Общая информация
Название Cyber Security - SOC Analyst Interview Question and Answers
Тип Порно
Размер 6.92Гб
Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 218б
001 Collection of Networking Interview Questions_en.vtt 57.70Кб
001 Collection of Networking Interview Questions.mp4 463.43Мб
001 How do you analyze if receive a Brute Force Attack Alert_en.vtt 22.89Кб
001 How do you analyze if receive a Brute Force Attack Alert.mp4 194.83Мб
001 Introduction_en.vtt 6.81Кб
001 Introduction.mp4 19.97Мб
001 SIEM related interview topics_en.vtt 77.78Кб
001 SIEM related interview topics.mp4 499.07Мб
001 what are networking devices_en.vtt 17.92Кб
001 what are networking devices.mp4 83.57Мб
001 What is Security Operation Center_en.vtt 11.19Кб
001 What is Security Operation Center.mp4 45.23Мб
002 Security Interview Questions - Part 1_en.vtt 72.18Кб
002 Security Interview Questions - Part 1.mp4 484.71Мб
002 SIEM Dashboard and Use cases_en.vtt 97.20Кб
002 SIEM Dashboard and Use cases.mp4 717.87Мб
002 What are various Security Devices used in your orrganization_en.vtt 42.65Кб
002 What are various Security Devices used in your orrganization.mp4 185.64Мб
002 what is P address and IP address classification_en.vtt 20.41Кб
002 what is P address and IP address classification.mp4 123.66Мб
002 what will you do if receive a Malware Attack Alert_en.vtt 35.26Кб
002 what will you do if receive a Malware Attack Alert.mp4 296.01Мб
003 How does a SOC Team manage or work in an Organization_en.vtt 30.73Кб
003 How does a SOC Team manage or work in an Organization.mp4 103.40Мб
003 How do you analyze Phishing email attack_en.vtt 43.88Кб
003 How do you analyze Phishing email attack.mp4 357.37Мб
003 Security Interview Questions - Part 2_en.vtt 25.88Кб
003 Security Interview Questions - Part 2.mp4 136.94Мб
003 What are different event logs you analyze_en.vtt 19.52Кб
003 What are different event logs you analyze.mp4 163.71Мб
003 What is NAT and PAT_en.vtt 13.93Кб
003 What is NAT and PAT.mp4 62.93Мб
004 How do you Analyze SQL Injection attack_en.vtt 21.92Кб
004 How do you Analyze SQL Injection attack.mp4 208.80Мб
004 Security Interview Questions - Part 3_en.vtt 64.01Кб
004 Security Interview Questions - Part 3.mp4 437.97Мб
004 Tell me few port numbers which you know_en.vtt 21.89Кб
004 Tell me few port numbers which you know.mp4 93.10Мб
004 What are the Roles and Responsibilities of SOC Engineer_en.vtt 34.48Кб
004 What are the Roles and Responsibilities of SOC Engineer.mp4 150.63Мб
005 How a Firewall Works_en.vtt 3.04Кб
005 How a Firewall Works.mp4 10.65Мб
005 How do you analyze DDOS Attack_en.vtt 18.62Кб
005 How do you analyze DDOS Attack.mp4 169.05Мб
005 Security Interview Questions - Part 4_en.vtt 60.96Кб
005 Security Interview Questions - Part 4.mp4 409.45Мб
005 what is your SOC Team Model_en.vtt 19.49Кб
005 what is your SOC Team Model.mp4 98.67Мб
006 How do you analyze if a suspicious IP detected in outbound traffic_en.vtt 4.86Кб
006 How do you analyze if a suspicious IP detected in outbound traffic.mp4 50.16Мб
006 How VPN works_en.vtt 5.67Кб
006 How VPN works.mp4 18.47Мб
006 What are the fields in Sample Incident Ticket - ServiceNow_en.vtt 26.59Кб
006 What are the fields in Sample Incident Ticket - ServiceNow.mp4 162.21Мб
007 what are Service level Agreements for the SOC Incidents_en.vtt 10.90Кб
