Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
218б |
001 Collection of Networking Interview Questions_en.vtt |
57.70Кб |
001 Collection of Networking Interview Questions.mp4 |
463.43Мб |
001 How do you analyze if receive a Brute Force Attack Alert_en.vtt |
22.89Кб |
001 How do you analyze if receive a Brute Force Attack Alert.mp4 |
194.83Мб |
001 Introduction_en.vtt |
6.81Кб |
001 Introduction.mp4 |
19.97Мб |
001 SIEM related interview topics_en.vtt |
77.78Кб |
001 SIEM related interview topics.mp4 |
499.07Мб |
001 what are networking devices_en.vtt |
17.92Кб |
001 what are networking devices.mp4 |
83.57Мб |
001 What is Security Operation Center_en.vtt |
11.19Кб |
001 What is Security Operation Center.mp4 |
45.23Мб |
002 Security Interview Questions - Part 1_en.vtt |
72.18Кб |
002 Security Interview Questions - Part 1.mp4 |
484.71Мб |
002 SIEM Dashboard and Use cases_en.vtt |
97.20Кб |
002 SIEM Dashboard and Use cases.mp4 |
717.87Мб |
002 What are various Security Devices used in your orrganization_en.vtt |
42.65Кб |
002 What are various Security Devices used in your orrganization.mp4 |
185.64Мб |
002 what is P address and IP address classification_en.vtt |
20.41Кб |
002 what is P address and IP address classification.mp4 |
123.66Мб |
002 what will you do if receive a Malware Attack Alert_en.vtt |
35.26Кб |
002 what will you do if receive a Malware Attack Alert.mp4 |
296.01Мб |
003 How does a SOC Team manage or work in an Organization_en.vtt |
30.73Кб |
003 How does a SOC Team manage or work in an Organization.mp4 |
103.40Мб |
003 How do you analyze Phishing email attack_en.vtt |
43.88Кб |
003 How do you analyze Phishing email attack.mp4 |
357.37Мб |
003 Security Interview Questions - Part 2_en.vtt |
25.88Кб |
003 Security Interview Questions - Part 2.mp4 |
136.94Мб |
003 What are different event logs you analyze_en.vtt |
19.52Кб |
003 What are different event logs you analyze.mp4 |
163.71Мб |
003 What is NAT and PAT_en.vtt |
13.93Кб |
003 What is NAT and PAT.mp4 |
62.93Мб |
004 How do you Analyze SQL Injection attack_en.vtt |
21.92Кб |
004 How do you Analyze SQL Injection attack.mp4 |
208.80Мб |
004 Security Interview Questions - Part 3_en.vtt |
64.01Кб |
004 Security Interview Questions - Part 3.mp4 |
437.97Мб |
004 Tell me few port numbers which you know_en.vtt |
21.89Кб |
004 Tell me few port numbers which you know.mp4 |
93.10Мб |
004 What are the Roles and Responsibilities of SOC Engineer_en.vtt |
34.48Кб |
004 What are the Roles and Responsibilities of SOC Engineer.mp4 |
150.63Мб |
005 How a Firewall Works_en.vtt |
3.04Кб |
005 How a Firewall Works.mp4 |
10.65Мб |
005 How do you analyze DDOS Attack_en.vtt |
18.62Кб |
005 How do you analyze DDOS Attack.mp4 |
169.05Мб |
005 Security Interview Questions - Part 4_en.vtt |
60.96Кб |
005 Security Interview Questions - Part 4.mp4 |
409.45Мб |
005 what is your SOC Team Model_en.vtt |
19.49Кб |
005 what is your SOC Team Model.mp4 |
98.67Мб |
006 How do you analyze if a suspicious IP detected in outbound traffic_en.vtt |
4.86Кб |
006 How do you analyze if a suspicious IP detected in outbound traffic.mp4 |
50.16Мб |
006 How VPN works_en.vtt |
5.67Кб |
006 How VPN works.mp4 |
18.47Мб |
006 What are the fields in Sample Incident Ticket - ServiceNow_en.vtt |
26.59Кб |
006 What are the fields in Sample Incident Ticket - ServiceNow.mp4 |
162.21Мб |
007 what are Service level Agreements for the SOC Incidents_en.vtt |
10.90Кб |
