Общая информация
Название [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
Тип
Размер 3.84Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[CourserHub.com].url 123б
[CourserHub.com].url 123б
01__01-intro.html 63.28Кб
01__16-software-updates.html 25.52Кб
01__2-4-3.html 8.64Кб
01__5.2 5.39Кб
01__55.html 42.49Кб
01__5-signs-youve-been-hit-with-an-apt.html 172.48Кб
01__7.1 11.66Кб
01__7.2 7.50Кб
01__7.5 8.17Кб
01__aa494182vexchg.140 33.94Кб
01__article.asp 62.82Кб
01 Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf 1.22Мб
01__bootup.html 8.15Кб
01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf 142.37Кб
01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf 360.21Кб
01__cis-controls-and-the-hph.pdf 1.49Мб
01__Course_1_glossary.docx 858.74Кб
01__Course_2_glossary.docx 858.52Кб
01__Course_3_glossary.docx 857.56Кб
01__Course_4_glossary.docx 1.12Мб
01__Course_5_glossary.docx 862.38Кб
01__Course_6_glossary.docx 859.78Кб
01__Course_7_glossary.docx 869.87Кб
01__Course_8_glossary.docx 1.11Мб
01__csos-guide-to-phishing-and-phishing-kits.html 155.82Кб
01__Cyber-Incident-Response-Standard.docx 63.29Кб
01__display.cfm 37.04Кб
01__dod85.pdf 239.72Кб
01__encryption-explained.html 45.23Кб
01 Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 508C pdf 1.09Мб
01__Format-Security-plus-Study-Guide.pdf 16.83Кб
01__FULL_TEXT.pdf 1.41Мб
01__functions.html 269.11Кб
01__gcat_threathorizons_full_sept2022.pdf 2.97Мб
01 gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations html 155.44Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.26Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.26Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.26Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.15Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.26Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.26Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.26Кб
01__Google_Cybersecurity_Certificate_glossary.docx 879.26Кб
01__guidelines.html 17.43Кб
01 hashing-explained-why-its-your-best-bet-to-protect-stored-passwords html 159.54Кб
01__hipaa.html 195.91Кб
01__hipaa.html 195.91Кб
01__index.html 32.52Кб
01__index.html 1.60Мб
01__index.html 21.33Кб
01__index.html 22.90Кб
01__IntroToCybersecurityEthics.pdf 578.32Кб
01__Linux-in-a-Nutshell-6th-Edition.pdf 12.42Мб
01__malware.html 211.67Кб
01__ncsam_eskimming_508.pdf 780.84Кб
01__network-operations-center.html 219.59Кб
01__nist_small_business_fundamentals_july_2019.pptx 4.16Мб
01__NIST.FIPS.140-3.pdf 303.35Кб
01__NIST.SP.800-218.pdf 722.55Кб
01__NIST.SP.800-53r5.pdf 5.79Мб
01__nist.sp.800-61r2.pdf 1.47Мб
01__nist.sp.800-61r2.pdf 1.47Мб
01__nistspecialpublication800-92.pdf 1.68Мб
01__operating-system2.htm 153.60Кб
01__overview.html 636.47Кб
01__paper.pdf 196.74Кб
01__physical-access-control.pdf 6.95Мб
01__question525.htm 170.30Кб
01__R0239.pdf 220.58Кб
01__R46536.pdf 1.29Мб
01__RAID4.pdf 284.66Кб
01__resources.html 18.57Кб
01__resources.html 6.55Кб
01__resources.html 108.50Кб
01__resources.html 60.18Кб
01__resources.html 6.49Кб
01__resources.html 15.95Кб
01__resources.html 8.76Кб
01__resources.html 18.68Кб
01__resources.html 6.55Кб
01__resources.html 6.49Кб
01__resources.html 6.99Кб
01__resources.html 15.95Кб
01__resources.html 8.76Кб
01__resources.html 18.58Кб
01__resources.html 6.55Кб
01__resources.html 108.50Кб
01__resources.html 6.49Кб
01__resources.html 37.05Кб
01__resources.html 15.95Кб
01__resources.html 8.76Кб
01__resources.html 19.42Кб
01__resources.html 6.49Кб
01__resources.html 28.11Кб
01__resources.html 6.55Кб
01__resources.html 15.95Кб
01__resources.html 18.57Кб
01__resources.html 6.55Кб
01__resources.html 108.51Кб
01__resources.html 108.50Кб
01__resources.html 6.48Кб
01__resources.html 19.77Кб
01__resources.html 15.95Кб
01__resources.html 8.76Кб
01__resources.html 18.59Кб
01__resources.html 6.55Кб
01__resources.html 6.49Кб
01__resources.html 33.05Кб
01__resources.html 15.95Кб
01__resources.html 8.76Кб
01__resources.html 18.56Кб
01__resources.html 6.55Кб
01__resources.html 6.45Кб
01__resources.html 17.59Кб
01__resources.html 15.95Кб
01__resources.html 8.76Кб
01__resources.html 18.56Кб
01__resources.html 6.43Кб
01__resources.html 11.47Кб
01__resources.html 6.55Кб
01__resources.html 15.95Кб
01__resources.html 8.75Кб
01__rules-and-security-requirements.html 74.82Кб
01__ShellIntro.pdf 124.26Кб
01__sp800-179r1-draft.pdf 1.82Мб
01__sql_injection.asp 110.14Кб
01__ssrf-attacks-explained-and-how-to-defend-against-them.html 155.61Кб
01__subsection3.1.html 4.33Кб
01__suricata-update.html 23.48Кб
01__suricata-yaml.html 236.66Кб
01__tcpdump.1.html 72.58Кб
01__thegnuproject.html 65.07Кб
01__the-pyramid-of-pain.html 67.09Кб
01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf 1.23Мб
01__vol01iss13.cfm 45.52Кб
01__vulnerability-vs-threat-vs-risk.html 76.72Кб
01__what-is-a-firewall.html 61.35Кб
01__what-is-cve-its-definition-and-purpose.html 169.18Кб
01__what-is-owasp-top-10.html 247.53Кб
01__what-is-phishing-examples-types-and-techniques.html 161.47Кб
01__why-splunk.html 227.46Кб
01__why-splunk.html 227.45Кб
01__xml_whatis.asp 89.39Кб
01_access-a-text-file-in-python.en.srt 4.03Кб
01_access-a-text-file-in-python.en.txt 2.51Кб
01_access-a-text-file-in-python.mp4 10.51Мб
01_access-controls-and-authentication-systems.en.srt 6.18Кб
01_access-controls-and-authentication-systems.en.txt 3.93Кб
01_access-controls-and-authentication-systems.mp4 18.28Мб
01_a-proactive-approach-to-security.en.srt 4.94Кб
01_a-proactive-approach-to-security.en.txt 3.12Кб
01_a-proactive-approach-to-security.mp4 17.07Мб
01_assets-in-a-digital-world.en.srt 6.62Кб
01_assets-in-a-digital-world.en.txt 3.54Кб
01_assets-in-a-digital-world.mp4 17.96Мб
01_basic-queries.en.srt 4.66Кб
01_basic-queries.en.txt 2.48Кб
01_basic-queries.mp4 8.95Мб
01_clear-and-concise-communication.en.srt 3.65Кб
01_clear-and-concise-communication.en.txt 1.97Кб
01_clear-and-concise-communication.mp4 12.14Мб
01_conditional-statements-in-python.en.srt 9.67Кб
01_conditional-statements-in-python.en.txt 6.16Кб
01_conditional-statements-in-python.mp4 17.68Мб
01_core-skills-for-cybersecurity-professionals.en.srt 7.63Кб
01_core-skills-for-cybersecurity-professionals.en.txt 4.08Кб
01_core-skills-for-cybersecurity-professionals.mp4 19.32Мб
01_course-wrap-up.en.srt 4.42Кб
01_course-wrap-up.en.srt 3.55Кб
01_course-wrap-up.en.srt 3.58Кб
01_course-wrap-up.en.srt 2.98Кб
01_course-wrap-up.en.srt 2.31Кб
01_course-wrap-up.en.srt 1.92Кб
01_course-wrap-up.en.srt 2.94Кб
01_course-wrap-up.en.txt 2.73Кб
01_course-wrap-up.en.txt 1.86Кб
01_course-wrap-up.en.txt 1.86Кб
01_course-wrap-up.en.txt 1.63Кб
01_course-wrap-up.en.txt 1.25Кб
01_course-wrap-up.en.txt 1.24Кб
01_course-wrap-up.en.txt 1.86Кб
01_course-wrap-up.mp4 17.66Мб
01_course-wrap-up.mp4 11.84Мб
01_course-wrap-up.mp4 5.84Мб
01_course-wrap-up.mp4 7.71Мб
01_course-wrap-up.mp4 3.76Мб
01_course-wrap-up.mp4 5.22Мб
01_course-wrap-up.mp4 6.64Мб
01_cross-site-scripting.en.srt 7.31Кб
01_cross-site-scripting.en.txt 4.50Кб
01_cross-site-scripting.mp4 21.50Мб
01_damar-my-journey-into-linux-commands.en.srt 3.69Кб
01_damar-my-journey-into-linux-commands.en.txt 2.28Кб
01_damar-my-journey-into-linux-commands.mp4 13.58Мб
01_data-types-in-python.en.srt 7.60Кб
01_data-types-in-python.en.txt 3.91Кб
01_data-types-in-python.mp4 19.40Мб
01_debugging-strategies.en.srt 8.46Кб
01_debugging-strategies.en.txt 4.43Кб
01_debugging-strategies.mp4 23.10Мб
01_denial-of-service-dos-attacks.en.srt 7.83Кб
01_denial-of-service-dos-attacks.en.txt 4.21Кб
01_denial-of-service-dos-attacks.mp4 18.55Мб
01_detect-and-protect-without-neglect.en.srt 5.74Кб
