RAR-files |
jgt-evaluating-organizations-security-posture.rar |
15,000,000 |
32001C69 |
jgt-evaluating-organizations-security-posture.r00 |
15,000,000 |
406FC0E6 |
jgt-evaluating-organizations-security-posture.r01 |
15,000,000 |
4633708F |
jgt-evaluating-organizations-security-posture.r02 |
15,000,000 |
3266951F |
jgt-evaluating-organizations-security-posture.r03 |
15,000,000 |
63C89B54 |
jgt-evaluating-organizations-security-posture.r04 |
15,000,000 |
2C826159 |
jgt-evaluating-organizations-security-posture.r05 |
15,000,000 |
002491E4 |
jgt-evaluating-organizations-security-posture.r06 |
15,000,000 |
2CA5A2D0 |
jgt-evaluating-organizations-security-posture.r07 |
15,000,000 |
F4601C5E |
jgt-evaluating-organizations-security-posture.r08 |
15,000,000 |
B8095786 |
jgt-evaluating-organizations-security-posture.r09 |
15,000,000 |
AFD24825 |
jgt-evaluating-organizations-security-posture.r10 |
15,000,000 |
67908DCE |
jgt-evaluating-organizations-security-posture.r11 |
15,000,000 |
CA2F995C |
jgt-evaluating-organizations-security-posture.r12 |
15,000,000 |
8CF5D452 |
jgt-evaluating-organizations-security-posture.r13 |
15,000,000 |
D39477B3 |
jgt-evaluating-organizations-security-posture.r14 |
15,000,000 |
CA49ED92 |
jgt-evaluating-organizations-security-posture.r15 |
15,000,000 |
AA61EA9F |
jgt-evaluating-organizations-security-posture.r16 |
15,000,000 |
16473EAE |
jgt-evaluating-organizations-security-posture.r17 |
15,000,000 |
D7DDD1CB |
jgt-evaluating-organizations-security-posture.r18 |
15,000,000 |
FBF8EB4D |
jgt-evaluating-organizations-security-posture.r19 |
15,000,000 |
1A079BE4 |
jgt-evaluating-organizations-security-posture.r20 |
15,000,000 |
88CAC9BB |
jgt-evaluating-organizations-security-posture.r21 |
15,000,000 |
AB19D5AE |
jgt-evaluating-organizations-security-posture.r22 |
15,000,000 |
FD9D53C6 |
jgt-evaluating-organizations-security-posture.r23 |
15,000,000 |
D04335B2 |
jgt-evaluating-organizations-security-posture.r24 |
15,000,000 |
398B076E |
jgt-evaluating-organizations-security-posture.r25 |
15,000,000 |
8E032EEE |
jgt-evaluating-organizations-security-posture.r26 |
10,051,877 |
7F03635C |
|
Total size: |
415,051,877 |
|
|
Archived
files |
Pluralsight Evaluating Your Organization’s Security Posture\01.Course Overview\0101.Course Overview.mp4
[ddb9faaa458fa9f3]
|
4,620,979 |
A13DF48D |
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0201.Overview.mp4
[bac82f4f703673c3]
|
3,928,965 |
5DA92FDD |
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0202.Practices of an Evaluation.mp4
[cdcc6a7e84615527]
|
4,452,511 |
03A6A2BD |
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0203.Metrics and Measurements Primer.mp4
[e99842cfc1f07be]
|
7,011,417 |
DF7268B5 |
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0204.Introduction to the Scenario.mp4
[5263cd167c82f98d]
|
5,686,122 |
EB8A9CE8 |
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0205.Demo Risk Assessment in Eramba.mp4
[20a4ce605adf9826]
|
33,579,121 |
74441FF1 |
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0206.Summary.mp4
[4002cec38538fd32]
|
1,937,404 |
B8CD0A31 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0301.Overview.mp4
[beb63eacb0f4f6fa]
|
2,576,557 |
46116670 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0302.Logical Areas of IT.mp4
[41bf813dc037fda9]
|
3,763,564 |
1887AE85 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0303.New and Evolving Areas of IT.mp4
[cd0f6410c8546564]
|
5,358,987 |
2442794B |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0304.Basics of Planning and Organizing Your Evaluation.mp4
[9fe277575a1a0ac2]
|
6,410,876 |
70C969F6 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0305.Demo Building a Project Plan in Trello.mp4
[6cb16d5ddd99b617]
|
11,617,796 |
2361AA83 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0306.The Info Gathering Cycle.mp4
[a46fac19fddaa02c]
|
1,413,815 |
165CFC8E |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0307.Frameworks for Guiding Evaluations.mp4
[ffe651667524ee2c]
|
20,051,117 |
AAFBF981 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0308.Demo Review the Top 20 CIS Controls in Eramba.mp4
