Search Torrents

[UDEMY] Cyber Security Fundamentals 2019 [FTU] Glo...


[UDEMY] Cyber Security Fundamentals 2019 [FTU] GloDLS Torrent content (File list)
1. Introduction/1. Instructor introduction.mp4 4.1 MB
1. Introduction/1. Instructor introduction.vtt 1.2 KB
1. Introduction/2. Course overview.mp4 18.7 MB
1. Introduction/2. Course overview.vtt 4.9 KB
2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.mp4 161.4 MB
2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.vtt 29.6 KB
2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.mp4 51.0 MB
2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.vtt 12.8 KB
2. Understanding the cybersecurity landscape/3. Cost of Breach.mp4 56.7 MB
2. Understanding the cybersecurity landscape/3. Cost of Breach.vtt 10.5 KB
2. Understanding the cybersecurity landscape/4. Section 2 Quiz.html 0.1 KB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.mp4 29.0 MB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.vtt 8.5 KB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.mp4 53.2 MB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.vtt 16.7 KB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.mp4 135.8 MB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.vtt 33.4 KB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/4.1 Document Vulnerabilities.pdf.pdf 657.2 KB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.mp4 10.1 MB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.vtt 3.1 KB
3. Red Team Penetration, lateral movement, escalation, and exfiltration/5. Section 3 Quiz.html 0.1 KB
4. Blue Team Detection, Investigation, Response and Mitigation/1.1 BlueTeam.pdf.pdf 657.2 KB
4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.mp4 21.8 MB
4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.vtt 6.6 KB
4. Blue Team Detection, Investigation, Response and Mitigation/2.1 BlueTeamKillChain.pdf.pdf 679.2 KB
4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.mp4 67.0 MB
4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.vtt 17.7 KB
4. Blue Team Detection, Investigation, Response and Mitigation/3.1 RestrictPrivilegeEscalation.pdf.pdf 676.5 KB
4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.mp4 57.1 MB
4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.vtt 12.2 KB
4. Blue Team Detection, Investigation, Response and Mitigation/4.1 RestrictLateralMovement.pdf.pdf 673.9 KB
4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.mp4 41.0 MB
4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.vtt 11.4 KB
4. Blue Team Detection, Investigation, Response and Mitigation/5.1 Azure Security Center.html 0.1 KB
4. Blue Team Detection, Investigation, Response and Mitigation/5.2 AttackDetection.pdf.pdf 692.7 KB
4. Blue Team Detection, Investigation, Response and Mitigation/5.3 Windows Defender ATP.html 0.2 KB
4. Blue Team Detection, Investigation, Response and Mitigation/5.4 Microsoft ATA.html 0.1 KB
4. Blue Team Detection, Investigation, Response and Mitigation/5.5 Office 365 ATP.html 0.1 KB
4. Blue Team Detection, Investigation, Response and Mitigation/5.6 Azure ATP.html 0.1 KB
4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.mp4 85.7 MB
4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.vtt 21.9 KB
4. Blue Team Detection, Investigation, Response and Mitigation/6. Section 4 Quiz.html 0.1 KB
5. Beyond The Breach/1.1 Azure Information Protection.html 0.2 KB
5. Beyond The Breach/1.2 CIA Triad.pdf.pdf 654.6 KB
5. Beyond The Breach/1. CIA Triad.mp4 29.3 MB
5. Beyond The Breach/1. CIA Triad.vtt 11.6 KB
5. Beyond The Breach/2.1 Security Compliance Toolkit.html 0.2 KB
5. Beyond The Breach/2.2 Organization Preparations.pdf.pdf 657.3 KB
5. Beyond The Breach/2. Organization Preparations.mp4 65.4 MB
5. Beyond The Breach/2. Organization Preparations.vtt 13.5 KB
5. Beyond The Breach/3.1 DevelopingPolicies.pdf.pdf 651.2 KB
5. Beyond The Breach/3. Developing and Maintaining Policies.mp4 48.3 MB
5. Beyond The Breach/3. Developing and Maintaining Policies.vtt 14.6 KB
5. Beyond The Breach/4. Section 5 Quiz.html 0.1 KB
5. Beyond The Breach/vz 0.0 KB
6. Final Exam/1. Final Exam.html 0.1 KB
Discuss.FreeTutorials.Us.html 165.7 KB
FreeCoursesOnline.Me.html 108.3 KB
FreeTutorials.Eu.html 102.2 KB
How you can help Team-FTU.txt 0.3 KB
[TGx]Downloaded from torrentgalaxy.org.txt 0.5 KB
Torrent Downloaded From GloDls.to.txt 0.1 KB



  • Torrent indexed: 6 years

  • Torrent updated: Tuesday 19th of February 2019 11:00:11 AM
  • Torrent hash: A474EA7D94B33DB02390D609BF1C90742651F4B4

  • Torrent size: 942.2 MB

  • Torrent category: Tutorials




Comments



Report suspicious or fake torrent



Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
BTC: 13uHKcvKFUuJvkmX2XbDuxFHueDoqaeBSi