FileMood

Download CBR5535

CBR5535

Name

CBR5535

 DOWNLOAD Copy Link

Total Size

3.1 GB

Total Files

60

Hash

A153F2D638D10541616CA9E8E0114A8379D92959

/

0 Course Introduction -- 0 CYSA Course Introduction.mp4

8.8 MB

1 Threat Management -- 0 Reconnaissance.mp4

67.3 MB

1 Threat Management -- 1 Port Scanning for Active Reconnaissance.mp4

108.2 MB

1 Threat Management -- 10 Methods of Network Traffic Analysis.mp4

41.4 MB

1 Threat Management -- 11 Network Traffic Analysis.mp4

88.8 MB

1 Threat Management -- 12 Netflows.mp4

58.0 MB

1 Threat Management -- 13 Working with Netflows.mp4

33.3 MB

1 Threat Management -- 14 Netflow Tools.mp4

38.3 MB

1 Threat Management -- 15 Examining Log Files.mp4

65.5 MB

1 Threat Management -- 16 Data Correlation and Analytics.mp4

23.6 MB

1 Threat Management -- 17 Analyzing Device Data.mp4

30.3 MB

1 Threat Management -- 18 SIEM.mp4

34.3 MB

1 Threat Management -- 19 DEMO- Wireshark Packet Analyzer.mp4

24.9 MB

1 Threat Management -- 2 Environmental Reconnaissance Tools.mp4

67.6 MB

1 Threat Management -- 20 Hardening Network Devices.mp4

95.8 MB

1 Threat Management -- 21 Network Segmentation and Design.mp4

54.8 MB

1 Threat Management -- 22 Honeypot.mp4

60.4 MB

1 Threat Management -- 23 Endpoint Security.mp4

113.0 MB

1 Threat Management -- 24 Windows Group Policy.mp4

24.6 MB

1 Threat Management -- 25 Access Control Models.mp4

124.3 MB

1 Threat Management -- 26 Remote Authentication - Radius and Tacacs+.mp4

65.0 MB

1 Threat Management -- 27 Hardening Host and Networked Systems.mp4

72.1 MB

1 Threat Management -- 28 Compensating Controls.mp4

56.2 MB

1 Threat Management -- 29 Corporate Penetration Testing.mp4

97.3 MB

1 Threat Management -- 3 Social Engineering for Reconnaissance.mp4

83.7 MB

1 Threat Management -- 30 Reverse Engineering Purpose and Practice.mp4

99.9 MB

1 Threat Management -- 31 Team Training and Exercises.mp4

27.8 MB

1 Threat Management -- 32 Risk Evaluation and Security Controls.mp4

75.5 MB

1 Threat Management -- 4 Network Mapping for Active Reconnaissance.mp4

96.8 MB

1 Threat Management -- 5 Syslog.mp4

65.1 MB

1 Threat Management -- 6 Reviewing Alerts:Detecting Attack Phases.mp4

51.5 MB

1 Threat Management -- 7 Common Tasks in Environmental Reconnaissance.mp4

28.4 MB

1 Threat Management -- 8 Environmental Reconnaissance Variables.mp4

27.2 MB

1 Threat Management -- 9 Basic Packet Analysis.mp4

38.1 MB

2 Cyber Incident Response -- 0 Malware and Social Engineering Threats.mp4

39.2 MB

2 Cyber Incident Response -- 1 Preparing for Impact Analysis.mp4

42.0 MB

2 Cyber Incident Response -- 2 Forensics Kit and Incident Response.mp4

26.4 MB

2 Cyber Incident Response -- 3 Forensic Investigation Suite.mp4

24.3 MB

2 Cyber Incident Response -- 4 Setting Up an Analysis Environment.mp4

14.8 MB

2 Cyber Incident Response -- 5 Communication During Incident Response.mp4

25.6 MB

2 Cyber Incident Response -- 6 Common Symptoms of Host Infection.mp4

39.0 MB

2 Cyber Incident Response -- 7 Incident Response and Recovery Part 1 of 2.mp4

98.2 MB

2 Cyber Incident Response -- 8 Incident Response and Recovery Part 2 of 2.mp4

58.3 MB

3 Security Architecture and Tool Sets -- 0 Regulatory Compliance and Frameworks.mp4

30.7 MB

3 Security Architecture and Tool Sets -- 1 Control Selection Tailoring and Implementation.mp4

46.1 MB

3 Security Architecture and Tool Sets -- 10 Code Review and Testing.mp4

61.0 MB

3 Security Architecture and Tool Sets -- 11 Secure Coding Best Practice Resources.mp4

31.5 MB

3 Security Architecture and Tool Sets -- 12 Preventative Cyber Tools.mp4

20.3 MB

3 Security Architecture and Tool Sets -- 13 Collective Cyber Tools.mp4

40.6 MB

3 Security Architecture and Tool Sets -- 14 Analytical Cyber Tools.mp4

22.6 MB

3 Security Architecture and Tool Sets -- 15 Exploit Cyber Tools.mp4

22.5 MB

3 Security Architecture and Tool Sets -- 16 Forensics Cyber Tools.mp4

19.7 MB

3 Security Architecture and Tool Sets -- 2 Verification and Quality Control.mp4

37.9 MB

3 Security Architecture and Tool Sets -- 3 Procedures Supporting Policy.mp4

28.5 MB

3 Security Architecture and Tool Sets -- 4 Enterprise Network Authentication Part 1 of 2.mp4

44.9 MB

3 Security Architecture and Tool Sets -- 5 Enterprise Network Authentication Part 2 of 2.mp4

75.4 MB

3 Security Architecture and Tool Sets -- 6 Cross-site Scripting and Other Exploits.mp4

73.4 MB

3 Security Architecture and Tool Sets -- 7 Privilege Escalation Exploit.mp4

27.7 MB

3 Security Architecture and Tool Sets -- 8 Technical Processes and Controls.mp4

41.9 MB

3 Security Architecture and Tool Sets -- 9 Software Development Models and SDLC.mp4

65.6 MB

 

Total files 60


Copyright © 2024 FileMood.com