搜索
Coursera - Cybersecurity Operations Fundamentals Specialization 2024
磁力链接/BT种子名称
Coursera - Cybersecurity Operations Fundamentals Specialization 2024
磁力链接/BT种子简介
种子哈希:
23326996620df32330916d8a6dfeb1b58632a2d5
文件大小:
1.84G
已经下载:
450
次
下载速度:
极快
收录时间:
2024-06-03
最近下载:
2024-11-18
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:23326996620DF32330916D8A6DFEB1B58632A2D5
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
李艳妮
河西亚美
kokona
ktv里那些事
tp 女j
2016-7
loliporn
oba411
glassmannequin.com
狗主人
小姐不乖
古村
the stranger
监控名师工作室
性+医院
소장
ユフィン
baldurs.gate.3.gog
carolina sweets incest
车模美女菲菲
瑜伽裤美女
地停车
绿 舔
minaj
ren
선덕여왕
親婚
bihter_ a forbidden passion 2023 1080p hdrip [dual
妲己+
maitland.ward
文件列表
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.mp4
32.8 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.mp4
26.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.mp4
25.9 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.mp4
22.4 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.mp4
19.3 MB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.mp4
18.9 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.mp4
18.0 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.mp4
17.8 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.mp4
17.7 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.mp4
16.6 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.mp4
16.3 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.mp4
16.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.mp4
15.9 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.mp4
15.3 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.mp4
15.0 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.mp4
14.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.mp4
14.5 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.mp4
14.3 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.mp4
14.0 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.mp4
13.7 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/02_soc-defined/01_soc-defined.mp4
13.5 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/21_accessing-network-resources-with-windows/01_accessing-network-resources-with-windows.mp4
13.5 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/07_editing-file-properties/01_editing-file-properties.mp4
13.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/01_linux-architecture.mp4
13.4 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/15_controlling-startup-services-and-executing-system-shutdown/01_controlling-startup-services-and-executing-system-shutdown.mp4
13.4 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/01_windows-file-system-overview.mp4
13.3 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/01_identifying-possible-threat-actors.mp4
13.2 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/01_other-useful-command-line-tools.mp4
13.2 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/12_shellcode-and-exploits/02_shellcode-and-exploits.mp4
12.9 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/05_challenges-of-a-soc/01_challenges-of-a-soc.mp4
12.9 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/09_dns-log/01_dns-log.mp4
12.8 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/14_windows-net-command/01_windows-net-command.mp4
12.3 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/01_reconnaissance-attacks.mp4
12.3 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/01_netflow.mp4
12.2 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/01_windows-powershell.mp4
12.1 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/02_soc-tools-and-their-features.mp4
12.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/06_file-properties-and-permissions/01_file-properties-and-permissions.mp4
11.8 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/02_nat-fundamentals/01_nat-fundamentals.mp4
11.8 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/01_event-sources.mp4
11.7 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/18_data-loss-detection-using-netflow-example/01_data-loss-detection-using-netflow-example.mp4
11.5 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/01_disks-and-file-systems.mp4
11.4 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/05_log-data-search/01_log-data-search.mp4
11.3 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/01_windows-networking.mp4
11.0 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/01_network-security-monitoring-data-types.mp4
11.0 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/11_obfuscated-javascript/01_obfuscated-javascript.mp4
11.0 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/02_dns-operations.mp4
10.8 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/01_networking.mp4
10.7 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/20_http-302-cushioning/02_http-302-cushioning.mp4
10.6 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/22_windows-registry/01_windows-registry.mp4
10.4 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/05_application-allowed-lists-and-blocked-lists/01_application-allowed-lists-and-blocked-lists.mp4
10.3 MB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/03_incident-response-workflow/01_incident-response-workflow.mp4
9.9 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/17_network-behavior-anomaly-detection/01_network-behavior-anomaly-detection.mp4
9.8 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/17_monitoring-system-resources/01_monitoring-system-resources.mp4
9.8 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/02_tcp-vulnerabilities.mp4
9.5 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/01_common-vulnerability-scoring-system.mp4
9.5 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/27_executables-vs-interpreters/01_executables-vs-interpreters.mp4
9.4 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/08_hot-threat-dashboard/01_hot-threat-dashboard.mp4
9.4 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/14_directory-traversal/02_directory-traversal.mp4
9.3 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/01_host-based-malware-protection.mp4
9.3 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/16_piping-command-output/01_piping-command-output.mp4
9.3 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/03_security-information-and-event-management-systems/01_security-information-and-event-management-systems.mp4
9.3 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/11_emergency-alternate-startup-options/01_emergency-alternate-startup-options.mp4
9.2 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/15_sql-injection/02_sql-injection.mp4
9.2 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/02_common-metasploit-payloads.mp4
9.2 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/02_pki-overview.mp4
9.2 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/22_name-resolution-dns/01_name-resolution-dns.mp4
9.1 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/14_spoofing-attacks/01_spoofing-attacks.mp4
9.1 MB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/05_soc-workflow-automation-example.mp4
8.9 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/12_threat-analytic-systems/01_threat-analytic-systems.mp4
8.9 MB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/01_what-is-in-a-play.mp4
8.9 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/03_host-based-antivirus/01_host-based-antivirus.mp4
8.9 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/01_system-initialization.mp4
8.8 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/06_cryptanalysis/02_cryptanalysis.mp4
8.7 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/02_smtp-operations.mp4
8.7 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/08_asymmetric-encryption-algorithms/01_asymmetric-encryption-algorithms.mp4
8.6 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/07_symmetric-encryption-algorithms/01_symmetric-encryption-algorithms.mp4
8.6 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/24_viewing-network-traffic/01_viewing-network-traffic.mp4
8.5 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/20_managing-services-in-sysv-environments/01_managing-services-in-sysv-environments.mp4
8.5 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/13_security-tools-reference/01_security-tools-reference.mp4
8.4 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/09_publicly-available-threat-awareness-resources/01_publicly-available-threat-awareness-resources.mp4
8.4 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/01_ips-evasion-techniques.mp4
8.3 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/03_cryptography-overview/01_cryptography-overview.mp4
8.2 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/01_common-third-party-tools.mp4
8.2 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/01_attack-surface-and-attack-vectors.mp4
8.2 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/10_windows-gui/01_windows-gui.mp4
8.2 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/04_windows-processes-threads-and-handles/01_windows-processes-threads-and-handles.mp4
8.1 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/01_system-logs.mp4
8.0 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/22_gaining-access-and-control/01_gaining-access-and-control.mp4
7.8 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/23_windows-management-instrumentation/01_windows-management-instrumentation.mp4
7.8 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/03_hunting-maturity-model/01_hunting-maturity-model.mp4
7.8 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/01_other-security-data-manipulation.mp4
7.8 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/10_access-attacks/01_access-attacks.mp4
7.7 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/01_windows-domains-and-local-user-accounts.mp4
7.7 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/24_common-windows-server-functions/01_common-windows-server-functions.mp4
7.7 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/13_correlating-nsm-data/01_correlating-nsm-data.mp4
7.7 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/02_impact-of-cryptography-on-security-investigations/02_impact-of-cryptography-on-security-investigations.mp4
7.6 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/05_icmp-vulnerabilities/02_icmp-vulnerabilities.mp4
7.6 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/11_diamond-model-overview/01_diamond-model-overview.mp4
7.6 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/18_overview-of-secure-shell-protocol/01_overview-of-secure-shell-protocol.mp4
