FileMood

Download Security Analyst Fundamentals Specialization

Security Analyst Fundamentals Specialization

Name

Security Analyst Fundamentals Specialization

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.7 GB

Total Files

373

Last Seen

2025-07-18 00:01

Hash

13C152F4C46CE4C0EA9D6741D2819964B5FFB12F

/.../02_incident-response-process/

03_incident-response-detection-analysis.mp4

168.8 MB

03_incident-response-detection-analysis.en.srt

19.0 KB

01_incident-response-preparation.en.srt

12.3 KB

03_incident-response-detection-analysis.en.txt

10.2 KB

04_containment-eradication-recovery.en.srt

9.7 KB

06_post-incident-activities.en.srt

7.3 KB

01_incident-response-preparation.en.txt

6.4 KB

04_containment-eradication-recovery.en.txt

6.3 KB

06_post-incident-activities.en.txt

3.9 KB

01_incident-response-preparation.mp4

31.8 MB

04_containment-eradication-recovery.mp4

29.2 MB

06_post-incident-activities.mp4

12.6 MB

/

TutsNode.net.txt

0.1 KB

[TGx]Downloaded from torrentgalaxy.to .txt

0.6 KB

/.../01_siem-concepts/

01_siem-concepts-and-benefits.en.srt

22.0 KB

02_siem-deployment.en.srt

16.7 KB

03_siem-solutions-vendors.en.srt

16.5 KB

01_siem-concepts-and-benefits.en.txt

11.5 KB

03_siem-solutions-vendors.en.txt

10.5 KB

02_siem-deployment.en.txt

8.8 KB

01_siem-concepts-and-benefits.mp4

21.0 MB

03_siem-solutions-vendors.mp4

20.2 MB

02_siem-deployment.mp4

15.5 MB

/.../02_cyberattack-frameworks/

01_ibm-x-force-iris-cyberattack-framework.en.srt

20.5 KB

01_ibm-x-force-iris-cyberattack-framework.en.txt

10.9 KB

02_what-is-a-breach.en.srt

9.1 KB

02_what-is-a-breach.en.txt

4.8 KB

01_ibm-x-force-iris-cyberattack-framework.mp4

19.8 MB

02_what-is-a-breach.mp4

7.2 MB

/.../02_mobile-endpoint-protection/

01_mobile-endpoint-protection.en.srt

20.1 KB

01_mobile-endpoint-protection.en.txt

12.9 KB

01_mobile-endpoint-protection.mp4

19.1 MB

/.../03_real-world-case-studies/

01_target-attack-timeline.en.srt

20.0 KB

02_target-attack-vulnerabilities.en.txt

3.3 KB

03_watering-hole-attack.en.srt

11.6 KB

01_target-attack-timeline.en.txt

10.5 KB

03_watering-hole-attack.en.txt

7.4 KB

02_target-attack-vulnerabilities.en.srt

4.9 KB

01_target-attack-timeline.mp4

18.3 MB

03_watering-hole-attack.mp4

14.0 MB

02_target-attack-vulnerabilities.mp4

6.9 MB

/.../03_forensic-data/

05_network-data.en.srt

19.8 KB

03_operating-system-data.en.srt

17.6 KB

01_data-files.en.srt

16.9 KB

04_application-data.en.srt

16.6 KB

01_data-files.mp4

43.0 MB

05_network-data.en.txt

10.5 KB

03_operating-system-data.mp4

35.7 MB

03_operating-system-data.en.txt

9.2 KB

01_data-files.en.txt

8.8 KB

04_application-data.en.txt

8.8 KB

05_network-data.mp4

22.9 MB

04_application-data.mp4

12.6 MB

/.../04_deep-dive-into-cross-site-scripting/

01_application-security-defects-writing-secure-code.en.srt

19.7 KB

03_cross-site-scripting-effective-defenses.en.srt

19.3 KB

02_cross-site-scripting-common-attacks.en.srt

14.2 KB

02_cross-site-scripting-common-attacks.en.txt

7.5 KB

01_application-security-defects-writing-secure-code.en.txt

10.4 KB

03_cross-site-scripting-effective-defenses.en.txt

10.0 KB

01_application-security-defects-writing-secure-code.mp4

