[ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
File List
- ~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 18.9 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 14.7 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 14.5 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 12.5 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 10.8 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 10.7 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.2 MB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.2 MB
- ~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 9.9 MB
- ~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 9.7 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 9.6 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 9.5 MB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.5 MB
- ~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.4 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.0 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 8.9 MB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 8.9 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 7.8 MB
- ~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 7.7 MB
- ~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.5 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/01 - Conducting investigations.mp4 7.5 MB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/02 - Backups.mp4 7.2 MB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/06 - After-action reports.mp4 6.7 MB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/05 - Testing BCDR plans.mp4 6.5 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/13 - Embedded device forensics.mp4 6.2 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/03 - Incident communications plan.mp4 6.2 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/03 - Introduction to forensics.mp4 6.1 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/02 - Evidence types.mp4 5.8 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/02 - Creating an incident response team.mp4 5.6 MB
- ~Get Your Files Here !/06 - 5. Business Continuity/01 - Business continuity planning.mp4 5.4 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/07 - Containment techniques.mp4 5.1 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/07 - Digital forensics toolkit.mp4 4.9 MB
- ~Get Your Files Here !/01 - Introduction/01 - Incident response.mp4 4.8 MB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/03 - Restoring backups.mp4 4.6 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/11 - Incident response exercises.mp4 4.4 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/05 - Escalation and notification.mp4 4.4 MB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/03 - Cyber kill chain analysis.mp4 4.3 MB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/02 - Diamond model of intrusion analysis.mp4 4.2 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/06 - Mitigation.mp4 3.9 MB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/09 - Validation.mp4 3.8 MB
- ~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4 3.7 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/14 - Chain of custody.mp4 3.5 MB
- ~Get Your Files Here !/08 - Conclusion/01 - Continuing your studies.mp4 2.1 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/12 - Mobile device forensics.mp4 2.0 MB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/04 - Testing guides.mp4 1.7 MB
- ~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4 1.1 MB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.srt 13.7 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.srt 12.1 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.srt 11.1 KB
- ~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.srt 10.4 KB
- ~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.srt 10.0 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.srt 10.0 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.srt 8.5 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.srt 8.3 KB
- ~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.srt 8.3 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.srt 8.2 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.srt 8.2 KB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.srt 8.0 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.srt 8.0 KB
- ~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.srt 7.9 KB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/02 - Backups.srt 7.8 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.srt 7.8 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/01 - Conducting investigations.srt 7.5 KB
- ~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.srt 7.0 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.srt 7.0 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/02 - Evidence types.srt 6.6 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/03 - Introduction to forensics.srt 6.5 KB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.srt 6.4 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.srt 6.3 KB
- ~Get Your Files Here !/06 - 5. Business Continuity/01 - Business continuity planning.srt 6.2 KB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/05 - Testing BCDR plans.srt 6.0 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/07 - Containment techniques.srt 5.9 KB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/02 - Diamond model of intrusion analysis.srt 5.8 KB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/06 - After-action reports.srt 5.5 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/03 - Incident communications plan.srt 5.3 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/07 - Digital forensics toolkit.srt 5.2 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/13 - Embedded device forensics.srt 4.9 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/09 - Validation.srt 4.9 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/05 - Escalation and notification.srt 4.8 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/06 - Mitigation.srt 4.6 KB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.srt 4.6 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/02 - Creating an incident response team.srt 4.5 KB
- ~Get Your Files Here !/07 - 6. Disaster Recovery/03 - Restoring backups.srt 4.3 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/14 - Chain of custody.srt 3.8 KB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/03 - Cyber kill chain analysis.srt 3.5 KB
- ~Get Your Files Here !/02 - 1. Incident Response Programs/11 - Incident response exercises.srt 3.3 KB
- ~Get Your Files Here !/01 - Introduction/03 - Study resources.srt 2.9 KB
- ~Get Your Files Here !/05 - 4. Forensic Techniques/12 - Mobile device forensics.srt 2.4 KB
- ~Get Your Files Here !/01 - Introduction/01 - Incident response.srt 1.7 KB
- ~Get Your Files Here !/03 - 2. Attack Frameworks/04 - Testing guides.srt 1.6 KB
- ~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt 1.3 KB
- ~Get Your Files Here !/08 - Conclusion/01 - Continuing your studies.srt 1.2 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 183 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.