7.6 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/12_denial-of-service-and-distributed-denial-of-service/01_denial-of-service-and-distributed-denial-of-service.mp4
7.5 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/08_network-based-malware-protection/01_network-based-malware-protection.mp4
7.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/13_next-generation-firewall-log/01_next-generation-firewall-log.mp4
7.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/01_running-software-on-linux.mp4
7.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/05_basic-file-system-navigation-and-management-commands/01_basic-file-system-navigation-and-management-commands.mp4
7.4 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/02_address-resolution-protocol/01_address-resolution-protocol.mp4
7.4 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/01_other-data-types.mp4
7.4 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/04_host-intrusion-prevention-system/01_host-intrusion-prevention-system.mp4
7.3 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/07_packet-captures/01_packet-captures.mp4
7.3 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/17_punycode/02_punycode.mp4
7.3 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/10_applying-the-kill-chain-model/01_applying-the-kill-chain-model.mp4
7.2 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/02_cyber-threat-hunting-concepts/01_cyber-threat-hunting-concepts.mp4
7.2 MB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/03_common-soc-services/01_common-soc-services.mp4
7.2 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/08_firewall-log/01_firewall-log.mp4
7.2 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/02_https-operations.mp4
7.1 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/11_security-intelligence/01_security-intelligence.mp4
7.1 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/01_pki-operations.mp4
7.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/28_using-package-managers-to-install-software-in-linux/01_using-package-managers-to-install-software-in-linux.mp4
7.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/14_interacting-with-linux/01_interacting-with-linux.mp4
6.8 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/01_dns-risk-and-mitigation-tool.mp4
6.8 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/07_cvss-v3-0-example/01_cvss-v3-0-example.mp4
6.8 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/02_web-scripting.mp4
6.6 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/11_alert-data/01_alert-data.mp4
6.6 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/06_full-packet-capture/01_full-packet-capture.mp4
6.4 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/21_gaining-access-via-web-based-attacks/02_gaining-access-via-web-based-attacks.mp4
6.4 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/04_acls-with-the-established-option/01_acls-with-the-established-option.mp4
6.4 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/06_authentication-authorization-and-account/01_authentication-authorization-and-accounting.mp4
6.4 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/10_web-proxy-log/01_web-proxy-log.mp4
6.4 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/03_incident-response-life-cycle/01_incident-response-life-cycle.mp4
6.3 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/15_cipher-suite/01_cipher-suite.mp4
6.3 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/04_cyber-threat-hunting-cycle/01_cyber-threat-hunting-cycle.mp4
6.3 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/15_dhcp-attacks/01_dhcp-attacks.mp4
6.2 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/03_packet-filtering-with-acls/01_packet-filtering-with-acls.mp4
6.1 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/16_cross-site-scripting/02_cross-site-scripting.mp4
6.1 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/06_cvss-v3-0-scoring/01_cvss-v3-0-scoring.mp4
5.8 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/06_event-correlation/01_event-correlation.mp4
5.8 MB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/01_soc-workflow-automation-example.mp4
5.7 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/01_hash-algorithms.mp4
5.7 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/15_personally-identifiable-information/01_personally-identifiable-information.mp4
5.7 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/05_access-control-models/01_access-control-models.mp4
5.7 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/08_root-and-sudo/01_root-and-sudo.mp4
5.6 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/12_windows-cli/01_windows-cli.mp4
5.6 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/03_legacy-tcp-ip-vulnerabilities/02_legacy-tcp-ip-vulnerabilities.mp4
5.5 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/02_history-and-benefits-of-linux/01_history-and-benefits-of-linux.mp4
5.4 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/14_use-case-ssl-tls/01_use-case-ssl-tls.mp4
5.3 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/04_soc-tools-and-their-features-cont.mp4
5.3 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/03_windows-operating-system-architecture/01_windows-operating-system-architecture.mp4
5.3 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/07_sandboxing/01_sandboxing.mp4
5.3 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/11_digital-signatures/01_digital-signatures.mp4
5.3 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/06_windows-services/01_windows-services.mp4
5.3 MB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/01_security-incident-investigation-procedures.mp4
5.2 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/10_csirt-incident-handling-services/01_csirt-incident-handling-services.mp4
5.2 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/01_key-management.mp4
5.0 MB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/01_soc-wms-concepts.mp4
5.0 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/06_reference-us-cert-incident-categories/01_reference-us-cert-incident-categories.mp4
5.0 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/03_dynamic-dns/02_dynamic-dns.mp4
4.9 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/03_kill-chain-phase-1-reconnaissance/01_kill-chain-phase-1-reconnaissance.mp4
4.9 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/18_dns-tunneling/02_dns-tunneling.mp4
4.8 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/03_security-onion.mp4
4.8 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/14_information-security-confidentiality-integrity-and-availability/01_information-security-overview.mp4
4.8 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/09_session-data/01_session-data.mp4
4.8 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/04_wrap-up/02_wrap-up.mp4
4.6 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/13_reflection-and-amplification-attacks/01_reflection-and-amplification-attacks.mp4
4.6 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/10_transaction-data/01_transaction-data.mp4
4.6 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/23_testing-name-resolution/01_testing-name-resolution.mp4
4.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/07_windows-event-viewer/01_windows-event-viewer.mp4
4.5 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/04_wrap-up/02_wrap-up.mp4
4.5 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/03_evidence/01_evidence.mp4
4.5 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/05_incident-attack-categories/01_incident-attack-categories.mp4
4.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/02_understanding-the-network-design/01_understanding-network-design.mp4
4.5 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/07_udp-vulnerabilities/02_udp-vulnerabilities.mp4
4.4 MB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/04_pcap-analysis/01_pcap-analysis.mp4
4.4 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/08_sql-operations/02_sql-operations.mp4
4.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/12_shutting-down-the-system/01_shutting-down-the-system.mp4
4.3 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/18_windows-boot-process/01_windows-boot-process.mp4
4.3 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/11_man-in-the-middle-attacks/01_man-in-the-middle-attacks.mp4
4.3 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/14_applications-log/01_applications-log.mp4
4.3 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/25_configuring-remote-syslog/01_configuring-remote-syslog.mp4
4.2 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/11_run-as-administrator/01_run-as-administrator.mp4
4.2 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/02_exploit-kits.mp4
4.2 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/04_recursive-dns-query/02_recursive-dns-query.mp4
4.1 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/05_security-data-normalization/01_security-data-normalization.mp4
4.1 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/12_applying-the-diamond-model/01_applying-the-diamond-model.mp4
4.1 MB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/01_veris-4-a-s.mp4
4.1 MB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/02_soc-interaction-with-other-departments/01_soc-interaction-with-other-departments.mp4
4.1 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/01_introduction/02_introduction-to-soc-deployment-models-and-types.mp4
4.1 MB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/03_threat-investigation-example-china-chopper-remote-access-trojan/02_threat-investigation-example-china-chopper-remote-access-trojan.mp4
4.0 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/08_csirt-categories/01_csirt-categories.mp4
3.9 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/01_introduction/01_introduction-to-understanding-windows-operating-system-basics.mp4
3.8 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/08_file-integrity-checking/01_file-integrity-checking.mp4
3.8 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/04_exploit-kits.mp4
3.8 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/05_encryption-overview/01_encryption-overview.mp4
3.8 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/16_regulatory-compliance/01_regulatory-compliance.mp4
3.7 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/10_wrap-up/02_wrap-up.mp4
3.7 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/19_pivoting/02_pivoting.mp4
3.7 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/01_introduction/02_introduction-to-developing-key-relationships-with-internal-and-external.mp4
3.7 MB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/06_wrap-up/02_wrap-up.mp4
3.7 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/05_log-data-search/02_topic-introduction_instructions.html
3.7 MB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/02_security-data-aggregation/01_security-data-aggregation.mp4
3.6 MB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/01_introduction/02_introduction-to-using-a-playbook-model-to-organize-security-monitoring.mp4
3.6 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/18_wrap-up/02_wrap-up.mp4
3.6 MB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/03_identifying-anomalies-and-suspicious-behaviors/01_identify-anomalies-and-suspicious-behaviors.mp4
3.6 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/26_wrap-up/02_wrap-up.mp4
3.6 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/02_windows-operating-system-history/01_windows-operating-system-history.mp4
3.5 MB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/01_introduction/01_introduction.mp4
3.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/11_email-proxy-log/01_email-proxy-log.mp4
3.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/26_wrap-up/02_wrap-up.mp4
3.5 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/04_kill-chain-phase-2-weaponization/01_weaponization.mp4
3.5 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/30_lightweight-directory-access-protocol/01_lightweight-directory-access-protocol.mp4
3.4 MB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/01_introduction/02_introduction-to-conducting-security-incident-investigations.mp4
3.4 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/01_introduction/01_introduction-to-understanding-network-infrastructure-and-network-security.mp4
3.3 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/01_lesson-introduction/02_introduction-to-exploring-data-type-categories.mp4
3.3 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/06_wrap-up/01_wrap-up.mp4
3.3 MB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/06_wrap-up/01_wrap-up.mp4
3.3 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/05_windows-virtual-memory-address-space/01_windows-virtual-memory-address-space.mp4
3.3 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/08_wrap-up/02_wrap-up.mp4
3.3 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/09_wrap-up/02_wrap-up.mp4
3.3 MB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/04_wrap-up/02_wrap-up.mp4
3.3 MB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/01_introduction/02_introduction-to-staffing-an-effective-soc-team.mp4
3.3 MB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/05_delivery/02_delivery_instructions.html
3.2 MB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/08_wrap-up/02_wrap-up.mp4
3.2 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/01_introduction/02_introduction-to-identifying-malicious-activity.mp4
3.2 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/09_diffie-hellman-key-agreement/01_diffie-hellman-key-agreement.mp4
3.2 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/01_security-onion-overview.mp4
3.2 MB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/04_wrap-up/02_wrap-up.mp4
3.2 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/01_introduction/01_introduction-to-understanding-incident-analysis-in-a-threat-centric-soc.mp4
3.2 MB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/06_wrap-up/02_wrap-up.mp4
3.2 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/31_wrap-up/02_wrap-up.mp4
3.2 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/01_introduction/02_introduction-to-understanding-basic-cryptography-concepts.mp4
3.2 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/01_lesson-introduction/02_course-introduction-to-understanding-linux-operating-system-basics.mp4
3.2 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/14_wrap-up/02_wrap-up.mp4
3.2 MB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/01_introduction/01_introduction-to-security-operations-center-processes-and-services.mp4
3.2 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/04_wrap-up/02_wrap-up.mp4
3.1 MB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/01_introduction/02_introduction-to-understanding-the-use-of-veris.mp4
3.1 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/24_wrap-up/02_wrap-up.mp4
3.1 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/14_wrap-up/02_wrap-up.mp4
3.1 MB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/01_soc-wms-integration.mp4
3.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/29_system-applications/01_system-applications.mp4
3.1 MB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/05_soc-metrics/01_soc-metrics.mp4
3.0 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/10_use-case-ssh/01_use-case-ssh.mp4
3.0 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/01_lesson-introduction/01_lesson-introduction.mp4
3.0 MB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/01_introduction/01_introduction-to-identifying-resources-for-hunting-cyber-threats.mp4
3.0 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/01_introduction/02_introduction-to-security-operations-center.mp4
3.0 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/16_wrap-up/02_wrap-up.mp4
3.0 MB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/04_wrap-up/02_wrap-up.mp4
3.0 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/11_wrap-up/02_wrap-up.mp4
3.0 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/01_introduction/02_introduction-to-understanding-event-correlation-and-normalization.mp4
3.0 MB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/06_wrap-up/02_wrap-up.mp4
2.9 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/01_lesson-introduction/02_introduction-to-understanding-common-tcp-ip-attacks.mp4
2.9 MB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/05_playbook-management-system/01_playbook-management-system.mp4
2.9 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/01_introduction/02_introduction-to-identifying-common-attack-vectors.mp4
2.8 MB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/01_introduction/01_introduction-to-understanding-soc-workflow-and-automation.mp4
2.8 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/04_incident-response-policy-elements/01_incident-response-policy-elements.mp4
2.7 MB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/02_soc-roles/02_soc-roles.mp4
2.7 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/08_kill-chain-phase-6-command-and-control/01_kill-chain-phase-6-command-and-control.mp4
2.7 MB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/09_network-security-monitoring-tools/01_network-security-monitoring-tools.mp4
2.7 MB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/05_delivery/01_delivery.mp4
2.6 MB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/01_introduction/01_introduction-to-understanding-soc-metrics.mp4
2.6 MB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/03_veris-incidents-structure/01_veris-incidents-structure.mp4
2.5 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/01_introduction/02_introduction-to-security-events-data-and-soc-analyst-tools.mp4
2.5 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/18_wrap-up/02_wrap-up.mp4
2.5 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/01_introduction/01_introduction-to-describing-incident-response.mp4
2.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/12_aaa-server-log/01_aaa-server-log.mp4
2.5 MB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/05_veris-records/01_veris-records.mp4
2.4 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/07_regulatory-compliance-incident-response-requirements/01_regulatory-compliance-incident-response-requirements.mp4
2.4 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/02_incident-response-planning/01_incident-response-planning.mp4
2.3 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/05_soc-tools-and-their-features-cont_instructions.html
2.3 MB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/03_playbook-definition/01_playbook-definition.mp4
2.3 MB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/06_veris-community-database/01_veris-community-database.mp4
2.2 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/13_next-generation-firewall-log/02_next-generation-firewall-log_instructions.html
2.1 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/05_kill-chain-phase-3-delivery/01_kill-chain-phase-3-delivery.mp4
2.1 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/07_kill-chain-phase-5-installation/01_kill-chain-phase-5-installation.mp4
2.1 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/02_classic-kill-chain-model-overview/01_classic-kill-chain-model-overview.mp4
2.0 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/06_kill-chain-phase-4-exploitation/01_kill-chain-phase-4-exploitation.mp4
2.0 MB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/02_network-baselining/01_network-baselining.mp4
1.9 MB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/02_security-analytics/01_security-analytics.mp4
1.9 MB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/04_chain-of-custody/01_chain-of-custody.mp4
1.9 MB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/04_security-controls-detection-effectiveness/01_security-controls-detection-effectiveness.mp4
1.9 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/09_kill-chain-phase-7-actions-on-objectives/01_kill-chain-phase-7-actions-on-objectives.mp4
1.7 MB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/17_nsa-suite-b/01_nsa-suite-b.mp4
1.7 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/04_wrap-up/01_wrap-up_2021_002_001_651819.pdf
1.7 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/09_csirt-framework/01_csirt-framework.mp4
1.7 MB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/02_veris-overview/01_veris-overview.mp4
1.6 MB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/03_time-to-detection/01_time-to-detection.mp4
1.6 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/01_introduction/01_introduction-to-developing-key-relationships-with-internal-and-external_NIST.SP.800-61r2.pdf
1.5 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/03_incident-response-life-cycle/02_incident-response-life-cycle_NIST.SP.800-61r2.pdf
1.5 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/04_incident-response-policy-elements/02_incident-response-policy-elements_NIST.SP.800-61r2.pdf