21.0 MB

03_cross-site-scripting-effective-defenses.mp4

18.1 MB

02_cross-site-scripting-common-attacks.mp4

13.3 MB

/.../03_user-behavior-analysis/

02_user-behavior-analytics.en.srt

18.9 KB

02_user-behavior-analytics.en.txt

9.9 KB

02_user-behavior-analytics.mp4

18.0 MB

/.../01_threat-hunting-overview/

01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.en.srt

18.2 KB

02_soc-cyber-threat-hunting.en.srt

17.9 KB

03_cyber-threat-hunting-an-industry-example.en.srt

11.7 KB

02_soc-cyber-threat-hunting.en.txt

11.4 KB

01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.en.txt

9.5 KB

03_cyber-threat-hunting-an-industry-example.en.txt

7.5 KB

01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.mp4

18.6 MB

02_soc-cyber-threat-hunting.mp4

18.4 MB

03_cyber-threat-hunting-an-industry-example.mp4

13.8 MB

/.../01_incident-response-overview/

02_what-is-incident-response.en.srt

17.1 KB

02_what-is-incident-response.en.txt

9.1 KB

02_what-is-incident-response.mp4

34.8 MB

01_incident-response-overview.en.srt

0.9 KB

01_incident-response-overview.en.txt

0.6 KB

01_incident-response-overview.mp4

2.5 MB

/.../01_vulnerability-assessment-tools/

01_vulnerability-assessment-tools.en.srt

16.7 KB

01_vulnerability-assessment-tools.en.txt

10.6 KB

01_vulnerability-assessment-tools.mp4

27.4 MB

/.../01_overview-of-incident-management-response/

01_nist-incident-response-lifecycle-teams.en.srt

16.2 KB

02_nist-incident-response-lifecycle.en.srt

13.9 KB

02_nist-incident-response-lifecycle.en.txt

8.8 KB

01_nist-incident-response-lifecycle-teams.en.txt

8.6 KB

01_nist-incident-response-lifecycle-teams.mp4

13.1 MB

02_nist-incident-response-lifecycle.mp4

13.1 MB

/.../01_data-security-and-protection/

01_what-is-data-security-and-protection.en.srt

16.2 KB

06_critical-data-protection-capabilities.en.srt

15.7 KB

07_data-protection-industry-example.en.srt

14.0 KB

05_capabilities-of-data-protection.en.srt

13.8 KB

04_industry-specific-data-security-challenges.en.srt

13.7 KB

02_data-security-top-challenges.en.srt

13.4 KB

03_data-security-common-pitfalls.en.srt

13.4 KB

01_what-is-data-security-and-protection.en.txt

8.7 KB

02_data-security-top-challenges.en.txt

8.5 KB

03_data-security-common-pitfalls.en.txt

8.5 KB

06_critical-data-protection-capabilities.en.txt

8.3 KB

05_capabilities-of-data-protection.en.txt

7.3 KB

07_data-protection-industry-example.en.txt

7.2 KB

04_industry-specific-data-security-challenges.en.txt

7.2 KB

07_data-protection-industry-example.mp4

16.4 MB

01_what-is-data-security-and-protection.mp4

15.5 MB

06_critical-data-protection-capabilities.mp4

15.1 MB

04_industry-specific-data-security-challenges.mp4

13.9 MB

03_data-security-common-pitfalls.mp4

13.8 MB

05_capabilities-of-data-protection.mp4

13.2 MB

02_data-security-top-challenges.mp4

12.4 MB

/.../02_threat-intelligence-frameworks/

01_threat-intelligence-frameworks.en.srt

16.0 KB

02_security-intelligence.en.srt

8.9 KB

01_threat-intelligence-frameworks.en.txt

8.4 KB

02_security-intelligence.en.txt

4.8 KB

01_threat-intelligence-frameworks.mp4

14.9 MB

02_security-intelligence.mp4

8.7 MB

