"The great use of a life is to spend it for something that outlasts it." ―William James 1842-1910
  • Anonymous
  • 2022-09-26 12:34:30
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
37,484
Stored files
794 00E1B476
27,043 540633AE
1,298 CC42B0A8
RAR-files
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.rar 50,000,000 5B6562E3
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r00 50,000,000 30724D02
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r01 50,000,000 58DBE4A2
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r02 50,000,000 5AD2B325
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r03 50,000,000 6B477268
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r04 50,000,000 132225A1
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r05 50,000,000 9EBEB966
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r06 50,000,000 FD75D496
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r07 50,000,000 6DF7BDEE
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r08 50,000,000 0C252213
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r09 14,997,363 989AD29D

Total size: 514,997,363
Archived files
01.01-incident_management.mkv [ef7b397bdd14b3bb] 17,741,727 82889910
01.02-what_you_need_to_know.mkv [d3152e0adf06ec67] 1,307,876 E26173E5
01.03-study_resources.mkv [b73d20440fd6b57e] 13,841,962 D32D1EFF
02.01-role_of_a_manager_in_incident_response.mkv [6c360172f9399ab2] 9,377,254 FE93CCD2
02.02-creating_an_incident_response_team.mkv [e45b5d64e9b4213a] 11,198,825 2E8E8DCB
03.01-identifying_and_classifying_security_incidents.mkv [6c6092ada9ea99f5] 8,967,491 07028264
03.02-threat_classification.mkv [e83d400104240c82] 9,769,480 6EE1EA1E
03.03-zero_days_and_the_advanced_persistent_threat.mkv [a5d7ed83d0b7bb14] 10,692,064 AA6ACC11
03.04-determining_incident_severity.mkv [66207017f732c1f0] 9,125,711 C9849E65
04.01-build_an_incident_response_program.mkv [7603b4b62fdae4b2] 16,549,827 A605211F
04.02-incident_communications_plan.mkv [90036c38943f7494] 12,625,536 7807F407
04.03-incident_identification.mkv [9da4a7907a8204f3] 17,198,289 30FB873D
04.04-escalation_and_notification.mkv [8276eeccfd41627c] 7,119,740 4C3ABC0F
04.05-mitigation.mkv [804b23e649194de5] 6,941,992 0BEDF22D
04.06-containment_techniques.mkv [24abe06585b35faa] 7,550,116 0C8FAE68
04.07-incident_eradication_and_recovery.mkv [85264384c0006ed1] 17,809,835 CB0611E8
04.08-validation.mkv [3a42b5a79733e05] 5,372,991 6A08B81B
04.09-post-incident_activities.mkv [973c7aba78f45d63] 15,276,431 D4CD3A65
04.10-incident_response_exercises.mkv [3f84b1b37daa27b1] 8,056,968 2A6A19BF
05.01-network_symptoms.mkv [d109ea11ed791856] 12,989,091 B237C653
05.02-rogue_access_points_and_evil_twins.mkv [f06dbafbf0078076] 8,777,268 C6F5B802
05.03-endpoint_symptoms.mkv [e2a1975bbf6ba370] 9,389,767 D2914357
05.04-application_symptoms.mkv [2de97e438b00951f] 8,548,313 D8957B6B
06.01-conducting_investigations.mkv [1fb269a52b8b6e71] 15,346,066 C5EA2409
06.02-evidence_types.mkv [fe07a60d7d15b972] 9,097,566 77A44D5A
06.03-introduction_to_forensics.mkv [e9f4e4364c579b73] 10,530,524 AD6B7B13
06.04-system_and_file_forensics.mkv [c394c8817665e8c4] 15,808,995 B00955F8
06.05-file_carving.mkv [bbc4a4804a7142c4] 14,799,795 BBAE89C9
06.06-creating_forensic_images.mkv [ebcc8143cfee834f] 12,907,183 74F98CDB
06.07-digital_forensics_toolkit.mkv [3e0aaffda2a040b3] 8,642,792 0804E5AE
06.08-operating_system_analysis.mkv [bf20bf3dc8cfa2d3] 23,484,637 750713CD
06.09-password_forensics.mkv [506894c8f82154e9] 28,898,256 523F7CF0
06.10-network_forensics.mkv [1eaaf8145a0d7aaa] 19,030,707 D9B670FD
06.11-software_forensics.mkv [312d0bc238de78bd] 24,300,118 2C17052C
06.12-mobile_device_forensics.mkv [c7391952202f007e] 3,175,774 AE30C0EB
06.13-embedded_device_forensics.mkv [5f9db7f02ec83f8d] 10,194,289 DD828133
06.14-chain_of_custody.mkv [62c7025ef018429] 6,792,303 3F2EE278
06.15-ediscovery_and_evidence_production.mkv [6260f365ea8d3f78] 13,869,072 738C7868
06.16-exploitation_frameworks.mkv [aad6ee96cfdf28b8] 16,324,968 EC7753D2
07.01-security_information_and_event_management.mkv [74bbc9b66bea74af] 13,732,113 ECCDC506
07.02-continuous_security_monitoring.mkv [d362f40a5810b9e6] 12,074,351 673B479C
08.01-continuing_your_studies.mkv [cc53e79d4ee7ddbd] 9,755,133 556DB560

Total size: 514,993,196
Video files
Sample
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt-sample.mkv 5,851,141 87D92638
RAR Recovery
Not Present
Labels UNKNOWN