1.5 MB
Coursera - Threat Response 2024-1/01_describing-incident-response/05_incident-attack-categories/02_incident-attack-categories_NIST.SP.800-61r2.pdf
1.5 MB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/12_applying-the-diamond-model/02_applying-the-diamond-model_instructions.html
1.1 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/23_peer-to-peer-networks/05_detecting-malicious-encrypted-p2p-traffic_nb-09-encrytd-traf-anlytcs-wp-cte-en.pdf
964.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/15_cipher-suite/03_tls-cipher-suite-examples_NIST.SP.800-52r1.pdf
854.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/14_directory-traversal/03_topic-introduction_instructions.html
804.5 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/07_verizon-data-breach-investigations-report-and-cisco-annual-security-report/01_verizon-data-breach-investigations-report-and-cisco-annual-security-report_instructions.html
763.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/09_dns-log/02_dns-log_instructions.html
726.4 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/03_host-based-malware-protection_Talos_WhitePaper.pdf
700.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/04_windows-8-and-greater-task-manager_instructions.html
667.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/02_netflow_instructions.html
632.4 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/07_mitre-att-ck-navigator-web-application_instructions.html
611.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/02_impact-of-cryptography-on-security-investigations/04_digital-certificates_instructions.html
588.6 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/07_why-what-does-the-malware-do-and-what-is-its-purpose_instructions.html
534.0 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/06_mitre-att-ck-techniques-and-strategies-for-detection-and-mitigation_instructions.html
514.5 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/03_intrusion-prevention-system_instructions.html
509.0 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/05_deduplication_instructions.html
455.8 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/03_threat-investigation-example-china-chopper-remote-access-trojan/03_threat-investigation-example-china-chopper-remote-access-trojan_instructions.html
444.4 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/04_who-what-ip-domain-was-associated-with-the-malware_instructions.html
437.9 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/03_host-based-malware-protection_instructions.html
437.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/18_data-loss-detection-using-netflow-example/02_data-loss-detection-using-netflow-example_instructions.html
432.7 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/12_threat-analytic-systems/02_threat-analytic-systems_instructions.html
423.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/06_http-request-and-response-packets-capture-example_instructions.html
416.4 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/05_mitre-att-ck-matrices-and-tactics_instructions.html
395.1 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/06_event-correlation/02_event-correlation_instructions.html
394.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/07_windows-event-viewer/02_windows-event-viewer_instructions.html
358.9 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/11_security-intelligence/02_security-intelligence_instructions.html
354.0 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/02_host-based-personal-firewall_instructions.html
342.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/11_alert-data/02_alert-data_instructions.html
333.8 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/08_create-a-threat-model-using-att-ck-framework_instructions.html
328.1 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/02_soc-roles/04_soc-tasks-and-responsibilities-overview_instructions.html
325.0 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/04_pcap-analysis/02_pcap-analysis_instructions.html
323.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/02_security-onion-overview_instructions.html
318.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/11_emergency-alternate-startup-options/03_single-user_instructions.html
299.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/21_the-onion-router/03_detecting-tor-traffic_instructions.html
297.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/17_monitoring-system-resources/03_resource-monitor_instructions.html
293.0 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/04_firewalls_instructions.html
292.0 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/05_where-where-did-the-infection-come-from_instructions.html
288.9 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/08_network-based-malware-protection/02_network-based-malware-protection_instructions.html
284.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/11_obfuscated-javascript/02_topic-introduction_instructions.html
284.1 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/06_veris-community-database/02_veris-community-database_instructions.html
277.4 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/03_aggregation_instructions.html
273.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/07_nmap-port-scan_instructions.html
270.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/06_sysinternals_instructions.html
269.1 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/06_what-what-type-of-malware-is-on-the-system_instructions.html
265.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/03_cryptography-overview/03_cryptography-history_instructions.html
263.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/15_cipher-suite/02_cipher-suite_instructions.html
262.6 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/04_next-generation-endpoint-security_instructions.html
256.7 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/02_security-data-aggregation/02_security-data-aggregation_instructions.html
256.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/05_web-server-digital-certificate_instructions.html
253.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/04_windows-processes-threads-and-handles/03_windows-task-manager_instructions.html
248.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/06_displaying-processes-and-process-threads_instructions.html
245.8 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/03_identifying-anomalies-and-suspicious-behaviors/02_identifying-anomalies-and-suspicious-behaviors_instructions.html
243.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/05_smtp-flow_instructions.html
238.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/16_cross-site-scripting/04_cross-site-scripting_instructions.html
236.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/03_netflow_instructions.html
229.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/08_the-nslookup-utility_instructions.html
216.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/04_netflow-as-security-tool-examples_instructions.html
209.9 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/01_introduction/01_introduction-to-developing-key-relationships-with-internal-and-external_csirt_services_framework_v2.1
205.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/10_windows-gui/04_windows-file-explorer_instructions.html
203.6 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/05_security-data-normalization/02_security-data-normalization_instructions.html
203.0 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/05_netflow_instructions.html
202.8 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/05_playbook-management-system/02_playbook-management-system_instructions.html
200.3 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/13_correlating-nsm-data/02_correlating-nsm-data_instructions.html
196.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/11_run-as-administrator/02_run-as-administrator_instructions.html
189.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/08_http-cookies_instructions.html
189.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/05_exploit-kits_instructions.html
186.4 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/10_other-external-threat-intelligence-sources-and-feeds-reference/01_other-external-threat-intelligence-sources-and-feeds-reference_research.html
180.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/05_shodan-search-engine_instructions.html
176.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/22_windows-registry/03_registry-editor_instructions.html
172.2 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/03_soc-tools-and-their-features_instructions.html
166.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/05_file-properties-attributes-and-permissions_instructions.html
162.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/09_session-data/02_session-data_instructions.html
160.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/04_winscp_instructions.html
159.6 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/06_full-packet-capture/02_full-packet-capture_instructions.html
159.6 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/13_security-tools-reference/02_security-tools-reference_tshark.html
158.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/23_emotet-advanced-persistent-threat/01_emotet-advanced-persistent-threat_instructions.html
158.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/19_pivoting/03_topic-introduction_instructions.html
156.5 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/06_security-information-and-event-management_instructions.html
153.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/06_robots-txt-file_instructions.html
149.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/04_kill-chain-phase-2-weaponization/02_weaponization_instructions.html
148.5 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/01_introduction/01_introduction-to-developing-key-relationships-with-internal-and-external_instructions.html
147.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/07_nano-text-editor_instructions.html
143.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/22_windows-registry/02_windows-registry_instructions.html
143.3 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/06_authentication-authorization-and-account/02_authentication-authorization-and-accounting_instructions.html
142.1 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/03_external-stakeholder-summary-table_instructions.html
