switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition - Audio Lesson 6 Fundamentals of Security Monitoring

c File Name Size files dur q aq Ac Fmt T Date
-001. Learning objectives.mp438781954.8050115655aacmovmp42023-08-23 16:06:42
-002. 6.1 Describing Endpoint-based Attacks.mp44177364592.5759865655aacmovmp42023-08-23 16:06:44
-003. 6.2 Understanding Data Normalization.mp41271954180.3090025655aacmovmp42023-08-23 16:06:44
-004. 6.3 Deconstructing Universal Data Formats.mp41323827187.6690025655aacmovmp42023-08-23 16:06:45
-005. 6.4 Understanding the 5-tuple Correlation.mp4914391129.5786855655aacmovmp42023-08-23 16:06:47
-006. 6.5 Performing DNS Analysis.mp464766291.7329935655aacmovmp42023-08-23 16:06:48
-007. 6.6 Performing Web Log Analysis.mp41834539260.1386855655aacmovmp42023-08-23 16:06:49
-008. 6.7 Performing Deterministic and Probabilistic Analysis.mp4841736119.2746715655aacmovmp42023-08-23 16:06:50
-009. 6.8 Understanding Security Monitoring Fundamentals.mp41139244161.4719955655aacmovmp42023-08-23 16:06:51
-010. 6.9 Surveying Security Monitoring Tools.mp41183426167.7439915655aacmovmp42023-08-23 16:06:52
-011. 6.10 Grasping Security Monitoring Operational Challenges.mp45698719808.4690025655aacmovmp42023-08-23 16:06:53

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB