FileMood

Download [FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition

FreeCoursesOnline Me REILLY The Complete Cybersecurity Bootcamp 2nd Edition

Name

[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition

 DOWNLOAD Copy Link

Total Size

6.7 GB

Total Files

340

Last Seen

2024-07-23 00:05

Hash

629B49D13DCF54A01410040D59A9706FFF8F2DE0

/0. Websites you may like/

1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url

0.4 KB

2. FTUApps.com Download Cracked Developers Applications For Free.url

0.2 KB

/

FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url

0.3 KB

/Introduction/

001. The Complete Cybersecurity Bootcamp Introduction.mp4

17.6 MB

/Lesson 1 Cybersecurity Fundamentals/

001. Learning objectives.mp4

6.1 MB

002. 1.1 Describing the CIA Triad.mp4

6.7 MB

003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4

13.0 MB

004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4

12.0 MB

005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4

11.2 MB

006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4

35.3 MB

007. 1.6 Defining Threat Intelligence.mp4

47.8 MB

008. 1.7 Defining Threat Hunting.mp4

29.6 MB

009. 1.8 Understanding Malware Analysis.mp4

29.5 MB

010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4

9.9 MB

011. 1.10 Understanding the Different Threat Actor Types.mp4

5.9 MB

012. 1.11 Defining Run Book Automation (RBA).mp4

8.9 MB

013. 1.12 Defining Reverse Engineering.mp4

10.1 MB

014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4

5.0 MB

/Lesson 10 Network Intrusion Analysis/

001. Learning objectives.mp4

5.4 MB

002. 10.1 Introducing Intrusion Analysis Fundamentals.mp4

34.3 MB

003. 10.2 Examining Packet Captures.mp4

28.9 MB

004. 10.3 Examining Protocol Headers.mp4

8.8 MB

005. 10.4 Analyzing Security Device Data.mp4

18.3 MB

006. 10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives.mp4

7.9 MB

007. 10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring.mp4

16.2 MB

008. 10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark.mp4

7.3 MB

009. 10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert.mp4

11.2 MB

/Lesson 11 Introducing AAA and Identity Management/

001. Learning objectives.mp4

3.1 MB

002. 11.1 Understanding Authentication.mp4

30.6 MB

003. 11.2 Exploring the RADIUS Protocol.mp4

10.6 MB

004. 11.3 Surveying the TACACS+ Protocol.mp4

7.2 MB

005. 11.4 Understanding Authorization.mp4

7.5 MB

006. 11.5 Surveying Authorization Models.mp4

15.2 MB

007. 11.6 Defining Accounting.mp4

6.1 MB