139.8 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/07_course-exam/01_course-exam_exam.html
139.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/21_accessing-network-resources-with-windows/02_accessing-network-resources-with-windows_instructions.html
130.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/14_use-case-ssl-tls/03_ssl-tls-certificate-example_instructions.html
128.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/02_hash-algorithms_instructions.html
128.3 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/06_proxy-servers_instructions.html
123.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/18_dns-tunneling/03_topic-introduction_instructions.html
122.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/15_controlling-startup-services-and-executing-system-shutdown/02_controlling-startup-services_instructions.html
119.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/03_the-msconfig-utility_instructions.html
117.6 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/03_packet-filtering-with-acls/02_packet-filtering-with-acls_instructions.html
114.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/14_applications-log/02_applications-log_instructions.html
112.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/21_accessing-network-resources-with-windows/03_remote-desktop-protocol_instructions.html
112.0 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/07_sandboxing/03_sandboxing_instructions.html
112.0 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/03_packet-filtering-with-acls/03_acl-example_instructions.html
109.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/05_security-onion-network-security-monitoring-tools_instructions.html
108.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/02_windows-netstat-command_instructions.html
106.3 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/08_kill-chain-phase-6-command-and-control/02_kill-chain-phase-6-command-and-control_instructions.html
105.9 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/02_soc-relevant-data-and-security-event-data-introduction_instructions.html
105.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/04_references_white-paper-c11-736595.pdf
105.1 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/07_packet-captures/02_packet-captures_instructions.html
98.6 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/05_incident-attack-categories/02_incident-attack-categories_instructions.html
96.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/04_enterprise-att-ck-matrix-components_instructions.html
95.6 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/04_summarization_instructions.html
94.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/04_using-windows-powershell_instructions.html
92.0 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/07_identity-and-access-management_instructions.html
91.2 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/02_veris-4-a-s_instructions.html
89.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/10_web-proxy-log/02_web-proxy-log_instructions.html
89.4 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/02_soc-roles/03_soc-roles_instructions.html
88.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/12_shellcode-and-exploits/03_topic-introduction_instructions.html
87.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/03_dns-mappings_instructions.html
87.1 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/05_application-allowed-lists-and-blocked-lists/03_application-allowed-lists-and-blocked-lists_instructions.html
85.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/04_statistical-data_instructions.html
85.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/03_dynamic-dns/03_ddns-operations_instructions.html
82.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/03_kill-chain-phase-1-reconnaissance/02_kill-chain-phase-1-reconnaissance_instructions.html
82.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/21_the-onion-router/01_the-onion-router_instructions.html
82.0 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/02_pyramid-of-pain_instructions.html
81.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/17_punycode/03_topic-introduction_instructions.html
81.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/20_http-302-cushioning/04_http-302-cushioning_instructions.html
79.1 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/03_soc-workflow-for-an-alert_instructions.html
77.9 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/08_hot-threat-dashboard/03_hot-threat-process_instructions.html
77.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/03_network-as-a-sensor_instructions.html
77.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/10_transaction-data/02_transaction-data_instructions.html
75.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/04_security-orchestration-automation-and-response/03_cisco-securex-platform_instructions.html
74.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/08_tcpview_instructions.html
73.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/06_windows-services/02_windows-services_instructions.html
73.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/05_log-data-search/02_topic-introduction_rfc3164.txt
73.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/24_encapsulation/02_dns-tunnels_instructions.html
71.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/04_recursive-dns-query/03_recursive-dns-query_instructions.html
70.9 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/03_interaction-of-various-roles-within-the-soc_instructions.html
69.9 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/03_playbook-definition/02_playbook-definition_instructions.html
69.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/12_windows-cli/02_windows-cli_instructions.html
68.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/02_pyramid-of-pain_the-pyramid-of-pain.html
68.6 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/02_nat-fundamentals/02_nat-fundamentals_instructions.html
67.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/04_cryptographic-authentication-in-action_instructions.html
66.9 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/02_what-is-in-a-play_instructions.html
66.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/03_http-protocol-fundamentals_instructions.html
65.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/17_monitoring-system-resources/02_monitoring-system-resources_instructions.html
65.4 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/07_verizon-data-breach-investigations-report-and-cisco-annual-security-report/01_verizon-data-breach-investigations-report-and-cisco-annual-security-report_security-reports.html
65.3 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/08_antivirus_instructions.html
65.1 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/07_mitre-att-ck-navigator-web-application_README.md
65.0 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/08_csirt-categories/02_csirt-categories_national-csirts.cfm
62.5 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/10_applying-the-kill-chain-model/02_applying-the-kill-chain-model_instructions.html
61.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/06_http-2-pcap-example_instructions.html
61.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/04_network-adapter-properties_instructions.html
57.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/12_aaa-server-log/02_aaa-server-log_instructions.html
57.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/06_tcp-reset-attack_instructions.html
56.9 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/05_icmp-vulnerabilities/03_icmp-vulnerabilities_instructions.html
56.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/03_http-2-streams_instructions.html
56.7 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/02_soc-environment-today_instructions.html
56.1 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/02_security-incident-investigation-procedures_instructions.html
54.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/06_smtp-conversation_instructions.html
54.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/05_wireshark_instructions.html
52.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/15_personally-identifiable-information/02_personally-identifiable-information_instructions.html
52.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/13_reflection-and-amplification-attacks/02_reflection-and-amplification-attacks_instructions.html
50.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/04_deployment-options_instructions.html
50.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/02_controlling-services-and-processes_instructions.html
50.7 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/02_security-analytics/02_security-analytics_instructions.html
50.2 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/08_csirt-categories/02_csirt-categories_csirt-faq.cfm
49.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/21_the-onion-router/02_tor-relays_instructions.html
49.8 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/10_csirt-incident-handling-services/02_csirt-incident-handling-services_services.cfm
49.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/03_extracted-content_instructions.html
48.3 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/08_how-how-did-the-malware-get-onto-the-system_instructions.html
47.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/08_sql-operations/03_topic-introduction_instructions.html
47.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/06_dns-terminology_instructions.html
47.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/14_spoofing-attacks/02_spoofing-attacks_instructions.html
46.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/04_tcp-syn-flooding_instructions.html
45.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/05_creating-a-local-user-account_instructions.html
42.9 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/02_nat-fundamentals/04_port-address-translation_instructions.html
41.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/03_putty-application_instructions.html
41.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/09_http-referer_instructions.html
40.9 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/07_load-balancing/02_web-application-firewall_instructions.html
40.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/03_entering-powershell_instructions.html
40.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/03_zero-trust-model/04_zero-trust-workplace-protections_instructions.html