/.../02_application-security-techniques-and-risks/

01_application-security-overview.en.srt

14.5 KB

03_application-security-threats-and-attacks.en.srt

13.6 KB

04_application-security-standards-and-regulations.en.srt

12.4 KB

04_application-security-standards-and-regulations.en.txt

8.1 KB

01_application-security-overview.en.txt

7.6 KB

03_application-security-threats-and-attacks.en.txt

7.2 KB

01_application-security-overview.mp4

15.0 MB

03_application-security-threats-and-attacks.mp4

14.8 MB

04_application-security-standards-and-regulations.mp4

13.5 MB

/.../01_threat-intelligence-and-cybersecurity/

03_threat-intelligence-platforms.en.srt

14.4 KB

02_threat-intelligence-strategy-and-external-sources.en.srt

9.8 KB

01_threat-intelligence-overview.en.srt

9.8 KB

03_threat-intelligence-platforms.en.txt

9.2 KB

02_threat-intelligence-strategy-and-external-sources.en.txt

6.3 KB

01_threat-intelligence-overview.en.txt

6.2 KB

03_threat-intelligence-platforms.mp4

15.2 MB

01_threat-intelligence-overview.mp4

13.3 MB

02_threat-intelligence-strategy-and-external-sources.mp4

12.5 MB

/.../01_introduction-to-phishing-scams/

01_phishing-scams-overview.en.srt

14.4 KB

03_phishing-email-study.en.srt

9.3 KB

05_impact-of-phishing.en.srt

8.0 KB

01_phishing-scams-overview.en.txt

7.5 KB

05_impact-of-phishing.en.txt

4.2 KB

03_phishing-email-study.en.txt

5.0 KB

01_phishing-scams-overview.mp4

18.5 MB

03_phishing-email-study.mp4

12.1 MB

05_impact-of-phishing.mp4

11.4 MB

/.../02_case-study/

01_phishing-case-study-google-facebook.en.srt

14.0 KB

01_phishing-case-study-google-facebook.en.txt

7.5 KB

01_phishing-case-study-google-facebook.mp4

13.5 MB

/.pad/

0

0.0 KB

1

0.0 KB

2

0.1 KB

3

0.1 KB

4

94.3 KB

5

224.4 KB

6

382.3 KB

7

201.3 KB

8

456.3 KB

9

388.8 KB

10

111.5 KB

11

213.2 KB

12

122.3 KB

13

489.8 KB

14

512.5 KB

15

239.3 KB

16

241.5 KB

17

160.9 KB

18

270.0 KB

19

298.6 KB

20

417.6 KB

21

505.3 KB

22

69.1 KB

23

123.6 KB

24

233.7 KB

25

304.0 KB

26

174.7 KB

27

58.0 KB

28

382.4 KB

29

173.8 KB

30

198.7 KB

31

200.7 KB

32

325.2 KB

33

486.3 KB

34

71.1 KB

35

71.5 KB

36

77.1 KB

37

193.8 KB

38

268.8 KB

39

362.5 KB

40

444.0 KB

41

225.2 KB

42

155.6 KB

43

183.7 KB

44

263.2 KB

45

326.3 KB

46

345.4 KB

47

348.6 KB

48

438.9 KB

49

505.6 KB

50

84.4 KB

51

155.5 KB

52

171.2 KB

53

289.3 KB

54

330.9 KB

55

395.9 KB

56

428.9 KB

57

514.3 KB

58

48.5 KB

59

471.2 KB

60

486.2 KB

61

520.7 KB

62

82.2 KB

63

207.4 KB

64

426.4 KB

65

447.7 KB

66

107.0 KB

67

107.9 KB

68

491.7 KB

69

515.8 KB

70

109.4 KB

71

284.9 KB

72

404.6 KB

73

155.8 KB

74

471.3 KB

75

263.3 KB

76

272.9 KB

77

186.6 KB

78

251.6 KB

79

54.8 KB

80

95.7 KB

81

122.1 KB

82

461.8 KB

83

380.1 KB

84

390.7 KB

85

367.1 KB

86

511.6 KB

87

492.5 KB

88

179.2 KB

89

128.1 KB

90

115.2 KB

91

211.8 KB

/.../01_introduction-to-penetration-testing/

02_what-is-penetration-testing.mp4

130.0 MB

02_what-is-penetration-testing.en.srt

11.8 KB

02_what-is-penetration-testing.en.txt

6.3 KB

01_introduction-to-penetration-testing.en.srt

0.8 KB

01_introduction-to-penetration-testing.en.txt