008. 11.7 Exploring Multifactor Authentication and Single Sign-On.mp4

24.8 MB

009. 11.8 Exploring Examples of Multifactor and Single Sign-On.mp4

6.8 MB

/Lesson 12 Network Visibility and Segmentation/

001. Learning objectives.mp4

3.7 MB

002. 12.1 Defining Network Visibility and Segmentation.mp4

6.2 MB

003. 12.2 Introducing NetFlow and IPFIX.mp4

6.6 MB

004. 12.3 Describing Flexible NetFlow Records.mp4

11.3 MB

005. 12.4 Understanding NetFlow Deployment.mp4

10.6 MB

006. 12.5 Introducing Network Segmentation.mp4

5.4 MB

007. 12.6 Exploring Application-based Segmentation.mp4

5.8 MB

008. 12.7 Describing Network Access with CoA.mp4

5.0 MB

/Lesson 13 Network Infrastructure Security/

001. Learning objectives.mp4

5.6 MB

002. 13.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4

13.2 MB

003. 13.2 Configuring and Verifying Port Security.mp4

12.1 MB

004. 13.3 Configuring and Verifying DHCP Snooping.mp4

11.4 MB

005. 13.4 Configuring and Verifying Dynamic ARP Inspection.mp4

15.9 MB

006. 13.5 Exploring and Mitigating Common Layer 2 Threats.mp4

15.8 MB

007. 13.6 Understanding and Configuring BPDU Guard and Root Guard.mp4

6.8 MB

008. 13.7 Understanding and Configuring CDPLLDP.mp4

9.1 MB

009. 13.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4

15.3 MB

010. 13.9 Exploring How to Secure the Management Plane.mp4

14.5 MB

011. 13.10 Exploring How to Secure the Control Plane.mp4

15.3 MB

012. 13.11 Exploring How to Secure the Data Plane.mp4

11.8 MB

/Lesson 14 Software-Defined Networking Security and Programmability/

001. Learning objectives.mp4

8.4 MB

002. 14.1 Introducing SDN.mp4

14.2 MB

003. 14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4

9.9 MB

004. 14.3 Introducing Cisco ACI.mp4

18.0 MB

005. 14.4 Introducing Cisco DNA and Cisco DNA Center.mp4

29.9 MB

006. 14.5 Understanding VXLAN and Network Overlays.mp4

10.3 MB

007. 14.6 Understanding Microsegmentation.mp4

9.3 MB

008. 14.7 Surveying Open Source SDN Solutions.mp4

10.3 MB

009. 14.8 Understanding the Threats Against SDN Solutions.mp4

7.6 MB

010. 14.9 Understanding the Security Benefits in SDN Solutions.mp4

7.0 MB

011. 14.10 Introducing Network Programmability.mp4

32.4 MB

012. 14.11 Exploring DevNet and DevNet Resources for Security Automation.mp4

3.9 MB

013. 14.12 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4

39.0 MB

014. 14.13 A Brief Introduction to Git.mp4

26.1 MB

015. 14.14 Exploring pxGrid.mp4

16.3 MB

016. 14.15 Integrating and Automating Security Operations with Cisco Products.mp4

11.5 MB

/Lesson 15 Overview of Ethical Hacking and Penetration Testing/

001. Learning objectives.mp4

4.3 MB

002. 15.1 Introducing Ethical Hacking and Pen Testing.mp4

21.6 MB

003. 15.2 Exploring Penetration Testing Methodologies.mp4

22.1 MB

004. 15.3 Explaining the Importance of the Planning and Preparation Phase.mp4

47.1 MB

005. 15.4 Understanding the Legal Concepts of Penetration Testing.mp4

14.5 MB

006. 15.5 Learning How to Scope a Penetration Testing Engagement Properly.mp4

15.3 MB

007. 15.6 Learning the Key Aspects of Compliance-based Assessments.mp4

11.4 MB

/Lesson 16 Information Gathering and Passive Reconnaissance/

001. Learning objectives.mp4

4.4 MB

002. 16.1 Introducing Footprinting Concepts and Methodologies.mp4

27.8 MB

003. 16.2 Performing Footprinting through Search Engines.mp4

20.3 MB

004. 16.3 Performing Footprinting through Web Services.mp4

23.2 MB

005. 16.4 Performing Footprinting through Social Networking Sites.mp4

7.6 MB

006. 16.5 Understanding Website Footprinting.mp4

38.6 MB

007. 16.6 Understanding Email Footprinting.mp4

12.8 MB

008. 16.7 Understanding Whois Footprinting.mp4

21.9 MB

009. 16.8 Understanding DNS Footprinting.mp4

27.7 MB

010. 16.9 Understanding Network Footprinting.mp4

14.3 MB

011. 16.10 Performing Footprinting through Social Engineering.mp4

59.1 MB

012. 16.11 Surveying Footprinting Tools.mp4

7.7 MB

/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/

001. Learning objectives.mp4

6.1 MB

002. 17.1 Surveying Network Scanning Concepts.mp4

13.4 MB

003. 17.2 Exploiting Scanning Tools.mp4

36.7 MB

004. 17.3 Understanding Host Discovery.mp4

69.7 MB

005. 17.4 Understanding Port and Service Discovery.mp4

39.6 MB

006. 17.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting).mp4

41.6 MB

007. 17.6 Scanning Beyond IDS and Firewall.mp4

68.2 MB

008. 17.7 Creating Network Diagrams.mp4

26.2 MB

009. 17.8 Introducing Enumeration Techniques.mp4

18.5 MB

010. 17.9 Performing NetBIOS Enumeration.mp4

36.2 MB

011. 17.1 Performing SNMP Enumeration.mp4

71.8 MB

012. 17.11 Performing LDAP Enumeration.mp4

23.5 MB

013. 17.12 Performing NTP and NFS Enumeration.mp4

61.8 MB

014. 17.13 Performing SMTP and DNS Enumeration.mp4

80.0 MB

015. 17.14 Conducting Additional Enumeration Techniques.mp4

75.8 MB

/Lesson 18 Hacking Web Servers/

001. Learning objectives.mp4

2.9 MB

002. 18.1 Introducing Web Server Concepts.mp4

26.3 MB

003. 18.2 Exploring Web Server Attacks and Methodologies.mp4

15.8 MB

004. 18.3 Surveying Web Server Attack Tools.mp4

41.7 MB

005. 18.4 Understanding Patch Management.mp4

22.5 MB

006. 18.5 Surveying Web Server Security Tools.mp4

8.4 MB

/Lesson 19 Hacking Web Applications/

001. Learning objectives.mp4

6.5 MB

002. 19.1 Introducing Web Application Concepts.mp4

27.6 MB

003. 19.2 Understanding Web App Threats and Hacking Methodologies.mp4

41.2 MB

004. 19.3 Footprinting Web Infrastructures.mp4

45.9 MB

005. 19.4 Analyzing Web Applications.mp4

24.1 MB

006. 19.5 Introducing the OWASP Top 10.mp4

21.2 MB

007. 19.6 Attacking Authentication, Authorization, and Access Controls - Part 1.mp4

22.0 MB

008. 19.7 Attacking Authentication, Authorization, and Access Controls - Part 2.mp4

46.5 MB

009. 19.8 Performing Command Injection Attacks.mp4

15.0 MB

010. 19.9 Exploiting DirectoryPath Traversal Vulnerabilities.mp4

10.6 MB

011. 19.1 Input Validation and Sanitation.mp4

22.7 MB

012. 19.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities.mp4

47.4 MB

013. 19.12 Exploiting XML External Entities.mp4

20.2 MB

014. 19.13 Attacking Web Services, APIs, and Understanding Webhooks.mp4

47.5 MB

/Lesson 2 Additional Cybersecurity Principles/

001. Learning objectives.mp4

5.6 MB

002. 2.1 Performing Risk Assessment.mp4

23.2 MB

003. 2.2 Comparing Threats, Vulnerabilities, and Exploits.mp4

25.5 MB

004. 2.3 Understanding Authentication, Authorization, and Accounting.mp4

8.0 MB

005. 2.4 Examining the Access Control Process Terminology and Data Classification.mp4

10.3 MB

006. 2.5 Examining the Access Control Process Data States and Policy Roles.mp4

10.5 MB

007. 2.6 Examining the Access Control Process Security and Access Control Classification.mp4

20.6 MB

008. 2.7 Understanding Discretionary Access Control.mp4

9.7 MB

009. 2.8 Understanding Mandatory Access Control.mp4

11.3 MB

010. 2.9 Understanding Role-based Access Control.mp4

8.3 MB

011. 2.10 Understanding Attribute-based Access Control.mp4

6.6 MB

012. 2.11 Understanding Rule-based Access Control.mp4

21.4 MB

013. 2.12 Understanding Time-based Access Control.mp4

8.5 MB

/Lesson 20 SQL Injection/

001. Learning objectives.mp4

3.5 MB

002. 20.1 Introducing SQL Injection Concepts.mp4

21.1 MB

003. 20.2 Understanding the Types of SQL Injection.mp4

12.5 MB

004. 20.3 Exploring the SQL Injection Methodologies.mp4

17.2 MB

005. 20.4 Exploring SQL Injection Tools.mp4

63.3 MB

006. 20.5 Exploring Evasion Techniques.mp4

8.8 MB

007. 20.6 Understanding SQL Injection Countermeasures.mp4

16.6 MB

/Lesson 21 Fundamentals of Wireless Hacking/

001. Learning objectives.mp4

3.2 MB

002. 21.1 Introducing Wireless Concepts.mp4

31.6 MB

003. 21.2 Understanding Wireless Encryption.mp4

62.7 MB

004. 21.3 Exploring Wireless Threats.mp4

79.0 MB

005. 21.4 Understanding Wireless Hacking Methodologies.mp4

21.3 MB

006. 21.5 Surveying Wireless Hacking Tools.mp4

49.6 MB

007. 21.6 Hacking Bluetooth.mp4

52.3 MB

008. 21.7 Introducing Wireless Countermeasures.mp4

37.2 MB

/Lesson 22 Wireless Client Attacks/

001. Learning objectives.mp4

2.9 MB

002. 22.1 Understanding Wireless Client Attacks and Their Motives.mp4

31.7 MB

003. 22.2 Learning Packet Injection Attacks.mp4

4.7 MB

004. 22.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications.mp4

11.4 MB

005. 22.4 Attacking Publicly Secure Packet Forwarding (PSPF).mp4

6.9 MB

006. 22.5 Attacking the Preferred Network List (PNL).mp4

4.8 MB

/Lesson 23 Building Your Lab and Attack Hardware/

001. Learning objectives.mp4

2.3 MB

002. 23.1 Understanding Wireless Antennas.mp4

18.3 MB

003. 23.2 Surveying Wi-Fi Devices Like the Pinneaple.mp4

49.7 MB

004. 23.3 Building Your Own Lab.mp4

29.2 MB

/Lesson 24 Aircrack-ng/

001. Learning objectives.mp4

2.1 MB

002. 24.1 Introducing the Aircrack-ng Suite.mp4

25.8 MB

003. 24.2 Introducing Airmon-ng.mp4

5.4 MB

004. 24.3 Understanding Airodump-ng.mp4

12.4 MB

005. 24.4 Introducing Aireplay-ng.mp4

12.6 MB

006. 24.5 Introducing Airdecap-ng.mp4

6.5 MB

007. 24.6 Introducing Airserv-ng.mp4

11.1 MB

008. 24.7 Introducing Airtun-ng.mp4

7.2 MB

/Lesson 25 Buffer Overflows/

001. Learning objectives.mp4

3.8 MB

002. 25.1 Understanding Buffer Overflows.mp4

23.2 MB

003. 25.2 Exploiting Buffer Overflows.mp4

19.1 MB

004. 25.3 Overcoming Defenses for Buffer Overflow Vulnerabilities.mp4

5.7 MB

005. 25.4 Understanding Fuzzing.mp4

8.1 MB

006. 25.5 Creating a Fuzzing Strategy.mp4

21.0 MB

007. 25.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers.mp4

13.5 MB

008. 25.7 Surveying Tools to Find and Exploit Buffer Overflows.mp4

25.4 MB

/Lesson 26 Post-Exploitation Techniques/

001. Learning objectives.mp4

3.0 MB

002. 26.1 Maintaining Persistence After Compromising a System.mp4

31.8 MB

003. 26.2 Understanding How to Perform Lateral Movement and Pivoting.mp4

13.5 MB

004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp4

6.7 MB

/Lesson 27 Hacking User Credentials/

001. Learning objectives.mp4

3.7 MB

002. 27.1 Understanding Authentication and Authorization Mechanisms.mp4

22.4 MB