39.8 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/07_load-balancing/01_load-balancing_instructions.html
39.5 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/09_kill-chain-phase-7-actions-on-objectives/02_kill-chain-phase-7-actions-on-objectives_instructions.html
38.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/14_use-case-ssl-tls/02_use-case-ssl-tls_instructions.html
37.9 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/09_publicly-available-threat-awareness-resources/02_open-web-application-security-project_instructions.html
37.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/22_gaining-access-and-control/02_gaining-access-and-control_instructions.html
37.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/12_denial-of-service-and-distributed-denial-of-service/02_denial-of-service-and-distributed-denial-of-service_instructions.html
37.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/16_regulatory-compliance/02_regulatory-compliance_instructions.html
36.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/03_certificate-enrollment_instructions.html
36.6 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/03_incident-response-workflow/03_incident-response-workflow-roles_instructions.html
36.5 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/04_acls-with-the-established-option/02_acls-with-the-established-option_instructions.html
36.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/15_dhcp-attacks/02_dhcp-attacks_instructions.html
35.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/11_email-proxy-log/02_email-proxy-log_instructions.html
35.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/17_network-behavior-anomaly-detection/02_network-behavior-anomaly-detection_instructions.html
35.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/05_encryption-overview/02_encryption-overview_instructions.html
34.9 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/10_other-external-threat-intelligence-sources-and-feeds-reference/01_other-external-threat-intelligence-sources-and-feeds-reference_knowledgebase.aspx
34.7 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/03_definition-of-wms_instructions.html
34.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/22_name-resolution-dns/03_configuring-dns_instructions.html
34.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/03_zero-trust-model/02_zero-trust-workforce-protections_instructions.html
34.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/07_editing-file-properties/02_editing-file-properties_instructions.html
33.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/08_asymmetric-encryption-algorithms/02_asymmetric-encryption-algorithms_instructions.html
33.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/10_other-external-threat-intelligence-sources-and-feeds-reference/01_other-external-threat-intelligence-sources-and-feeds-reference_urlquery.net
33.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/05_kill-chain-phase-3-delivery/02_kill-chain-phase-3-delivery_instructions.html
33.0 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/02_network-baselining/03_core-baseline-process_instructions.html
32.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/03_configuring-basic-networking-properties_instructions.html
32.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/03_zero-trust-model/03_zero-trust-workload-protections_instructions.html
32.4 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/03_time-to-detection/02_time-to-detection_instructions.html
31.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/11_man-in-the-middle-attacks/02_man-in-the-middle-attacks_instructions.html
31.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.en.srt
31.0 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/05_soc-metrics/02_soc-metrics_instructions.html
30.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/05_dns-distributed-database_instructions.html
30.3 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/04_acls-with-the-established-option/03_acls-with-the-established-option-example_instructions.html
30.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/02_netflow-as-a-security-tool_instructions.html
29.1 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/03_common-soc-services/02_common-soc-services_instructions.html
28.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/04_authentication-using-certificates_instructions.html
27.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/03_fast-flux-and-botnets_instructions.html
27.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/09_diffie-hellman-key-agreement/02_diffie-hellman-key-agreement_instructions.html
27.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/03_web-scripting_instructions.html
27.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/08_syslog_instructions.html
25.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/04_configuring-network-properties_instructions.html
25.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/03_topic-introduction_instructions.html
24.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/05_certificate-revocation_instructions.html
24.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/23_peer-to-peer-networks/04_botnets_instructions.html
24.3 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/03_security-information-and-event-management-systems/02_security-information-and-event-management-systems_instructions.html
24.2 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/10_csirt-incident-handling-services/02_csirt-incident-handling-services_instructions.html
24.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/18_windows-boot-process/02_windows-boot-process_instructions.html
24.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/11_digital-signatures/03_rsa-digital-signatures_instructions.html
24.1 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/02_classic-kill-chain-model-overview/02_classic-kill-chain-model-overview_instructions.html
23.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/03_windows-operating-system-architecture/02_windows-operating-system-architecture_instructions.html
22.9 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/02_network-baselining/02_network-baselining_instructions.html
22.7 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/07_sandboxing/02_sandboxing-introduction_instructions.html
22.6 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/06_reference-us-cert-incident-categories/02_reference-us-cert-incident-categories_instructions.html
22.4 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/04_cyber-threat-hunting-cycle/02_cyber-threat-hunting-cycle_instructions.html
21.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/10_windows-gui/02_windows-gui_instructions.html
21.3 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/11_diamond-model-overview/02_diamond-model-overview_instructions.html
21.1 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/02_soc-workflow-automation-example_instructions.html
20.6 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/02_address-resolution-protocol/02_address-resolution-protocol_instructions.html
20.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/03_attack-surface_instructions.html
19.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/03_zero-trust-model/01_topic-introduction_instructions.html
19.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.en.srt
18.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/19_course-exam/01_understanding-basic-cryptography-concepts-course-exam_exam.html
18.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/02_dns-risk-and-mitigation-tool_instructions.html
18.5 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/03_evidence/02_evidence_instructions.html
18.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/04_http-2-version-identification_instructions.html
18.4 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/13_security-tools-reference/02_security-tools-reference_instructions.html
17.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/10_windows-gui/03_windows-context-menu_instructions.html
17.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/03_trusted-third-party-example_instructions.html
16.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/05_security-risks-and-challenges_instructions.html
16.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/06_protocol-level-misinterpretation_instructions.html
16.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/03_passive-and-active-reconnaissance_instructions.html
16.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/02_key-management_instructions.html
16.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.en.srt
16.2 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/04_chain-of-custody/02_chain-of-custody_instructions.html
16.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/06_the-vi-command_instructions.html
16.2 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.en.txt
16.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.en.srt
16.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/03_linux-architecture_instructions.html
15.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/02_windows-file-system-structure_instructions.html
15.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/02_linux-file-system-overview_instructions.html
15.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/27_course-exam/01_understanding-windows-operating-system-basics-course-exam_exam.html
15.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/02_tcp-vulnerabilities.en.srt
15.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/21_the-onion-router/01_the-onion-router_index.html.en
15.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/03_cryptographic-authentication-using-hash-technology_instructions.html
15.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/03_hunting-maturity-model/02_hunting-maturity-model_instructions.html
15.1 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/08_csirt-categories/02_csirt-categories_instructions.html
14.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/17_course-exam/01_understanding-common-tcp-ip-attacks-course-exam_exam.html
14.8 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/02_veris-overview/02_veris-overview_instructions.html
14.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/04_security-orchestration-automation-and-response/01_security-orchestration-automation-and-response_instructions.html
14.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.en.srt
