|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 01 - 1.0 Threat Management_ Vocabulary Related to Threats and Attacks.mp4 |
22.46Мб |
| 02 - 1.0 Threat Management_ Attack Categories, Types, and Vectors.mp4 |
17.16Мб |
| 03 - 1.0 Threat Management_ Reconnaissance and Footprinting Overview.mp4 |
27.52Мб |
| 04 - 1.0 Threat Management_ Using DNS for Reconnaissance.mp4 |
25.60Мб |
| 05 - 1.0 Threat Management_ Direct Network Scanning Overview.mp4 |
15.30Мб |
| 06 - 1.0 Threat Management_ Direct Network Scanning Methodology .mp4 |
26.29Мб |
| 07 - 1.0 Threat Management_ Port Discovery Overview.mp4 |
25.34Мб |
| 08 - 1.0 Threat Management_ OS and App Fingerprinting.mp4 |
24.24Мб |
| 09 - 1.0 Threat Management_ Using NMAP for Host, Port, and OS Discovery_ VLab.mp4 |
77.10Мб |
| 10 - 1.0 Threat Management_ Vulnerability Scanning Tools.mp4 |
20.82Мб |
| 11 - 1. Threat Management_ Vulnerability Scan Scenario.mp4 |
13.79Мб |
| 12 - 1. Threat Management_ Network Mapping.mp4 |
11.89Мб |
| 13 - 1. Threat Management_ Understanding System Hacking.mp4 |
26.49Мб |
| 14 - 1. Threat Management_ Honeypot Overview.mp4 |
23.89Мб |
| 15 - 1. Threat Management_ Using a Network Scanner To See a Honeypot.mp4 |
30.75Мб |
| 16 - 1. Threat Management_ Social Engineering Overview.mp4 |
15.65Мб |
| 17 - 1. Threat Management_ Phases and Methods of Social Engineering.mp4 |
15.81Мб |
| 18 - 1. Threat Management_ Phishing Overview.mp4 |
24.10Мб |
| 19 - 1. Threat Management_ Defending Against Phishing.mp4 |
24.43Мб |
| 20 - 1. Threat Management_ Packet Capture and Analysis Overview.mp4 |
19.21Мб |
| 21 - 1. Threat Management_ Practicing Packet Capture and Protocol Analysis_ VLab.mp4 |
43.07Мб |
| 22 - 1. Threat Management_ Logging Overview.mp4 |
27.75Мб |
| 23 - 1. Threat Management_ Firewall_Router ACL Review.mp4 |
25.40Мб |
| 24 - 1. Threat Management_ Trend Awareness.mp4 |
28.32Мб |
| 25 - 1. Threat Management_ Hardening and Other Best Practices.mp4 |
21.93Мб |
| 26 - 1. Threat Management_ Whitelisting and Access Control.mp4 |
16.39Мб |
| 27 - 1. Threat Management_ Evaluating Risk.mp4 |
19.09Мб |
| 28 - 1. Threat Management_ Network Access Control (NAC).mp4 |
25.17Мб |
| 29 - 1. Threat Management_ Uncovering Vulnerabilities.mp4 |
24.75Мб |
| 30 - 2. Vulnerability Management_ Motivators for Vulnerability Management.mp4 |
18.64Мб |
| 31 - 2. Vulnerability Management_ SCAP Overview.mp4 |
16.99Мб |
| 32 - 2. Vulnerability Management_ What to Ask When Doing Focused Vulnerability Scanning.mp4 |
26.22Мб |
| 33 - 2. Vulnerability Management_ Remediation Considerations.mp4 |
24.08Мб |
| 34 - 2. Vulnerability Management_ Review and Interpret Output_ Web Server Version.mp4 |
22.00Мб |
| 35 - 2. Vulnerability Management_ Analyzing Vulnerability Scan Output_ Enumeration of Shares.mp4 |
20.52Мб |
| 36 - 2. Vulnerability Management_ Vulnerabilities in Servers.mp4 |
32.12Мб |
| 37 - 2. Vulnerability Management_ Vulnerabilities in Endpoints.mp4 |
23.65Мб |
| 38 - 2. Vulnerability Management_ Vulnerabilities in Infrastructure Devices.mp4 |
22.97Мб |
