Magnetic link has been copied to the cutting board

Name Lynda - CySAPlus Cert Prep - 3 Cyber Incident Response

File Type video

Size 317.53MB

UpdateDate 2024-9-15

hash *****0E8C96F91910DC1770707E35CAE73112D1

Hot 2

Files 5.4. Forensic Investigations/28.Password forensics.mp4 | 23.93MB 1.Introduction/01.Welcome.mp4 | 11.63MB 1.Introduction/02.What you need to know.en.srt | 1.29KB 1.Introduction/02.What you need to know.mp4 | 1.94MB 2.1. Assessing Incidents/03.Identifying and classifying security incidents.en.srt | 5.75KB 2.1. Assessing Incidents/03.Identifying and classifying security incidents.mp4 | 8.03MB 2.1. Assessing Incidents/04.Threat classification.en.srt | 7.20KB 2.1. Assessing Incidents/04.Threat classification.mp4 | 8.96MB 2.1. Assessing Incidents/05.Zero days and the advanced persistent threat.en.srt | 5.95KB 2.1. Assessing Incidents/05.Zero days and the advanced persistent threat.mp4 | 8.50MB 2.1. Assessing Incidents/06.Determining incident severity.en.srt | 6.01KB 2.1. Assessing Incidents/06.Determining incident severity.mp4 | 8.11MB 3.2. Incident Response Process/07.Build an incident response program.en.srt | 7.95KB 3.2. Incident Response Process/07.Build an incident response program.mp4 | 14.58MB 3.2. Incident Response Process/08.Incident communications plan.en.srt | 4.95KB 3.2. Incident Response Process/08.Incident communications plan.mp4 | 5.92MB 3.2. Incident Response Process/09.Incident identification.en.srt | 7.12KB 3.2. Incident Response Process/09.Incident identification.mp4 | 9.19MB 3.2. Incident Response Process/10.Escalation and notification.en.srt | 4.67KB 3.2. Incident Response Process/10.Escalation and notification.mp4 | 6.51MB 3.2. Incident Response Process/11.Mitigation.en.srt | 4.74KB 3.2. Incident Response Process/11.Mitigation.mp4 | 6.11MB 3.2. Incident Response Process/12.Containment techniques.en.srt | 5.91KB 3.2. Incident Response Process/12.Containment techniques.mp4 | 7.80MB 3.2. Incident Response Process/13.Incident eradication and recovery.en.srt | 8.08KB 3.2. Incident Response Process/13.Incident eradication and recovery.mp4 | 11.44MB 3.2. Incident Response Process/14.Validation.en.srt | 4.24KB 3.2. Incident Response Process/14.Validation.mp4 | 5.44MB 3.2. Incident Response Process/15.Lessons learned and reporting.en.srt | 5.98KB 3.2. Incident Response Process/15.Lessons learned and reporting.mp4 | 7.62MB 3.2. Incident Response Process/16.Creating an incident response team.en.srt | 3.73KB 3.2. Incident Response Process/16.Creating an incident response team.mp4 | 4.86MB 4.3. Incident Symptoms/17.Network symptoms.en.srt | 7.19KB 4.3. Incident Symptoms/17.Network symptoms.mp4 | 8.09MB 4.3. Incident Symptoms/18.Rogue access points and evil twins.en.srt | 5.80KB 4.3. Incident Symptoms/18.Rogue access points and evil twins.mp4 | 7.77MB 4.3. Incident Symptoms/19.Endpoint symptoms.en.srt | 4.57KB 4.3. Incident Symptoms/19.Endpoint symptoms.mp4 | 7.56MB 4.3. Incident Symptoms/20.Application symptoms.en.srt | 4.09KB 4.3. Incident Symptoms/20.Application symptoms.mp4 | 5.91MB 5.4. Forensic Investigations/21.Conducting investigations.en.srt | 8.59KB 5.4. Forensic Investigations/21.Conducting investigations.mp4 | 12.43MB 5.4. Forensic Investigations/22.Evidence types.en.srt | 6.76KB 5.4. Forensic Investigations/22.Evidence types.mp4 | 8.79MB 5.4. Forensic Investigations/23.Introduction to forensics.en.srt | 7.05KB 5.4. Forensic Investigations/23.Introduction to forensics.mp4 | 8.78MB 5.4. Forensic Investigations/24.System and file forensics.en.srt | 7.51KB 5.4. Forensic Investigations/24.System and file forensics.mp4 | 11.82MB 5.4. Forensic Investigations/25.Creating forensic images.en.srt | 9.79KB 5.4. Forensic Investigations/25.Creating forensic images.mp4 | 13.86MB 5.4. Forensic Investigations/26.Digital forensics toolkit.en.srt | 5.52KB 5.4. Forensic Investigations/26.Digital forensics toolkit.mp4 | 8.96MB 5.4. Forensic Investigations/27.Operating system analysis.en.srt | 11.55KB 5.4. Forensic Investigations/27.Operating system analysis.mp4 | 18.67MB 5.4. Forensic Investigations/28.Password forensics.en.srt | 13.06KB 1.Introduction/01.Welcome.en.srt | 5.97KB 5.4. Forensic Investigations/29.Network forensics.en.srt | 7.66KB 5.4. Forensic Investigations/29.Network forensics.mp4 | 12.78MB 5.4. Forensic Investigations/30.Software forensics.en.srt | 6.04KB 5.4. Forensic Investigations/30.Software forensics.mp4 | 11.33MB 5.4. Forensic Investigations/31.Mobile device forensics.en.srt | 2.75KB 5.4. Forensic Investigations/31.Mobile device forensics.mp4 | 3.82MB 5.4. Forensic Investigations/32.Embedded device forensics.en.srt | 5.01KB 5.4. Forensic Investigations/32.Embedded device forensics.mp4 | 9.07MB 5.4. Forensic Investigations/33.Chain of custody.en.srt | 3.88KB 5.4. Forensic Investigations/33.Chain of custody.mp4 | 5.92MB 5.4. Forensic Investigations/34.Ediscovery and evidence production.en.srt | 6.03KB 5.4. Forensic Investigations/34.Ediscovery and evidence production.mp4 | 9.42MB 6.Next Steps/35.Next steps.en.srt | 1.33KB 6.Next Steps/35.Next steps.mp4 | 1.77MB

Recommend

Magnetic link has been copied to the cutting board