01_detect-and-protect-without-neglect.en.txt 3.09Кб
01_detect-and-protect-without-neglect.mp4 18.60Мб
01_develop-an-elevator-pitch.en.srt 4.48Кб
01_develop-an-elevator-pitch.en.txt 2.86Кб
01_develop-an-elevator-pitch.mp4 13.00Мб
01_elements-of-a-security-plan.en.srt 6.19Кб
01_elements-of-a-security-plan.en.txt 3.98Кб
01_elements-of-a-security-plan.mp4 20.22Мб
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt 4.72Кб
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt 3.10Кб
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 14.69Мб
01_ethics-in-cybersecurity.en.srt 6.56Кб
01_ethics-in-cybersecurity.en.txt 4.14Кб
01_ethics-in-cybersecurity.mp4 22.54Мб
01_explore-common-siem-tools.en.srt 4.35Кб
01_explore-common-siem-tools.en.txt 2.83Кб
01_explore-common-siem-tools.mp4 14.71Мб
01_explore-the-cia-triad.en.srt 4.80Кб
01_explore-the-cia-triad.en.txt 3.08Кб
01_explore-the-cia-triad.mp4 14.74Мб
01_explore-the-interview-process.en.srt 6.36Кб
01_explore-the-interview-process.en.txt 3.42Кб
01_explore-the-interview-process.mp4 14.00Мб
01_file-permissions-and-ownership.en.srt 11.06Кб
01_file-permissions-and-ownership.en.txt 5.80Кб
01_file-permissions-and-ownership.mp4 16.73Мб
01_filter-dates-and-numbers.en.srt 5.14Кб
01_filter-dates-and-numbers.en.txt 3.19Кб
01_filter-dates-and-numbers.mp4 10.99Мб
01_find-what-you-need-with-linux.en.srt 7.57Кб
01_find-what-you-need-with-linux.en.txt 3.91Кб
01_find-what-you-need-with-linux.mp4 10.67Мб
01_firewalls-and-network-security-measures.en.srt 7.40Кб
01_firewalls-and-network-security-measures.en.txt 3.95Кб
01_firewalls-and-network-security-measures.mp4 16.81Мб
01_from-simple-activity-to-major-data-breach.en.srt 5.47Кб
01_from-simple-activity-to-major-data-breach.en.txt 2.89Кб
01_from-simple-activity-to-major-data-breach.mp4 18.28Мб
01_fundamentals-of-cryptography.en.srt 5.94Кб
01_fundamentals-of-cryptography.en.txt 3.76Кб
01_fundamentals-of-cryptography.mp4 22.57Мб
01_gui-versus-cli.en.srt 6.97Кб
01_gui-versus-cli.en.txt 3.73Кб
01_gui-versus-cli.mp4 14.08Мб
01_incident-response-teams.en.srt 4.62Кб
01_incident-response-teams.en.txt 2.91Кб
01_incident-response-teams.mp4 12.44Мб
01_incident-response-tools.en.srt 2.81Кб
01_incident-response-tools.en.txt 1.53Кб
01_incident-response-tools.mp4 5.42Мб
01_inside-the-operating-system.en.srt 5.76Кб
01_inside-the-operating-system.en.txt 3.11Кб
01_inside-the-operating-system.mp4 10.46Мб
01_introduction-to-course-2.en.srt 2.38Кб
01_introduction-to-course-2.en.txt 1.49Кб
01_introduction-to-course-2.mp4 7.91Мб
01_introduction-to-course-3.en.srt 1.75Кб
01_introduction-to-course-3.en.txt 1.10Кб
01_introduction-to-course-3.mp4 3.60Мб
01_introduction-to-course-4.en.srt 3.92Кб
01_introduction-to-course-4.en.txt 2.07Кб
01_introduction-to-course-4.mp4 8.66Мб
01_introduction-to-course-5.en.srt 4.40Кб
01_introduction-to-course-5.en.txt 2.78Кб
01_introduction-to-course-5.mp4 16.06Мб
01_introduction-to-course-6.en.srt 4.11Кб
01_introduction-to-course-6.en.txt 2.20Кб
01_introduction-to-course-6.mp4 7.20Мб
01_introduction-to-course-7.en.srt 4.79Кб
01_introduction-to-course-7.en.txt 3.01Кб
01_introduction-to-course-7.mp4 18.04Мб
01_introduction-to-course-8.en.srt 3.85Кб
01_introduction-to-course-8.en.txt 2.40Кб
01_introduction-to-course-8.mp4 13.12Мб
01_introduction-to-cybersecurity.en.srt 7.14Кб
01_introduction-to-cybersecurity.en.txt 3.83Кб
01_introduction-to-cybersecurity.mp4 23.11Мб
01_introduction-to-linux-sql-and-python.en.srt 5.13Кб
01_introduction-to-linux-sql-and-python.en.txt 2.75Кб
01_introduction-to-linux-sql-and-python.mp4 14.49Мб
01_introduction-to-network-communication.en.srt 3.67Кб
01_introduction-to-network-communication.en.txt 2.35Кб
01_introduction-to-network-communication.mp4 7.25Мб
01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt 5.27Кб
01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt 3.32Кб
01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 18.32Мб
01_introduction-to-the-shell.en.srt 2.68Кб
01_introduction-to-the-shell.en.txt 1.66Кб
01_introduction-to-the-shell.mp4 5.98Мб
01_ip-addresses-and-network-communication.en.srt 4.16Кб
01_ip-addresses-and-network-communication.en.txt 2.21Кб
01_ip-addresses-and-network-communication.mp4 7.31Мб
01_join-tables-in-sql.en.srt 8.47Кб
01_join-tables-in-sql.en.txt 4.54Кб
01_join-tables-in-sql.mp4 12.29Мб
01_linux-distributions.en.srt 4.25Кб
01_linux-distributions.en.txt 2.63Кб
01_linux-distributions.mp4 10.30Мб
01_list-operations-in-python.en.srt 8.29Кб
01_list-operations-in-python.en.txt 5.15Кб
01_list-operations-in-python.mp4 19.31Мб
01_malicious-packet-sniffing.en.srt 8.04Кб
01_malicious-packet-sniffing.en.txt 4.29Кб
01_malicious-packet-sniffing.mp4 19.32Мб
01_malicious-software.en.srt 7.57Кб
01_malicious-software.en.txt 4.06Кб
01_malicious-software.mp4 24.52Мб
01_modules-and-libraries.en.srt 3.25Кб
01_modules-and-libraries.en.txt 2.04Кб
01_modules-and-libraries.mp4 11.35Мб
01_network-hardening-practices.en.srt 6.19Кб
01_network-hardening-practices.en.txt 3.31Кб
01_network-hardening-practices.mp4 16.90Мб
01_network-security-in-the-cloud.en.srt 2.82Кб
01_network-security-in-the-cloud.en.txt 1.84Кб
01_network-security-in-the-cloud.mp4 9.73Мб
01_nist-frameworks.en.srt 6.85Кб
01_nist-frameworks.en.txt 3.64Кб
01_nist-frameworks.mp4 18.00Мб
01_os-hardening-practices.en.srt 7.52Кб
01_os-hardening-practices.en.txt 3.97Кб
01_os-hardening-practices.mp4 18.03Мб
01_owasp-security-principles.en.srt 6.59Кб
01_owasp-security-principles.en.txt 3.51Кб
01_owasp-security-principles.mp4 19.09Мб
01_packet-captures-with-tcpdump.en.srt 6.99Кб
01_packet-captures-with-tcpdump.en.txt 3.68Кб
01_packet-captures-with-tcpdump.mp4 9.30Мб
01_packets-and-packet-captures.en.srt 5.11Кб
01_packets-and-packet-captures.en.txt 2.76Кб
01_packets-and-packet-captures.mp4 10.23Мб
01_prepare-to-escalate-through-security-recognition.en.srt 5.55Кб
01_prepare-to-escalate-through-security-recognition.en.txt 2.94Кб
01_prepare-to-escalate-through-security-recognition.mp4 17.27Мб
01_protect-all-entry-points.en.srt 5.74Кб
01_protect-all-entry-points.en.txt 3.59Кб
01_protect-all-entry-points.mp4 22.54Мб
01_recap-of-the-google-cybersecurity-certificate-program.en.srt 3.91Кб
01_recap-of-the-google-cybersecurity-certificate-program.en.txt 2.13Кб
01_recap-of-the-google-cybersecurity-certificate-program.mp4 8.85Мб
01_reexamine-siem-tools.en.srt 3.64Кб
01_reexamine-siem-tools.en.txt 2.25Кб
01_reexamine-siem-tools.mp4 9.10Мб
01_regular-expressions-in-python.en.srt 10.37Кб
01_regular-expressions-in-python.en.txt 6.45Кб
01_regular-expressions-in-python.mp4 21.86Мб
01_security-monitoring-with-detection-tools.en.srt 6.08Кб
01_security-monitoring-with-detection-tools.en.txt 3.27Кб
01_security-monitoring-with-detection-tools.mp4 14.69Мб
01_the-benefits-of-documentation.en.srt 3.57Кб
01_the-benefits-of-documentation.en.txt 2.29Кб
01_the-benefits-of-documentation.mp4 9.32Мб
01_the-post-incident-activity-phase-of-the-lifecycle.en.srt 3.54Кб
01_the-post-incident-activity-phase-of-the-lifecycle.en.txt 2.22Кб
01_the-post-incident-activity-phase-of-the-lifecycle.mp4 8.22Мб
01_the-role-of-triage-in-incident-response.en.srt 6.03Кб
01_the-role-of-triage-in-incident-response.en.txt 3.21Кб
01_the-role-of-triage-in-incident-response.mp4 11.56Мб
01_threats-risks-and-vulnerabilities.en.srt 5.90Кб
01_threats-risks-and-vulnerabilities.en.txt 3.76Кб
01_threats-risks-and-vulnerabilities.mp4 17.04Мб
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt 5.86Кб
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt 3.18Кб
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 19.05Мб
01_use-parameters-in-functions.en.srt 5.43Кб
01_use-parameters-in-functions.en.txt 3.32Кб
01_use-parameters-in-functions.mp4 10.62Мб
01_use-strategies-to-answer-interview-questions.en.srt 4.34Кб
01_use-strategies-to-answer-interview-questions.en.txt 2.76Кб
01_use-strategies-to-answer-interview-questions.mp4 12.02Мб
01_visual-storytelling-in-cybersecurity.en.srt 3.79Кб
01_visual-storytelling-in-cybersecurity.en.txt 2.37Кб
01_visual-storytelling-in-cybersecurity.mp4 16.07Мб
01_vulnerability-assessments.en.srt 5.86Кб
01_vulnerability-assessments.en.txt 3.11Кб
01_vulnerability-assessments.mp4 19.46Мб
01_welcome-to-the-google-cybersecurity-certificate.en.srt 15.24Кб
01_welcome-to-the-google-cybersecurity-certificate.en.txt 8.04Кб
01_welcome-to-the-google-cybersecurity-certificate.mp4 47.29Мб
01_welcome-to-week-1.en.srt 3.30Кб
01_welcome-to-week-1.en.srt 2.86Кб
01_welcome-to-week-1.en.srt 2.51Кб
01_welcome-to-week-1.en.srt 1.54Кб
01_welcome-to-week-1.en.srt 1.63Кб
01_welcome-to-week-1.en.srt 863б
01_welcome-to-week-1.en.srt 1.02Кб
01_welcome-to-week-1.en.txt 2.08Кб
01_welcome-to-week-1.en.txt 1.48Кб
01_welcome-to-week-1.en.txt 1.59Кб
01_welcome-to-week-1.en.txt 878б
01_welcome-to-week-1.en.txt 1.04Кб
01_welcome-to-week-1.en.txt 533б
01_welcome-to-week-1.en.txt 545б
01_welcome-to-week-1.mp4 10.16Мб
01_welcome-to-week-1.mp4 7.80Мб
01_welcome-to-week-1.mp4 5.80Мб
01_welcome-to-week-1.mp4 2.94Мб
01_welcome-to-week-1.mp4 4.46Мб
01_welcome-to-week-1.mp4 2.30Мб
01_welcome-to-week-1.mp4 1.79Мб
01_welcome-to-week-2.en.srt 3.12Кб
01_welcome-to-week-2.en.srt 2.18Кб
01_welcome-to-week-2.en.srt 1.85Кб
01_welcome-to-week-2.en.srt 2.15Кб
01_welcome-to-week-2.en.srt 1.59Кб
01_welcome-to-week-2.en.srt 1.68Кб
01_welcome-to-week-2.en.srt 1.98Кб
01_welcome-to-week-2.en.srt 2.30Кб
01_welcome-to-week-2.en.txt 1.70Кб
01_welcome-to-week-2.en.txt 1.17Кб
01_welcome-to-week-2.en.txt 1023б
01_welcome-to-week-2.en.txt 1.13Кб
01_welcome-to-week-2.en.txt 889б
01_welcome-to-week-2.en.txt 950б
01_welcome-to-week-2.en.txt 1.09Кб
01_welcome-to-week-2.en.txt 1.18Кб
01_welcome-to-week-2.mp4 9.84Мб
01_welcome-to-week-2.mp4 5.01Мб
01_welcome-to-week-2.mp4 3.69Мб
01_welcome-to-week-2.mp4 6.71Мб
01_welcome-to-week-2.mp4 3.23Мб
01_welcome-to-week-2.mp4 5.42Мб
01_welcome-to-week-2.mp4 4.60Мб
01_welcome-to-week-2.mp4 6.07Мб
01_welcome-to-week-3.en.srt 2.84Кб
01_welcome-to-week-3.en.srt 1.92Кб
01_welcome-to-week-3.en.srt 1.55Кб
01_welcome-to-week-3.en.srt 3.81Кб
01_welcome-to-week-3.en.srt 2.66Кб
01_welcome-to-week-3.en.srt 1.30Кб
01_welcome-to-week-3.en.srt 710б
01_welcome-to-week-3.en.srt 1.15Кб
01_welcome-to-week-3.en.txt 1.69Кб
01_welcome-to-week-3.en.txt 1.03Кб
01_welcome-to-week-3.en.txt 954б
01_welcome-to-week-3.en.txt 2.36Кб
01_welcome-to-week-3.en.txt 1.41Кб
01_welcome-to-week-3.en.txt 835б
01_welcome-to-week-3.en.txt 447б
01_welcome-to-week-3.en.txt 715б
01_welcome-to-week-3.mp4 9.15Мб
01_welcome-to-week-3.mp4 4.89Мб
01_welcome-to-week-3.mp4 3.53Мб
01_welcome-to-week-3.mp4 14.48Мб
01_welcome-to-week-3.mp4 5.11Мб
01_welcome-to-week-3.mp4 4.27Мб
01_welcome-to-week-3.mp4 1.32Мб
01_welcome-to-week-3.mp4 3.69Мб
01_welcome-to-week-4.en.srt 3.04Кб
01_welcome-to-week-4.en.srt 1.95Кб
01_welcome-to-week-4.en.srt 2.17Кб
01_welcome-to-week-4.en.srt 2.56Кб
01_welcome-to-week-4.en.srt 2.57Кб
01_welcome-to-week-4.en.srt 912б
01_welcome-to-week-4.en.srt 1.50Кб
01_welcome-to-week-4.en.srt 2.19Кб
01_welcome-to-week-4.en.txt 1.62Кб
01_welcome-to-week-4.en.txt 1.03Кб
01_welcome-to-week-4.en.txt 1.32Кб
01_welcome-to-week-4.en.txt 1.38Кб
01_welcome-to-week-4.en.txt 1.38Кб
01_welcome-to-week-4.en.txt 548б
01_welcome-to-week-4.en.txt 929б
01_welcome-to-week-4.en.txt 1.37Кб
01_welcome-to-week-4.mp4 8.59Мб
01_welcome-to-week-4.mp4 5.14Мб
01_welcome-to-week-4.mp4 5.00Мб
01_welcome-to-week-4.mp4 7.04Мб
01_welcome-to-week-4.mp4 5.29Мб
01_welcome-to-week-4.mp4 2.97Мб
01_welcome-to-week-4.mp4 3.84Мб
01_welcome-to-week-4.mp4 6.84Мб
01_welcome-to-week-5.en.srt 2.64Кб
01_welcome-to-week-5.en.txt 1.45Кб
01_welcome-to-week-5.mp4 7.55Мб
01_wrap-up.en.srt 3.04Кб
01_wrap-up.en.srt 2.36Кб
01_wrap-up.en.srt 3.57Кб
01_wrap-up.en.srt 2.79Кб
01_wrap-up.en.srt 1.58Кб
01_wrap-up.en.srt 1.75Кб
01_wrap-up.en.srt 1.79Кб
01_wrap-up.en.srt 1.47Кб
01_wrap-up.en.srt 1.39Кб
01_wrap-up.en.srt 1.61Кб
01_wrap-up.en.srt 1.65Кб
01_wrap-up.en.srt 1.83Кб
01_wrap-up.en.srt 1.66Кб
01_wrap-up.en.srt 2.21Кб
01_wrap-up.en.srt 1.68Кб
01_wrap-up.en.srt 1012б
01_wrap-up.en.srt 1.89Кб
01_wrap-up.en.srt 1.41Кб
01_wrap-up.en.srt 1.34Кб
01_wrap-up.en.srt 2.25Кб
01_wrap-up.en.srt 1.45Кб
01_wrap-up.en.srt 2.82Кб
01_wrap-up.en.srt 1.18Кб
01_wrap-up.en.srt 1.24Кб
01_wrap-up.en.srt 1.03Кб
01_wrap-up.en.srt 1.10Кб
01_wrap-up.en.srt 1.35Кб
01_wrap-up.en.srt 1.58Кб
01_wrap-up.en.srt 1.55Кб
01_wrap-up.en.srt 1.60Кб
01_wrap-up.en.srt 2.89Кб
01_wrap-up.en.srt 1.36Кб
01_wrap-up.en.srt 1.06Кб
01_wrap-up.en.txt 1.62Кб
01_wrap-up.en.txt 1.54Кб
01_wrap-up.en.txt 1.92Кб
01_wrap-up.en.txt 1.50Кб
01_wrap-up.en.txt 949б
01_wrap-up.en.txt 952б
01_wrap-up.en.txt 992б
01_wrap-up.en.txt 806б
01_wrap-up.en.txt 788б
01_wrap-up.en.txt 872б
01_wrap-up.en.txt 1.06Кб
01_wrap-up.en.txt 1.14Кб
01_wrap-up.en.txt 925б
01_wrap-up.en.txt 1.45Кб
01_wrap-up.en.txt 953б
01_wrap-up.en.txt 648б
01_wrap-up.en.txt 1.11Кб
01_wrap-up.en.txt 735б
01_wrap-up.en.txt 876б
01_wrap-up.en.txt 1.20Кб
01_wrap-up.en.txt 882б
01_wrap-up.en.txt 1.50Кб
01_wrap-up.en.txt 780б
01_wrap-up.en.txt 836б
01_wrap-up.en.txt 620б
01_wrap-up.en.txt 727б
01_wrap-up.en.txt 747б
01_wrap-up.en.txt 909б
01_wrap-up.en.txt 1018б
01_wrap-up.en.txt 1.01Кб
01_wrap-up.en.txt 1.51Кб
01_wrap-up.en.txt 856б
01_wrap-up.en.txt 586б
01_wrap-up.mp4 6.83Мб
01_wrap-up.mp4 8.23Мб
01_wrap-up.mp4 11.83Мб
01_wrap-up.mp4 8.07Мб
01_wrap-up.mp4 3.43Мб
01_wrap-up.mp4 3.75Мб
01_wrap-up.mp4 3.67Мб
01_wrap-up.mp4 2.89Мб
01_wrap-up.mp4 2.38Мб
01_wrap-up.mp4 3.20Мб
01_wrap-up.mp4 2.86Мб
01_wrap-up.mp4 3.44Мб
01_wrap-up.mp4 3.99Мб
01_wrap-up.mp4 7.36Мб
01_wrap-up.mp4 4.70Мб
01_wrap-up.mp4 2.06Мб
01_wrap-up.mp4 3.16Мб
01_wrap-up.mp4 2.83Мб
01_wrap-up.mp4 3.36Мб
01_wrap-up.mp4 3.38Мб
01_wrap-up.mp4 3.95Мб
01_wrap-up.mp4 7.07Мб
01_wrap-up.mp4 2.62Мб
01_wrap-up.mp4 4.37Мб
01_wrap-up.mp4 1.71Мб
01_wrap-up.mp4 2.77Мб
01_wrap-up.mp4 2.93Мб
01_wrap-up.mp4 3.14Мб
01_wrap-up.mp4 4.09Мб
01_wrap-up.mp4 4.50Мб
01_wrap-up.mp4 9.05Мб
01_wrap-up.mp4 3.85Мб
01_wrap-up.mp4 1.96Мб
02_an-introduction-to-malware_instructions.html 163.88Кб
02_apply-debugging-strategies.en.srt 7.90Кб
02_apply-debugging-strategies.en.txt 4.18Кб
02_apply-debugging-strategies.mp4 13.56Мб
02_apply-the-star-method-during-interviews_instructions.html 50.99Кб
02_approach-cybersecurity-with-an-attacker-mindset_instructions.html 206.00Кб
02_approaches-to-vulnerability-scanning_instructions.html 7.45Кб
02_automate-cybersecurity-tasks-with-python.en.srt 5.73Кб
02_automate-cybersecurity-tasks-with-python.en.txt 3.02Кб
02_automate-cybersecurity-tasks-with-python.mp4 19.07Мб
02_brute-force-attacks-and-os-hardening_instructions.html 8.12Кб
02_building-blocks-of-cybersecurity-communications.en.srt 5.82Кб
02_building-blocks-of-cybersecurity-communications.en.txt 3.07Кб
02_building-blocks-of-cybersecurity-communications.mp4 17.00Мб
02_casey-apply-soft-skills-in-cybersecurity.en.srt 2.75Кб
02_casey-apply-soft-skills-in-cybersecurity.en.txt 1.46Кб
02_casey-apply-soft-skills-in-cybersecurity.mp4 13.89Мб
02_change-permissions.en.srt 7.17Кб
02_change-permissions.en.txt 3.79Кб
02_change-permissions.mp4 9.40Мб
02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt 3.69Кб
02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt 1.97Кб
02_chantelle-the-value-of-diversity-in-cybersecurity.mp4 14.09Мб
02_chris-my-path-to-cybersecurity.en.srt 4.91Кб
02_chris-my-path-to-cybersecurity.en.txt 2.63Кб
02_chris-my-path-to-cybersecurity.mp4 18.89Мб
02_code-readability.en.srt 6.10Кб
02_code-readability.en.txt 3.86Кб
02_code-readability.mp4 19.05Мб
02_common-cybersecurity-tools.en.srt 7.10Кб
02_common-cybersecurity-tools.en.txt 3.79Кб
02_common-cybersecurity-tools.mp4 20.23Мб
02_components-of-network-layer-communication_instructions.html 642.17Кб
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en srt 2.82Кб
02 congratulations-on-completing-the-google-cybersecurity-certificate-program en txt 1.40Кб
02 congratulations-on-completing-the-google-cybersecurity-certificate-program mp4 9.41Мб
02_connect-with-other-cybersecurity-professionals_instructions.html 4.24Кб
02_course-1-glossary_Course_1_glossary.docx 858.91Кб
02_course-1-glossary_instructions.html 6.49Кб
02_course-2-glossary_Course_2_glossary.docx 858.52Кб
02_course-2-glossary_instructions.html 6.49Кб
02_course-2-overview_instructions.html 1.85Мб
02_course-3-glossary_Course_3_glossary.docx 857.56Кб
02_course-3-glossary_instructions.html 6.45Кб
02_course-3-overview_instructions.html 1.22Мб
02_course-4-glossary_Course_4_glossary.docx 1.12Мб
02_course-4-glossary_instructions.html 6.48Кб
02_course-4-overview_instructions.html 1.20Мб
02_course-5-glossary_Course_5_glossary.docx 862.38Кб
02_course-5-glossary_instructions.html 6.49Кб
02_course-5-overview_instructions.html 1.26Мб
02_course-6-glossary_Course_6_glossary.docx 859.70Кб
02_course-6-glossary_instructions.html 6.49Кб
02_course-6-overview_instructions.html 1.27Мб
02_course-7-glossary_Course_7_glossary.docx 869.85Кб
02_course-7-glossary_instructions.html 6.49Кб
02_course-7-overview_instructions.html 1.21Мб
02_course-8-overview_instructions.html 1.38Мб
02 create-visual-dashboards-for-impactful-cybersecurity-communications instructions html 4.98Кб
02_detection-tools-and-techniques_instructions.html 342.75Кб
02_disaster-recovery-and-business-continuity_instructions.html 5.50Кб
02_document-evidence-with-chain-of-custody-forms.en.srt 5.57Кб
02_document-evidence-with-chain-of-custody-forms.en.txt 3.52Кб
02_document-evidence-with-chain-of-custody-forms.mp4 13.10Мб
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en srt 4.40Кб
02 erin-the-importance-of-diversity-of-perspective-on-a-security-team en txt 2.75Кб
02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 19.88Мб
02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html 7.87Кб
02_exploitable-gaps-in-databases.en.srt 5.10Кб
02_exploitable-gaps-in-databases.en.txt 3.21Кб
02_exploitable-gaps-in-databases.mp4 17.35Мб
02_explore-the-cissp-security-domains-part-1.en.srt 6.17Кб
02_explore-the-cissp-security-domains-part-1.en.txt 3.99Кб
02_explore-the-cissp-security-domains-part-1.mp4 19.14Мб
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt 6.04Кб
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt 3.19Кб
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 15.16Мб
02_fatima-the-importance-of-communication-during-incident-response.en.srt 4.60Кб
02_fatima-the-importance-of-communication-during-incident-response.en.txt 2.38Кб
02_fatima-the-importance-of-communication-during-incident-response.mp4 15.18Мб
02_filter-content-in-linux_instructions.html 8.70Кб
02_find-cybersecurity-jobs.en.srt 5.55Кб
02_find-cybersecurity-jobs.en.txt 2.97Кб
02_find-cybersecurity-jobs.mp4 16.32Мб
02_frameworks.en.srt 3.45Кб
02_frameworks.en.txt 1.90Кб
02_frameworks.mp4 10.33Мб
02_glossary-terms-from-week-1_instructions.html 3.42Кб
02_glossary-terms-from-week-1_instructions.html 4.02Кб
02_glossary-terms-from-week-1_instructions.html 4.14Кб
02_glossary-terms-from-week-1_instructions.html 2.75Кб
02_glossary-terms-from-week-1_instructions.html 2.47Кб
02_glossary-terms-from-week-1_instructions.html 3.91Кб
02_glossary-terms-from-week-1_instructions.html 4.49Кб
02_glossary-terms-from-week-1_instructions.html 2.30Кб
02_glossary-terms-from-week-2_instructions.html 7.07Кб
02_glossary-terms-from-week-2_instructions.html 3.05Кб
02_glossary-terms-from-week-2_instructions.html 4.03Кб
02_glossary-terms-from-week-2_instructions.html 4.22Кб
02_glossary-terms-from-week-2_instructions.html 4.96Кб
02_glossary-terms-from-week-2_instructions.html 4.96Кб
02_glossary-terms-from-week-2_instructions.html 5.09Кб
02_glossary-terms-from-week-2_instructions.html 2.44Кб
02_glossary-terms-from-week-3_instructions.html 3.63Кб
02_glossary-terms-from-week-3_instructions.html 2.57Кб
02_glossary-terms-from-week-3_instructions.html 4.82Кб
02_glossary-terms-from-week-3_instructions.html 3.90Кб
02_glossary-terms-from-week-3_instructions.html 3.20Кб
02_glossary-terms-from-week-3_instructions.html 2.65Кб
02_glossary-terms-from-week-3_instructions.html 3.75Кб
02_glossary-terms-from-week-3_instructions.html 1.26Кб
02_glossary-terms-from-week-4_instructions.html 7.93Кб
02_glossary-terms-from-week-4_instructions.html 2.92Кб
02_glossary-terms-from-week-4_instructions.html 4.50Кб
02_glossary-terms-from-week-4_instructions.html 2.85Кб
02_glossary-terms-from-week-4_instructions.html 3.00Кб
02_glossary-terms-from-week-4_instructions.html 1.48Кб
02_glossary-terms-from-week-4_instructions.html 2.83Кб
02_glossary-terms-from-week-4_instructions.html 1.15Кб
02_glossary-terms-from-week-5_instructions.html 1.41Кб
02_google-cybersecurity-certificate-overview_instructions.html 500.47Кб
02_helpful-cybersecurity-resources.en.srt 4.17Кб
02_helpful-cybersecurity-resources.en.txt 2.19Кб
02_helpful-cybersecurity-resources.mp4 15.26Мб
02_import-files-into-python_instructions.html 107.34Кб
02_input-and-output-in-the-shell.en.srt 4.91Кб
02_input-and-output-in-the-shell.en.txt 2.67Кб
02_input-and-output-in-the-shell.mp4 8.58Мб
02_introduction-to-databases.en.srt 5.93Кб
02_introduction-to-databases.en.txt 3.68Кб
02_introduction-to-databases.mp4 10.43Мб
02_introduction-to-functions.en.srt 4.00Кб
02_introduction-to-functions.en.txt 2.15Кб
02_introduction-to-functions.mp4 13.82Мб
02_introduction-to-linux.en.srt 4.97Кб
02_introduction-to-linux.en.txt 3.09Кб
02_introduction-to-linux.mp4 12.60Мб
02_introduction-to-security-frameworks-and-controls.en.srt 7.47Кб
02_introduction-to-security-frameworks-and-controls.en.txt 3.99Кб
02_introduction-to-security-frameworks-and-controls.mp4 23.41Мб
02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt 5.67Кб
02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt 3.03Кб
02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 17.31Мб
02_introduction-to-the-incident-response-lifecycle.en.srt 6.44Кб
02_introduction-to-the-incident-response-lifecycle.en.txt 4.02Кб
02_introduction-to-the-incident-response-lifecycle.mp4 16.02Мб
02_ip-spoofing.en.srt 5.13Кб
02_ip-spoofing.en.txt 2.72Кб
02_ip-spoofing.mp4 11.52Мб
02_kali-linux-tm.en.srt 3.53Кб
02_kali-linux-tm.en.txt 2.28Кб
02_kali-linux-tm.mp4 7.17Мб
02_kelsey-cloud-security-explained.en.srt 3.79Кб
02_kelsey-cloud-security-explained.en.txt 2.31Кб
02_kelsey-cloud-security-explained.mp4 21.94Мб
02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt 5.20Кб
02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt 3.38Кб
02_key-impacts-of-threats-risks-and-vulnerabilities.mp4 17.31Мб
02_kim-my-journey-into-computing.en.srt 3.46Кб
02_kim-my-journey-into-computing.en.txt 1.84Кб
02_kim-my-journey-into-computing.mp4 10.92Мб
02_learn-more-about-developing-an-elevator-pitch_instructions.html 5.02Кб
02_learn-more-about-packet-captures_instructions.html 735.83Кб
02_linux-commands-via-the-bash-shell.en.srt 5.10Кб
