TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - Cybersecurity Tools Bootcamp 2026 - Siem, Edr, Soar + Devsecops
- Date: 2026-04-18
- Size: 3.2 GB
- Files: 150
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/1 - 05-Glossary.pdf
25 kB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/1 - What Is Cybersecurity.mp4
34 MB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/2 - 01-Tools-Master-Cheat-Sheet.pdf
14 kB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/2 - Cybersecurity Tool Categories.mp4
24 MB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/3 - 06-Tool-Evaluation-Matrix.xlsx
11 kB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/3 - Open Source Vs Commercial Tools.mp4
16 MB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/4 - 03-MITRE-ATTACK-Quick-Reference.pdf
9.8 kB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/4 - Frameworks And Tool Mapping.mp4
21 MB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/5 - 08-Risk-Register.xlsx
7.2 kB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/5 - 14-Apex-Digital-Reference-Architecture.docx
39 kB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/5 - Apex Digital Scenario And Security Maturity.mp4
21 MB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/6 - Building A Security Roadmap.mp4
19 MB
~Get Your Files Here !/1 - Section 1 Introduction To Cybersecurity Tools/7 - Cybersecurity Career Map.mp4
11 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/103 - Devsecops Culture.mp4
23 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/104 - Sast Tools.mp4
24 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/105 - Dast Tools.mp4
35 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/106 - Sca Tools.mp4
31 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/107 - Secret Scanning.mp4
27 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/108 - Container Image Security.mp4
28 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/109 - Policy As Code.mp4
32 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/110 - Security Automation.mp4
31 MB
~Get Your Files Here !/10 - Section 10 Devsecops And Security Automation/111 - Apex Digital Pipeline.mp4
27 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/112 - Data Security Fundamentals.mp4
17 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/113 - Dlp Solutions.mp4
37 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/114 - Encryption Tools.mp4
33 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/115 - Pki And Certificate Management.mp4
34 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/116 - Email Security.mp4
30 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/117 - Database Security.mp4
32 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/118 - Data Masking And Anonymization.mp4
30 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/119 - Gdpr And Privacy Compliance.mp4
32 MB
~Get Your Files Here !/11 - Section 11 Data Security And Privacy/120 - Apex Digital Data Protection.mp4
34 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/121 - Business Continuity Planning.mp4
30 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/122 - Backup Tools.mp4
27 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/123 - Disaster Recovery Tools.mp4
32 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/124 - Dr Testing And Exercises.mp4
32 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/125 - High Availability.mp4
32 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/126 - Tool Selection Matrix.mp4
16 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/127 - Open Source Security Stack.mp4
33 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/128 - 10-SOC-Analyst-Daily-Runbook.docx
39 kB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/128 - Enterprise Security Stack.mp4
32 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/129 - Compliance As Code.mp4
32 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/130 - Career Roadmap.mp4
30 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/131 - 16-Apex-Digital-Stack-BOM.xlsx
8.2 kB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/131 - Apex Digital Final Architecture.mp4
29 MB
~Get Your Files Here !/12 - Section 12 Business Continuity Dr And Security Strategy/132 - Final Assessment.mp4
35 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/10 - Pfsense Installation And Configuration.mp4
21 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/11 - Linux Firewall Management.mp4
20 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/12 - Waf Modsecurity And Owasp Crs.mp4
23 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/13 - Cloudbased Waf.mp4
9.7 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/14 - Idsips With Snort.mp4
14 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/15 - 02-Command-Cheat-Sheets.pdf
11 kB
~Get Your Files Here !/2 - Section 2 Network Security Tools/15 - Suricata.mp4
19 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/16 - 02-Command-Cheat-Sheets.pdf
11 kB
~Get Your Files Here !/2 - Section 2 Network Security Tools/16 - Wireshark Deep Packet Inspection.mp4
20 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/17 - Network Monitoring Zeek And Ntopng.mp4
17 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/18 - Infrastructure Monitoring Nagios And Zabbix.mp4
7.2 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/19 - Vpn And Network Segmentation.mp4
17 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/20 - Dns Security Tools.mp4
7.5 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/21 - Apex Digital Network Security.mp4
21 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/8 - 04-Ports-Protocols-Log-Sources.pdf
10 kB
~Get Your Files Here !/2 - Section 2 Network Security Tools/8 - Network Security Fundamentals.mp4
19 MB
~Get Your Files Here !/2 - Section 2 Network Security Tools/9 - Firewall Types.mp4
19 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/22 - 07-Vulnerability-Tracker.xlsx
7.1 kB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/22 - Vulnerability Management Lifecycle.mp4
20 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/23 - Owasp Top 10 And Cve Analysis.mp4
26 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/24 - Nessus Vulnerability Scanner.mp4
14 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/25 - Openvas And Gvm.mp4
30 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/26 - Penetration Testing Methodology.mp4
24 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/27 - Kali Linux And Metasploit.mp4
30 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/28 - Burp Suite Web Application Testing.mp4
30 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/29 - Network Reconnaissance With Nmap.mp4
29 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/30 - Password Cracking And Hash Analysis.mp4
