switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition - Audio Lesson 10 Network Intrusion Analysis

c File Name Size files dur q aq Ac Fmt T Date
-001. Learning objectives.mp437771253.3759865655aacmovmp42023-08-23 16:07:23
-002. 10.1 Introducing Intrusion Analysis Fundamentals.mp43473713492.7359865655aacmovmp42023-08-23 16:07:24
-003. 10.2 Examining Packet Captures.mp42370139336.1490025655aacmovmp42023-08-23 16:07:25
-004. 10.3 Examining Protocol Headers.mp4975755138.2826535655aacmovmp42023-08-23 16:07:26
-005. 10.4 Analyzing Security Device Data.mp42271957322.2186855655aacmovmp42023-08-23 16:07:28
-006. 10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives.mp41200772170.2186855655aacmovmp42023-08-23 16:07:28
-007. 10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring.mp4932335132.1170075655aacmovmp42023-08-23 16:07:29
-008. 10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark.mp453033475.0719955655aacmovmp42023-08-23 16:07:31
-009. 10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert.mp41736684246.250685655aacmovmp42023-08-23 16:07:32

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB