| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/05 - Connecting threat intelligence sources to OpenCTI.mp4 |
27.1 MB |
| Linkedin - Complete Guide to Open Source Security/01 - Introduction/01 - Introduction to complete open source security.srt |
1 KB |
| Linkedin - Complete Guide to Open Source Security/01 - Introduction/02 - What you should know.mp4 |
1 MB |
| Linkedin - Complete Guide to Open Source Security/01 - Introduction/02 - What you should know.srt |
1 KB |
| Linkedin - Complete Guide to Open Source Security/01 - Introduction/03 - Disclaimer.mp4 |
1.1 MB |
| Linkedin - Complete Guide to Open Source Security/01 - Introduction/03 - Disclaimer.srt |
1 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/01 - Open source security software.mp4 |
4.4 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/01 - Open source security software.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/02 - Open source software licensing.mp4 |
3.9 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/02 - Open source software licensing.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/03 - Installing and testing open source security tools.mp4 |
2.1 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/03 - Installing and testing open source security tools.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/04 - The Proxmox virtualization system.mp4 |
12 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/04 - The Proxmox virtualization system.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/05 - Installing Kali Linux.mp4 |
15.2 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/05 - Installing Kali Linux.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/06 - Using the application menu.mp4 |
12.1 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/06 - Using the application menu.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/07 - Installing additional tools.mp4 |
6.4 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/07 - Installing additional tools.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/08 - Introduction to the Kali Purple workstation.mp4 |
16.2 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/08 - Introduction to the Kali Purple workstation.srt |
11 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/09 - Introduction to the Kali Purple server.mp4 |
8.2 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/09 - Introduction to the Kali Purple server.srt |
9 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/10 - Creating a Kali Purple server template.mp4 |
4.6 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/10 - Creating a Kali Purple server template.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/11 - Software component security.mp4 |
12 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/11 - Software component security.srt |
9 KB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/12 - Scanning with an automated SCA tool.mp4 |
4.5 MB |
| Linkedin - Complete Guide to Open Source Security/02 - 1. Open Source Software/12 - Scanning with an automated SCA tool.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/01 - Introduction to GRC.mp4 |
1.7 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/01 - Introduction to GRC.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/02 - Architecting with ArchiMate.mp4 |
12.4 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/02 - Architecting with ArchiMate.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/03 - Modelling security with Archi.mp4 |
5.9 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/03 - Modelling security with Archi.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/04 - Adding security to the model.mp4 |
7.6 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/04 - Adding security to the model.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/05 - Security risk management with SimpleRisk.mp4 |
6.1 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/05 - Security risk management with SimpleRisk.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/06 - Taking SimpleRisk for a spin.mp4 |
16 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/06 - Taking SimpleRisk for a spin.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/07 - Using eramba for GRC.mp4 |
8.6 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/07 - Using eramba for GRC.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/08 - Configuring the eramba system.mp4 |
18.7 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/08 - Configuring the eramba system.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/09 - Preparing your risk context.mp4 |
19 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/09 - Preparing your risk context.srt |
7 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/10 - Setting up your assets.mp4 |
6.9 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/10 - Setting up your assets.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/11 - Entering risks into eramba.mp4 |
7.5 MB |
| Linkedin - Complete Guide to Open Source Security/03 - 2. Governance and Risk Tools/11 - Entering risks into eramba.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/01 - Introduction to identities.mp4 |
5 MB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/01 - Introduction to identities.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/02 - Installing ZITADEL.mp4 |
13.1 MB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/02 - Installing ZITADEL.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/03 - Setting up the ZITADEL directory.mp4 |
10.3 MB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/03 - Setting up the ZITADEL directory.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/04 - Authorizing access with ZITADEL.mp4 |
7.3 MB |
| Linkedin - Complete Guide to Open Source Security/04 - 3. Identity Solutions/04 - Authorizing access with ZITADEL.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/01 - A survey of open source firewalls.mp4 |
11.3 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/01 - A survey of open source firewalls.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/02 - The basics of firewall operation.mp4 |
