https://img100.pixhost.to/images/617/539499712_359020115_tuto.jpg
3.28 GB | 23min 6s | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
FileName :001  Introduction.mp4 | Size:  (3.9 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.9 MB)
FileName :002  1 1 Threat actors Part 1.mp4 | Size:  (51.04 MB)
FileName :003  1 2 Threat actors Part 2.mp4 | Size:  (16.78 MB)
FileName :004  1 3 Confidence levels.mp4 | Size:  (18.18 MB)
FileName :005  1 4 Threat hunting.mp4 | Size:  (17.37 MB)
FileName :001  Learning objectives.mp4 | Size:  (5.63 MB)
FileName :002  2 1 Network-related.mp4 | Size:  (73.56 MB)
FileName :003  2 2 Host-related.mp4 | Size:  (39.26 MB)
FileName :004  2 3 Application-related.mp4 | Size:  (12.74 MB)
FileName :005  2 4 Malicious Activity Indicators.mp4 | Size:  (22.47 MB)
FileName :001  Learning objectives.mp4 | Size:  (3.94 MB)
FileName :002  3 1 Tools Part 1.mp4 | Size:  (39.36 MB)
FileName :003  3 2 Tools Part 2.mp4 | Size:  (37.08 MB)
FileName :004  3 3 Common techniques Part 1.mp4 | Size:  (54.28 MB)
FileName :005  3 4 Common techniques Part 2.mp4 | Size:  (48.73 MB)
FileName :006  3 5 Common techniques Part 3.mp4 | Size:  (60.75 MB)
FileName :007  3 6 Programming languagesscripting.mp4 | Size:  (23.92 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.44 MB)
FileName :002  4 1 Cyber kill chains.mp4 | Size:  (21.51 MB)
FileName :003  4 2 Diamond Model of Intrusion Analysis.mp4 | Size:  (9.61 MB)
FileName :004  4 3 MITRE ATT&CK Part 1.mp4 | Size:  (32.69 MB)
FileName :005  4 4 MITRE ATT&CK Part 2.mp4 | Size:  (36.41 MB)
FileName :006  4 5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 | Size:  (5.07 MB)
FileName :007  4 6 OWASP Testing Guide.mp4 | Size:  (15.4 MB)
FileName :001  Learning objectives.mp4 | Size:  (3.7 MB)
FileName :002  5 1 Attack Frameworks Part 1.mp4 | Size:  (35.26 MB)
FileName :003  5 2 Attack Frameworks Part 2.mp4 | Size:  (22.07 MB)
FileName :004  5 3 Threat Research.mp4 | Size:  (15.24 MB)
FileName :006  5 5 Wireless Analysis Techniques.mp4 | Size:  (18.12 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.07 MB)
FileName :002  6 1 Understanding Results.mp4 | Size:  (17.99 MB)
FileName :003  6 2 Web Application Scanners.mp4 | Size:  (4.07 MB)
FileName :004  6 3 Infrastructure Vulnerability Scanner.mp4 | Size:  (8.57 MB)
FileName :005  6 4 Software Assessment Tools and Techniques.mp4 | Size:  (2.69 MB)
FileName :006  6 5 Wireless Assessment.mp4 | Size:  (8.08 MB)
FileName :007  6 6 Cloud Infrastructure Assessment.mp4 | Size:  (3.65 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.09 MB)
FileName :002  7 1 Mobile.mp4 | Size:  (10.89 MB)
FileName :005  7 4 APTs.mp4 | Size:  (24.94 MB)
FileName :007  7 6 SOC and FPGA.mp4 | Size:  (48.13 MB)
FileName :008  7 7 Physical Access Control.mp4 | Size:  (3.52 MB)
FileName :011  7 10 Defending Critical Infrastructure.mp4 | Size:  (37.18 MB)
FileName :014  7 13 Verifications and Quality Controls.mp4 | Size:  (25.27 MB)
FileName :001  Threat Intelligence and Threat Hunting Summary.mp4 | Size:  (1.14 MB)
FileName :001  Introduction.mp4 | Size:  (4.55 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.69 MB)
FileName :002  1 1 Privacy vs  Security.mp4 | Size:  (15.62 MB)
