Cybersecurity Operations Fundamentals Specialization
By theetay.com
Categories: Coursera
About Course
Cybersecurity Operations Fundamentals Specialization, Launch Your Career in Cybersecurity Operations. Learn the basic skills required to become an entry-level cybersecurity operations analyst in a Security Operations Center (SOC). The Cybersecurity Operations Fundamentals Specialization gives you the basic skills you need to begin a career as an entry-level cybersecurity analyst. As you progress through this Specialization, you’ll gain the foundational knowledge that organizations require to protect their network. Completing this Specialization will prepare you to start your career as a Security Operations Center Analyst.
What Will You Learn?
- The concepts behind TCP/IP networking communication
- The basics of networking communication, common attack vectors, and malicious activities
- The patterns of suspicious behaviors typically encountered when working in a Security Operations Center (SOC)
Course Content
01. Security Operations Center (SOC)
-
001 01_introduction-to-security-operations-center_instructions.html
00:00 -
004 02_introduction-to-security-operations-center.mp4
00:00 -
007 01_soc-defined.mp4
00:00 -
008 02_soc-defined_instructions.html
00:00 -
011 01_soc-environment-today.mp4
00:00 -
012 02_soc-environment-today_instructions.html
00:00 -
013 03_soc-environment-today_quiz.html
00:00 -
016 01_goal-of-a-soc.mp4
00:00 -
017 02_goal-of-a-soc_instructions.html
00:00 -
018 03_goal-of-a-soc_quiz.html
00:00 -
021 01_challenges-of-a-soc.mp4
00:00 -
022 02_challenges-of-a-soc_instructions.html
00:00 -
023 03_challenges-of-a-soc-practice-quiz_quiz.html
00:00 -
026 01_wrap-up.mp4
00:00 -
027 02_wrap-up_instructions.html
00:00 -
031 01_introduction-to-security-operations-center-processes-and-services.mp4
00:00 -
032 02_introduction-to-security-operations-center-processes-and-services_instructions.html
00:00 -
035 01_soc-interaction-with-other-departments.mp4
00:00 -
036 02_soc-interaction-with-other-departments_instructions.html
00:00 -
037 03_soc-interaction-with-other-departments-practice-quiz_quiz.html
00:00 -
040 01_common-soc-services.mp4
00:00 -
041 02_common-soc-services_instructions.html
00:00 -
042 03_common-soc-services-practice-quiz_quiz.html
00:00 -
043 01_wrap-up_instructions.html
00:00 -
046 02_wrap-up.mp4
00:00 -
047 01_security-operations-center-processes-and-services-course-exam_exam.html
00:00 -
051 02_introduction-to-soc-deployment-models-and-types.mp4
00:00 -
052 01_introduction-to-soc-types-and-staffing-considerations_instructions.html
00:00 -
055 02_soc-types-and-staffing-considerations.mp4
00:00 -
056 03_soc-types-and-staffing-considerations_instructions.html
00:00 -
057 04_compliance-based-soc_instructions.html
00:00 -
058 05_operational-based-soc_instructions.html
00:00 -
059 06_soc-types-and-staffing-considerations-practice-quiz_quiz.html
00:00 -
060 01_introduction-to-soc-models-and-their-consumers_instructions.html
00:00 -
063 02_soc-models-and-their-consumers.mp4
00:00 -
064 03_soc-models-and-their-consumers_instructions.html
00:00 -
065 04_soc-models-and-their-consumers-practice-quiz_quiz.html
00:00 -
066 01_wrap-up_instructions.html
00:00 -
069 02_wrap-up.mp4
00:00 -
070 01_soc-deployment-models-and-types-course-exam_exam.html
00:00 -
074 02_introduction-to-staffing-an-effective-soc-team.mp4
00:00 -
075 01_topic-introduction-to-soc-roles_instructions.html
00:00 -
078 02_soc-roles.mp4
00:00 -
079 03_soc-roles_instructions.html
00:00 -
080 04_soc-tasks-and-responsibilities-overview_instructions.html
00:00 -
081 05_soc-roles-practice-quiz_quiz.html
00:00 -
082 01_introduction-to-interaction-of-different-roles-within-the-soc_instructions.html
00:00 -
085 02_interaction-of-various-roles-within-the-soc.mp4
00:00 -
086 03_interaction-of-various-roles-within-the-soc_instructions.html
00:00 -
087 04_interaction-of-different-roles-within-the-soc-practice-quiz_quiz.html
00:00 -
088 01_wrap-up_instructions.html
00:00 -
091 02_wrap-up.mp4
00:00 -
092 01_staffing-an-effective-soc-team-course-exam_exam.html
00:00 -
096 02_introduction-to-security-events-data-and-soc-analyst-tools.mp4
00:00 -
099 01_soc-relevant-data-and-security-event-data-introduction.mp4
00:00 -
100 02_soc-relevant-data-and-security-event-data-introduction_instructions.html
00:00 -
101 03_session-data_instructions.html
00:00 -
102 04_full-packet-capture_instructions.html
00:00 -
103 05_transaction-data_instructions.html
00:00 -
104 06_extracted-content_instructions.html
00:00 -
105 07_statistical-data_instructions.html
00:00 -
106 08_alert-data_instructions.html
00:00 -
107 09_external-data_instructions.html
00:00 -
108 10_soc-relevant-data-and-security-event-data-practice-quiz_quiz.html
00:00 -
109 01_introduction-to-soc-tools-and-their-features_instructions.html
00:00 -
112 02_soc-tools-and-their-features.mp4
00:00 -
113 03_soc-tools-and-their-features_instructions.html
00:00 -
116 04_soc-tools-and-their-features-cont.mp4
00:00 -
117 05_soc-tools-and-their-features-cont_instructions.html
00:00 -
118 06_security-information-and-event-management_instructions.html
00:00 -
119 07_soc-tools-and-their-features-practice-quiz_quiz.html
00:00 -
120 01_wrap-up_instructions.html
00:00 -
123 02_wrap-up.mp4
00:00 -
124 01_security-events-data-and-soc-analyst-tools-course-exam_exam.html
00:00 -
130 02_introduction-to-developing-key-relationships-with-internal-and-external.mp4
00:00 -
131 01_internal-stakeholders_instructions.html
00:00 -
134 02_internal-stakeholders.mp4
00:00 -
135 03_internal-stakeholder-summary-table_instructions.html
00:00 -
136 04_internal-stakeholders-practice-quiz_quiz.html
00:00 -
137 01_external-stakeholders_instructions.html
00:00 -
140 02_external-stakeholders.mp4
00:00 -
141 03_external-stakeholder-summary-table_instructions.html
00:00 -
142 04_external-stakeholders-practice-quiz_quiz.html
00:00 -
144 01_wrap-up_instructions.html
00:00 -
147 02_wrap-up.mp4
00:00 -
151 01_introduction-to-understanding-soc-metrics.mp4
00:00 -
152 02_introduction-to-understanding-soc-metrics_instructions.html
00:00 -
155 01_security-data-aggregation.mp4
00:00 -
156 02_security-data-aggregation_instructions.html
00:00 -
157 03_security-data-aggregation-practice-quiz_quiz.html
00:00 -
160 01_time-to-detection.mp4
00:00 -
161 02_time-to-detection_instructions.html
00:00 -
162 03_time-to-detection-practice-quiz_quiz.html
00:00 -
165 01_security-controls-detection-effectiveness.mp4
00:00 -
166 02_security-controls-detection-effectiveness_instructions.html
00:00 -
167 03_security-controls-detection-effectiveness-practice-quiz_quiz.html
00:00 -
170 01_soc-metrics.mp4
00:00 -
171 02_soc-metrics_instructions.html
00:00 -
172 03_soc-metrics-practice-quiz_quiz.html
00:00 -
173 01_wrap-up_instructions.html
00:00 -
176 02_wrap-up.mp4
00:00 -
180 01_introduction-to-understanding-soc-workflow-and-automation.mp4
00:00 -
181 02_introduction-to-understanding-soc-workflow-and-automation_instructions.html
00:00 -
184 01_soc-wms-concepts.mp4
00:00 -
185 02_soc-wms-concepts_instructions.html
00:00 -
186 03_definition-of-wms_instructions.html
00:00 -
187 04_workflow-types_instructions.html
00:00 -
188 05_repeatable-tasks_instructions.html
00:00 -
189 06_soc-wms-concepts-practice-quiz_quiz.html
00:00 -
192 01_incident-response-workflow.mp4
00:00 -
193 02_incident-response-workflow_instructions.html
00:00 -
194 03_incident-response-workflow-roles_instructions.html
00:00 -
195 04_incident-response-workflow-practice-quiz_quiz.html
00:00 -
198 01_soc-wms-integration.mp4
00:00 -
199 02_soc-wms-integration-overeview_instructions.html
00:00 -
200 03_soc-wms-integration_instructions.html
00:00 -
201 04_wms-integration-with-siem_instructions.html
00:00 -
202 05_wms-integration-approaches_instructions.html
00:00 -
203 06_soc-wms-integration-practice-quiz_quiz.html
00:00 -
206 01_soc-workflow-automation-example.mp4
00:00 -
207 02_soc-workflow-automation-example_instructions.html
00:00 -
208 03_soc-workflow-for-an-alert_instructions.html
00:00 -
209 04_wms-products_instructions.html
00:00 -
212 05_soc-workflow-automation-example.mp4
00:00 -
213 06_soc-workflow-automation-example-practice-quiz_quiz.html
00:00 -
216 01_wrap-up.mp4
00:00
02. Endpoints and Systems
-
004 02_introduction-to-understanding-windows-operating-system-basics_instructions.html
00:00 -
007 01_windows-operating-system-history.mp4
00:00 -
008 02_windows-operating-system-history_instructions.html
00:00 -
009 03_windows-operating-system-history-practice-quiz_quiz.html
00:00 -
012 01_windows-operating-system-architecture.mp4
00:00 -
013 02_windows-operating-system-architecture_instructions.html
00:00 -
014 03_user-mode_instructions.html
00:00 -
015 04_kernel-mode_instructions.html
00:00 -
016 05_windows-operating-system-architecture-practice-quiz_quiz.html
00:00 -
019 01_windows-processes-threads-and-handles.mp4
00:00 -
020 02_windows-processes-threads-and-handles_instructions.html
00:00 -
021 03_windows-task-manager_instructions.html
00:00 -
022 04_windows-processes-threads-and-handles-practice-quiz_quiz.html
00:00 -
025 01_windows-virtual-memory-address-space.mp4
00:00 -
026 02_windows-virtual-memory-address-space_instructions.html
00:00 -
027 03_windows-virtual-memory-address-space-practice-quiz_quiz.html
00:00 -
030 01_windows-services.mp4
00:00 -
031 02_windows-services_instructions.html
00:00 -
032 03_windows-services-practice-quiz_quiz.html
00:00 -
035 01_windows-file-system-overview.mp4
00:00 -
036 02_windows-file-system-overview_instructions.html
00:00 -
037 03_ntfs-basics_instructions.html
00:00 -
038 04_ntfs-volume-structure_instructions.html
00:00 -
039 05_ntfs-alternate-data-streams_instructions.html
00:00 -
040 06_practice-quiz_quiz.html
00:00 -
043 01_windows-file-system-structure.mp4
00:00 -
044 02_windows-file-system-structure_instructions.html
00:00 -
045 03_file-system-paths_instructions.html
00:00 -
046 04_file-naming-conventions_instructions.html
00:00 -
047 05_file-properties-attributes-and-permissions_instructions.html
00:00 -
048 06_windows-file-system-overview-practice-quiz_quiz.html
00:00 -
051 01_windows-domains-and-local-user-accounts.mp4
00:00 -
052 02_windows-domains-and-local-user-accounts_instructions.html
00:00 -
053 03_windows-domains_instructions.html
00:00 -
054 04_local-users-and-user-groups_instructions.html
00:00 -
055 05_creating-a-local-user-account_instructions.html
00:00 -
056 06_practice-quiz_quiz.html
00:00 -
059 01_windows-gui.mp4
00:00 -
060 02_windows-gui_instructions.html
00:00 -
061 03_windows-context-menu_instructions.html
00:00 -
062 04_windows-file-explorer_instructions.html
00:00 -
063 05_windows-domains-and-local-user-accounts-practice-quiz_quiz.html
00:00 -
066 01_run-as-administrator.mp4
00:00 -
067 02_run-as-administrator_instructions.html
00:00 -
068 03_run-as-administrator-practice-quiz_quiz.html
00:00 -
071 01_windows-cli.mp4
00:00 -
072 02_windows-cli_instructions.html
00:00 -
073 03_file-and-directory-references-from-the-command-line_instructions.html
00:00 -
074 04_practice-quiz_quiz.html
00:00 -
077 01_windows-powershell.mp4
00:00 -
078 02_windows-powershell_instructions.html
00:00 -
079 03_entering-powershell_instructions.html
00:00 -
080 04_using-windows-powershell_instructions.html
00:00 -
081 05_importing-powershell-functions_instructions.html
00:00 -
082 06_windows-cli-practice-quiz_quiz.html
00:00 -
085 01_windows-net-command.mp4
00:00 -
086 02_windows-net-command_instructions.html
00:00 -
087 03_practice-quiz_quiz.html
00:00 -
090 01_controlling-startup-services-and-executing-system-shutdown.mp4
00:00 -
091 02_controlling-startup-services_instructions.html
00:00 -
092 03_windows-system-shutdown_instructions.html
00:00 -
093 04_windows-net-command-practice-quiz_quiz.html
00:00 -
096 01_controlling-services-and-processes.mp4
00:00 -
097 02_controlling-services-and-processes_instructions.html
00:00 -
098 03_the-msconfig-utility_instructions.html
00:00 -
099 04_windows-8-and-greater-task-manager_instructions.html
00:00 -
100 05_controlling-services-and-processes-practice-quiz_quiz.html
00:00 -
103 01_monitoring-system-resources.mp4
00:00 -
104 02_monitoring-system-resources_instructions.html
00:00 -
105 03_resource-monitor_instructions.html
00:00 -
106 04_practice-quiz_quiz.html
00:00 -
109 01_windows-boot-process.mp4
00:00 -
110 02_windows-boot-process_instructions.html
00:00 -
111 03_starting-services-at-boot-time_instructions.html
00:00 -
112 04_monitoring-system-resources-practice-quiz_quiz.html
00:00 -
115 01_windows-networking.mp4
00:00 -
116 02_windows-networking_instructions.html
00:00 -
117 03_configuring-basic-networking-properties_instructions.html
00:00 -
118 04_network-adapter-properties_instructions.html
00:00 -
119 05_testing-network-connectivity_instructions.html
00:00 -
120 06_the-nslookup-command_instructions.html
00:00 -
121 07_windows-networking-practice-quiz_quiz.html
00:00 -
124 01_windows-netstat-command.mp4
00:00 -
125 02_windows-netstat-command_instructions.html
00:00 -
126 03_practice-quiz_quiz.html
00:00 -
129 01_accessing-network-resources-with-windows.mp4
00:00 -
130 02_accessing-network-resources-with-windows_instructions.html
00:00 -
131 03_remote-desktop-protocol_instructions.html
00:00 -
132 04_windows-netstat-command-practice-quiz_quiz.html
00:00 -
135 01_windows-registry.mp4
00:00 -
136 02_windows-registry_instructions.html
00:00 -
137 03_registry-editor_instructions.html
00:00 -
138 04_security-concerns-regarding-the-windows-registry_instructions.html
00:00 -
139 05_practice-quiz_quiz.html
00:00 -
142 01_windows-management-instrumentation.mp4
00:00 -
143 02_windows-management-instrumentation_instructions.html
00:00 -
144 03_windows-registry-practice-quiz_quiz.html
00:00 -
147 01_common-windows-server-functions.mp4
00:00 -
148 02_common-windows-server-functions_instructions.html
00:00 -
149 03_common-windows-server-functions-practice-quiz_quiz.html
00:00 -
152 01_common-third-party-tools.mp4
00:00 -
153 02_common-third-party-tools_instructions.html
00:00 -
154 03_putty-application_instructions.html
00:00 -
155 04_winscp_instructions.html
00:00 -
156 05_wireshark_instructions.html
00:00 -
157 06_sysinternals_instructions.html
00:00 -
158 07_process-monitor_instructions.html
00:00 -
159 08_tcpview_instructions.html
00:00 -
160 09_practice-quiz_quiz.html
00:00 -
161 01_wrap-up_instructions.html
00:00 -
164 02_wrap-up.mp4
00:00 -
165 01_understanding-windows-operating-system-basics-course-exam_exam.html
00:00 -
169 02_course-introduction-to-understanding-linux-operating-system-basics.mp4
00:00 -
172 01_history-and-benefits-of-linux.mp4
00:00 -
173 02_history-and-benefits-of-linux_instructions.html
00:00 -
174 03_history-and-benefits-of-linux-practice-quiz_quiz.html
00:00 -
177 01_linux-architecture.mp4
00:00 -
178 02_linux-architecture_instructions.html
00:00 -
179 03_linux-architecture_instructions.html
00:00 -
180 04_user-space_instructions.html
00:00 -
181 05_kernel-space_instructions.html
00:00 -
182 06_kernel-user-relationship-to-the-hardware_instructions.html
00:00 -
183 07_practice-quiz_quiz.html
00:00 -
186 01_linux-file-system-overview.mp4
00:00 -
187 02_linux-file-system-overview_instructions.html
00:00 -
188 03_special-file-system-structures_instructions.html
00:00 -
189 04_fully-qualified-vs-relative-file-references_instructions.html
00:00 -
190 05_how-devices-are-represented-as-files-in-the-linux-file-system_instructions.html
00:00 -
191 06_linux-architecture-practice-quiz_quiz.html
00:00 -
194 01_basic-file-system-navigation-and-management-commands.mp4
00:00 -
195 02_basic-file-system-navigation-and-management-commands_instructions.html
00:00 -
196 03_changing-directories_instructions.html
00:00 -
197 04_copying-and-moving-files_instructions.html
00:00 -
198 05_basic-file-system-navigation-and-management-commands-practice-quiz_quiz.html
00:00 -
201 01_file-properties-and-permissions.mp4
00:00 -
202 02_file-properties-and-permissions_instructions.html
00:00 -
203 03_permissions_instructions.html
00:00 -
204 04_ownership_instructions.html
00:00 -
205 05_file-properties-and-permissions-practice-quiz_quiz.html
