Advanced Persistent Threats - The Big Picture/1. Course Overview/01. Course Overview.mp4 |
4.9 MB |
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/02. Introduction.mp4 |
5.1 MB |
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/03. Meeting Your Case Study - Globomantics.mp4 |
1.3 MB |
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/04. What Is an Advanced Persistent Threat.mp4 |
8.6 MB |
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/05. The Eight Characteristics of APTs.mp4 |
11.6 MB |
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/06. Why Is Classifying Every Threat as an APT a Bad Idea.mp4 |
3.7 MB |
Advanced Persistent Threats - The Big Picture/2. What Is an Advanced Persistent Threat/07. Summary.mp4 |
1.1 MB |
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/08. Overview.mp4 |
2.2 MB |
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/09. Stuxnet - A Life.mp4 |
11.4 MB |
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/10. Red October.mp4 |
11.9 MB |
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/11. FinFisher and FinSpy - If You Can Pay, It's Yours.mp4 |
5.6 MB |
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/12. The DDos Attack on ProtonMail.mp4 |
4.5 MB |
Advanced Persistent Threats - The Big Picture/3. Understanding the History of APTs/13. Summary.mp4 |
788 KB |
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/14. Overview.mp4 |
3.1 MB |
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/15. The Kill Chain.mp4 |
11.2 MB |
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/16. Non-conventional Threats.mp4 |
5.4 MB |
Advanced Persistent Threats - The Big Picture/4. How Does an APT Work/17. Summary.mp4 |
917 KB |
Advanced Persistent Threats - The Big Picture/5. Who Are They, and Why Do They Do What They Do/18. Overview.mp4 |
2.4 MB |
Advanced Persistent Threats - The Big Picture/5. Who Are They, and Why Do They Do What They Do/19. Am I at Risk from APTs.mp4 |
13.3 MB |
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/20. Overview.mp4 |
2.1 MB |
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/21. Detecting APTs - The Bigger Picture.mp4 |
2.7 MB |
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/22. Examining Some Practical Detection Mechanisms.mp4 |
19.8 MB |
Advanced Persistent Threats - The Big Picture/6. How Do You Detect APTs/23. Summary.mp4 |
1 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/24. The Security Onion.mp4 |
4.5 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/25. Understanding Defence with the OSI Layers.mp4 |
1.3 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/26. Defense at the Physical Layer.mp4 |
8.5 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/27. Defense at the Data Link Layer.mp4 |
2.1 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/28. Defense at the Network Layer.mp4 |
5.2 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/29. Securing the Presentation Layer.mp4 |
4.1 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/30. Defense at the Application Layer and AV Solutions.mp4 |
8.2 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/31. Advanced Network Security.mp4 |
4.2 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/32. Advanced Physical Security.mp4 |
5 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/33. Infrastructural and Application Security.mp4 |
2.8 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/34. Summary.mp4 |
1 MB |
Advanced Persistent Threats - The Big Picture/7. Defending Against APTs - Best Practices and Mitigation Strategies/35. Course Summary.mp4 |
2.7 MB |
Advanced Persistent Threats - The Big Picture/advanced-persistent-threats-big-picture.zip |
6 MB |