FileMood

Download Pdf

Pdf

Name

Pdf

 DOWNLOAD Copy Link

Total Size

11.5 GB

Total Files

356

Hash

B081AE0EFAD80D1CDE8F705AD5B3AB42D5C55CD2

/text/2008/

SANS Audit 507.1 Audit Principles, Risk Assessment & Effective Reporting (2008).pdf

20.3 MB

SANS Audit 507.2 Auditing the Perimeter (2008).pdf

16.0 MB

SANS Audit 507.3 Network Auditing Essentials (2008).pdf

20.9 MB

SANS Audit 507.4 Web Application Auditing (2008).pdf

17.2 MB

SANS Audit 507.5 Advanced Windows Auditing (2008).pdf

12.0 MB

SANS Audit 507.6 Auditing Unix Systems (2008).pdf

10.6 MB

/text/2016/

507.1.pdf

32.8 MB

507.2.pdf

30.0 MB

507.3.pdf

32.4 MB

507.4.pdf

39.8 MB

507.5.pdf

33.8 MB

Active Directory Cheat Sheet.pdf

344.2 KB

Active Directory Cheat Sheet_1.pdf

298.3 KB

AUD 507 Tools Quickreference.pdf

1.0 MB

AUD 507 Workbook.pdf

53.8 MB

IOS IPv4 Access Lists.pdf

443.3 KB

regularexpressions.pdf

370.7 KB

Web Application Audit Checklist.pdf

402.4 KB

/text/2011/

SANS 408.1-v2011_0208.pdf

66.9 MB

SANS 408.2-v2011_0208.pdf

59.3 MB

SANS 408.3-408.6-v2011_0208.pdf

205.4 MB

/text/2014/

SANS408-1.pdf

64.3 MB

SANS408-2-3.pdf

15.9 MB

SANS408-4-6.pdf

32.0 MB

SANS408-ExerciseWorkbook.pdf

25.2 MB

/text/2017/

500.1-2.pdf

52.5 MB

500.3-4.pdf

62.2 MB

500.5.pdf

63.6 MB

500.Workbook.pdf

78.2 MB

/text/2015/

508.1.pdf

14.5 MB

508.2.pdf

14.1 MB

508.3.pdf

8.9 MB

508.4-5.pdf

21.3 MB

508.Workbook.pdf

15.6 MB

/text/2016/

508.1.pdf

8.3 MB

508.2.pdf

13.9 MB

508.3-4.pdf

17.8 MB

508.5.pdf

11.2 MB

508.6.pdf

15.7 MB

/text/2015/

FOR518.1.pdf

9.5 MB

FOR518.2.pdf

9.9 MB

FOR518.3.pdf

9.1 MB

FOR518.4.pdf

11.7 MB

FOR518.5.pdf

10.6 MB

FOR518.WB.pdf

15.0 MB

/text/2013/

FOR526.1 UnStructured_Memory_Analysis_2013.pdf

25.9 MB

FOR526.2 Windows_Memory_Internals_2013.pdf

21.8 MB

FOR526.3 User_Visible_Objects_2013_rev1.pdf

21.3 MB

FOR526.4 Internal_Structures_2013.pdf

15.3 MB

FOR526.5 Windows_Memory_Forensics_2013.pdf

26.8 MB

FOR526_20131006_OnDemand_Release_Notes_Rev131028.pdf

528.5 KB

FOR526_HANDOUT_APT-ANSWERS.pdf

407.6 KB

FOR526_HANDOUT_Cheatsheet.pdf

149.5 KB

FOR526_Workbook_2013.pdf

3.5 MB

/text/2015/

FOR526.1.pdf

24.7 MB

FOR526.2.pdf

35.0 MB

FOR526.3.pdf

27.5 MB

FOR526.4-5.pdf

38.3 MB

FOR526.Workbook.pdf

26.5 MB

/text/2014/

FOR 572.1 - Off the Disk and Onto the Wire.pdf

33.9 MB

FOR 572.2 - NetFlow Analysis, Commercial Tools.pdf

18.4 MB

FOR 572.3 - Network Protocols and Wireless Investigations.pdf

24.6 MB

FOR 572.4 - Logging, OPSEC, and Footprint.pdf

18.9 MB

FOR 572.5 Encryption, Protocol Reversing and Automation.pdf

17.7 MB

/text/2017/

FOR572.1.pdf

159.7 MB

FOR572.2.pdf

95.7 MB

FOR572.3.pdf

48.2 MB

FOR572.4.pdf

50.9 MB

FOR572.5.pdf

42.7 MB

FOR572.6 Workbook.pdf

101.9 MB

/text/2017/

FOR585. Workbook.pdf

80.4 MB

