TorBT - Torrents and Magnet Links Search Engine

Udemy - CompTIA SecurityX (CAS-005) Complete Course & Practice Exam 2025

File Name
Size
23. Vulnerabilities and Attacks/2. Injection Vulnerabilities (OBJ 4.2).mp4
67 MB
01. Introduction/1. Introduction.vtt
23 kB
01. Introduction/2. CompTIA SecurityX (CAS-005) - Study Guide.pdf
2.5 MB
01. Introduction/2. CompTIA SecurityX (CAS-005) Exam Objectives.pdf
192 kB
01. Introduction/2. CompTIA SecurityX (CAS-005) Study Plan .pdf
131 kB
01. Introduction/2. Download your free study guide.html
166 B
01. Introduction/3. Exam Tips.mp4
13 MB
01. Introduction/3. Exam Tips.vtt
8.8 kB
01. Introduction/4.1 Checkpoint Introduction.html
18 kB
02. Governance/1. Governance (OBJ. 1.1).mp4
21 MB
02. Governance/1. Governance (OBJ. 1.1).vtt
13 kB
02. Governance/2. Security Program Documentation (OBJ. 1.1).mp4
28 MB
02. Governance/2. Security Program Documentation (OBJ. 1.1).vtt
18 kB
02. Governance/3. Awareness and Training Considerations (OBJ. 1.1).mp4
27 MB
02. Governance/3. Awareness and Training Considerations (OBJ. 1.1).vtt
14 kB
02. Governance/4. Governance Frameworks (OBJ. 1.1).mp4
14 MB
02. Governance/4. Governance Frameworks (OBJ. 1.1).vtt
8.6 kB
02. Governance/5. Governance, Risk, and Compliance (GRC) Tools (OBJ. 1.1).mp4
17 MB
02. Governance/5. Governance, Risk, and Compliance (GRC) Tools (OBJ. 1.1).vtt
9.8 kB
02. Governance/6. Management Involvement (OBJ. 1.1).mp4
17 MB
02. Governance/6. Management Involvement (OBJ. 1.1).vtt
10 kB
02. Governance/7. Change and Configuration Management (OBJ. 1.1).mp4
17 MB
02. Governance/7. Change and Configuration Management (OBJ. 1.1).vtt
10 kB
02. Governance/8. The Data Lifecycle (OBJ. 1.1).mp4
20 MB
02. Governance/8. The Data Lifecycle (OBJ. 1.1).vtt
12 kB
02. Governance/9. Communication Considerations (OBJ. 1.1).mp4
16 MB
02. Governance/9. Communication Considerations (OBJ. 1.1).vtt
9.1 kB
02. Governance/10.2 Checkpoint Governance.html
25 kB
03. Risk Management/1. Risk Management (OBJ. 1.2).mp4
28 MB
03. Risk Management/1. Risk Management (OBJ. 1.2).vtt
16 kB
03. Risk Management/2. Confidentiality Risk Considerations (OBJ. 1.2).mp4
24 MB
03. Risk Management/2. Confidentiality Risk Considerations (OBJ. 1.2).vtt
14 kB
03. Risk Management/3. Integrity Risk Considerations (OBJ. 1.2).mp4
27 MB
03. Risk Management/3. Integrity Risk Considerations (OBJ. 1.2).vtt
13 kB
03. Risk Management/4. Availability Risk Considerations (OBJ. 1.2).mp4
26 MB
03. Risk Management/4. Availability Risk Considerations (OBJ. 1.2).vtt
16 kB
03. Risk Management/5. Privacy Risk Considerations (OBJ. 1.2).mp4
19 MB
03. Risk Management/5. Privacy Risk Considerations (OBJ. 1.2).vtt
11 kB
03. Risk Management/6. Risk Assessment Frameworks (OBJ. 1.2).mp4
18 MB
03. Risk Management/6. Risk Assessment Frameworks (OBJ. 1.2).vtt
10 kB
03. Risk Management/7. Risk Assessment (OBJ. 1.2).mp4
23 MB
03. Risk Management/7. Risk Assessment (OBJ. 1.2).vtt
15 kB
03. Risk Management/8. Risk Response (OBJ. 1.2).mp4
14 MB
03. Risk Management/8. Risk Response (OBJ. 1.2).vtt
8.3 kB
03. Risk Management/9. Impact Analysis (OBJ. 1.2).mp4
16 MB
03. Risk Management/9. Impact Analysis (OBJ. 1.2).vtt
9.9 kB
03. Risk Management/10. Third-Party Risk Management (OBJ. 1.2).mp4
15 MB
03. Risk Management/10. Third-Party Risk Management (OBJ. 1.2).vtt
9.1 kB
03. Risk Management/11.3 Checkpoint Risk Management.html
23 kB
04. Compliance/1. Compliance (OBJ. 1.3).mp4
29 MB
04. Compliance/1. Compliance (OBJ. 1.3).vtt
18 kB
04. Compliance/2. Industry Compliance (OBJ. 1.3).mp4
26 MB
04. Compliance/2. Industry Compliance (OBJ. 1.3).vtt
15 kB
04. Compliance/3. Industry Standards (OBJ. 1.3).mp4
21 MB
04. Compliance/3. Industry Standards (OBJ. 1.3).vtt
12 kB
04. Compliance/4. Security Frameworks (OBJ. 1.3).mp4
20 MB
04. Compliance/4. Security Frameworks (OBJ. 1.3).vtt
13 kB
04. Compliance/5. Security Organziation Control Type 2 (SOC 2) (OBJ. 1.3).mp4
15 MB
04. Compliance/5. Security Organziation Control Type 2 (SOC 2) (OBJ. 1.3).vtt
9.0 kB
04. Compliance/6. NIST Cybersecurity Framework (CSF) (OBJ. 1.3).mp4
12 MB
04. Compliance/6. NIST Cybersecurity Framework (CSF) (OBJ. 1.3).vtt
7.2 kB
04. Compliance/7. Cloud Security Alliance (CSA) (OBJ. 1.3).mp4
9.7 MB
04. Compliance/7. Cloud Security Alliance (CSA) (OBJ. 1.3).vtt
5.8 kB
04. Compliance/8. Privacy Regulations (OBJ. 1.3).mp4
27 MB
04. Compliance/8. Privacy Regulations (OBJ. 1.3).vtt
16 kB
04. Compliance/9. Security Reviews (OBJ. 1.3).mp4
20 MB
04. Compliance/9. Security Reviews (OBJ. 1.3).vtt
11 kB
04. Compliance/10. Cross-Jurisdictional Compliance (OBJ. 1.3).mp4
18 MB
04. Compliance/10. Cross-Jurisdictional Compliance (OBJ. 1.3).vtt
10 kB
04. Compliance/11.4 Checkpoint Compliance.html
26 kB
05. Resilient System Design/1. Resilient System Design (OBJ 2.1).mp4
29 MB
05. Resilient System Design/1. Resilient System Design (OBJ 2.1).vtt
18 kB
05. Resilient System Design/2. Security Devices (OBJ 2.1).mp4
31 MB
05. Resilient System Design/2. Security Devices (OBJ 2.1).vtt
17 kB
05. Resilient System Design/3. Monitoring and Detection (OBJ 2.1).mp4
35 MB
05. Resilient System Design/3. Monitoring and Detection (OBJ 2.1).vtt
17 kB
05. Resilient System Design/4. Network Traffic Management (OBJ 2.1).mp4
26 MB
05. Resilient System Design/4. Network Traffic Management (OBJ 2.1).vtt
15 kB
05. Resilient System Design/5. Application Layer Security (OBJ 2.1).mp4