14.1 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/02_incident-response-planning/02_incident-response-planning_instructions.html
14.0 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/03_packet-capture-using-tcpdump_instructions.html
14.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/01_reconnaissance-attacks.en.srt
13.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/14_spoofing-attacks/01_spoofing-attacks.en.srt
13.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/32_course-exam/01_understanding-linux-operating-system-basics-course-exam_exam.html
13.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/04_traffic-substitution-and-insertion_instructions.html
13.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/01_identifying-possible-threat-actors.en.srt
13.6 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/09_course-exam/01_understanding-the-use-of-veris-course-exam_exam.html
13.6 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/15_course-exam/01_understanding-incident-analysis-in-a-threat-centric-soc-course-exam_exam.html
13.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/05_windows-virtual-memory-address-space/02_windows-virtual-memory-address-space_instructions.html
13.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.en.srt
13.0 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.en.srt
12.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.en.srt
12.5 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/03_incident-response-workflow/02_incident-response-workflow_instructions.html
11.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/01_pki-operations.en.srt
11.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/06_file-properties-and-permissions/03_permissions_instructions.html
11.2 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.en.srt
11.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/03_cvss-v3-0-base-metrics_instructions.html
11.2 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/02_nat-fundamentals/01_nat-fundamentals.en.srt
11.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/07_symmetric-encryption-algorithms/01_symmetric-encryption-algorithms.en.srt
10.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/01_other-useful-command-line-tools.en.srt
10.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/07_symmetric-encryption-algorithms/02_symmetric-encryption-algorithms_instructions.html
10.8 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/01_event-sources.en.srt
10.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/01_attack-surface-and-attack-vectors.en.srt
10.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/01_windows-powershell.en.srt
10.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/15_controlling-startup-services-and-executing-system-shutdown/01_controlling-startup-services-and-executing-system-shutdown.en.srt
10.7 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/03_incident-response-life-cycle/01_incident-response-life-cycle.en.srt
10.6 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/09_csirt-framework/02_csirt-framework_instructions.html
10.5 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.en.srt
10.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.en.srt
10.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.en.srt
10.4 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.en.srt
10.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/07_symmetric-encryption-algorithms/03_symmetric-encryption-key-lengths_instructions.html
10.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/03_traffic-fragmentation_instructions.html
10.2 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/10_course-exam/01_understanding-endpoint-security-technologies-course-exam_exam.html
10.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/21_the-onion-router/03_detecting-tor-traffic_rs.html
10.1 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/11_diamond-model-overview/01_diamond-model-overview.en.srt
10.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/05_stdin-stdout-and-stderr_instructions.html
10.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/12_denial-of-service-and-distributed-denial-of-service/01_denial-of-service-and-distributed-denial-of-service.en.srt
10.0 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/05_challenges-of-a-soc/01_challenges-of-a-soc.en.srt
10.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.en.srt
10.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/01_disks-and-file-systems.en.srt
9.9 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.en.srt
9.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/06_file-properties-and-permissions/01_file-properties-and-permissions.en.srt
9.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/01_dns-risk-and-mitigation-tool.en.srt
9.9 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.en.srt
9.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/15_cipher-suite/01_cipher-suite.en.srt
9.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/03_cryptography-overview/04_ciphers-for-everyone_instructions.html
9.8 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/05_access-control-models/03_access-control-models_instructions.html
9.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/01_windows-file-system-overview.en.srt
9.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.en.txt
9.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.en.txt
9.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/02_pki-overview.en.srt
9.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/24_viewing-network-traffic/03_tcpdump-basics_instructions.html
9.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/22_name-resolution-dns/01_name-resolution-dns.en.srt
9.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/27_course-exam/01_identifying-malicious-activity_exam.html
9.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/07_editing-file-properties/01_editing-file-properties.en.srt
9.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/10_access-attacks/01_access-attacks.en.srt
9.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/05_log-data-search/01_log-data-search.en.srt
9.3 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/01_network-security-monitoring-data-types.en.srt
9.3 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/08_network-based-malware-protection/01_network-based-malware-protection.en.srt
9.3 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.en.srt
9.2 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/01_host-based-malware-protection.en.srt
9.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/21_accessing-network-resources-with-windows/01_accessing-network-resources-with-windows.en.srt
9.2 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/15_dhcp-attacks/01_dhcp-attacks.en.srt
9.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/03_security-information-and-event-management-systems/01_security-information-and-event-management-systems.en.srt
9.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/19_course-exam/01_exploring-data-type-categories-course-exam_exam.html
9.1 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/02_address-resolution-protocol/01_address-resolution-protocol.en.srt
9.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/02_impact-of-cryptography-on-security-investigations/02_impact-of-cryptography-on-security-investigations.en.srt
9.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/01_networking.en.srt
9.0 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/14_information-security-confidentiality-integrity-and-availability/02_information-security-confidentiality-integrity-and-availability_instructions.html
8.9 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/12_course-exam/01_describing-incident-response-course-exam_exam.html
8.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/14_windows-net-command/01_windows-net-command.en.srt
8.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/22_windows-registry/01_windows-registry.en.srt
8.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/09_monitoring-cpu-and-memory-utilization_instructions.html
8.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/01_reconnaissance-attacks.en.txt
8.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/08_asymmetric-encryption-algorithms/01_asymmetric-encryption-algorithms.en.srt
8.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/03_the-history-command_instructions.html
8.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/22_name-resolution-dns/04_name-resolution-configuration-files_instructions.html
8.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/06_file-properties-and-permissions/04_ownership_instructions.html
8.6 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/05_course-exam/01_conducting-security-incident-investigations-course-exam_exam.html
8.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/14_spoofing-attacks/01_spoofing-attacks.en.txt
8.5 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/02_soc-tools-and-their-features.en.srt
8.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/08_displaying-open-files_instructions.html
8.5 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/11_course-exam/01_understanding-network-infrastructure-and-network-security-monitoring-tools_exam.html
8.5 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/01_soc-workflow-automation-example.en.srt
8.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.en.txt
8.4 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/03_incident-response-workflow/01_incident-response-workflow.en.srt
8.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/25_course-exam/01_identifying-common-attack-vectors-course-exam_exam.html
8.3 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/03_host-based-antivirus/01_host-based-antivirus.en.srt
8.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.en.txt
8.3 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/04_acls-with-the-established-option/01_acls-with-the-established-option.en.srt
8.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/18_overview-of-secure-shell-protocol/02_overview-of-secure-shell-protocol_instructions.html
8.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/01_linux-architecture.en.srt
8.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/02_tcp-vulnerabilities.en.txt
8.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/18_data-loss-detection-using-netflow-example/01_data-loss-detection-using-netflow-example.en.srt
