[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition

Photo unavailable
Category:
Date:
07/27/23 at 6:50pm GMT+1
Submitter:
Seeders:
14
Leechers:
5
File size:
6.2 GB in 96 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
629b49d13dcf54a01410040d59a9706fff8f2de0


File list

  • [FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
  • icon Introduction/001. The Complete Cybersecurity Bootcamp Introduction.mp4 16.8 MB
    icon Lesson 1 Cybersecurity Fundamentals/001. Learning objectives.mp4 5.8 MB
    icon Lesson 1 Cybersecurity Fundamentals/002. 1.1 Describing the CIA Triad.mp4 6.4 MB
    icon Lesson 1 Cybersecurity Fundamentals/003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4 12.4 MB
    icon Lesson 1 Cybersecurity Fundamentals/004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4 11.4 MB
    icon Lesson 1 Cybersecurity Fundamentals/005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4 10.6 MB
    icon Lesson 1 Cybersecurity Fundamentals/006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4 33.6 MB
    icon Lesson 1 Cybersecurity Fundamentals/007. 1.6 Defining Threat Intelligence.mp4 45.6 MB
    icon Lesson 1 Cybersecurity Fundamentals/008. 1.7 Defining Threat Hunting.mp4 28.3 MB
    icon Lesson 1 Cybersecurity Fundamentals/009. 1.8 Understanding Malware Analysis.mp4 28.2 MB
    icon Lesson 1 Cybersecurity Fundamentals/010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4 9.5 MB
    icon Lesson 1 Cybersecurity Fundamentals/011. 1.10 Understanding the Different Threat Actor Types.mp4 5.7 MB
    icon Lesson 1 Cybersecurity Fundamentals/012. 1.11 Defining Run Book Automation (RBA).mp4 8.5 MB
    icon Lesson 1 Cybersecurity Fundamentals/013. 1.12 Defining Reverse Engineering.mp4 9.6 MB
    icon Lesson 1 Cybersecurity Fundamentals/014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4 4.8 MB
    icon Lesson 10 Network Intrusion Analysis/001. Learning objectives.mp4 5.2 MB
    icon Lesson 10 Network Intrusion Analysis/002. 10.1 Introducing Intrusion Analysis Fundamentals.mp4 32.7 MB
    icon Lesson 10 Network Intrusion Analysis/003. 10.2 Examining Packet Captures.mp4 27.5 MB
    icon Lesson 10 Network Intrusion Analysis/004. 10.3 Examining Protocol Headers.mp4 8.4 MB
    icon Lesson 10 Network Intrusion Analysis/005. 10.4 Analyzing Security Device Data.mp4 17.5 MB
    icon Lesson 10 Network Intrusion Analysis/006. 10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives.mp4 7.6 MB
    icon Lesson 10 Network Intrusion Analysis/007. 10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring.mp4 15.5 MB
    icon Lesson 10 Network Intrusion Analysis/008. 10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark.mp4 6.9 MB
    icon Lesson 10 Network Intrusion Analysis/009. 10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert.mp4 10.7 MB
    icon Lesson 11 Introducing AAA and Identity Management/001. Learning objectives.mp4 2.9 MB
    icon Lesson 11 Introducing AAA and Identity Management/002. 11.1 Understanding Authentication.mp4 29.2 MB
    icon Lesson 11 Introducing AAA and Identity Management/003. 11.2 Exploring the RADIUS Protocol.mp4 10.1 MB
    icon Lesson 11 Introducing AAA and Identity Management/004. 11.3 Surveying the TACACS+ Protocol.mp4 6.9 MB
    icon Lesson 11 Introducing AAA and Identity Management/005. 11.4 Understanding Authorization.mp4 7.2 MB
    icon Lesson 11 Introducing AAA and Identity Management/006. 11.5 Surveying Authorization Models.mp4 14.5 MB
    icon Lesson 11 Introducing AAA and Identity Management/007. 11.6 Defining Accounting.mp4 5.8 MB
    icon Lesson 11 Introducing AAA and Identity Management/008. 11.7 Exploring Multifactor Authentication and Single Sign-On.mp4 23.6 MB
    icon Lesson 11 Introducing AAA and Identity Management/009. 11.8 Exploring Examples of Multifactor and Single Sign-On.mp4 6.4 MB
    icon Lesson 12 Network Visibility and Segmentation/001. Learning objectives.mp4 3.6 MB
    icon Lesson 12 Network Visibility and Segmentation/002. 12.1 Defining Network Visibility and Segmentation.mp4 5.9 MB
    icon Lesson 12 Network Visibility and Segmentation/003. 12.2 Introducing NetFlow and IPFIX.mp4 6.3 MB
    icon Lesson 12 Network Visibility and Segmentation/004. 12.3 Describing Flexible NetFlow Records.mp4 10.8 MB
    icon Lesson 12 Network Visibility and Segmentation/005. 12.4 Understanding NetFlow Deployment.mp4 10.1 MB
    icon Lesson 12 Network Visibility and Segmentation/006. 12.5 Introducing Network Segmentation.mp4 5.1 MB
    icon Lesson 12 Network Visibility and Segmentation/007. 12.6 Exploring Application-based Segmentation.mp4 5.6 MB
    icon Lesson 12 Network Visibility and Segmentation/008. 12.7 Describing Network Access with CoA.mp4 4.7 MB
    icon Lesson 13 Network Infrastructure Security/001. Learning objectives.mp4 5.3 MB
    icon Lesson 13 Network Infrastructure Security/002. 13.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 12.6 MB
    icon Lesson 13 Network Infrastructure Security/003. 13.2 Configuring and Verifying Port Security.mp4 11.6 MB
    icon Lesson 13 Network Infrastructure Security/004. 13.3 Configuring and Verifying DHCP Snooping.mp4 10.9 MB
    icon Lesson 13 Network Infrastructure Security/005. 13.4 Configuring and Verifying Dynamic ARP Inspection.mp4 15.2 MB
    icon Lesson 13 Network Infrastructure Security/006. 13.5 Exploring and Mitigating Common Layer 2 Threats.mp4 15 MB
    icon Lesson 13 Network Infrastructure Security/007. 13.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 6.4 MB
    icon Lesson 13 Network Infrastructure Security/008. 13.7 Understanding and Configuring CDPLLDP.mp4 8.7 MB
    icon Lesson 13 Network Infrastructure Security/009. 13.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 14.6 MB
    icon Lesson 13 Network Infrastructure Security/010. 13.9 Exploring How to Secure the Management Plane.mp4 13.8 MB
    icon Lesson 13 Network Infrastructure Security/011. 13.10 Exploring How to Secure the Control Plane.mp4 14.6 MB
    icon Lesson 13 Network Infrastructure Security/012. 13.11 Exploring How to Secure the Data Plane.mp4 11.3 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/001. Learning objectives.mp4 8.1 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/002. 14.1 Introducing SDN.mp4 13.6 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/003. 14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 9.4 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/004. 14.3 Introducing Cisco ACI.mp4 17.1 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/005. 14.4 Introducing Cisco DNA and Cisco DNA Center.mp4 28.5 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/006. 14.5 Understanding VXLAN and Network Overlays.mp4 9.8 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/007. 14.6 Understanding Microsegmentation.mp4 8.9 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/008. 14.7 Surveying Open Source SDN Solutions.mp4 9.8 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/009. 14.8 Understanding the Threats Against SDN Solutions.mp4 7.2 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/010. 14.9 Understanding the Security Benefits in SDN Solutions.mp4 6.7 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/011. 14.10 Introducing Network Programmability.mp4 30.9 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/012. 14.11 Exploring DevNet and DevNet Resources for Security Automation.mp4 3.7 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/013. 14.12 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 37.2 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/014. 14.13 A Brief Introduction to Git.mp4 24.9 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/015. 14.14 Exploring pxGrid.mp4 15.6 MB
    icon Lesson 14 Software-Defined Networking Security and Programmability/016. 14.15 Integrating and Automating Security Operations with Cisco Products.mp4 11 MB
    icon Lesson 15 Overview of Ethical Hacking and Penetration Testing/001. Learning objectives.mp4 4.1 MB
    icon Lesson 15 Overview of Ethical Hacking and Penetration Testing/002. 15.1 Introducing Ethical Hacking and Pen Testing.mp4 20.6 MB
    icon Lesson 15 Overview of Ethical Hacking and Penetration Testing/003. 15.2 Exploring Penetration Testing Methodologies.mp4 21.1 MB
    icon Lesson 15 Overview of Ethical Hacking and Penetration Testing/004. 15.3 Explaining the Importance of the Planning and Preparation Phase.mp4 44.9 MB
    icon Lesson 15 Overview of Ethical Hacking and Penetration Testing/005. 15.4 Understanding the Legal Concepts of Penetration Testing.mp4 13.8 MB
    icon Lesson 15 Overview of Ethical Hacking and Penetration Testing/006. 15.5 Learning How to Scope a Penetration Testing Engagement Properly.mp4 14.6 MB
    icon Lesson 15 Overview of Ethical Hacking and Penetration Testing/007. 15.6 Learning the Key Aspects of Compliance-based Assessments.mp4 10.9 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/001. Learning objectives.mp4 4.2 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/002. 16.1 Introducing Footprinting Concepts and Methodologies.mp4 26.5 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/003. 16.2 Performing Footprinting through Search Engines.mp4 19.4 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/004. 16.3 Performing Footprinting through Web Services.mp4 22.1 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/005. 16.4 Performing Footprinting through Social Networking Sites.mp4 7.3 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/006. 16.5 Understanding Website Footprinting.mp4 36.8 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/007. 16.6 Understanding Email Footprinting.mp4 12.2 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/008. 16.7 Understanding Whois Footprinting.mp4 20.9 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/009. 16.8 Understanding DNS Footprinting.mp4 26.4 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/010. 16.9 Understanding Network Footprinting.mp4 13.6 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 56.4 MB
    icon Lesson 16 Information Gathering and Passive Reconnaissance/012. 16.11 Surveying Footprinting Tools.mp4 7.4 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/001. Learning objectives.mp4 5.8 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/002. 17.1 Surveying Network Scanning Concepts.mp4 12.8 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/003. 17.2 Exploiting Scanning Tools.mp4 35 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 66.5 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/005. 17.4 Understanding Port and Service Discovery.mp4 37.7 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/006. 17.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting).mp4 39.7 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 65.1 MB
    icon Lesson 17 Active Reconnaissance, Scanning, and Enumeration/008. 17.7 Creating Network Diagrams.mp4 25 MB

Similar Torrents