FOR585.1 Malware Forensics, Smartphone Overview, and SQLite Introduction.pdf

78.1 MB

FOR585.2 Android Forensics.pdf

55.9 MB

FOR585.3 Android Backups and iOS Device Forensics.pdf

60.5 MB

FOR585.4 iOS Backups, Windows, and BlackBerry 10 Forensics.pdf

53.8 MB

FOR585.5 Third-Party Application and Knock-Off Forensics.pdf

62.0 MB

/text/2010/

SANS 610.1.pdf

32.4 MB

SANS 610.2.pdf

11.1 MB

SANS 610.3.pdf

16.1 MB

SANS 610.4.pdf

13.7 MB

SANS 610.5.pdf

15.9 MB

/text/2015/

SANS 610 Day1.pdf

32.4 MB

SANS 610 Day2.pdf

38.9 MB

SANS 610 Day3.pdf

43.1 MB

SANS 610 Day4.pdf

31.2 MB

SANS 610 Day5.pdf

36.5 MB

SANS 610 WorkBook.pdf

39.3 MB

/text/2016/

410.1.pdf

2.1 MB

410.2.pdf

2.2 MB

410.3.pdf

2.6 MB

410.4.pdf

2.7 MB

410.5.pdf

2.5 MB

/text/2011/

day1.pdf

147.7 MB

day2.pdf

108.5 MB

day3.pdf

128.2 MB

day4.pdf

126.3 MB

/text/2016/

MGT514.1 - Strategic Planning Foundations.pdf

13.7 MB

MGT514.2 - Strategic Roadmap Development.pdf

60.9 MB

MGT514.3 - Security Policy Development and Assessment.pdf

49.7 MB

MGT514.4 - Leadership and Management Competencies.pdf

62.1 MB

MGT514.5 - Strategic Planning Workshop.pdf

38.6 MB

/text/2010/

SEC517c2.pdf

62.5 MB

/.../Section 1.0 - Security Essentials Introduction/

SANS Security Essentials Introduction.pdf

35.8 KB

/Text/2011/

401.1 Networking Concepts.pdf

78.6 MB

401.2 Defense in Depth.pdf

58.3 MB

401.3 Internet SecurityTechnologies.pdf

55.3 MB

401.4 Secure Communications.pdf

62.8 MB

401.5 Windows Security.pdf

70.9 MB

401.6 Linux Security.pdf

29.2 MB

/Text/2016/

401-1-Network Conepts.pdf

57.6 MB

401-2-Defense In-Depth.pdf

53.9 MB

401-3-Internet Security Tech.pdf

61.4 MB

401-4-Secure Communications.pdf

56.1 MB

401-5-Windows Sec.pdf

87.7 MB

401-6-Unix-Linux Sec.pdf

50.2 MB

/Text/2016/

SANS SEC501.1 Defensive Network Infrastructure.pdf

12.1 MB

SANS SEC501.2 Packet Analysis.pdf

11.4 MB

SANS SEC501.3 Pentest.pdf

11.6 MB

SANS SEC501.4 First Responder.pdf

11.5 MB

SANS SEC501.5 Malware.pdf

30.2 MB

SANS SEC501.6 Data Loss Prevention.pdf

9.7 MB

/Text/2003/

3.1.1 - TCP.IP Refresher.pdf

1.7 MB

3.1.2 - IP Behavior I - Fragmentation.pdf

1.3 MB

3.1.3 - IP Behavior II - ICMP.pdf

1.6 MB

3.1.4 - IP Behavior III - Stimulus and Response.pdf

1.6 MB

3.1.5 - IP Behavior IV - Microsoft Networking.pdf

1.5 MB

3.1.6 - IP Behavior V - DNS.pdf

2.0 MB

3.1.7 - IP Routing.pdf

1.6 MB

3.1.8 - IPSec.pdf

1.7 MB

3.2.0 - Reference Material.pdf

140.5 KB

3.2.0 - tcpdump Exercises.pdf

1.7 MB

3.2.1 - Introduction to tcpdump.pdf

1.7 MB

3.2.2 - Writing tcpdump Filters.pdf

560.8 KB

3.2.3 - Examination of Datagram Fields I.pdf

728.1 KB

3.2.4 - Examination of Datagram Fields II.pdf

710.1 KB

3.2.5 - Examination of Datagram Fields III.pdf

1.2 MB

3.2.6 - Beginning Analysis.pdf

1.1 MB

3.2.7 - Real World Examples.pdf