| 39 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Weak Policy.mp4 |
23.70Мб |
| 40 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Traveling.mp4 |
22.75Мб |
| 41 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Remote Wipe.mp4 |
19.22Мб |
| 42 - 2. Vulnerability Management_ Vulnerabilities Regarding Interconnected Networks.mp4 |
18.95Мб |
| 43 - 2. Vulnerability Management_ Physical and Virtual Device Vulnerabilities.mp4 |
25.10Мб |
| 44 - 2. Vulnerability Management_ Using ACLs and VPNs to Reduce Vulnerabilities.mp4 |
18.27Мб |
| 45 - 3. Cyber Incident Response_ Threat Classification.mp4 |
22.50Мб |
| 46 - 3. Cyber Incident Response_ Factors Contributing to Incident Severity and Prioritization.mp4 |
21.66Мб |
| 47 - 3. Cyber Incident Response_ Building a Forensic Tool Kit.mp4 |
24.91Мб |
| 48 - 3. Cyber Incident Response_ Tool Categories in a Forensic Investigation Suite.mp4 |
19.87Мб |
| 49 - 3. Cyber Incident Response_ Communication During an Incident Response.mp4 |
32.77Мб |
| 50 - 3. Cyber Incident Response_ Abnormal Traffic Patterns that May Indicate a Cyber Incident.mp4 |
22.50Мб |
| 51 - 3. Cyber Incident Response_ Network Scans as a Symptom of a Cyber Incident.mp4 |
15.39Мб |
| 52 - 3. Cyber Incident Response_ Host-Related Cybersecurity Symptoms.mp4 |
25.97Мб |
| 53 - 3. Cyber Incident Response_ Application-Related Cyber Incident Symptoms.mp4 |
12.57Мб |
| 54 - 3. Cyber Incident Response_ Containment and Eradication Techniques.mp4 |
28.94Мб |
| 55 - 3. Cyber Incident Response_ Validation of Post-Incident Remediation .mp4 |
19.86Мб |
| 56 - 3. Cyber Incident Response_ Corrective Actions, Updates, and Reports.mp4 |
11.88Мб |
| 57 - 4.0 Security Architecture_ Security Frameworks for IT.mp4 |
17.33Мб |
| 58 - 4.0 Security Architecture_ Regulatory Compliance and Control Types.mp4 |
23.12Мб |
| 59 - 4.0 Security Architecture_ Verification and Validation of Controls.mp4 |
14.44Мб |
| 60 - 4.0 Security Architecture_ Having Policies to Improve Security.mp4 |
15.13Мб |
| 61 - 4.0 Security Architecture_ Having Procedures to Improve Security.mp4 |
15.13Мб |
| 62 - 4.0 Security Architecture_ Identity Context and Repositories .mp4 |
25.17Мб |
| 63 - 4.0 Security Architecture_ SSO and Federations.mp4 |
20.92Мб |
| 64 - 4.0 Security Architecture_ Exploits Related to Identity and Access.mp4 |
23.26Мб |
| 65 - 4.0 Security Architecture_ Recommending Compensating Controls.mp4 |
24.91Мб |
| 66 - 4.0 Security Architecture_ Best Practices During Software Development.mp4 |
23.63Мб |
| 67 - 4.0 Security Architecture_ Secure Coding Best Practices.mp4 |
23.40Мб |
| 68 - 4.0 Security Architecture_ Identifying Preventive Tools and Technologies.mp4 |
24.26Мб |
| 69 - 4.0 Security Architecture_ Selecting and Applying Appropriate Preventive Tools.mp4 |
23.37Мб |
| 70 - 4.0 Security Architecture_ Tools and Technologies for Information Collection.mp4 |
17.85Мб |
| 71 - 4.0 Security Architecture_ Tools and Tech for Analysis, Exploits, and Forensics.mp4 |
19.32Мб |
| AhLaN.txt |
961б |
| Seed Me!!.png |
42.05Кб |