003. 27.2 Understanding Authentication and Authorization Attacks.mp4

15.8 MB

004. 27.3 Exploring Password Storage Mechanisms.mp4

7.2 MB

005. 27.4 Understanding Password Storage Vulnerability.mp4

11.4 MB

006. 27.5 Cracking Passwords with John the Ripper.mp4

66.1 MB

007. 27.6 Cracking Passwords with hashcat.mp4

40.9 MB

008. 27.7 Improving Password Security.mp4

8.3 MB

/Lesson 28 Reporting and Communication/

001. Learning objectives.mp4

3.0 MB

002. 28.1 Surveying Report Writing and Handling Best Practices.mp4

14.7 MB

003. 28.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp4

9.0 MB

004. 28.3 Explaining the Importance of Appropriate Communication.mp4

30.2 MB

/Lesson 29 Hacking Mobile Platforms/

001. Learning objectives.mp4

2.7 MB

002. 29.1 Understanding Mobile Platform Attack Vectors.mp4

73.4 MB

003. 29.2 Hacking iOS.mp4

86.6 MB

004. 29.3 Hacking Android OS.mp4

63.8 MB

005. 29.4 Understanding Mobile Device Management.mp4

37.8 MB

006. 29.5 Surveying Mobile Security Guidelines and Tools.mp4

11.4 MB

/Lesson 3 Types of Attacks and Vulnerabilities/

001. Learning objectives.mp4

8.3 MB

002. 3.1 Surveying Types of Vulnerabilities.mp4

35.9 MB

003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp4

28.5 MB

004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4

30.9 MB

005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp4

4.7 MB

006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp4

12.5 MB

007. 3.6 Understanding Denial of Service Attacks.mp4

10.3 MB

008. 3.7 Surveying Attack Methods for Data Exfiltration.mp4

7.3 MB

009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4

15.2 MB

010. 3.9 Understanding Password Attacks.mp4

13.0 MB

011. 3.10 Understanding Wireless Attacks.mp4

10.7 MB

012. 3.11 Exploring Security Evasion Techniques.mp4

18.5 MB

013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp4

23.2 MB

014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp4

5.6 MB

015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp4

27.6 MB

/Lesson 30 Mobile Device Security/

001. Learning objectives.mp4

2.6 MB

002. 30.1 Understanding OWASP Mobile Device Vulnerabilities.mp4

19.1 MB

003. 30.2 Wrestling with the BYOD Dilemma.mp4

25.7 MB

004. 30.3 Understanding Mobile Device Management (MDM).mp4

27.7 MB

005. 30.4 Understanding Mobile Device Security Policies.mp4

21.3 MB

/Lesson 31 Fundamentals of Android Security/

001. Learning objectives.mp4

2.5 MB

002. 31.1 Hacking Android Devices.mp4

44.6 MB

003. 31.2 Exploring Android Emulators and SDK.mp4

10.8 MB

004. 31.3 Understanding Android Hacking Tools and Methodologies.mp4

50.8 MB

/Lesson 32 Hacking iOS Devices/

001. Learning objectives.mp4

2.0 MB

002. 32.1 Introducing iOS Security.mp4

4.5 MB

003. 32.2 Exploring Jailbraking iOS.mp4

7.0 MB

004. 32.3 Surveying Tools for Disassembling iOS Applications.mp4

5.0 MB

/Lesson 33 Fundamentals of IoT Security/

001. Learning objectives.mp4

3.9 MB

002. 33.1 Introducing IoT Concepts.mp4

74.4 MB

003. 33.2 Understanding IoT Attacks.mp4

76.8 MB

004. 33.3 Understanding IoT Hacking Methodologies.mp4

29.8 MB

005. 33.4 Surveying IoT Hacking Tools.mp4

39.9 MB

006. 33.5 Understanding IoT Countermeasures.mp4

36.2 MB

007. 33.6 Introducing OT Concepts.mp4

44.7 MB

008. 33.7 Performing OT Attacks.mp4

32.8 MB

009. 33.8 Understanding OT Hacking Methodologies.mp4

23.3 MB

010. 33.9 Surveying OT Hacking Tools.mp4

37.5 MB

011. 33.10 Understanding OT Countermeasures.mp4

48.8 MB

/Lesson 34 Hacking IoT Devices/

001. Learning objectives.mp4

2.5 MB

002. 34.1 Surveying Tools for Dissasembling iOS Applications.mp4

50.7 MB

003. 34.2 Exploring ZigBee and IEEE 802.15.4.mp4

11.7 MB

004. 34.3 Exploring INSTEON.mp4

10.0 MB

005. 34.4 Exploring ZWave.mp4

38.1 MB

006. 34.5 Exploring LoRA.mp4

13.3 MB

/Lesson 35 Attacking Bluetooth/

001. Learning objectives.mp4

1.6 MB

002. 35.1 Attacking Bluetooth.mp4

4.4 MB

003. 35.2 Surveying Tools for Bluetooth Monitoring.mp4

25.2 MB

/Lesson 36 Attacking NFC/

001. Learning ojectives.mp4

1.8 MB

002. 36.1 Understanding NFC Vulnerabilities.mp4

7.2 MB

003. 36.2 Exploring NFC Attacks and Case Studies.mp4

14.0 MB

/Lesson 37 Understanding Cloud Security/

001. Learning objectives.mp4

5.6 MB

002. 37.1 Introducing Cloud Computing Concepts.mp4

30.6 MB

003. 37.2 Exploring Container Technology.mp4

20.9 MB

004. 37.3 Understanding Serverless Computing.mp4

3.9 MB

005. 37.4 Surveying Cloud Computing Threats.mp4

20.6 MB

006. 37.5 Understanding Cloud Hacking and Cloud Security Implementations.mp4

20.6 MB

007. 37.6 Introducing the Different Cloud Deployment and Service Models.mp4

11.8 MB

008. 37.7 Surveying Patch Management in the Cloud.mp4

8.5 MB

009. 37.8 Performing Security Assessments in Cloud Environments.mp4

11.9 MB

010. 37.9 Introducing Agile, DevOps, and CICD Pipelines.mp4

22.5 MB

011. 37.10 Understanding Container Orchestration and an Introduction to Kubernetes.mp4

5.7 MB

012. 37.11 Exploring the Concepts of DevSecOps.mp4

13.0 MB

/Lesson 38 Understanding Social Engineering Countermeasures/

001. Learning objectives.mp4

3.4 MB

002. 38.1 Introducing Social Engineering Concepts.mp4

15.2 MB

003. 38.2 Exploring Social Engineering Techniques.mp4

24.6 MB

004. 38.3 Understanding the Insider Threat.mp4

10.1 MB

005. 38.4 Impersonation on Social Networking Sites.mp4

22.4 MB

006. 38.5 Understanding Identity Theft.mp4

14.6 MB

007. 38.6 Understanding Social Engineering Countermeasures.mp4

9.3 MB

/Lesson 4 Fundamentals of Cryptography and PKI/

001. Learning objectives.mp4

3.9 MB

002. 4.1 Understanding the Basic Components of Cryptography.mp4

31.8 MB

003. 4.2 Introducing Public Key Infrastructure.mp4

20.8 MB

004. 4.3 Deciphering Encryption Algorithms.mp4

18.3 MB

005. 4.4 Understanding Hashing Algorithms.mp4

36.3 MB

006. 4.5 Examining Secure Socket Layer and Transport Layer Security.mp4

23.1 MB

007. 4.6 Examining Digital Certificates.mp4

40.9 MB

/Lesson 5 Fundamentals of Incident Response/

001. Learning objectives.mp4

3.9 MB

002. 5.1 Describing Concepts as Documented in NIST.SP800-86.mp4

46.3 MB

003. 5.2 Mapping the Organization Stakeholders Against the NIST IR Categories.mp4

37.9 MB

004. 5.3 Scoping the Incident Response Plan and Process.mp4

43.7 MB

005. 5.4 Understanding Information Sharing and Coordination.mp4

10.2 MB

006. 5.5 Identifying the Incident Response Team Structure.mp4

4.6 MB

007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4

68.5 MB

008. 5.7 Analyzing Product Security Incident Response Teams (PSIRTs).mp4

36.3 MB

009. 5.8 Surveying Coordination Centers.mp4

17.3 MB

010. 5.9 Analyzing Managed Security Service Providers Incident Response Teams.mp4

