zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeTutorials.Eu] [UDEMY] SOC Analyst Cyber Security Intrusion Training from Scratch - [FTU]
magnet:?xt=urn:btih:3a53d823abf176395ae4d73dcfc751c5e20de1b2&dn=[FreeTutorials.Eu] [UDEMY] SOC Analyst Cyber Security Intrusion Training from Scratch - [FTU]
磁力链接详情
Hash值:
3a53d823abf176395ae4d73dcfc751c5e20de1b2
点击数:
367
文件大小:
4.33 GB
文件数量:
73
创建日期:
2020-2-1 01:51
最后访问:
2024-12-26 03:16
访问标签:
FreeTutorials
Eu
UDEMY
SOC
Analyst
Cyber
Security
Intrusion
Training
from
Scratch
-
FTU
文件列表详情
10. Module 10 Web Application/1. Web Application Introduction.mp4 28.53 MB
10. Module 10 Web Application/2. Web Application Working.mp4 71.36 MB
11. Module 11 Web Application Attack/1. Web Application Attack.mp4 13.47 MB
11. Module 11 Web Application Attack/2. Poodle Attack.mp4 34.5 MB
11. Module 11 Web Application Attack/3. Heart bleed Attack.mp4 19.73 MB
11. Module 11 Web Application Attack/4. Shellshock Attack.mp4 18.31 MB
12. Module 12 UseCases/1. SQL Injection Attack & Remediation.mp4 47.79 MB
12. Module 12 UseCases/2. XSS Injection Attack & Remediation.mp4 36.1 MB
12. Module 12 UseCases/3. CSRF Injection Attack & Remediation.mp4 13.82 MB
13. Module 13 Antivirus Working, Types & UseCase/1. Antivirus Working & Detection.mp4 65.35 MB
13. Module 13 Antivirus Working, Types & UseCase/2. USECASE - Virus Outbreak.mp4 81.23 MB
13. Module 13 Antivirus Working, Types & UseCase/3. Ransomware.mp4 33.43 MB
13. Module 13 Antivirus Working, Types & UseCase/4. Conficker Worm.mp4 25.78 MB
14. Module 14 IDS - Working, Detection & Evasion/1. Working, Detection & Evasion.mp4 203.74 MB
15. Module 15 Firewall Working, Types & Reporting/1. Working, Types and Reporting.mp4 74.41 MB
16. Module 16 Attacking Phases/1. Attacking Phase 1 Reconnaissance.mp4 137.97 MB
16. Module 16 Attacking Phases/2. Attacking Phase 2 Scanning.mp4 279.32 MB
16. Module 16 Attacking Phases/3. Attacking Phase 3 Attacking.mp4 200.87 MB
16. Module 16 Attacking Phases/4. Attacking Phase 4 Maintaining Access.mp4 306.03 MB
17. SIEM Solution/1. SIEM Installation.mp4 80.27 MB
17. SIEM Solution/2. Logs Forwarding to SIEM.mp4 98.94 MB
17. SIEM Solution/3. SIEM Hunting For Logs.mp4 132.77 MB
17. SIEM Solution/4. SIEM Dashboard Usage & Creation.mp4 266.63 MB
1. Module 1 Basic of Networks/1. Introduction Training Plan.mp4 32.6 MB
1. Module 1 Basic of Networks/2. What is Networking.mp4 37.65 MB
1. Module 1 Basic of Networks/3. OSI Model & TCP IP Protocol Suite.mp4 55.17 MB
1. Module 1 Basic of Networks/4. Types of Netowrk Device and Working.mp4 33.52 MB
1. Module 1 Basic of Networks/5. Types of Network Security Devices and Working.mp4 36.49 MB
2. Module 2 Foundation of BitBytes in Packets/1. Bit, Hexadecimal & Bytes Represenation.mp4 56.3 MB
2. Module 2 Foundation of BitBytes in Packets/2. MAC Address & IP Address.mp4 65.28 MB
2. Module 2 Foundation of BitBytes in Packets/3. NAT.mp4 17.24 MB
2. Module 2 Foundation of BitBytes in Packets/4. PAT.mp4 16.83 MB
2. Module 2 Foundation of BitBytes in Packets/5. Basics of Wireshark & Tshark.mp4 78.56 MB
