Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
00. Course Overview.mp4 |
3.79Мб |
00. Course Overview.srt |
2.78Кб |
00. The Threat Based Approach.mp4 |
11.75Мб |
00. The Threat Based Approach.srt |
11.83Кб |
00. Threats and IoCs.mp4 |
14.63Мб |
00. Threats and IoCs.srt |
13.35Кб |
00. Understanding Highly Skilled Attackers.mp4 |
2.70Мб |
00. Understanding Highly Skilled Attackers.srt |
3.39Кб |
00. Understanding the Kill Chain Methodology.mp4 |
4.07Мб |
00. Understanding the Kill Chain Methodology.srt |
5.23Кб |
01. APT Objectives and Characteristics.mp4 |
12.83Мб |
01. APT Objectives and Characteristics.srt |
13.30Кб |
01. Cyber Threats Overview.mp4 |
5.31Мб |
01. Cyber Threats Overview.srt |
4.43Кб |
01. The Kill Chain Process.mp4 |
18.31Мб |
01. The Kill Chain Process.srt |
17.33Кб |
01. Understanding Main Indicators of Compromise.mp4 |
16.57Мб |
01. Understanding Main Indicators of Compromise.srt |
16.65Кб |
02. Analyzing Main Threat Vectors.mp4 |
23.69Мб |
02. Analyzing Main Threat Vectors.srt |
18.96Кб |
02. Identifying Common Adversary Behavior.mp4 |
13.32Мб |
02. Identifying Common Adversary Behavior.srt |
12.89Кб |
02. Indicators of Compromise in the Real World.mp4 |
5.71Мб |
02. Indicators of Compromise in the Real World.srt |
5.95Кб |
02. The APT Lifecycle.mp4 |
11.24Мб |
02. The APT Lifecycle.srt |
12.66Кб |
03. Analyzing Threat Actors.mp4 |
13.93Мб |
03. Analyzing Threat Actors.srt |
13.74Кб |
03. Demo- Investigating IoCs of a Ransomware Attack.mp4 |
22.99Мб |
03. Demo- Investigating IoCs of a Ransomware Attack.srt |
11.84Кб |
03. Detecting and Preventing APTs.mp4 |
4.22Мб |
03. Detecting and Preventing APTs.srt |
4.30Кб |
03. Fingerprinting an Adversary.mp4 |
4.62Мб |
03. Fingerprinting an Adversary.srt |
5.70Кб |
04. Analyzing Real World Cyber Attacks.mp4 |
17.35Мб |
04. Analyzing Real World Cyber Attacks.srt |
17.00Кб |
04. Demo- The Mitre Att&ck Framework.mp4 |
30.71Мб |
04. Demo- The Mitre Att&ck Framework.srt |
11.99Кб |
04. Real-World Analysis- Threat Actors.mp4 |
6.38Мб |
04. Real-World Analysis- Threat Actors.srt |
7.22Кб |
05. Analyzing Real World APT Groups.mp4 |
9.50Мб |
05. Analyzing Real World APT Groups.srt |
9.18Кб |
05. Understanding Your Enemies.mp4 |
14.59Мб |
05. Understanding Your Enemies.srt |
13.90Кб |
06. Course Closure and C-TIA Certification Tips.mp4 |
6.52Мб |
06. Course Closure and C-TIA Certification Tips.srt |
7.51Кб |
6 Simple Memory Techniques - All hacker use this.html |
98б |
Linux Tails Operating System.html |
84б |
You Can Boost Brain Power.html |
114б |
Yubico - YubiKey 5 NFC.html |
84б |