1.1 MB

3.2.8 - Advanced Analysis.pdf

1.1 MB

3.2.9 - Appendix - Hexidecimal Refresher.pdf

472.4 KB

3.3.0 - Snort Exercises.pdf

1.1 MB

3.3.1 - Snort I.pdf

727.6 KB

3.3.2 - Snort II.pdf

346.7 KB

3.3.3 - Snort III.pdf

980.8 KB

3.3.4 - Snort IV.pdf

899.6 KB

3.3.5 - Snort V.pdf

396.7 KB

3.3.6 - Snort VI.pdf

925.8 KB

3.4.1 - Terminology and Firewalls.pdf

842.7 KB

3.4.10 - Network Mapping and Information Gathering.pdf

1.3 MB

3.4.11 - Coordinated Attacks and Correlation.pdf

871.6 KB

3.4.12 - Appendix - Log File Analysis Intro.pdf

1.9 MB

3.4.2 - Interoperability and Signatures.pdf

984.5 KB

3.4.3 - SYN Floods and TCP Sequence Numbers.pdf

873.1 KB

3.4.4 - Basic Analysis.pdf

1.2 MB

3.4.5 - Indications and Warnings.pdf

1.2 MB

3.4.6 - Traffic Analysis I.pdf

764.0 KB

3.4.7 - Traffic Analysis II.pdf

1.2 MB

3.4.8 - Intrusion Detection Patterns I.pdf

1.4 MB

3.4.9 - Intrusion Detection Patterns II.pdf

737.1 KB

/Text/2010/

503.1.pdf

25.5 MB

503.2-503.3.pdf

39.4 MB

503.4.pdf

19.2 MB

503.5-503.6.pdf

46.4 MB

workbook.pdf

25.7 MB

/Text/2015/

503.1.pdf

92.0 MB

503.2.pdf

101.6 MB

503.3.pdf

103.4 MB

503.4.pdf

111.5 MB

503.5.pdf

156.0 MB

503.6.pdf

23.8 MB

/text/2010/

SANS Security 504.1.pdf

12.3 MB

SANS Security 504.2.pdf

9.7 MB

SANS Security 504.3.pdf

10.2 MB

SANS Security 504.4.pdf

9.3 MB

SANS Security 504.5.pdf

13.3 MB

SANS Security 504.6.pdf

2.2 MB

/text/2016/

SANS504.1.pdf

42.2 MB

SANS504.2.pdf

14.0 MB

SANS504.3.pdf

16.2 MB

SANS504.4.pdf

15.9 MB

SANS504.5.pdf

17.8 MB

SANS504.6.pdf

3.6 MB

/text/2010/

SANS Security 505.1 Securing Active Directory & DNS (2010).pdf

8.3 MB

SANS Security 505.2 Enforcing Critical Controls with Group Policy (2010).pdf

7.8 MB

SANS Security 505.3 Windows PKI, EFS & Bitlocker (2010).pdf

8.0 MB

SANS Security 505.4 Windows Firewalls, IPSec, Wireless & VPN's (2010).pdf

11.6 MB

SANS Security 505.5 Securing IIS 7.0 (2010).pdf

10.5 MB

SANS Security 505.6 Windows PowerShell (2010).pdf

17.5 MB

/text/2017/

SEC505.1 PowerShell Automation and Security.pdf

92.4 MB

SEC505.2 Continuous Secure Configuration Enforcement.pdf

89.8 MB

SEC505.3 Windows PKI and Smart Cards.pdf

74.9 MB

SEC505.4 Administrative Compromise and Privilege Management.pdf

88.0 MB

SEC505.5 Endpoint Protection and Pre-Forensics.pdf

76.7 MB

SEC505.6 Defensible Networking and Blue Team WMI.pdf

82.9 MB

/text/2000/

SANS Securing Linux.pdf

2.4 MB

/text/2009/

SEC506.1.pdf

36.0 MB

SEC506.2.pdf

39.0 MB

SEC506.3.pdf

47.3 MB

SEC506.4&5.pdf

56.4 MB

SEC506.6.pdf

37.1 MB

/text/2017/

SEC506.1-3.pdf

106.6 MB

SEC506.4-5.pdf

73.4 MB

SEC506.6.pdf

44.8 MB

/text/2015/

SEC511-1.pdf

7.5 MB

SEC511-2.pdf

7.0 MB

SEC511-3.pdf

7.5 MB

SEC511-4.pdf

8.5 MB

SEC511-5.pdf

7.8 MB

SEC511-6.pdf

2.3 MB

SEC511-workbook.pdf

16.3 MB