[a5ee4a5e3e72ee95]
|
5,500,343 |
195FFA00 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0309.Summary.mp4
[7fa1fdb21347f757]
|
1,216,935 |
B7FC353F |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0401.Overview.mp4
[3fe1ca061d6d68df]
|
1,718,191 |
6B82E0B4 |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0402.Types of Evidence.mp4
[bc99d055fdd1b84d]
|
11,103,619 |
D1584DF7 |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0403.Policies and Procedures.mp4
[feebe1b57c3e89e3]
|
4,094,562 |
FB43F9F1 |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0404.Tips and Tricks for Interviews.mp4
[93fb5a05ad74e9cc]
|
6,501,268 |
FCCBDE3C |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0405.Maintaining Evidence Integrity.mp4
[13ec3c92373b1824]
|
2,603,803 |
D38EE061 |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0406.Demo Generating a Hash with PowerShell.mp4
[26eb9174f4ecf168]
|
6,749,105 |
99594C12 |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0407.Summary.mp4
[7380e7913421ae75]
|
1,435,116 |
B695CCE0 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0501.Overview .mp4
[37eef8f2be597455]
|
1,481,765 |
26091D68 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0502.Understanding Layers of Physical Security.mp4
[47f059ade8281063]
|
5,437,261 |
F2A6A3F2 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0503.Threats and Vulnerabilities.mp4
[d18d00e9ffb945fe]
|
3,529,489 |
4BF1BE35 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0504.Outer Perimeter Controls and Countermeasures.mp4
[46c5727246cd541e]
|
2,560,245 |
8F45F144 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0505.Inner Perimeter Controls and Countermeasures.mp4
[8722f0d91a32941]
|
5,191,056 |
28A166F1 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0506.Locks, Badges, and CCTV.mp4
[8de5e67424308cc]
|
3,741,581 |
3031835E |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0507.Work Center Security.mp4
[99695b28852746d9]
|
3,277,372 |
D94CFC4B |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0508.Inventory and Vendor Management.mp4
[ce2ebe364276a7d8]
|
4,123,877 |
12BF54CA |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0509.Testing and Assessing Physical Controls.mp4
[1976110222681b75]
|
2,172,236 |
56A159D4 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0510.Summary.mp4
[d089c2a67e6e7d98]
|
1,770,376 |
C9D7635E |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0601.Overview.mp4
[7c744820968db2b1]
|
3,999,973 |
0EDCC345 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0602.Why You Should Map Your External Footprint.mp4
[5d5548f42300f081]
|
12,457,968 |
657AD66E |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0603.The Process of Evaluating Your External Environment.mp4
[b8830df853c19eaa]
|
3,419,286 |
20C0B430 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0604.Enumerating Subdomains & Demo.mp4
[4f79d52169f7d7ac]
|
6,214,918 |
532511CF |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0605.Email Addresses Are a Target.mp4
[2b0e924e5e44f301]
|
1,482,416 |
2CC381E4 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0606.Evaluating Your Cloud Tenant.mp4
[c1e5c75e28de9d5e]
|
7,405,720 |
9A697F0E |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0607.Assessing Web Apps.mp4
[dbf06328ab261367]
|
3,389,081 |
ED245525 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0608.Assessing Bug Tracking & Release Cycles.mp4
[32c1ba866ede4e62]
|
7,442,849 |
D513A672 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0609.Questions for Penetration Testing and Vulnerability Scanning.mp4
[13e3c6a2351b18c8]
|
6,987,264 |
E6DA0ADF |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0610.Considerations for SaaS.mp4
[26c57f4256a2610a]
|
4,379,332 |
EBFACC20 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0611.Demo Finding Secrets in GitHub.mp4
[8e140b758fcccd33]
|
8,308,286 |
DAAE2471 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0612.Summary.mp4
[b4fea2a555da9a71]
|
3,050,708 |
7A83237B |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0701.Overview.mp4
[50e69bd3ee0ee8f3]
|
3,764,217 |
