Security Analyst Fundamentals Specialization |
||
Name |
DOWNLOAD
Copy Link
Trouble downloading? see How To |
|
Total Size |
1.7 GB |
|
Total Files |
373 |
|
Last Seen |
2025-07-18 00:01 |
|
Hash |
13C152F4C46CE4C0EA9D6741D2819964B5FFB12F |
/.../02_incident-response-process/ |
|
|
168.8 MB |
|
19.0 KB |
|
12.3 KB |
|
10.2 KB |
|
9.7 KB |
|
7.3 KB |
|
6.4 KB |
|
6.3 KB |
|
3.9 KB |
|
31.8 MB |
|
29.2 MB |
|
12.6 MB |
/ |
|
|
0.1 KB |
|
0.6 KB |
/.../01_siem-concepts/ |
|
|
22.0 KB |
|
16.7 KB |
|
16.5 KB |
|
11.5 KB |
|
10.5 KB |
|
8.8 KB |
|
21.0 MB |
|
20.2 MB |
|
15.5 MB |
/.../02_cyberattack-frameworks/ |
|
|
20.5 KB |
|
10.9 KB |
|
9.1 KB |
|
4.8 KB |
|
19.8 MB |
|
7.2 MB |
/.../02_mobile-endpoint-protection/ |
|
|
20.1 KB |
|
12.9 KB |
|
19.1 MB |
/.../03_real-world-case-studies/ |
|
|
20.0 KB |
|
3.3 KB |
|
11.6 KB |
|
10.5 KB |
|
7.4 KB |
|
4.9 KB |
|
18.3 MB |
|
14.0 MB |
|
6.9 MB |
/.../03_forensic-data/ |
|
|
19.8 KB |
|
17.6 KB |
|
16.9 KB |
|
16.6 KB |
|
43.0 MB |
|
10.5 KB |
|
35.7 MB |
|
9.2 KB |
|
8.8 KB |
|
8.8 KB |
|
22.9 MB |
|
12.6 MB |
/.../04_deep-dive-into-cross-site-scripting/ |
|
|
19.7 KB |
|
19.3 KB |
|
14.2 KB |
|
7.5 KB |
|
10.4 KB |
|
10.0 KB |
|
21.0 MB |
|
18.1 MB |
|
13.3 MB |
/.../03_user-behavior-analysis/ |
|
|
18.9 KB |
|
9.9 KB |
|
18.0 MB |
/.../01_threat-hunting-overview/ |
|
01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.en.srt |
18.2 KB |
|
17.9 KB |
|
11.7 KB |
|
11.4 KB |
01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.en.txt |
9.5 KB |
|
7.5 KB |
01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.mp4 |
18.6 MB |
|
18.4 MB |
|
13.8 MB |
/.../01_incident-response-overview/ |
|
|
17.1 KB |
|
9.1 KB |
|
34.8 MB |
|
0.9 KB |
|
0.6 KB |
|
2.5 MB |
/.../01_vulnerability-assessment-tools/ |
|
|
16.7 KB |
|
10.6 KB |
|
27.4 MB |
/.../01_overview-of-incident-management-response/ |
|
|
16.2 KB |
|
13.9 KB |
|
8.8 KB |
|
8.6 KB |
|
13.1 MB |
|
13.1 MB |
/.../01_data-security-and-protection/ |
|
|
16.2 KB |
|
15.7 KB |
|
14.0 KB |
|
13.8 KB |
|
13.7 KB |
|
13.4 KB |
|
13.4 KB |
|
8.7 KB |
|
8.5 KB |
|
8.5 KB |
|
8.3 KB |
|
7.3 KB |
|
7.2 KB |
|
7.2 KB |
|
16.4 MB |
|
15.5 MB |
|
15.1 MB |
|
13.9 MB |
|
13.8 MB |
|
13.2 MB |
|
12.4 MB |
/.../02_threat-intelligence-frameworks/ |
|
|
16.0 KB |
|
8.9 KB |
|
8.4 KB |
|
4.8 KB |
|
14.9 MB |
|
8.7 MB |
/.../02_application-security-techniques-and-risks/ |
|
|
14.5 KB |
|
13.6 KB |
|
12.4 KB |
|
8.1 KB |
|
7.6 KB |
|
7.2 KB |
|
15.0 MB |
|
14.8 MB |
|
13.5 MB |
/.../01_threat-intelligence-and-cybersecurity/ |
|
|
14.4 KB |
|
9.8 KB |
|
9.8 KB |
|
9.2 KB |
|
6.3 KB |
|
6.2 KB |
|
15.2 MB |
|
13.3 MB |
|
12.5 MB |
/.../01_introduction-to-phishing-scams/ |
|
|
14.4 KB |
|
9.3 KB |
|
8.0 KB |
|
7.5 KB |
|
4.2 KB |
|
5.0 KB |
|
18.5 MB |
|
12.1 MB |
|
11.4 MB |
/.../02_case-study/ |
|
|
14.0 KB |
|
7.5 KB |
|
13.5 MB |
/.pad/ |
|
|
0.0 KB |
|
0.0 KB |
|
0.1 KB |
|
0.1 KB |
|
94.3 KB |
|
224.4 KB |
|
382.3 KB |
|
201.3 KB |
|
456.3 KB |
|
388.8 KB |
|
111.5 KB |
|
213.2 KB |
|
122.3 KB |
|
489.8 KB |
|
512.5 KB |
|
239.3 KB |
|
241.5 KB |
|
160.9 KB |
|
270.0 KB |
|
298.6 KB |
|
417.6 KB |
|
505.3 KB |
|
69.1 KB |
|
123.6 KB |
|
233.7 KB |
|
304.0 KB |
|
174.7 KB |
|
58.0 KB |
|
382.4 KB |
|
173.8 KB |
|
198.7 KB |
|
200.7 KB |
|
325.2 KB |
|
486.3 KB |
|
71.1 KB |
|
71.5 KB |
|
77.1 KB |
|
193.8 KB |
|
268.8 KB |
|
362.5 KB |
|
444.0 KB |
|
225.2 KB |
|
155.6 KB |
|
183.7 KB |
|
263.2 KB |
|
326.3 KB |
|
345.4 KB |
|
348.6 KB |
|
438.9 KB |
|
505.6 KB |
|
84.4 KB |
|
155.5 KB |
|
171.2 KB |
|
289.3 KB |
|
330.9 KB |
|
395.9 KB |
|
428.9 KB |
|
514.3 KB |
|
48.5 KB |
|
471.2 KB |
|
486.2 KB |
|
520.7 KB |
|
82.2 KB |
|
207.4 KB |
|
426.4 KB |
|
447.7 KB |
|
107.0 KB |
|
107.9 KB |
|
491.7 KB |
|
515.8 KB |
|
109.4 KB |
|
284.9 KB |
|
404.6 KB |
|
155.8 KB |
|
471.3 KB |
|
263.3 KB |
|
272.9 KB |
|
186.6 KB |
|
251.6 KB |
|
54.8 KB |
|
95.7 KB |
|
122.1 KB |
|
461.8 KB |
|
380.1 KB |
|
390.7 KB |
|
367.1 KB |
|
511.6 KB |
|
492.5 KB |
|
179.2 KB |
|
128.1 KB |
|
115.2 KB |
|
211.8 KB |
/.../01_introduction-to-penetration-testing/ |
|
|
130.0 MB |
|
11.8 KB |
|
6.3 KB |
|
0.8 KB |
|
0.5 KB |
|
2.0 MB |
/.../02_case-study/ |
|
|
13.8 KB |
|
7.3 KB |
|
13.7 MB |
/.../03_incident-response-demo/ |
|
|
13.6 KB |
|
12.4 KB |
|
9.9 KB |
|
8.5 KB |
|
6.6 KB |
|
5.2 KB |
|
29.5 MB |
|
15.4 MB |
|
10.5 MB |
/.../02_case-study/ |
|
|
13.3 KB |
|
