Jump to content

Incident Response and Digital Forensics


kingers

Recommended Posts

541637676_oip.jpg
531.59 MB | 00:12:27 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English



Files Included :
01 threat-intelligence-overview.mp4 (12.91 MB)
04 threat-intelligence-strategy-and-external-sources.mp4 (11.92 MB)
05 threat-intelligence-platforms.mp4 (14.54 MB)
01 threat-intelligence-frameworks.mp4 (14.24 MB)
02 security-intelligence.mp4 (8.32 MB)
01 what-is-data-security-and-protection.mp4 (14.81 MB)
02 data-security-top-challenges.mp4 (11.8 MB)
03 data-security-common-pitfalls.mp4 (13.17 MB)
04 industry-specific-data-security-challenges.mp4 (13.25 MB)
05 capabilities-of-data-protection.mp4 (12.59 MB)
06 critical-data-protection-capabilities.mp4 (14.43 MB)
07 data-protection-industry-example.mp4 (15.64 MB)
01 mobile-endpoint-protection.mp4 (18.24 MB)
01 vulnerability-assessment-tools.mp4 (26.13 MB)
01 port-scanning.mp4 (14.43 MB)
02 microsoft-windows-server-lab-environment.mp4 (8.43 MB)
01 network-protocol-analyzers-overview.mp4 (11.4 MB)
01 characteristics-of-a-security-architecture.mp4 (13.08 MB)
02 high-level-architectural-models.mp4 (12.92 MB)
03 solutions-architecture.mp4 (11.01 MB)
04 security-patterns.mp4 (5.65 MB)
01 application-security-overview.mp4 (14.32 MB)
03 application-security-threats-and-attacks.mp4 (14.08 MB)
04 application-security-standards-and-regulations.mp4 (12.84 MB)
01 devsecops-overview.mp4 (12.62 MB)
02 devsecops-deployment.mp4 (6.14 MB)
01 application-security-defects-writing-secure-code.mp4 (20.01 MB)
02 cross-site-scripting-common-attacks.mp4 (12.68 MB)
03 cross-site-scripting-effective-defenses.mp4 (17.28 MB)
01 siem-concepts-and-benefits.mp4 (18.81 MB)
02 siem-deployment.mp4 (14.81 MB)
03 siem-solutions-vendors.mp4 (19.27 MB)
01 qradar-siem-an-industry-example.mp4 (9.75 MB)
01 user-behavior-analytics.mp4 (17.21 MB)
01 ai-and-siem.mp4 (7.76 MB)
02 ai-and-siem-an-industry-example.mp4 (5.51 MB)
01 fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.mp4 (17.72 MB)
02 soc-cyber-threat-hunting.mp4 (17.52 MB)
03 cyber-threat-hunting-an-industry-example.mp4 (13.17 MB)]
Screenshot
6Deg6Uda_o.jpg
djAYe1Uk_o.jpg
8ukJc0cE_o.jpg
vm9S4sod_o.jpg
FCdUXIqT_o.jpg
P4ZdtQJX_o.jpg
5ZvyF74A_o.jpg
Gp5aMZG1_o.jpg
vPYQZPOo_o.jpg
CfVesTqG_o.jpg
pGu36OMh_o.jpg
hK6oOU4A_o.jpg
XNHz6412_o.jpg
EftfSdMb_o.jpg
8h4QyUJ0_o.jpg
vNHd33AJ_o.jpg
aLSLcQDV_o.jpg
QYgEwy6s_o.jpg
57Vda7co_o.jpg
8xZjwDji_o.jpg
t9gUt1p0_o.jpg
wSTHNhdp_o.jpg
OiPzjrsd_o.jpg
nP3bUQd1_o.jpg
ErASeLSi_o.jpg
eYt2PJr8_o.jpg
OflAEIR4_o.jpg





https://rapidgator.net/file/4f333e8f4e8af6c934c6f10f4580a4f9/Coursera.-.Incident.Response.and.Digital.Forensics.rar



https://nitroflare.com/view/14C5002290724D7/Coursera.-.Incident.Response.and.Digital.Forensics.rar


Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...