CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\03.Identifying and classifying security incidents.en.srt |
5,884 |
3A8A35AC |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\05.Zero days and the advanced persistent threat.mp4
[8bdad1dd0d7e9c]
|
8,910,534 |
53F4B812 |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\05.Zero days and the advanced persistent threat.en.srt |
6,094 |
1A0FAEA2 |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\04.Threat classification.en.srt |
7,368 |
546320B5 |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\03.Identifying and classifying security incidents.mp4
[f087610874cdbc25]
|
8,425,241 |
6B115452 |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\06.Determining incident severity.en.srt |
6,152 |
FB7CEA01 |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\06.Determining incident severity.mp4
[c6a1622efb1eb748]
|
8,499,876 |
29DCED1B |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents\04.Threat classification.mp4
[9ec8ffea5be67189]
|
9,390,785 |
9DC61AC7 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\17.Network symptoms.mp4
[1524d09e2a84fec8]
|
8,487,763 |
D3D5A252 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\20.Application symptoms.mp4
[ae459950d6e14c5a]
|
6,200,188 |
38594A76 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\17.Network symptoms.en.srt |
7,367 |
4DB54A1D |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\19.Endpoint symptoms.mp4
[d62ecf380a17fd34]
|
7,926,497 |
AD208D42 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\18.Rogue access points and evil twins.en.srt |
5,944 |
322A9304 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\20.Application symptoms.en.srt |
4,186 |
5E21C1B1 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\18.Rogue access points and evil twins.mp4
[e4b1ae6170f92161]
|
8,148,687 |
282E5442 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms\19.Endpoint symptoms.en.srt |
4,683 |
5168F158 |
CySA+ Cert Prep - 3 Cyber Incident Response\1.Introduction\02.What you need to know.en.srt |
1,316 |
2339BBD8 |
CySA+ Cert Prep - 3 Cyber Incident Response\1.Introduction\01.Welcome.en.srt |
6,117 |
80FC217E |
CySA+ Cert Prep - 3 Cyber Incident Response\1.Introduction\01.Welcome.mp4
[7f140216728d5f32]
|
12,190,996 |
98EA4A44 |
CySA+ Cert Prep - 3 Cyber Incident Response\1.Introduction\02.What you need to know.mp4
[14b85d46377dc44f]
|
2,032,143 |
B1318B14 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\24.System and file forensics.mp4
[81014bd13894f0aa]
|
12,396,230 |
FFEC1FE0 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\29.Network forensics.en.srt |
7,840 |
9FFE485B |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\26.Digital forensics toolkit.mp4
[c0f5e536605e639e]
|
9,395,035 |
4275AC9D |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\32.Embedded device forensics.mp4
[a1966d0f9eec799d]
|
9,510,388 |
84369F6A |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\30.Software forensics.en.srt |
6,184 |
C3311B79 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\30.Software forensics.mp4
[905e70b4c17afa0]
|
11,881,741 |
F04E4C2C |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\32.Embedded device forensics.en.srt |
5,127 |
B069F379 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\25.Creating forensic images.mp4
[3a0f0cad23a3ca1]
|
14,529,667 |
0DA5983E |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\33.Chain of custody.en.srt |
3,974 |
EF3655AF |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\21.Conducting investigations.en.srt |
8,800 |
450285F1 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\28.Password forensics.mp4
[b40e2b624b21d002]
|
25,093,111 |
3198A6A3 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\29.Network forensics.mp4
[2ccc3357c4a334c]
|
13,403,907 |
EAB90D22 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\23.Introduction to forensics.mp4
[c2b9fe5bbef6696e]
|
9,209,012 |
2283F221 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\33.Chain of custody.mp4
[9d73e499a6da8745]
|
6,212,044 |
9C5B5F91 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\26.Digital forensics toolkit.en.srt |
5,654 |
2AE9BEB5 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\21.Conducting investigations.mp4
[dca323990c17533b]
|
13,033,031 |
1AA6EF08 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\22.Evidence types.en.srt |
6,918 |