2.8 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/02 - The basics of firewall operation.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/03 - Installing pfSense.mp4 |
14 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/03 - Installing pfSense.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/04 - Accessing the DMZ via pfSense.mp4 |
11.7 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/04 - Accessing the DMZ via pfSense.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/05 - Installing the IPFire firewall.mp4 |
13.5 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/05 - Installing the IPFire firewall.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/06 - Up and running with IPFire.mp4 |
4.7 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/06 - Up and running with IPFire.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/07 - Installing NethSecurity.mp4 |
21.4 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/07 - Installing NethSecurity.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/08 - Configuring the zones.mp4 |
7 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/08 - Configuring the zones.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/09 - Configuring the NethSecurity lab.mp4 |
4.9 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/09 - Configuring the NethSecurity lab.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/10 - Opening up the file server.mp4 |
7.3 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/10 - Opening up the file server.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/11 - Activating the LAN DHCP.mp4 |
3.1 MB |
| Linkedin - Complete Guide to Open Source Security/05 - 4. Firewalls/11 - Activating the LAN DHCP.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/01 - Setting up Nginx as a proxy server.mp4 |
14.7 MB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/01 - Setting up Nginx as a proxy server.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/02 - Adding Suricata IDS to the proxy.mp4 |
7 MB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/02 - Adding Suricata IDS to the proxy.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/03 - Setting up a public web server.mp4 |
9.2 MB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/03 - Setting up a public web server.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/04 - Testing the efficacy of web protection.mp4 |
5.6 MB |
| Linkedin - Complete Guide to Open Source Security/06 - 5. Proxy, IDS, and Web Services/04 - Testing the efficacy of web protection.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/07 - 6. Vulnerability Scanning/01 - Installing GVM.mp4 |
8.8 MB |
| Linkedin - Complete Guide to Open Source Security/07 - 6. Vulnerability Scanning/01 - Installing GVM.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/07 - 6. Vulnerability Scanning/02 - Running a vulnerability scan with GVM.mp4 |
8.9 MB |
| Linkedin - Complete Guide to Open Source Security/07 - 6. Vulnerability Scanning/02 - Running a vulnerability scan with GVM.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/01 - Installing the Wazuh SIEM.mp4 |
12.6 MB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/01 - Installing the Wazuh SIEM.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/02 - Installing a Wazuh Linux agent.mp4 |
8.5 MB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/02 - Installing a Wazuh Linux agent.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/03 - Installing a Wazuh Windows agent.mp4 |
3.1 MB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/03 - Installing a Wazuh Windows agent.srt |
1 KB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/04 - Collecting Nginx logs in Wazuh.mp4 |
12.5 MB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/04 - Collecting Nginx logs in Wazuh.srt |
7 KB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/05 - Monitoring an attack with Wazuh.mp4 |
9.9 MB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/05 - Monitoring an attack with Wazuh.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/06 - Detecting web shells with Wazuh.mp4 |
17.7 MB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/06 - Detecting web shells with Wazuh.srt |
9 KB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/07 - Activating vulnerability scanning.mp4 |
10.3 MB |
| Linkedin - Complete Guide to Open Source Security/08 - 7. Security Assurance/07 - Activating vulnerability scanning.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/01 - Installing the ELK Stack SIEM.mp4 |
20.8 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/01 - Installing the ELK Stack SIEM.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/02 - Upgrading Kibana to HTTPS.mp4 |
13.9 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/02 - Upgrading Kibana to HTTPS.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/03 - Configuring log integrations.mp4 |
9.4 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/03 - Configuring log integrations.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/04 - Installing the Fleet server.mp4 |
6.6 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/04 - Installing the Fleet server.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/05 - Enrolling hosts into the Fleet server.mp4 |
14.4 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/05 - Enrolling hosts into the Fleet server.srt |
7 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/06 - Enhancing your logs.mp4 |
18.2 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/06 - Enhancing your logs.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/07 - Detecting reconnaissance with the ELK Stack.mp4 |
19.1 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/07 - Detecting reconnaissance with the ELK Stack.srt |
9 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/08 - Detecting exploitation with the ELK Stack.mp4 |
11.7 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/08 - Detecting exploitation with the ELK Stack.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/09 - Monitoring alerts with the ELK Stack.mp4 |
10.3 MB |
| Linkedin - Complete Guide to Open Source Security/09 - 8. Security Log Monitoring/09 - Monitoring alerts with the ELK Stack.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/01 - Installing Sirius CE.mp4 |
8.6 MB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/01 - Installing Sirius CE.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/02 - Solving the Unit 42 quiz with SELKS.mp4 |
11 MB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/02 - Solving the Unit 42 quiz with SELKS.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/03 - Installing NetWitness.mp4 |
3.9 MB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/03 - Installing NetWitness.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/04 - Taking NetWitness for a spin.mp4 |
4.3 MB |
| Linkedin - Complete Guide to Open Source Security/10 - 9. Security Analytics/04 - Taking NetWitness for a spin.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/01 - Exchanging threat intelligence.mp4 |
4.5 MB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/01 - Exchanging threat intelligence.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/02 - Installing OpenTAXII.mp4 |
17.9 MB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/02 - Installing OpenTAXII.srt |
7 KB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/03 - Working with the Cabby client library.mp4 |
16.6 MB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/03 - Working with the Cabby client library.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.mp4 |
14.6 MB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/01 - Introduction/01 - Introduction to complete open source security.mp4 |
2 MB |
| Linkedin - Complete Guide to Open Source Security/11 - 10. Threat Intelligence/05 - Connecting threat intelligence sources to OpenCTI.srt |
10 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/01 - Installing the IRIS incident management system.mp4 |
5.2 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/01 - Installing the IRIS incident management system.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/02 - Managing incidents with IRIS.mp4 |
10.1 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/02 - Managing incidents with IRIS.srt |
7 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/03 - Installing Velociraptor.mp4 |
15.4 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/03 - Installing Velociraptor.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/04 - Connecting Linux hosts to Velociraptor.mp4 |
8.5 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/04 - Connecting Linux hosts to Velociraptor.srt |
5 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/05 - Connecting Windows hosts to Velociraptor.mp4 |
4.2 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/05 - Connecting Windows hosts to Velociraptor.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/06 - Running commands remotely from Velociraptor.mp4 |
2.5 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/06 - Running commands remotely from Velociraptor.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/07 - Accessing client files with VFS.mp4 |
5.7 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/07 - Accessing client files with VFS.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/08 - Hunting with Velociraptor.mp4 |
11.6 MB |
| Linkedin - Complete Guide to Open Source Security/12 - 11. Managing Incidents/08 - Hunting with Velociraptor.srt |
7 KB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/01 - Understanding Malcolm for threat hunting.mp4 |
3.1 MB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/01 - Understanding Malcolm for threat hunting.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/02 - Installing Malcolm.mp4 |
5.2 MB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/02 - Installing Malcolm.srt |
4 KB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/03 - A tour of Cyberville with Malcolm.mp4 |
14.7 MB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/03 - A tour of Cyberville with Malcolm.srt |
7 KB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/04 - Threat hunting with Malcolm.mp4 |
22 MB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/04 - Threat hunting with Malcolm.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/05 - Deep diving with Malcolm's Arkime.mp4 |
16.7 MB |
| Linkedin - Complete Guide to Open Source Security/13 - 12. Threat Hunting/05 - Deep diving with Malcolm's Arkime.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/01 - Installing the Kiwi TCMS test management system.mp4 |
6 MB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/01 - Installing the Kiwi TCMS test management system.srt |
2 KB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/02 - Security testing with Kiwi TCMS.mp4 |
16.4 MB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/02 - Security testing with Kiwi TCMS.srt |
9 KB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/03 - Installing the osTicket web app.mp4 |
13.1 MB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/03 - Installing the osTicket web app.srt |
6 KB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/04 - Managing trouble tickets.mp4 |
19.4 MB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/04 - Managing trouble tickets.srt |
10 KB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/05 - Mind mapping with Freeplane.mp4 |
15.9 MB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/05 - Mind mapping with Freeplane.srt |
8 KB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/06 - Introducing the Valkey datastore.mp4 |
6.2 MB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/06 - Introducing the Valkey datastore.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/07 - Scripting with Valkey.mp4 |
4.7 MB |
| Linkedin - Complete Guide to Open Source Security/14 - 13. Dev and Support Tools/07 - Scripting with Valkey.srt |
3 KB |
| Linkedin - Complete Guide to Open Source Security/15 - Conclusion/01 - Next steps.mp4 |
2.2 MB |
| Linkedin - Complete Guide to Open Source Security/15 - Conclusion/01 - Next steps.srt |
2 KB |