589689.xyz

[] [UDEMY] SOC Analyst Cyber Security Intrusion Training from Scratch - [FTU]

  • 收录时间:2019-11-23 09:14:06
  • 文件大小:4GB
  • 下载次数:108
  • 最近下载:2021-01-18 16:45:06
  • 磁力链接:

文件列表

  1. 16. Module 16 Attacking Phases/4. Attacking Phase 4 Maintaining Access.mp4 306MB
  2. 16. Module 16 Attacking Phases/2. Attacking Phase 2 Scanning.mp4 279MB
  3. 17. SIEM Solution/4. SIEM Dashboard Usage & Creation.mp4 267MB
  4. 14. Module 14 IDS - Working, Detection & Evasion/1. Working, Detection & Evasion.mp4 204MB
  5. 16. Module 16 Attacking Phases/3. Attacking Phase 3 Attacking.mp4 201MB
  6. 16. Module 16 Attacking Phases/1. Attacking Phase 1 Reconnaissance.mp4 138MB
  7. 17. SIEM Solution/3. SIEM Hunting For Logs.mp4 133MB
  8. 7. Module 7 Windows & Linux/4. Windows Authentication.mp4 117MB
  9. 3. Module 3 Internet Layer & Transport Layer/2. What are the IP Header Fields.mp4 115MB
  10. 17. SIEM Solution/2. Logs Forwarding to SIEM.mp4 99MB
  11. 6. Module 6 UseCases/6. DOSDDOS Attack and Remediation.mp4 84MB
  12. 13. Module 13 Antivirus Working, Types & UseCase/2. USECASE - Virus Outbreak.mp4 81MB
  13. 17. SIEM Solution/1. SIEM Installation.mp4 80MB
  14. 8. Module 8 System Hacking/1. System Exploitation.mp4 80MB
  15. 2. Module 2 Foundation of BitBytes in Packets/5. Basics of Wireshark & Tshark.mp4 79MB
  16. 8. Module 8 System Hacking/3. Brute Force Attack.mp4 76MB
  17. 15. Module 15 Firewall Working, Types & Reporting/1. Working, Types and Reporting.mp4 74MB
  18. 9. Module 9 UseCases/1. Brute Force Attack - Part 1 & Remediation.mp4 73MB
  19. 10. Module 10 Web Application/2. Web Application Working.mp4 71MB
  20. 3. Module 3 Internet Layer & Transport Layer/5. What are the common attacks performed with Transport Layer.mp4 68MB
  21. 7. Module 7 Windows & Linux/1. Workgroup & Domain.mp4 67MB
  22. 3. Module 3 Internet Layer & Transport Layer/4. What are the Transport Header Fields.mp4 67MB
  23. 13. Module 13 Antivirus Working, Types & UseCase/1. Antivirus Working & Detection.mp4 65MB
  24. 2. Module 2 Foundation of BitBytes in Packets/2. MAC Address & IP Address.mp4 65MB
  25. 6. Module 6 UseCases/3. Port Scanning Attack and Remediation.mp4 60MB
  26. 6. Module 6 UseCases/2. Host Disovery Attcack and Remediation.mp4 59MB
  27. 7. Module 7 Windows & Linux/2. Cryptography.mp4 57MB
  28. 2. Module 2 Foundation of BitBytes in Packets/1. Bit, Hexadecimal & Bytes Represenation.mp4 56MB
  29. 8. Module 8 System Hacking/2. Malware Types.mp4 55MB
  30. 1. Module 1 Basic of Networks/3. OSI Model & TCP IP Protocol Suite.mp4 55MB
  31. 4. Module 4 UDP & ICMP Protocol/6. Common Attacks Performed with ICMP Protocol.mp4 54MB
  32. 7. Module 7 Windows & Linux/3. Windows Password.mp4 50MB
  33. 7. Module 7 Windows & Linux/6. Windows & Linux Logs.mp4 50MB
  34. 12. Module 12 UseCases/1. SQL Injection Attack & Remediation.mp4 48MB
  35. 9. Module 9 UseCases/6. Malware Detection & Remediation.mp4 47MB
  36. 7. Module 7 Windows & Linux/5. Linux Basics.mp4 47MB
  37. 6. Module 6 UseCases/5. Arp Poisoning & MITM Attack and Remediation.mp4 45MB
  38. 6. Module 6 UseCases/1. DNS Zone Transfer Attack and Remediation.mp4 45MB
  39. 9. Module 9 UseCases/4. Phishing Attack & Remediation.mp4 45MB
  40. 5. Module 5 Protcols & Ports/5. What Is HTTP & How does it works.mp4 41MB
  41. 1. Module 1 Basic of Networks/2. What is Networking.mp4 38MB
  42. 1. Module 1 Basic of Networks/5. Types of Network Security Devices and Working.mp4 36MB
  43. 12. Module 12 UseCases/2. XSS Injection Attack & Remediation.mp4 36MB
  44. 11. Module 11 Web Application Attack/2. Poodle Attack.mp4 34MB
  45. 1. Module 1 Basic of Networks/4. Types of Netowrk Device and Working.mp4 34MB
  46. 13. Module 13 Antivirus Working, Types & UseCase/3. Ransomware.mp4 33MB
  47. 6. Module 6 UseCases/4. Vulnerabilty Scanning Attack and Remediation.mp4 33MB
  48. 1. Module 1 Basic of Networks/1. Introduction Training Plan.mp4 33MB
  49. 5. Module 5 Protcols & Ports/8. What is DNS & How does it works.mp4 31MB
  50. 10. Module 10 Web Application/1. Web Application Introduction.mp4 29MB
  51. 13. Module 13 Antivirus Working, Types & UseCase/4. Conficker Worm.mp4 26MB
  52. 9. Module 9 UseCases/2. Brute Force Attack - Part 2 & Remediation.mp4 26MB
  53. 9. Module 9 UseCases/7. Zero Day Attack & Remediation.mp4 25MB
  54. 5. Module 5 Protcols & Ports/1. Protocols vs Ports.mp4 23MB
  55. 3. Module 3 Internet Layer & Transport Layer/1. What is the Internet Layer & IP Header.mp4 22MB
  56. 4. Module 4 UDP & ICMP Protocol/5. What are the ICMP Header Fields.mp4 22MB
  57. 9. Module 9 UseCases/3. Privilege Escalation attack & Remediation.mp4 21MB
  58. 11. Module 11 Web Application Attack/3. Heart bleed Attack.mp4 20MB
  59. 11. Module 11 Web Application Attack/4. Shellshock Attack.mp4 18MB
  60. 5. Module 5 Protcols & Ports/10. Basics of FTP, Telnet, SSH & SMTP.mp4 18MB
  61. 2. Module 2 Foundation of BitBytes in Packets/3. NAT.mp4 17MB
  62. 2. Module 2 Foundation of BitBytes in Packets/4. PAT.mp4 17MB
  63. 9. Module 9 UseCases/5. Multiple Geo Location Access & Remediation.mp4 16MB
  64. 4. Module 4 UDP & ICMP Protocol/3. What is the ICMP Protocol & ICMP Header.mp4 16MB
  65. 3. Module 3 Internet Layer & Transport Layer/3. What is the Transport Layer & TCP Header.mp4 15MB
  66. 4. Module 4 UDP & ICMP Protocol/2. What are the UDP Header Fields.mp4 15MB
  67. 5. Module 5 Protcols & Ports/2. What is ARP Protocol.mp4 14MB
  68. 12. Module 12 UseCases/3. CSRF Injection Attack & Remediation.mp4 14MB
  69. 4. Module 4 UDP & ICMP Protocol/1. What is UDP Protcol & UDP Header.mp4 14MB
  70. 11. Module 11 Web Application Attack/1. Web Application Attack.mp4 13MB
  71. 5. Module 5 Protcols & Ports/6. What is DHCP & How does it works.mp4 13MB
  72. 5. Module 5 Protcols & Ports/4. Client-Server Model.mp4 9MB
  73. Discuss.FreeTutorials.Us.html 166KB
  74. FreeCoursesOnline.Me.html 108KB
  75. FreeTutorials.Eu.html 102KB
  76. [TGx]Downloaded from torrentgalaxy.org.txt 524B
  77. How you can help Team-FTU.txt 259B
  78. 4. Module 4 UDP & ICMP Protocol/4. Packet Analysis with Wireshark - ICMP.html 165B
  79. 5. Module 5 Protcols & Ports/3. Packet Analysis with Wireshark.html 165B
  80. 5. Module 5 Protcols & Ports/7. Packet Analysis with Wireshark - DHCP.html 165B
  81. 5. Module 5 Protcols & Ports/9. Packet Analysis with Wireshark - DNS.html 165B
  82. Torrent Downloaded From GloDls.to.txt 84B
  83. 5. Module 5 Protcols & Ports/vz 0B