permission-commands_instructions.html |
15.50Кб |
03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt |
4.08Кб |
03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt |
2.20Кб |
03_phil-learn-and-grow-in-the-cybersecurity-field.mp4 |
12.59Мб |
03_playbooks-siem-tools-and-soar-tools_instructions.html |
3.10Кб |
03_prepare-for-interviews_instructions.html |
5.48Кб |
03_prepare-for-interviews_vol01iss13.cfm |
45.52Кб |
03_principle-of-least-privilege_instructions.html |
7.70Кб |
03_query-databases-with-sql.en.srt |
3.88Кб |
03_query-databases-with-sql.en.txt |
2.46Кб |
03_query-databases-with-sql.mp4 |
8.50Мб |
03_query-for-events-with-chronicle.en.srt |
6.65Кб |
03_query-for-events-with-chronicle.en.txt |
3.54Кб |
03_query-for-events-with-chronicle.mp4 |
8.22Мб |
03_resource-allocation-via-the-os.en.srt |
3.91Кб |
03_resource-allocation-via-the-os.en.txt |
2.09Кб |
03_resource-allocation-via-the-os.mp4 |
9.46Мб |
03_resources-for-completing-sql-labs_instructions.html |
108.50Кб |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt |
4.53Кб |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt |
2.45Кб |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 |
14.50Мб |
03_roles-in-response_instructions.html |
84.34Кб |
03_sarah-network-in-the-cybersecurity-community.en.srt |
3.52Кб |
03_sarah-network-in-the-cybersecurity-community.en.txt |
2.24Кб |
03_sarah-network-in-the-cybersecurity-community.mp4 |
10.28Мб |
03_secure-design.en.srt |
6.79Кб |
03_secure-design.en.txt |
3.61Кб |
03_secure-design.mp4 |
19.14Мб |
03_secure-the-cloud_instructions.html |
8.98Кб |
03 security-guidelines-in-action Commercial Facilities Sector Cybersecurity Framework Implementation Guidance FINAL 508 pdf |
1.53Мб |
03_security-guidelines-in-action_instructions.html |
472.50Кб |
03_security-zones.en.srt |
6.05Кб |
03_security-zones.en.txt |
3.20Кб |
03_security-zones.mp4 |
12.00Мб |
03_showcase-your-work_instructions.html |
899.17Кб |
03_showcase-your-work_overview.html |
636.47Кб |
03_siem-dashboards.en.srt |
4.42Кб |
03_siem-dashboards.en.txt |
2.34Кб |
03_siem-dashboards.mp4 |
10.76Мб |
03_social-engineering-tactics_instructions.html |
175.25Кб |
03 strategies-for-engaging-with-the-cybersecurity-community instructions html |
5.48Кб |
03_string-indices-and-slices.en.srt |
8.50Кб |
03_string-indices-and-slices.en.txt |
4.54Кб |
03_string-indices-and-slices.mp4 |
20.29Мб |
03_symmetric-and-asymmetric-encryption_instructions.html |
9.23Кб |
03_talya-myths-about-the-cybersecurity-field.en.srt |
3.08Кб |
03_talya-myths-about-the-cybersecurity-field.en.txt |
1.59Кб |
03_talya-myths-about-the-cybersecurity-field.mp4 |
9.58Мб |
03_test-your-knowledge-local-and-wide-network-communication_quiz.html |
3.67Кб |
03_the-four-layers-of-the-tcp-ip-model.en.srt |
3.41Кб |
03_the-four-layers-of-the-tcp-ip-model.en.txt |
1.83Кб |
03_the-four-layers-of-the-tcp-ip-model.mp4 |
6.47Мб |
03_the-importance-of-network-traffic-flows.en.srt |
4.53Кб |
03_the-importance-of-network-traffic-flows.en.txt |
2.88Кб |
03_the-importance-of-network-traffic-flows.mp4 |
12.76Мб |
03_the-importance-of-updates_instructions.html |
7.16Кб |
03_the-mechanisms-of-authorization.en.srt |
8.11Кб |
03_the-mechanisms-of-authorization.en.txt |
4.32Кб |
03_the-mechanisms-of-authorization.mp4 |
25.17Мб |
03_the-purpose-and-impact-of-stakeholders_instructions.html |
