Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 |
114.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Introduction/001. Introduction.mp4 |
3.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/001. Learning objectives.en.srt |
964 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/001. Learning objectives.mp4 |
2.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.en.srt |
20 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 |
51 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/003. 1.2 Threat actors Part 2.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/003. 1.2 Threat actors Part 2.mp4 |
16.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/004. 1.3 Confidence levels.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/004. 1.3 Confidence levels.mp4 |
18.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/005. 1.4 Threat hunting.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/005. 1.4 Threat hunting.mp4 |
17.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/001. Learning objectives.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/001. Learning objectives.mp4 |
5.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.en.srt |
33 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 |
73.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/003. 2.2 Host-related.en.srt |
18 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/003. 2.2 Host-related.mp4 |
39.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/004. 2.3 Application-related.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/004. 2.3 Application-related.mp4 |
12.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/005. 2.4 Malicious Activity Indicators.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/005. 2.4 Malicious Activity Indicators.mp4 |
22.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/001. Learning objectives.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/001. Learning objectives.mp4 |
3.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/002. 3.1 Tools Part 1.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/002. 3.1 Tools Part 1.mp4 |
39.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/003. 3.2 Tools Part 2.en.srt |
16 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/003. 3.2 Tools Part 2.mp4 |
37.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.en.srt |
21 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 |
54.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.en.srt |
18 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 |
48.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.en.srt |
25 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 |
60.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/007. 3.6 Programming languagesscripting.en.srt |
11 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/007. 3.6 Programming languagesscripting.mp4 |
23.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/001. Learning objectives.en.srt |
657 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/001. Learning objectives.mp4 |
2.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/002. 4.1 Cyber kill chains.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/002. 4.1 Cyber kill chains.mp4 |
21.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/003. 4.2 Diamond Model of Intrusion Analysis.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/003. 4.2 Diamond Model of Intrusion Analysis.mp4 |
9.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/004. 4.3 MITRE ATT&CK Part 1.en.srt |
12 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/004. 4.3 MITRE ATT&CK Part 1.mp4 |
32.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/005. 4.4 MITRE ATT&CK Part 2.en.srt |
15 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/005. 4.4 MITRE ATT&CK Part 2.mp4 |
36.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/006. 4.5 Open Source Security Testing Methodology Manual (OSS TMM).mp4 |
5.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/007. 4.6 OWASP Testing Guide.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 4 Concepts Related to Attack Methodology Frameworks/007. 4.6 OWASP Testing Guide.mp4 |
15.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/001. Learning objectives.en.srt |
952 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/001. Learning objectives.mp4 |
3.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/002. 5.1 Attack Frameworks Part 1.en.srt |
23 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/002. 5.1 Attack Frameworks Part 1.mp4 |
35.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/003. 5.2 Attack Frameworks Part 2.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/003. 5.2 Attack Frameworks Part 2.mp4 |
22.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/004. 5.3 Threat Research.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/004. 5.3 Threat Research.mp4 |
15.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/006. 5.5 Wireless Analysis Techniques.en.srt |
12 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 5 Utilizing Threat Intelligence to Support Organization Security/006. 5.5 Wireless Analysis Techniques.mp4 |
18.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/001. Learning objectives.en.srt |
484 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/001. Learning objectives.mp4 |
2.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/002. 6.1 Understanding Results.en.srt |
14 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/002. 6.1 Understanding Results.mp4 |
18 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/003. 6.2 Web Application Scanners.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/003. 6.2 Web Application Scanners.mp4 |
4.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/004. 6.3 Infrastructure Vulnerability Scanner.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/004. 6.3 Infrastructure Vulnerability Scanner.mp4 |
8.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/005. 6.4 Software Assessment Tools and Techniques.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/005. 6.4 Software Assessment Tools and Techniques.mp4 |
2.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/006. 6.5 Wireless Assessment.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/006. 6.5 Wireless Assessment.mp4 |
8.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/007. 6.6 Cloud Infrastructure Assessment.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 6 Analyze Output from Common Vulnerability Assessment Tools/007. 6.6 Cloud Infrastructure Assessment.mp4 |
3.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/001. Learning objectives.en.srt |
431 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/001. Learning objectives.mp4 |
2.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/002. 7.1 Mobile.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/002. 7.1 Mobile.mp4 |
10.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/003. 7.2 Internet of Things (IoT) and Embedded Devices Part 1.mp4 |
18.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.en.srt |
26 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 |
43.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/005. 7.4 APTs.en.srt |
21 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/005. 7.4 APTs.mp4 |
24.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/006. 7.5 Embedded and Real-Time Operating Systems (RTOS).en.srt |
10 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/006. 7.5 Embedded and Real-Time Operating Systems (RTOS).mp4 |
16.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.en.srt |
10 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 |
48.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/008. 7.7 Physical Access Control.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/008. 7.7 Physical Access Control.mp4 |
3.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/009. 7.8 Building Automation Systems, Vehicles, and Drones.en.srt |
11 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/009. 7.8 Building Automation Systems, Vehicles, and Drones.mp4 |
22.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.en.srt |
24 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 |
44 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/011. 7.10 Defending Critical Infrastructure.en.srt |
22 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/011. 7.10 Defending Critical Infrastructure.mp4 |
37.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.en.srt |
24 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/012. 7.11 Supervisory Control and Data Acquisition (SCADA) Part 1.mp4 |
37.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.en.srt |
21 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/013. 7.12 Supervisory Control and Data Acquisition (SCADA) Part 2.mp4 |
39.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/014. 7.13 Verifications and Quality Controls.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/014. 7.13 Verifications and Quality Controls.mp4 |
25.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Summary/001. Threat Intelligence and Threat Hunting Summary.en.srt |
346 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Summary/001. Threat Intelligence and Threat Hunting Summary.mp4 |
1.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Introduction/001. Introduction.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Introduction/001. Introduction.mp4 |
4.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/001. Learning objectives.en.srt |
492 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/001. Learning objectives.mp4 |
1.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/002. 1.1 Privacy vs. Security.en.srt |
9 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/002. 1.1 Privacy vs. Security.mp4 |
15.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/003. 1.2 Non-technical Controls.en.srt |
9 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/003. 1.2 Non-technical Controls.mp4 |
13.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/004. 1.3 Classification, Ownership, Retention, and Data Types.en.srt |
19 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/004. 1.3 Classification, Ownership, Retention, and Data Types.mp4 |
26.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/005. 1.4 Confidentiality, Legal Requirements, and Data Sovereignty.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/005. 1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4 |
21.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/006. 1.5 Data Minimization, Purpose Limitation, and NDA.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/006. 1.5 Data Minimization, Purpose Limitation, and NDA.mp4 |
3.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/007. 1.6 Technical Controls.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/007. 1.6 Technical Controls.mp4 |
2.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/008. 1.7 Encryption.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/008. 1.7 Encryption.mp4 |
12.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/009. 1.8 Data Loss Prevention (DLP).en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/009. 1.8 Data Loss Prevention (DLP).mp4 |
1.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/010. 1.9 Data Masking and Deidentification.en.srt |
5 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/010. 1.9 Data Masking and Deidentification.mp4 |
7.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/011. 1.10 Tokenization.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/011. 1.10 Tokenization.mp4 |
3.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/012. 1.11 Digital Rights Management (DRM) and Watermarking.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/012. 1.11 Digital Rights Management (DRM) and Watermarking.mp4 |
7.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/013. 1.12 Geographic Access Requirements.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/013. 1.12 Geographic Access Requirements.mp4 |
5.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/014. 1.13 Access Controls.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 1 Data Privacy and Protection/014. 1.13 Access Controls.mp4 |
2.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/001. Learning objectives.en.srt |
499 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/001. Learning objectives.mp4 |
1.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/002. 2.1 Business Impact and Risk Calculation.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/002. 2.1 Business Impact and Risk Calculation.mp4 |
2.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/003. 2.2 Communication Risk Factors and Risk Prioritization.en.srt |
10 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/003. 2.2 Communication Risk Factors and Risk Prioritization.mp4 |
13.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/004. 2.3 System Assessments.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/004. 2.3 System Assessments.mp4 |
8.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/005. 2.4 Compensating Controls and Training - Part 1.en.srt |
20 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/005. 2.4 Compensating Controls and Training - Part 1.mp4 |
26.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/006. 2.5 Compensating Controls and Training - Part 2.en.srt |
14 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/006. 2.5 Compensating Controls and Training - Part 2.mp4 |
18 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/007. 2.6 Supply Chain Assessment.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 2 Risk Mitigation/007. 2.6 Supply Chain Assessment.mp4 |
8.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/001. Learning objectives.en.srt |
517 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/001. Learning objectives.mp4 |
1.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/002. 3.1 Frameworks.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/002. 3.1 Frameworks.mp4 |
5.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/003. 3.2 AUP, Password Policies, Data Ownership, and Other Procedures.en.srt |
17 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/003. 3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4 |
21.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/004. 3.3 Control Types.en.srt |
17 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/004. 3.3 Control Types.mp4 |
21.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/005. 3.4 Audits and Assessments.en.srt |
11 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 3 Importance of Policies, Procedures, and Controls/005. 3.4 Audits and Assessments.mp4 |
10.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/001. Learning objectives.en.srt |
422 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/001. Learning objectives.mp4 |
1.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/002. 4.1 Event Logs.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/002. 4.1 Event Logs.mp4 |
6.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/003. 4.2 Syslogs.en.srt |
15 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/003. 4.2 Syslogs.mp4 |
18.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/004. 4.3 Firewall Logs.en.srt |
15 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/004. 4.3 Firewall Logs.mp4 |
23.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/005. 4.4 Web Application Firewall (WAF).en.srt |
11 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/005. 4.4 Web Application Firewall (WAF).mp4 |
18.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/006. 4.5 Proxy.en.srt |
23 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/006. 4.5 Proxy.mp4 |
34.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/007. 4.6 Intrusion Detection and Prevention (IDSIPS).en.srt |
15 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/007. 4.6 Intrusion Detection and Prevention (IDSIPS).mp4 |
21.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.en.srt |
24 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 |
48.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/009. 4.8 Organizations Impact vs. Localized Impact.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/009. 4.8 Organizations Impact vs. Localized Impact.mp4 |
3.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/010. 4.9 Immediate vs. Total.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/010. 4.9 Immediate vs. Total.mp4 |
2.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/001. Learning objectives.en.srt |
451 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/001. Learning objectives.mp4 |
1.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/002. 5.1 Security Information and Event Management (SIEM) - Part 1.en.srt |
12 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/002. 5.1 Security Information and Event Management (SIEM) - Part 1.mp4 |
16.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/003. 5.2 Security Information and Event Management (SIEM) - Part 2.en.srt |
21 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/003. 5.2 Security Information and Event Management (SIEM) - Part 2.mp4 |
30.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/004. 5.3 Rule Writing.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/004. 5.3 Rule Writing.mp4 |
10.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/005. 5.4 Known-bad Internet Protocol (IP).en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 5 SIEMs and Query Writing/005. 5.4 Known-bad Internet Protocol (IP).mp4 |
8.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/001. Learning objectives.en.srt |
607 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/001. Learning objectives.mp4 |
1.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/002. 6.1 Malicious Payload.en.srt |
23 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/002. 6.1 Malicious Payload.mp4 |
28.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/003. 6.2 Domain Keys Identified Mail (DKIM).en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/003. 6.2 Domain Keys Identified Mail (DKIM).mp4 |
19.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/004. 6.3 Domain-based Message.en.srt |
15 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/004. 6.3 Domain-based Message.mp4 |
15.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/005. 6.4 Embedded Links.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/005. 6.4 Embedded Links.mp4 |
7.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/006. 6.5 Impersonation.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/006. 6.5 Impersonation.mp4 |
2.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/007. 6.6 Header.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 6 E-Mail Analysis/007. 6.6 Header.mp4 |
7.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/001. Learning objectives.en.srt |
606 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/001. Learning objectives.mp4 |
2.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/002. 7.1 Workflow Orchestration.en.srt |
14 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/002. 7.1 Workflow Orchestration.mp4 |
20.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/003. 7.2 Security Orchestration.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/003. 7.2 Security Orchestration.mp4 |
6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/004. 7.3 Security Orchestration, Automation, and Response (SOAR).en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/004. 7.3 Security Orchestration, Automation, and Response (SOAR).mp4 |
9.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/005. 7.4 Scripting.en.srt |
5 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/005. 7.4 Scripting.mp4 |
4.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/006. 7.5 Application Programming Interface (API) Integration.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/006. 7.5 Application Programming Interface (API) Integration.mp4 |
8.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/007. 7.6 Automated Malware Signature Creation.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/007. 7.6 Automated Malware Signature Creation.mp4 |
3.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/008. 7.7 Data Encrichment.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/008. 7.7 Data Encrichment.mp4 |
7.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/009. 7.8 Threat Feed Combination.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/009. 7.8 Threat Feed Combination.mp4 |
5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/010. 7.9 Machine Learning.en.srt |
22 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/010. 7.9 Machine Learning.mp4 |
35.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/011. 7.10 Security Content Automation Protocol (SCAP).en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/011. 7.10 Security Content Automation Protocol (SCAP).mp4 |
4.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/012. 7.11 Continuous Integration.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/012. 7.11 Continuous Integration.mp4 |
6.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/013. 7.12 Continuous Deployment and Delivery.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Lesson 7 Automation/013. 7.12 Continuous Deployment and Delivery.mp4 |
3.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Summary/001. System and Privacy Data Protection Summary.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/02 System and Privacy Data Protection/Summary/001. System and Privacy Data Protection Summary.mp4 |
3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Introduction/001. Introduction.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Introduction/001. Introduction.mp4 |
4.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/001. Learning objectives.en.srt |
342 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/001. Learning objectives.mp4 |
1.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.en.srt |
23 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 |
86.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/003. 1.2 Malware Analysis.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/003. 1.2 Malware Analysis.mp4 |
11 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/004. 1.3 Malware Analysis Overview.en.srt |
15 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 1 Threat Landscape/004. 1.3 Malware Analysis Overview.mp4 |
13.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 2 Malware Labs/001. Learning objectives.en.srt |
426 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 2 Malware Labs/001. Learning objectives.mp4 |
1.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 2 Malware Labs/002. 2.1 Why Set Up a Malware Lab.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 2 Malware Labs/002. 2.1 Why Set Up a Malware Lab.mp4 |
21.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 2 Malware Labs/003. 2.2 How to Correctly Set Up a Lab.en.srt |
25 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 2 Malware Labs/003. 2.2 How to Correctly Set Up a Lab.mp4 |
33.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/001. Learning objectives.en.srt |
714 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/001. Learning objectives.mp4 |
3.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/002. 3.1 Cuckoo Sandbox.en.srt |
18 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/002. 3.1 Cuckoo Sandbox.mp4 |
16.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/003. 3.2 Other Sandbox Systems.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/003. 3.2 Other Sandbox Systems.mp4 |
2.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/004. 3.3 Networking and Internet Connections.en.srt |
12 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/004. 3.3 Networking and Internet Connections.mp4 |
11.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/005. 3.4 Sandbox and Network.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 3 Dynamic Analysis/005. 3.4 Sandbox and Network.mp4 |
24.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 4 Malware Packet Analysis/001. Learning objectives.en.srt |
424 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 4 Malware Packet Analysis/001. Learning objectives.mp4 |
1.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 4 Malware Packet Analysis/002. 4.1 Wireshark.en.srt |
10 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 4 Malware Packet Analysis/002. 4.1 Wireshark.mp4 |
14.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 4 Malware Packet Analysis/003. 4.2 Column Setup.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 4 Malware Packet Analysis/003. 4.2 Column Setup.mp4 |
15.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/001. Learning objectives.en.srt |
602 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/001. Learning objectives.mp4 |
2.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/002. 5.1 PE File Format.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/002. 5.1 PE File Format.mp4 |
7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/003. 5.2 Image Header.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/003. 5.2 Image Header.mp4 |
6.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.en.srt |
33 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 |
59.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/001. Learning objectives.en.srt |