02_linux-commands-via-the-bash-shell.en.txt 2.82Кб
02_linux-commands-via-the-bash-shell.mp4 10.20Мб
02_logs-and-siem-tools.en.srt 4.02Кб
02_logs-and-siem-tools.en.txt 2.14Кб
02_logs-and-siem-tools.mp4 8.88Мб
02_more-about-cybersecurity-tools_instructions.html 5.50Кб
02_more-about-data-types_instructions.html 12.18Кб
02_more-about-owasp-security-principles_instructions.html 5.36Кб
02_more-about-regular-expressions_instructions.html 11.41Кб
02_more-on-conditionals-in-python_instructions.html 15.09Кб
02_network-protocols.en.srt 6.01Кб
02_network-protocols.en.txt 3.27Кб
02_network-protocols.mp4 11.29Мб
02_network-security-applications_instructions.html 2.90Мб
02_operators-for-filtering-dates-and-numbers_instructions.html 6.76Кб
02_overview-of-tcpdump_instructions.html 132.48Кб
02_overview-of-tcpdump_tcpdump.1.html 72.58Кб
02_past-cybersecurity-attacks.en.srt 6.34Кб
02_past-cybersecurity-attacks.en.txt 3.33Кб
02_past-cybersecurity-attacks.mp4 22.02Мб
02_phases-of-an-incident-response-playbook.en.srt 7.86Кб
02_phases-of-an-incident-response-playbook.en.txt 4.21Кб
02_phases-of-an-incident-response-playbook.mp4 24.30Мб
02_post-incident-review_instructions.html 233.43Кб
02_public-key-infrastructure.en.srt 8.70Кб
02_public-key-infrastructure.en.txt 4.54Кб
02_public-key-infrastructure.mp4 21.15Мб
02_python-and-cybersecurity.en.srt 5.21Кб
02_python-and-cybersecurity.en.txt 3.29Кб
02_python-and-cybersecurity.mp4 20.08Мб
02_query-a-database_instructions.html 8.81Кб
02_query-for-events-with-splunk.en.srt 6.99Кб
02_query-for-events-with-splunk.en.txt 3.78Кб
02_query-for-events-with-splunk.mp4 9.28Мб
02_read-tcpdump-logs_instructions.html 146.64Кб
02_recognize-roles-and-responsibilities-during-escalation_instructions.html 4.34Кб
02_requests-to-the-operating-system_instructions.html 133.93Кб
02_return-statements.en.srt 4.80Кб
02_return-statements.en.txt 3.02Кб
02_return-statements.mp4 13.70Мб
02_robin-foster-cross-team-collaboration.en.srt 3.80Кб
02_robin-foster-cross-team-collaboration.en.txt 2.39Кб
02_robin-foster-cross-team-collaboration.mp4 14.14Мб
02_security-as-a-mindset.en.srt 5.08Кб
02_security-as-a-mindset.en.txt 2.70Кб
02_security-as-a-mindset.mp4 16.95Мб
02_security-controls.en.srt 5.17Кб
02_security-controls.en.txt 3.29Кб
02_security-controls.mp4 19.59Мб
02_security-hardening.en.srt 4.62Кб
02_security-hardening.en.txt 2.93Кб
02_security-hardening.mp4 12.25Мб
02_stakeholders-in-cybersecurity.en.srt 6.76Кб
02_stakeholders-in-cybersecurity.en.txt 3.58Кб
02_stakeholders-in-cybersecurity.mp4 15.13Мб
02_string-operations.en.srt 7.78Кб
02_string-operations.en.txt 4.10Кб
02_string-operations.mp4 21.28Мб
02_the-case-for-securing-networks.en.srt 2.20Кб
02_the-case-for-securing-networks.en.txt 1.41Кб
02_the-case-for-securing-networks.mp4 5.52Мб
02_the-command-line-in-use_instructions.html 197.12Кб
02_the-criminal-art-of-persuasion.en.srt 7.36Кб
02_the-criminal-art-of-persuasion.en.txt 3.98Кб
02_the-criminal-art-of-persuasion.mp4 21.70Мб
02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt 3.07Кб
02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt 2.01Кб
02_the-detection-and-analysis-phase-of-the-lifecycle.mp4 8.54Мб
02_the-emergence-of-cloud-security_instructions.html 141.30Кб
02_the-importance-of-escalation.en.srt 6.63Кб
02_the-importance-of-escalation.en.txt 3.55Кб
02_the-importance-of-escalation.mp4 18.97Мб
02_the-importance-of-logs.en.srt 5.97Кб
02_the-importance-of-logs.en.txt 3.75Кб
02_the-importance-of-logs.mp4 12.76Мб
02_the-interview-process_instructions.html 5.26Кб
02_the-linux-community.en.srt 2.51Кб
02_the-linux-community.en.txt 1.35Кб
02_the-linux-community.mp4 5.99Мб
02_the-nist-cybersecurity-framework.en.srt 5.77Кб
02_the-nist-cybersecurity-framework.en.txt 3.63Кб
02_the-nist-cybersecurity-framework.mp4 20.35Мб
02_the-rise-of-sso-and-mfa_instructions.html 369.55Кб
02_the-tcp-ip-model.en.srt 4.42Кб
02_the-tcp-ip-model.en.txt 2.37Кб
02_the-tcp-ip-model.mp4 8.96Мб
02_the-value-of-documentation.en.srt 4.61Кб
02_the-value-of-documentation.en.txt 2.96Кб
02_the-value-of-documentation.mp4 11.00Мб
02_the-what-why-and-how-of-asset-security.en.srt 6.91Кб
02_the-what-why-and-how-of-asset-security.en.txt 4.26Кб
02_the-what-why-and-how-of-asset-security.mp4 20.75Мб
02_toni-my-path-to-cybersecurity.en.srt 5.53Кб
02_toni-my-path-to-cybersecurity.en.txt 2.92Кб
02_toni-my-path-to-cybersecurity.mp4 20.00Мб
02_types-of-joins.en.srt 5.05Кб
02_types-of-joins.en.txt 2.70Кб
02_types-of-joins.mp4 7.97Мб
02_use-the-cia-triad-to-protect-organizations_instructions.html 4.29Кб
02_use-tools-to-protect-business-operations_instructions.html 6.58Кб
02_veronica-my-path-to-working-in-cybersecurity.en.srt 3.08Кб
02_veronica-my-path-to-working-in-cybersecurity.en.txt 1.59Кб
02_veronica-my-path-to-working-in-cybersecurity.mp4 11.01Мб
02_virtual-private-networks-vpns.en.srt 4.30Кб
02_virtual-private-networks-vpns.en.txt 2.28Кб
02_virtual-private-networks-vpns.mp4 8.06Мб
02_vulnerability-management.en.srt 5.96Кб
02_vulnerability-management.en.txt 3.81Кб
02_vulnerability-management.mp4 21.96Мб
02_when-and-how-to-escalate-a-security-incident.en.srt 3.41Кб
02_when-and-how-to-escalate-a-security-incident.en.txt 2.12Кб
02_when-and-how-to-escalate-a-security-incident.mp4 12.83Мб
02_write-a-simple-algorithm.en.srt 8.38Кб
02_write-a-simple-algorithm.en.txt 4.35Кб
02_write-a-simple-algorithm.mp4 17.58Мб
03_activity-analysis-of-network-hardening_quiz.html 1.23Кб
03_activity-analyze-network-layer-communication_quiz.html 1.26Кб
03_activity-apply-os-hardening-techniques_quiz.html 1.26Кб
03_angel-my-personal-career-journey.en.srt 4.84Кб
03_angel-my-personal-career-journey.en.txt 2.62Кб
03_angel-my-personal-career-journey.mp4 16.51Мб
03_attacks-in-the-digital-age.en.srt 6.52Кб
03_attacks-in-the-digital-age.en.txt 4.17Кб
03_attacks-in-the-digital-age.mp4 25.52Мб
03_best-practices-for-effective-documentation_instructions.html 5.85Кб
03_best-practices-for-log-collection-and-management_instructions.html 8.33Кб
03_common-network-protocols_instructions.html 8.69Кб
03_communicate-effectively-with-stakeholders_instructions.html 5.04Кб
03_compare-types-of-joins_instructions.html 1.51Мб
03_components-of-a-detection-signature.en.srt 6.65Кб
03_components-of-a-detection-signature.en.txt 3.50Кб
03_components-of-a-detection-signature.mp4 12.80Мб
03_controls.en.srt 5.39Кб
03_controls.en.txt 2.88Кб
03_controls.mp4 14.11Мб
03_core-commands-for-navigation-and-reading-files.en.srt 7.62Кб
03_core-commands-for-navigation-and-reading-files.en.txt 4.04Кб
03_core-commands-for-navigation-and-reading-files.mp4 11.26Мб
03_course-1-overview_instructions.html 1.27Мб
03_course-wrap-up.en.srt 1.75Кб
03_course-wrap-up.en.txt 1.13Кб
03_course-wrap-up.mp4 2.75Мб
03_create-a-basic-function.en.srt 3.67Кб
03_create-a-basic-function.en.txt 1.88Кб
03_create-a-basic-function.mp4 7.14Мб
03_create-a-cybersecurity-portfolio_instructions.html 8.73Кб
03_create-and-modify-directories-and-files.en.srt 11.12Кб
03_create-and-modify-directories-and-files.en.txt 5.82Кб
03_create-and-modify-directories-and-files.mp4 17.80Мб
03_create-a-resume.en.srt 6.19Кб
03_create-a-resume.en.txt 3.94Кб
03_create-a-resume.mp4 11.92Мб
03_cybersecurity-incident-detection-methods_instructions.html 7.73Кб
03_data-and-asset-classification_instructions.html 5.74Кб
03_defense-in-depth-strategy.en.srt 6.22Кб
03_defense-in-depth-strategy.en.txt 3.34Кб
03_defense-in-depth-strategy.mp4 19.92Мб
03_determine-the-type-of-attack_instructions.html 225.01Кб
03_dion-my-personal-career-journey.en.srt 3.70Кб
03_dion-my-personal-career-journey.en.txt 2.29Кб
03_dion-my-personal-career-journey.mp4 16.87Мб