5.65Кб |
03_the-rise-of-cryptojacking.en.srt |
6.65Кб |
03_the-rise-of-cryptojacking.en.txt |
3.57Кб |
03_the-rise-of-cryptojacking.mp4 |
23.67Мб |
03_the-triage-process_instructions.html |
8.28Кб |
03_tips-for-interviewing-remotely_instructions.html |
5.57Кб |
03 tools-for-protecting-business-operations gcat threathorizons full sept2022 pdf |
2.97Мб |
03_tools-for-protecting-business-operations_instructions.html |
651.52Кб |
03_transferable-and-technical-cybersecurity-skills_instructions.html |
7.33Кб |
03_types-of-threat-actors_instructions.html |
493.37Кб |
03_understand-risks-threats-and-vulnerabilities_instructions.html |
6.41Кб |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt |
3.05Кб |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt |
1.90Кб |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 |
9.96Мб |
03_weekly-challenge-1_exam.html |
8.39Кб |
03_weekly-challenge-2_exam.html |
8.45Кб |
03_weekly-challenge-3_exam.html |
9.31Кб |
03_weekly-challenge-4_exam.html |
9.52Кб |
03_what-are-networks.en.srt |
2.66Кб |
03_what-are-networks.en.txt |
1.64Кб |
03_what-are-networks.mp4 |
6.22Мб |
03_work-with-variables-in-python.en.srt |
9.99Кб |
03_work-with-variables-in-python.en.txt |
5.24Кб |
03_work-with-variables-in-python.mp4 |
21.69Мб |
04_activity-analyze-network-attacks_quiz.html |
1.25Кб |
04_add-and-delete-users.en.srt |
8.85Кб |
04_add-and-delete-users.en.txt |
4.72Кб |
04_add-and-delete-users.mp4 |
14.68Мб |
04_additional-network-protocols_instructions.html |
11.08Кб |
04_ask-the-interviewer-questions.en.srt |
2.47Кб |
04_ask-the-interviewer-questions.en.txt |
1.62Кб |
04_ask-the-interviewer-questions.mp4 |
7.91Мб |
04_assign-and-reassign-variables-in-python_instructions.html |
8.17Кб |
04_basic-filters-on-sql-queries.en.srt |
6.43Кб |
04_basic-filters-on-sql-queries.en.txt |
4.05Кб |
04_basic-filters-on-sql-queries.mp4 |
14.77Мб |
04_claim-your-google-cybersecurity-certificate-badge_instructions.html |
4.48Кб |
04_clancy-continual-learning-and-python.en.srt |
3.58Кб |
04_clancy-continual-learning-and-python.en.txt |
1.89Кб |
04_clancy-continual-learning-and-python.mp4 |
11.33Мб |
04_common-attacks-and-their-effectiveness_instructions.html |
8.41Кб |
04_common-vulnerabilities-and-exposures.en.srt |
8.07Кб |
04_common-vulnerabilities-and-exposures.en.txt |
4.31Кб |
04_common-vulnerabilities-and-exposures.mp4 |
27.86Мб |
04_compare-operating-systems_instructions.html |
6.27Кб |
04_continuous-learning-in-sql_instructions.html |
5.33Кб |
04_controls-frameworks-and-compliance_instructions.html |
151.83Кб |
04_course-8-glossary_Course_8_glossary.docx |
1.11Мб |
04_course-8-glossary_instructions.html |
6.43Кб |
04_create-a-basic-python-script.en.srt |
3.68Кб |
04_create-a-basic-python-script.en.txt |
1.96Кб |
04_create-a-basic-python-script.mp4 |
8.44Мб |
04_da-queshia-my-path-to-cybersecurity.en.srt |
4.43Кб |
04_da-queshia-my-path-to-cybersecurity.en.txt |
2.28Кб |
04_da-queshia-my-path-to-cybersecurity.mp4 |
13.90Мб |
04_dave-grow-your-cybersecurity-career-with-mentors.en.srt |
4.34Кб |
04_dave-grow-your-cybersecurity-career-with-mentors.en.txt |
2.33Кб |
04_dave-grow-your-cybersecurity-career-with-mentors.mp4 |
13.90Мб |
04_develop-a-parsing-algorithm-in-python.en.srt |
6.88Кб |
04_develop-a-parsing-algorithm-in-python.en.txt |