18 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/31 - Social Engineering Toolkit.mp4
12 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/32 - Wireless Network Security Testing.mp4
23 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/33 - Automated Vulnerability Scanning Pipelines.mp4
21 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/34 - Penetration Testing Report Writing.mp4
21 MB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/35 - 15-Apex-Digital-Threat-Model.docx
39 kB
~Get Your Files Here !/3 - Section 3 Vulnerability Management And Penetration Testing/35 - Apex Digital Penetration Test Simulation.mp4
16 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/36 - What Is Siem.mp4
20 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/37 - Elk Stack Setup.mp4
28 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/38 - Splunk.mp4
25 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/39 - Wazuh Siem.mp4
30 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/40 - Log Collection Strategies.mp4
11 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/41 - Windows Event Log And Sysmon.mp4
22 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/42 - 13-Detection-Engineering-Starter-Pack.pdf
23 kB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/42 - Sigma Rules.mp4
20 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/43 - Alert Management.mp4
9.9 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/44 - Siem Dashboard Design.mp4
24 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/45 - Security Onion.mp4
21 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/46 - Ueba.mp4
19 MB
~Get Your Files Here !/4 - Section 4 Siem Log Management And Threat Detection/47 - Apex Digital Siem Strategy.mp4
36 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/48 - Endpoint Security Evolution.mp4
53 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/49 - Wazuh Edr.mp4
73 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/50 - Crowdstrike Falcon.mp4
55 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/51 - Microsoft Defender For Endpoint.mp4
42 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/52 - Sentinelone And Carbon Black.mp4
40 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/53 - Xdr Platforms.mp4
19 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/54 - 12-Hardening-Checklists.pdf
15 kB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/54 - Endpoint Hardening.mp4
29 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/55 - Application Whitelisting.mp4
29 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/56 - Mobile Device Security.mp4
33 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/57 - Yara Rules.mp4
30 MB
~Get Your Files Here !/5 - Section 5 Endpoint Security Edr And Xdr/58 - Apex Digital Endpoint Strategy.mp4
47 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/59 - Iam Fundamentals.mp4
26 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/60 - Active Directory Security.mp4
37 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/61 - Bloodhound And Sharphound.mp4
25 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/62 - Ad Hardening Tools.mp4
36 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/63 - Mfa Duo Yubikey And Fido2.mp4
32 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/64 - Sso And Identity Federation.mp4
34 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/65 - Privileged Access Management.mp4
39 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/66 - Secret Management.mp4
31 MB
~Get Your Files Here !/6 - Section 6 Identity And Access Management/67 - Apex Digital Iam Strategy.mp4
38 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/68 - Cloud Security Fundamentals.mp4
15 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/69 - Aws Security Services.mp4
26 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/70 - Azure Security.mp4
53 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/71 - Gcp Security.mp4
17 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/72 - Cspm Tools.mp4
24 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/73 - Cwpp And Cnapp.mp4
19 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/74 - Container Security.mp4
22 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/75 - Kubernetes Security.mp4
22 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/76 - Iac Security Scanning.mp4
17 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/77 - Casb And Saas Security.mp4
15 MB
~Get Your Files Here !/7 - Section 7 Cloud Security And Container Security/78 - Apex Digital Cloud Security.mp4
17 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/79 - 09-Incident-Response-Playbooks.docx
41 kB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/79 - Incident Response Lifecycle.mp4
20 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/80 - Thehive Case Management.mp4
20 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/81 - Dfir Iris.mp4
24 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/82 - Soar Fundamentals.mp4
17 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/83 - Shuffle Soar.mp4
3.2 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/84 - Cortex Xsoar.mp4
8.4 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/85 - Tines And Splunk Soar.mp4
8.6 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/86 - Disk Forensics.mp4
32 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/87 - Memory Forensics.mp4
24 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/88 - Network Forensics.mp4
26 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/89 - Malware Analysis Fundamentals.mp4
28 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/90 - Velociraptor.mp4
22 MB
~Get Your Files Here !/8 - Section 8 Incident Response Soar And Digital Forensics/91 - Apex Digital Ir Playbook.mp4
21 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/100 - Threat Hunting.mp4
15 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/101 - C2 Framework Analysis.mp4
18 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/102 - Apex Digital Purple Team.mp4
16 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/92 - Cti Fundamentals.mp4
16 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/93 - Mitre Attck Framework.mp4
16 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/94 - Misp.mp4
16 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/95 - Opencti.mp4
13 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/96 - Threat Feeds.mp4
17 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/97 - Purple Team Methodology.mp4
15 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/98 - Atomic Red Team And Caldera.mp4
19 MB
~Get Your Files Here !/9 - Section 9 Threat Intelligence And Purple Teaming/99 - Bas Platforms.mp4
19 MB
~Get Your Files Here !/Bonus Resources.txt
70 B