00:00 -
208 01_editing-file-properties.mp4
00:00 -
209 02_editing-file-properties_instructions.html
00:00 -
210 03_editing-file-properties-practice-quiz_quiz.html
00:00 -
213 01_root-and-sudo.mp4
00:00 -
214 02_root-and-sudo_instructions.html
00:00 -
002 01_introduction-to-understanding-windows-operating-system-basics.en.txt
00:00 -
215 03_root-and-sudo-practice-quiz_quiz.html
00:00 -
218 01_disks-and-file-systems.mp4
00:00 -
219 02_disks-and-file-systems_instructions.html
00:00 -
220 03_disk-partitions_instructions.html
00:00 -
221 04_file-system-types_instructions.html
00:00 -
222 05_mounting-devices_instructions.html
00:00 -
223 06_disks-and-file-systems-practice-quiz_quiz.html
00:00 -
226 01_system-initialization.mp4
00:00 -
227 02_system-initialization_instructions.html
00:00 -
228 03_system-initialization_instructions.html
00:00 -
229 04_how-linux-controls-the-boot-process_instructions.html
00:00 -
230 05_run-levels_instructions.html
00:00 -
231 06_common-boot-management-processes_instructions.html
00:00 -
232 07_traditional-system-v-bootup_instructions.html
00:00 -
233 08_the-systemd-command_instructions.html
00:00 -
234 09_system-initialization-practice-quiz_quiz.html
00:00 -
237 01_emergency-alternate-startup-options.mp4
00:00 -
238 02_emergency-alternate-startup-options_instructions.html
00:00 -
239 03_single-user_instructions.html
00:00 -
240 04_live-cd_instructions.html
00:00 -
241 05_emergency-alternate-startup-options-practice-quiz_quiz.html
00:00 -
244 01_shutting-down-the-system.mp4
00:00 -
245 02_shutting-down-the-system_instructions.html
00:00 -
246 03_shutting-down-the-system-practice-quiz_quiz.html
00:00 -
249 01_system-processes.mp4
00:00 -
250 02_system-processes_instructions.html
00:00 -
251 03_identifying-the-processes_instructions.html
00:00 -
252 04_linux-process-creation_instructions.html
00:00 -
253 05_monitoring-running-processes_instructions.html
00:00 -
254 06_displaying-processes-and-process-threads_instructions.html
00:00 -
255 07_the-ps-command_instructions.html
00:00 -
256 08_displaying-open-files_instructions.html
00:00 -
257 09_monitoring-cpu-and-memory-utilization_instructions.html
00:00 -
258 10_monitoring-i-o_instructions.html
00:00 -
259 11_copy-of-monitoring-running-processes_instructions.html
00:00 -
260 12_system-processes-practice-quiz_quiz.html
00:00 -
263 01_interacting-with-linux.mp4
00:00 -
264 02_interacting-with-linux_instructions.html
00:00 -
265 03_gui-vs-shell_instructions.html
00:00 -
266 04_interacting-with-linux-practice-quiz_quiz.html
00:00 -
269 01_linux-command-shell-concepts.mp4
00:00 -
270 02_linux-command-shell-concepts_instructions.html
00:00 -
271 03_environment-variables-and-shell-variables_instructions.html
00:00 -
272 04_general-command-structure_instructions.html
00:00 -
273 05_stdin-stdout-and-stderr_instructions.html
00:00 -
274 06_linux-command-shell-concepts-practice-quiz_quiz.html
00:00 -
277 01_piping-command-output.mp4
00:00 -
278 02_piping-command-output_instructions.html
00:00 -
279 03_piping-command-output-practice-quiz_quiz.html
00:00 -
282 01_other-useful-command-line-tools.mp4
00:00 -
283 02_other-useful-command-line-tools_instructions.html
00:00 -
284 03_the-history-command_instructions.html
00:00 -
285 04_the-awk-command_instructions.html
00:00 -
286 05_the-sed-command_instructions.html
00:00 -
287 06_the-vi-command_instructions.html
00:00 -
288 07_nano-text-editor_instructions.html
00:00 -
289 08_other-useful-command-line-tools-practice-quiz_quiz.html
00:00 -
292 01_overview-of-secure-shell-protocol.mp4
00:00 -
293 02_overview-of-secure-shell-protocol_instructions.html
00:00 -
294 03_securely-copying-files-between-hosts_instructions.html
00:00 -
295 04_overview-of-secure-shell-protocol-practice-quiz_quiz.html
00:00 -
298 01_networking.mp4
00:00 -
299 02_networking_instructions.html
00:00 -
300 03_viewing-basic-network-properties_instructions.html
00:00 -
301 04_configuring-network-properties_instructions.html
00:00 -
302 05_configuring-basic-properties-ip-subnet-mask-gateway_instructions.html
00:00 -
303 06_viewing-and-configuring-routes_instructions.html
00:00 -
304 07_testing-connectivity_instructions.html
00:00 -
305 08_networking-practice-quiz_quiz.html
00:00 -
308 01_managing-services-in-sysv-environments.mp4
00:00 -
309 02_managing-services-in-sysv-environments_instructions.html
00:00 -
310 03_systemd-service-manager_instructions.html
00:00 -
311 04_managing-services-in-sysv-environments-practice-quiz_quiz.html
00:00 -
314 01_viewing-running-network-services.mp4
00:00 -
315 02_viewing-running-network-services_instructions.html
00:00 -
316 03_viewing-running-network-services_instructions.html
00:00 -
317 04_viewing-connection-status_instructions.html
00:00 -
318 05_the-lsof-command_instructions.html
00:00 -
319 06_viewing-running-network-services-practice-quiz_quiz.html
00:00 -
322 01_name-resolution-dns.mp4
00:00 -
323 02_name-resolution-dns_instructions.html
00:00 -
324 03_configuring-dns_instructions.html
00:00 -
325 04_name-resolution-configuration-files_instructions.html
00:00 -
326 05_name-resolution-dns-practice-quiz_quiz.html
00:00 -
329 01_testing-name-resolution.mp4
00:00 -
330 02_topic-introduction_instructions.html
00:00 -
331 03_testing-name-resolution_instructions.html
00:00 -
332 04_testing-name-resolution_quiz.html
00:00 -
335 01_viewing-network-traffic.mp4
00:00 -
336 02_viewing-network-traffic_instructions.html
00:00 -
337 03_tcpdump-basics_instructions.html
00:00 -
338 04_viewing-network-traffic-practice-quiz_quiz.html
00:00 -
341 01_configuring-remote-syslog.mp4
00:00 -
342 02_configuring-remote-syslog_instructions.html
00:00 -
343 03_testing-your-logging-configuration_instructions.html
00:00 -
344 04_configuring-remote-syslog-practice-quiz_quiz.html
00:00 -
347 01_running-software-on-linux.mp4
00:00 -
348 02_running-software-on-linux_instructions.html
00:00 -
349 03_overview-of-the-process-for-compiling-code_instructions.html
00:00 -
350 04_overview-of-the-process-for-compiling-code_instructions.html
00:00 -
351 05_types-of-files-used-in-compiling-software_instructions.html
00:00 -
352 06_compiling-code_instructions.html
00:00 -
353 07_running-software-on-linux-practice-quiz_quiz.html
00:00 -
356 01_executables-vs-interpreters.mp4
00:00 -
357 02_topic-introduction_instructions.html
00:00 -
358 03_executables-vs-interpreters-practice-quiz_instructions.html
00:00 -
361 01_using-package-managers-to-install-software-in-linux.mp4
00:00 -
362 02_using-package-managers-to-install-software-in-linux_instructions.html
00:00 -
363 03_using-package-managers-to-install-software-in-linux_instructions.html
00:00 -
364 04_package-managers_instructions.html
00:00 -
365 05_using-package-managers-to-install-software-in-linux-practice-quiz_quiz.html
00:00 -
368 01_system-applications.mp4
00:00 -
369 02_system-applications_instructions.html
00:00 -
370 03_web_instructions.html
00:00 -
371 04_database_instructions.html
00:00 -
372 05_system-applications-practice-quiz_quiz.html
00:00 -
375 01_lightweight-directory-access-protocol.mp4
00:00 -
376 02_lightweight-directory-access-protocol_instructions.html
00:00 -
377 03_lightweight-directory-access-protocol-practice-quiz_quiz.html
00:00 -
378 01_wrap-up_instructions.html
00:00 -
381 02_wrap-up.mp4
00:00 -
385 01_lesson-introduction.mp4
00:00 -
386 02_lesson-introduction_instructions.html
00:00 -
389 01_host-based-personal-firewall.mp4
00:00 -
390 02_host-based-personal-firewall_instructions.html
00:00 -
391 03_host-based-personal-firewall-practice-exam_quiz.html
00:00 -
394 01_host-based-antivirus.mp4
00:00 -
395 02_host-based-antivirus_instructions.html
00:00 -
396 03_host-based-antivirus-practice-exam_quiz.html
00:00 -
399 01_host-intrusion-prevention-system.mp4
00:00 -
400 02_host-intrusion-prevention-system_instructions.html
00:00 -
401 03_host-intrusion-prevention-system-practice-exam_quiz.html
00:00 -
404 01_application-allowed-lists-and-blocked-lists.mp4
00:00 -
405 02_application-allowed-lists-and-blocked-lists-introduction_instructions.html