FileName :003  1 2 Non-technical Controls.mp4 | Size:  (13.81 MB)
FileName :004  1 3 Classification, Ownership, Retention, and Data Types.mp4 | Size:  (26.47 MB)
FileName :005  1 4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4 | Size:  (21.11 MB)
FileName :006  1 5 Data Minimization, Purpose Limitation, and NDA.mp4 | Size:  (3.71 MB)
FileName :007  1 6 Technical Controls.mp4 | Size:  (2.79 MB)
FileName :008  1 7 Encryption.mp4 | Size:  (12.54 MB)
FileName :009  1 8 Data Loss Prevention (DLP).mp4 | Size:  (1.9 MB)
FileName :010  1 9 Data Masking and Deidentification.mp4 | Size:  (7.22 MB)
FileName :011  1 10 Tokenization.mp4 | Size:  (3.11 MB)
FileName :012  1 11 Digital Rights Management (DRM) and Watermarking.mp4 | Size:  (7.7 MB)
FileName :013  1 12 Geographic Access Requirements.mp4 | Size:  (5.93 MB)
FileName :014  1 13 Access Controls.mp4 | Size:  (2.8 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.87 MB)
FileName :002  2 1 Business Impact and Risk Calculation.mp4 | Size:  (2.95 MB)
FileName :003  2 2 Communication Risk Factors and Risk Prioritization.mp4 | Size:  (13.87 MB)
FileName :004  2 3 System Assessments.mp4 | Size:  (8.55 MB)
FileName :005  2 4 Compensating Controls and Training - Part 1.mp4 | Size:  (26.11 MB)
FileName :006  2 5 Compensating Controls and Training - Part 2.mp4 | Size:  (18.04 MB)
FileName :007  2 6 Supply Chain Assessment.mp4 | Size:  (8.63 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.9 MB)
FileName :002  3 1 Frameworks.mp4 | Size:  (5.82 MB)
FileName :003  3 2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4 | Size:  (21.47 MB)
FileName :004  3 3 Control Types.mp4 | Size:  (21.47 MB)
FileName :005  3 4 Audits and Assessments.mp4 | Size:  (10.83 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.7 MB)
FileName :002  4 1 Event Logs.mp4 | Size:  (6.15 MB)
FileName :003  4 2 Syslogs.mp4 | Size:  (18.76 MB)
FileName :004  4 3 Firewall Logs.mp4 | Size:  (23.51 MB)
FileName :005  4 4 Web Application Firewall (WAF).mp4 | Size:  (18.09 MB)
FileName :006  4 5 Proxy.mp4 | Size:  (34.94 MB)
FileName :007  4 6 Intrusion Detection and Prevention (IDSIPS).mp4 | Size:  (21.76 MB)
FileName :008  4 7 Impact Analysis.mp4 | Size:  (48.63 MB)
FileName :009  4 8 Organizations Impact vs  Localized Impact.mp4 | Size:  (3.59 MB)
FileName :010  4 9 Immediate vs  Total.mp4 | Size:  (2.84 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.72 MB)
FileName :002  5 1 Security Information and Event Management (SIEM) - Part 1.mp4 | Size:  (16.61 MB)
FileName :003  5 2 Security Information and Event Management (SIEM) - Part 2.mp4 | Size:  (30.7 MB)
FileName :004  5 3 Rule Writing.mp4 | Size:  (10.68 MB)
FileName :005  5 4 Known-bad Internet Protocol (IP).mp4 | Size:  (8.64 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.92 MB)
FileName :002  6 1 Malicious Payload.mp4 | Size:  (28.43 MB)
FileName :003  6 2 Domain Keys Identified Mail (DKIM).mp4 | Size:  (19.43 MB)
FileName :004  6 3 Domain-based Message.mp4 | Size:  (15.33 MB)
FileName :005  6 4 Embedded Links.mp4 | Size:  (7.41 MB)
FileName :006  6 5 Impersonation.mp4 | Size:  (2.79 MB)
FileName :007  6 6 Header.mp4 | Size:  (7.17 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.17 MB)
FileName :002  7 1 Workflow Orchestration.mp4 | Size:  (20.08 MB)
FileName :003  7 2 Security Orchestration.mp4 | Size:  (5.99 MB)
FileName :004  7 3 Security Orchestration, Automation, and Response (SOAR).mp4 | Size:  (9.49 MB)
FileName :005  7 4 Scripting.mp4 | Size:  (4.69 MB)
FileName :006  7 5 Application Programming Interface (API) Integration.mp4 | Size:  (8.26 MB)
FileName :007  7 6 Automated Malware Signature Creation.mp4 | Size:  (3.92 MB)
FileName :008  7 7 Data Encrichment.mp4 | Size:  (7.3 MB)
FileName :009  7 8 Threat Feed Combination.mp4 | Size:  (4.99 MB)
FileName :010  7 9 Machine Learning.mp4 | Size:  (35.56 MB)
FileName :011  7 10 Security Content Automation Protocol (SCAP).mp4 | Size:  (4.85 MB)
FileName :012  7 11 Continuous Integration.mp4 | Size:  (6.51 MB)
FileName :013  7 12 Continuous Deployment and Delivery.mp4 | Size:  (3.39 MB)
FileName :001  System and Privacy Data Protection Summary.mp4 | Size:  (3 MB)
FileName :001  Introduction.mp4 | Size:  (4.09 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.36 MB)
FileName :002  1 1 Malware Threat Landscape.mp4 | Size:  (86.63 MB)
FileName :003  1 2 Malware Analysis.mp4 | Size:  (11.04 MB)
FileName :004  1 3 Malware Analysis Overview.mp4 | Size:  (13.26 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.4 MB)
FileName :002  2 1 Why Set Up a Malware Lab.mp4 | Size:  (21.62 MB)
FileName :003  2 2 How to Correctly Set Up a Lab.mp4 | Size:  (33.78 MB)
FileName :001  Learning objectives.mp4 | Size:  (3.11 MB)
FileName :002  3 1 Cuckoo Sandbox.mp4 | Size:  (16.78 MB)
FileName :003  3 2 Other Sandbox Systems.mp4 | Size:  (2.2 MB)
FileName :004  3 3 Networking and Internet Connections.mp4 | Size:  (11.63 MB)
FileName :005  3 4 Sandbox and Network.mp4 | Size:  (24.66 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.58 MB)
FileName :002  4 1 Wireshark.mp4 | Size:  (14.8 MB)
FileName :003  4 2 Column Setup.mp4 | Size:  (15.91 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.37 MB)
FileName :002  5 1 PE File Format.mp4 | Size:  (7.01 MB)
FileName :003  5 2 Image Header.mp4 | Size:  (6.48 MB)
FileName :004  5 3 Entry Points.mp4 | Size:  (59.54 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.18 MB)
FileName :002  6 1 Registry Persistence.mp4 | Size:  (13.91 MB)
FileName :003  6 2 Analyzing for Persistence.mp4 | Size:  (11.09 MB)
FileName :004  6 3 Other Techniques.mp4 | Size:  (15.42 MB)
FileName :001  Learning objectives.mp4 | Size:  (1.8 MB)
FileName :002  7 1 What to Look for.mp4 | Size:  (16.41 MB)
FileName :001  Malware and Incident Response LiveLessons Summary.mp4 | Size:  (3.41 MB)
FileName :001  Introduction.mp4 | Size:  (3.34 MB)
FileName :001  Learning objectives.mp4 | Size:  (3.99 MB)
FileName :002  1 1 Log ingestion Part 1.mp4 | Size:  (101.11 MB)
FileName :003  1 2 Log ingestion Part 2.mp4 | Size:  (112.42 MB)
FileName :004  1 3 Operating system (OS) concepts.mp4 | Size:  (49.65 MB)
FileName :005  1 4 Infrastructure concepts.mp4 | Size:  (85.15 MB)
FileName :006  1 5 Network architecture.mp4 | Size:  (47.78 MB)
FileName :007  1 6 Identity and access management.mp4 | Size:  (114.75 MB)
FileName :008  1 7 Encryption.mp4 | Size:  (72.49 MB)
FileName :009  1 8 Sensitive data protection.mp4 | Size:  (20.97 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.56 MB)
FileName :002  2 1 Standardize processes.mp4 | Size:  (32.74 MB)
FileName :003  2 2 Streamline operations.mp4 | Size:  (18.3 MB)
FileName :004  2 3 Technology and tool integration.mp4 | Size:  (83.12 MB)
FileName :001  Learning objectives.mp4 | Size:  (4.23 MB)
FileName :002  3 1 Cross-site scripting.mp4 | Size:  (11.82 MB)
FileName :003  3 2 Overflow vulnerabilities.mp4 | Size:  (17.11 MB)
FileName :004  3 3 Data poisoning.mp4 | Size:  (16.09 MB)
FileName :005  3 4 Broken access control.mp4 | Size:  (16.39 MB)
FileName :006  3 5 Cryptographic failures.mp4 | Size:  (22.65 MB)
FileName :007  3 6 Injection flaws.mp4 | Size:  (16.69 MB)
FileName :008  3 7 Cross-site request forgery.mp4 | Size:  (17.28 MB)
FileName :009  3 8 Directory traversal.mp4 | Size:  (19.34 MB)
FileName :010  3 9 Insecure design.mp4 | Size:  (14.77 MB)
FileName :011  3 10 Security misconfiguration.mp4 | Size:  (6.34 MB)
FileName :012  3 11 End-of-life or outdated components.mp4 | Size:  (13.76 MB)
FileName :013  3 12 Identification and authentication failures.mp4 | Size:  (26.14 MB)
FileName :014  3 13 Server-side request forgery.mp4 | Size:  (11.64 MB)
FileName :015  3 14 Remote code execution.mp4 | Size:  (19.36 MB)
FileName :016  3 15 Privilege escalation.mp4 | Size:  (25.06 MB)
FileName :001  Learning objectives.mp4 | Size:  (2.54 MB)
FileName :002  4 1 Compensating controls.mp4 | Size:  (7.18 MB)
FileName :003  4 2 Control types.mp4 | Size:  (23.01 MB)
FileName :004  4 3 Patching and configuration management.mp4 | Size:  (14.8 MB)
FileName :005  4 4 Maintenance windows.mp4 | Size:  (19.69 MB)
FileName :006  4 5 Exceptions.mp4 | Size:  (14.64 MB)
FileName :007  4 6 Risk management principles.mp4 | Size:  (31.6 MB)
FileName :008  4 7 Policies, governance, and service-level objectives (SLOs).mp4 | Size:  (8.93 MB)
FileName :009  4 8 Prioritization and escalation.mp4 | Size:  (10.63 MB)
FileName :010  4 9 Attack surface management.mp4 | Size:  (23.43 MB)
FileName :011  4 10 Secure coding best practices.mp4 | Size:  (37.39 MB)
FileName :012  4 11 Secure software development life cycle (SDLC).mp4 | Size:  (31.74 MB)
FileName :013  4 12 Threat modeling.mp4 | Size:  (41.62 MB)
FileName :001  Secure Operations and Protections Summary.mp4 | Size:  (1.29 MB)]
Screenshot
https://images2.imgbox.com/ed/82/2kzX3MTe_o.jpg



NitroFlare

Код:
https://nitroflare.com/view/EDC15EF4523E3FC/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part1.rar
https://nitroflare.com/view/A9F2D68C6E5FD2A/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part2.rar
https://nitroflare.com/view/E40A8ED533AE4AB/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part3.rar
https://nitroflare.com/view/1C9BF348D43BD02/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part4.rar

DDownload

Код:
https://ddownload.com/ido99xhb96cm/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part1.rar
https://ddownload.com/up866xa6wwxl/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part2.rar
https://ddownload.com/5btluqlfqc5j/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part3.rar
https://ddownload.com/jy5gycqlnj0o/Cybersecurity.Prevention.and.Detection.2nd.Edition.Video.Collection.part4.rar