007 what are Service level Agreements for the SOC Incidents.mp4 |
29.29Мб |
007 What is Symmetric and Asymmetric Encryption_en.vtt |
20.73Кб |
007 What is Symmetric and Asymmetric Encryption.mp4 |
172.94Мб |
008 Explain CIA triad_en.vtt |
12.79Кб |
008 Explain CIA triad.mp4 |
67.26Мб |
008 What is False Positive Analysis or what are various outcomes of Analysis_en.vtt |
17.41Кб |
008 What is False Positive Analysis or what are various outcomes of Analysis.mp4 |
81.49Мб |
009 How many Logs sources are there in your organization_en.vtt |
8.42Кб |
009 How many Logs sources are there in your organization.mp4 |
36.31Мб |
009 What is the difference in between SSL and HTTPS_en.vtt |
2.30Кб |
009 What is the difference in between SSL and HTTPS.mp4 |
15.43Мб |
010 How do you stay up to date on Cyber Security news and latest attacks_en.vtt |
12.76Кб |
010 How do you stay up to date on Cyber Security news and latest attacks.mp4 |
111.82Мб |
010 What are the steps in Incident Response Life Cycle_en.vtt |
26.87Кб |
010 What are the steps in Incident Response Life Cycle.mp4 |
196.85Мб |
011 Can you please explain what you will do after getting an alert (Alert IR FLow)_en.vtt |
12.20Кб |
011 Can you please explain what you will do after getting an alert (Alert IR FLow).mp4 |
50.24Мб |
011 What is the difference between Virus and Warm_en.vtt |
3.33Кб |
011 What is the difference between Virus and Warm.mp4 |
22.23Мб |
012 Explain SQL Injection Attack_en.vtt |
9.59Кб |
012 Explain SQL Injection Attack.mp4 |
92.40Мб |
012 How will you manage work in shifts_en.vtt |
12.34Кб |
012 How will you manage work in shifts.mp4 |
69.64Мб |
013 How do you handle P1, P2, P3 and P4 Incidents_en.vtt |
16.04Кб |
013 How do you handle P1, P2, P3 and P4 Incidents.mp4 |
66.59Мб |
013 What is botnet_en.vtt |
5.12Кб |
013 What is botnet.mp4 |
28.14Мб |
014 What is Brute Force Attack_en.vtt |
22.18Кб |
014 What is Brute Force Attack.mp4 |
138.19Мб |
1 |
315б |
10 |
173.66Кб |
11 |
366.72Кб |
12 |
62.60Кб |
13 |
977.13Кб |
14 |
297.03Кб |
15 |
809.20Кб |
16 |
374.61Кб |
17 |
831.82Кб |
18 |
640.08Кб |
19 |
57.64Кб |
2 |
1.13Кб |
20 |
353.11Кб |
21 |
184.95Кб |
22 |
614.40Кб |
23 |
338.88Кб |
24 |
921.19Кб |
25 |
612.88Кб |
26 |
444.13Кб |
27 |
518.91Кб |
28 |
366.96Кб |
29 |
753.27Кб |
3 |
2.27Кб |
30 |
421.69Кб |
31 |
68.43Кб |
32 |
774.62Кб |
33 |
857.00Кб |
34 |
788.80Кб |
35 |
710.47Кб |
36 |
725.18Кб |
37 |
877.23Кб |
38 |
791.09Кб |
38672384-2-Org-Architecture.png |
79.10Кб |
38672698-3-SOC-Team-Architecture.png |
63.71Кб |
38672760-4-Roles-and-Responsibilities.png |
61.21Кб |
38673180-5-SOC-Models.png |
106.00Кб |
38673182-6-SOC-Incident-Document.png |
176.24Кб |
38673622-7-SLA-Service-Level-Agreements.png |
23.88Кб |
38673678-8-False-Positive.png |
26.12Кб |
38673766-9-No-of-Logs-Received.png |
23.89Кб |
38674192-10-Incident-Life-cycle.png |
11.81Кб |
38674208-10-Incident-Life-cycle.png |
11.81Кб |
38674370-12-SOC-Shift-Handover-Document.png |
22.26Кб |
38765424-Brute-Force-2.png |
232.56Кб |
38765426-15-Malware2.png |
197.67Кб |
38783204-GMT20220114-023122-Recording-1920x1080.mp4 |
137.37Мб |
38783224-Phishing-Attack-Analysis.png |
147.11Кб |
38783226-sql-injection.png |
174.55Кб |
38802934-Suspecious-IP-outbound.png |
109.40Кб |
38802936-DDOS-Analysis.png |
148.18Кб |
39 |
29.68Кб |
4 |
209б |
40 |
539.77Кб |
41 |
585.24Кб |
5 |
142б |
6 |
501.28Кб |
7 |
1018.27Кб |
8 |
205.90Кб |
9 |
148.68Кб |
external-assets-links.txt |
69б |
TutsNode.com.txt |
63б |