3. Module 3 Internet Layer & Transport Layer/1. What is the Internet Layer & IP Header.mp4 22.04 MB
3. Module 3 Internet Layer & Transport Layer/2. What are the IP Header Fields.mp4 114.75 MB
3. Module 3 Internet Layer & Transport Layer/3. What is the Transport Layer & TCP Header.mp4 15.2 MB
3. Module 3 Internet Layer & Transport Layer/4. What are the Transport Header Fields.mp4 66.6 MB
3. Module 3 Internet Layer & Transport Layer/5. What are the common attacks performed with Transport Layer.mp4 68.04 MB
4. Module 4 UDP & ICMP Protocol/1. What is UDP Protcol & UDP Header.mp4 13.61 MB
4. Module 4 UDP & ICMP Protocol/2. What are the UDP Header Fields.mp4 14.57 MB
4. Module 4 UDP & ICMP Protocol/3. What is the ICMP Protocol & ICMP Header.mp4 15.93 MB
4. Module 4 UDP & ICMP Protocol/5. What are the ICMP Header Fields.mp4 21.79 MB
4. Module 4 UDP & ICMP Protocol/6. Common Attacks Performed with ICMP Protocol.mp4 53.64 MB
5. Module 5 Protcols & Ports/10. Basics of FTP, Telnet, SSH & SMTP.mp4 17.7 MB
5. Module 5 Protcols & Ports/1. Protocols vs Ports.mp4 23.09 MB
5. Module 5 Protcols & Ports/2. What is ARP Protocol.mp4 13.98 MB
5. Module 5 Protcols & Ports/4. Client-Server Model.mp4 9.16 MB
5. Module 5 Protcols & Ports/5. What Is HTTP & How does it works.mp4 41.36 MB
5. Module 5 Protcols & Ports/6. What is DHCP & How does it works.mp4 12.76 MB
5. Module 5 Protcols & Ports/8. What is DNS & How does it works.mp4 31.31 MB
5. Module 5 Protcols & Ports/vz 0 字节
6. Module 6 UseCases/1. DNS Zone Transfer Attack and Remediation.mp4 44.75 MB
6. Module 6 UseCases/2. Host Disovery Attcack and Remediation.mp4 58.95 MB
6. Module 6 UseCases/3. Port Scanning Attack and Remediation.mp4 60.09 MB
6. Module 6 UseCases/4. Vulnerabilty Scanning Attack and Remediation.mp4 33.35 MB
6. Module 6 UseCases/5. Arp Poisoning & MITM Attack and Remediation.mp4 45.11 MB
6. Module 6 UseCases/6. DOSDDOS Attack and Remediation.mp4 84.28 MB
7. Module 7 Windows & Linux/1. Workgroup & Domain.mp4 67.07 MB
7. Module 7 Windows & Linux/2. Cryptography.mp4 57.29 MB
7. Module 7 Windows & Linux/3. Windows Password.mp4 50.09 MB
7. Module 7 Windows & Linux/4. Windows Authentication.mp4 116.77 MB
7. Module 7 Windows & Linux/5. Linux Basics.mp4 46.55 MB
7. Module 7 Windows & Linux/6. Windows & Linux Logs.mp4 49.77 MB
8. Module 8 System Hacking/1. System Exploitation.mp4 79.83 MB
8. Module 8 System Hacking/2. Malware Types.mp4 55.19 MB
8. Module 8 System Hacking/3. Brute Force Attack.mp4 75.96 MB
9. Module 9 UseCases/1. Brute Force Attack - Part 1 & Remediation.mp4 72.84 MB
9. Module 9 UseCases/2. Brute Force Attack - Part 2 & Remediation.mp4 25.63 MB
9. Module 9 UseCases/3. Privilege Escalation attack & Remediation.mp4 21.41 MB
9. Module 9 UseCases/4. Phishing Attack & Remediation.mp4 44.7 MB
9. Module 9 UseCases/5. Multiple Geo Location Access & Remediation.mp4 16.23 MB
9. Module 9 UseCases/6. Malware Detection & Remediation.mp4 47.14 MB
9. Module 9 UseCases/7. Zero Day Attack & Remediation.mp4 24.89 MB
其他位置