File | Dimensione |
---|
1. Introduction/1. Instructor introduction.mp4 | 4.13 MB |
1. Introduction/1. Instructor introduction.vtt | 1.19 kB |
1. Introduction/2. Course overview.mp4 | 18.73 MB |
1. Introduction/2. Course overview.vtt | 4.94 kB |
2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.mp4 | 161.40 MB |
2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.vtt | 29.57 kB |
2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.mp4 | 51.00 MB |
2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.vtt | 12.84 kB |
2. Understanding the cybersecurity landscape/3. Cost of Breach.mp4 | 56.71 MB |
2. Understanding the cybersecurity landscape/3. Cost of Breach.vtt | 10.55 kB |
2. Understanding the cybersecurity landscape/4. Section 2 Quiz.html | 139.00 B |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.mp4 | 28.96 MB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.vtt | 8.53 kB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.mp4 | 53.23 MB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.vtt | 16.68 kB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.mp4 | 135.84 MB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.vtt | 33.36 kB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.mp4 | 10.13 MB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.vtt | 3.14 kB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/4.1 Document Vulnerabilities.pdf.pdf | 657.19 kB |
3. Red Team Penetration, lateral movement, escalation, and exfiltration/5. Section 3 Quiz.html | 139.00 B |
4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.mp4 | 21.84 MB |
4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.vtt | 6.64 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/1.1 BlueTeam.pdf.pdf | 657.19 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.mp4 | 67.02 MB |
4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.vtt | 17.66 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/2.1 BlueTeamKillChain.pdf.pdf | 679.17 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.mp4 | 57.09 MB |
4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.vtt | 12.23 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/3.1 RestrictPrivilegeEscalation.pdf.pdf | 676.53 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.mp4 | 40.99 MB |
4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.vtt | 11.41 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/4.1 RestrictLateralMovement.pdf.pdf | 673.85 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.mp4 | 85.72 MB |
4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.vtt | 21.94 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/5.1 Azure Security Center.html | 137.00 B |
4. Blue Team Detection, Investigation, Response and Mitigation/5.2 AttackDetection.pdf.pdf | 692.71 kB |
4. Blue Team Detection, Investigation, Response and Mitigation/5.3 Windows Defender ATP.html | 193.00 B |
4. Blue Team Detection, Investigation, Response and Mitigation/5.4 Microsoft ATA.html | 133.00 B |
4. Blue Team Detection, Investigation, Response and Mitigation/5.5 Office 365 ATP.html | 137.00 B |
4. Blue Team Detection, Investigation, Response and Mitigation/5.6 Azure ATP.html | 138.00 B |
4. Blue Team Detection, Investigation, Response and Mitigation/6. Section 4 Quiz.html | 139.00 B |
5. Beyond The Breach/1. CIA Triad.mp4 | 29.25 MB |
5. Beyond The Breach/1. CIA Triad.vtt | 11.57 kB |
5. Beyond The Breach/1.1 Azure Information Protection.html | 193.00 B |
5. Beyond The Breach/1.2 CIA Triad.pdf.pdf | 654.62 kB |
5. Beyond The Breach/2. Organization Preparations.mp4 | 65.36 MB |
5. Beyond The Breach/2. Organization Preparations.vtt | 13.49 kB |
5. Beyond The Breach/2.1 Security Compliance Toolkit.html | 159.00 B |
5. Beyond The Breach/2.2 Organization Preparations.pdf.pdf | 657.31 kB |
5. Beyond The Breach/3. Developing and Maintaining Policies.mp4 | 48.31 MB |
5. Beyond The Breach/3. Developing and Maintaining Policies.vtt | 14.60 kB |
5. Beyond The Breach/3.1 DevelopingPolicies.pdf.pdf | 651.16 kB |
5. Beyond The Breach/4. Section 5 Quiz.html | 139.00 B |
5. Beyond The Breach/vz | 0.00 B |
6. Final Exam/1. Final Exam.html | 139.00 B |
Discuss.FreeTutorials.Us.html | 165.68 kB |
FreeCoursesOnline.Me.html | 108.30 kB |
FreeTutorials.Eu.html | 102.23 kB |
How you can help Team-FTU.txt | 259.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
[TGx]Downloaded from torrentgalaxy.org.txt | 524.00 B |