03_ellen-my-path-into-cybersecurity.en.srt 3.76Кб
03_ellen-my-path-into-cybersecurity.en.txt 2.41Кб
03_ellen-my-path-into-cybersecurity.mp4 12.42Мб
03_ensure-proper-syntax-and-readability-in-python_instructions.html 9.57Кб
03_escalate-with-a-purpose_instructions.html 4.83Кб
03_escalation-timing_instructions.html 5.54Кб
03_essential-python-components-for-automation_instructions.html 8.20Кб
03_explore-debugging-techniques_instructions.html 13.02Кб
03_explore-the-cissp-security-domains-part-2.en.srt 6.73Кб
03_explore-the-cissp-security-domains-part-2.en.txt 4.38Кб
03_explore-the-cissp-security-domains-part-2.mp4 18.20Мб
03_filters-with-and-or-and-not.en.srt 8.17Кб
03_filters-with-and-or-and-not.en.txt 4.38Кб
03_filters-with-and-or-and-not.mp4 16.09Мб
03_for-loops.en.srt 7.58Кб
03_for-loops.en.txt 4.03Кб
03_for-loops.mp4 12.20Мб
03_functions-and-variables_instructions.html 10.79Кб
03_garvey-technical-interview-tips.en.srt 4.65Кб
03_garvey-technical-interview-tips.en.txt 2.93Кб
03_garvey-technical-interview-tips.mp4 11.21Мб
03_get-started-on-the-next-course_instructions.html 794.71Кб
03_get-started-on-the-next-course_instructions.html 806.10Кб
03_get-started-on-the-next-course_instructions.html 789.45Кб
03_get-started-on-the-next-course_instructions.html 796.16Кб
03_get-started-on-the-next-course_instructions.html 784.18Кб
03_get-started-on-the-next-course_instructions.html 793.15Кб
03_get-started-on-the-next-course_instructions.html 786.47Кб
03_get-to-know-python_instructions.html 4.28Кб
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
03 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
03_helpful-resources-and-tips_instructions.html 11.26Кб
03_helpful-resources-and-tips_instructions.html 11.26Кб
03_helpful-resources-and-tips_instructions.html 11.17Кб
03_helpful-resources-and-tips_instructions.html 11.26Кб
03_helpful-resources-and-tips_instructions.html 11.21Кб
03_herbert-manage-threats-risks-and-vulnerabilities.en.srt 3.05Кб
03_herbert-manage-threats-risks-and-vulnerabilities.en.txt 1.93Кб
03_herbert-manage-threats-risks-and-vulnerabilities.mp4 9.61Мб
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt 4.10Кб
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt 2.25Кб
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 14.62Мб
03_how-intrusions-compromise-your-system_instructions.html 6.62Кб
03_how-to-create-a-visual-dashboard.en.srt 5.24Кб
03_how-to-create-a-visual-dashboard.en.txt 3.13Кб
03_how-to-create-a-visual-dashboard.mp4 18.13Мб
03_interpret-network-communications-with-packets.en.srt 2.71Кб
03_interpret-network-communications-with-packets.en.txt 1.69Кб
03_interpret-network-communications-with-packets.mp4 7.65Мб
03_introduction-to-operating-systems.en.srt 4.34Кб
03_introduction-to-operating-systems.en.txt 2.79Кб
03_introduction-to-operating-systems.mp4 11.51Мб
03_intrusion-detection-systems.en.srt 3.15Кб
03_intrusion-detection-systems.en.txt 1.70Кб
03_intrusion-detection-systems.mp4 5.36Мб
03_julianas-story-asset-protection_instructions.html 5.03Кб
03_lists-and-the-security-analyst_instructions.html 13.07Кб
03_man-pages-within-the-shell.en.srt 3.99Кб
03_man-pages-within-the-shell.en.txt 2.10Кб
03_man-pages-within-the-shell.mp4 6.58Мб
03_more-about-playbooks_guidelines.html 17.43Кб
03_more-about-playbooks_instructions.html 200.44Кб
03_more-linux-distributions_instructions.html 4.39Кб
03_overview-of-interception-tactics_instructions.html 7.19Кб
03_parse-a-text-file-in-python.en.srt 3.53Кб
03_parse-a-text-file-in-python.en.txt 1.88Кб
03_parse-a-text-file-in-python.mp4 10.01Мб
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt 6.09Кб
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt 3.81Кб
03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 17.80Мб
03_permission-commands_instructions.html 15.50Кб
03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt 4.08Кб
03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt 2.20Кб
03_phil-learn-and-grow-in-the-cybersecurity-field.mp4 12.59Мб
03_playbooks-siem-tools-and-soar-tools_instructions.html 3.10Кб
03_prepare-for-interviews_instructions.html 5.48Кб
03_prepare-for-interviews_vol01iss13.cfm 45.52Кб
03_principle-of-least-privilege_instructions.html 7.70Кб
03_query-databases-with-sql.en.srt 3.88Кб
03_query-databases-with-sql.en.txt 2.46Кб
03_query-databases-with-sql.mp4 8.50Мб
03_query-for-events-with-chronicle.en.srt 6.65Кб
03_query-for-events-with-chronicle.en.txt 3.54Кб
03_query-for-events-with-chronicle.mp4 8.22Мб
03_resource-allocation-via-the-os.en.srt 3.91Кб
03_resource-allocation-via-the-os.en.txt 2.09Кб
03_resource-allocation-via-the-os.mp4 9.46Мб
03_resources-for-completing-sql-labs_instructions.html 108.50Кб
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt 4.53Кб
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt 2.45Кб
03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 14.50Мб
03_roles-in-response_instructions.html 84.34Кб
03_sarah-network-in-the-cybersecurity-community.en.srt 3.52Кб
03_sarah-network-in-the-cybersecurity-community.en.txt 2.24Кб
03_sarah-network-in-the-cybersecurity-community.mp4 10.28Мб
03_secure-design.en.srt 6.79Кб
03_secure-design.en.txt 3.61Кб
03_secure-design.mp4 19.14Мб
03_secure-the-cloud_instructions.html 8.98Кб
03 security-guidelines-in-action Commercial Facilities Sector Cybersecurity Framework Implementation Guidance FINAL 508 pdf 1.53Мб
03_security-guidelines-in-action_instructions.html 472.50Кб
03_security-zones.en.srt 6.05Кб
03_security-zones.en.txt 3.20Кб
03_security-zones.mp4 12.00Мб
03_showcase-your-work_instructions.html 899.17Кб
03_showcase-your-work_overview.html 636.47Кб
03_siem-dashboards.en.srt 4.42Кб
03_siem-dashboards.en.txt 2.34Кб
03_siem-dashboards.mp4 10.76Мб
03_social-engineering-tactics_instructions.html 175.25Кб
03 strategies-for-engaging-with-the-cybersecurity-community instructions html 5.48Кб
03_string-indices-and-slices.en.srt 8.50Кб
03_string-indices-and-slices.en.txt 4.54Кб
03_string-indices-and-slices.mp4 20.29Мб
03_symmetric-and-asymmetric-encryption_instructions.html 9.23Кб
03_talya-myths-about-the-cybersecurity-field.en.srt 3.08Кб
03_talya-myths-about-the-cybersecurity-field.en.txt 1.59Кб
03_talya-myths-about-the-cybersecurity-field.mp4 9.58Мб
03_test-your-knowledge-local-and-wide-network-communication_quiz.html 3.67Кб
03_the-four-layers-of-the-tcp-ip-model.en.srt 3.41Кб
03_the-four-layers-of-the-tcp-ip-model.en.txt 1.83Кб
03_the-four-layers-of-the-tcp-ip-model.mp4 6.47Мб
03_the-importance-of-network-traffic-flows.en.srt 4.53Кб
03_the-importance-of-network-traffic-flows.en.txt 2.88Кб
03_the-importance-of-network-traffic-flows.mp4 12.76Мб
03_the-importance-of-updates_instructions.html 7.16Кб
03_the-mechanisms-of-authorization.en.srt 8.11Кб
03_the-mechanisms-of-authorization.en.txt 4.32Кб
03_the-mechanisms-of-authorization.mp4 25.17Мб
03_the-purpose-and-impact-of-stakeholders_instructions.html 5.65Кб
03_the-rise-of-cryptojacking.en.srt 6.65Кб
03_the-rise-of-cryptojacking.en.txt 3.57Кб
03_the-rise-of-cryptojacking.mp4 23.67Мб
03_the-triage-process_instructions.html 8.28Кб
03_tips-for-interviewing-remotely_instructions.html 5.57Кб
03 tools-for-protecting-business-operations gcat threathorizons full sept2022 pdf 2.97Мб
03_tools-for-protecting-business-operations_instructions.html 651.52Кб
03_transferable-and-technical-cybersecurity-skills_instructions.html 7.33Кб
03_types-of-threat-actors_instructions.html 493.37Кб
03_understand-risks-threats-and-vulnerabilities_instructions.html 6.41Кб
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt 3.05Кб