4.33Кб |
04_develop-a-parsing-algorithm-in-python.mp4 |
15.23Мб |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt |
4.28Кб |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt |
2.26Кб |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 |
11.39Мб |
04_emily-overcome-imposter-syndrome.en.srt |
4.71Кб |
04_emily-overcome-imposter-syndrome.en.txt |
2.56Кб |
04_emily-overcome-imposter-syndrome.mp4 |
13.95Мб |
04_examine-signatures-with-suricata.en.srt |
5.95Кб |
04_examine-signatures-with-suricata.en.txt |
3.76Кб |
04_examine-signatures-with-suricata.mp4 |
8.40Мб |
04_explore-built-in-functions.en.srt |
8.50Кб |
04_explore-built-in-functions.en.txt |
4.51Кб |
04_explore-built-in-functions.mp4 |
21.00Мб |
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
04_helpful-resources-and-tips_instructions.html |
11.26Кб |
04_helpful-resources-and-tips_instructions.html |
11.22Кб |
04_incident-response-plans.en.srt |
3.59Кб |
04_incident-response-plans.en.txt |
2.28Кб |
04_incident-response-plans.mp4 |
9.30Мб |
04_information-privacy-regulations-and-compliance_instructions.html |
129.20Кб |
04_julianas-story-attention-to-detail_instructions.html |
4.83Кб |
04_julianas-story-effective-communication_instructions.html |
4.46Кб |
04_learn-more-about-the-tcp-ip-model_instructions.html |
1.53Мб |
04_linux-architecture.en.srt |
5.77Кб |
04_linux-architecture.en.txt |
3.02Кб |
04_linux-architecture.mp4 |
11.81Мб |
04_linux-resources_instructions.html |
5.10Кб |
04_maintain-awareness-with-network-monitoring_instructions.html |
293.74Кб |
04_manage-directories-and-files_instructions.html |
9.62Кб |
04_mk-changes-in-the-cybersecurity-industry.en.srt |
4.33Кб |
04_mk-changes-in-the-cybersecurity-industry.en.txt |
2.77Кб |
04_mk-changes-in-the-cybersecurity-industry.mp4 |
13.39Мб |
04_more-on-filters-with-and-or-and-not_instructions.html |
6.39Кб |
04_navigate-linux-and-read-file-content_instructions.html |
104.91Кб |
04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt |
3.77Кб |
04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt |
2.45Кб |
04_nikki-a-day-in-the-life-of-a-security-engineer.mp4 |
16.05Мб |
04_niru-adopt-an-attacker-mindset.en.srt |
4.63Кб |
04_niru-adopt-an-attacker-mindset.en.txt |
2.94Кб |
04_niru-adopt-an-attacker-mindset.mp4 |
18.08Мб |
04_nist-s-risk-management-framework.en.srt |
6.41Кб |
04_nist-s-risk-management-framework.en.txt |
3.43Кб |
04_nist-s-risk-management-framework.mp4 |
16.35Мб |
04_omad-my-learning-journey-into-cybersecurity.en.srt |
4.44Кб |
04_omad-my-learning-journey-into-cybersecurity.en.txt |
2.75Кб |
04_omad-my-learning-journey-into-cybersecurity.mp4 |
9.89Мб |
04_overview-of-detection-tools_instructions.html |
9.42Кб |
04_phishing-for-information.en.srt |
6.80Кб |
04_phishing-for-information.en.txt |
4.32Кб |
04_phishing-for-information.mp4 |
24.02Мб |
04_plan-a-security-audit.en.srt |
6.92Кб |
04_plan-a-security-audit.en.txt |
3.60Кб |
04_plan-a-security-audit.mp4 |
16.69Мб |
04 portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security exam html |
3.46Кб |
04_prepare-for-technical-interviews_instructions.html |
5.62Кб |
04_python-functions-in-cybersecurity_instructions.html |
6.84Кб |
04_real-life-ddos-attack_instructions.html |
5.12Кб |
04_rebecca-learn-new-tools-and-technologies.en.srt |
2.98Кб |
