RAR-files |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.rar |
50,000,000 |
5B6562E3 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r00 |
50,000,000 |
30724D02 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r01 |
50,000,000 |
58DBE4A2 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r02 |
50,000,000 |
5AD2B325 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r03 |
50,000,000 |
6B477268 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r04 |
50,000,000 |
132225A1 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r05 |
50,000,000 |
9EBEB966 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r06 |
50,000,000 |
FD75D496 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r07 |
50,000,000 |
6DF7BDEE |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r08 |
50,000,000 |
0C252213 |
linkedin.learning.certified.information.security.manager.cism.cert.prep.2022.4.incident.management-xqzt.r09 |
14,997,363 |
989AD29D |
|
Total size: |
514,997,363 |
|
|
Archived
files |
01.01-incident_management.mkv
[ef7b397bdd14b3bb]
|
17,741,727 |
82889910 |
01.02-what_you_need_to_know.mkv
[d3152e0adf06ec67]
|
1,307,876 |
E26173E5 |
01.03-study_resources.mkv
[b73d20440fd6b57e]
|
13,841,962 |
D32D1EFF |
02.01-role_of_a_manager_in_incident_response.mkv
[6c360172f9399ab2]
|
9,377,254 |
FE93CCD2 |
02.02-creating_an_incident_response_team.mkv
[e45b5d64e9b4213a]
|
11,198,825 |
2E8E8DCB |
03.01-identifying_and_classifying_security_incidents.mkv
[6c6092ada9ea99f5]
|
8,967,491 |
07028264 |
03.02-threat_classification.mkv
[e83d400104240c82]
|
9,769,480 |
6EE1EA1E |
03.03-zero_days_and_the_advanced_persistent_threat.mkv
[a5d7ed83d0b7bb14]
|
10,692,064 |
AA6ACC11 |
03.04-determining_incident_severity.mkv
[66207017f732c1f0]
|
9,125,711 |
C9849E65 |
04.01-build_an_incident_response_program.mkv
[7603b4b62fdae4b2]
|
16,549,827 |
A605211F |
04.02-incident_communications_plan.mkv
[90036c38943f7494]
|
12,625,536 |
7807F407 |
04.03-incident_identification.mkv
[9da4a7907a8204f3]
|
17,198,289 |
30FB873D |
04.04-escalation_and_notification.mkv
[8276eeccfd41627c]
|
7,119,740 |
4C3ABC0F |
04.05-mitigation.mkv
[804b23e649194de5]
|
6,941,992 |
0BEDF22D |
04.06-containment_techniques.mkv
[24abe06585b35faa]
|
7,550,116 |
0C8FAE68 |
04.07-incident_eradication_and_recovery.mkv
[85264384c0006ed1]
|
17,809,835 |
CB0611E8 |
04.08-validation.mkv
[3a42b5a79733e05]
|
5,372,991 |
6A08B81B |
04.09-post-incident_activities.mkv
[973c7aba78f45d63]
|
15,276,431 |
D4CD3A65 |
04.10-incident_response_exercises.mkv
[3f84b1b37daa27b1]
|
8,056,968 |
2A6A19BF |
05.01-network_symptoms.mkv
[d109ea11ed791856]
|
12,989,091 |
B237C653 |
05.02-rogue_access_points_and_evil_twins.mkv
[f06dbafbf0078076]
|
8,777,268 |
C6F5B802 |
05.03-endpoint_symptoms.mkv
[e2a1975bbf6ba370]
|
9,389,767 |
D2914357 |
05.04-application_symptoms.mkv
[2de97e438b00951f]
|
8,548,313 |
D8957B6B |
06.01-conducting_investigations.mkv
[1fb269a52b8b6e71]
|
15,346,066 |
C5EA2409 |
06.02-evidence_types.mkv
[fe07a60d7d15b972]
|
9,097,566 |
77A44D5A |
06.03-introduction_to_forensics.mkv
[e9f4e4364c579b73]
|
10,530,524 |
AD6B7B13 |
06.04-system_and_file_forensics.mkv
[c394c8817665e8c4]
|
15,808,995 |
B00955F8 |
06.05-file_carving.mkv
[bbc4a4804a7142c4]
|
14,799,795 |
BBAE89C9 |
06.06-creating_forensic_images.mkv
[ebcc8143cfee834f]
|
12,907,183 |
74F98CDB |
06.07-digital_forensics_toolkit.mkv
[3e0aaffda2a040b3]
|
8,642,792 |
0804E5AE |
06.08-operating_system_analysis.mkv
[bf20bf3dc8cfa2d3]
|
23,484,637 |
750713CD |
06.09-password_forensics.mkv
[506894c8f82154e9]
|
28,898,256 |
523F7CF0 |
06.10-network_forensics.mkv
[1eaaf8145a0d7aaa]
|
19,030,707 |
D9B670FD |
06.11-software_forensics.mkv
[312d0bc238de78bd]
|
24,300,118 |
2C17052C |
06.12-mobile_device_forensics.mkv
[c7391952202f007e]
|
3,175,774 |
AE30C0EB |
06.13-embedded_device_forensics.mkv
[5f9db7f02ec83f8d]
|
10,194,289 |
DD828133 |
06.14-chain_of_custody.mkv
[62c7025ef018429]
|
6,792,303 |
3F2EE278 |
06.15-ediscovery_and_evidence_production.mkv
[6260f365ea8d3f78]
|
13,869,072 |
738C7868 |
06.16-exploitation_frameworks.mkv
[aad6ee96cfdf28b8]
|
16,324,968 |
EC7753D2 |
07.01-security_information_and_event_management.mkv
[74bbc9b66bea74af]
|
13,732,113 |
ECCDC506 |
07.02-continuous_security_monitoring.mkv
[d362f40a5810b9e6]
|
12,074,351 |
673B479C |
08.01-continuing_your_studies.mkv
[cc53e79d4ee7ddbd]
|
9,755,133 |
556DB560 |
|
Total size: |
514,993,196 |
|
|