PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Coursera - Security Analyst Fundamentals Specialization

Category: Courses / Others
Author: AD-TEAM
Date added: 08.07.2023 :01:54
Views: 10
Comments: 0










Description material

Coursera - Security Analyst Fundamentals Specialization


Coursera - Security Analyst Fundamentals Specialization
Language: English | Size:1.49 GB
Genre:eLearning


Files Included :

01 introduction-to-penetration-testing.mp4 (1.89 MB)
MP4
02 what-is-penetration-testing.mp4 (124 MB)
MP4
01 penetration-testing-planning.mp4 (13.79 MB)
MP4
03 penetration-testing-discovery.mp4 (11.4 MB)
MP4
05 penetration-testing-additional-discovery-details.mp4 (10.61 MB)
MP4
08 penetration-testing-attack.mp4 (19.77 MB)
MP4
09 penetration-testing-reporting.mp4 (14.43 MB)
MP4
01 tools.mp4 (7.45 MB)
MP4
01 incident-response-overview.mp4 (2.38 MB)
MP4
02 what-is-incident-response.mp4 (33.23 MB)
MP4
01 incident-response-preparation.mp4 (30.29 MB)
MP4
03 incident-response-detection-analysis.mp4 (161.01 MB)
MP4
04 containment-eradication-recovery.mp4 (27.81 MB)
MP4
06 post-incident-activities.mp4 (12 MB)
MP4
01 incident-response-demo-part-1.mp4 (10.05 MB)
MP4
02 incident-response-demo-part-2.mp4 (28.14 MB)
MP4
03 incident-response-demo-part-3.mp4 (14.69 MB)
MP4
01 module-overview.mp4 (1.8 MB)
MP4
02 what-are-forensics.mp4 (24.39 MB)
MP4
01 data-collection-examination.mp4 (23.8 MB)
MP4
03 analysis-reporting.mp4 (27.56 MB)
MP4
01 data-files.mp4 (41.02 MB)
MP4
03 operating-system-data.mp4 (34.05 MB)
MP4
04 application-data.mp4 (12.05 MB)
MP4
05 network-data.mp4 (21.88 MB)
MP4
01 module-overview.mp4 (860.01 KB)
MP4
02 history-of-scripting.mp4 (10.73 MB)
MP4
03 scripting-concepts.mp4 (13.32 MB)
MP4
04 scripting-languages.mp4 (17.38 MB)
MP4
01 python-basics.mp4 (8.74 MB)
MP4
02 python-getting-started.mp4 (11.59 MB)
MP4
03 data-structures.mp4 (6.88 MB)
MP4
04 functions-and-methods.mp4 (3.53 MB)
MP4
05 python-libraries.mp4 (3.33 MB)
MP4
01 threat-intelligence-overview.mp4 (12.72 MB)
MP4
02 threat-intelligence-strategy-and-external-sources.mp4 (11.92 MB)
MP4
03 threat-intelligence-platforms.mp4 (14.54 MB)
MP4
01 threat-intelligence-frameworks.mp4 (14.24 MB)
MP4
02 security-intelligence.mp4 (8.32 MB)
MP4
01 what-is-data-security-and-protection.mp4 (14.81 MB)
MP4
02 data-security-top-challenges.mp4 (11.8 MB)
MP4
03 data-security-common-pitfalls.mp4 (13.17 MB)
MP4
04 industry-specific-data-security-challenges.mp4 (13.25 MB)
MP4
05 capabilities-of-data-protection.mp4 (12.59 MB)
MP4
06 critical-data-protection-capabilities.mp4 (14.43 MB)
MP4
07 data-protection-industry-example.mp4 (15.64 MB)
MP4
01 mobile-endpoint-protection.mp4 (18.24 MB)
MP4
01 vulnerability-assessment-tools.mp4 (26.13 MB)
MP4
01 port-scanning.mp4 (14.43 MB)
MP4
01 network-protocol-analyzers-overview.mp4 (11.4 MB)
MP4
01 characteristics-of-a-security-architecture.mp4 (13.08 MB)
MP4
02 high-level-architectural-models.mp4 (12.92 MB)
MP4
03 solutions-architecture.mp4 (11.01 MB)
MP4
04 security-patterns.mp4 (5.65 MB)
MP4
01 application-security-overview.mp4 (14.32 MB)
MP4
03 application-security-threats-and-attacks.mp4 (14.08 MB)
MP4
04 application-security-standards-and-regulations.mp4 (12.84 MB)
MP4
01 devsecops-overview.mp4 (12.62 MB)
MP4
02 devsecops-deployment.mp4 (6.14 MB)
MP4
01 application-security-defects-writing-secure-code.mp4 (20.01 MB)
MP4
02 cross-site-scripting-common-attacks.mp4 (12.68 MB)
MP4
03 cross-site-scripting-effective-defenses.mp4 (17.28 MB)
MP4
01 siem-concepts-and-benefits.mp4 (20.03 MB)
MP4
02 siem-deployment.mp4 (14.81 MB)
MP4
03 siem-solutions-vendors.mp4 (19.27 MB)
MP4
01 qradar-siem-an-industry-example.mp4 (9.75 MB)
MP4
02 user-behavior-analytics.mp4 (17.21 MB)
MP4
01 ai-and-siem.mp4 (7.76 MB)
MP4
02 ai-and-siem-an-industry-example.mp4 (5.51 MB)
MP4
01 fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.mp4 (17.72 MB)
MP4
02 soc-cyber-threat-hunting.mp4 (17.52 MB)
MP4
03 cyber-threat-hunting-an-industry-example.mp4 (13.17 MB)
MP4
02 what-is-a-breach.mp4 (6.91 MB)
MP4
01 target-attack-timeline.mp4 (17.43 MB)
MP4
02 target-attack-vulnerabilities.mp4 (6.56 MB)
MP4
03 watering-hole-attack.mp4 (13.35 MB)
MP4
01 phishing-scams-overview.mp4 (17.6 MB)
MP4
03 phishing-email-study.mp4 (11.57 MB)
MP4
05 impact-of-phishing.mp4 (10.9 MB)
MP4
01 phishing-case-study-google-facebook.mp4 (12.85 MB)
MP4
01 point-of-sale-breach-overview.mp4 (14.15 MB)
MP4
02 pos-malware.mp4 (12.04 MB)
MP4
01 pos-case-study-home-depot.mp4 (14.83 MB)
MP4
01 3rd-party-breach-overview.mp4 (16.33 MB)
MP4
02 3rd-party-breach-impacts.mp4 (10.35 MB)
MP4
01 3rd-party-breach-quest-diagnostics.mp4 (13.02 MB)
MP4
01 ransomware-overview.mp4 (11.03 MB)
MP4
03 examples-of-ransomware.mp4 (13.19 MB)
MP4
01 ransomware-case-study-city-of-atlanta.mp4 (15.94 MB)
MP4






Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: