[FreeCoursesOnline.Me] Pluralsight - System and File Analysis with Bash
File List
- 3. Data Collection/4. Scanning for Open Ports.mp4 25.2 MB
- 5. Data Analysis/2. Demo - Data Analysis.mp4 23.8 MB
- 3. Data Collection/3. Checking for Suspicious Network Connections.mp4 21.5 MB
- 3. Data Collection/6. Demo - System Information Collection.mp4 20.4 MB
- 4. File Analysis/3. Demo - Managing Data and File Formats.mp4 18.0 MB
- exercise.zip 17.7 MB
- 4. File Analysis/6. Conduct File System Searches.mp4 17.7 MB
- 4. File Analysis/2. Demo - Gathering File Info.mp4 15.8 MB
- 4. File Analysis/5. Demo - Create File System Baseline.mp4 9.7 MB
- 4. File Analysis/4. Demo - Extract Strings from Files.mp4 9.3 MB
- 3. Data Collection/2. Detection Activities and Checking System Logs.mp4 9.2 MB
- 2. Incident Response (IR)/1. Business Scenario.mp4 8.9 MB
- 4. File Analysis/1. File Analysis Main Goals.mp4 8.8 MB
- 3. Data Collection/1. Types of Data Collected during IR.mp4 8.8 MB
- 3. Data Collection/5. Target Data and System Information.mp4 8.3 MB
- 5. Data Analysis/1. Data Analysis vs. File Analysis.mp4 7.2 MB
- 2. Incident Response (IR)/2. Incident Response Process.mp4 4.5 MB
- 3. Data Collection/7. Business Scenario Revisited.mp4 4.3 MB
- 5. Data Analysis/3. Course Summary.mp4 3.1 MB
- 1. Course Overview/1. Course Overview.mp4 2.9 MB
- 4. File Analysis/7. Business Scenario Revisited.mp4 975.4 KB
- 5. Data Analysis/2. Demo - Data Analysis.vtt 15.0 KB
- 3. Data Collection/3. Checking for Suspicious Network Connections.vtt 14.7 KB
- 3. Data Collection/4. Scanning for Open Ports.vtt 13.5 KB
- 3. Data Collection/6. Demo - System Information Collection.vtt 11.1 KB
- 4. File Analysis/3. Demo - Managing Data and File Formats.vtt 10.8 KB
- 4. File Analysis/6. Conduct File System Searches.vtt 10.4 KB
- 4. File Analysis/2. Demo - Gathering File Info.vtt 8.9 KB
- 4. File Analysis/1. File Analysis Main Goals.vtt 6.5 KB
- 2. Incident Response (IR)/1. Business Scenario.vtt 6.3 KB
- 3. Data Collection/5. Target Data and System Information.vtt 6.0 KB
- 3. Data Collection/2. Detection Activities and Checking System Logs.vtt 5.7 KB
- 4. File Analysis/5. Demo - Create File System Baseline.vtt 5.6 KB
- 3. Data Collection/1. Types of Data Collected during IR.vtt 4.9 KB
- 5. Data Analysis/1. Data Analysis vs. File Analysis.vtt 4.4 KB
- 4. File Analysis/4. Demo - Extract Strings from Files.vtt 4.1 KB
- 2. Incident Response (IR)/2. Incident Response Process.vtt 3.6 KB
- 3. Data Collection/7. Business Scenario Revisited.vtt 3.0 KB
- 5. Data Analysis/3. Course Summary.vtt 2.6 KB
- 1. Course Overview/1. Course Overview.vtt 1.8 KB
- playlist.m3u 1.1 KB
- 4. File Analysis/7. Business Scenario Revisited.vtt 760 bytes
- 0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 bytes
- FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 bytes
- 0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.