/text/2016/

511.1.pdf

38.4 MB

511.2.pdf

39.9 MB

511.3.pdf

36.5 MB

511.4.pdf

40.6 MB

511.5.pdf

36.9 MB

511.6.pdf

8.1 MB

511.Workbook.pdf

65.3 MB

/text/2012/

524.1.pdf

26.8 MB

524.2.pdf

31.4 MB

/text/2010/

SANS-542.1.1.pdf

208.8 KB

SANS-542.1.2.pdf

27.8 MB

SANS-542.1.3.pdf

659.7 KB

SANS-542.1.4.pdf

15.2 MB

SANS-542.2.1.pdf

194.2 KB

SANS-542.2.2.pdf

11.2 MB

SANS-542.2.3.pdf

19.3 MB

SANS-542.3.1.pdf

8.6 MB

SANS-542.3.2.pdf

6.7 MB

SANS-542.4.1.pdf

6.8 MB

SANS-542.4.2.pdf

6.6 MB

SANS-542.5.1.pdf

8.4 MB

SANS-542.5.2.pdf

7.8 MB

/text/2011/

sans 542-Day1.pdf

28.2 MB

sans 542-Day2.pdf

30.0 MB

sans 542-Day3.pdf

24.4 MB

sans 542-Day4.pdf

20.7 MB

sans 542-Day5.pdf.pdf

25.5 MB

/text/2012/

542.1 - The Attacker's View of the Web.pdf

8.3 MB

542.2 - Reconnaissance and Mapping.pdf

7.6 MB

542.3 - Server-Side Discovery.pdf

3.7 MB

542.4 - Client-Side Discovery.pdf

3.0 MB

542.5 - Exploitation.pdf

3.7 MB

/text/2016/

SEC542_Book1.pdf

283.4 MB

SEC542_Book2.pdf

143.6 MB

SEC542_Book3.pdf

13.6 MB

SEC542_Book4.pdf

12.1 MB

SEC542_Book5.pdf

14.4 MB

SEC542_Book6.pdf

42.1 MB

/text/2016/

SANS550 - 2016.pdf

13.2 MB

/text/2017/

SEC555 Workbook.pdf

96.0 MB

SEC555.1 SIEM Architecture and SOF-ELK.pdf

62.2 MB

SEC555.2 Service Profiling with SIEM.pdf

55.9 MB

SEC555.3 Advanced Endpoint Analytics.pdf

58.1 MB

SEC555.4 Baselining and User Behavior Monitoring.pdf

63.2 MB

SEC555.5 Tactical SIEM Detection and Post-Mortem Analysis.pdf

56.3 MB

SEC555.6 Capstone Design, Detect, Defend.pdf

6.9 MB

/text/2009/

SANS_560.1.pdf

17.2 MB

SANS_560.2.pdf

14.0 MB

SANS_560.3.pdf

15.8 MB

SANS_560.4.pdf

13.6 MB

SANS_560.5.pdf

14.6 MB

/text/2012/

560.1-2012.pdf

8.4 MB

560.2-2012.pdf

8.0 MB

560.3-2012.pdf

7.8 MB

560.4-2012.pdf

7.2 MB

560.5-2012.pdf

7.4 MB

/text/2015/

560.1_1Q2015_P238.pdf

41.1 MB

560.2_1Q2015_P202.pdf

51.4 MB

560.3_1Q2015_P226.pdf

51.9 MB

560.4_1Q2015_P202.pdf

49.7 MB

560.5_1Q2015_P198.pdf

50.2 MB

560.6_1Q2015_P34.pdf

5.4 MB

560SampleReport.pdf

239.7 KB

/text/2016/

560.1.pdf

43.0 MB

560.2.pdf

36.1 MB

560.3.pdf

35.4 MB

560.4.pdf

46.0 MB

560.5.pdf

46.7 MB

560.6.pdf

6.1 MB

/text/2015/

SEC561.pdf

44.0 MB

/text/2017/

SANS564.1.pdf

32.9 MB

SANS564.2.pdf

31.0 MB

/text/2013/

566.1.2013_P168.pdf

41.8 MB

566.2.2013_P186.pdf

67.1 MB

566.3.2013_P190.pdf

85.0 MB

566.4.2013_P234.pdf

80.2 MB

566.5.2013_P196.pdf

64.9 MB

/text/2016/

566.1.pdf

34.4 MB

566.2.pdf

36.6 MB

566.3.pdf

33.2 MB

566.4.pdf

36.7 MB

566.5.pdf

33.0 MB

/text/2017/

SEC573.1-2.pdf

129.7 MB

SEC573.3-5.pdf

151.1 MB

SEC573.6.pdf

12.2 MB

/text/2011/

sans 580.1.pdf

42.6 MB

sans 580.2.pdf

33.0 MB

/text/2015/

580.1.pdf

50.0 MB

580.2.pdf

44.9 MB

/text/2016/

580.1 - Metasploit Kung Fu for Enterprise Pen Testing Day 1.pdf

129.2 MB

580.2 - Metasploit Kung Fu for Enterprise Pen Testing Day 2.pdf

148.6 MB

/2017/

599.1.pdf

26.3 MB

599.2.pdf

26.5 MB

599.3.pdf

27.8 MB

599.4.pdf

27.8 MB

599.5.pdf

23.4 MB

599.6.pdf

5.0 MB

599.Workbook.pdf

37.1 MB

/text/2007/

617_1_wireless_networks.pdf

7.0 MB

617_2_wireless_networks.pdf

8.1 MB

617_3_wireless_networks.pdf

8.1 MB

617_4_wireless_networks.pdf

7.3 MB

617_5_wireless_networks.pdf

7.7 MB

617_6_wireless_networks.pdf

7.5 MB

617_bootcamp_wireless_networks.pdf

3.3 MB

617_workbook_wireless_networks.pdf

5.3 MB

/text/2010/

SANS Security 617 Wireless Ethical Hacking, Penetration Testing & Defenses (2010).pdf

45.8 MB

/text/2015/

SEC617 - Workbook.pdf

42.7 MB

SEC617.1 - Wireless Data Collection and WiFi MAC Analysis.pdf

22.0 MB

SEC617.2 - Wireless Tools and Information Analysis.pdf

24.0 MB

SEC617.3 - Client, Crypto, and Enterprise Attacks.pdf

24.2 MB

SEC617.4 - Advanced WiFi Attack Techniques.pdf

24.0 MB

SEC617.5 - Bluetooth, DECT and ZigBee Attacks.pdf

26.0 MB

SEC617.6 - Wireless Security Strategies and Implementation.pdf

21.4 MB

/text/2013/

642.1 - Advanced Discovery and Exploitation.pdf

55.5 MB

642.2 - Discovery and Exploitation for Specific Applications.pdf

44.1 MB

642.3 - Web Application Encryption.pdf

48.7 MB

642.4 - Mobile Application and Web Services.pdf

49.6 MB

642.5 - Web Application Firewall and Filter Bypass.pdf

38.4 MB

642.6 - Capture the Flag.pdf

3.7 MB

/text/2016/

SEC642.1 - Advanced Attacks.pdf

29.8 MB

SEC642.2 - Discovery and Exploitation for Specific Applications.pdf

22.8 MB

SEC642.3 - Web Cryptography.pdf

30.4 MB

SEC642.4 - Alternative Web Interfaces.pdf

23.9 MB

SEC642.5 - Web Application Firewall and Filter Bypass.pdf

22.2 MB

SEC642.6 - Capture the Flag.pdf

609.8 KB

/text/2012/

Sans Sec 660.1 - Advanced Penetration Testing Essentials.pdf

46.6 MB

Sans Sec 660.2 - Network Attacks for Penetration Testers.pdf

35.6 MB

Sans Sec 660.3 - Attacking the Domain.pdf

43.3 MB

Sans Sec 660.4 - Exploiting Linux for Penetration Testers.pdf

39.6 MB

Sans Sec 660.5 - Exploiting Windows for Penetration Testers.pdf

42.2 MB

/text/2014/

660-1.pdf

46.6 MB

660-2.pdf

44.8 MB

660-3.pdf

48.0 MB

660-4.pdf

42.9 MB

660-5.pdf

45.4 MB

/text/2014/

SANS 760 Day1.pdf

41.4 MB

SANS 760 Day2.pdf

32.9 MB

SANS 760 Day3.pdf

31.0 MB

SANS 760 Day4.pdf

32.2 MB

SANS 760 Day5.pdf

29.9 MB

/text/2016/

SEC760.1 - Threat Modeling Reverrsing and Debugging with IDA.pdf

36.5 MB

SEC760.2 - Advanced Linux Exploitation.pdf

27.6 MB

SEC760.3 - Patch Diffing One-Day Exploits and Return Oriented Shellcode.pdf

36.6 MB

SEC760.4 - Windows Kernel Debugging and Exploitation.pdf

36.7 MB

SEC760.5 - Windows Hear Overflows and Client-Side Exploitation.pdf

38.3 MB

 

Total files 356


Copyright © 2024 FileMood.com