677 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/001. Learning objectives.mp4 |
2.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/002. 6.1 Registry Persistence.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/002. 6.1 Registry Persistence.mp4 |
13.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/003. 6.2 Analyzing for Persistence.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/003. 6.2 Analyzing for Persistence.mp4 |
11.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/004. 6.3 Other Techniques.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 6 File Persistence/004. 6.3 Other Techniques.mp4 |
15.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 7 String Analysis/001. Learning objectives.en.srt |
476 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 7 String Analysis/001. Learning objectives.mp4 |
1.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 7 String Analysis/002. 7.1 What to Look for.en.srt |
10 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Lesson 7 String Analysis/002. 7.1 What to Look for.mp4 |
16.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Summary/001. Malware and Incident Response LiveLessons Summary.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/03 Malware and Incident Response/Summary/001. Malware and Incident Response LiveLessons Summary.mp4 |
3.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Introduction/001. Introduction.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Introduction/001. Introduction.mp4 |
3.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.mp4 |
4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.en.srt |
49 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 |
101.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.en.srt |
55 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 |
112.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.en.srt |
22 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 |
49.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.en.srt |
23 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 |
85.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.en.srt |
23 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 |
47.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.en.srt |
42 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/01 Threat Intelligence and Threat Hunting/Introduction/001. Introduction.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.en.srt |
34 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 |
72.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.en.srt |
9 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.mp4 |
21 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.en.srt |
736 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.mp4 |
2.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.mp4 |
32.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.mp4 |
18.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.en.srt |
22 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 |
83.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.en.srt |
1 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.mp4 |
4.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.mp4 |
11.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.mp4 |
17.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.mp4 |
16.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.mp4 |
16.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.mp4 |
22.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.mp4 |
16.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.en.srt |
6 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.mp4 |
17.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.en.srt |
8 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.mp4 |
19.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.en.srt |
5 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.mp4 |
14.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.en.srt |
2 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.mp4 |
6.3 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.en.srt |
5 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.mp4 |
13.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.en.srt |
9 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.mp4 |
26.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.mp4 |
11.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.mp4 |
19.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.en.srt |
10 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.mp4 |
25.1 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).mp4 |
11.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.en.srt |
571 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.mp4 |
2.5 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.en.srt |
3 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.mp4 |
7.2 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.en.srt |
11 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.mp4 |
23 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.mp4 |
14.8 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.mp4 |
19.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.mp4 |
14.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.en.srt |
13 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.mp4 |
31.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).mp4 |
8.9 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.en.srt |
4 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.mp4 |
10.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.en.srt |
7 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.mp4 |
23.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.en.srt |
16 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.mp4 |
37.4 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).en.srt |
15 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).mp4 |
31.7 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.en.srt |
17 KB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 |
41.6 MB |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Summary/001. Secure Operations and Protections Summary.en.srt |
433 B |
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)/04 Secure Operations and Protections/Summary/001. Secure Operations and Protections Summary.mp4 |
1.3 MB |