https://img87.pixhost.to/images/599/359020115_tuto.jpg


Cybersecurity Attack and Defense Fundamentals Specialization
Language: English | Size:2.54 GB
Genre:eLearning

Files Included :

01 course-introduction.mp4 (12.84 MB)
MP4
01 introduction.mp4 (5.46 MB)
MP4
01 understanding-the-fundamentals-of-computer-forensics.mp4 (16.87 MB)
MP4
01 understanding-different-types-of-cybercrimes.mp4 (15.77 MB)
MP4
01 introduction.mp4 (4.38 MB)
MP4
01 understanding-the-pre-investigation-phase.mp4 (29.1 MB)
MP4
01 understanding-the-investigation-phase.mp4 (39.76 MB)
MP4
01 understanding-the-post-investigation-phase.mp4 (27.48 MB)
MP4
01 introduction.mp4 (5.04 MB)
MP4
01 understanding-the-logical-structure-of-a-disk.mp4 (71.94 MB)
MP4
01 introduction.mp4 (4.62 MB)
MP4
01 understanding-the-data-acquisition-fundamentals.mp4 (18.95 MB)
MP4
01 understanding-the-different-types-of-data-acquisition.mp4 (10.55 MB)
MP4
01 understanding-the-data-acquisition-format.mp4 (12.2 MB)
MP4
01 understanding-the-data-acquisition-methodology.mp4 (43.63 MB)
MP4
01 introduction.mp4 (5.95 MB)
MP4
01 understanding-the-anti-forensics-techniques.mp4 (5.44 MB)
MP4
01 introduction.mp4 (4.64 MB)
MP4
01 understanding-the-windows-memory-and-registry-analysis.mp4 (37.74 MB)
MP4
01 understanding-how-to-examine-windows-files-and-metadata.mp4 (38.62 MB)
MP4
01 introduction.mp4 (4.73 MB)
MP4
01 understanding-the-volatile-and-non-volatile-data-in-linux.mp4 (74.07 MB)
MP4
01 understanding-the-mac-forensics.mp4 (40.12 MB)
MP4
01 introduction.mp4 (4.64 MB)
MP4
01 understanding-the-network-forensics-fundamentals.mp4 (3.51 MB)
MP4
01 understanding-the-logging-fundamentals.mp4 (26.38 MB)
MP4
01 understanding-the-event-correlation-concepts.mp4 (19.78 MB)
MP4
01 understanding-how-to-investigate-network-traffic.mp4 (43.66 MB)
MP4
01 introduction.mp4 (4.24 MB)
MP4
01 understanding-the-web-application-forensics.mp4 (33.93 MB)
MP4
01 understanding-the-internet-information-services-iis-logs.mp4 (22.36 MB)
MP4
01 understanding-the-apache-web-server-logs.mp4 (20.72 MB)
MP4
01 overview-of-web-attacks-on-windows-based-servers.mp4 (9.56 MB)
MP4
01 introduction.mp4 (5.28 MB)
MP4
01 understanding-the-dark-web.mp4 (18.61 MB)
MP4
01 understanding-the-tor-browser-forensics.mp4 (2.56 MB)
MP4
01 overview-of-collecting-and-analyzing-memory-dumps.mp4 (4.13 MB)
MP4
01 introduction.mp4 (4.47 MB)
MP4
01 understanding-the-email-system.mp4 (3.22 MB)
MP4
01 understanding-the-parts-of-an-email-message.mp4 (3.59 MB)
MP4
01 overview-of-email-crime-investigation-and-its-steps.mp4 (45.68 MB)
MP4
01 module-introduction.mp4 (5.49 MB)
MP4
01 overview-of-static-analysis-of-malware.mp4 (25.02 MB)
MP4
01 overview-of-analysis-of-suspicious-word-documents.mp4 (11.43 MB)
MP4
01 course-introduction.mp4 (16.31 MB)
MP4
01 introduction.mp4 (5.18 MB)
MP4
01 understanding-the-need-for-security.mp4 (6.61 MB)
MP4
01 understanding-the-elements-of-information-security.mp4 (5.57 MB)
MP4
01 overview-of-classification-of-attacks.mp4 (13.67 MB)
MP4
01 overview-of-information-security-attack-vectors.mp4 (21.44 MB)
MP4
01 introduction.mp4 (5.36 MB)
MP4
01 understanding-the-cyber-kill-chain-methodology.mp4 (9.51 MB)
MP4
01 understanding-tactics-techniques-and-procedures-ttps.mp4 (11.4 MB)
MP4
01 overview-of-indicators-of-compromise-iocs.mp4 (9.39 MB)
MP4
01 overview-of-hacking-concepts-and-hacker-classes.mp4 (22.91 MB)
MP4
01 understanding-different-phases-of-hacking-cycle.mp4 (11.96 MB)
MP4
01 understanding-ethical-hacking-concepts-and-its-scope.mp4 (45.87 MB)
MP4
01 overview-of-ethical-hacking-tools.mp4 (17.69 MB)
MP4
01 introduction.mp4 (5.77 MB)
MP4
01 introduction.mp4 (5.18 MB)
MP4
01 understanding-microsoft-authentication.mp4 (6.56 MB)
MP4
01 video-4-5-overview-of-password-cracking-tools.mp4 (4.3 MB)
MP4
01 video-5-1-introduction.mp4 (4.95 MB)
MP4
01 video-5-2-understanding-social-engineering-concepts.mp4 (43.43 MB)
MP4
01 video-5-4-understanding-insider-threats.mp4 (22.48 MB)
MP4
01 video-5-5-understanding-identity-theft.mp4 (11.22 MB)
MP4
01 video-6-1-introduction.mp4 (5.58 MB)
MP4
01 video-6-6-understanding-different-dos-ddos-attack-tools.mp4 (7.48 MB)
MP4
01 video-7-1-introduction.mp4 (6.35 MB)
MP4
01 video-7-8-understanding-different-sql-injection-tools.mp4 (6.03 MB)
MP4
01 video-8-1-introduction.mp4 (5 MB)
MP4
01 video-8-2-overview-of-wireless-terminology.mp4 (15.03 MB)
MP4