16 MB
05. Resilient System Design/5. Application Layer Security (OBJ 2.1).vtt
9.9 kB
05. Resilient System Design/6. Availability Considerations (OBJ 2.1).mp4
19 MB
05. Resilient System Design/6. Availability Considerations (OBJ 2.1).vtt
11 kB
05. Resilient System Design/7. Scaling Considerations (OBJ 2.1).mp4
19 MB
05. Resilient System Design/7. Scaling Considerations (OBJ 2.1).vtt
11 kB
05. Resilient System Design/8. Recovery Strategies (OBJ 2.1).mp4
15 MB
05. Resilient System Design/8. Recovery Strategies (OBJ 2.1).vtt
8.2 kB
05. Resilient System Design/9. Deployment Strategies (OBJ 2.1).mp4
15 MB
05. Resilient System Design/9. Deployment Strategies (OBJ 2.1).vtt
8.3 kB
05. Resilient System Design/10.5 Checkpoint Resilient System Design.html
22 kB
06. Secure Architecture Design/1. Secure Architecture Design (OBJ 2.3).mp4
26 MB
06. Secure Architecture Design/1. Secure Architecture Design (OBJ 2.3).vtt
17 kB
06. Secure Architecture Design/2. Data States (OBJ 2.3).mp4
19 MB
06. Secure Architecture Design/2. Data States (OBJ 2.3).vtt
11 kB
06. Secure Architecture Design/3. Data Classification (OBJ 2.3).mp4
24 MB
06. Secure Architecture Design/3. Data Classification (OBJ 2.3).vtt
14 kB
06. Secure Architecture Design/4. Data Labeling and Tagging (OBJ 2.3).mp4
23 MB
06. Secure Architecture Design/4. Data Labeling and Tagging (OBJ 2.3).vtt
14 kB
06. Secure Architecture Design/5. Data Loss Prevention (DLP) (OBJ 2.3).mp4
18 MB
06. Secure Architecture Design/5. Data Loss Prevention (DLP) (OBJ 2.3).vtt
9.8 kB
06. Secure Architecture Design/6. Hybrid Infrastrucutres (OBJ 2.3).mp4
24 MB
06. Secure Architecture Design/6. Hybrid Infrastrucutres (OBJ 2.3).vtt
14 kB
06. Secure Architecture Design/7. Third-Party Integrations (OBJ 2.3).mp4
20 MB
06. Secure Architecture Design/7. Third-Party Integrations (OBJ 2.3).vtt
11 kB
06. Secure Architecture Design/8. Attack Surface Management (OBJ 2.3).mp4
35 MB
06. Secure Architecture Design/8. Attack Surface Management (OBJ 2.3).vtt
18 kB
06. Secure Architecture Design/9. Control Effectiveness (OBJ 2.3).mp4
24 MB
06. Secure Architecture Design/9. Control Effectiveness (OBJ 2.3).vtt
15 kB
06. Secure Architecture Design/10.6 Checkpoint Secure Architecture Design.html
23 kB
07. Security in Systems/1. Security in Systems (OBJ 2.2).mp4
34 MB
07. Security in Systems/1. Security in Systems (OBJ 2.2).vtt
21 kB
07. Security in Systems/2. Hardware Assurance (OBJ 2.2).mp4
24 MB
07. Security in Systems/2. Hardware Assurance (OBJ 2.2).vtt
14 kB
07. Security in Systems/3. Security Requirements (OBJ 2.2).mp4
26 MB
07. Security in Systems/3. Security Requirements (OBJ 2.2).vtt
15 kB
07. Security in Systems/4. Software Assurance (OBJ 2.2).mp4
31 MB
07. Security in Systems/4. Software Assurance (OBJ 2.2).vtt
15 kB
07. Security in Systems/5. Supply Chain Assurance (OBJ 2.2).mp4
24 MB
07. Security in Systems/5. Supply Chain Assurance (OBJ 2.2).vtt
12 kB
07. Security in Systems/6. Pre-Deployment Testing (OBJ 2.2).mp4
32 MB
07. Security in Systems/6. Pre-Deployment Testing (OBJ 2.2).vtt
18 kB
07. Security in Systems/7. Post-Deployment Testing (OBJ 2.2).mp4
28 MB
07. Security in Systems/7. Post-Deployment Testing (OBJ 2.2).vtt
14 kB
07. Security in Systems/8. Continuous IntegrationContinuous Deployment (CICD) Management (OBJ 2.2).mp4
18 MB
07. Security in Systems/8. Continuous IntegrationContinuous Deployment (CICD) Management (OBJ 2.2).vtt
9.2 kB
07. Security in Systems/9. Continuous IntegrationContinuous Deployment (CICD) Testing (OBJ 2.2).mp4
19 MB
07. Security in Systems/9. Continuous IntegrationContinuous Deployment (CICD) Testing (OBJ 2.2).vtt
9.5 kB
07. Security in Systems/10. End-of-Life (EOL) Considerations (OBJ 2.2).mp4
22 MB
07. Security in Systems/10. End-of-Life (EOL) Considerations (OBJ 2.2).vtt
12 kB
07. Security in Systems/11.7 Checkpoint Security in Systems.html
23 kB
08. Access, Authentication, Authorization/1. Access, Authentication, Authorization (OBJ 2.4).mp4
26 MB
08. Access, Authentication, Authorization/1. Access, Authentication, Authorization (OBJ 2.4).vtt
15 kB
08. Access, Authentication, Authorization/2. Access Control Systems (OBJ 2.4).mp4
24 MB
08. Access, Authentication, Authorization/2. Access Control Systems (OBJ 2.4).vtt
12 kB
08. Access, Authentication, Authorization/3. Access Provision (OBJ 2.4).mp4
16 MB
08. Access, Authentication, Authorization/3. Access Provision (OBJ 2.4).vtt
8.8 kB
08. Access, Authentication, Authorization/4. Rule-Based Access Control (OBJ 2.4).mp4
33 MB
08. Access, Authentication, Authorization/4. Rule-Based Access Control (OBJ 2.4).vtt
18 kB
08. Access, Authentication, Authorization/5. Role-Based Access Control (RBAC) (OBJ 2.4).mp4
10 MB
08. Access, Authentication, Authorization/5. Role-Based Access Control (RBAC) (OBJ 2.4).vtt
5.2 kB
08. Access, Authentication, Authorization/6. Identity and Authentication (OBJ 2.4).mp4
25 MB
08. Access, Authentication, Authorization/6. Identity and Authentication (OBJ 2.4).vtt
14 kB
08. Access, Authentication, Authorization/7. Access Control Policies (OBJ 2.4).mp4
13 MB
08. Access, Authentication, Authorization/7. Access Control Policies (OBJ 2.4).vtt
7.3 kB
08. Access, Authentication, Authorization/8. Monitoring and Oversight (OBJ 2.4).mp4
22 MB
08. Access, Authentication, Authorization/8. Monitoring and Oversight (OBJ 2.4).vtt
12 kB