8.6 KB |
|
15.6 MB |
/.../02_ransomware-case-study-city-of-atlanta/ |
|
|
13.1 KB |
|
8.5 KB |
|
16.7 MB |
/.../03_python-scripting/ |
|
|
12.5 KB |
|
11.1 KB |
|
6.9 KB |
|
6.5 KB |
|
5.8 KB |
|
3.7 KB |
|
3.2 KB |
|
2.9 KB |
|
1.8 KB |
|
1.7 KB |
|
12.2 MB |
|
9.2 MB |
|
7.2 MB |
|
3.7 MB |
|
3.5 MB |
/.../01_security-architecture-considerations/ |
|
|
12.4 KB |
|
11.6 KB |
|
2.6 KB |
|
8.2 KB |
|
6.6 KB |
|
6.2 KB |
|
5.2 KB |
|
4.8 KB |
|
13.7 MB |
|
13.5 MB |
|
11.5 MB |
|
5.9 MB |
/.../03_devsecops-security-automation/ |
|
|
11.5 KB |
|
7.3 KB |
|
6.7 KB |
|
3.6 KB |
|
13.2 MB |
|
6.4 MB |
/.../02_the-forensic-process/ |
|
|
10.4 KB |
|
9.7 KB |
|
6.2 KB |
|
5.6 KB |
|
28.9 MB |
|
25.0 MB |
/.../01_3rd-party-breach-overview/ |
|
|
10.4 KB |
|
8.8 KB |
|
6.7 KB |
|
4.6 KB |
|
17.1 MB |
|
10.9 MB |
/.../01_forensics-course-overview/ |
|
|
10.3 KB |
|
0.7 KB |
|
6.6 KB |
|
0.4 KB |
|
25.6 MB |
|
1.9 MB |
/.../01_ransomware-overview/ |
|
|
9.8 KB |
|
8.3 KB |
|
5.3 KB |
|
5.3 KB |
|
13.8 MB |
|
11.6 MB |
/.../01_introduction-to-point-of-sale-attacks/ |
|
|
9.8 KB |
|
8.9 KB |
|
6.1 KB |
|
4.8 KB |
|
14.8 MB |
|
12.6 MB |
/.../02_port-scanning/ |
|
|
9.6 KB |
|
5.1 KB |
|
15.1 MB |
/.../01_scripting-overview/ |
|
|
9.6 KB |
|
8.7 KB |
|
7.5 KB |
|
5.1 KB |
|
4.6 KB |
|
4.3 KB |
|
0.4 KB |
|
0.3 KB |
|
18.2 MB |
|
14.0 MB |
|
11.2 MB |
|
880.7 KB |
/.../02_penetration-testing-phases/ |
|
|
9.5 KB |
|
9.5 KB |
|
6.8 KB |
|
5.9 KB |
|
5.1 KB |
|
4.4 KB |
|
4.2 KB |
|
3.6 KB |
|
2.3 KB |
|
2.6 KB |
|
20.7 MB |
|
15.1 MB |
|
14.5 MB |
|
12.0 MB |
|
11.1 MB |
/.../04_artificial-intelligence-in-siems/ |
|
|
2.9 KB |
|
7.9 KB |
|
5.4 KB |
|
4.3 KB |
|
8.1 MB |
|
5.8 MB |
/.../02_an-industry-siem-solution/ |
|
|
7.8 KB |
|
5.1 KB |
|
10.2 MB |
/.../03_network-protocol-analyzers/ |
|
|
7.6 KB |
|
4.0 KB |
|
12.0 MB |
/.../03_penetration-testing/ |
|
|
6.4 KB |
|
3.8 KB |
|
7.8 MB |
/.../01_applied-project-data-breaches/ |
|
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.srt |
6.2 KB |
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.txt |
4.0 KB |
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.mp4 |
6.4 MB |
Total files 373 |
Copyright © 2025 FileMood.com