switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition Lesson 1 Cybersecurity Fundamentals

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt1188srtsrt2023-08-23 17:36:19
-001. Learning objectives.mp4608005259.350204819686125h264aacmov1280x72030mp42023-08-23 15:50:55
-002. 1.1 Describing the CIA Triad en.srt4429srtsrt2023-08-23 17:36:20
-002. 1.1 Describing the CIA Triad.mp46708211180.117188297164125h264aacmov1280x72030mp42023-08-23 15:50:56
-003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems en.srt1898srtsrt2023-08-23 17:36:20
-003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp41301335598.1275281060928125h264aacmov1280x72030mp42023-08-23 15:50:57
-004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections en.srt6822srtsrt2023-08-23 17:36:21
-004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp411985739259.900952368235125h264aacmov1280x72030mp42023-08-23 15:50:59
-005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware en.srt6504srtsrt2023-08-23 17:36:21
-005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp411164761210.419229424291125h264aacmov1280x72030mp42023-08-23 15:51:00
-006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management en.srt5684srtsrt2023-08-23 17:36:21
-006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp435264427263.8715651069936125h264aacmov1280x72030mp42023-08-23 15:51:03
-007. 1.6 Defining Threat Intelligence en.srt6845srtsrt2023-08-23 17:36:22
-007. 1.6 Defining Threat Intelligence.mp447790340328.56235811631030125h264aacmov1280x72030mp42023-08-23 15:51:07
-008. 1.7 Defining Threat Hunting en.srt11797srtsrt2023-08-23 17:36:22
-008. 1.7 Defining Threat Hunting.mp429635700444.940771532399125h264aacmov1280x72030mp42023-08-23 15:51:10
-009. 1.8 Understanding Malware Analysis en.srt4390srtsrt2023-08-23 17:36:22
-009. 1.8 Understanding Malware Analysis.mp429519078207.79537411361003125h264aacmov1280x72030mp42023-08-23 15:51:12
-010. 1.9 Interpreting the Output Report of a Malware Analysis Tool en.srt1697srtsrt2023-08-23 17:36:23
-010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4994951494.807075839706125h264aacmov1280x72030mp42023-08-23 15:51:14
-011. 1.10 Understanding the Different Threat Actor Types en.srt5166srtsrt2023-08-23 17:36:23
-011. 1.10 Understanding the Different Threat Actor Types.mp45939461188.546032252118125h264aacmov1280x72030mp42023-08-23 15:51:14
-012. 1.11 Defining Run Book Automation (RBA) en.srt3090srtsrt2023-08-23 17:36:23
-012. 1.11 Defining Run Book Automation (RBA).mp48904006133.491519533400125h264aacmov1280x72030mp42023-08-23 15:51:15
-013. 1.12 Defining Reverse Engineering en.srt6566srtsrt2023-08-23 17:36:24
-013. 1.12 Defining Reverse Engineering.mp410090474254.606803317183125h264aacmov1280x72030mp42023-08-23 15:51:16
-014. 1.13 Understanding the Sliding Window Anomaly Detection en.srt1783srtsrt2023-08-23 17:36:24
-014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4500456380.828685495362125h264aacmov1280x72030mp42023-08-23 15:51:17

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB