YourBittorrent
Categories
Movies
Music
Television
Games
Software
Anime
XXX
eBooks
Photos
Other
Upload
More
News
Legal
Advertising
Privacy
Bittorrent Clients
Contact
All torrents
Verified only
All categories
Movies
TV
Music
Games
Software
Anime
eBooks
XXX
Search
All torrents
Verified only
All categories
Movies
TV
Music
Games
Software
Anime
eBooks
XXX
Guest
Login
Sign up
[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Category:
Other
Date:
07/27/23 at 6:50pm GMT+1
Submitter:
Unknown
Seeders:
14
Leechers:
5
File size:
6.2 GB in 96 files
Torrent Status:
This torrent has
NOT
been verified.
Infohash:
629b49d13dcf54a01410040d59a9706fff8f2de0
File list
[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Introduction/001. The Complete Cybersecurity Bootcamp Introduction.mp4
16.8 MB
Lesson 1 Cybersecurity Fundamentals/001. Learning objectives.mp4
5.8 MB
Lesson 1 Cybersecurity Fundamentals/002. 1.1 Describing the CIA Triad.mp4
6.4 MB
Lesson 1 Cybersecurity Fundamentals/003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4
12.4 MB
Lesson 1 Cybersecurity Fundamentals/004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4
11.4 MB
Lesson 1 Cybersecurity Fundamentals/005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4
10.6 MB
Lesson 1 Cybersecurity Fundamentals/006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4
33.6 MB
Lesson 1 Cybersecurity Fundamentals/007. 1.6 Defining Threat Intelligence.mp4
45.6 MB
Lesson 1 Cybersecurity Fundamentals/008. 1.7 Defining Threat Hunting.mp4
28.3 MB
Lesson 1 Cybersecurity Fundamentals/009. 1.8 Understanding Malware Analysis.mp4
28.2 MB
Lesson 1 Cybersecurity Fundamentals/010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4
9.5 MB
Lesson 1 Cybersecurity Fundamentals/011. 1.10 Understanding the Different Threat Actor Types.mp4
5.7 MB
Lesson 1 Cybersecurity Fundamentals/012. 1.11 Defining Run Book Automation (RBA).mp4
8.5 MB
Lesson 1 Cybersecurity Fundamentals/013. 1.12 Defining Reverse Engineering.mp4
9.6 MB
Lesson 1 Cybersecurity Fundamentals/014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4
4.8 MB
Lesson 10 Network Intrusion Analysis/001. Learning objectives.mp4
5.2 MB
Lesson 10 Network Intrusion Analysis/002. 10.1 Introducing Intrusion Analysis Fundamentals.mp4
32.7 MB
Lesson 10 Network Intrusion Analysis/003. 10.2 Examining Packet Captures.mp4
27.5 MB
Lesson 10 Network Intrusion Analysis/004. 10.3 Examining Protocol Headers.mp4
8.4 MB
Lesson 10 Network Intrusion Analysis/005. 10.4 Analyzing Security Device Data.mp4
17.5 MB
Lesson 10 Network Intrusion Analysis/006. 10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives.mp4
7.6 MB
Lesson 10 Network Intrusion Analysis/007. 10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring.mp4
15.5 MB
Lesson 10 Network Intrusion Analysis/008. 10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark.mp4
6.9 MB
Lesson 10 Network Intrusion Analysis/009. 10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert.mp4
10.7 MB
Lesson 11 Introducing AAA and Identity Management/001. Learning objectives.mp4
2.9 MB
Lesson 11 Introducing AAA and Identity Management/002. 11.1 Understanding Authentication.mp4
29.2 MB
Lesson 11 Introducing AAA and Identity Management/003. 11.2 Exploring the RADIUS Protocol.mp4
10.1 MB
Lesson 11 Introducing AAA and Identity Management/004. 11.3 Surveying the TACACS+ Protocol.mp4
6.9 MB
Lesson 11 Introducing AAA and Identity Management/005. 11.4 Understanding Authorization.mp4
7.2 MB
Lesson 11 Introducing AAA and Identity Management/006. 11.5 Surveying Authorization Models.mp4
14.5 MB
Lesson 11 Introducing AAA and Identity Management/007. 11.6 Defining Accounting.mp4
5.8 MB
Lesson 11 Introducing AAA and Identity Management/008. 11.7 Exploring Multifactor Authentication and Single Sign-On.mp4
23.6 MB
Lesson 11 Introducing AAA and Identity Management/009. 11.8 Exploring Examples of Multifactor and Single Sign-On.mp4
6.4 MB
Lesson 12 Network Visibility and Segmentation/001. Learning objectives.mp4
3.6 MB
Lesson 12 Network Visibility and Segmentation/002. 12.1 Defining Network Visibility and Segmentation.mp4
5.9 MB
Lesson 12 Network Visibility and Segmentation/003. 12.2 Introducing NetFlow and IPFIX.mp4