01 video-8-3-overview-of-wireless-encryption-algorithms.mp4 (21.74 MB)
MP4
01 video-8-5-overview-of-different-wireless-attack-tools.mp4 (16.27 MB)
MP4
01 video-8-6-understanding-bluetooth-attack-techniques.mp4 (29.41 MB)
MP4
01 video-8-8-overview-of-different-wireless-security-tools.mp4 (6.04 MB)
MP4
01 video-9-1-introduction.mp4 (6.25 MB)
MP4
01 video-9-2-understanding-anatomy-of-a-mobile-attack.mp4 (21.19 MB)
MP4
01 video-9-3-understanding-mobile-platform-attack-vectors.mp4 (9.15 MB)
MP4
01 video-9-4-understanding-mobile-platform-vulnerabilities.mp4 (44.32 MB)
MP4
01 video-9-5-understanding-mobile-device-management.mp4 (16.13 MB)
MP4
01 video-10-1-introduction.mp4 (6.47 MB)
MP4
01 video-10-2-understanding-iot-concepts.mp4 (21.53 MB)
MP4
01 video-10-3-understanding-iot-attacks-and-iot-attack-tools.mp4 (74.59 MB)
MP4
01 video-10-5-understanding-ot-concepts.mp4 (43.12 MB)
MP4
01 video-10-6-understanding-ot-attacks-and-ot-attack-tools.mp4 (52.63 MB)
MP4
01 video-11-1-introduction.mp4 (4.41 MB)
MP4
01 video-11-2-understanding-cloud-computing-concepts.mp4 (52.53 MB)
MP4
01 video-11-3-overview-of-container-technology.mp4 (51.38 MB)
MP4
01 video-11-4-understanding-cloud-computing-threats.mp4 (39.6 MB)
MP4
01 video-11-5-overview-of-cloud-attacks-and-tools.mp4 (21.51 MB)
MP4
01 video-11-6-understanding-cloud-attack-countermeasures.mp4 (20.66 MB)
MP4
01 video-12-1-introduction.mp4 (5.42 MB)
MP4
01 video-12-3-understanding-types-of-penetration-testing.mp4 (15.64 MB)
MP4
01 video-12-4-understanding-phases-of-penetration-testing.mp4 (13.55 MB)
MP4
01 video-12-5-overview-of-penetration-testing-methodologies.mp4 (4.49 MB)
MP4
01 course-introduction.mp4 (42.03 MB)
MP4
01 introduction.mp4 (6.5 MB)
MP4
01 understanding-the-goals-of-network-defense.mp4 (41.12 MB)
MP4
01 understanding-information-assurance-ia-principles.mp4 (13.97 MB)
MP4
01 understanding-the-different-network-security-protocols.mp4 (74 MB)
MP4
01 introduction.mp4 (6.08 MB)
MP4
01 understanding-user-access-management.mp4 (8.4 MB)
MP4
01 overview-of-different-types-of-authentication.mp4 (17.1 MB)
MP4
01 overview-of-different-types-of-authorization.mp4 (4.9 MB)
MP4
01 understanding-user-accounting.mp4 (6.98 MB)
MP4
01 introduction.mp4 (7.34 MB)
MP4
01 introduction.mp4 (5.46 MB)
MP4
01 understanding-the-importance-of-physical-security.mp4 (9.65 MB)
MP4
01 overview-of-physical-security-policy.mp4 (9.56 MB)
MP4
01 understanding-the-various-environmental-controls.mp4 (32.91 MB)
MP4
01 introduction.mp4 (6.35 MB)
MP4
01 understanding-network-segmentation-and-its-types.mp4 (65.51 MB)
MP4
01 overview-of-different-types-of-honeypots.mp4 (15.1 MB)
MP4
01 introduction.mp4 (5.31 MB)
MP4
01 understanding-os-virtualization-security-and-concerns.mp4 (61.34 MB)
MP4
01 understanding-cloud-computing-and-its-benefits.mp4 (12.73 MB)
MP4
01 overview-of-cloud-deployment-models.mp4 (20.34 MB)
MP4
01 introduction.mp4 (5.71 MB)
MP4
01 understanding-the-components-of-a-wireless-network.mp4 (16.15 MB)
MP4
01 overview-of-wireless-network-encryption-mechanisms.mp4 (25.02 MB)
MP4
01 introduction.mp4 (5.32 MB)
MP4
01 understanding-the-various-mobile-device-connection-methods.mp4 (14.49 MB)
MP4
01 understanding-the-concepts-of-mobile-device-management.mp4 (14.44 MB)
MP4
01 introduction.mp4 (5.98 MB)
MP4
01 overview-of-iot-application-areas-and-iot-devices.mp4 (21.96 MB)
MP4
01 understanding-the-security-in-iot-enabled-environments.mp4 (20.03 MB)
MP4
01 overview-of-iot-device-management.mp4 (3.92 MB)
MP4
01 understanding-the-best-practices-and-tools-for-iot-security.mp4 (9.17 MB)
MP4
01 introduction.mp4 (5.44 MB)
MP4
01 understanding-cryptographic-techniques.mp4 (29.96 MB)
MP4
01 understanding-the-different-encryption-algorithms.mp4 (21.48 MB)
MP4
01 understanding-the-different-hashing-algorithms.mp4 (16.08 MB)
MP4
01 introduction.mp4 (4.85 MB)
MP4
01 understanding-data-security-and-its-importance.mp4 (23.04 MB)
MP4
01 understanding-the-different-data-security-technologies.mp4 (10.76 MB)
MP4
01 understanding-the-data-loss-prevention-dlp-and-dlp-solutions.mp4 (13.09 MB)
MP4
01 introduction.mp4 (5.52 MB)
MP4
01 understanding-the-network-traffic-signatures.mp4 (12.37 MB)
MP4
01 overview-of-attack-signature-analysis-techniques.mp4 (5.76 MB)
MP4
01 understanding-network-monitoring-for-suspicious-traffic.mp4 (31.4 MB)
MP4
01 overview-of-various-network-monitoring-tools.mp4 (5.42 MB)
MP4

