TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - Cybersecurity 360 - A Defense in Depth Approach

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introdution to Cybersecurity/1. Test 1.html
5.0 kB
~Get Your Files Here !/1 - Introdution to Cybersecurity/1. What is Cybersecurity.mp4
31 MB
~Get Your Files Here !/1 - Introdution to Cybersecurity/2. Real time Cyberattack map.mp4
66 MB
~Get Your Files Here !/1 - Introdution to Cybersecurity/3. Current scenario in Information Technology.mp4
29 MB
~Get Your Files Here !/1 - Introdution to Cybersecurity/4. Main challenges for maintaining Cybersecurity.mp4
23 MB
~Get Your Files Here !/1 - Introdution to Cybersecurity/5. The mindset of a good Cybersecurity professional.mp4
36 MB
~Get Your Files Here !/1 - Introdution to Cybersecurity/6. Top tip.mp4
3.7 MB
~Get Your Files Here !/1 - Introdution to Cybersecurity/6. Top tip_Resource_Cybersecurity Glossary pdf.pdf
104 kB
~Get Your Files Here !/1 - Introdution to Cybersecurity/7. Summary and Achievement Unlocked.mp4
42 MB
~Get Your Files Here !/10 - Application Layer Protections/68. Application layer protections.en_US.srt
1.6 kB
~Get Your Files Here !/10 - Application Layer Protections/68. Application layer protections.mp4
14 MB
~Get Your Files Here !/10 - Application Layer Protections/69. Layered application development.mp4
42 MB
~Get Your Files Here !/10 - Application Layer Protections/70. WAF Web Application Firewall.mp4
33 MB
~Get Your Files Here !/10 - Application Layer Protections/71. Code review.mp4
33 MB
~Get Your Files Here !/10 - Application Layer Protections/72. DevSecOps.mp4
20 MB
~Get Your Files Here !/10 - Application Layer Protections/73. MFA Multi Factor Authentication.mp4
25 MB
~Get Your Files Here !/10 - Application Layer Protections/74. Summary and Achievement Unlocked.mp4
32 MB
~Get Your Files Here !/10 - Application Layer Protections/9. Test 9.html
6.1 kB
~Get Your Files Here !/11 - Data Layer Protections/10. Test 10.html
6.0 kB
~Get Your Files Here !/11 - Data Layer Protections/75. Data layer protections.mp4
12 MB
~Get Your Files Here !/11 - Data Layer Protections/76. Data classification.mp4
19 MB
~Get Your Files Here !/11 - Data Layer Protections/77. Data protection Backup and restore.mp4
22 MB
~Get Your Files Here !/11 - Data Layer Protections/78. Top tip.mp4
4.4 MB
~Get Your Files Here !/11 - Data Layer Protections/79. Data wiping.mp4
22 MB
~Get Your Files Here !/11 - Data Layer Protections/80. DLP Data Leak Prevention.mp4
30 MB
~Get Your Files Here !/11 - Data Layer Protections/81. PAM Privileged Access Management.mp4
24 MB
~Get Your Files Here !/11 - Data Layer Protections/82. PKI Public Key Infrastructure.mp4
17 MB
~Get Your Files Here !/11 - Data Layer Protections/83. Top tip.mp4
3.9 MB
~Get Your Files Here !/11 - Data Layer Protections/84. Summary and Achievement Unlocked.mp4
34 MB
~Get Your Files Here !/12 - Public Cloud Layer Protections/11. Test 11.html
6.1 kB
~Get Your Files Here !/12 - Public Cloud Layer Protections/85. Public cloud layer protections.mp4
11 MB
~Get Your Files Here !/12 - Public Cloud Layer Protections/86. CASB.mp4
25 MB
~Get Your Files Here !/12 - Public Cloud Layer Protections/87. IAM Identity Access Management.mp4
24 MB
~Get Your Files Here !/12 - Public Cloud Layer Protections/88. KMS and Vaults.mp4
32 MB
~Get Your Files Here !/12 - Public Cloud Layer Protections/89. Summary and Achievement Unlocked.mp4
32 MB
~Get Your Files Here !/13 - Prevention policies and compliance/100. Summary and Achievement Unlocked.mp4
38 MB
~Get Your Files Here !/13 - Prevention policies and compliance/12. Test 12.html
11 kB
~Get Your Files Here !/13 - Prevention policies and compliance/90. Prevention policies and compliance.mp4
13 MB
~Get Your Files Here !/13 - Prevention policies and compliance/91. Risk management.mp4
26 MB
~Get Your Files Here !/13 - Prevention policies and compliance/92. Top tip.mp4
5.4 MB
~Get Your Files Here !/13 - Prevention policies and compliance/93. Security and compliance policies.mp4
29 MB
~Get Your Files Here !/13 - Prevention policies and compliance/94. Information Security Governance.mp4
44 MB
~Get Your Files Here !/13 - Prevention policies and compliance/95. Training and Awareness.mp4
44 MB
~Get Your Files Here !/13 - Prevention policies and compliance/96. Information security architecture.mp4
20 MB
~Get Your Files Here !/13 - Prevention policies and compliance/97. Vulnerability management.mp4
30 MB
~Get Your Files Here !/13 - Prevention policies and compliance/98. Penetration test.mp4
17 MB
~Get Your Files Here !/13 - Prevention policies and compliance/99. Cyber Threat Intelligence.mp4
25 MB
~Get Your Files Here !/14 - Operations and Incident Response/101. Operations monitoring and incident response.mp4
14 MB
~Get Your Files Here !/14 - Operations and Incident Response/102. SIEM.mp4
22 MB
~Get Your Files Here !/14 - Operations and Incident Response/103. SOC Security Operation Center.mp4
41 MB
~Get Your Files Here !/14 - Operations and Incident Response/104. CIRT.mp4
35 MB
~Get Your Files Here !/14 - Operations and Incident Response/105. BAS.mp4
21 MB
~Get Your Files Here !/14 - Operations and Incident Response/106. Summary and Achievement Unlocked.mp4
34 MB
~Get Your Files Here !/14 - Operations and Incident Response/13. Test 13.html
6.0 kB
~Get Your Files Here !/15 - Cybersecurity carrer and leadership/107. Certifications in Cybersecurity.mp4
38 MB
~Get Your Files Here !/15 - Cybersecurity carrer and leadership/108. How to Stay Informed on Cybersecurity Threats.mp4
27 MB
~Get Your Files Here !/15 - Cybersecurity carrer and leadership/109. Cybersecurity Color Team Operating Model.mp4
29 MB
~Get Your Files Here !/15 - Cybersecurity carrer and leadership/110. Engaging and Raising Awareness with the C level for Cybersecurity.mp4
39 MB
~Get Your Files Here !/15 - Cybersecurity carrer and leadership/111. The role of the CISO or Manager in Cybersecurity.mp4
68 MB
~Get Your Files Here !/15 - Cybersecurity carrer and leadership/112. Summary and Achievement Unlocked.mp4
34 MB
~Get Your Files Here !/16 - Additional Lessons/113. Emerging technologies and their threats.mp4
26 MB
~Get Your Files Here !/16 - Additional Lessons/114. Shadow IT and its risks.mp4
31 MB
~Get Your Files Here !/16 - Additional Lessons/115. How to evaluate a cybersecurity solution.mp4
33 MB
~Get Your Files Here !/16 - Additional Lessons/116. Information Security Certifications for companies.mp4
24 MB
~Get Your Files Here !/16 - Additional Lessons/117. Cyber Insurance.mp4
37 MB
~Get Your Files Here !/16 - Additional Lessons/118. Public cloud security assessment.mp4
31 MB
~Get Your Files Here !/16 - Additional Lessons/119. Tokenization.mp4
14 MB
~Get Your Files Here !/16 - Additional Lessons/120. Configuring Apache Tomcat Our Target.mp4
75 MB
~Get Your Files Here !/16 - Additional Lessons/121. VirtualBox and Kali Linux Configuration.mp4
58 MB
~Get Your Files Here !/16 - Additional Lessons/122. Attacking Apache Tomcat.mp4
124 MB
~Get Your Files Here !/16 - Additional Lessons/123. Course E book.mp4
13 MB
~Get Your Files Here !/16 - Additional Lessons/123. Course E book_Resource_Ebook Cybersecurity 360 pdf.pdf
290 kB
~Get Your Files Here !/16 - Additional Lessons/124. Summary and Achievement Unlocked.mp4
63 MB
~Get Your Files Here !/2 - Cybersecurity Principles/10. Encryption.mp4
60 MB
~Get Your Files Here !/2 - Cybersecurity Principles/11. Hashing.mp4
19 MB
~Get Your Files Here !/2 - Cybersecurity Principles/12. Salt.mp4
16 MB
~Get Your Files Here !/2 - Cybersecurity Principles/13. Top tip.mp4
4.6 MB
~Get Your Files Here !/2 - Cybersecurity Principles/14. Summary and Achievement Unlocked.mp4
43 MB
~Get Your Files Here !/2 - Cybersecurity Principles/2. Test 2.html
6.2 kB
~Get Your Files Here !/2 - Cybersecurity Principles/8. CIA Triad.mp4
27 MB
~Get Your Files Here !/2 - Cybersecurity Principles/9. Threads and Vulnerabilities.mp4
16 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/15. Main objectives of cyberattacks.mp4
18 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/16. Security best practice frameworks.mp4
24 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/17. Security Maturity Assessment.mp4
28 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/18. Company Security Posture.mp4
32 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/19. Summary and Achievement Unlocked.mp4
40 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/3. Test 3.html
6.1 kB
~Get Your Files Here !/4 - The world of cyberattacks/20. Evolution of cyberattacks.mp4
27 MB
~Get Your Files Here !/4 - The world of cyberattacks/21. Famous Cyberattacks.mp4
20 MB
~Get Your Files Here !/4 - The world of cyberattacks/22. Who is behind cyberattacks.mp4