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt 1.90Кб
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 9.96Мб
03_weekly-challenge-1_exam.html 8.39Кб
03_weekly-challenge-2_exam.html 8.45Кб
03_weekly-challenge-3_exam.html 9.31Кб
03_weekly-challenge-4_exam.html 9.52Кб
03_what-are-networks.en.srt 2.66Кб
03_what-are-networks.en.txt 1.64Кб
03_what-are-networks.mp4 6.22Мб
03_work-with-variables-in-python.en.srt 9.99Кб
03_work-with-variables-in-python.en.txt 5.24Кб
03_work-with-variables-in-python.mp4 21.69Мб
04_activity-analyze-network-attacks_quiz.html 1.25Кб
04_add-and-delete-users.en.srt 8.85Кб
04_add-and-delete-users.en.txt 4.72Кб
04_add-and-delete-users.mp4 14.68Мб
04_additional-network-protocols_instructions.html 11.08Кб
04_ask-the-interviewer-questions.en.srt 2.47Кб
04_ask-the-interviewer-questions.en.txt 1.62Кб
04_ask-the-interviewer-questions.mp4 7.91Мб
04_assign-and-reassign-variables-in-python_instructions.html 8.17Кб
04_basic-filters-on-sql-queries.en.srt 6.43Кб
04_basic-filters-on-sql-queries.en.txt 4.05Кб
04_basic-filters-on-sql-queries.mp4 14.77Мб
04_claim-your-google-cybersecurity-certificate-badge_instructions.html 4.48Кб
04_clancy-continual-learning-and-python.en.srt 3.58Кб
04_clancy-continual-learning-and-python.en.txt 1.89Кб
04_clancy-continual-learning-and-python.mp4 11.33Мб
04_common-attacks-and-their-effectiveness_instructions.html 8.41Кб
04_common-vulnerabilities-and-exposures.en.srt 8.07Кб
04_common-vulnerabilities-and-exposures.en.txt 4.31Кб
04_common-vulnerabilities-and-exposures.mp4 27.86Мб
04_compare-operating-systems_instructions.html 6.27Кб
04_continuous-learning-in-sql_instructions.html 5.33Кб
04_controls-frameworks-and-compliance_instructions.html 151.83Кб
04_course-8-glossary_Course_8_glossary.docx 1.11Мб
04_course-8-glossary_instructions.html 6.43Кб
04_create-a-basic-python-script.en.srt 3.68Кб
04_create-a-basic-python-script.en.txt 1.96Кб
04_create-a-basic-python-script.mp4 8.44Мб
04_da-queshia-my-path-to-cybersecurity.en.srt 4.43Кб
04_da-queshia-my-path-to-cybersecurity.en.txt 2.28Кб
04_da-queshia-my-path-to-cybersecurity.mp4 13.90Мб
04_dave-grow-your-cybersecurity-career-with-mentors.en.srt 4.34Кб
04_dave-grow-your-cybersecurity-career-with-mentors.en.txt 2.33Кб
04_dave-grow-your-cybersecurity-career-with-mentors.mp4 13.90Мб
04_develop-a-parsing-algorithm-in-python.en.srt 6.88Кб
04_develop-a-parsing-algorithm-in-python.en.txt 4.33Кб
04_develop-a-parsing-algorithm-in-python.mp4 15.23Мб
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt 4.28Кб
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt 2.26Кб
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 11.39Мб
04_emily-overcome-imposter-syndrome.en.srt 4.71Кб
04_emily-overcome-imposter-syndrome.en.txt 2.56Кб
04_emily-overcome-imposter-syndrome.mp4 13.95Мб
04_examine-signatures-with-suricata.en.srt 5.95Кб
04_examine-signatures-with-suricata.en.txt 3.76Кб
04_examine-signatures-with-suricata.mp4 8.40Мб
04_explore-built-in-functions.en.srt 8.50Кб
04_explore-built-in-functions.en.txt 4.51Кб
04_explore-built-in-functions.mp4 21.00Мб
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
04 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
04_helpful-resources-and-tips_instructions.html 11.26Кб
04_helpful-resources-and-tips_instructions.html 11.22Кб
04_incident-response-plans.en.srt 3.59Кб
04_incident-response-plans.en.txt 2.28Кб
04_incident-response-plans.mp4 9.30Мб
04_information-privacy-regulations-and-compliance_instructions.html 129.20Кб
04_julianas-story-attention-to-detail_instructions.html 4.83Кб
04_julianas-story-effective-communication_instructions.html 4.46Кб
04_learn-more-about-the-tcp-ip-model_instructions.html 1.53Мб
04_linux-architecture.en.srt 5.77Кб
04_linux-architecture.en.txt 3.02Кб
04_linux-architecture.mp4 11.81Мб
04_linux-resources_instructions.html 5.10Кб
04_maintain-awareness-with-network-monitoring_instructions.html 293.74Кб
04_manage-directories-and-files_instructions.html 9.62Кб
04_mk-changes-in-the-cybersecurity-industry.en.srt 4.33Кб
04_mk-changes-in-the-cybersecurity-industry.en.txt 2.77Кб
04_mk-changes-in-the-cybersecurity-industry.mp4 13.39Мб
04_more-on-filters-with-and-or-and-not_instructions.html 6.39Кб
04_navigate-linux-and-read-file-content_instructions.html 104.91Кб
04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt 3.77Кб
04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt 2.45Кб
04_nikki-a-day-in-the-life-of-a-security-engineer.mp4 16.05Мб
04_niru-adopt-an-attacker-mindset.en.srt 4.63Кб
04_niru-adopt-an-attacker-mindset.en.txt 2.94Кб
04_niru-adopt-an-attacker-mindset.mp4 18.08Мб
04_nist-s-risk-management-framework.en.srt 6.41Кб
04_nist-s-risk-management-framework.en.txt 3.43Кб
04_nist-s-risk-management-framework.mp4 16.35Мб
04_omad-my-learning-journey-into-cybersecurity.en.srt 4.44Кб
04_omad-my-learning-journey-into-cybersecurity.en.txt 2.75Кб
04_omad-my-learning-journey-into-cybersecurity.mp4 9.89Мб
04_overview-of-detection-tools_instructions.html 9.42Кб
04_phishing-for-information.en.srt 6.80Кб
04_phishing-for-information.en.txt 4.32Кб
04_phishing-for-information.mp4 24.02Мб
04_plan-a-security-audit.en.srt 6.92Кб
04_plan-a-security-audit.en.txt 3.60Кб
04_plan-a-security-audit.mp4 16.69Мб
04 portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security exam html 3.46Кб
04_prepare-for-technical-interviews_instructions.html 5.62Кб
04_python-functions-in-cybersecurity_instructions.html 6.84Кб
04_real-life-ddos-attack_instructions.html 5.12Кб
04_rebecca-learn-new-tools-and-technologies.en.srt 2.98Кб
04_rebecca-learn-new-tools-and-technologies.en.txt 1.83Кб
04_rebecca-learn-new-tools-and-technologies.mp4 9.32Мб
04_reexamine-the-fields-of-a-packet-header.en.srt 7.77Кб
04_reexamine-the-fields-of-a-packet-header.en.txt 4.15Кб
04_reexamine-the-fields-of-a-packet-header.mp4 13.61Мб
04_resources-for-completing-labs_instructions.html 108.52Кб
04_resources-for-completing-linux-labs_instructions.html 108.51Кб
04_search-methods-with-siem-tools_instructions.html 415.57Кб
04_security-domains-cybersecurity-analysts-need-to-know_instructions.html 195.32Кб
04_sql-filtering-versus-linux-filtering_instructions.html 4.19Кб
04_strings-and-the-security-analyst_instructions.html 13.46Кб
04_subnetting-and-cidr_instructions.html 133.92Кб
04_test-your-knowledge-cloud-hardening_quiz.html 3.62Кб
04_test-your-knowledge-network-hardening_quiz.html 3.78Кб
04_test-your-knowledge-os-hardening_quiz.html 3.69Кб
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt 4.39Кб
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt 2.40Кб
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 9.87Мб
04_the-future-of-siem-tools_instructions.html 5.06Кб
04_the-importance-of-cybersecurity.en.srt 4.05Кб
04_the-importance-of-cybersecurity.en.txt 2.57Кб
04_the-importance-of-cybersecurity.mp4 17.84Мб
04_the-relationship-between-frameworks-and-controls_instructions.html 6.56Кб
04 the-relationship-between-frameworks-and-controls physical-access-control pdf 6.95Мб
04_the-value-of-cybersecurity-playbooks.en.srt 6.08Кб
04_the-value-of-cybersecurity-playbooks.en.txt 3.20Кб
04_the-value-of-cybersecurity-playbooks.mp4 13.00Мб
04_tina-working-in-network-security.en.srt 3.06Кб
04_tina-working-in-network-security.en.txt 1.64Кб
04_tina-working-in-network-security.mp4 11.31Мб
04_tips-for-finding-and-applying-for-a-job_instructions.html 4.24Кб
04_traits-of-an-effective-threat-model_instructions.html 120.94Кб
04_tri-life-in-asset-security.en.srt 3.80Кб
04_tri-life-in-asset-security.en.txt 2.32Кб
04_tri-life-in-asset-security.mp4 16.96Мб
04_understand-attackers_instructions.html 313.26Кб