08. Access, Authentication, Authorization/9.8 Checkpoint Access, Authentication, Authorization.html
23 kB
09. Zero Trust Design/1. Zero Trust Design (OBJ 2.6).mp4
30 MB
09. Zero Trust Design/1. Zero Trust Design (OBJ 2.6).vtt
18 kB
09. Zero Trust Design/2. Security Boundaries (OBJ 2.6).mp4
22 MB
09. Zero Trust Design/2. Security Boundaries (OBJ 2.6).vtt
12 kB
09. Zero Trust Design/3. VPN Architecture (OBJ 2.6).mp4
25 MB
09. Zero Trust Design/3. VPN Architecture (OBJ 2.6).vtt
13 kB
09. Zero Trust Design/4. Segmentation (OBJ 2.6).mp4
19 MB
09. Zero Trust Design/4. Segmentation (OBJ 2.6).vtt
9.8 kB
09. Zero Trust Design/5. Deperimeterization (OBJ 2.6).mp4
27 MB
09. Zero Trust Design/5. Deperimeterization (OBJ 2.6).vtt
15 kB
09. Zero Trust Design/6. Access Management (OBJ 2.6).mp4
19 MB
09. Zero Trust Design/6. Access Management (OBJ 2.6).vtt
9.4 kB
09. Zero Trust Design/7. Application Programming Interface (API) Integeration and Validation (OBJ 2.6).mp4
23 MB
09. Zero Trust Design/7. Application Programming Interface (API) Integeration and Validation (OBJ 2.6).vtt
12 kB
09. Zero Trust Design/8. Asset Control (OBJ 2.6).mp4
20 MB
09. Zero Trust Design/8. Asset Control (OBJ 2.6).vtt
9.9 kB
09. Zero Trust Design/9.9 Checkpoint Zero Trust Design.html
23 kB
10. Hardware Security/1. Hardware Security (OBJ 3.4).mp4
28 MB
10. Hardware Security/1. Hardware Security (OBJ 3.4).vtt
16 kB
10. Hardware Security/2. Roots of Trust (OBJ 3.4).mp4
25 MB
10. Hardware Security/2. Roots of Trust (OBJ 3.4).vtt
13 kB
10. Hardware Security/3. Boot Options (OBJ 3.4).mp4
21 MB
10. Hardware Security/3. Boot Options (OBJ 3.4).vtt
12 kB
10. Hardware Security/4. Security Coprocessors (OBJ 3.4).mp4
18 MB
10. Hardware Security/4. Security Coprocessors (OBJ 3.4).vtt
9.4 kB
10. Hardware Security/5. Self-Encrypting Drives (SED) (OBJ 3.4).mp4
14 MB
10. Hardware Security/5. Self-Encrypting Drives (SED) (OBJ 3.4).vtt
7.4 kB
10. Hardware Security/6. Host-Based Encryption (OBJ 3.4).mp4
25 MB
10. Hardware Security/6. Host-Based Encryption (OBJ 3.4).vtt
12 kB
10. Hardware Security/7. Self-Healing Hardware (OBJ 3.4).mp4
13 MB
10. Hardware Security/7. Self-Healing Hardware (OBJ 3.4).vtt
7.4 kB
10. Hardware Security/8. Virtual Hardware (OBJ 3.4).mp4
16 MB
10. Hardware Security/8. Virtual Hardware (OBJ 3.4).vtt
8.8 kB
10. Hardware Security/9.10 Checkpoint Hardware Security.html
23 kB
11. Endpoint and Server Security/1. Endpoint and Server Security (OBJ 3.2).mp4
26 MB
11. Endpoint and Server Security/1. Endpoint and Server Security (OBJ 3.2).vtt
15 kB
11. Endpoint and Server Security/2. Configuration and Privilege Management (OBJ 3.2).mp4
16 MB
11. Endpoint and Server Security/2. Configuration and Privilege Management (OBJ 3.2).vtt
9.1 kB
11. Endpoint and Server Security/3. Operating System Security (OBJ 3.2).mp4
25 MB
11. Endpoint and Server Security/3. Operating System Security (OBJ 3.2).vtt
12 kB
11. Endpoint and Server Security/4. Threat Protection (OBJ 3.2).mp4
26 MB
11. Endpoint and Server Security/4. Threat Protection (OBJ 3.2).vtt
14 kB
11. Endpoint and Server Security/5. Application Management (OBJ 3.2).mp4
16 MB
11. Endpoint and Server Security/5. Application Management (OBJ 3.2).vtt
9.1 kB
11. Endpoint and Server Security/6. Monitoring and Response (OBJ 3.2).mp4
37 MB
11. Endpoint and Server Security/6. Monitoring and Response (OBJ 3.2).vtt
20 kB
11. Endpoint and Server Security/7. Mobile Management (OBJ 3.2).mp4
21 MB
11. Endpoint and Server Security/7. Mobile Management (OBJ 3.2).vtt
11 kB
11. Endpoint and Server Security/8. Attack Surface Management (OBJ 3.2).mp4
34 MB
11. Endpoint and Server Security/8. Attack Surface Management (OBJ 3.2).vtt
19 kB
11. Endpoint and Server Security/9.11 Checkpoint Endpoint and Server Security.html
23 kB
12. Data Security Concepts/1. Data Security Concepts (OBJ 3.8).mp4
32 MB
12. Data Security Concepts/1. Data Security Concepts (OBJ 3.8).vtt
18 kB
12. Data Security Concepts/2. Data Integrity (OBJ 3.8).mp4
27 MB
12. Data Security Concepts/2. Data Integrity (OBJ 3.8).vtt
14 kB
12. Data Security Concepts/3. Integrity Use Cases (OBJ 3.8).mp4
24 MB
12. Data Security Concepts/3. Integrity Use Cases (OBJ 3.8).vtt
12 kB
12. Data Security Concepts/4. Blockchain (OBJ 3.8).mp4
44 MB
12. Data Security Concepts/4. Blockchain (OBJ 3.8).vtt
23 kB
12. Data Security Concepts/5. Data Protection (OBJ 3.8).mp4
36 MB
12. Data Security Concepts/5. Data Protection (OBJ 3.8).vtt
19 kB
12. Data Security Concepts/6. Data State Protection (OBJ 3.8).mp4
37 MB
12. Data Security Concepts/6. Data State Protection (OBJ 3.8).vtt
19 kB
12. Data Security Concepts/7. Data Handling and Management (OBJ 3.8).mp4
29 MB
12. Data Security Concepts/7. Data Handling and Management (OBJ 3.8).vtt
16 kB
12. Data Security Concepts/8. Data Compliance and Privacy (OBJ 3.8).mp4
29 MB
12. Data Security Concepts/8. Data Compliance and Privacy (OBJ 3.8).vtt
14 kB
12. Data Security Concepts/9.12 Checkpoint Data Security Concepts.html
23 kB
13. Cryptographic Types/1. Cryptographic Types (OBJ 3.8).mp4
31 MB
13. Cryptographic Types/1. Cryptographic Types (OBJ 3.8).vtt
18 kB
13. Cryptographic Types/2. Symmetric Cryptography (OBJ 3.8).mp4
23 MB
13. Cryptographic Types/2. Symmetric Cryptography (OBJ 3.8).vtt
11 kB
13. Cryptographic Types/3. Symmetric Algorithms (OBJ 3.8).mp4
41 MB
13. Cryptographic Types/3. Symmetric Algorithms (OBJ 3.8).vtt
20 kB