04_rebecca-learn-new-tools-and-technologies.en.txt |
1.83Кб |
04_rebecca-learn-new-tools-and-technologies.mp4 |
9.32Мб |
04_reexamine-the-fields-of-a-packet-header.en.srt |
7.77Кб |
04_reexamine-the-fields-of-a-packet-header.en.txt |
4.15Кб |
04_reexamine-the-fields-of-a-packet-header.mp4 |
13.61Мб |
04_resources-for-completing-labs_instructions.html |
108.52Кб |
04_resources-for-completing-linux-labs_instructions.html |
108.51Кб |
04_search-methods-with-siem-tools_instructions.html |
415.57Кб |
04_security-domains-cybersecurity-analysts-need-to-know_instructions.html |
195.32Кб |
04_sql-filtering-versus-linux-filtering_instructions.html |
4.19Кб |
04_strings-and-the-security-analyst_instructions.html |
13.46Кб |
04_subnetting-and-cidr_instructions.html |
133.92Кб |
04_test-your-knowledge-cloud-hardening_quiz.html |
3.62Кб |
04_test-your-knowledge-network-hardening_quiz.html |
3.78Кб |
04_test-your-knowledge-os-hardening_quiz.html |
3.69Кб |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt |
4.39Кб |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt |
2.40Кб |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 |
9.87Мб |
04_the-future-of-siem-tools_instructions.html |
5.06Кб |
04_the-importance-of-cybersecurity.en.srt |
4.05Кб |
04_the-importance-of-cybersecurity.en.txt |
2.57Кб |
04_the-importance-of-cybersecurity.mp4 |
17.84Мб |
04_the-relationship-between-frameworks-and-controls_instructions.html |
6.56Кб |
04 the-relationship-between-frameworks-and-controls physical-access-control pdf |
6.95Мб |
04_the-value-of-cybersecurity-playbooks.en.srt |
6.08Кб |
04_the-value-of-cybersecurity-playbooks.en.txt |
3.20Кб |
04_the-value-of-cybersecurity-playbooks.mp4 |
13.00Мб |
04_tina-working-in-network-security.en.srt |
3.06Кб |
04_tina-working-in-network-security.en.txt |
1.64Кб |
04_tina-working-in-network-security.mp4 |
11.31Мб |
04_tips-for-finding-and-applying-for-a-job_instructions.html |
4.24Кб |
04_traits-of-an-effective-threat-model_instructions.html |
120.94Кб |
04_tri-life-in-asset-security.en.srt |
3.80Кб |
04_tri-life-in-asset-security.en.txt |
2.32Кб |
04_tri-life-in-asset-security.mp4 |
16.96Мб |
04_understand-attackers_instructions.html |
313.26Кб |
04_use-siem-tools-to-protect-organizations_instructions.html |
8.57Кб |
04_victoria-continue-your-learning-journey.en.srt |
3.93Кб |
04_victoria-continue-your-learning-journey.en.txt |
2.48Кб |
04_victoria-continue-your-learning-journey.mp4 |
15.43Мб |
04_welcome-to-week-1.en.srt |
1.95Кб |
04_welcome-to-week-1.en.txt |
1.03Кб |
04_welcome-to-week-1.mp4 |
4.67Мб |
04_while-loops.en.srt |
8.08Кб |
04_while-loops.en.txt |
4.25Кб |
04_while-loops.mp4 |
10.19Мб |
04_why-we-audit-user-activity.en.srt |
5.47Кб |
04_why-we-audit-user-activity.en.txt |
2.92Кб |
04_why-we-audit-user-activity.mp4 |
16.24Мб |
05_adedayo-sql-in-cybersecurity.en.srt |
3.81Кб |
05_adedayo-sql-in-cybersecurity.en.txt |
2.06Кб |
05_adedayo-sql-in-cybersecurity.mp4 |
13.70Мб |
05_alert-and-event-management-with-siem-and-soar-tools.en.srt |
5.97Кб |
05_alert-and-event-management-with-siem-and-soar-tools.en.txt |
3.72Кб |
05_alert-and-event-management-with-siem-and-soar-tools.mp4 |
14.47Мб |
05_ashley-my-path-to-cybersecurity.en.srt |
5.72Кб |
05_ashley-my-path-to-cybersecurity.en.txt |
3.04Кб |
05_ashley-my-path-to-cybersecurity.mp4 |
19.83Мб |
