FileMood

Download CBR1125

CBR1125

Name

CBR1125

 DOWNLOAD Copy Link

Total Size

3.0 GB

Total Files

51

Hash

2389E148B4F5982A7FA37E4619C32E1C7B422DAE

/

0 Module 1 - Introduction to Incident Response -- 0 Part 1 - An Overall View of the Course.mp4

55.5 MB

0 Module 1 - Introduction to Incident Response -- 1 Part 2 - The Humans Behind Cyber Security Incidents.mp4

62.4 MB

0 Module 1 - Introduction to Incident Response -- 2 Part 3 - The Sony Hack Case Study.mp4

54.5 MB

1 Module 2 - Incident Response Policy -- 0 Part 1 - An Overview of Incident Response Policy.mp4

46.0 MB

1 Module 2 - Incident Response Policy -- 1 Part 2 - The Elements of an Incident Response Policy.mp4

75.7 MB

1 Module 2 - Incident Response Policy -- 2 Part 3 - The Role of Communication with Law Enforcement when it comes to security.mp4

62.3 MB

1 Module 2 - Incident Response Policy -- 3 Part 4 - The Different Types of Incident Response Teams.mp4

74.8 MB

1 Module 2 - Incident Response Policy -- 4 Part 5 - Outsourcing Considerations.mp4

62.5 MB

1 Module 2 - Incident Response Policy -- 5 Part 6 - The Role of the Incident Response Manager.mp4

70.3 MB

1 Module 2 - Incident Response Policy -- 6 Part 7 - What does an Incident Response team do?.mp4

41.1 MB

2 Module 3 - Incident Handling -- 0 Part 1 - An Introduction to Incident Handling.mp4

55.8 MB

2 Module 3 - Incident Handling -- 1 Part 2 - CIRC Team Composition.mp4

45.8 MB

2 Module 3 - Incident Handling -- 2 Part 3 - Incident Response Policies.mp4

32.0 MB

2 Module 3 - Incident Handling -- 3 Part 4 - The REACT Principle.mp4

47.3 MB

2 Module 3 - Incident Handling -- 4 Part 5 - Maintaining the Integrity of the Scene following an incident.mp4

43.0 MB

2 Module 3 - Incident Handling -- 5 Part 6 - The Content of Notice.mp4

68.1 MB

2 Module 3 - Incident Handling -- 6 Part 7 - The Respond Part of Incident Response.mp4

32.7 MB

3 Module 4 - Legal Aspects of Incident Response -- 0 Part 1 - An Introduction to legal considerations of incident response.mp4

49.2 MB

3 Module 4 - Legal Aspects of Incident Response -- 1 Part 2 - Expectation of Privacy.mp4

49.8 MB

3 Module 4 - Legal Aspects of Incident Response -- 2 Part 3 - Personally Identifiable Information (PII).mp4

69.8 MB

3 Module 4 - Legal Aspects of Incident Response -- 3 Part 4 - Giving notice to individuals.mp4

68.1 MB

3 Module 4 - Legal Aspects of Incident Response -- 4 Part 5 -Benefits of Information Sharing.mp4

31.4 MB

4 Module 5 - Forensics of Incident Response -- 0 Part 1 - Forensics in Support of an Incident Response.mp4

52.2 MB

4 Module 5 - Forensics of Incident Response -- 1 Part 2 - The Phases of Investigation.mp4

49.8 MB

4 Module 5 - Forensics of Incident Response -- 10 Part 11 - Using the FTK Imaging Software.mp4

54.2 MB

4 Module 5 - Forensics of Incident Response -- 11 Part 12 - The Forensic Acquisition of Data from a PC.mp4

54.2 MB

4 Module 5 - Forensics of Incident Response -- 12 Part 13 - Navigating the H Drive.mp4

59.7 MB

4 Module 5 - Forensics of Incident Response -- 13 Part 14 - Obtaining the Windows Bitlocker Encryption Keys.mp4

36.9 MB

4 Module 5 - Forensics of Incident Response -- 14 Part 15 - Obtaining the Windows Bitlocker Encryption Keys (continued).mp4

34.1 MB

4 Module 5 - Forensics of Incident Response -- 15 Part 16 - The Autopsy Program.mp4

69.1 MB

4 Module 5 - Forensics of Incident Response -- 2 Part 3 - The Preservation Phase of Investigation.mp4

64.9 MB

4 Module 5 - Forensics of Incident Response -- 3 Part 4 - Keys of Preservation.mp4

59.5 MB

4 Module 5 - Forensics of Incident Response -- 4 Part 5 - Volatile Data Considerations.mp4

55.6 MB

4 Module 5 - Forensics of Incident Response -- 5 Part 6 - Capturing the data.mp4

52.3 MB

4 Module 5 - Forensics of Incident Response -- 6 Part 7 - Imaging concepts.mp4

64.2 MB

4 Module 5 - Forensics of Incident Response -- 7 Part 8 - Volatile Memory Capture.mp4

75.0 MB

4 Module 5 - Forensics of Incident Response -- 8 Part 9 - Forensics in Support of Incident Response.mp4

60.3 MB

4 Module 5 - Forensics of Incident Response -- 9 Part 10 - Formatting a disk for Incident Response.mp4

64.8 MB

5 Module 6 - Insider Threat -- 0 Part 1 - What is Insider Threat?.mp4

67.7 MB

5 Module 6 - Insider Threat -- 1 Part 2 - American Superconductor Case Study.mp4

41.1 MB

5 Module 6 - Insider Threat -- 2 Part 3 - Indicators to identify an insider threat.mp4

111.3 MB

5 Module 6 - Insider Threat -- 3 Part 4 - Using Automated processes to look for indicators of in insider threats.mp4

71.9 MB

5 Module 6 - Insider Threat -- 4 Part 5 - Policy Enforcement.mp4

71.2 MB

5 Module 6 - Insider Threat -- 5 Part 6 - Policies and procedures.mp4

76.1 MB

5 Module 6 - Insider Threat -- 6 Part 7 - Policies and procedures (continued).mp4

70.8 MB

5 Module 6 - Insider Threat -- 7 Part 8 - Policies and procedures (continued).mp4

64.8 MB

6 Module 7 - Malware -- 0 Part 1 - Malware incidents.mp4

60.2 MB

6 Module 7 - Malware -- 1 Part 2 - Setting up a Virtual Machine.mp4

45.2 MB

6 Module 7 - Malware -- 2 Part 3 - Dynamic Analysis.mp4

66.7 MB

7 Module 8 - Incident Recovery -- 0 Part 1- Incident Recovery.mp4

90.5 MB

7 Module 8 - Incident Recovery -- 1 Part 2 - Resiliency: The Answer to the Cyber Security Paradox.mp4

61.2 MB

 

Total files 51


Copyright © 2024 FileMood.com