Create Tool:
Create Time:1970-01-01 08:00:00
File Size:274.97 MB
File Count:50
File Hash:f8a8825ecd33247d69b76dbc3b9fb62fe3ed0727
04. Advanced Persistent Threats (APTs)/04. Demo- The Mitre Att&ck Framework.mp4 | 30.71 MB |
00. Course Overview/00. Course Overview.srt | 2.78 KB |
01. Threat Vectors and Threat Actors/00. The Threat Based Approach.mp4 | 11.75 MB |
01. Threat Vectors and Threat Actors/00. The Threat Based Approach.srt | 11.83 KB |
01. Threat Vectors and Threat Actors/01. Cyber Threats Overview.mp4 | 5.31 MB |
01. Threat Vectors and Threat Actors/01. Cyber Threats Overview.srt | 4.43 KB |
01. Threat Vectors and Threat Actors/02. Analyzing Main Threat Vectors.mp4 | 23.69 MB |
01. Threat Vectors and Threat Actors/02. Analyzing Main Threat Vectors.srt | 18.96 KB |
01. Threat Vectors and Threat Actors/03. Analyzing Threat Actors.mp4 | 13.93 MB |
01. Threat Vectors and Threat Actors/03. Analyzing Threat Actors.srt | 13.74 KB |
01. Threat Vectors and Threat Actors/04. Real-World Analysis- Threat Actors.mp4 | 6.38 MB |
01. Threat Vectors and Threat Actors/04. Real-World Analysis- Threat Actors.srt | 7.22 KB |
01. Threat Vectors and Threat Actors/05. Understanding Your Enemies.mp4 | 14.59 MB |
01. Threat Vectors and Threat Actors/05. Understanding Your Enemies.srt | 13.90 KB |
01. Threat Vectors and Threat Actors/Secret/6 Simple Memory Techniques - All hacker use this.html | 98 B |
01. Threat Vectors and Threat Actors/Secret/You Can Boost Brain Power.html | 114 B |
02. Indicators of Compromise (IoCs)/00. Threats and IoCs.mp4 | 14.63 MB |
02. Indicators of Compromise (IoCs)/00. Threats and IoCs.srt | 13.35 KB |
02. Indicators of Compromise (IoCs)/01. Understanding Main Indicators of Compromise.mp4 | 16.57 MB |
02. Indicators of Compromise (IoCs)/01. Understanding Main Indicators of Compromise.srt | 16.65 KB |
02. Indicators of Compromise (IoCs)/02. Indicators of Compromise in the Real World.mp4 | 5.71 MB |
02. Indicators of Compromise (IoCs)/02. Indicators of Compromise in the Real World.srt | 5.95 KB |
02. Indicators of Compromise (IoCs)/03. Demo- Investigating IoCs of a Ransomware Attack.mp4 | 22.99 MB |
02. Indicators of Compromise (IoCs)/03. Demo- Investigating IoCs of a Ransomware Attack.srt | 11.84 KB |
02. Indicators of Compromise (IoCs)/Linux Tails Operating System.html | 84 B |
03. The Kill Chain Methodology/00. Understanding the Kill Chain Methodology.mp4 | 4.07 MB |
03. The Kill Chain Methodology/00. Understanding the Kill Chain Methodology.srt | 5.23 KB |
03. The Kill Chain Methodology/01. The Kill Chain Process.mp4 | 18.31 MB |
03. The Kill Chain Methodology/01. The Kill Chain Process.srt | 17.33 KB |
03. The Kill Chain Methodology/02. Identifying Common Adversary Behavior.mp4 | 13.32 MB |
03. The Kill Chain Methodology/02. Identifying Common Adversary Behavior.srt | 12.89 KB |
03. The Kill Chain Methodology/03. Fingerprinting an Adversary.mp4 | 4.62 MB |
03. The Kill Chain Methodology/03. Fingerprinting an Adversary.srt | 5.70 KB |
03. The Kill Chain Methodology/04. Analyzing Real World Cyber Attacks.mp4 | 17.35 MB |
03. The Kill Chain Methodology/04. Analyzing Real World Cyber Attacks.srt | 17.00 KB |
04. Advanced Persistent Threats (APTs)/00. Understanding Highly Skilled Attackers.mp4 | 2.70 MB |
04. Advanced Persistent Threats (APTs)/00. Understanding Highly Skilled Attackers.srt | 3.39 KB |
04. Advanced Persistent Threats (APTs)/01. APT Objectives and Characteristics.mp4 | 12.83 MB |
04. Advanced Persistent Threats (APTs)/01. APT Objectives and Characteristics.srt | 13.30 KB |
04. Advanced Persistent Threats (APTs)/02. The APT Lifecycle.mp4 | 11.24 MB |
04. Advanced Persistent Threats (APTs)/02. The APT Lifecycle.srt | 12.66 KB |
04. Advanced Persistent Threats (APTs)/03. Detecting and Preventing APTs.mp4 | 4.22 MB |
04. Advanced Persistent Threats (APTs)/03. Detecting and Preventing APTs.srt | 4.30 KB |
00. Course Overview/00. Course Overview.mp4 | 3.79 MB |
04. Advanced Persistent Threats (APTs)/04. Demo- The Mitre Att&ck Framework.srt | 11.99 KB |
04. Advanced Persistent Threats (APTs)/05. Analyzing Real World APT Groups.mp4 | 9.50 MB |
04. Advanced Persistent Threats (APTs)/05. Analyzing Real World APT Groups.srt | 9.18 KB |
04. Advanced Persistent Threats (APTs)/06. Course Closure and C-TIA Certification Tips.mp4 | 6.52 MB |
04. Advanced Persistent Threats (APTs)/06. Course Closure and C-TIA Certification Tips.srt | 7.51 KB |
04. Advanced Persistent Threats (APTs)/Yubico - YubiKey 5 NFC.html | 84 B |
No trackers found |
TorrentBank
Copyright © 2024