switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition - Audio Lesson 7 Intrusion Event Categories

c File Name Size files dur q aq Ac Fmt T Date
-001. Learning objectives.mp444122662.3786855655aacmovmp42023-08-23 16:06:54
-002. 7.1 Identifying and Mitigating Reconnaissance.mp43620659513.65655aacmovmp42023-08-23 16:06:56
-003. 7.2 Identifying and Mitigating Weaponization.mp41091790154.7519955655aacmovmp42023-08-23 16:06:57
-004. 7.3 Identifying and Mitigating Delivery.mp4883791125.2480055655aacmovmp42023-08-23 16:06:57
-005. 7.4 Identifying and Mitigating Exploitation.mp444262562.6346715655aacmovmp42023-08-23 16:06:58
-006. 7.5 Identifying and Mitigating Installation.mp41200281170.1329935655aacmovmp42023-08-23 16:07:00
-007. 7.6 Identifying and Mitigating Command and Control.mp470559099.9466675655aacmovmp42023-08-23 16:07:00
-008. 7.7 Understanding Action on Objectives.mp4975264138.2186855655aacmovmp42023-08-23 16:07:01
-009. 7.8 Understanding the MITRE ATT&CK Framework.mp45882484834.5386855655aacmovmp42023-08-23 16:07:03

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB