https://img87.pixhost.to/images/599/359020115_tuto.jpg
3.28 GB | 00:23:06 | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
001  Introduction  (3.9 MB)
001  Learning objectives  (2.9 MB)
002  1 1 Threat actors Part 1  (51.04 MB)
003  1 2 Threat actors Part 2  (16.78 MB)
004  1 3 Confidence levels  (18.18 MB)
005  1 4 Threat hunting  (17.37 MB)
001  Learning objectives  (5.63 MB)
002  2 1 Network-related  (73.56 MB)
003  2 2 Host-related  (39.26 MB)
004  2 3 Application-related  (12.74 MB)
005  2 4 Malicious Activity Indicators  (22.47 MB)
001  Learning objectives  (3.94 MB)
002  3 1 Tools Part 1  (39.36 MB)
003  3 2 Tools Part 2  (37.08 MB)
004  3 3 Common techniques Part 1  (54.28 MB)
005  3 4 Common techniques Part 2  (48.73 MB)
006  3 5 Common techniques Part 3  (60.75 MB)
007  3 6 Programming languagesscripting  (23.92 MB)
001  Learning objectives  (2.44 MB)
002  4 1 Cyber kill chains  (21.51 MB)
003  4 2 Diamond Model of Intrusion Analysis  (9.61 MB)
004  4 3 MITRE ATT&CK Part 1  (32.69 MB)
005  4 4 MITRE ATT&CK Part 2  (36.41 MB)
006  4 5 Open Source Security Testing Methodology Manual (OSS TMM)  (5.07 MB)
007  4 6 OWASP Testing Guide  (15.4 MB)
001  Learning objectives  (3.7 MB)
002  5 1 Attack Frameworks Part 1  (35.26 MB)
003  5 2 Attack Frameworks Part 2  (22.07 MB)
004  5 3 Threat Research  (15.24 MB)
006  5 5 Wireless Analysis Techniques  (18.12 MB)
001  Learning objectives  (2.07 MB)
002  6 1 Understanding Results  (17.99 MB)
003  6 2 Web Application Scanners  (4.07 MB)
004  6 3 Infrastructure Vulnerability Scanner  (8.57 MB)
005  6 4 Software Assessment Tools and Techniques  (2.69 MB)
006  6 5 Wireless Assessment  (8.08 MB)
007  6 6 Cloud Infrastructure Assessment  (3.65 MB)
001  Learning objectives  (2.09 MB)
002  7 1 Mobile  (10.89 MB)
005  7 4 APTs  (24.94 MB)
007  7 6 SOC and FPGA  (48.13 MB)
008  7 7 Physical Access Control  (3.52 MB)
011  7 10 Defending Critical Infrastructure  (37.18 MB)
014  7 13 Verifications and Quality Controls  (25.27 MB)
001  Threat Intelligence and Threat Hunting Summary  (1.14 MB)
001  Introduction  (4.55 MB)
001  Learning objectives  (1.69 MB)
002  1 1 Privacy vs  Security  (15.62 MB)
003  1 2 Non-technical Controls  (13.81 MB)
004  1 3 Classification, Ownership, Retention, and Data Types  (26.47 MB)
005  1 4 Confidentiality, Legal Requirements, and Data Sovereignty  (21.11 MB)
006  1 5 Data Minimization, Purpose Limitation, and NDA  (3.71 MB)
007  1 6 Technical Controls  (2.79 MB)
008  1 7 Encryption  (12.54 MB)
009  1 8 Data Loss Prevention (DLP)  (1.9 MB)
010  1 9 Data Masking and Deidentification  (7.22 MB)
011  1 10 Tokenization  (3.11 MB)
012  1 11 Digital Rights Management (DRM) and Watermarking  (7.7 MB)
013  1 12 Geographic Access Requirements  (5.93 MB)
014  1 13 Access Controls  (2.8 MB)
001  Learning objectives  (1.87 MB)
002  2 1 Business Impact and Risk Calculation  (2.95 MB)
003  2 2 Communication Risk Factors and Risk Prioritization  (13.87 MB)
004  2 3 System Assessments  (8.55 MB)
005  2 4 Compensating Controls and Training - Part 1  (26.11 MB)
006  2 5 Compensating Controls and Training - Part 2  (18.04 MB)
007  2 6 Supply Chain Assessment  (8.63 MB)
001  Learning objectives  (1.9 MB)
002  3 1 Frameworks  (5.82 MB)
003  3 2 AUP, Password Policies, Data Ownership, and Other Procedures  (21.47 MB)
004  3 3 Control Types  (21.47 MB)
005  3 4 Audits and Assessments  (10.83 MB)
001  Learning objectives  (1.7 MB)
002  4 1 Event Logs  (6.15 MB)
003  4 2 Syslogs  (18.76 MB)
004  4 3 Firewall Logs  (23.51 MB)
005  4 4 Web Application Firewall (WAF)  (18.09 MB)
006  4 5 Proxy  (34.94 MB)
007  4 6 Intrusion Detection and Prevention (IDSIPS)  (21.76 MB)
008  4 7 Impact Analysis  (48.63 MB)
009  4 8 Organizations Impact vs  Localized Impact  (3.59 MB)
010  4 9 Immediate vs  Total  (2.84 MB)
001  Learning objectives  (1.72 MB)
002  5 1 Security Information and Event Management (SIEM) - Part 1  (16.61 MB)
003  5 2 Security Information and Event Management (SIEM) - Part 2  (30.7 MB)
004  5 3 Rule Writing  (10.68 MB)
005  5 4 Known-bad Internet Protocol (IP)  (8.64 MB)
001  Learning objectives  (1.92 MB)
002  6 1 Malicious Payload  (28.43 MB)
003  6 2 Domain Keys Identified Mail (DKIM)  (19.43 MB)
004  6 3 Domain-based Message  (15.33 MB)
005  6 4 Embedded Links  (7.41 MB)
006  6 5 Impersonation  (2.79 MB)
007  6 6 Header  (7.17 MB)
001  Learning objectives  (2.17 MB)
002  7 1 Workflow Orchestration  (20.08 MB)
003  7 2 Security Orchestration  (5.99 MB)
004  7 3 Security Orchestration, Automation, and Response (SOAR)  (9.49 MB)
005  7 4 Scripting  (4.69 MB)
006  7 5 Application Programming Interface (API) Integration  (8.26 MB)
007  7 6 Automated Malware Signature Creation  (3.92 MB)
008  7 7 Data Encrichment  (7.3 MB)
009  7 8 Threat Feed Combination  (4.99 MB)
010  7 9 Machine Learning  (35.56 MB)
011  7 10 Security Content Automation Protocol (SCAP)  (4.85 MB)
012  7 11 Continuous Integration  (6.51 MB)
013  7 12 Continuous Deployment and Delivery  (3.39 MB)
001  System and Privacy Data Protection Summary  (3 MB)
001  Introduction  (4.09 MB)
001  Learning objectives  (1.36 MB)
002  1 1 Malware Threat Landscape  (86.63 MB)
003  1 2 Malware Analysis  (11.04 MB)
004  1 3 Malware Analysis Overview  (13.26 MB)
001  Learning objectives  (1.4 MB)
002  2 1 Why Set Up a Malware Lab  (21.62 MB)
003  2 2 How to Correctly Set Up a Lab  (33.78 MB)
001  Learning objectives  (3.11 MB)
002  3 1 Cuckoo Sandbox  (16.78 MB)
003  3 2 Other Sandbox Systems  (2.2 MB)
004  3 3 Networking and Internet Connections  (11.63 MB)
005  3 4 Sandbox and Network  (24.66 MB)
001  Learning objectives  (1.58 MB)
002  4 1 Wireshark  (14.8 MB)
003  4 2 Column Setup  (15.91 MB)
001  Learning objectives  (2.37 MB)
002  5 1 PE File Format  (7.01 MB)
003  5 2 Image Header  (6.48 MB)
004  5 3 Entry Points  (59.54 MB)
001  Learning objectives  (2.18 MB)
002  6 1 Registry Persistence  (13.91 MB)
003  6 2 Analyzing for Persistence  (11.09 MB)
004  6 3 Other Techniques  (15.42 MB)
001  Learning objectives  (1.8 MB)
002  7 1 What to Look for  (16.41 MB)
001  Malware and Incident Response LiveLessons Summary  (3.41 MB)
001  Introduction  (3.34 MB)
001  Learning objectives  (3.99 MB)
002  1 1 Log ingestion Part 1  (101.11 MB)
003  1 2 Log ingestion Part 2  (112.42 MB)
004  1 3 Operating system (OS) concepts  (49.65 MB)
005  1 4 Infrastructure concepts  (85.15 MB)
006  1 5 Network architecture  (47.78 MB)
007  1 6 Identity and access management  (114.75 MB)
008  1 7 Encryption  (72.49 MB)
009  1 8 Sensitive data protection  (20.97 MB)
001  Learning objectives  (2.56 MB)
002  2 1 Standardize processes  (32.74 MB)
003  2 2 Streamline operations  (18.3 MB)
004  2 3 Technology and tool integration  (83.12 MB)
001  Learning objectives  (4.23 MB)
002  3 1 Cross-site scripting  (11.82 MB)
003  3 2 Overflow vulnerabilities  (17.11 MB)
004  3 3 Data poisoning  (16.09 MB)
005  3 4 Broken access control  (16.39 MB)
006  3 5 Cryptographic failures  (22.65 MB)
007  3 6 Injection flaws  (16.69 MB)
008  3 7 Cross-site request forgery  (17.28 MB)
009  3 8 Directory traversal  (19.34 MB)
010  3 9 Insecure design  (14.77 MB)
011  3 10 Security misconfiguration  (6.34 MB)
012  3 11 End-of-life or outdated components  (13.76 MB)
013  3 12 Identification and authentication failures  (26.14 MB)
014  3 13 Server-side request forgery  (11.64 MB)
015  3 14 Remote code execution  (19.36 MB)
016  3 15 Privilege escalation  (25.06 MB)
001  Learning objectives  (2.54 MB)
002  4 1 Compensating controls  (7.18 MB)
003  4 2 Control types  (23.01 MB)
004  4 3 Patching and configuration management  (14.8 MB)
005  4 4 Maintenance windows  (19.69 MB)
006  4 5 Exceptions  (14.64 MB)
007  4 6 Risk management principles  (31.6 MB)
008  4 7 Policies, governance, and service-level objectives (SLOs)  (8.93 MB)
009  4 8 Prioritization and escalation  (10.63 MB)
010  4 9 Attack surface management  (23.43 MB)
011  4 10 Secure coding best practices  (37.39 MB)
012  4 11 Secure software development life cycle (SDLC)  (31.74 MB)
013  4 12 Threat modeling  (41.62 MB)
001  Secure Operations and Protections Summary  (1.29 MB)]
Screenshot
https://images2.imgbox.com/84/a9/jHfG89Cd_o.jpg


DDownload

Код:
https://ddownload.com/k8bm5avblxr5/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part1.rar
https://ddownload.com/4a1pmkmuvz2n/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part2.rar

RapidGator

Код:
https://rapidgator.net/file/17b10e3833aabdbd41b69e2187229267/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part1.rar
https://rapidgator.net/file/bbe97b2ccfb8cb1e88945eccd9e7fe49/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part2.rar

TurboBit

Код:
https://turbobit.net/knjflowrwlei/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part1.rar.html
https://turbobit.net/2l9z3mbfwc76/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part2.rar.html