13. Cryptographic Types/4. Symmetric Cryptography Considerations (OBJ 3.8).mp4
26 MB
13. Cryptographic Types/4. Symmetric Cryptography Considerations (OBJ 3.8).vtt
13 kB
13. Cryptographic Types/5. Asymmetric Cryptography (OBJ 3.8).mp4
27 MB
13. Cryptographic Types/5. Asymmetric Cryptography (OBJ 3.8).vtt
14 kB
13. Cryptographic Types/6. Asymmetric Algorithms (OBJ 3.8).mp4
36 MB
13. Cryptographic Types/6. Asymmetric Algorithms (OBJ 3.8).vtt
19 kB
13. Cryptographic Types/7. Digital Signatures (OBJ 3.8).mp4
28 MB
13. Cryptographic Types/7. Digital Signatures (OBJ 3.8).vtt
14 kB
13. Cryptographic Types/8. Asymmetric Cryptography Use Cases (OBJ 3.8).mp4
36 MB
13. Cryptographic Types/8. Asymmetric Cryptography Use Cases (OBJ 3.8).vtt
19 kB
13. Cryptographic Types/9.13 Checkpoint Cryptographic Types.html
23 kB
14. PKI Architecture/1. Public Key Infrastructure (PKI) Architecture (OBJ 2.4).mp4
22 MB
14. PKI Architecture/1. Public Key Infrastructure (PKI) Architecture (OBJ 2.4).vtt
13 kB
14. PKI Architecture/2. Certificate Management (OBJ 2.4).mp4
46 MB
14. PKI Architecture/2. Certificate Management (OBJ 2.4).vtt
24 kB
14. PKI Architecture/3. Certificate Authority (CA) Functions (OBJ 2.4).mp4
42 MB
14. PKI Architecture/3. Certificate Authority (CA) Functions (OBJ 2.4).vtt
22 kB
14. PKI Architecture/4. Certificate Validation (OBJ 2.4).mp4
39 MB
14. PKI Architecture/4. Certificate Validation (OBJ 2.4).vtt
21 kB
14. PKI Architecture/5. Certificate Deployment (OBJ 2.4).mp4
22 MB
14. PKI Architecture/5. Certificate Deployment (OBJ 2.4).vtt
12 kB
14. PKI Architecture/6.14 Checkpoint PKI Architecture.html
23 kB
15. Advanced Cryptographic Concepts/1. Advanced Cryptographic Concepts (OBJ 3.7).mp4
36 MB
15. Advanced Cryptographic Concepts/1. Advanced Cryptographic Concepts (OBJ 3.7).vtt
20 kB
15. Advanced Cryptographic Concepts/2. Cryptographic Blockers (OBJ 3.7).mp4
16 MB
15. Advanced Cryptographic Concepts/2. Cryptographic Blockers (OBJ 3.7).vtt
8.1 kB
15. Advanced Cryptographic Concepts/3. Key Management (OBJ 3.7).mp4
23 MB
15. Advanced Cryptographic Concepts/3. Key Management (OBJ 3.7).vtt
12 kB
15. Advanced Cryptographic Concepts/4. Encryption Techniques (OBJ 3.7).mp4
18 MB
15. Advanced Cryptographic Concepts/4. Encryption Techniques (OBJ 3.7).vtt
9.5 kB
15. Advanced Cryptographic Concepts/5. Security Properties (OBJ 3.7).mp4
26 MB
15. Advanced Cryptographic Concepts/5. Security Properties (OBJ 3.7).vtt
12 kB
15. Advanced Cryptographic Concepts/6. Collaborative Considerations (OBJ 3.7).mp4
26 MB
15. Advanced Cryptographic Concepts/6. Collaborative Considerations (OBJ 3.7).vtt
13 kB
15. Advanced Cryptographic Concepts/7. Performance Considerations (OBJ 3.7).mp4
31 MB
15. Advanced Cryptographic Concepts/7. Performance Considerations (OBJ 3.7).vtt
15 kB
15. Advanced Cryptographic Concepts/8. Post-Quantum Cryptography (PQC) (OBJ 3.7).mp4
32 MB
15. Advanced Cryptographic Concepts/8. Post-Quantum Cryptography (PQC) (OBJ 3.7).vtt
16 kB
15. Advanced Cryptographic Concepts/9. Post-Quantum Implications (OBJ 3.7).mp4
22 MB
15. Advanced Cryptographic Concepts/9. Post-Quantum Implications (OBJ 3.7).vtt
12 kB
15. Advanced Cryptographic Concepts/10.15 Checkpoint Advanced Cryptographic Concepts.html
23 kB
16. Troubleshooting IAM/1. Troubleshooting IAM (OBJ 3.1).mp4
42 MB
16. Troubleshooting IAM/1. Troubleshooting IAM (OBJ 3.1).vtt
24 kB
16. Troubleshooting IAM/2. Management Frameworks (OBJ 3.1).mp4
23 MB
16. Troubleshooting IAM/2. Management Frameworks (OBJ 3.1).vtt
12 kB
16. Troubleshooting IAM/3. Subject Access Control (OBJ 3.1).mp4
18 MB
16. Troubleshooting IAM/3. Subject Access Control (OBJ 3.1).vtt
8.6 kB
16. Troubleshooting IAM/4. User Identity Control (OBJ 3.1).mp4
32 MB
16. Troubleshooting IAM/4. User Identity Control (OBJ 3.1).vtt
16 kB
16. Troubleshooting IAM/5. Secrets Management (OBJ 3.1).mp4
43 MB
16. Troubleshooting IAM/5. Secrets Management (OBJ 3.1).vtt
22 kB
16. Troubleshooting IAM/6. Authentication and Authorization (OBJ 3.1).mp4
40 MB
16. Troubleshooting IAM/6. Authentication and Authorization (OBJ 3.1).vtt
21 kB
16. Troubleshooting IAM/7. Cloud IAM access and Trust Policies (OBJ 3.1).mp4
20 MB
16. Troubleshooting IAM/7. Cloud IAM access and Trust Policies (OBJ 3.1).vtt
10 kB
16. Troubleshooting IAM/8. WiFi Authentication (OBJ 3.1).mp4
46 MB
16. Troubleshooting IAM/8. WiFi Authentication (OBJ 3.1).vtt
22 kB
16. Troubleshooting IAM/9. Access Control (OBJ 3.1).mp4
36 MB
16. Troubleshooting IAM/9. Access Control (OBJ 3.1).vtt
18 kB
16. Troubleshooting IAM/10. Conditional Access (OBJ 3.1).mp4
28 MB
16. Troubleshooting IAM/10. Conditional Access (OBJ 3.1).vtt
13 kB
16. Troubleshooting IAM/11. Logging and Monitoring (OBJ 3.1).mp4
19 MB
16. Troubleshooting IAM/11. Logging and Monitoring (OBJ 3.1).vtt
10 kB
16. Troubleshooting IAM/12.16 Checkpoint Troubleshooting IAM.html
22 kB
17. Troubleshooting Network Infrastructure/1. Troubleshooting Network Infrastructure (OBJ 3.3).mp4
45 MB
17. Troubleshooting Network Infrastructure/1. Troubleshooting Network Infrastructure (OBJ 3.3).vtt
26 kB
17. Troubleshooting Network Infrastructure/2. Observability (OBJ 3.3).mp4
17 MB
17. Troubleshooting Network Infrastructure/2. Observability (OBJ 3.3).vtt
8.4 kB
17. Troubleshooting Network Infrastructure/3. Network Errors (OBJ 3.3).mp4
39 MB
17. Troubleshooting Network Infrastructure/3. Network Errors (OBJ 3.3).vtt