https://thumbs2.imgbox.com/cb/91/Eq5GlN1O_t.jpg

https://img87.pixhost.to/images/1010/363506399_rg.png
Cybersecurity Attack and Defense Fundamentals Specialization.z01

Код:
https://rapidgator.net/file/830cc9a09869082a2713053a159ac7f2/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.z01

Cybersecurity Attack and Defense Fundamentals Specialization.z02

Код:
https://rapidgator.net/file/1f96528923ddc065441ef9e97132cab9/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.z02

Cybersecurity Attack and Defense Fundamentals Specialization.zip

Код:
https://rapidgator.net/file/b801f3d10b278a001e431d16b318292a/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.zip

https://img88.pixhost.to/images/1104/374887060_banner_240-32.png
Cybersecurity Attack and Defense Fundamentals Specialization.z01

Код:
https://ddownload.com/b3p2jc8hi3o8/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.z01

Cybersecurity Attack and Defense Fundamentals Specialization.z02

Код:
https://ddownload.com/ggaj7coyzrdh/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.z02

Cybersecurity Attack and Defense Fundamentals Specialization.zip

Код:
https://ddownload.com/lb7qju5sb1z9/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.zip

https://t89.pixhost.to/thumbs/773/382702167_dropapk-download скачать-dark.png
Cybersecurity Attack and Defense Fundamentals Specialization.z01

Код:
https://drop.download скачать/5j68z63liydf/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.z01

Cybersecurity Attack and Defense Fundamentals Specialization.z02

Код:
https://drop.download скачать/3rf6hk6gctsg/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.z02

Cybersecurity Attack and Defense Fundamentals Specialization.zip

Код:
https://drop.download скачать/4arnbgqrm210/Cybersecurity_Attack_and_Defense_Fundamentals_Specialization.zip