Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
01 Operations and incident response.en.srt |
1.45Кб |
01 Operations and incident response.mp4 |
8.70Мб |
02 What you need to know.en.srt |
1.10Кб |
02 What you need to know.mp4 |
1.78Мб |
03 Study resources.en.srt |
3.21Кб |
03 Study resources.mp4 |
8.18Мб |
04 Build an incident response program.en.srt |
7.97Кб |
04 Build an incident response program.mp4 |
16.83Мб |
05 Creating an incident response team.en.srt |
4.27Кб |
05 Creating an incident response team.mp4 |
11.59Мб |
06 Incident communications plan.en.srt |
5.17Кб |
06 Incident communications plan.mp4 |
13.08Мб |
07 Incident identification.en.srt |
8.24Кб |
07 Incident identification.mp4 |
17.62Мб |
08 Escalation and notification.en.srt |
4.62Кб |
08 Escalation and notification.mp4 |
7.34Мб |
09 Mitigation.en.srt |
4.63Кб |
09 Mitigation.mp4 |
7.23Мб |
10 Containment techniques.en.srt |
5.84Кб |
10 Containment techniques.mp4 |
7.60Мб |
11 Incident eradication and recovery.en.srt |
10.83Кб |
11 Incident eradication and recovery.mp4 |
18.42Мб |
12 Validation.en.srt |
4.76Кб |
12 Validation.mp4 |
5.51Мб |
13 Post-incident activities.en.srt |
7.49Кб |
13 Post-incident activities.mp4 |
15.57Мб |
14 Incident response exercises.en.srt |
3.29Кб |
14 Incident response exercises.mp4 |
8.31Мб |
15 MITRE ATT&CK.en.srt |
4.40Кб |
15 MITRE ATT&CK.mp4 |
18.20Мб |
16 Diamond Model of Intrusion Analysis.en.srt |
5.79Кб |
16 Diamond Model of Intrusion Analysis.mp4 |
6.03Мб |
17 Cyber kill chain analysis.en.srt |
3.43Кб |
17 Cyber kill chain analysis.mp4 |
7.40Мб |
18 Logging security information.en.srt |
10.34Кб |
18 Logging security information.mp4 |
16.30Мб |
19 Security information and event management.en.srt |
8.06Кб |
19 Security information and event management.mp4 |
13.60Мб |
20 Cloud audits and investigations.en.srt |
8.33Кб |
20 Cloud audits and investigations.mp4 |
16.92Мб |
21 Conducting investigations.en.srt |
7.60Кб |
21 Conducting investigations.mp4 |
16.00Мб |
22 Evidence types.en.srt |
6.79Кб |
22 Evidence types.mp4 |
10.19Мб |
23 Introduction to forensics.en.srt |
6.63Кб |
23 Introduction to forensics.mp4 |
10.59Мб |
24 System and file forensics.en.srt |
8.62Кб |
24 System and file forensics.mp4 |
16.39Мб |
25 File carving.en.srt |
6.87Кб |
25 File carving.mp4 |
14.46Мб |
26 Creating forensic images.en.srt |
10.04Кб |
26 Creating forensic images.mp4 |
13.01Мб |
27 Digital forensics toolkit.en.srt |
4.77Кб |
27 Digital forensics toolkit.mp4 |
8.67Мб |
28 Operating system analysis.en.srt |
12.27Кб |
28 Operating system analysis.mp4 |
24.23Мб |
29 Password forensics.en.srt |
13.88Кб |
29 Password forensics.mp4 |
29.01Мб |
30 Network forensics.en.srt |
7.91Кб |
30 Network forensics.mp4 |
18.86Мб |
31 Software forensics.en.srt |
8.46Кб |
31 Software forensics.mp4 |
27.05Мб |
32 Mobile device forensics.en.srt |
2.29Кб |
32 Mobile device forensics.mp4 |
3.26Мб |
33 Embedded device forensics.en.srt |
4.90Кб |
33 Embedded device forensics.mp4 |
10.73Мб |
34 Chain of custody.en.srt |
3.71Кб |
34 Chain of custody.mp4 |
7.18Мб |
35 Ediscovery and evidence production.en.srt |
6.15Кб |
35 Ediscovery and evidence production.mp4 |
14.14Мб |
36 Exploitation frameworks.en.srt |
11.45Кб |
36 Exploitation frameworks.mp4 |
16.71Мб |
37 Continuing your studies.en.srt |
1.25Кб |
37 Continuing your studies.mp4 |
1.69Мб |
TutsNode.com.txt |
63б |