20 MB
~Get Your Files Here !/4 - The world of cyberattacks/23. Attacker Profile.mp4
36 MB
~Get Your Files Here !/4 - The world of cyberattacks/24. How leaked data is traded.mp4
18 MB
~Get Your Files Here !/4 - The world of cyberattacks/25. Dark Web.mp4
47 MB
~Get Your Files Here !/4 - The world of cyberattacks/26. Means used in cyberattacks.mp4
55 MB
~Get Your Files Here !/4 - The world of cyberattacks/27. Mitre Att&ck Tactics and Techniques used in cyberattacks.mp4
36 MB
~Get Your Files Here !/4 - The world of cyberattacks/28. Signs that could indicate a cyberattack.mp4
24 MB
~Get Your Files Here !/4 - The world of cyberattacks/29. Summary and Achievement Unlocked.mp4
44 MB
~Get Your Files Here !/4 - The world of cyberattacks/4. Test 4.html
4.9 kB
~Get Your Files Here !/5 - Main cyberattacks and threats/30. Malwares.mp4
24 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/31. Phishing.mp4
19 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/32. Top tip.mp4
5.6 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/33. Ransomware.mp4
29 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/34. Brute force.mp4
23 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/35. SQL injection.mp4
22 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/36. Cross site scripting XSS.mp4
30 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/37. Crypto mining.mp4
28 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/38. DDoS.mp4
23 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/39. Man in the middle.mp4
29 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/40. Internal threats.mp4
26 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/41. Impacts of a cyberattack.mp4
16 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/42. Summary and Achievement Unlocked.mp4
41 MB
~Get Your Files Here !/5 - Main cyberattacks and threats/5. Test 5.html
6.1 kB
~Get Your Files Here !/6 - Course Framework/43. Course Framework.mp4
70 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/44. Perimeter layer protections.mp4
12 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/45. DMZ Demilitarized Zone.mp4
19 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/46. Firewall.mp4
17 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/47. DNS filtering.mp4
26 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/48. Top tip.mp4
4.5 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/49. Antiphishing.mp4
44 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/50. Remote access security.mp4
34 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/51. Honeypot.mp4
15 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/52. SBC.mp4
19 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/53. Physical security.mp4
20 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/54. Summary and Achievement Unlocked.mp4
38 MB
~Get Your Files Here !/7 - Perimeter Layer Protections/6. Test 6.html
7.1 kB
~Get Your Files Here !/8 - Network Layer Protections/55. Network layer protections.mp4
10 MB
~Get Your Files Here !/8 - Network Layer Protections/56. NAC Network Access Control.mp4
38 MB
~Get Your Files Here !/8 - Network Layer Protections/57. IDS IPS.mp4
35 MB
~Get Your Files Here !/8 - Network Layer Protections/58. Wireless security.mp4
33 MB
~Get Your Files Here !/8 - Network Layer Protections/59. Content filtering proxy.mp4
39 MB
~Get Your Files Here !/8 - Network Layer Protections/60. Summary and Achievement Unlocked.mp4
34 MB
~Get Your Files Here !/8 - Network Layer Protections/7. Test 7.html
5.9 kB
~Get Your Files Here !/9 - Endpoint Layer Protections/61. Endpoint layer protections.mp4
13 MB
~Get Your Files Here !/9 - Endpoint Layer Protections/62. EPP EndPoint Protection.mp4
26 MB
~Get Your Files Here !/9 - Endpoint Layer Protections/63. MDM Mobile Security.mp4
19 MB
~Get Your Files Here !/9 - Endpoint Layer Protections/64. Patch management.mp4
23 MB
~Get Your Files Here !/9 - Endpoint Layer Protections/65. Sandbox Malware analysis.mp4
36 MB
~Get Your Files Here !/9 - Endpoint Layer Protections/66. Security enforcement.mp4
26 MB
~Get Your Files Here !/9 - Endpoint Layer Protections/67. Summary and Achievement Unlocked.mp4
37 MB
~Get Your Files Here !/9 - Endpoint Layer Protections/8. Test 8.html
6.0 kB
~Get Your Files Here !/Bonus Resources.txt
70 B