00:00 -
406 03_application-allowed-lists-and-blocked-lists_instructions.html
00:00 -
407 04_application-allowed-lists-and-blocked-lists-practice-exam_quiz.html
00:00 -
410 01_host-based-malware-protection.mp4
00:00 -
411 02_host-based-malware-protection_instructions.html
00:00 -
412 03_host-based-malware-protection_instructions.html
00:00 -
414 04_next-generation-endpoint-security_instructions.html
00:00 -
415 05_host-based-malware-protection-practice-exam_quiz.html
00:00 -
418 01_sandboxing.mp4
00:00 -
419 02_sandboxing-introduction_instructions.html
00:00 -
420 03_sandboxing_instructions.html
00:00 -
421 04_sandboxing-practice-exam_quiz.html
00:00 -
424 01_file-integrity-checking.mp4
00:00 -
425 02_file-integrity-checking_instructions.html
00:00 -
426 03_file-integrity-checking-practice-exam_quiz.html
00:00 -
427 01_wrap-up_instructions.html
00:00 -
430 02_wrap-up.mp4
00:00 -
431 01_understanding-endpoint-security-technologies-course-exam_exam.html
00:00 -
links.txt
00:00
03. Network Security
-
003 01_introduction-to-understanding-network-infrastructure-and-network-security.mp4
00:00 -
004 02_introduction-to-understanding-network-infrastructure-and-network-security_instructions.html
00:00 -
007 01_nat-fundamentals.mp4
00:00 -
008 02_nat-fundamentals_instructions.html
00:00 -
009 03_nat-requirements_instructions.html
00:00 -
010 04_port-address-translation_instructions.html
00:00 -
011 05_nat-fundamentals-practice-quiz_quiz.html
00:00 -
014 01_packet-filtering-with-acls.mp4
00:00 -
015 02_packet-filtering-with-acls_instructions.html
00:00 -
016 03_acl-example_instructions.html
00:00 -
017 04_packet-filtering-with-acls-practice-quiz_quiz.html
00:00 -
020 01_acls-with-the-established-option.mp4
00:00 -
021 02_acls-with-the-established-option_instructions.html
00:00 -
022 03_acls-with-the-established-option-example_instructions.html
00:00 -
023 04_acls-with-the-established-option-practice-quiz_quiz.html
00:00 -
026 01_access-control-models.mp4
00:00 -
027 02_access-conrtol-models-introduction_instructions.html
00:00 -
028 03_access-control-models_instructions.html
00:00 -
031 01_authentication-authorization-and-accounting.mp4
00:00 -
032 02_authentication-authorization-and-accounting_instructions.html
00:00 -
033 03_authentication-authorization-and-account-practice-quiz_quiz.html
00:00 -
034 01_load-balancing_instructions.html
00:00 -
035 02_web-application-firewall_instructions.html
00:00 -
036 03_load-balancing-practice-quiz_quiz.html
00:00 -
039 01_network-based-malware-protection.mp4
00:00 -
040 02_network-based-malware-protection_instructions.html
00:00 -
041 03_network-based-malware-protection-practice-quiz_quiz.html
00:00 -
044 01_network-security-monitoring-tools.mp4
00:00 -
045 02_network-security-monitoring-tools_instructions.html
00:00 -
046 03_network-security-monitoring-tools_quiz.html
00:00 -
047 01_wrap-up_instructions.html
00:00 -
050 02_wrap-up.mp4
00:00 -
051 01_understanding-network-infrastructure-and-network-security-monitoring-tools_exam.html
00:00 -
055 02_introduction-to-understanding-common-tcp-ip-attacks.mp4
00:00 -
058 01_address-resolution-protocol.mp4
00:00 -
059 02_address-resolution-protocol_instructions.html
00:00 -
060 03_the-arp-a-command_instructions.html
00:00 -
061 04_address-resolution-protocol-practice-quiz_quiz.html
00:00 -
062 01_legacy-tcp-ip_instructions.html
00:00 -
065 02_legacy-tcp-ip-vulnerabilities.mp4
00:00 -
066 03_legacy-tcp-ip-vulnerabilities_instructions.html
00:00 -
067 04_legacy-tcp-ip-vulnerabilities-practice-quiz_quiz.html
00:00 -
068 01_ip-protocol_instructions.html
00:00 -
071 02_ip-vulnerabilities.mp4
00:00 -
072 03_ip-vulnerabilities_instructions.html
00:00 -
073 04_ip-vulnerabilities-practice-quiz_quiz.html
00:00 -
074 01_icmp-protocol_instructions.html
00:00 -
077 02_icmp-vulnerabilities.mp4
00:00 -
078 03_icmp-vulnerabilities_instructions.html
00:00 -
079 04_icmp-vulnerabilities-practice-quiz_quiz.html
00:00 -
080 01_tcp-protocol_instructions.html
00:00 -
083 02_tcp-vulnerabilities.mp4
00:00 -
084 03_tcp-vulnerabilities_instructions.html
00:00 -
085 04_tcp-syn-flooding_instructions.html
00:00 -
086 05_tcp-session-hijacking_instructions.html
00:00 -
087 06_tcp-reset-attack_instructions.html
00:00 -
088 07_tcp-vulnerabilities-practice-quiz_quiz.html
00:00 -
089 01_udp-protocol_instructions.html
00:00 -
092 02_udp-vulnerabilities.mp4
00:00 -
093 03_udp-vulnerabilities_instructions.html
00:00 -
094 04_udp-vulnerabilities-practice-quiz_quiz.html
00:00 -
097 01_attack-surface-and-attack-vectors.mp4
00:00 -
098 02_attack-surface-and-attack-vectors_instructions.html
00:00 -
099 03_attack-surface_instructions.html
00:00 -
100 04_attack-vectors_instructions.html
00:00 -
101 05_security-risks-and-challenges_instructions.html
00:00 -
102 06_attack-surface-and-attack-vectors-practice-quiz_quiz.html
00:00 -
105 01_reconnaissance-attacks.mp4
00:00 -
106 02_reconnaissance-attacks_instructions.html
00:00 -
107 03_passive-and-active-reconnaissance_instructions.html
00:00 -
108 04_whois_instructions.html
00:00 -
109 05_shodan-search-engine_instructions.html
00:00 -
110 06_robots-txt-file_instructions.html
00:00 -
111 07_nmap-port-scan_instructions.html
00:00 -
112 08_vulnerability-scanners_instructions.html
00:00 -
113 09_reconnaissance-attacks-practice-quiz_quiz.html
00:00 -
116 01_access-attacks.mp4
00:00 -
117 02_access-attacks_instructions.html
00:00 -
118 03_access-attacks-practice-quiz_quiz.html
00:00 -
121 01_man-in-the-middle-attacks.mp4
00:00 -
122 02_man-in-the-middle-attacks_instructions.html
00:00 -
123 03_man-in-the-middle-attacks-practice-quiz_quiz.html
00:00 -
126 01_denial-of-service-and-distributed-denial-of-service.mp4
00:00 -
127 02_denial-of-service-and-distributed-denial-of-service_instructions.html
00:00 -
128 03_ddos-trends_instructions.html
00:00 -
129 04_denial-of-service-and-distributed-denial-of-service-practice-quiz_quiz.html
00:00 -
132 01_reflection-and-amplification-attacks.mp4
00:00 -
133 02_reflection-and-amplification-attacks_instructions.html
00:00 -
134 03_reflection-and-amplification-attacks-practice-quiz_quiz.html
00:00 -
137 01_spoofing-attacks.mp4
00:00 -
138 02_spoofing-attacks_instructions.html
00:00 -
139 03_spoofing-attacks-practice-quiz_quiz.html
00:00 -
142 01_dhcp-attacks.mp4
00:00 -
143 02_dhcp-attacks_instructions.html
00:00 -
144 03_dhcp-attacks-practice-quiz_quiz.html
00:00 -
145 01_wrap-up_instructions.html
00:00 -
148 02_wrap-up.mp4
00:00 -
149 01_understanding-common-tcp-ip-attacks-course-exam_exam.html
00:00
04. Data Security
-
004 02_introduction-to-exploring-data-type-categories.mp4
00:00 -
007 01_network-security-monitoring-data-types.mp4
00:00 -
008 02_session-data_instructions.html
00:00 -
009 03_full-packet-capture_instructions.html
00:00 -
010 04_transaction-data_instructions.html
00:00 -
011 05_extracted-content_instructions.html
00:00 -
012 06_statistical-data_instructions.html
00:00 -
013 07_alert-data_instructions.html
00:00 -
014 08_syslog_instructions.html
00:00 -
015 09_indicator-of-compromise_instructions.html
00:00 -
016 10_network-time-protocol_instructions.html
00:00 -
017 11_network-security-monitoring-data-types_instructions.html
00:00 -
018 12_network-security-monitoring-data-types-practice-quiz_quiz.html
00:00 -
021 01_security-information-and-event-management-systems.mp4
00:00 -
022 02_security-information-and-event-management-systems_instructions.html
00:00 -
023 03_security-information-and-event-management-systems-practice-quiz_quiz.html
00:00 -
024 01_security-orchestration-automation-and-response_instructions.html
00:00 -
025 02_soar-capabilities_instructions.html
00:00 -
026 03_cisco-securex-platform_instructions.html
00:00 -
027 04_security-orchestration-automation-and-response-practice-quiz_quiz.html
00:00 -
030 01_security-onion-overview.mp4
00:00 -
031 02_security-onion-overview_instructions.html
00:00 -
034 03_security-onion.mp4
00:00 -
035 04_deployment-options_instructions.html
00:00 -
036 05_security-onion-network-security-monitoring-tools_instructions.html
00:00 -
037 06_security-onion-overview-practice-quiz_quiz.html
00:00 -
040 01_full-packet-capture.mp4
00:00 -
041 02_full-packet-capture_instructions.html
00:00 -
042 03_full-packet-capture-practice-quiz_quiz.html
00:00 -
045 01_packet-captures.mp4
00:00 -
046 02_packet-captures_instructions.html
00:00 -
047 03_packet-capture-practice-quiz_quiz.html
00:00 -
050 01_packet-capture-using-tcpdump.mp4
00:00 -
051 02_packet-capture-using-tcpdump_instructions.html
00:00 -
052 03_packet-capture-using-tcpdump_instructions.html
00:00 -
053 04_packet-capture-using-tcpdump-cont_instructions.html
00:00 -
054 05_tcpdump-command-options_instructions.html
00:00 -
055 06_bpf-syntax-examples_instructions.html
00:00 -
056 07_packet-capture-using-tcpdump-practice-quiz_quiz.html
00:00 -
059 01_session-data.mp4
00:00 -
060 02_session-data_instructions.html
00:00 -
061 03_session-data-practice-quiz_quiz.html
00:00 -
064 01_transaction-data.mp4
00:00 -
065 02_transaction-data_instructions.html
00:00 -
066 03_transaction-data-practice-quiz_quiz.html
00:00 -
069 01_alert-data.mp4
00:00 -
070 02_alert-data_instructions.html
00:00 -
071 03_alert-data-practice-quiz_quiz.html
00:00 -
074 01_other-data-types.mp4
00:00 -
075 02_other-data-types_instructions.html
00:00 -
076 03_extracted-content_instructions.html
00:00 -
077 04_statistical-data_instructions.html
00:00 -
078 05_metadata_instructions.html
00:00 -
079 06_other-data-types-practice-quiz_quiz.html
00:00 -
082 01_correlating-nsm-data.mp4
00:00 -
083 02_correlating-nsm-data_instructions.html
00:00 -
084 03_correlating-nsm-data-practice-quiz_quiz.html
00:00 -
087 01_information-security-overview.mp4
00:00 -
088 02_information-security-confidentiality-integrity-and-availability_instructions.html
00:00 -
089 03_information-security-confidentiality-integrity-and-availability-practice-quiz_quiz.html
00:00 -
092 01_personally-identifiable-information.mp4
00:00 -
093 02_personally-identifiable-information_instructions.html
00:00 -
094 03_personally-identifiable-information-practice-quiz_quiz.html
00:00 -
097 01_regulatory-compliance.mp4
00:00 -
098 02_regulatory-compliance_instructions.html
00:00 -
099 03_regulatory-compliance-practice-quiz_quiz.html
00:00 -
100 01_intellectual-property_instructions.html
00:00 -
101 02_information-assets_instructions.html
00:00 -
102 03_threat-spectrum_instructions.html
00:00 -
103 04_a-pervasive-security-culture_instructions.html
00:00 -
104 05_intellectual-property-practice-quiz_quiz.html
00:00 -
105 01_wrap-up_instructions.html
00:00 -
108 02_wrap-up.mp4
00:00 -
109 01_exploring-data-type-categories-course-exam_exam.html
00:00 -
113 02_introduction-to-understanding-basic-cryptography-concepts.mp4
00:00 -
114 03_overview-of-cryptography_instructions.html
00:00 -
115 01_impact-of-cryptography-on-security-investigations_instructions.html
00:00 -
118 02_impact-of-cryptography-on-security-investigations.mp4
00:00 -
119 03_impact-of-cryptography-on-security-investigations_instructions.html
00:00 -
120 04_digital-certificates_instructions.html
00:00 -
121 05_impact-of-cryptography-on-security-investigations-practice-quiz_quiz.html
00:00 -
124 01_cryptography-overview.mp4
00:00 -
125 02_cryptography-overview_instructions.html
00:00 -
126 03_cryptography-history_instructions.html
00:00 -
127 04_ciphers-for-everyone_instructions.html
00:00 -
128 05_cryptography-overview-practice-quiz_quiz.html
00:00 -
131 01_hash-algorithms.mp4
00:00 -
132 02_hash-algorithms_instructions.html
00:00 -
133 03_cryptographic-authentication-using-hash-technology_instructions.html
00:00 -
134 04_cryptographic-authentication-in-action_instructions.html
00:00 -
135 05_comparing-hashing-algorithms_instructions.html
00:00 -
136 06_hash-algorithms-practice-quiz_quiz.html
00:00 -
139 01_encryption-overview.mp4
00:00 -
140 02_encryption-overview_instructions.html
00:00 -
141 03_encryption-algorithm-features_instructions.html
00:00 -
142 04_encryption-overview-practice-quiz_quiz.html
00:00 -
143 01_cryptanalysis_instructions.html
00:00 -
146 02_cryptanalysis.mp4
00:00 -
147 03_cryptanalysis-practice-quiz_quiz.html
00:00 -
150 01_symmetric-encryption-algorithms.mp4
00:00 -
151 02_symmetric-encryption-algorithms_instructions.html
00:00 -
152 03_symmetric-encryption-key-lengths_instructions.html
00:00 -
153 04_comparing-symmetric-encryption-algorithms_instructions.html
00:00 -
154 05_symmetric-encryption-algorithms-practice-quiz_quiz.html
00:00 -
157 01_asymmetric-encryption-algorithms.mp4
00:00 -
158 02_asymmetric-encryption-algorithms_instructions.html
00:00 -
159 03_asymmetric-encryption-algorithms-practice-quiz_quiz.html
00:00 -
162 01_diffie-hellman-key-agreement.mp4
00:00 -
163 02_diffie-hellman-key-agreement_instructions.html
00:00 -
164 03_diffie-hellman-key-agreement-practice-quiz_quiz.html
00:00 -
167 01_use-case-ssh.mp4
00:00 -
168 02_use-case-ssh_instructions.html
00:00 -
169 03_use-case-ssh-practice-quiz_quiz.html
00:00 -
172 01_digital-signatures.mp4
00:00 -
173 02_digital-signatures_instructions.html
00:00 -
174 03_rsa-digital-signatures_instructions.html
00:00 -
175 04_practical-example-digitally-signed-cisco-software_instructions.html
00:00 -
176 05_digital-signatures-practice-quiz_quiz.html
00:00 -
177 01_pki-overview_instructions.html
00:00 -
180 02_pki-overview.mp4
00:00 -
181 03_trusted-third-party-example_instructions.html
00:00 -
182 04_pki-terminology-and-components_instructions.html
00:00 -
183 05_public-key-cryptography-standards_instructions.html
00:00 -
184 06_x-509_instructions.html
00:00 -
185 07_pki-overview-practice-quiz_quiz.html
00:00 -
188 01_pki-operations.mp4
00:00 -
189 02_pki-operations_instructions.html
00:00 -
190 03_certificate-enrollment_instructions.html
00:00 -
191 04_authentication-using-certificates_instructions.html
00:00 -
192 05_certificate-revocation_instructions.html
00:00 -
193 06_certificate-revocation-check-methods_instructions.html
00:00 -
194 07_pki-operations-practice-quiz_quiz.html
00:00 -
197 01_use-case-ssl-tls.mp4
00:00 -
198 02_use-case-ssl-tls_instructions.html
00:00 -
199 03_ssl-tls-certificate-example_instructions.html
00:00 -
200 04_web-browser-security-warnings_instructions.html
00:00 -
201 05_use-case-ssl-tls-practice-quiz_quiz.html
00:00 -
204 01_cipher-suite.mp4
00:00 -
205 02_cipher-suite_instructions.html
00:00 -
206 03_tls-cipher-suite-examples_instructions.html
00:00 -
208 04_cipher-suite-practice-quiz_quiz.html
00:00 -
211 01_key-management.mp4
00:00 -
212 02_key-management_instructions.html
00:00 -
213 03_key-management-components_instructions.html
00:00 -
214 04_key-spaces_instructions.html
00:00 -
215 05_key-length-issues_instructions.html
00:00 -
216 06_key-management-practice-quiz_quiz.html
00:00 -
219 01_nsa-suite-b.mp4
00:00 -
220 02_nsa-suite-b_instructions.html
00:00 -
221 03_nsa-suite-b-practice-quiz_quiz.html
00:00 -
222 01_wrap-up_instructions.html
00:00 -
225 02_wrap-up.mp4
00:00 -
226 01_understanding-basic-cryptography-concepts-course-exam_exam.html
00:00 -
links.txt
00:00
05. Threat Analysis
-
003 01_introduction-to-understanding-incident-analysis-in-a-threat-centric-soc.mp4
00:00 -
004 02_introduction-to-understanding-incident-analysis-in-a-threat-centric-soc_instructions.html
00:00 -
007 01_classic-kill-chain-model-overview.mp4
00:00 -
008 02_classic-kill-chain-model-overview_instructions.html
00:00 -
009 03_classic-kill-chain-model-overview-practice-quiz_quiz.html
00:00 -
012 01_kill-chain-phase-1-reconnaissance.mp4
00:00 -
013 02_kill-chain-phase-1-reconnaissance_instructions.html
00:00 -
014 03_kill-chain-phase-1-reconnaissance-practice-quiz_quiz.html
00:00 -
017 01_weaponization.mp4
00:00 -
018 02_weaponization_instructions.html
00:00 -
019 03_kill-chain-phase-2-weaponization-practice-quiz_quiz.html
00:00 -
022 01_kill-chain-phase-3-delivery.mp4
00:00 -
023 02_kill-chain-phase-3-delivery_instructions.html
00:00 -
024 03_kill-chain-phase-3-delivery-practice-quiz_quiz.html
00:00 -
027 01_kill-chain-phase-4-exploitation.mp4
00:00 -
028 02_kill-chain-phase-4-exploitation_instructions.html
00:00 -
029 03_kill-chain-phase-4-delivery-practice-quiz_quiz.html
00:00 -
032 01_kill-chain-phase-5-installation.mp4
00:00 -
033 02_kill-chain-phase-5-installation_instructions.html
00:00 -
034 03_kill-chain-phase-5-delivery-practice-quiz_quiz.html
00:00 -
037 01_kill-chain-phase-6-command-and-control.mp4
00:00 -
038 02_kill-chain-phase-6-command-and-control_instructions.html
00:00 -
039 03_kill-chain-phase-6-delivery-practice-quiz_quiz.html
00:00 -
042 01_kill-chain-phase-7-actions-on-objectives.mp4
00:00 -
043 02_kill-chain-phase-7-actions-on-objectives_instructions.html
00:00 -
044 03_kill-chain-phase-7-delivery-practice-quiz_quiz.html
00:00 -
047 01_applying-the-kill-chain-model.mp4
00:00 -
048 02_applying-the-kill-chain-model_instructions.html
00:00 -
049 03_applying-the-kill-chain-model-practice-quiz_quiz.html
00:00 -
052 01_diamond-model-overview.mp4
00:00 -
053 02_diamond-model-overview_instructions.html
00:00 -
054 03_diamond-model-overview-practice-quiz_quiz.html
00:00 -
057 01_applying-the-diamond-model.mp4
00:00 -
058 02_applying-the-diamond-model_instructions.html
00:00 -
059 03_applying-the-diamond-model-practice-exam_quiz.html
00:00 -
060 01_topic-introduction_instructions.html
00:00 -
061 02_pyramid-of-pain_instructions.html
00:00 -
063 03_getting-started-with-the-mitre-att-ck-framework_instructions.html
00:00 -
064 04_enterprise-att-ck-matrix-components_instructions.html
00:00 -
065 05_mitre-att-ck-matrices-and-tactics_instructions.html
00:00 -
066 06_mitre-att-ck-techniques-and-strategies-for-detection-and-mitigation_instructions.html
00:00 -
067 07_mitre-att-ck-navigator-web-application_instructions.html
00:00 -
069 08_create-a-threat-model-using-att-ck-framework_instructions.html
00:00 -
070 09_mitre-attack-tm-framework-practice-exam_quiz.html
00:00 -
071 01_wrap-up_instructions.html
00:00 -
074 02_wrap-up.mp4
00:00 -
075 01_understanding-incident-analysis-in-a-threat-centric-soc-course-exam_exam.html
00:00 -
079 02_introduction-to-identifying-common-attack-vectors.mp4
00:00 -
080 01_dns-operations_instructions.html
00:00 -
083 02_dns-operations.mp4
00:00 -
084 03_dns-mappings_instructions.html
00:00 -
085 04_dns-ports_instructions.html
00:00 -
086 05_dns-distributed-database_instructions.html
00:00 -
087 06_dns-terminology_instructions.html
00:00 -
088 07_dns-rr-types_instructions.html
00:00 -
089 08_the-nslookup-utility_instructions.html
00:00 -
090 09_dns-operations-practice-exam_quiz.html
00:00 -
091 01_dynamic-dns_instructions.html
00:00 -
094 02_dynamic-dns.mp4
00:00 -
095 03_ddns-operations_instructions.html
00:00 -
096 04_dynamic-dns_instructions.html
00:00 -
097 05_dynamic-dns-practice-exam_quiz.html
00:00 -
098 01_topic-introduction_instructions.html
00:00 -
101 02_recursive-dns-query.mp4
00:00 -
102 03_recursive-dns-query_instructions.html
00:00 -
103 04_recursive-dns-query-practice-exam_quiz.html
00:00 -
104 01_topic-introduction_instructions.html
00:00 -
107 02_http-operations.mp4
00:00 -
108 03_http-protocol-fundamentals_instructions.html
00:00 -
109 04_uri-and-url_instructions.html
00:00 -
110 05_http-request-methods_instructions.html
00:00 -
111 06_http-request-and-response-packets-capture-example_instructions.html
00:00 -
112 07_http-status-codes_instructions.html
00:00 -
113 08_http-cookies_instructions.html
00:00 -
114 09_http-referer_instructions.html
00:00 -
115 10_http-operations-practice-exam_quiz.html
00:00 -
116 01_https-operations_instructions.html
00:00 -
119 02_https-operations.mp4
00:00 -
120 03_topic-introduction_instructions.html
00:00 -
121 04_https-operations_instructions.html
00:00 -
122 05_web-server-digital-certificate_instructions.html
00:00 -
123 06_https-operations-practice-exam_quiz.html
00:00 -
124 01_topic-introduction_instructions.html
00:00 -
125 02_http-2-operations_instructions.html
00:00 -
126 03_http-2-streams_instructions.html
00:00 -
127 04_http-2-version-identification_instructions.html
00:00 -
128 05_other-features-of-http-2_instructions.html
00:00 -
129 06_http-2-pcap-example_instructions.html
00:00 -
130 07_http-2-vulnerabilities_instructions.html
00:00 -
131 08_http-2-operations-practice-exam_quiz.html
00:00 -
132 01_sql-operations_instructions.html
00:00 -
135 02_sql-operations.mp4
00:00 -
136 03_topic-introduction_instructions.html
00:00 -
137 04_sql-commands_instructions.html
00:00 -
138 05_sql-operations-practice-exam_quiz.html
00:00 -
139 01_smtp-operations_instructions.html
00:00 -
142 02_smtp-operations.mp4
00:00 -
143 03_topic-introduction_instructions.html
00:00 -
144 04_smtp-terminology_instructions.html
00:00 -
145 05_smtp-flow_instructions.html
00:00 -
146 06_smtp-conversation_instructions.html
00:00 -
147 07_smtp-operations-practice-exam_quiz.html
00:00 -
148 01_web-scripting_instructions.html
00:00 -
151 02_web-scripting.mp4
00:00 -
152 03_web-scripting_instructions.html
00:00 -
153 04_web-scripting_instructions.html
00:00 -
154 05_server-side-and-client-side-scripting_instructions.html
00:00 -
155 06_web-scripting-practice-exam_quiz.html
00:00 -
158 01_obfuscated-javascript.mp4
00:00 -
159 02_topic-introduction_instructions.html
00:00 -
160 03_obfuscated-javascript_instructions.html
00:00 -
161 04_obfuscated-javascript-practice-exam_quiz.html
00:00 -
162 01_shellcode-and-exploits_instructions.html
00:00 -
165 02_shellcode-and-exploits.mp4
00:00 -
166 03_topic-introduction_instructions.html
00:00 -
167 04_shellcode-and-exploits-practice-exam_quiz.html
00:00 -
168 01_common-metasploit-payloads_instructions.html
00:00 -
171 02_common-metasploit-payloads.mp4
00:00 -
172 03_singles_instructions.html
00:00 -
173 04_stagers_instructions.html
00:00 -
174 05_stages_instructions.html
00:00 -
175 06_other-payloads_instructions.html
00:00 -
176 07_common-metasploit-payloads-practice-exam_quiz.html
00:00 -
177 01_directory-traversal_instructions.html
00:00 -
180 02_directory-traversal.mp4
00:00 -
181 03_topic-introduction_instructions.html
00:00 -
182 04_directory-traversal-practice-exam_quiz.html
00:00 -
183 01_sql-injection_instructions.html
00:00 -
186 02_sql-injection.mp4
00:00 -
187 03_topic-introduction_instructions.html
00:00 -
188 04_intrusion-prevention-system-signatures_instructions.html
00:00 -
189 05_sql-injection-practice-exam_quiz.html
00:00 -
190 01_cross-site-scripting_instructions.html
00:00 -
193 02_cross-site-scripting.mp4
00:00 -
194 03_topic-introduction_instructions.html
00:00 -
195 04_cross-site-scripting_instructions.html
00:00 -
196 05_cross-site-scripting-practice-exam_quiz.html
00:00 -
197 01_punycode_instructions.html
00:00 -
200 02_punycode.mp4
00:00 -
201 03_topic-introduction_instructions.html
00:00 -
202 04_punycode-practice-exam_quiz.html
00:00 -
203 01_dns-tunneling_instructions.html
00:00 -
206 02_dns-tunneling.mp4
00:00 -
207 03_topic-introduction_instructions.html
00:00 -
208 04_dns-tunneling-practice-exam_quiz.html
00:00 -
209 01_pivoting_instructions.html
00:00 -
212 02_pivoting.mp4
00:00 -
213 03_topic-introduction_instructions.html
00:00 -
214 04_pivoting-practice-exam_quiz.html
00:00 -
215 01_http-302-cushioning_instructions.html
00:00 -
218 02_http-302-cushioning.mp4
00:00 -
219 03_topic-introduction_instructions.html
00:00 -
220 04_http-302-cushioning_instructions.html
00:00 -
221 05_http-302-cushioning-practice-exam_quiz.html
00:00 -
222 01_gaining-access-via-web-based-attacks_instructions.html
00:00 -
225 02_gaining-access-via-web-based-attacks.mp4
00:00 -
226 03_topic-introduction_instructions.html
00:00 -
227 04_gaining-access-via-web-based-attacks-practice-exam_quiz.html
00:00 -
228 01_exploit-kits_instructions.html
00:00 -
231 02_exploit-kits.mp4
00:00 -
232 03_topic-introduction_instructions.html
00:00 -
235 04_exploit-kits.mp4
00:00 -
236 05_exploit-kits_instructions.html
00:00 -
237 06_exploit-kits_instructions.html
00:00 -
238 07_exploit-kits-practice-exam_quiz.html
00:00 -
239 01_emotet-advanced-persistent-threat_6824920-Full-Operational-Shutdown-Another-Cybercrime.html
00:00 -
241 02_emotet-advanced-persistent-threat-practice-exam_quiz.html
00:00 -
242 01_wrap-up_instructions.html
