switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition - Audio Lesson 1 Cybersecurity Fundamentals

c File Name Size files dur q aq Ac Fmt T Date
-001. Learning objectives.mp441947759.2850115655aacmovmp42023-08-23 16:05:41
-002. 1.1 Describing the CIA Triad.mp41270154180.0529935655aacmovmp42023-08-23 16:05:42
-003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp469233598.0690025655aacmovmp42023-08-23 16:05:43
-004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp41832412259.845655aacmovmp42023-08-23 16:05:43
-005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp41483701210.3680055655aacmovmp42023-08-23 16:05:44
-006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp41860394263.8080055655aacmovmp42023-08-23 16:05:45
-007. 1.6 Defining Threat Intelligence.mp42316303328.5119955655aacmovmp42023-08-23 16:05:46
-008. 1.7 Defining Threat Hunting.mp43136452444.8850115655aacmovmp42023-08-23 16:05:48
-009. 1.8 Understanding Malware Analysis.mp41465210207.7439915655aacmovmp42023-08-23 16:05:49
-010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp466893594.7409985655aacmovmp42023-08-23 16:05:49
-011. 1.10 Understanding the Different Threat Actor Types.mp41329554188.485655aacmovmp42023-08-23 16:05:50
-012. 1.11 Defining Run Book Automation (RBA).mp4941555133.445655aacmovmp42023-08-23 16:05:51
-013. 1.12 Defining Reverse Engineering.mp41795102254.5490025655aacmovmp42023-08-23 16:05:52
-014. 1.13 Understanding the Sliding Window Anomaly Detection.mp457042680.7680055655aacmovmp42023-08-23 16:05:53

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB