[ CourseWikia.com ] Oreilly - Secure Operations and Protections, 2nd Edition

File Type Create Time File Size Seeders Leechers Updated
Movie 2024-04-09 1.26GB 11 8 2 weeks ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
CourseWikia  com  Oreilly  Secure  Operations  and  Protections  2nd  Edition  
Related Torrents
  1. [ CourseWikia.com ] Ultrasonography in Obstetrics and Gynaecology, 2nd Edition 14.90MB
  2. [ CourseWikia.com ] Oreilly - Introduction to Generative AI, Video Edition 1.84GB
  3. [ CourseWikia.com ] Forestry Economics - A Managerial Approach, 2nd Edition (ePUB) 11.14MB
  4. [ CourseWikia.com ] The Encyclopedia of Animal Nutrition, 2nd Edition 43.90MB
  5. [ CourseWikia.com ] Mirror Face - Brain and Emotion, 20th Edition 4.18MB
  6. [ FreeCourseWeb.com ] Oreilly - Threat Intelligence and Threat Hunting, 2nd Edition 1.15GB
  7. [ CourseWikia.com ] Organic and Printed Electronics - Fundamentals and Applications (2nd Edition) 61.18MB
  8. [ CourseWikia.com ] Mapping Applied Linguistics - A Guide for Students and Practitioners, 2nd Edition 11.22MB
  9. [ CourseWikia.com ] Oreilly - Applied Fundamentals - Guess the Number 2.25GB
  10. [ FreeCourseWeb.com ] Oreilly - Quantum Computing in Action, Video Edition 987.34MB
Files
  1. Get Bonus Downloads Here.url 181B
  2. ~Get Your Files Here !/Bonus Resources.txt 386B
  3. ~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.en.srt 1.07KB
  4. ~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.mp4 3.34MB
  5. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.en.srt 1.18KB
  6. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.mp4 3.99MB
  7. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.en.srt 48.79KB
  8. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 101.11MB
  9. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.en.srt 54.81KB
  10. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 112.42MB
  11. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.en.srt 22.15KB
  12. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 49.64MB
  13. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.en.srt 23.32KB
  14. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 85.14MB
  15. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.en.srt 22.86KB
  16. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 47.80MB
  17. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.en.srt 42.00KB
  18. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 114.75MB
  19. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.en.srt 33.83KB
  20. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 72.50MB
  21. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.en.srt 8.72KB
  22. ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.mp4 20.97MB
  23. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.en.srt 736B
  24. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.mp4 2.56MB
  25. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.en.srt 12.68KB
  26. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.mp4 32.75MB
  27. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.en.srt 6.92KB
  28. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.mp4 18.28MB
  29. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.en.srt 22.37KB
  30. ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 83.10MB
  31. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.en.srt 1.14KB
  32. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.mp4 4.23MB
  33. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.en.srt 4.13KB
  34. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.mp4 11.82MB
  35. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.en.srt 5.75KB
  36. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.mp4 17.11MB
  37. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.en.srt 6.33KB
  38. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.mp4 16.08MB
  39. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.en.srt 6.39KB
  40. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.mp4 16.44MB
  41. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.en.srt 7.91KB
  42. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.mp4 22.66MB
  43. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.en.srt 5.99KB
  44. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.mp4 16.69MB
  45. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.en.srt 6.07KB
  46. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.mp4 17.28MB
  47. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.en.srt 7.54KB
  48. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.mp4 19.35MB
  49. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.en.srt 4.84KB
  50. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.mp4 14.77MB
  51. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.en.srt 2.45KB
  52. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.mp4 6.33MB
  53. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.en.srt 5.41KB
  54. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.mp4 13.75MB
  55. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.en.srt 9.38KB
  56. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.mp4 26.14MB
  57. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.en.srt 3.62KB
  58. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.mp4 11.66MB
  59. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.en.srt 6.77KB
  60. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.mp4 19.36MB
  61. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.en.srt 9.54KB
  62. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.mp4 25.06MB
  63. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).en.srt 4.15KB
  64. ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).mp4 11.37MB
  65. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.en.srt 571B
  66. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.mp4 2.54MB
  67. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.en.srt 2.88KB
  68. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.mp4 7.18MB
  69. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.en.srt 10.73KB
  70. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.mp4 23.02MB
  71. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.en.srt 7.36KB
  72. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.mp4 14.80MB
  73. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.en.srt 7.24KB
  74. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.mp4 19.69MB
  75. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.en.srt 7.41KB
  76. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.mp4 14.64MB
  77. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.en.srt 13.12KB
  78. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.mp4 31.59MB
  79. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).en.srt 3.64KB
  80. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).mp4 8.92MB
  81. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.en.srt 4.46KB
  82. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.mp4 10.63MB
  83. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.en.srt 6.57KB
  84. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.mp4 23.43MB
  85. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.en.srt 16.29KB
  86. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.mp4 37.37MB
  87. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).en.srt 15.09KB
  88. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).mp4 31.73MB
  89. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.en.srt 17.43KB
  90. ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 41.61MB
  91. ~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.en.srt 433B
  92. ~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.mp4 1.29MB