20 kB
17. Troubleshooting Network Infrastructure/4. Network Misconfigurations (OBJ 3.3).mp4
22 MB
17. Troubleshooting Network Infrastructure/4. Network Misconfigurations (OBJ 3.3).vtt
12 kB
17. Troubleshooting Network Infrastructure/5. IPSIDS Issues (OBJ 3.3).mp4
27 MB
17. Troubleshooting Network Infrastructure/5. IPSIDS Issues (OBJ 3.3).vtt
14 kB
17. Troubleshooting Network Infrastructure/6. Alert Analysis (OBJ 3.3).mp4
23 MB
17. Troubleshooting Network Infrastructure/6. Alert Analysis (OBJ 3.3).vtt
12 kB
17. Troubleshooting Network Infrastructure/7. DNS Security (OBJ 3.3).mp4
42 MB
17. Troubleshooting Network Infrastructure/7. DNS Security (OBJ 3.3).vtt
21 kB
17. Troubleshooting Network Infrastructure/8. Email Security (OBJ 3.3).mp4
42 MB
17. Troubleshooting Network Infrastructure/8. Email Security (OBJ 3.3).vtt
22 kB
17. Troubleshooting Network Infrastructure/9. Network Issues (OBJ 3.3).mp4
26 MB
17. Troubleshooting Network Infrastructure/9. Network Issues (OBJ 3.3).vtt
14 kB
17. Troubleshooting Network Infrastructure/10. Cryptographic Issues (OBJ 3.3).mp4
32 MB
17. Troubleshooting Network Infrastructure/10. Cryptographic Issues (OBJ 3.3).vtt
15 kB
17. Troubleshooting Network Infrastructure/11. PKI Issues (OBJ 3.3).mp4
37 MB
17. Troubleshooting Network Infrastructure/11. PKI Issues (OBJ 3.3).vtt
18 kB
17. Troubleshooting Network Infrastructure/12.17 Checkpoint Troubleshooting Network Infrastructure.html
23 kB
18. Cloud Security/1. Cloud Security (OBJ 2.5).mp4
39 MB
18. Cloud Security/1. Cloud Security (OBJ 2.5).vtt
23 kB
18. Cloud Security/2. Cloud Implementation (OBJ 2.5).mp4
21 MB
18. Cloud Security/2. Cloud Implementation (OBJ 2.5).vtt
10 kB
18. Cloud Security/3. Cloud Management (OBJ 2.5).mp4
24 MB
18. Cloud Security/3. Cloud Management (OBJ 2.5).vtt
11 kB
18. Cloud Security/4. Connectivity and Integration (OBJ 2.5).mp4
33 MB
18. Cloud Security/4. Connectivity and Integration (OBJ 2.5).vtt
15 kB
18. Cloud Security/5. Cloud Security Considerations (OBJ 2.5).mp4
37 MB
18. Cloud Security/5. Cloud Security Considerations (OBJ 2.5).vtt
18 kB
18. Cloud Security/6. API Security (OBJ 2.5).mp4
28 MB
18. Cloud Security/6. API Security (OBJ 2.5).vtt
13 kB
18. Cloud Security/7. Cloud Access Security Broker (CASB) (OBJ 2.5).mp4
26 MB
18. Cloud Security/7. Cloud Access Security Broker (CASB) (OBJ 2.5).vtt
12 kB
18. Cloud Security/8. Development and Deployment (OBJ 2.5).mp4
32 MB
18. Cloud Security/8. Development and Deployment (OBJ 2.5).vtt
16 kB
18. Cloud Security/9. CICD Pipeline (OBJ 2.5).mp4
23 MB
18. Cloud Security/9. CICD Pipeline (OBJ 2.5).vtt
12 kB
18. Cloud Security/10. Container Management (OBJ 2.5).mp4
21 MB
18. Cloud Security/10. Container Management (OBJ 2.5).vtt
10 kB
18. Cloud Security/11. Serverless Computing (OBJ 2.5).mp4
28 MB
18. Cloud Security/11. Serverless Computing (OBJ 2.5).vtt
16 kB
18. Cloud Security/12.18 Checkpoint Cloud Security.html
22 kB
19. Specialized System Security/1. Specialized System Security (OBJ 3.5).mp4
34 MB
19. Specialized System Security/1. Specialized System Security (OBJ 3.5).vtt
21 kB
19. Specialized System Security/2. Specialized Systems (OBJ 3.5).mp4
28 MB
19. Specialized System Security/2. Specialized Systems (OBJ 3.5).vtt
15 kB
19. Specialized System Security/3. Operational Technology (OT) (OBJ 3.5).mp4
28 MB
19. Specialized System Security/3. Operational Technology (OT) (OBJ 3.5).vtt
15 kB
19. Specialized System Security/4. Characteristics of SpecializedLegacy Systems (OBJ 3.5).mp4
32 MB
19. Specialized System Security/4. Characteristics of SpecializedLegacy Systems (OBJ 3.5).vtt
18 kB
19. Specialized System Security/5. Security Practices (OBJ 3.5).mp4
18 MB
19. Specialized System Security/5. Security Practices (OBJ 3.5).vtt
11 kB
19. Specialized System Security/6. Data Management (OBJ 3.5).mp4
26 MB
19. Specialized System Security/6. Data Management (OBJ 3.5).vtt
14 kB
19. Specialized System Security/7. Compliance and Regulatory Considerations (OBJ 3.5).mp4
21 MB
19. Specialized System Security/7. Compliance and Regulatory Considerations (OBJ 3.5).vtt
11 kB
19. Specialized System Security/8. Critical Services Challenges (OBJ 3.5).mp4
20 MB
19. Specialized System Security/8. Critical Services Challenges (OBJ 3.5).vtt
12 kB
19. Specialized System Security/9. Commercial and Government Challenges (OBJ 3.5).mp4
26 MB
19. Specialized System Security/9. Commercial and Government Challenges (OBJ 3.5).vtt
16 kB
19. Specialized System Security/10.19 Checkpoint Specialized System Security.html
23 kB
20. Automated Security Operations/1. Automated Security Operations (OBJ 3.6).mp4
30 MB
20. Automated Security Operations/1. Automated Security Operations (OBJ 3.6).vtt
18 kB
20. Automated Security Operations/2. Vulnerability Scanning and Reporting (OBJ 3.6).mp4
23 MB
20. Automated Security Operations/2. Vulnerability Scanning and Reporting (OBJ 3.6).vtt
12 kB
20. Automated Security Operations/3. Scripting (OBJ 3.6).mp4
26 MB
20. Automated Security Operations/3. Scripting (OBJ 3.6).vtt
15 kB
20. Automated Security Operations/4. Bash (OBJ 3.6).mp4
24 MB
20. Automated Security Operations/4. Bash (OBJ 3.6).vtt
14 kB
20. Automated Security Operations/5. PowerShell (OBJ 3.6).mp4
26 MB
20. Automated Security Operations/5. PowerShell (OBJ 3.6).vtt
14 kB
20. Automated Security Operations/6. Python (OBJ 3.6).mp4
27 MB
20. Automated Security Operations/6. Python (OBJ 3.6).vtt
14 kB
20. Automated Security Operations/7. CronScheduled Tasks (OBJ 3.6).mp4
38 MB
20. Automated Security Operations/7. CronScheduled Tasks (OBJ 3.6).vtt
19 kB
20. Automated Security Operations/8. Workflow Automation (OBJ 3.6).mp4
20 MB
20. Automated Security Operations/8. Workflow Automation (OBJ 3.6).vtt
10 kB
20. Automated Security Operations/9.20 Checkpoint Automated Security Operations.html
22 kB
21. Integrated Security and Automation/1. Integrated Security and Automation (OBJ 3.6).mp4
41 MB
21. Integrated Security and Automation/1. Integrated Security and Automation (OBJ 3.6).vtt
24 kB
21. Integrated Security and Automation/2. Configuration Files (OBJ 3.6).mp4
26 MB
21. Integrated Security and Automation/2. Configuration Files (OBJ 3.6).vtt
12 kB
21. Integrated Security and Automation/3. Automated Patching (OBJ 3.6).mp4
26 MB
21. Integrated Security and Automation/3. Automated Patching (OBJ 3.6).vtt
13 kB
21. Integrated Security and Automation/4. Dynamic Security Controls (OBJ 3.6).mp4
23 MB
21. Integrated Security and Automation/4. Dynamic Security Controls (OBJ 3.6).vtt
12 kB
21. Integrated Security and Automation/5. Security Orchestration, Automation, and Response (SOAR) (OBJ 3.6).mp4
34 MB
21. Integrated Security and Automation/5. Security Orchestration, Automation, and Response (SOAR) (OBJ 3.6).vtt
18 kB
21. Integrated Security and Automation/6. Cloud Automation (OBJ 3.6).mp4
30 MB
21. Integrated Security and Automation/6. Cloud Automation (OBJ 3.6).vtt
15 kB
21. Integrated Security and Automation/7. Cloud APIsSoftware Development Kits (SDKs) (OBJ 3.6).mp4
21 MB
21. Integrated Security and Automation/7. Cloud APIsSoftware Development Kits (SDKs) (OBJ 3.6).vtt
10 kB
21. Integrated Security and Automation/8. Vulnerability Management (OBJ 3.6).mp4
25 MB
21. Integrated Security and Automation/8. Vulnerability Management (OBJ 3.6).vtt
12 kB
21. Integrated Security and Automation/9. Security Content Automation Protocol (SCAP) (OBJ 3.6).mp4
22 MB
21. Integrated Security and Automation/9. Security Content Automation Protocol (SCAP) (OBJ 3.6).vtt
11 kB
21. Integrated Security and Automation/10.21 Checkpoint Integrated Security and Automation.html
24 kB
22. Artificial Intelligence/1. Artificial Intelligence (AI) (OBJ 1.5, OBJ 3.6).mp4
42 MB
22. Artificial Intelligence/1. Artificial Intelligence (AI) (OBJ 1.5, OBJ 3.6).vtt
24 kB
22. Artificial Intelligence/2. Generative AI (OBJ 3.6).mp4
27 MB
22. Artificial Intelligence/2. Generative AI (OBJ 3.6).vtt
14 kB
22. Artificial Intelligence/3. Ethical and Governance Considerations (OBJ 1.5).mp4
25 MB
22. Artificial Intelligence/3. Ethical and Governance Considerations (OBJ 1.5).vtt
12 kB
22. Artificial Intelligence/4. Legal and Privacy Risks (OBJ 1.5).mp4
24 MB
22. Artificial Intelligence/4. Legal and Privacy Risks (OBJ 1.5).vtt
12 kB
22. Artificial Intelligence/5. Threats to the Model (OBJ 1.5).mp4
24 MB
22. Artificial Intelligence/5. Threats to the Model (OBJ 1.5).vtt
12 kB
22. Artificial Intelligence/6. AI-enabled Attacks (OBJ 1.5).mp4
29 MB
22. Artificial Intelligence/6. AI-enabled Attacks (OBJ 1.5).vtt
15 kB
22. Artificial Intelligence/7. AI Manipulation Attacks (OBJ 1.5).mp4
26 MB
22. Artificial Intelligence/7. AI Manipulation Attacks (OBJ 1.5).vtt
12 kB
22. Artificial Intelligence/8. AI Usage Risks (OBJ 1.5).mp4
30 MB
22. Artificial Intelligence/8. AI Usage Risks (OBJ 1.5).vtt
16 kB
22. Artificial Intelligence/9. AI Bots (OBJ 1.5).mp4
26 MB
22. Artificial Intelligence/9. AI Bots (OBJ 1.5).vtt
14 kB
22. Artificial Intelligence/10.22 Checkpoint Artificial Intelligence.html
23 kB
23. Vulnerabilities and Attacks/1. Vulnerabilities and Attacks (OBJ 3.4, OBJ 4.2).mp4
43 MB
23. Vulnerabilities and Attacks/1. Vulnerabilities and Attacks (OBJ 3.4, OBJ 4.2).vtt
25 kB
01. Introduction/1. Introduction.mp4
32 MB
23. Vulnerabilities and Attacks/2. Injection Vulnerabilities (OBJ 4.2).vtt
35 kB
23. Vulnerabilities and Attacks/3. Memory-related Vulnerabilities (OBJ 4.2).mp4
41 MB
23. Vulnerabilities and Attacks/3. Memory-related Vulnerabilities (OBJ 4.2).vtt
22 kB
23. Vulnerabilities and Attacks/4. Configuration Vulnerabilities (OBJ 4.2).mp4
41 MB
23. Vulnerabilities and Attacks/4. Configuration Vulnerabilities (OBJ 4.2).vtt
22 kB
23. Vulnerabilities and Attacks/5. Authorization Vulnerabilities (OBJ 4.2).mp4
26 MB
23. Vulnerabilities and Attacks/5. Authorization Vulnerabilities (OBJ 4.2).vtt
14 kB
23. Vulnerabilities and Attacks/6. Malicious Code Attacks (OBJ 4.2).mp4
18 MB
23. Vulnerabilities and Attacks/6. Malicious Code Attacks (OBJ 4.2).vtt
9.8 kB
23. Vulnerabilities and Attacks/7. Hardware and Firmware Attacks (OBJ 3.4).mp4
25 MB
23. Vulnerabilities and Attacks/7. Hardware and Firmware Attacks (OBJ 3.4).vtt
13 kB
23. Vulnerabilities and Attacks/8. Memory-based Attacks (OBJ 3.4).mp4
23 MB
23. Vulnerabilities and Attacks/8. Memory-based Attacks (OBJ 3.4).vtt
12 kB
23. Vulnerabilities and Attacks/9. Electro-magnetic Attacks (OBJ 3.4).mp4
18 MB
23. Vulnerabilities and Attacks/9. Electro-magnetic Attacks (OBJ 3.4).vtt
9.5 kB
23. Vulnerabilities and Attacks/10.23 Checkpoint Vulnerabilities and Attacks.html
23 kB
24. Detection and Mitigation/1. Detection and Mitigation (OBJ 3.4, OBJ 4.2).mp4
31 MB
24. Detection and Mitigation/1. Detection and Mitigation (OBJ 3.4, OBJ 4.2).vtt
19 kB