6.3 MB
Lesson 12 Network Visibility and Segmentation/004. 12.3 Describing Flexible NetFlow Records.mp4
10.8 MB
Lesson 12 Network Visibility and Segmentation/005. 12.4 Understanding NetFlow Deployment.mp4
10.1 MB
Lesson 12 Network Visibility and Segmentation/006. 12.5 Introducing Network Segmentation.mp4
5.1 MB
Lesson 12 Network Visibility and Segmentation/007. 12.6 Exploring Application-based Segmentation.mp4
5.6 MB
Lesson 12 Network Visibility and Segmentation/008. 12.7 Describing Network Access with CoA.mp4
4.7 MB
Lesson 13 Network Infrastructure Security/001. Learning objectives.mp4
5.3 MB
Lesson 13 Network Infrastructure Security/002. 13.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4
12.6 MB
Lesson 13 Network Infrastructure Security/003. 13.2 Configuring and Verifying Port Security.mp4
11.6 MB
Lesson 13 Network Infrastructure Security/004. 13.3 Configuring and Verifying DHCP Snooping.mp4
10.9 MB
Lesson 13 Network Infrastructure Security/005. 13.4 Configuring and Verifying Dynamic ARP Inspection.mp4
15.2 MB
Lesson 13 Network Infrastructure Security/006. 13.5 Exploring and Mitigating Common Layer 2 Threats.mp4
15 MB
Lesson 13 Network Infrastructure Security/007. 13.6 Understanding and Configuring BPDU Guard and Root Guard.mp4
6.4 MB
Lesson 13 Network Infrastructure Security/008. 13.7 Understanding and Configuring CDPLLDP.mp4
8.7 MB
Lesson 13 Network Infrastructure Security/009. 13.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4
14.6 MB
Lesson 13 Network Infrastructure Security/010. 13.9 Exploring How to Secure the Management Plane.mp4
13.8 MB
Lesson 13 Network Infrastructure Security/011. 13.10 Exploring How to Secure the Control Plane.mp4
14.6 MB
Lesson 13 Network Infrastructure Security/012. 13.11 Exploring How to Secure the Data Plane.mp4
11.3 MB
Lesson 14 Software-Defined Networking Security and Programmability/001. Learning objectives.mp4
8.1 MB
Lesson 14 Software-Defined Networking Security and Programmability/002. 14.1 Introducing SDN.mp4
13.6 MB
Lesson 14 Software-Defined Networking Security and Programmability/003. 14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4
9.4 MB
Lesson 14 Software-Defined Networking Security and Programmability/004. 14.3 Introducing Cisco ACI.mp4
17.1 MB
Lesson 14 Software-Defined Networking Security and Programmability/005. 14.4 Introducing Cisco DNA and Cisco DNA Center.mp4
28.5 MB
Lesson 14 Software-Defined Networking Security and Programmability/006. 14.5 Understanding VXLAN and Network Overlays.mp4
9.8 MB
Lesson 14 Software-Defined Networking Security and Programmability/007. 14.6 Understanding Microsegmentation.mp4
8.9 MB
Lesson 14 Software-Defined Networking Security and Programmability/008. 14.7 Surveying Open Source SDN Solutions.mp4
9.8 MB
Lesson 14 Software-Defined Networking Security and Programmability/009. 14.8 Understanding the Threats Against SDN Solutions.mp4
7.2 MB
Lesson 14 Software-Defined Networking Security and Programmability/010. 14.9 Understanding the Security Benefits in SDN Solutions.mp4
6.7 MB
Lesson 14 Software-Defined Networking Security and Programmability/011. 14.10 Introducing Network Programmability.mp4
30.9 MB
Lesson 14 Software-Defined Networking Security and Programmability/012. 14.11 Exploring DevNet and DevNet Resources for Security Automation.mp4
3.7 MB
Lesson 14 Software-Defined Networking Security and Programmability/013. 14.12 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4
37.2 MB
Lesson 14 Software-Defined Networking Security and Programmability/014. 14.13 A Brief Introduction to Git.mp4
24.9 MB
Lesson 14 Software-Defined Networking Security and Programmability/015. 14.14 Exploring pxGrid.mp4
15.6 MB
Lesson 14 Software-Defined Networking Security and Programmability/016. 14.15 Integrating and Automating Security Operations with Cisco Products.mp4
11 MB
Lesson 15 Overview of Ethical Hacking and Penetration Testing/001. Learning objectives.mp4
4.1 MB
Lesson 15 Overview of Ethical Hacking and Penetration Testing/002. 15.1 Introducing Ethical Hacking and Pen Testing.mp4
20.6 MB
Lesson 15 Overview of Ethical Hacking and Penetration Testing/003. 15.2 Exploring Penetration Testing Methodologies.mp4