87DAAC2A |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0702.Assessing AD and Administrators.mp4
[890ec5b9d8481e61]
|
6,056,017 |
E5326268 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0703.IT Services and Account Lifecycle.mp4
[e4447999fb1b99ab]
|
5,133,605 |
60236F66 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0704.Investigating Email Security.mp4
[8498072e942e2d72]
|
3,275,547 |
5930DF07 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0705.Assessing NTP.mp4
[6dbf3ecd56bb33f8]
|
3,279,785 |
76F23073 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0706.Evaluating Log Practices.mp4
[364c55cd64f38f9b]
|
2,041,264 |
69EF5161 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0707.Digging into Fileshares.mp4
[6975f5e1dd0c5736]
|
3,188,366 |
9A6A4D32 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0708.DNS Security Posture.mp4
[8312282757cc15eb]
|
6,585,576 |
5A373503 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0709.Evaluating Networking.mp4
[4ecc78d3adf16558]
|
4,201,848 |
5FF793D6 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0710.Vulnerability Management.mp4
[813df8320e6945c5]
|
3,185,371 |
BC42D45C |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0711.All About Incident Response.mp4
[bc8964fb31af369d]
|
7,542,407 |
F81FE6CA |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0712.Summary.mp4
[ead34d7f85e09943]
|
1,369,133 |
A408D82C |
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0801.Overview.mp4
[cd673181ecd4349]
|
4,697,740 |
C0721E18 |
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0802.Assessing Employee Security Training.mp4
[ea74c2bcd1523ee]
|
5,474,202 |
B097EF9A |
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0803.Avenues of Social Engineering.mp4
[21d0e3dd0129fb48]
|
5,943,549 |
0BC0572B |
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0804.Why to Focus Efforts on Phishing.mp4
[396a337d42f55d5b]
|
3,048,756 |
3BB53F9E |
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0805.Gophish Demo.mp4
[75ec360ecbdc9f33]
|
19,021,880 |
0CDD7990 |
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0806.Summary.mp4
[a3fe99df42c0da6b]
|
2,484,177 |
32D59714 |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0901.Overview.mp4
[ec8df19dd8880dde]
|
3,701,906 |
363B6FC9 |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0902.Creating Measurements and Metrics.mp4
[663cf6c797830b92]
|
4,625,022 |
F33C038D |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0903. Planning and Organizing Measures.mp4
[af00fe3a5b700d94]
|
2,982,160 |
CB664282 |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0904.Evidence Measures.mp4
[3bd9f8bac838bd00]
|
3,252,912 |
14D3C67C |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0905.Physical Measures.mp4
[d584c7a3c39a7bb2]
|
2,243,640 |
2EE13C9C |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0906.External Measures.mp4
[f4a720fa78b1d8d7]
|
5,013,353 |
B53C5F62 |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0907.Internal Measures.mp4
[ff249df1c71b507f]
|
3,689,604 |
B8A4DA39 |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0908.Social Engineering Measures.mp4
[af29f69b208f3619]
|
1,921,553 |
1EECF82D |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0909.Dashboard Example.mp4
[a562754b85fc4c5c]
|
4,059,463 |
059E8065 |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0910.Summary.mp4
[9d2f9caa8495c886]
|
1,505,628 |
E2E0BC96 |
Pluralsight Evaluating Your Organization’s Security Posture\10.Wrapping the Security Evaluation\1001. Completing the Evaluation.mp4
[8540f5ece692d6bc]
|
16,554,630 |
A2A25EBF |
Pluralsight Evaluating Your Organization’s Security Posture\Exercise Files\evaluating-organizations-security-posture.zip |
15,917,047 |
69132759 |
Pluralsight Evaluating Your Organization’s Security Posture\01.Course Overview |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\10.Wrapping the Security Evaluation |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture\Exercise Files |
0 |
00000000 |
Pluralsight Evaluating Your Organization’s Security Posture |
0 |
00000000 |
|
Total size: |
410,915,590 |
|
|