[FreeTutorials.Eu] [UDEMY] Cyber Security Fundamentals 2019 [FTU]
File List
- 2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.mp4 161.4 MB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.mp4 135.8 MB
- 4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.mp4 85.7 MB
- 4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.mp4 67.0 MB
- 5. Beyond The Breach/2. Organization Preparations.mp4 65.4 MB
- 4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.mp4 57.1 MB
- 2. Understanding the cybersecurity landscape/3. Cost of Breach.mp4 56.7 MB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.mp4 53.2 MB
- 2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.mp4 51.0 MB
- 5. Beyond The Breach/3. Developing and Maintaining Policies.mp4 48.3 MB
- 4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.mp4 41.0 MB
- 5. Beyond The Breach/1. CIA Triad.mp4 29.3 MB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.mp4 29.0 MB
- 4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.mp4 21.8 MB
- 1. Introduction/2. Course overview.mp4 18.7 MB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.mp4 10.1 MB
- 1. Introduction/1. Instructor introduction.mp4 4.1 MB
- 4. Blue Team Detection, Investigation, Response and Mitigation/5.2 AttackDetection.pdf.pdf 692.7 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/2.1 BlueTeamKillChain.pdf.pdf 679.2 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/3.1 RestrictPrivilegeEscalation.pdf.pdf 676.5 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/4.1 RestrictLateralMovement.pdf.pdf 673.9 KB
- 5. Beyond The Breach/2.2 Organization Preparations.pdf.pdf 657.3 KB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/4.1 Document Vulnerabilities.pdf.pdf 657.2 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/1.1 BlueTeam.pdf.pdf 657.2 KB
- 5. Beyond The Breach/1.2 CIA Triad.pdf.pdf 654.6 KB
- 5. Beyond The Breach/3.1 DevelopingPolicies.pdf.pdf 651.2 KB
- Discuss.FreeTutorials.Us.html 165.7 KB
- FreeCoursesOnline.Me.html 108.3 KB
- FreeTutorials.Eu.html 102.2 KB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.vtt 33.4 KB
- 2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.vtt 29.6 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.vtt 21.9 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.vtt 17.7 KB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.vtt 16.7 KB
- 5. Beyond The Breach/3. Developing and Maintaining Policies.vtt 14.6 KB
- 5. Beyond The Breach/2. Organization Preparations.vtt 13.5 KB
- 2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.vtt 12.8 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.vtt 12.2 KB
- 5. Beyond The Breach/1. CIA Triad.vtt 11.6 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.vtt 11.4 KB
- 2. Understanding the cybersecurity landscape/3. Cost of Breach.vtt 10.5 KB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.vtt 8.5 KB
- 4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.vtt 6.6 KB
- 1. Introduction/2. Course overview.vtt 4.9 KB
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.vtt 3.1 KB
- 1. Introduction/1. Instructor introduction.vtt 1.2 KB
- [TGx]Downloaded from torrentgalaxy.org.txt 524 bytes
- How you can help Team-FTU.txt 259 bytes
- 4. Blue Team Detection, Investigation, Response and Mitigation/5.3 Windows Defender ATP.html 193 bytes
- 5. Beyond The Breach/1.1 Azure Information Protection.html 193 bytes
- 5. Beyond The Breach/2.1 Security Compliance Toolkit.html 159 bytes
- 2. Understanding the cybersecurity landscape/4. Section 2 Quiz.html 139 bytes
- 3. Red Team Penetration, lateral movement, escalation, and exfiltration/5. Section 3 Quiz.html 139 bytes
- 4. Blue Team Detection, Investigation, Response and Mitigation/6. Section 4 Quiz.html 139 bytes
- 5. Beyond The Breach/4. Section 5 Quiz.html 139 bytes
- 6. Final Exam/1. Final Exam.html 139 bytes
- 4. Blue Team Detection, Investigation, Response and Mitigation/5.6 Azure ATP.html 138 bytes
- 4. Blue Team Detection, Investigation, Response and Mitigation/5.1 Azure Security Center.html 137 bytes
- 4. Blue Team Detection, Investigation, Response and Mitigation/5.5 Office 365 ATP.html 137 bytes
- 4. Blue Team Detection, Investigation, Response and Mitigation/5.4 Microsoft ATA.html 133 bytes
- Torrent Downloaded From GloDls.to.txt 84 bytes
- 5. Beyond The Breach/vz 0 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.