21.1 MB
Lesson 15 Overview of Ethical Hacking and Penetration Testing/004. 15.3 Explaining the Importance of the Planning and Preparation Phase.mp4
44.9 MB
Lesson 15 Overview of Ethical Hacking and Penetration Testing/005. 15.4 Understanding the Legal Concepts of Penetration Testing.mp4
13.8 MB
Lesson 15 Overview of Ethical Hacking and Penetration Testing/006. 15.5 Learning How to Scope a Penetration Testing Engagement Properly.mp4
14.6 MB
Lesson 15 Overview of Ethical Hacking and Penetration Testing/007. 15.6 Learning the Key Aspects of Compliance-based Assessments.mp4
10.9 MB
Lesson 16 Information Gathering and Passive Reconnaissance/001. Learning objectives.mp4
4.2 MB
Lesson 16 Information Gathering and Passive Reconnaissance/002. 16.1 Introducing Footprinting Concepts and Methodologies.mp4
26.5 MB
Lesson 16 Information Gathering and Passive Reconnaissance/003. 16.2 Performing Footprinting through Search Engines.mp4
19.4 MB
Lesson 16 Information Gathering and Passive Reconnaissance/004. 16.3 Performing Footprinting through Web Services.mp4
22.1 MB
Lesson 16 Information Gathering and Passive Reconnaissance/005. 16.4 Performing Footprinting through Social Networking Sites.mp4
7.3 MB
Lesson 16 Information Gathering and Passive Reconnaissance/006. 16.5 Understanding Website Footprinting.mp4
36.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/007. 16.6 Understanding Email Footprinting.mp4
12.2 MB
Lesson 16 Information Gathering and Passive Reconnaissance/008. 16.7 Understanding Whois Footprinting.mp4
20.9 MB
Lesson 16 Information Gathering and Passive Reconnaissance/009. 16.8 Understanding DNS Footprinting.mp4
26.4 MB
Lesson 16 Information Gathering and Passive Reconnaissance/010. 16.9 Understanding Network Footprinting.mp4
13.6 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
56.4 MB
Lesson 16 Information Gathering and Passive Reconnaissance/012. 16.11 Surveying Footprinting Tools.mp4
7.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/001. Learning objectives.mp4
5.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/002. 17.1 Surveying Network Scanning Concepts.mp4
12.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/003. 17.2 Exploiting Scanning Tools.mp4
35 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
66.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/005. 17.4 Understanding Port and Service Discovery.mp4
37.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/006. 17.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting).mp4
39.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
65.1 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/008. 17.7 Creating Network Diagrams.mp4
25 MB
Similar Torrents
Category
Name
Size
Date
[FreeCoursesOnline.Me] Complete AI Course ChatGPT, DALL-E, Midjourney and More Ai
1.7 GB
01/27/24
33
5
[FreeCoursesOnline.Me] PacktPub - Raspberry Pi for Beginners - 2022 Complete Course
3.4 GB
02/25/23
26
3
[FreeCoursesOnline.Me] Code With Mosh - The Complete Node.js Course
3.1 GB
06/20/20
25
1
[FreeCoursesOnline.Me] PacktPub - Complete Python Web Course Build 8 Python Web Applications
2.4 GB
03/01/23
24
2
[FreeCoursesOnline.Me] Code With Mosh - Complete SQL Mastery
2.1 GB
07/08/20
20
3
[FreeCoursesOnline.Me] TechWorld - DevOps Bootcamp By Nana
15.1 GB
04/25/22
20
3
[FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
3.4 GB
09/01/22
20
3
[FreeCoursesOnline.Me] ZeroToMastery - Go Programming (Golang) The Complete Developer's Guide
2.5 GB
02/12/22
19
1
[FreeCoursesOnline.Me] Complete Godot 3D Develop Your Own 3D Games Using Godot 4
2.7 GB
12/24/23
19
0
[FreeCoursesOnline.Me] FrontendMasters - Complete Intro To React, v8
1.2 GB
01/02/23
17
0
[FreeCoursesOnline.Me] LiveLessons - Scrum Fundamentals LiveLessons, 2nd Edition
1.5 GB
03/05/23
16
2
[FreeCoursesOnline.Me] Academind Pro - GitHub Actions - The Complete Guide
1.3 GB
01/23/23
15
6
[FreeCoursesOnline Me] Hands-On Ethical Hacking and Network Defense (MindTap Course Lis ...
25 MB
08/31/23
15
0
[FreeCoursesOnline Me] Applied Mathematics for Scientists and Engineers (Textbooks in M ...
4 MB
09/04/23
15
0
[FreeCoursesOnline.Me] The Web Developer Bootcamp 2023
57.7 GB
01/01/24
15
12