24. Detection and Mitigation/2. Tamper Detection and Countermeasures (OBJ 3.4).mp4
21 MB
24. Detection and Mitigation/2. Tamper Detection and Countermeasures (OBJ 3.4).vtt
11 kB
24. Detection and Mitigation/3. Design Mitigations (OBJ 4.2).mp4
29 MB
24. Detection and Mitigation/3. Design Mitigations (OBJ 4.2).vtt
14 kB
24. Detection and Mitigation/4. Validation Mitigations (OBJ 4.2).mp4
22 MB
24. Detection and Mitigation/4. Validation Mitigations (OBJ 4.2).vtt
12 kB
24. Detection and Mitigation/5. Safe Functions (OBJ 4.2).mp4
27 MB
24. Detection and Mitigation/5. Safe Functions (OBJ 4.2).vtt
14 kB
24. Detection and Mitigation/6. Access Control Mitigations (OBJ 4.2).mp4
29 MB
24. Detection and Mitigation/6. Access Control Mitigations (OBJ 4.2).vtt
15 kB
24. Detection and Mitigation/7. Confidentiality Management (OBJ 4.2).mp4
30 MB
24. Detection and Mitigation/7. Confidentiality Management (OBJ 4.2).vtt
16 kB
24. Detection and Mitigation/8. Update Management (OBJ 4.2).mp4
31 MB
24. Detection and Mitigation/8. Update Management (OBJ 4.2).vtt
17 kB
24. Detection and Mitigation/9. Fail-Safe Mechanisms (OBJ 4.2).mp4
18 MB
24. Detection and Mitigation/9. Fail-Safe Mechanisms (OBJ 4.2).vtt
9.2 kB
24. Detection and Mitigation/10.24 Checkpoint Detection and Mitigation.html
23 kB
25. Threat Modeling Considerations/1. Threat Modeling Considerations (OBJ 1.4 ).mp4
28 MB
25. Threat Modeling Considerations/1. Threat Modeling Considerations (OBJ 1.4 ).vtt
18 kB
25. Threat Modeling Considerations/2. Threat Actor Motivation (OBJ 1.4 ).mp4
35 MB
25. Threat Modeling Considerations/2. Threat Actor Motivation (OBJ 1.4 ).vtt
18 kB
25. Threat Modeling Considerations/3. Threat Actor Resources (OBJ 1.4 ).mp4
18 MB
25. Threat Modeling Considerations/3. Threat Actor Resources (OBJ 1.4 ).vtt
9.5 kB
25. Threat Modeling Considerations/4. Threat Actor Capabilities (OBJ 1.4 ).mp4
28 MB
25. Threat Modeling Considerations/4. Threat Actor Capabilities (OBJ 1.4 ).vtt
15 kB
25. Threat Modeling Considerations/5. Attack Patterns (OBJ 1.4 ).mp4
27 MB
25. Threat Modeling Considerations/5. Attack Patterns (OBJ 1.4 ).vtt
14 kB
25. Threat Modeling Considerations/6. Threat Actor Methods (OBJ 1.4 ).mp4
21 MB
25. Threat Modeling Considerations/6. Threat Actor Methods (OBJ 1.4 ).vtt
12 kB
25. Threat Modeling Considerations/7. Initial Access and Escalation Methods (OBJ 3.2).mp4
38 MB
25. Threat Modeling Considerations/7. Initial Access and Escalation Methods (OBJ 3.2).vtt
18 kB
25. Threat Modeling Considerations/8. Post-exploitation and Evasion Methods (OBJ 3.2).mp4
26 MB
25. Threat Modeling Considerations/8. Post-exploitation and Evasion Methods (OBJ 3.2).vtt
16 kB
25. Threat Modeling Considerations/9.25 Checkpoint Threat Modeling Considerations.html
23 kB
26. Threat Modeling Frameworks/1. Threat Modeling Frameworks.mp4
31 MB
26. Threat Modeling Frameworks/1. Threat Modeling Frameworks.vtt
19 kB
26. Threat Modeling Frameworks/2. Cyber Kill Chain (OBJ 1.4 ).mp4
23 MB
26. Threat Modeling Frameworks/2. Cyber Kill Chain (OBJ 1.4 ).vtt
13 kB
26. Threat Modeling Frameworks/3. CAPEC (OBJ 1.4 ).mp4
18 MB
26. Threat Modeling Frameworks/3. CAPEC (OBJ 1.4 ).vtt
9.6 kB
26. Threat Modeling Frameworks/4. MITRE ATT&CK (OBJ 1.4 ).mp4
28 MB
26. Threat Modeling Frameworks/4. MITRE ATT&CK (OBJ 1.4 ).vtt
14 kB
26. Threat Modeling Frameworks/5. Diamond Model of Intrusion Analysis (OBJ 1.4 ).mp4
18 MB
26. Threat Modeling Frameworks/5. Diamond Model of Intrusion Analysis (OBJ 1.4 ).vtt
11 kB
26. Threat Modeling Frameworks/6. STRIDE.mp4
16 MB
26. Threat Modeling Frameworks/6. STRIDE.vtt
9.2 kB
26. Threat Modeling Frameworks/7. OWASP (OBJ 1.4 ).mp4
17 MB
26. Threat Modeling Frameworks/7. OWASP (OBJ 1.4 ).vtt
9.3 kB
26. Threat Modeling Frameworks/8.26 Checkpoint Threat Modeling Frameworks.html
23 kB
27. Attack Surface Determination/1. Attack Surface Determination (OBJ 1.4).mp4
32 MB
27. Attack Surface Determination/1. Attack Surface Determination (OBJ 1.4).vtt
20 kB
27. Attack Surface Determination/2. Technical Attack Surface (OBJ 1.4 ).mp4
34 MB
27. Attack Surface Determination/2. Technical Attack Surface (OBJ 1.4 ).vtt
18 kB
27. Attack Surface Determination/3. Operational Attack Surface (OBJ 1.4 ).mp4
25 MB
27. Attack Surface Determination/3. Operational Attack Surface (OBJ 1.4 ).vtt
14 kB
27. Attack Surface Determination/4. Organizational Attack Surface (OBJ 1.4 ).mp4
19 MB
27. Attack Surface Determination/4. Organizational Attack Surface (OBJ 1.4 ).vtt
10 kB
27. Attack Surface Determination/5. Cloud Attack Surface (OBJ 1.4 ).mp4
28 MB
27. Attack Surface Determination/5. Cloud Attack Surface (OBJ 1.4 ).vtt
15 kB
27. Attack Surface Determination/6. Organizational Change Attack Surface (OBJ 1.4 ).mp4
25 MB
27. Attack Surface Determination/6. Organizational Change Attack Surface (OBJ 1.4 ).vtt
14 kB
27. Attack Surface Determination/7. Modeling with an Existing System (OBJ 1.4 ).mp4
20 MB
27. Attack Surface Determination/7. Modeling with an Existing System (OBJ 1.4 ).vtt
10 kB
27. Attack Surface Determination/8. Modeling without an Existing System (OBJ 1.4 ).mp4
23 MB
27. Attack Surface Determination/8. Modeling without an Existing System (OBJ 1.4 ).vtt
11 kB
27. Attack Surface Determination/9.27 Checkpoint Attack Surface Determination.html
23 kB
28. Monitoring and Response/1. Monitoring and Response (OBJ 4.1).mp4
41 MB
28. Monitoring and Response/1. Monitoring and Response (OBJ 4.1).vtt