007 what are Service level Agreements for the SOC Incidents.mp4 29.29Мб
007 What is Symmetric and Asymmetric Encryption_en.vtt 20.73Кб
007 What is Symmetric and Asymmetric Encryption.mp4 172.94Мб
008 Explain CIA triad_en.vtt 12.79Кб
008 Explain CIA triad.mp4 67.26Мб
008 What is False Positive Analysis or what are various outcomes of Analysis_en.vtt 17.41Кб
008 What is False Positive Analysis or what are various outcomes of Analysis.mp4 81.49Мб
009 How many Logs sources are there in your organization_en.vtt 8.42Кб
009 How many Logs sources are there in your organization.mp4 36.31Мб
009 What is the difference in between SSL and HTTPS_en.vtt 2.30Кб
009 What is the difference in between SSL and HTTPS.mp4 15.43Мб
010 How do you stay up to date on Cyber Security news and latest attacks_en.vtt 12.76Кб
010 How do you stay up to date on Cyber Security news and latest attacks.mp4 111.82Мб
010 What are the steps in Incident Response Life Cycle_en.vtt 26.87Кб
010 What are the steps in Incident Response Life Cycle.mp4 196.85Мб
011 Can you please explain what you will do after getting an alert (Alert IR FLow)_en.vtt 12.20Кб
011 Can you please explain what you will do after getting an alert (Alert IR FLow).mp4 50.24Мб
011 What is the difference between Virus and Warm_en.vtt 3.33Кб
011 What is the difference between Virus and Warm.mp4 22.23Мб
012 Explain SQL Injection Attack_en.vtt 9.59Кб
012 Explain SQL Injection Attack.mp4 92.40Мб
012 How will you manage work in shifts_en.vtt 12.34Кб
012 How will you manage work in shifts.mp4 69.64Мб
013 How do you handle P1, P2, P3 and P4 Incidents_en.vtt 16.04Кб
013 How do you handle P1, P2, P3 and P4 Incidents.mp4 66.59Мб
013 What is botnet_en.vtt 5.12Кб
013 What is botnet.mp4 28.14Мб
014 What is Brute Force Attack_en.vtt 22.18Кб
014 What is Brute Force Attack.mp4 138.19Мб
1 315б
10 173.66Кб
11 366.72Кб
12 62.60Кб
13 977.13Кб
14 297.03Кб
15 809.20Кб
16 374.61Кб
17 831.82Кб
18 640.08Кб
19 57.64Кб
2 1.13Кб
20 353.11Кб
21 184.95Кб
22 614.40Кб
23 338.88Кб
24 921.19Кб
25 612.88Кб
26 444.13Кб
27 518.91Кб
28 366.96Кб
29 753.27Кб
3 2.27Кб
30 421.69Кб
31 68.43Кб
32 774.62Кб
33 857.00Кб
34 788.80Кб
35 710.47Кб
36 725.18Кб
37 877.23Кб
38 791.09Кб
38672384-2-Org-Architecture.png 79.10Кб
38672698-3-SOC-Team-Architecture.png 63.71Кб
38672760-4-Roles-and-Responsibilities.png 61.21Кб
38673180-5-SOC-Models.png 106.00Кб
38673182-6-SOC-Incident-Document.png 176.24Кб
38673622-7-SLA-Service-Level-Agreements.png 23.88Кб
38673678-8-False-Positive.png 26.12Кб
38673766-9-No-of-Logs-Received.png 23.89Кб
38674192-10-Incident-Life-cycle.png 11.81Кб
38674208-10-Incident-Life-cycle.png 11.81Кб
38674370-12-SOC-Shift-Handover-Document.png 22.26Кб
38765424-Brute-Force-2.png 232.56Кб
38765426-15-Malware2.png 197.67Кб
38783204-GMT20220114-023122-Recording-1920x1080.mp4 137.37Мб
38783224-Phishing-Attack-Analysis.png 147.11Кб
38783226-sql-injection.png 174.55Кб
38802934-Suspecious-IP-outbound.png 109.40Кб
38802936-DDOS-Analysis.png 148.18Кб
39 29.68Кб
4 209б
40 539.77Кб
41 585.24Кб
5 142б
6 501.28Кб
7 1018.27Кб
8 205.90Кб
9 148.68Кб
external-assets-links.txt 69б
TutsNode.com.txt 63б
Статистика распространения по странам
Филиппины (PH) 3
Чешская Республика (CZ) 1
Великобритания (GB) 1
Нидерланды (NL) 1
США (US) 1
Сенегал (SN) 1
Германия (DE) 1
Индия (IN) 1
Всего 10
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент