| Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
                        эти файлы или скачать torrent-файл. | 
                
                    | [TGx]Downloaded from torrentgalaxy.to .txt | 585б | 
                
                    | 0 | 218б | 
                
                    | 001 Collection of Networking Interview Questions_en.vtt | 57.70Кб | 
                
                    | 001 Collection of Networking Interview Questions.mp4 | 463.43Мб | 
                
                    | 001 How do you analyze if receive a Brute Force Attack Alert_en.vtt | 22.89Кб | 
                
                    | 001 How do you analyze if receive a Brute Force Attack Alert.mp4 | 194.83Мб | 
                
                    | 001 Introduction_en.vtt | 6.81Кб | 
                
                    | 001 Introduction.mp4 | 19.97Мб | 
                
                    | 001 SIEM related interview topics_en.vtt | 77.78Кб | 
                
                    | 001 SIEM related interview topics.mp4 | 499.07Мб | 
                
                    | 001 what are networking devices_en.vtt | 17.92Кб | 
                
                    | 001 what are networking devices.mp4 | 83.57Мб | 
                
                    | 001 What is Security Operation Center_en.vtt | 11.19Кб | 
                
                    | 001 What is Security Operation Center.mp4 | 45.23Мб | 
                
                    | 002 Security Interview Questions - Part 1_en.vtt | 72.18Кб | 
                
                    | 002 Security Interview Questions - Part 1.mp4 | 484.71Мб | 
                
                    | 002 SIEM Dashboard and Use cases_en.vtt | 97.20Кб | 
                
                    | 002 SIEM Dashboard and Use cases.mp4 | 717.87Мб | 
                
                    | 002 What are various Security Devices used in your orrganization_en.vtt | 42.65Кб | 
                
                    | 002 What are various Security Devices used in your orrganization.mp4 | 185.64Мб | 
                
                    | 002 what is P address and IP address classification_en.vtt | 20.41Кб | 
                
                    | 002 what is P address and IP address classification.mp4 | 123.66Мб | 
                
                    | 002 what will you do if receive a Malware Attack Alert_en.vtt | 35.26Кб | 
                
                    | 002 what will you do if receive a Malware Attack Alert.mp4 | 296.01Мб | 
                
                    | 003 How does a SOC Team manage or work in an Organization_en.vtt | 30.73Кб | 
                
                    | 003 How does a SOC Team manage or work in an Organization.mp4 | 103.40Мб | 
                
                    | 003 How do you analyze Phishing email attack_en.vtt | 43.88Кб | 
                
                    | 003 How do you analyze Phishing email attack.mp4 | 357.37Мб | 
                
                    | 003 Security Interview Questions - Part 2_en.vtt | 25.88Кб | 
                
                    | 003 Security Interview Questions - Part 2.mp4 | 136.94Мб | 
                
                    | 003 What are different event logs you analyze_en.vtt | 19.52Кб | 
                
                    | 003 What are different event logs you analyze.mp4 | 163.71Мб | 
                
                    | 003 What is NAT and PAT_en.vtt | 13.93Кб | 
                
                    | 003 What is NAT and PAT.mp4 | 62.93Мб | 
                
                    | 004 How do you Analyze SQL Injection attack_en.vtt | 21.92Кб | 
                
                    | 004 How do you Analyze SQL Injection attack.mp4 | 208.80Мб | 
                
                    | 004 Security Interview Questions - Part 3_en.vtt | 64.01Кб | 
                
                    | 004 Security Interview Questions - Part 3.mp4 | 437.97Мб | 
                
                    | 004 Tell me few port numbers which you know_en.vtt | 21.89Кб | 
                
                    | 004 Tell me few port numbers which you know.mp4 | 93.10Мб | 
                
                    | 004 What are the Roles and Responsibilities of SOC Engineer_en.vtt | 34.48Кб | 
                
                    | 004 What are the Roles and Responsibilities of SOC Engineer.mp4 | 150.63Мб | 
                
                    | 005 How a Firewall Works_en.vtt | 3.04Кб | 
                
                    | 005 How a Firewall Works.mp4 | 10.65Мб | 
                
                    | 005 How do you analyze DDOS Attack_en.vtt | 18.62Кб | 
                
                    | 005 How do you analyze DDOS Attack.mp4 | 169.05Мб | 
                
                    | 005 Security Interview Questions - Part 4_en.vtt | 60.96Кб | 
                
                    | 005 Security Interview Questions - Part 4.mp4 | 409.45Мб | 
                
                    | 005 what is your SOC Team Model_en.vtt | 19.49Кб | 
                
                    | 005 what is your SOC Team Model.mp4 | 98.67Мб | 
                
                    | 006 How do you analyze if a suspicious IP detected in outbound traffic_en.vtt | 4.86Кб | 
                
                    | 006 How do you analyze if a suspicious IP detected in outbound traffic.mp4 | 50.16Мб | 
                
                    | 006 How VPN works_en.vtt | 5.67Кб | 
                
                    | 006 How VPN works.mp4 | 18.47Мб | 
                
                    | 006 What are the fields in Sample Incident Ticket - ServiceNow_en.vtt | 26.59Кб | 
                
                    | 006 What are the fields in Sample Incident Ticket - ServiceNow.mp4 | 162.21Мб | 
                
                    | 007 what are Service level Agreements for the SOC Incidents_en.vtt | 10.90Кб | 
                
                    | 007 what are Service level Agreements for the SOC Incidents.mp4 | 29.29Мб | 
                
                    | 007 What is Symmetric and Asymmetric Encryption_en.vtt | 20.73Кб | 
                
                    | 007 What is Symmetric and Asymmetric Encryption.mp4 | 172.94Мб | 
                
                    | 008 Explain CIA triad_en.vtt | 12.79Кб | 
                
                    | 008 Explain CIA triad.mp4 | 67.26Мб | 
                
                    | 008 What is False Positive Analysis or what are various outcomes of Analysis_en.vtt | 17.41Кб | 
                
                    | 008 What is False Positive Analysis or what are various outcomes of Analysis.mp4 | 81.49Мб | 
                
                    | 009 How many Logs sources are there in your organization_en.vtt | 8.42Кб | 
                
                    | 009 How many Logs sources are there in your organization.mp4 | 36.31Мб | 
                
                    | 009 What is the difference in between SSL and HTTPS_en.vtt | 2.30Кб | 
                
                    | 009 What is the difference in between SSL and HTTPS.mp4 | 15.43Мб | 
                
                    | 010 How do you stay up to date on Cyber Security news and latest attacks_en.vtt | 12.76Кб | 
                
                    | 010 How do you stay up to date on Cyber Security news and latest attacks.mp4 | 111.82Мб | 
                
                    | 010 What are the steps in Incident Response Life Cycle_en.vtt | 26.87Кб | 
                
                    | 010 What are the steps in Incident Response Life Cycle.mp4 | 196.85Мб | 
                
                    | 011 Can you please explain what you will do after getting an alert (Alert IR FLow)_en.vtt | 12.20Кб | 
                
                    | 011 Can you please explain what you will do after getting an alert (Alert IR FLow).mp4 | 50.24Мб | 
                
                    | 011 What is the difference between Virus and Warm_en.vtt | 3.33Кб | 
                
                    | 011 What is the difference between Virus and Warm.mp4 | 22.23Мб | 
                
                    | 012 Explain SQL Injection Attack_en.vtt | 9.59Кб | 
                
                    | 012 Explain SQL Injection Attack.mp4 | 92.40Мб | 
                
                    | 012 How will you manage work in shifts_en.vtt | 12.34Кб | 
                
                    | 012 How will you manage work in shifts.mp4 | 69.64Мб | 
                
                    | 013 How do you handle P1, P2, P3 and P4 Incidents_en.vtt | 16.04Кб | 
                
                    | 013 How do you handle P1, P2, P3 and P4 Incidents.mp4 | 66.59Мб | 
                
                    | 013 What is botnet_en.vtt | 5.12Кб | 
                
                    | 013 What is botnet.mp4 | 28.14Мб | 
                
                    | 014 What is Brute Force Attack_en.vtt | 22.18Кб | 
                
                    | 014 What is Brute Force Attack.mp4 | 138.19Мб | 
                
                    | 1 | 315б | 
                
                    | 10 | 173.66Кб | 
                
                    | 11 | 366.72Кб | 
                
                    | 12 | 62.60Кб | 
                
                    | 13 | 977.13Кб | 
                
                    | 14 | 297.03Кб | 
                
                    | 15 | 809.20Кб | 
                
                    | 16 | 374.61Кб | 
                
                    | 17 | 831.82Кб | 
                
                    | 18 | 640.08Кб | 
                
                    | 19 | 57.64Кб | 
                
                    | 2 | 1.13Кб | 
                
                    | 20 | 353.11Кб | 
                
                    | 21 | 184.95Кб | 
                
                    | 22 | 614.40Кб | 
                
                    | 23 | 338.88Кб | 
                
                    | 24 | 921.19Кб | 
                
                    | 25 | 612.88Кб | 
                
                    | 26 | 444.13Кб | 
                
                    | 27 | 518.91Кб | 
                
                    | 28 | 366.96Кб | 
                
                    | 29 | 753.27Кб | 
                
                    | 3 | 2.27Кб | 
                
                    | 30 | 421.69Кб | 
                
                    | 31 | 68.43Кб | 
                
                    | 32 | 774.62Кб | 
                
                    | 33 | 857.00Кб | 
                
                    | 34 | 788.80Кб | 
                
                    | 35 | 710.47Кб | 
                
                    | 36 | 725.18Кб | 
                
                    | 37 | 877.23Кб | 
                
                    | 38 | 791.09Кб | 
                
                    | 38672384-2-Org-Architecture.png | 79.10Кб | 
                
                    | 38672698-3-SOC-Team-Architecture.png | 63.71Кб | 
                
                    | 38672760-4-Roles-and-Responsibilities.png | 61.21Кб | 
                
                    | 38673180-5-SOC-Models.png | 106.00Кб | 
                
                    | 38673182-6-SOC-Incident-Document.png | 176.24Кб | 
                
                    | 38673622-7-SLA-Service-Level-Agreements.png | 23.88Кб | 
                
                    | 38673678-8-False-Positive.png | 26.12Кб | 
                
                    | 38673766-9-No-of-Logs-Received.png | 23.89Кб | 
                
                    | 38674192-10-Incident-Life-cycle.png | 11.81Кб | 
                
                    | 38674208-10-Incident-Life-cycle.png | 11.81Кб | 
                
                    | 38674370-12-SOC-Shift-Handover-Document.png | 22.26Кб | 
                
                    | 38765424-Brute-Force-2.png | 232.56Кб | 
                
                    | 38765426-15-Malware2.png | 197.67Кб | 
                
                    | 38783204-GMT20220114-023122-Recording-1920x1080.mp4 | 137.37Мб | 
                
                    | 38783224-Phishing-Attack-Analysis.png | 147.11Кб | 
                
                    | 38783226-sql-injection.png | 174.55Кб | 
                
                    | 38802934-Suspecious-IP-outbound.png | 109.40Кб | 
                
                    | 38802936-DDOS-Analysis.png | 148.18Кб | 
                
                    | 39 | 29.68Кб | 
                
                    | 4 | 209б | 
                
                    | 40 | 539.77Кб | 
                
                    | 41 | 585.24Кб | 
                
                    | 5 | 142б | 
                
                    | 6 | 501.28Кб | 
                
                    | 7 | 1018.27Кб | 
                
                    | 8 | 205.90Кб | 
                
                    | 9 | 148.68Кб | 
                
                    | external-assets-links.txt | 69б | 
                
                    | TutsNode.com.txt | 63б |