TorBT - Torrents and Magnet Links Search Engine
[ DevCourseWeb.com ] Udemy - Cyber Security - SOC and Incident Response Analyst Interview
- Date: 2026-05-05
- Size: 1.0 GB
- Files: 118
File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. SECTION 1. COURSE CONTENT.html
967 B
~Get Your Files Here !/1.1 CYBER SECURITY - SOC INTERVIEW PREP - UDEMY.pdf
904 kB
~Get Your Files Here !/10. SECTION 7-A WHY ARE YOU LOOKING FOR A NEW JOB.mp4
20 MB
~Get Your Files Here !/10. SECTION 7-A WHY ARE YOU LOOKING FOR A NEW JOB.srt
7.2 kB
~Get Your Files Here !/11. SECTION 7-B WHY ARE YOU LOOKING FOR A NEW JOB.mp4
16 MB
~Get Your Files Here !/11. SECTION 7-B WHY ARE YOU LOOKING FOR A NEW JOB.srt
5.1 kB
~Get Your Files Here !/12. SECTION 8-A WHAT PROJECTS ARE YOU WORKING..mp4
27 MB
~Get Your Files Here !/12. SECTION 8-A WHAT PROJECTS ARE YOU WORKING..srt
7.4 kB
~Get Your Files Here !/13. SECTION 8-B WHAT PROJECTS ARE YOU WORKING.mp4
46 MB
~Get Your Files Here !/13. SECTION 8-B WHAT PROJECTS ARE YOU WORKING.srt
10 kB
~Get Your Files Here !/14. SECTION 9-A THREAT, ATTACKS AND VULNERABILITY..mp4
20 MB
~Get Your Files Here !/14. SECTION 9-A THREAT, ATTACKS AND VULNERABILITY..srt
6.6 kB
~Get Your Files Here !/15. SECTION 9-B THREAT, ATTACKS AND VULNERABILITY..mp4
14 MB
~Get Your Files Here !/15. SECTION 9-B THREAT, ATTACKS AND VULNERABILITY..srt
5.0 kB
~Get Your Files Here !/16. SECTION 10 -A NETWORK TRAFFIC MONITORING..mp4
20 MB
~Get Your Files Here !/16. SECTION 10 -A NETWORK TRAFFIC MONITORING..srt
4.8 kB
~Get Your Files Here !/17. SECTION 10 - B NETWORK TRAFFIC MONITORING..mp4
31 MB
~Get Your Files Here !/17. SECTION 10 - B NETWORK TRAFFIC MONITORING..srt
8.4 kB
~Get Your Files Here !/18. SECTION 11 - A VULNERABILITY MANAGEMENT..mp4
23 MB
~Get Your Files Here !/18. SECTION 11 - A VULNERABILITY MANAGEMENT..srt
7.2 kB
~Get Your Files Here !/19. SECTION 11 - B VULNERABILITY MANAGEMENT..mp4
32 MB
~Get Your Files Here !/19. SECTION 11 - B VULNERABILITY MANAGEMENT..srt
8.4 kB
~Get Your Files Here !/2. INTRODUCTION.mp4
5.1 MB
~Get Your Files Here !/2. INTRODUCTION.srt
1.6 kB
~Get Your Files Here !/20. SECTION 12 -A LOG FILES THREAT MONITORING..mp4
19 MB
~Get Your Files Here !/20. SECTION 12 -A LOG FILES THREAT MONITORING..srt
5.5 kB
~Get Your Files Here !/21. SECTION 13 - A HASHING AND ENCRYPTION..mp4
32 MB
~Get Your Files Here !/21. SECTION 13 - A HASHING AND ENCRYPTION..srt
8.9 kB
~Get Your Files Here !/22. SECTION 13 - B HASHING AND ENCRYPTION..mp4
30 MB
~Get Your Files Here !/22. SECTION 13 - B HASHING AND ENCRYPTION..srt
7.3 kB
~Get Your Files Here !/23. SECTION 14 A SALTING, HASHING AND ENCODING..mp4
12 MB
~Get Your Files Here !/23. SECTION 14 A SALTING, HASHING AND ENCODING..srt
2.8 kB
~Get Your Files Here !/24. SECTION 14 B SALTING, HASHING AND ENCODING..mp4
24 MB
~Get Your Files Here !/24. SECTION 14 B SALTING, HASHING AND ENCODING..srt
5.0 kB
~Get Your Files Here !/25. SECTION 15 A FIREWALLS AND NETWORK MONITORING..mp4
18 MB
~Get Your Files Here !/25. SECTION 15 A FIREWALLS AND NETWORK MONITORING..srt
6.0 kB
~Get Your Files Here !/26. SECTION 15 B FIREWALLS AND NETWORK MONITORING..mp4
26 MB
~Get Your Files Here !/26. SECTION 15 B FIREWALLS AND NETWORK MONITORING..srt
7.6 kB
~Get Your Files Here !/27. SECTION 16 A KILL CHAIN METHODOLOGY..mp4
16 MB
~Get Your Files Here !/27. SECTION 16 A KILL CHAIN METHODOLOGY..srt
5.3 kB
~Get Your Files Here !/28. SECTION 16 B KILL CHAIN METHODOLOGY..mp4
45 MB
~Get Your Files Here !/28. SECTION 16 B KILL CHAIN METHODOLOGY..srt
9.2 kB
~Get Your Files Here !/29. SECTION 17 A THREE WAY HANDSHAKE..mp4
10 MB
~Get Your Files Here !/29. SECTION 17 A THREE WAY HANDSHAKE..srt
3.5 kB
~Get Your Files Here !/3. SECTION 3 A ABOUT THE COURSE..mp4
3.0 MB
~Get Your Files Here !/3. SECTION 3 A ABOUT THE COURSE..srt
1.6 kB
~Get Your Files Here !/30. SECTION 17 B THREE WAY HANDSHAKE..mp4
14 MB
~Get Your Files Here !/30. SECTION 17 B THREE WAY HANDSHAKE..srt
5.7 kB
~Get Your Files Here !/31. SECTION 18 A OWASP AND APPLICATION SECURITY..mp4
16 MB
~Get Your Files Here !/31. SECTION 18 A OWASP AND APPLICATION SECURITY..srt
5.0 kB
~Get Your Files Here !/32. SECTION 18 B OWASP AND APPLICATION SECURITY..mp4
14 MB
~Get Your Files Here !/32. SECTION 18 B OWASP AND APPLICATION SECURITY..srt
4.1 kB
~Get Your Files Here !/33. SECTION 19 A IDS AND IPS TECHNOLOGY..mp4
22 MB
~Get Your Files Here !/33. SECTION 19 A IDS AND IPS TECHNOLOGY..srt
6.7 kB
~Get Your Files Here !/34. SECTION 19 B IDS AND IPS TECHNOLOGY..mp4
24 MB
~Get Your Files Here !/34. SECTION 19 B IDS AND IPS TECHNOLOGY..srt
6.6 kB
~Get Your Files Here !/35. SECTION 20 A SSL AND TLS TECHNOLOGY QUESTION..mp4
21 MB
~Get Your Files Here !/35. SECTION 20 A SSL AND TLS TECHNOLOGY QUESTION..srt
6.0 kB
~Get Your Files Here !/36. SECTION 20 B SSL AND TLS TECHNOLOGY QUESTION..mp4
22 MB
~Get Your Files Here !/36. SECTION 20 B SSL AND TLS TECHNOLOGY QUESTION..srt
6.8 kB
~Get Your Files Here !/37. SECTION 21 A CYBER SECURITY COMMON THREATS, ATTACKS ATTACKS AND VULNERABLITY..mp4
18 MB
~Get Your Files Here !/37. SECTION 21 A CYBER SECURITY COMMON THREATS, ATTACKS ATTACKS AND VULNERABLITY..srt
5.5 kB
~Get Your Files Here !/38. SECTION 21 B CYBER SECURITY COMMON THREATS, ATTACKS ATTACKS AND VULNERABLITY..mp4
25 MB
~Get Your Files Here !/38. SECTION 21 B CYBER SECURITY COMMON THREATS, ATTACKS ATTACKS AND VULNERABLITY..srt
9.8 kB
~Get Your Files Here !/39. SECTION 22 A PORT SCANNINING..mp4
23 MB
~Get Your Files Here !/39. SECTION 22 A PORT SCANNINING..srt
6.6 kB
~Get Your Files Here !/4. SECTION 3 B COURSE OBJECTIVE..mp4
5.7 MB
~Get Your Files Here !/4. SECTION 3 B COURSE OBJECTIVE..srt
2.2 kB
~Get Your Files Here !/40. SECTION 22 B PORT SCANNINING..mp4
12 MB
~Get Your Files Here !/40. SECTION 22 B PORT SCANNINING..srt
4.7 kB
~Get Your Files Here !/41. SECTION 23 A OSI MODEL..mp4
15 MB
~Get Your Files Here !/41. SECTION 23 A OSI MODEL..srt
3.8 kB
~Get Your Files Here !/42. SECTION 23 B OSI MODEL..mp4
21 MB
~Get Your Files Here !/42. SECTION 23 B OSI MODEL..srt
8.3 kB
~Get Your Files Here !/43. SECTION 24 A VPN TECHNOLOGY..mp4
15 MB
~Get Your Files Here !/43. SECTION 24 A VPN TECHNOLOGY..srt
3.8 kB