00:00 -
245 02_wrap-up.mp4
00:00 -
246 01_identifying-common-attack-vectors-course-exam_exam.html
00:00 -
250 02_introduction-to-identifying-malicious-activity.mp4
00:00 -
253 01_understanding-network-design.mp4
00:00 -
254 02_topic-introduction_instructions.html
00:00 -
255 03_understanding-the-network-design-practice-quiz_quiz.html
00:00 -
256 01_topic-introduction_instructions.html
00:00 -
257 02_zero-trust-workforce-protections_instructions.html
00:00 -
258 03_zero-trust-workload-protections_instructions.html
00:00 -
259 04_zero-trust-workplace-protections_instructions.html
00:00 -
260 05_zero-trust-model-security-vision_instructions.html
00:00 -
261 06_zero-trust-model-practice-quiz_quiz.html
00:00 -
264 01_identifying-possible-threat-actors.mp4
00:00 -
265 02_topic-introduction_instructions.html
00:00 -
266 03_script-kiddies_instructions.html
00:00 -
267 04_hacktivists_instructions.html
00:00 -
268 05_organized-crime_instructions.html
00:00 -
269 06_state-sponsored-nation-state-actors_instructions.html
00:00 -
270 07_insider-threat_instructions.html
00:00 -
273 01_log-data-search.mp4
00:00 -
274 02_topic-introduction_instructions.html
00:00 -
276 03_modeling-network-attacks_instructions.html
00:00 -
277 04_log-data-search-practice-quiz_quiz.html
00:00 -
280 01_system-logs.mp4
00:00 -
281 02_system-logs_instructions.html
00:00 -
282 03_log-file-locations-and-log-files_instructions.html
00:00 -
283 04_configuring-syslog_instructions.html
00:00 -
284 05_selector-syntax_instructions.html
00:00 -
285 06_action-syntax_instructions.html
00:00 -
286 07_practice-quiz_quiz.html
00:00 -
289 01_windows-event-viewer.mp4
00:00 -
290 02_windows-event-viewer_instructions.html
00:00 -
291 03_system-logs-practice-quiz_quiz.html
00:00 -
294 01_firewall-log.mp4
00:00 -
295 02_firewall-log_instructions.html
00:00 -
296 03_firewall-log-practice-quiz_quiz.html
00:00 -
299 01_dns-log.mp4
00:00 -
300 02_dns-log_instructions.html
00:00 -
301 03_dns-log-practice-quiz_quiz.html
00:00 -
304 01_web-proxy-log.mp4
00:00 -
305 02_web-proxy-log_instructions.html
00:00 -
306 03_web-proxy-log-practice-quiz_quiz.html
00:00 -
309 01_email-proxy-log.mp4
00:00 -
310 02_email-proxy-log_instructions.html
00:00 -
311 03_email-proxy-log-practice-quiz_quiz.html
00:00 -
314 01_aaa-server-log.mp4
00:00 -
315 02_aaa-server-log_instructions.html
00:00 -
316 03_aaa-server-log-practice-quiz_quiz.html
00:00 -
319 01_next-generation-firewall-log.mp4
00:00 -
320 02_next-generation-firewall-log_instructions.html
00:00 -
321 03_next-generation-firewall-log-practice-quiz_quiz.html
00:00 -
324 01_applications-log.mp4
00:00 -
325 02_applications-log_instructions.html
00:00 -
326 03_applications-log-practice-quiz_quiz.html
00:00 -
329 01_netflow.mp4
00:00 -
330 02_netflow_instructions.html
00:00 -
331 03_netflow_instructions.html
00:00 -
332 04_references_instructions.html
00:00 -
334 05_netflow-practice-quiz_quiz.html
00:00 -
337 01_netflow-as-a-security-tool.mp4
00:00 -
338 02_netflow-as-a-security-tool_instructions.html
00:00 -
339 03_network-as-a-sensor_instructions.html
00:00 -
340 04_netflow-as-security-tool-examples_instructions.html
00:00 -
341 05_netflow-as-a-security-tool-practice-quiz_quiz.html
00:00 -
344 01_network-behavior-anomaly-detection.mp4
00:00 -
345 02_network-behavior-anomaly-detection_instructions.html
00:00 -
346 03_network-behavior-anomaly-detection-practice-quiz_quiz.html
00:00 -
349 01_data-loss-detection-using-netflow-example.mp4
00:00 -
350 02_data-loss-detection-using-netflow-example_instructions.html
00:00 -
351 03_data-loss-detection-using-netflow-example-practice-quiz_quiz.html
00:00 -
354 01_dns-risk-and-mitigation-tool.mp4
00:00 -
355 02_dns-risk-and-mitigation-tool_instructions.html
00:00 -
356 03_fast-flux-and-botnets_instructions.html
00:00 -
357 04_double-ip-flux_instructions.html
00:00 -
358 05_domain-generation-algorithm_instructions.html
00:00 -
359 06_dns-risk-and-mitigation-tool-practice-quiz_quiz.html
00:00 -
362 01_ips-evasion-techniques.mp4
00:00 -
363 02_ips-evasion-techniques_instructions.html
00:00 -
364 03_traffic-fragmentation_instructions.html
00:00 -
365 04_traffic-substitution-and-insertion_instructions.html
00:00 -
366 05_encryption-and-tunneling_instructions.html
00:00 -
367 06_protocol-level-misinterpretation_instructions.html
00:00 -
368 07_resource-exhaustion_instructions.html
00:00 -
369 08_timing-attacks_instructions.html
00:00 -
370 09_ips-evasion-techniques-practice-quiz_quiz.html
00:00 -
372 01_the-onion-router_instructions.html
00:00 -
373 02_tor-relays_instructions.html
00:00 -
374 03_detecting-tor-traffic_instructions.html
00:00 -
376 04_the-onion-router-practice-quiz_quiz.html
00:00 -
379 01_gaining-access-and-control.mp4
00:00 -
380 02_gaining-access-and-control_instructions.html
00:00 -
381 03_nyetya-ransomware-event_instructions.html
00:00 -
382 04_gaining-access-and-control-practice-quiz_quiz.html
00:00 -
383 01_peer-to-peer-networks_instructions.html
00:00 -
384 02_bittorrent-application_instructions.html
00:00 -
385 03_risks-of-p2p-file-sharing_instructions.html
00:00 -
386 04_botnets_instructions.html
00:00 -
387 05_detecting-malicious-encrypted-p2p-traffic_instructions.html
00:00 -
389 06_peer-to-peer-networks-practice-quiz_quiz.html
00:00 -
390 01_encapsulation_instructions.html
00:00 -
391 02_dns-tunnels_instructions.html
00:00 -
392 03_other-tunnels_instructions.html
00:00 -
393 04_encapsulation-practice-quiz_quiz.html
00:00 -
394 01_altered-disk-image_instructions.html
00:00 -
395 02_software-image-verification_instructions.html
00:00 -
396 03_secure-boot_instructions.html
00:00 -
397 04_altered-disk-image_quiz.html
00:00 -
398 01_wrap-up_instructions.html
00:00 -
401 02_wrap-up.mp4
00:00 -
405 01_introduction.mp4
00:00 -
406 02_i_instructions.html
00:00 -
409 01_network-baselining.mp4
00:00 -
410 02_network-baselining_instructions.html
00:00 -
411 03_core-baseline-process_instructions.html
00:00 -
412 04_network-baselining-practice-quiz_quiz.html
00:00 -
415 01_identify-anomalies-and-suspicious-behaviors.mp4
00:00 -
416 02_identifying-anomalies-and-suspicious-behaviors_instructions.html
00:00 -
417 03_identifying-anomalies-and-suspicious-behaviors-practice-quiz_quiz.html
00:00 -
420 01_pcap-analysis.mp4
00:00 -
421 02_pcap-analysis_instructions.html
00:00 -
422 03_pcap-analysis-practice-quiz_quiz.html
00:00 -
425 01_delivery.mp4
00:00 -
426 02_delivery_instructions.html
00:00 -
427 03_delivery-practice-quiz_quiz.html
00:00 -
428 01_wrap-up_instructions.html
00:00 -
431 02_wrap-up.mp4
00:00 -
432 01_identifying-patterns-of-suspicious-behavior-course-exam_exam.html
00:00 -
links.txt
00:00
06. Threat Investigation
-
003 01_introduction-to-identifying-resources-for-hunting-cyber-threats.mp4
00:00 -
004 02_introduction-to-identifying-resources-for-hunting-cyber-threats_instructions.html
00:00 -
007 01_cyber-threat-hunting-concepts.mp4
00:00 -
008 02_cyber-threat-hunting-concepts_instructions.html
00:00 -
009 03_cyber-threat-hunting-concepts-practice-quiz_quiz.html
00:00 -
012 01_hunting-maturity-model.mp4
00:00 -
013 02_hunting-maturity-model_instructions.html
00:00 -
014 03_hunting-maturity-model-practice-quiz_quiz.html
00:00 -
017 01_cyber-threat-hunting-cycle.mp4
00:00 -
018 02_cyber-threat-hunting-cycle_instructions.html
00:00 -
019 03_cyber-threat-hunting-cycle-practice-quiz_quiz.html
00:00 -
022 01_common-vulnerability-scoring-system.mp4
00:00 -
023 02_common-vulnerability-scoring-system_instructions.html
00:00 -
024 03_cvss-v3-0-base-metrics_instructions.html
00:00 -
025 04_cvss-v3-0-temporal-metrics_instructions.html
00:00 -
026 05_cvss-v3-0-environmental-metrics_instructions.html
00:00 -
027 06_common-vulnerability-scoring-system-practice-quiz_quiz.html
00:00 -
030 01_cvss-v3-0-scoring.mp4
00:00 -
031 02_cvss-v3-0-scoring_instructions.html
00:00 -
032 03_practice-quiz_quiz.html
00:00 -
035 01_cvss-v3-0-example.mp4
00:00 -
036 02_cvss-v3-0-example_instructions.html
00:00 -
037 03_cvss-v3-0-scoring-practice-quiz_quiz.html
00:00 -
040 01_hot-threat-dashboard.mp4
00:00 -