25 kB
28. Monitoring and Response/2. Aggregate Data Analysis (OBJ 4.1).mp4
26 MB
28. Monitoring and Response/2. Aggregate Data Analysis (OBJ 4.1).vtt
13 kB
28. Monitoring and Response/3. Threat Intelligence Sources (OBJ 4.1).mp4
40 MB
28. Monitoring and Response/3. Threat Intelligence Sources (OBJ 4.1).vtt
21 kB
28. Monitoring and Response/4. System Log Sources (OBJ 4.1).mp4
37 MB
28. Monitoring and Response/4. System Log Sources (OBJ 4.1).vtt
18 kB
28. Monitoring and Response/5. Vulnerabilities and Data Security (OBJ 4.1).mp4
28 MB
28. Monitoring and Response/5. Vulnerabilities and Data Security (OBJ 4.1).vtt
14 kB
28. Monitoring and Response/6. Behavior Baselines and Analytics (OBJ 4.1).mp4
26 MB
28. Monitoring and Response/6. Behavior Baselines and Analytics (OBJ 4.1).vtt
12 kB
28. Monitoring and Response/7. SIEM Event Management (OBJ 4.1).mp4
26 MB
28. Monitoring and Response/7. SIEM Event Management (OBJ 4.1).vtt
13 kB
28. Monitoring and Response/8. SIEM Data Management (OBJ 4.1).mp4
21 MB
28. Monitoring and Response/8. SIEM Data Management (OBJ 4.1).vtt
10 kB
28. Monitoring and Response/9. Alerting (OBJ 4.1).mp4
36 MB
28. Monitoring and Response/9. Alerting (OBJ 4.1).vtt
18 kB
28. Monitoring and Response/10. Alert Prioritization Factors (OBJ 4.1).mp4
28 MB
28. Monitoring and Response/10. Alert Prioritization Factors (OBJ 4.1).vtt
14 kB
28. Monitoring and Response/11. Reporting and Metrics (OBJ 4.1).mp4
19 MB
28. Monitoring and Response/11. Reporting and Metrics (OBJ 4.1).vtt
9.8 kB
28. Monitoring and Response/12.28 Checkpoint Monitoring and Response.html
22 kB
29. Threat-hunting/1. Threat-hunting (OBJ 2.3, OBJ 4.3).mp4
35 MB
29. Threat-hunting/1. Threat-hunting (OBJ 2.3, OBJ 4.3).vtt
22 kB
29. Threat-hunting/2. Indicators of Attack (OBJ 4.3).mp4
29 MB
29. Threat-hunting/2. Indicators of Attack (OBJ 4.3).vtt
14 kB
29. Threat-hunting/3. Behavior and Data Analysis (OBJ 4.3).mp4
27 MB
29. Threat-hunting/3. Behavior and Data Analysis (OBJ 4.3).vtt
14 kB
29. Threat-hunting/4. Internal Intelligence Sources (OBJ 4.3).mp4
25 MB
29. Threat-hunting/4. Internal Intelligence Sources (OBJ 4.3).vtt
14 kB
29. Threat-hunting/5. Detection and Threat-hunting Enablers (OBJ 2.3).mp4
25 MB
29. Threat-hunting/5. Detection and Threat-hunting Enablers (OBJ 2.3).vtt
14 kB
29. Threat-hunting/6. External Intelligence Sources (OBJ 4.3).mp4
31 MB
29. Threat-hunting/6. External Intelligence Sources (OBJ 4.3).vtt
16 kB
29. Threat-hunting/7. Threat Intelligence Platforms (TIPs) (OBJ 4.3).mp4
21 MB
29. Threat-hunting/7. Threat Intelligence Platforms (TIPs) (OBJ 4.3).vtt
11 kB
29. Threat-hunting/8. IoC Sharing (OBJ 4.3).mp4
35 MB
29. Threat-hunting/8. IoC Sharing (OBJ 4.3).vtt
17 kB
29. Threat-hunting/9. Rule-Based Languages (OBJ 4.3).mp4
27 MB
29. Threat-hunting/9. Rule-Based Languages (OBJ 4.3).vtt
14 kB
29. Threat-hunting/10. Counterintelligence and Operational Security (OBJ 4.3).mp4
23 MB
29. Threat-hunting/10. Counterintelligence and Operational Security (OBJ 4.3).vtt
12 kB
29. Threat-hunting/11.29 Checkpoint Threat-hunting.html
22 kB
30. Indication Analysis/1. Indication Analysis (OBJ 4.4).mp4
30 MB
30. Indication Analysis/1. Indication Analysis (OBJ 4.4).vtt
18 kB
30. Indication Analysis/2. Infrastructure Analysis (OBJ 4.4).mp4
26 MB
30. Indication Analysis/2. Infrastructure Analysis (OBJ 4.4).vtt
14 kB
30. Indication Analysis/3. Metadata Analysis (OBJ 4.4).mp4
32 MB
30. Indication Analysis/3. Metadata Analysis (OBJ 4.4).vtt
16 kB
30. Indication Analysis/4. Volatile and Non-volatile Storage Analysis (OBJ 4.4).mp4
35 MB
30. Indication Analysis/4. Volatile and Non-volatile Storage Analysis (OBJ 4.4).vtt
17 kB
30. Indication Analysis/5. Reverse Engineering (OBJ 4.4).mp4
32 MB
30. Indication Analysis/5. Reverse Engineering (OBJ 4.4).vtt
16 kB
30. Indication Analysis/6. Malware Analysis (OBJ 4.4).mp4
22 MB
30. Indication Analysis/6. Malware Analysis (OBJ 4.4).vtt
11 kB
30. Indication Analysis/7. Code Stylometry (OBJ 4.4).mp4
24 MB
30. Indication Analysis/7. Code Stylometry (OBJ 4.4).vtt
12 kB
30. Indication Analysis/8. Cloud Workload Protection Platform (OBJ 4.4).mp4
21 MB
30. Indication Analysis/8. Cloud Workload Protection Platform (OBJ 4.4).vtt
11 kB
30. Indication Analysis/9.30 Checkpoint Indication Analysis.html
22 kB
31. Incident Response/1. Incident Response (OBJ 1.2, OBJ 4.4).mp4
22 MB
31. Incident Response/1. Incident Response (OBJ 1.2, OBJ 4.4).vtt
14 kB
31. Incident Response/2. Preparedness Exercises (OBJ 4.4).mp4
23 MB
31. Incident Response/2. Preparedness Exercises (OBJ 4.4).vtt
13 kB
31. Incident Response/3. Immediate Response (OBJ 1.2, OBJ 4.4).mp4
26 MB
31. Incident Response/3. Immediate Response (OBJ 1.2, OBJ 4.4).vtt
14 kB
31. Incident Response/4. Event Response (OBJ 1.2, OBJ 4.4).mp4
26 MB
31. Incident Response/4. Event Response (OBJ 1.2, OBJ 4.4).vtt
14 kB
31. Incident Response/5. Attribution (OBJ 4.4).mp4
20 MB
31. Incident Response/5. Attribution (OBJ 4.4).vtt
11 kB
31. Incident Response/6. Root Cause Analysis (OBJ 4.4).mp4
15 MB
31. Incident Response/6. Root Cause Analysis (OBJ 4.4).vtt
7.5 kB
31. Incident Response/7.31 Checkpoint Incident Response.html
22 kB
32. Conclusion/1. Conclusion.mp4
35 MB
32. Conclusion/1. Conclusion.vtt
24 kB
32. Conclusion/2.32 Checkpoint Conclusion.html
19 kB
32. Conclusion/3.1 Full-length Practice Exam.html
177 kB