BITCQ

Advanced Persistent Threats - The Big Picture

Size: 190.3 MB
Magnet link

Name Size
Advanced Persistent Threats - The Big Picture/1. Course Overview/01. Course Overview.mp4 4.9 MB
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/02. Introduction.mp4 5.1 MB
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/03. Meeting Your Case Study - Globomantics.mp4 1.3 MB
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/04. What Is an Advanced Persistent Threat.mp4 8.6 MB
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/05. The Eight Characteristics of APTs.mp4 11.6 MB
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/06. Why Is Classifying Every Threat as an APT a Bad Idea.mp4 3.7 MB
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/07. Summary.mp4 1.1 MB
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/08. Overview.mp4 2.2 MB
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/09. Stuxnet - A Life.mp4 11.4 MB
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/10. Red October.mp4 11.9 MB
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/11. FinFisher and FinSpy - If You Can Pay, It's Yours.mp4 5.6 MB
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/12. The DDos Attack on ProtonMail.mp4 4.5 MB
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/13. Summary.mp4 788 KB
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/14. Overview.mp4 3.1 MB
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/15. The Kill Chain.mp4 11.2 MB
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/16. Non-conventional Threats.mp4 5.4 MB
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/17. Summary.mp4 917 KB
Advanced Persistent Threats - The Big Picture/5. Who Are They, and Why Do They Do What They Do/18. Overview.mp4 2.4 MB
Advanced Persistent Threats - The Big Picture/5. Who Are They, and Why Do They Do What They Do/19. Am I at Risk from APTs.mp4 13.3 MB
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/20. Overview.mp4 2.1 MB
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/21. Detecting APTs - The Bigger Picture.mp4 2.7 MB
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/22. Examining Some Practical Detection Mechanisms.mp4 19.8 MB
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/23. Summary.mp4 1 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/24. The Security Onion.mp4 4.5 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/25. Understanding Defence with the OSI Layers.mp4 1.3 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/26. Defense at the Physical Layer.mp4 8.5 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/27. Defense at the Data Link Layer.mp4 2.1 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/28. Defense at the Network Layer.mp4 5.2 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/29. Securing the Presentation Layer.mp4 4.1 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/30. Defense at the Application Layer and AV Solutions.mp4 8.2 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/31. Advanced Network Security.mp4 4.2 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/32. Advanced Physical Security.mp4 5 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/33. Infrastructural and Application Security.mp4 2.8 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/34. Summary.mp4 1 MB
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/35. Course Summary.mp4 2.7 MB
Advanced Persistent Threats - The Big Picture/advanced-persistent-threats-big-picture.zip 6 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...