041 02_hot-threat-dashboard_instructions.html
00:00 -
042 03_hot-threat-process_instructions.html
00:00 -
043 04_hot-threat-challenges_instructions.html
00:00 -
044 05_hot-threat-dashboard-practice-quiz_quiz.html
00:00 -
047 01_publicly-available-threat-awareness-resources.mp4
00:00 -
048 02_open-web-application-security-project_instructions.html
00:00 -
049 03_spamhaus-project_instructions.html
00:00 -
050 04_alexa_instructions.html
00:00 -
051 05_publicly-available-threat-awareness-resources-practice-quiz_instructions.html
00:00 -
060 01_security-intelligence.mp4
00:00 -
061 02_security-intelligence_instructions.html
00:00 -
062 03_security-intelligence-practice-quiz_quiz.html
00:00 -
065 01_threat-analytic-systems.mp4
00:00 -
066 02_threat-analytic-systems_instructions.html
00:00 -
067 03_threat-analytic-systems-practice-quiz_quiz.html
00:00 -
070 01_security-tools-reference.mp4
00:00 -
071 02_security-tools-reference_cain.html
00:00 -
075 01_wrap-up_instructions.html
00:00 -
078 02_wrap-up.mp4
00:00 -
079 01_identifying-resources-for-hunting-cyber-threats-course-exam_exam.html
00:00 -
083 02_introduction-to-understanding-event-correlation-and-normalization.mp4
00:00 -
086 01_event-sources.mp4
00:00 -
087 02_event-sources_instructions.html
00:00 -
088 03_intrusion-prevention-system_instructions.html
00:00 -
089 04_firewalls_instructions.html
00:00 -
090 05_netflow_instructions.html
00:00 -
091 06_proxy-servers_instructions.html
00:00 -
092 07_identity-and-access-management_instructions.html
00:00 -
093 08_antivirus_instructions.html
00:00 -
094 09_application-logs_instructions.html
00:00 -
095 10_event-sources-practice-quiz_quiz.html
00:00 -
098 01_evidence.mp4
00:00 -
099 02_evidence_instructions.html
00:00 -
100 03_evidence-practice-quiz_quiz.html
00:00 -
103 01_chain-of-custody.mp4
00:00 -
104 02_chain-of-custody_instructions.html
00:00 -
105 03_chain-of-custody-practice-quiz_quiz.html
00:00 -
108 01_security-data-normalization.mp4
00:00 -
109 02_security-data-normalization_instructions.html
00:00 -
112 01_event-correlation.mp4
00:00 -
113 02_event-correlation_instructions.html
00:00 -
114 03_event-correlation-practice-quiz_quiz.html
00:00 -
117 01_other-security-data-manipulation.mp4
00:00 -
118 02_other-security-data-manipulation_instructions.html
00:00 -
119 03_aggregation_instructions.html
00:00 -
120 04_summarization_instructions.html
00:00 -
121 05_deduplication_instructions.html
00:00 -
122 06_other-security-data-manipulation-practice-quiz_quiz.html
00:00 -
123 01_wrap-up_instructions.html
00:00 -
126 02_wrap-up.mp4
00:00 -
127 01_understanding-event-correlation-and-normalization-course-exam_exam.html
00:00 -
131 02_introduction-to-conducting-security-incident-investigations.mp4
00:00 -
134 01_security-incident-investigation-procedures.mp4
00:00 -
135 02_security-incident-investigation-procedures_instructions.html
00:00 -
136 03_when-when-did-the-events-occur_instructions.html
00:00 -
137 04_who-what-ip-domain-was-associated-with-the-malware_instructions.html
00:00 -
138 05_where-where-did-the-infection-come-from_instructions.html
00:00 -
139 06_what-what-type-of-malware-is-on-the-system_instructions.html
00:00 -
140 07_why-what-does-the-malware-do-and-what-is-its-purpose_instructions.html
00:00 -
141 08_how-how-did-the-malware-get-onto-the-system_instructions.html
00:00 -
142 09_security-incident-investigation-procedures-practice-quiz_quiz.html
00:00 -
143 01_introduction_instructions.html
00:00 -
146 02_threat-investigation-example-china-chopper-remote-access-trojan.mp4
00:00 -
147 03_threat-investigation-example-china-chopper-remote-access-trojan_instructions.html
00:00 -
148 04_threat-investigation-example-china-chopper-remote-access-trojan-practice-quiz_quiz.html
00:00 -
149 01_wrap-up_instructions.html
00:00 -
152 02_wrap-up.mp4
00:00 -
153 01_conducting-security-incident-investigations-course-exam_exam.html
00:00 -
157 02_introduction-to-using-a-playbook-model-to-organize-security-monitoring.mp4
00:00 -
160 01_security-analytics.mp4
00:00 -
161 02_security-analytics_instructions.html
00:00 -
162 03_security-analytics-practice-quiz_quiz.html
00:00 -
165 01_playbook-definition.mp4
00:00 -
166 02_playbook-definition_instructions.html
00:00 -
167 03_playbook-definition-practice-quiz_quiz.html
00:00 -
170 01_what-is-in-a-play.mp4
00:00 -
171 02_what-is-in-a-play_instructions.html
00:00 -
172 03_report-identification_instructions.html
00:00 -
173 04_objective_instructions.html
00:00 -
174 05_data-query_instructions.html
00:00 -
175 06_action_instructions.html
00:00 -
176 07_analysis_instructions.html
00:00 -
177 08_reference_instructions.html
00:00 -
178 09_what-is-in-a-play-practice-quiz_quiz.html
00:00 -
181 01_playbook-management-system.mp4
00:00 -
182 02_playbook-management-system_instructions.html
00:00 -
183 03_playbook-management-system-quiz_quiz.html
00:00 -
184 01_wrap-up_instructions.html
00:00 -
187 02_wrap-up.mp4
00:00 -
188 01_course-exam_exam.html
00:00 -
links.txt
00:00
07. Threat Response
-
003 01_introduction-to-describing-incident-response.mp4
00:00 -
004 02_introduction-to-describing-incident-response_instructions.html
00:00 -
007 01_incident-response-planning.mp4
00:00 -
008 02_incident-response-planning_instructions.html
00:00 -
009 03_incident-response-planning-practice-quiz_quiz.html
00:00 -
012 01_incident-response-life-cycle.mp4
00:00 -
013 02_incident-response-life-cycle_instructions.html
00:00 -
015 03_practice-quiz_quiz.html
00:00 -
018 01_incident-response-policy-elements.mp4
00:00 -
019 02_incident-response-policy-elements_instructions.html
00:00 -
021 03_incident-response-life-cycle-practice-quiz_quiz.html
00:00 -
024 01_incident-attack-categories.mp4
00:00 -
025 02_incident-attack-categories_instructions.html
00:00 -
027 03_practice-quiz_quiz.html
00:00 -
030 01_reference-us-cert-incident-categories.mp4
00:00 -
031 02_reference-us-cert-incident-categories_instructions.html
00:00 -
034 01_regulatory-compliance-incident-response-requirements.mp4
00:00 -
035 02_regulatory-compliance-incident-response-requirements_instructions.html
00:00 -
036 03_regulatory-compliance-incident-response-requirements-practice-quiz_quiz.html
00:00 -
039 01_csirt-categories.mp4
00:00 -
041 02_csirt-categories_instructions.html
00:00 -
043 03_csirt-categories-practice-quiz_quiz.html
00:00 -
046 01_csirt-framework.mp4
00:00 -
047 02_csirt-framework_instructions.html
00:00 -
048 03_csirt-framework-practice-quiz_quiz.html
00:00 -
051 01_csirt-incident-handling-services.mp4
00:00 -
052 02_csirt-incident-handling-services_instructions.html
00:00 -
054 03_csirt-incident-handling-services-practice-quiz_quiz.html
00:00 -
055 01_wrap-up_instructions.html
00:00 -
058 02_wrap-up.mp4
00:00 -
059 01_describing-incident-response-course-exam_exam.html
00:00 -
063 02_introduction-to-understanding-the-use-of-veris.mp4
00:00 -
066 01_veris-overview.mp4
00:00 -
067 02_veris-overview_instructions.html
00:00 -
068 03_practice-quiz_quiz.html
00:00 -
071 01_veris-incidents-structure.mp4
00:00 -
072 02_veris-incidents-structure_instructions.html
00:00 -
073 03_veris-incidents-structure-practice-quiz_quiz.html
00:00 -
076 01_veris-4-a-s.mp4
00:00 -
077 02_veris-4-a-s_instructions.html
00:00 -
078 03_actors-or-agents_instructions.html
00:00 -
079 04_actions_instructions.html
00:00 -
080 05_assets_instructions.html
00:00 -
081 06_attributes_instructions.html
00:00 -
082 07_veris-4-a-s-practice-quiz_quiz.html
00:00 -
085 01_veris-records.mp4
00:00 -
086 02_veris-records_instructions.html
00:00 -
087 03_veris-records-practice-quiz_quiz.html
00:00 -
090 01_veris-community-database.mp4
00:00 -
091 02_veris-community-database_instructions.html
00:00 -
092 03_veris-community-database-practice-quiz_quiz.html
00:00 -
093 01_verizon-data-breach-investigations-report-and-cisco-annual-security-report_instructions.html
00:00 -
098 02_wrap-up.mp4
00:00 -
099 01_understanding-the-use-of-veris-course-exam_exam.html
00:00 -
links.txt
00:00
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.
Student Ratings & Reviews
No Review Yet