05_business-continuity-considerations_instructions.html |
6.20Кб |
05_common-cybersecurity-terminology_instructions.html |
5.55Кб |
05_complete-a-security-audit.en.srt |
5.29Кб |
05_complete-a-security-audit.en.txt |
3.41Кб |
05_complete-a-security-audit.mp4 |
16.98Мб |
05_conduct-pre-interview-research.en.srt |
5.04Кб |
05_conduct-pre-interview-research.en.txt |
2.73Кб |
05_conduct-pre-interview-research.mp4 |
12.58Мб |
05_data-exfiltration-attacks.en.srt |
7.21Кб |
05_data-exfiltration-attacks.en.txt |
3.90Кб |
05_data-exfiltration-attacks.mp4 |
15.53Мб |
05_emmanuel-useful-skills-for-network-security.en.srt |
4.86Кб |
05_emmanuel-useful-skills-for-network-security.en.txt |
2.51Кб |
05_emmanuel-useful-skills-for-network-security.mp4 |
13.44Мб |
05_examine-suricata-logs.en.srt |
3.26Кб |
05_examine-suricata-logs.en.txt |
2.04Кб |
05_examine-suricata-logs.mp4 |
7.37Мб |
05_garvey-cover-letter-tips.en.srt |
5.02Кб |
05_garvey-cover-letter-tips.en.txt |
3.01Кб |
05_garvey-cover-letter-tips.mp4 |
11.61Мб |
05 google-cybersecurity-certificate-glossary Google Cybersecurity Certificate glossary docx |
879.26Кб |
05_google-cybersecurity-certificate-glossary_instructions.html |
6.55Кб |
05_heather-protect-sensitive-data-and-information.en.srt |
3.12Кб |
05_heather-protect-sensitive-data-and-information.en.txt |
1.97Кб |
05_heather-protect-sensitive-data-and-information.mp4 |
16.82Мб |
05_heather-the-importance-of-protecting-pii.en.srt |
3.28Кб |
05_heather-the-importance-of-protecting-pii.en.txt |
1.76Кб |
05_heather-the-importance-of-protecting-pii.mp4 |
14.55Мб |
05 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx |
879.26Кб |
05_helpful-resources-and-tips_instructions.html |
11.20Кб |
05_indicators-of-compromise_instructions.html |
127.71Кб |
05_indicators-of-compromise_the-pyramid-of-pain.html |
67.09Кб |
05_investigate-packet-details_instructions.html |
3.64Мб |
05_karan-interview-tips-from-a-hiring-manager.en.srt |
4.92Кб |
05_karan-interview-tips-from-a-hiring-manager.en.txt |
2.64Кб |
05_karan-interview-tips-from-a-hiring-manager.mp4 |
18.50Мб |
05_linux-architecture-explained_instructions.html |
6.51Кб |
05_manage-common-threats-risks-and-vulnerabilities_instructions.html |
779.07Кб |
05_more-on-loops-in-python_instructions.html |
15.64Кб |
05_non-repudiation-and-hashing.en.srt |
4.96Кб |
05_non-repudiation-and-hashing.en.txt |
3.08Кб |
05_non-repudiation-and-hashing.mp4 |
13.51Мб |
05_parisa-the-parallels-of-accessibility-and-security.en.srt |
3.80Кб |
05_parisa-the-parallels-of-accessibility-and-security.en.txt |
2.45Кб |
05_parisa-the-parallels-of-accessibility-and-security.mp4 |
16.41Мб |
05_pathways-through-defenses.en.srt |
7.40Кб |
05_pathways-through-defenses.en.txt |
3.95Кб |
05_pathways-through-defenses.mp4 |
22.40Мб |
05_proxy-servers.en.srt |
4.94Кб |
05_proxy-servers.en.txt |
3.12Кб |
05_proxy-servers.mp4 |
11.21Мб |
05_python-environments_instructions.html |
4.16Кб |
05_responsible-use-of-sudo_instructions.html |
11.15Кб |
05_sean-keep-your-cool-during-a-data-breach.en.srt |
2.85Кб |
05_sean-keep-your-cool-during-a-data-breach.en.txt |
1.47Кб |
05_sean-keep-your-cool-during-a-data-breach.mp4 |
13.88Мб |
05_security-starts-with-asset-classification.en.srt |
6.62Кб |
05_security-starts-with-asset-classification.en.txt |
3.57Кб |
05_security-starts-with-asset-classification.mp4 |
