Udemy - Comprehensive Introduction to Cyber Security


Udemy - Comprehensive Introduction to Cyber Security
Category:
Date:
10/09/21 at 9:21am GMT+1
Submitter:
Seeders:
0
Leechers:
2
File size:
1.5 GB in 26 files

Torrent Status:
  This torrent has been verified.

Infohash:
410490f3214e748c6b66b07b88eccc0649c0e905


File list

  • Udemy - Comprehensive Introduction to Cyber Security
  • icon ~Get Your Files Here !/1. Course Introduction/1. Introduction.mp4 12.2 MB
    icon ~Get Your Files Here !/2. Understanding the Landscape/1. Rise in sophisticated and targeted attacks.mp4 58.9 MB
    icon ~Get Your Files Here !/2. Understanding the Landscape/2. Well-funded states are able to breach anything.mp4 72.6 MB
    icon ~Get Your Files Here !/2. Understanding the Landscape/3. Theft and resale of data on the rise.mp4 21.3 MB
    icon ~Get Your Files Here !/2. Understanding the Landscape/4. Massive and growing threats.mp4 116.4 MB
    icon ~Get Your Files Here !/2. Understanding the Landscape/5. More complex malicious activity detection.mp4 8.7 MB
    icon ~Get Your Files Here !/2. Understanding the Landscape/6. Zero-days are a juicy (dark) business.mp4 47.1 MB
    icon ~Get Your Files Here !/2. Understanding the Landscape/7. Cybercriminals will stop at nothing for profit.mp4 25.5 MB
    icon ~Get Your Files Here !/3. Understanding the Threats/1. The security Threats.mp4 36.2 MB
    icon ~Get Your Files Here !/4. Understanding the Attackers/1. Who are they What are their motivations and targets.mp4 35.8 MB
    icon ~Get Your Files Here !/4. Understanding the Attackers/2. Cyber Threat Intelligence and APTs - Homework.mp4 465.7 MB
    icon ~Get Your Files Here !/5. Understanding the Attacks/1. The “Intrusion Kill Chain” model.mp4 35.4 MB
    icon ~Get Your Files Here !/5. Understanding the Attacks/2. The “MITRE ATT&CK” framework.mp4 55.2 MB
    icon ~Get Your Files Here !/5. Understanding the Attacks/3. Commodity Threat vs APT vs Hacktivism.mp4 10.8 MB
    icon ~Get Your Files Here !/5. Understanding the Attacks/4. The Diamond Model - Homework.mp4 79.1 MB
    icon ~Get Your Files Here !/6. Study of real-life Attacks Scenarios/1. Goals.mp4 7.4 MB
    icon ~Get Your Files Here !/6. Study of real-life Attacks Scenarios/2. Spear-Phishing.mp4 130 MB
    icon ~Get Your Files Here !/6. Study of real-life Attacks Scenarios/3. Infected USB drive.mp4 80.4 MB
    icon ~Get Your Files Here !/6. Study of real-life Attacks Scenarios/4. Browser Exploitation.mp4 90.6 MB
    icon ~Get Your Files Here !/6. Study of real-life Attacks Scenarios/5. Exposed service compromise.mp4 81.5 MB
    icon ~Get Your Files Here !/6. Study of real-life Attacks Scenarios/6. Real APT study case.mp4 11.1 MB
    icon ~Get Your Files Here !/6. Study of real-life Attacks Scenarios/7. Notes on detection and mitigation.mp4 11.9 MB
    icon ~Get Your Files Here !/7. Conclusions/1. Conclusions.mp4 10.6 MB
    icon ~Get Your Files Here !/8. Working in ITCyber Security/1. Working in ITCyber Security.mp4 29.8 MB
    icon ~Get Your Files Here !/9. Closing Words/1. Closing.mp4 2.2 MB
    icon ~Get Your Files Here !/Bonus Resources.txt 357 B

Similar Torrents