04_use-siem-tools-to-protect-organizations_instructions.html 8.57Кб
04_victoria-continue-your-learning-journey.en.srt 3.93Кб
04_victoria-continue-your-learning-journey.en.txt 2.48Кб
04_victoria-continue-your-learning-journey.mp4 15.43Мб
04_welcome-to-week-1.en.srt 1.95Кб
04_welcome-to-week-1.en.txt 1.03Кб
04_welcome-to-week-1.mp4 4.67Мб
04_while-loops.en.srt 8.08Кб
04_while-loops.en.txt 4.25Кб
04_while-loops.mp4 10.19Мб
04_why-we-audit-user-activity.en.srt 5.47Кб
04_why-we-audit-user-activity.en.txt 2.92Кб
04_why-we-audit-user-activity.mp4 16.24Мб
05_adedayo-sql-in-cybersecurity.en.srt 3.81Кб
05_adedayo-sql-in-cybersecurity.en.txt 2.06Кб
05_adedayo-sql-in-cybersecurity.mp4 13.70Мб
05_alert-and-event-management-with-siem-and-soar-tools.en.srt 5.97Кб
05_alert-and-event-management-with-siem-and-soar-tools.en.txt 3.72Кб
05_alert-and-event-management-with-siem-and-soar-tools.mp4 14.47Мб
05_ashley-my-path-to-cybersecurity.en.srt 5.72Кб
05_ashley-my-path-to-cybersecurity.en.txt 3.04Кб
05_ashley-my-path-to-cybersecurity.mp4 19.83Мб
05_business-continuity-considerations_instructions.html 6.20Кб
05_common-cybersecurity-terminology_instructions.html 5.55Кб
05_complete-a-security-audit.en.srt 5.29Кб
05_complete-a-security-audit.en.txt 3.41Кб
05_complete-a-security-audit.mp4 16.98Мб
05_conduct-pre-interview-research.en.srt 5.04Кб
05_conduct-pre-interview-research.en.txt 2.73Кб
05_conduct-pre-interview-research.mp4 12.58Мб
05_data-exfiltration-attacks.en.srt 7.21Кб
05_data-exfiltration-attacks.en.txt 3.90Кб
05_data-exfiltration-attacks.mp4 15.53Мб
05_emmanuel-useful-skills-for-network-security.en.srt 4.86Кб
05_emmanuel-useful-skills-for-network-security.en.txt 2.51Кб
05_emmanuel-useful-skills-for-network-security.mp4 13.44Мб
05_examine-suricata-logs.en.srt 3.26Кб
05_examine-suricata-logs.en.txt 2.04Кб
05_examine-suricata-logs.mp4 7.37Мб
05_garvey-cover-letter-tips.en.srt 5.02Кб
05_garvey-cover-letter-tips.en.txt 3.01Кб
05_garvey-cover-letter-tips.mp4 11.61Мб
05 google-cybersecurity-certificate-glossary Google Cybersecurity Certificate glossary docx 879.26Кб
05_google-cybersecurity-certificate-glossary_instructions.html 6.55Кб
05_heather-protect-sensitive-data-and-information.en.srt 3.12Кб
05_heather-protect-sensitive-data-and-information.en.txt 1.97Кб
05_heather-protect-sensitive-data-and-information.mp4 16.82Мб
05_heather-the-importance-of-protecting-pii.en.srt 3.28Кб
05_heather-the-importance-of-protecting-pii.en.txt 1.76Кб
05_heather-the-importance-of-protecting-pii.mp4 14.55Мб
05 helpful-resources-and-tips Google Cybersecurity Certificate glossary docx 879.26Кб
05_helpful-resources-and-tips_instructions.html 11.20Кб
05_indicators-of-compromise_instructions.html 127.71Кб
05_indicators-of-compromise_the-pyramid-of-pain.html 67.09Кб
05_investigate-packet-details_instructions.html 3.64Мб
05_karan-interview-tips-from-a-hiring-manager.en.srt 4.92Кб
05_karan-interview-tips-from-a-hiring-manager.en.txt 2.64Кб
05_karan-interview-tips-from-a-hiring-manager.mp4 18.50Мб
05_linux-architecture-explained_instructions.html 6.51Кб
05_manage-common-threats-risks-and-vulnerabilities_instructions.html 779.07Кб
05_more-on-loops-in-python_instructions.html 15.64Кб
05_non-repudiation-and-hashing.en.srt 4.96Кб
05_non-repudiation-and-hashing.en.txt 3.08Кб
05_non-repudiation-and-hashing.mp4 13.51Мб
05_parisa-the-parallels-of-accessibility-and-security.en.srt 3.80Кб
05_parisa-the-parallels-of-accessibility-and-security.en.txt 2.45Кб
05_parisa-the-parallels-of-accessibility-and-security.mp4 16.41Мб
05_pathways-through-defenses.en.srt 7.40Кб
05_pathways-through-defenses.en.txt 3.95Кб
05_pathways-through-defenses.mp4 22.40Мб
05_proxy-servers.en.srt 4.94Кб
05_proxy-servers.en.txt 3.12Кб
05_proxy-servers.mp4 11.21Мб
05_python-environments_instructions.html 4.16Кб
05_responsible-use-of-sudo_instructions.html 11.15Кб
05_sean-keep-your-cool-during-a-data-breach.en.srt 2.85Кб
05_sean-keep-your-cool-during-a-data-breach.en.txt 1.47Кб
05_sean-keep-your-cool-during-a-data-breach.mp4 13.88Мб
05_security-starts-with-asset-classification.en.srt 6.62Кб
05_security-starts-with-asset-classification.en.txt 3.57Кб
05_security-starts-with-asset-classification.mp4 16.89Мб
05_test-your-knowledge-network-interception-attack-tactics_quiz.html 4.01Кб
05_test-your-knowledge-recognize-different-network-protocols_quiz.html 3.44Кб
05 test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks quiz html 3.84Кб
05_the-osi-model_instructions.html 302.88Кб
05_the-owasp-top-10_instructions.html 141.88Кб
05_the-where-clause-and-basic-operators_instructions.html 8.07Кб
05_tim-finding-purpose-in-protecting-assets.en.srt 2.02Кб
05_tim-finding-purpose-in-protecting-assets.en.txt 1.23Кб
05_tim-finding-purpose-in-protecting-assets.mp4 6.95Мб
05_types-of-phishing_instructions.html 339.37Кб
05_variations-of-logs.en.srt 6.77Кб
05_variations-of-logs.en.txt 3.59Кб
05_variations-of-logs.mp4 11.91Мб
05_work-with-built-in-functions_functions.html 269.11Кб
05_work-with-built-in-functions_instructions.html 7.43Кб
06_akash-python-and-the-cybersecurity-professional.en.srt 2.00Кб
06_akash-python-and-the-cybersecurity-professional.en.txt 1.28Кб
06_akash-python-and-the-cybersecurity-professional.mp4 5.72Мб
06 analyze-indicators-of-compromise-with-investigative-tools instructions html 1.46Мб
06_build-rapport-with-interviewers.en.srt 5.95Кб
06_build-rapport-with-interviewers.en.txt 3.17Кб
06_build-rapport-with-interviewers.mp4 13.60Мб
06_common-classification-requirements_instructions.html 106.29Кб
06_fortify-against-brute-force-cyber-attacks_instructions.html 153.11Кб
06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf 1.21Мб
06_identity-and-access-management_instructions.html 302.88Кб
06 more-about-security-audits Audit and Accountability AU CIO-IT Security 01-08 Rev 6 12-03-2020docx pdf 1.22Мб
06_more-about-security-audits_Control_categories.docx 837.97Кб
06_more-about-security-audits_instructions.html 8.82Кб
06_network-tools.en.srt 4.48Кб
06_network-tools.en.txt 2.44Кб
06_network-tools.mp4 7.03Мб
06_overview-of-log-file-formats_instructions.html 16.37Кб
06_overview-of-suricata_eve-json-examplesjq.html 22.98Кб
06_overview-of-suricata_index.html 32.52Кб
06_overview-of-suricata_instructions.html 124.41Кб
06_overview-of-suricata_suricata-update.html 23.48Кб
06_overview-of-suricata_suricata-yaml.html 236.66Кб
06_participate-in-program-surveys_instructions.html 3.71Кб
06_prepare-for-interviews-with-interview-warmup_instructions.html 183.12Кб
06_resources-for-completing-labs_instructions.html 108.52Кб
06_test-your-knowledge-network-communication_quiz.html 4.89Кб
06_the-evolution-of-hash-functions_instructions.html 585.39Кб
06_virtual-networks-and-privacy_instructions.html 8.43Кб
06_wireless-protocols.en.srt 2.12Кб
06_wireless-protocols.en.txt 1.10Кб
06_wireless-protocols.mp4 5.11Мб
07_network-components-devices-and-diagrams_instructions.html 1.68Мб
07_test-your-knowledge-system-identification_quiz.html 4.29Кб
07_the-evolution-of-wireless-security-protocols_instructions.html 159.17Кб
08_cloud-networks.en.srt 3.58Кб
08_cloud-networks.en.txt 2.33Кб
08_cloud-networks.mp4 8.77Мб
09_cloud-computing-and-software-defined-networks_instructions.html 694.11Кб
10_test-your-knowledge-introduction-to-networks_quiz.html 3.51Кб
Readme.txt 51б
Readme.txt 51б
Статистика распространения по странам
Индия (IN) 5
Марокко (MA) 5
США (US) 4
Греция (GR) 3
Зимбабве (ZW) 2
Россия (RU) 2
Австралия (AU) 2
Словения (SI) 1
Испания (ES) 1
Египет (EG) 1
Мексика (MX) 1
Норвегия (NO) 1
Всего 28
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент