FileMood

Download ITPT78

ITPT78

Name

ITPT78

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

31.9 GB

Total Files

55

Hash

F0E27BE9646E60D2B42328ACB14F8A4451F0A78F

/

0 - Overview.mp4

119.0 MB

1.11 - Reconnaissance: Tools.mp4

430.0 MB

1.12 - Reconnaissance: Tools Part 2.mp4

453.6 MB

1.13 - Reconnaissance: Tools Part 3.mp4

258.1 MB

1.14 - Reconnaissance: Tools Part 4.mp4

518.1 MB

1.21 - Reconnaissance: Techniques.mp4

379.0 MB

1.22 - Reconnaissance: Techniques Part 2.mp4

462.8 MB

1.23 - Reconnaissance: Techniques Part 3.mp4

468.1 MB

1.24 - Reconnaissance: Techniques Part 4.mp4

528.5 MB

1.31 - Data Correlation and Analytics.mp4

624.2 MB

1.41 - Reconnaissance: Interpreting Results.mp4

595.9 MB

1.51 - Countermeasures: Network Segmentation.mp4

524.8 MB

1.61 - Countermeasures: Honeypots and Sinkholes.mp4

521.6 MB

1.71 - Countermeasures: System Hardening and NAC.mp4

684.5 MB

1.81 - Security Practices: Penetration Testing.mp4

761.0 MB

1.91 - Security Practices: Reverse Engineering.mp4

596.2 MB

1.92 - Security Practices: Training and Risk Evaluation.mp4

589.2 MB

2.11 - Vulnerability Management Process.mp4

491.7 MB

2.21 - Vulnerability Management: Scan Configuration.mp4

705.6 MB

2.31 - Vulnerability Management CVSS.mp4

568.7 MB

2.32 - Vulnerability Management: CVSS Part 2.mp4

441.5 MB

2.41 - Vulnerability Management: Remediation.mp4

707.0 MB

2.51 - Scan Results Verification.mp4

582.5 MB

2.61 - Common Vulnerabilities.mp4

640.2 MB

2.62 - Common Vulnerabilities Part 2.mp4

738.2 MB

2.63 - Common Vulnerabilities Part 3.mp4

560.6 MB

2.64 - Common Vulnerabilities Part 4.mp4

593.5 MB

2.65 - Common Vulnerabilities Part 5.mp4

766.3 MB

3.11 - Threat Classification.mp4

654.5 MB

3.21 - Severity and Prioritization.mp4

457.6 MB

3.31 - Forensics Toolkit.mp4

589.3 MB

3.41 - Incident Response Plan.mp4

654.8 MB

3.51 - Forensic Suites and Utilities.mp4

443.1 MB

3.52 - Forensic Suites and Utilities Part 2.mp4

480.8 MB

3.53 - Forensic Suites and Utilities Part 3.mp4

395.6 MB

3.54 - Forensic Suites and Utilities Part 4.mp4

594.8 MB

3.61 - CSIRT Roles and Communication.mp4

577.1 MB

3.71 - Indicator of Compromise: Network Symptoms.mp4

703.1 MB

3.81 - Indicators of Compromise: Host and App Symptoms.mp4

517.1 MB

3.91 - Recovery and Post-Incident Response.mp4

669.4 MB

3.92 - Recovery and Post-Incident Response Part 2.mp4

682.9 MB

4.11 - Cybersecurity Frameworks.mp4

471.2 MB

4.12 - Cybersecurity Frameworks Part 2.mp4

568.2 MB

4.21 - Policies, Controls and Procedures.mp4

873.2 MB

4.22 - Policies, Controls and Procedures Part 2.mp4

920.7 MB

4.31 - Identity and Access Managemnt.mp4

723.6 MB

4.32 - Identity and Access Management Part 2.mp4

905.4 MB

4.41 - Compensating Controls and Architecture.mp4

518.0 MB

4.42 - Compensating Controls and Architecture Part 2.mp4

711.1 MB

4.43 - Compensating Controls and Architecture Part 3.mp4

689.2 MB

4.51 - Security Tools and Technologies.mp4

541.4 MB

4.52 - Security Tools and Technologies Part 2.mp4

556.6 MB

4.53 - Security Tools and Technologies Part 3.mp4

565.9 MB

4.61 - Software Development Security.mp4

666.0 MB

4.62 - Software Development Security Part 2.mp4

427.5 MB

 

Total files 55


Copyright © 2025 FileMood.com