11.0 MB

011. 5.10 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS).mp4

8.8 MB

012. 5.11 Applying the VERIS Schema to Incident Handling.mp4

19.1 MB

013. 5.12 Surveying the VERIS Incident Recording Tool and Other Resources.mp4

5.5 MB

/Lesson 6 Fundamentals of Security Monitoring/

001. Learning objectives.mp4

5.4 MB

002. 6.1 Describing Endpoint-based Attacks.mp4

35.0 MB

003. 6.2 Understanding Data Normalization.mp4

7.9 MB

004. 6.3 Deconstructing Universal Data Formats.mp4

10.7 MB

005. 6.4 Understanding the 5-tuple Correlation.mp4

5.8 MB

006. 6.5 Performing DNS Analysis.mp4

5.5 MB

007. 6.6 Performing Web Log Analysis.mp4

16.4 MB

008. 6.7 Performing Deterministic and Probabilistic Analysis.mp4

6.4 MB

009. 6.8 Understanding Security Monitoring Fundamentals.mp4

7.8 MB

010. 6.9 Surveying Security Monitoring Tools.mp4

7.4 MB

011. 6.10 Grasping Security Monitoring Operational Challenges.mp4

36.8 MB

/Lesson 7 Intrusion Event Categories/

001. Learning objectives.mp4

6.2 MB

002. 7.1 Identifying and Mitigating Reconnaissance.mp4

25.2 MB

003. 7.2 Identifying and Mitigating Weaponization.mp4

11.2 MB

004. 7.3 Identifying and Mitigating Delivery.mp4

7.6 MB

005. 7.4 Identifying and Mitigating Exploitation.mp4

3.3 MB

006. 7.5 Identifying and Mitigating Installation.mp4

9.5 MB

007. 7.6 Identifying and Mitigating Command and Control.mp4

5.3 MB

008. 7.7 Understanding Action on Objectives.mp4

6.4 MB

009. 7.8 Understanding the MITRE ATT&CK Framework.mp4

65.8 MB

/Lesson 8 Digital Forensics Fundamentals/

001. Learning objectives.mp4

2.8 MB

002. 8.1 Examining Types of Evidence.mp4

21.9 MB

003. 8.2 Understanding Chain of Custody.mp4

18.5 MB

004. 8.3 Understanding Evidence Collection.mp4

57.2 MB

005. 8.4 Handling Evidence.mp4

16.6 MB

006. 8.5 Examining Asset and Threat Actor Attribution.mp4

14.6 MB

/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/

001. Learning objectives.mp4

5.3 MB

002. 9.1 Examining Host-based Intrusion Detection.mp4

9.1 MB

003. 9.2 Exploring Antimalware and Antivirus.mp4

15.8 MB

004. 9.3 Understanding Host-based Firewalls.mp4

13.5 MB

005. 9.4 Exploring Application-level AllowListsBlockLists.mp4

5.7 MB

006. 9.5 Exploring Systems-based Sandboxing.mp4

16.2 MB

007. 9.6 Understanding Windows Forensics Basics.mp4

39.0 MB

008. 9.7 Surveying Windows Forensics Application Processes.mp4

11.1 MB

009. 9.8 Surveying Windows Forensics Memory.mp4

17.0 MB

010. 9.9 Surveying Windows Forensics The Windows Registry.mp4

21.0 MB

011. 9.10 Surveying Windows Forensics Hard Drives, FAT, and NTFS.mp4

24.1 MB

012. 9.11 Understanding Linux and MAC OS X Forensics Basics.mp4

34.8 MB

013. 9.12 Examining Web Server Logs.mp4

21.9 MB

/Module 1 Security Concepts/

001. Module introduction.mp4

3.0 MB

/Module 2 Security Operations, Incident Response, and Digital Forensics/

001. Module introduction.mp4

4.5 MB

/Module 3 Security Operations, Incident Response, and Digital Forensics/

001. Module introduction.mp4

6.2 MB

/Module 4 Fundamentals of Ethical Hacking and Penetration Testing/

001. Module introduction.mp4

9.6 MB

/Module 5 Mobile Device Security/

001. Module introduction.mp4

2.5 MB

/Module 6 Internet of Things (IoT) Security/

001. Module introduction.mp4

2.4 MB

/Module 7 Cloud Security Fundamentals/

001. Module introduction.mp4

3.3 MB

/Module 8 Social Engineering Fundamentals/

001. Module introduction.mp4

3.4 MB

/Summary/

001. The Complete Cybersecurity Bootcamp Summary.mp4

7.3 MB

 

Total files 340


Copyright © 2024 FileMood.com