16.89Мб |
05_test-your-knowledge-network-interception-attack-tactics_quiz.html |
4.01Кб |
05_test-your-knowledge-recognize-different-network-protocols_quiz.html |
3.44Кб |
05 test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks quiz html |
3.84Кб |
05_the-osi-model_instructions.html |
302.88Кб |
05_the-owasp-top-10_instructions.html |
141.88Кб |
05_the-where-clause-and-basic-operators_instructions.html |
8.07Кб |
05_tim-finding-purpose-in-protecting-assets.en.srt |
2.02Кб |
05_tim-finding-purpose-in-protecting-assets.en.txt |
1.23Кб |
05_tim-finding-purpose-in-protecting-assets.mp4 |
6.95Мб |
05_types-of-phishing_instructions.html |
339.37Кб |
05_variations-of-logs.en.srt |
6.77Кб |
05_variations-of-logs.en.txt |
3.59Кб |
05_variations-of-logs.mp4 |
11.91Мб |
05_work-with-built-in-functions_functions.html |
269.11Кб |
05_work-with-built-in-functions_instructions.html |
7.43Кб |
06_akash-python-and-the-cybersecurity-professional.en.srt |
2.00Кб |
06_akash-python-and-the-cybersecurity-professional.en.txt |
1.28Кб |
06_akash-python-and-the-cybersecurity-professional.mp4 |
5.72Мб |
06 analyze-indicators-of-compromise-with-investigative-tools instructions html |
1.46Мб |
06_build-rapport-with-interviewers.en.srt |
5.95Кб |
06_build-rapport-with-interviewers.en.txt |
3.17Кб |
06_build-rapport-with-interviewers.mp4 |
13.60Мб |
06_common-classification-requirements_instructions.html |
106.29Кб |
06_fortify-against-brute-force-cyber-attacks_instructions.html |
153.11Кб |
06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf |
1.21Мб |
06_identity-and-access-management_instructions.html |
302.88Кб |
06 more-about-security-audits Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf |
1.22Мб |
06_more-about-security-audits_Control_categories.docx |
837.97Кб |
06_more-about-security-audits_instructions.html |
8.82Кб |
06_network-tools.en.srt |
4.48Кб |
06_network-tools.en.txt |
2.44Кб |
06_network-tools.mp4 |
7.03Мб |
06_overview-of-log-file-formats_instructions.html |
16.37Кб |
06_overview-of-suricata_eve-json-examplesjq.html |
22.98Кб |
06_overview-of-suricata_index.html |
32.52Кб |
06_overview-of-suricata_instructions.html |
124.41Кб |
06_overview-of-suricata_suricata-update.html |
23.48Кб |
06_overview-of-suricata_suricata-yaml.html |
236.66Кб |
06_participate-in-program-surveys_instructions.html |
3.71Кб |
06_prepare-for-interviews-with-interview-warmup_instructions.html |
183.12Кб |
06_resources-for-completing-labs_instructions.html |
108.52Кб |
06_test-your-knowledge-network-communication_quiz.html |
4.89Кб |
06_the-evolution-of-hash-functions_instructions.html |
585.39Кб |
06_virtual-networks-and-privacy_instructions.html |
8.43Кб |
06_wireless-protocols.en.srt |
2.12Кб |
06_wireless-protocols.en.txt |
1.10Кб |
06_wireless-protocols.mp4 |
5.11Мб |
07_network-components-devices-and-diagrams_instructions.html |
1.68Мб |
07_test-your-knowledge-system-identification_quiz.html |
4.29Кб |
07_the-evolution-of-wireless-security-protocols_instructions.html |
159.17Кб |
08_cloud-networks.en.srt |
3.58Кб |
08_cloud-networks.en.txt |
2.33Кб |
08_cloud-networks.mp4 |
8.77Мб |
09_cloud-computing-and-software-defined-networks_instructions.html |
694.11Кб |
10_test-your-knowledge-introduction-to-networks_quiz.html |
3.51Кб |
Readme.txt |
51б |
Readme.txt |
51б |