FileMood

Download ITPT79

ITPT79

Name

ITPT79

 DOWNLOAD Copy Link

Total Size

35.7 GB

Total Files

72

Hash

58240F98B08C4010E30318AEB2F8ED8AC3EA4916

/

1.1 - Intelligence Sources.mp4

433.6 MB

1.21 - Indicator Management.mp4

410.3 MB

1.31 - Confidence Levels.mp4

194.7 MB

1.41 - Threat Classification.mp4

577.7 MB

1.51 - Threat Actors.mp4

763.6 MB

1.61 - Intelligence Cycle.mp4

546.9 MB

1.71 - Commodity Malware.mp4

359.5 MB

1.81 - Information Sharing and Analysis Centers.mp4

476.1 MB

1.91 - Attack Frameworks.mp4

424.4 MB

1.92 - Threat Research.mp4

572.0 MB

1.93 - Threat Modeling Methodologies.mp4

554.9 MB

1.941 - Threat Intelligence Sharing, Supported Functions.mp4

408.3 MB

1.95 - Vulnerability Identification and Validation.mp4

610.5 MB

1.96 - Vulnerability Remediation and Mitigation.mp4

640.8 MB

1.97 - Vulnerability Scanning Parameters and Criteria.mp4

543.7 MB

1.98 - Inhibitors to Remediation.mp4

595.1 MB

1.99 - Web App Scanners.mp4

390.9 MB

1.991 - Infrastructure Vulnerability Scanners.mp4

333.3 MB

1.992 - Software Assessment Tools and Techniques.mp4

459.4 MB

1.993 - Vulnerability Enumeration.mp4

308.7 MB

1.994 - Wireless Assessment Tools.mp4

416.9 MB

1.9951 - Cloud Infrastructure Assessment Tools.mp4

334.6 MB

1.996 - Mobile Technology Threats.mp4

520.1 MB

1.997 - Premises and Vehicle Systems Threats.mp4

528.2 MB

1.998 - Controller System Threats.mp4

508.7 MB

1.999 - IoT and Embedded System Threats.mp4

513.4 MB

1.9991 - CVSS Metrics.mp4

331.4 MB

1.9993 - Cloud Deployment Model Threats.mp4

594.7 MB

1.9994 - Cloud Service Model Threats.mp4

604.9 MB

1.99941 - Other Cloud Service Threats.mp4

440.9 MB

1.9995 - Mitigate Specific Attack Types.mp4

407.9 MB

1.9997 - Mitigate Vulnerability Types.mp4

625.8 MB

2.11 - Asset Tagging and Change Management.mp4

514.1 MB

2.21 - Network Architecture and Segmentation.mp4

772.5 MB

2.31 - Identity and Access Management.mp4

742.3 MB

2.41 - Virtual Desktop Infrastructure, Containerization.mp4

361.9 MB

2.51 - Honeypots and Active Defense.mp4

464.1 MB

2.61 - Cloud Access Security Broker.mp4

289.7 MB

2.71 - Certificate Management.mp4

390.5 MB

2.81 - Hardware Assurance.mp4

676.0 MB

2.91 - Software Assurance and Secure Coding.mp4

654.5 MB

3.11 - Trend Analysis.mp4

587.8 MB

3.21 - URL Analysis.mp4

405.6 MB

3.31 - DNS Analysis.mp4

394.6 MB

3.41 - Packet and Protocol Analysis.mp4

263.7 MB

3.51 - Flow Analysis.mp4

460.7 MB

3.61 - Endpoint Behavior Analysis.mp4

562.9 MB

3.71 - Malware Analysis.mp4

415.3 MB

3.81 - Log Review.mp4

556.2 MB

3.91 - Impact Analysis.mp4

407.0 MB

3.921 - SIEM Review.mp4

406.4 MB

3.931 - Email Analysis.mp4

607.1 MB

3.941 - File System Permissions.mp4

374.0 MB

3.951 - Blacklisting and Whitelisting.mp4

499.6 MB

3.961 - Firewall Configurations.mp4

473.8 MB

3.971 - Data Loss Prevention.mp4

516.0 MB

3.981 - Network Access Control.mp4

414.5 MB

3.991 - Blackholes and Sinkholes.mp4

396.2 MB

3.9911 - Malware Signatures.mp4

345.0 MB

3.9921 - Threat Hunting.mp4

489.4 MB

3.9931 - Scripting.mp4

399.9 MB

3.9941 - AI and Machine Learning.mp4

425.5 MB

3.9951 - Continuous Integration and Deployment.mp4

388.3 MB

4.11 - Incident Response Communication.mp4

591.9 MB

4.21 - Incident Response Phases.mp4

621.5 MB

4.31 - Indicators of Compromise.mp4

481.2 MB

4.41 - Digital Forensics.mp4

639.8 MB

5.11 - Privacy vs. Security.mp4

199.2 MB

5.12 - Non-Technical Controls - The Basics.mp4

786.6 MB

5.13 - Non-Technical Controls - The Rest.mp4

765.6 MB

5.14 - Technical Controls - The Basics.mp4

890.1 MB

5.15 - Technical Controls - The Rest.mp4

642.6 MB

 

Total files 72


Copyright © 2024 FileMood.com