~Get Your Files Here !/44. SECTION 24 B VPN TECHNOLOGY..mp4
9.4 MB
~Get Your Files Here !/44. SECTION 24 B VPN TECHNOLOGY..srt
3.5 kB
~Get Your Files Here !/45. SECTION 25 A PENETRATION TESTING VS VULNERABLITY TESTING..mp4
15 MB
~Get Your Files Here !/45. SECTION 25 A PENETRATION TESTING VS VULNERABLITY TESTING..srt
4.0 kB
~Get Your Files Here !/46. SECTION 25 B PENETRATION TESTING VS VULNERABLITY TESTING..mp4
15 MB
~Get Your Files Here !/46. SECTION 25 B PENETRATION TESTING VS VULNERABLITY TESTING..srt
4.5 kB
~Get Your Files Here !/47. SECTION 27 A TYPES OF HACKING OR HACKERS..mp4
16 MB
~Get Your Files Here !/47. SECTION 27 A TYPES OF HACKING OR HACKERS..srt
5.5 kB
~Get Your Files Here !/48. SECTION 27 B TYPES OF HACKING OR HACKERS..mp4
21 MB
~Get Your Files Here !/48. SECTION 27 B TYPES OF HACKING OR HACKERS..srt
6.1 kB
~Get Your Files Here !/49. SECTION 28 A POST INCIDENT REMEDIATION.mp4
16 MB
~Get Your Files Here !/49. SECTION 28 A POST INCIDENT REMEDIATION.srt
5.9 kB
~Get Your Files Here !/49.1 NIST.SP.800-61r2.pdf
1.5 MB
~Get Your Files Here !/5. SECTION 4 PROBLEM STATEMENT..mp4
5.4 MB
~Get Your Files Here !/5. SECTION 4 PROBLEM STATEMENT..srt
2.4 kB
~Get Your Files Here !/50. SECTION 28 B POST INCIDENT RESPONSE REMEDIATION.mp4
28 MB
~Get Your Files Here !/50. SECTION 28 B POST INCIDENT RESPONSE REMEDIATION.srt
10 kB
~Get Your Files Here !/50.1 NIST.SP.800-61r2.pdf
1.5 MB
~Get Your Files Here !/51. SECTION 29 A THREATS - ATTACKS AND VULNERABILITY.mp4
19 MB
~Get Your Files Here !/51. SECTION 29 A THREATS - ATTACKS AND VULNERABILITY.srt
6.1 kB
~Get Your Files Here !/52. SECTION 29 B THREATS - ATTACKS AND VULNERABILITY.mp4
14 MB
~Get Your Files Here !/52. SECTION 29 B THREATS - ATTACKS AND VULNERABILITY.srt
3.4 kB
~Get Your Files Here !/53. SECTION 30 A DoS AND DDoS.mp4
14 MB
~Get Your Files Here !/53. SECTION 30 A DoS AND DDoS.srt
6.2 kB
~Get Your Files Here !/54. SECTION 30 B DoS AND DDoS.mp4
9.5 MB
~Get Your Files Here !/54. SECTION 30 B DoS AND DDoS.srt
4.5 kB
~Get Your Files Here !/55. SECTION 31 A CONTINOUS EDUCATION ASSESSMENT.mp4
12 MB
~Get Your Files Here !/55. SECTION 31 A CONTINOUS EDUCATION ASSESSMENT.srt
4.3 kB
~Get Your Files Here !/56. SECTION 31 B CONTINOUS EDUCATION ASSESSMENT.mp4
13 MB
~Get Your Files Here !/56. SECTION 31 B CONTINOUS EDUCATION ASSESSMENT.srt
3.8 kB
~Get Your Files Here !/57. SECTION 32 . FINAL CONCLUSION.mp4
5.5 MB
~Get Your Files Here !/57. SECTION 32 . FINAL CONCLUSION.srt
3.5 kB
~Get Your Files Here !/6. SECTION 5-A TELL ME ABOUT YOURSELF..mp4
27 MB
~Get Your Files Here !/6. SECTION 5-A TELL ME ABOUT YOURSELF..srt
8.8 kB
~Get Your Files Here !/7. SECTION 5-B TELL ME ABOUT YOURSELF..mp4
20 MB
~Get Your Files Here !/7. SECTION 5-B TELL ME ABOUT YOURSELF..srt
6.7 kB
~Get Your Files Here !/8. SECTION 6-A ARE YOU CURRENTLY WORKING..mp4
15 MB
~Get Your Files Here !/8. SECTION 6-A ARE YOU CURRENTLY WORKING..srt
5.1 kB
~Get Your Files Here !/9. SECTION 6-B ARE YOU CURRENTLY WORKING.mp4
9.4 MB
~Get Your Files Here !/9. SECTION 6-B ARE YOU CURRENTLY WORKING.srt
4.1 kB
~Get Your Files Here !/Bonus Resources.txt
386 B