FileMood

Download Lynda - CySAPlus Cert Prep - 3 Cyber Incident Response

Lynda CySAPlus Cert Prep Cyber Incident Response

Name

Lynda - CySAPlus Cert Prep - 3 Cyber Incident Response

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

333.0 MB

Total Files

70

Hash

EB0430E8C96F91910DC1770707E35CAE73112D16

/5.4. Forensic Investigations/

28.Password forensics.mp4

25.1 MB

21.Conducting investigations.en.srt

8.8 KB

21.Conducting investigations.mp4

13.0 MB

22.Evidence types.en.srt

6.9 KB

22.Evidence types.mp4

9.2 MB

23.Introduction to forensics.en.srt

7.2 KB

23.Introduction to forensics.mp4

9.2 MB

24.System and file forensics.en.srt

7.7 KB

24.System and file forensics.mp4

12.4 MB

25.Creating forensic images.en.srt

10.0 KB

25.Creating forensic images.mp4

14.5 MB

26.Digital forensics toolkit.en.srt

5.7 KB

26.Digital forensics toolkit.mp4

9.4 MB

27.Operating system analysis.en.srt

11.8 KB

27.Operating system analysis.mp4

19.6 MB

28.Password forensics.en.srt

13.4 KB

29.Network forensics.en.srt

7.8 KB

29.Network forensics.mp4

13.4 MB

30.Software forensics.en.srt

6.2 KB

30.Software forensics.mp4

11.9 MB

31.Mobile device forensics.en.srt

2.8 KB

31.Mobile device forensics.mp4

4.0 MB

32.Embedded device forensics.en.srt

5.1 KB

32.Embedded device forensics.mp4

9.5 MB

33.Chain of custody.en.srt

4.0 KB

33.Chain of custody.mp4

6.2 MB

34.Ediscovery and evidence production.en.srt

6.2 KB

34.Ediscovery and evidence production.mp4

9.9 MB

/1.Introduction/

01.Welcome.mp4

12.2 MB

02.What you need to know.en.srt

1.3 KB

02.What you need to know.mp4

2.0 MB

01.Welcome.en.srt

6.1 KB

/2.1. Assessing Incidents/

03.Identifying and classifying security incidents.en.srt

5.9 KB

03.Identifying and classifying security incidents.mp4

8.4 MB

04.Threat classification.en.srt

7.4 KB

04.Threat classification.mp4

9.4 MB

05.Zero days and the advanced persistent threat.en.srt

6.1 KB

05.Zero days and the advanced persistent threat.mp4

8.9 MB

06.Determining incident severity.en.srt

6.2 KB

06.Determining incident severity.mp4

8.5 MB

/3.2. Incident Response Process/

07.Build an incident response program.en.srt

8.1 KB

07.Build an incident response program.mp4

15.3 MB

08.Incident communications plan.en.srt

5.1 KB

08.Incident communications plan.mp4

6.2 MB

09.Incident identification.en.srt

7.3 KB

09.Incident identification.mp4

9.6 MB

10.Escalation and notification.en.srt

4.8 KB

10.Escalation and notification.mp4

6.8 MB

11.Mitigation.en.srt

4.9 KB

11.Mitigation.mp4

6.4 MB

12.Containment techniques.en.srt

6.1 KB

12.Containment techniques.mp4

8.2 MB

13.Incident eradication and recovery.en.srt

8.3 KB

13.Incident eradication and recovery.mp4

12.0 MB

14.Validation.en.srt

4.3 KB

14.Validation.mp4

5.7 MB

15.Lessons learned and reporting.en.srt

6.1 KB

15.Lessons learned and reporting.mp4

8.0 MB

16.Creating an incident response team.en.srt

3.8 KB

16.Creating an incident response team.mp4

5.1 MB

/4.3. Incident Symptoms/

17.Network symptoms.en.srt

7.4 KB

17.Network symptoms.mp4

8.5 MB

18.Rogue access points and evil twins.en.srt

5.9 KB

18.Rogue access points and evil twins.mp4

8.1 MB

19.Endpoint symptoms.en.srt

4.7 KB

19.Endpoint symptoms.mp4

7.9 MB

20.Application symptoms.en.srt

4.2 KB

20.Application symptoms.mp4

6.2 MB

/6.Next Steps/

35.Next steps.en.srt

1.4 KB

35.Next steps.mp4

1.9 MB

 

Total files 70


Copyright © 2025 FileMood.com