DC66234D |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\27.Operating system analysis.en.srt |
11,831 |
F2796D12 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\25.Creating forensic images.en.srt |
10,022 |
725EED8B |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\31.Mobile device forensics.en.srt |
2,813 |
31F91D79 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\31.Mobile device forensics.mp4
[47d150c17037fa47]
|
4,003,785 |
8B1A8BC8 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\27.Operating system analysis.mp4
[e49ec9fbb09c1993]
|
19,576,122 |
3E30D7A9 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\23.Introduction to forensics.en.srt |
7,220 |
737ABC60 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\34.Ediscovery and evidence production.mp4
[342309be5004e7d3]
|
9,878,926 |
D8CD32A2 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\28.Password forensics.en.srt |
13,374 |
3A8E4CB6 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\24.System and file forensics.en.srt |
7,695 |
6D29D093 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\22.Evidence types.mp4
[4c640e77355c8717]
|
9,219,997 |
0FD80256 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations\34.Ediscovery and evidence production.en.srt |
6,176 |
6C4004B8 |
CySA+ Cert Prep - 3 Cyber Incident Response\6.Next Steps\35.Next steps.mp4
[bdc4d6d73e8944ef]
|
1,852,275 |
3C142921 |
CySA+ Cert Prep - 3 Cyber Incident Response\6.Next Steps\35.Next steps.en.srt |
1,365 |
7AFDF030 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\08.Incident communications plan.en.srt |
5,072 |
456BEA72 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\16.Creating an incident response team.mp4
[7eb5a6a4c94b1339]
|
5,093,518 |
BC22130C |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\14.Validation.mp4
[806a4ab1e3fa42e2]
|
5,707,887 |
715E66B9 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\10.Escalation and notification.en.srt |
4,780 |
E67E6AEC |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\13.Incident eradication and recovery.mp4
[29a56b875737c662]
|
11,991,896 |
9211306F |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\07.Build an incident response program.mp4
[f78d24f7a32219b]
|
15,286,808 |
E05CD6F7 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\10.Escalation and notification.mp4
[383db38c5886f4ad]
|
6,829,608 |
546DFDDB |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\09.Incident identification.mp4
[3ec60ee436fb5288]
|
9,632,915 |
5218BFF2 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\13.Incident eradication and recovery.en.srt |
8,278 |
94FC9111 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\12.Containment techniques.mp4
[992d51e1a96c5930]
|
8,175,173 |
3EE1D441 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\16.Creating an incident response team.en.srt |
3,822 |
04F735CB |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\15.Lessons learned and reporting.en.srt |
6,120 |
A5B3F964 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\15.Lessons learned and reporting.mp4
[37ee9a93cc1288aa]
|
7,989,784 |
17CB9250 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\07.Build an incident response program.en.srt |
8,137 |
B50F4FD3 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\12.Containment techniques.en.srt |
6,052 |
5CF541DE |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\09.Incident identification.en.srt |
7,289 |
ADFBAF79 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\08.Incident communications plan.mp4
[39dc882c6fc55]
|
6,207,950 |
C78CFC61 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\14.Validation.en.srt |
4,344 |
099D1868 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\11.Mitigation.en.srt |
4,858 |
3C71BB4C |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process\11.Mitigation.mp4
[621012e8c95e9ac2]
|
6,411,642 |
A1652E80 |
CySA+ Cert Prep - 3 Cyber Incident Response\2.1. Assessing Incidents |
0 |
00000000 |
CySA+ Cert Prep - 3 Cyber Incident Response\4.3. Incident Symptoms |
0 |
00000000 |
CySA+ Cert Prep - 3 Cyber Incident Response\1.Introduction |
0 |
00000000 |
CySA+ Cert Prep - 3 Cyber Incident Response\5.4. Forensic Investigations |
0 |
00000000 |
CySA+ Cert Prep - 3 Cyber Incident Response\6.Next Steps |
0 |
00000000 |
CySA+ Cert Prep - 3 Cyber Incident Response\3.2. Incident Response Process |
0 |
00000000 |
CySA+ Cert Prep - 3 Cyber Incident Response |
0 |
00000000 |
|
Total size: |
332,954,018 |
|