0.5 KB

01_introduction-to-penetration-testing.mp4

2.0 MB

/.../02_case-study/

01_3rd-party-breach-quest-diagnostics.en.srt

13.8 KB

01_3rd-party-breach-quest-diagnostics.en.txt

7.3 KB

01_3rd-party-breach-quest-diagnostics.mp4

13.7 MB

/.../03_incident-response-demo/

02_incident-response-demo-part-2.en.srt

13.6 KB

01_incident-response-demo-part-1.en.srt

12.4 KB

03_incident-response-demo-part-3.en.srt

9.9 KB

02_incident-response-demo-part-2.en.txt

8.5 KB

01_incident-response-demo-part-1.en.txt

6.6 KB

03_incident-response-demo-part-3.en.txt

5.2 KB

02_incident-response-demo-part-2.mp4

29.5 MB

03_incident-response-demo-part-3.mp4

15.4 MB

01_incident-response-demo-part-1.mp4

10.5 MB

/.../02_case-study/

01_pos-case-study-home-depot.en.srt

13.3 KB

01_pos-case-study-home-depot.en.txt

8.6 KB

01_pos-case-study-home-depot.mp4

15.6 MB

/.../02_ransomware-case-study-city-of-atlanta/

01_ransomware-case-study-city-of-atlanta.en.srt

13.1 KB

01_ransomware-case-study-city-of-atlanta.en.txt

8.5 KB

01_ransomware-case-study-city-of-atlanta.mp4

16.7 MB

/.../03_python-scripting/

02_python-getting-started.en.srt

12.5 KB

01_python-basics.en.srt

11.1 KB

03_data-structures.en.srt

6.9 KB

02_python-getting-started.en.txt

6.5 KB

01_python-basics.en.txt

5.8 KB

03_data-structures.en.txt

3.7 KB

05_python-libraries.en.srt

3.2 KB

04_functions-and-methods.en.srt

2.9 KB

04_functions-and-methods.en.txt

1.8 KB

05_python-libraries.en.txt

1.7 KB

02_python-getting-started.mp4

12.2 MB

01_python-basics.mp4

9.2 MB

03_data-structures.mp4

7.2 MB

04_functions-and-methods.mp4

3.7 MB

05_python-libraries.mp4

3.5 MB

/.../01_security-architecture-considerations/

01_characteristics-of-a-security-architecture.en.srt

12.4 KB

02_high-level-architectural-models.en.srt

11.6 KB

04_security-patterns.en.txt

2.6 KB

03_solutions-architecture.en.srt

8.2 KB

01_characteristics-of-a-security-architecture.en.txt

6.6 KB

02_high-level-architectural-models.en.txt

6.2 KB

03_solutions-architecture.en.txt

5.2 KB

04_security-patterns.en.srt

4.8 KB

01_characteristics-of-a-security-architecture.mp4

13.7 MB

02_high-level-architectural-models.mp4

13.5 MB

03_solutions-architecture.mp4

11.5 MB

04_security-patterns.mp4

5.9 MB

/.../03_devsecops-security-automation/

01_devsecops-overview.en.srt

11.5 KB

01_devsecops-overview.en.txt

7.3 KB

02_devsecops-deployment.en.srt

6.7 KB

02_devsecops-deployment.en.txt

3.6 KB

01_devsecops-overview.mp4

13.2 MB

02_devsecops-deployment.mp4

6.4 MB

/.../02_the-forensic-process/

01_data-collection-examination.en.srt

10.4 KB

03_analysis-reporting.en.srt

9.7 KB

03_analysis-reporting.en.txt

6.2 KB

01_data-collection-examination.en.txt

5.6 KB

03_analysis-reporting.mp4

28.9 MB

01_data-collection-examination.mp4

25.0 MB

/.../01_3rd-party-breach-overview/

01_3rd-party-breach-overview.en.srt

10.4 KB

02_3rd-party-breach-impacts.en.srt

8.8 KB

01_3rd-party-breach-overview.en.txt

6.7 KB

02_3rd-party-breach-impacts.en.txt

4.6 KB

01_3rd-party-breach-overview.mp4

17.1 MB

02_3rd-party-breach-impacts.mp4

10.9 MB

/.../01_forensics-course-overview/

02_what-are-forensics.en.srt

10.3 KB

01_module-overview.en.srt

0.7 KB

02_what-are-forensics.en.txt

6.6 KB

01_module-overview.en.txt

0.4 KB

02_what-are-forensics.mp4

25.6 MB

01_module-overview.mp4

1.9 MB

/.../01_ransomware-overview/

03_examples-of-ransomware.en.srt

9.8 KB

01_ransomware-overview.en.srt

8.3 KB

01_ransomware-overview.en.txt

5.3 KB

03_examples-of-ransomware.en.txt

5.3 KB

03_examples-of-ransomware.mp4

13.8 MB

01_ransomware-overview.mp4

11.6 MB

/.../01_introduction-to-point-of-sale-attacks/

01_point-of-sale-breach-overview.en.srt

9.8 KB

02_pos-malware.en.srt

8.9 KB

01_point-of-sale-breach-overview.en.txt

6.1 KB

02_pos-malware.en.txt

4.8 KB

01_point-of-sale-breach-overview.mp4

14.8 MB

02_pos-malware.mp4

12.6 MB

/.../02_port-scanning/

01_port-scanning.en.srt

9.6 KB

01_port-scanning.en.txt

5.1 KB

01_port-scanning.mp4

15.1 MB

/.../01_scripting-overview/

04_scripting-languages.en.srt

9.6 KB

02_history-of-scripting.en.srt

8.7 KB

03_scripting-concepts.en.srt

7.5 KB

04_scripting-languages.en.txt

5.1 KB

02_history-of-scripting.en.txt

4.6 KB

03_scripting-concepts.en.txt

4.3 KB

01_module-overview.en.srt

0.4 KB

01_module-overview.en.txt

0.3 KB

04_scripting-languages.mp4

18.2 MB

03_scripting-concepts.mp4

14.0 MB

02_history-of-scripting.mp4

11.2 MB

01_module-overview.mp4

880.7 KB

/.../02_penetration-testing-phases/

09_penetration-testing-reporting.en.srt

9.5 KB

08_penetration-testing-attack.en.srt

9.5 KB

03_penetration-testing-discovery.en.srt

6.8 KB

08_penetration-testing-attack.en.txt

5.9 KB

09_penetration-testing-reporting.en.txt

5.1 KB

05_penetration-testing-additional-discovery-details.en.srt

4.4 KB

01_penetration-testing-planning.en.srt

4.2 KB

03_penetration-testing-discovery.en.txt

3.6 KB

01_penetration-testing-planning.en.txt

2.3 KB

05_penetration-testing-additional-discovery-details.en.txt

2.6 KB

08_penetration-testing-attack.mp4

20.7 MB

09_penetration-testing-reporting.mp4

15.1 MB

01_penetration-testing-planning.mp4

14.5 MB

03_penetration-testing-discovery.mp4

12.0 MB

05_penetration-testing-additional-discovery-details.mp4

11.1 MB

/.../04_artificial-intelligence-in-siems/

02_ai-and-siem-an-industry-example.en.txt

2.9 KB

01_ai-and-siem.en.srt

7.9 KB

02_ai-and-siem-an-industry-example.en.srt

5.4 KB

01_ai-and-siem.en.txt

4.3 KB

01_ai-and-siem.mp4

8.1 MB

02_ai-and-siem-an-industry-example.mp4

5.8 MB

/.../02_an-industry-siem-solution/

01_qradar-siem-an-industry-example.en.srt

7.8 KB

01_qradar-siem-an-industry-example.en.txt

5.1 KB

01_qradar-siem-an-industry-example.mp4

10.2 MB

/.../03_network-protocol-analyzers/

01_network-protocol-analyzers-overview.en.srt

7.6 KB

01_network-protocol-analyzers-overview.en.txt

4.0 KB

01_network-protocol-analyzers-overview.mp4

12.0 MB

/.../03_penetration-testing/

01_tools.en.srt

6.4 KB

01_tools.en.txt

3.8 KB

01_tools.mp4

7.8 MB

/.../01_applied-project-data-breaches/

01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.srt

6.2 KB

01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.txt

4.0 KB

01_introduction-to-the-peer-to-peer-applied-project-data-breaches.mp4

6.4 MB

 

Total files 373


Copyright © 2025 FileMood.com