8.2 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/03_incident-response-life-cycle/02_incident-response-life-cycle_instructions.html
8.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/02_dns-operations.en.srt
8.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/10_applying-the-kill-chain-model/01_applying-the-kill-chain-model.en.srt
8.1 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/05_course-exam/01_staffing-an-effective-soc-team-course-exam_exam.html
8.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/07_the-ps-command_instructions.html
8.1 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/09_course-exam/01_understanding-event-correlation-and-normalization-course-exam_exam.html
8.1 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/04_ntfs-volume-structure_instructions.html
8.1 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/05_course-exam/01_developing-key-relationships-with-internal-and-external-stakeholders-course-exam_exam.html
8.1 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/07_course-exam/01_introduction-to-security-operations-center-course-exam_exam.html
8.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/27_executables-vs-interpreters/01_executables-vs-interpreters.en.srt
7.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/02_smtp-operations.en.srt
7.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/01_other-data-types.en.srt
7.8 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/15_course-exam/01_identifying-resources-for-hunting-cyber-threats-course-exam_exam.html
7.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/03_cryptography-overview/01_cryptography-overview.en.srt
7.8 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/03_soc-wms-integration_instructions.html
7.8 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/13_security-tools-reference/01_security-tools-reference.en.srt
7.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/11_emergency-alternate-startup-options/01_emergency-alternate-startup-options.en.srt
7.7 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/04_actions_instructions.html
7.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/18_windows-boot-process/03_starting-services-at-boot-time_instructions.html
7.6 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/05_veris-records/03_veris-records-practice-quiz_quiz.html
7.6 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/05_application-allowed-lists-and-blocked-lists/01_application-allowed-lists-and-blocked-lists.en.srt
7.5 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/05_course-exam/01_security-operations-center-processes-and-services-course-exam_exam.html
7.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/20_http-302-cushioning/02_http-302-cushioning.en.srt
7.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.en.srt
7.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/13_correlating-nsm-data/01_correlating-nsm-data.en.srt
7.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/06_cryptanalysis/02_cryptanalysis.en.srt
7.4 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/05_course-exam/01_security-events-data-and-soc-analyst-tools-course-exam_exam.html
7.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/03_viewing-running-network-services_instructions.html
7.4 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/01_common-vulnerability-scoring-system.en.srt
7.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/08_firewall-log/02_firewall-log_instructions.html
7.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.en.txt
7.4 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.en.srt
7.4 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/04_host-intrusion-prevention-system/02_host-intrusion-prevention-system_instructions.html
7.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/01_ips-evasion-techniques.en.srt
7.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/10_other-external-threat-intelligence-sources-and-feeds-reference/01_other-external-threat-intelligence-sources-and-feeds-reference_instructions.html
7.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/01_netflow.en.srt
7.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/01_identifying-possible-threat-actors.en.txt
7.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/01_system-logs.en.srt
7.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/05_basic-file-system-navigation-and-management-commands/01_basic-file-system-navigation-and-management-commands.en.srt
7.2 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.en.txt
7.2 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/07_course-exam/01_identifying-patterns-of-suspicious-behavior-course-exam_exam.html
7.1 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/10_other-external-threat-intelligence-sources-and-feeds-reference/01_other-external-threat-intelligence-sources-and-feeds-reference_jjencode.html
7.1 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/03_internal-stakeholder-summary-table_instructions.html
7.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/05_the-sed-command_instructions.html
7.1 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/05_access-control-models/01_access-control-models.en.srt
7.0 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/03_packet-filtering-with-acls/01_packet-filtering-with-acls.en.srt
7.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/14_interacting-with-linux/01_interacting-with-linux.en.srt
7.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/11_obfuscated-javascript/01_obfuscated-javascript.en.srt
7.0 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/13_security-tools-reference/02_security-tools-reference_cain.html
7.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/12_shellcode-and-exploits/02_shellcode-and-exploits.en.srt
7.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/01_system-initialization.en.srt
6.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/05_comparing-hashing-algorithms_instructions.html
6.9 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/02_event-sources_instructions.html
6.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/20_managing-services-in-sysv-environments/01_managing-services-in-sysv-environments.en.srt
6.9 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/01_attack-surface-and-attack-vectors.en.txt
6.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/01_other-useful-command-line-tools.en.txt
6.8 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/05_course-exam/01_soc-deployment-models-and-types-course-exam_exam.html
6.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/03_legacy-tcp-ip-vulnerabilities/02_legacy-tcp-ip-vulnerabilities.en.srt
6.8 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/12_threat-analytic-systems/01_threat-analytic-systems.en.srt
6.8 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.en.srt
6.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/07_symmetric-encryption-algorithms/01_symmetric-encryption-algorithms.en.txt
6.7 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.en.txt
6.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/12_denial-of-service-and-distributed-denial-of-service/03_ddos-trends_instructions.html
6.7 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/06_authentication-authorization-and-account/01_authentication-authorization-and-accounting.en.srt
6.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/14_use-case-ssl-tls/01_use-case-ssl-tls.en.srt
6.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/07_symmetric-encryption-algorithms/04_comparing-symmetric-encryption-algorithms_instructions.html
6.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/02_common-metasploit-payloads.en.srt
6.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.en.txt
6.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/06_cryptanalysis/01_cryptanalysis_instructions.html
6.6 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/04_host-intrusion-prevention-system/01_host-intrusion-prevention-system.en.srt
6.5 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/07_course-exam/01_understanding-soc-workflow-and-automation-course-exam_exam.html
6.5 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/08_hot-threat-dashboard/01_hot-threat-dashboard.en.srt
6.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/15_cipher-suite/03_tls-cipher-suite-examples_instructions.html
6.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/09_diffie-hellman-key-agreement/01_diffie-hellman-key-agreement.en.srt
6.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.en.txt
6.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.en.txt
6.5 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/03_host-based-antivirus/02_host-based-antivirus_instructions.html
6.5 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.en.txt
6.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/05_icmp-vulnerabilities/02_icmp-vulnerabilities.en.srt
6.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/14_directory-traversal/02_directory-traversal.en.srt
6.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/17_network-behavior-anomaly-detection/01_network-behavior-anomaly-detection.en.srt
6.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/12_denial-of-service-and-distributed-denial-of-service/01_denial-of-service-and-distributed-denial-of-service.en.txt
6.4 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/01_what-is-in-a-play.en.srt
6.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/17_monitoring-system-resources/01_monitoring-system-resources.en.srt
6.4 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/05_veris-records/02_veris-records_instructions.html
6.4 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/04_cvss-v3-0-temporal-metrics_instructions.html
6.4 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/03_evidence/01_evidence.en.srt
6.4 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/03_veris-incidents-structure/02_veris-incidents-structure_instructions.html
6.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/24_common-windows-server-functions/01_common-windows-server-functions.en.srt
6.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/21_gaining-access-via-web-based-attacks/03_topic-introduction_instructions.html
6.3 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/05_soc-workflow-automation-example.en.srt
6.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/03_viewing-basic-network-properties_instructions.html
6.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/01_key-management.en.srt
6.1 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/04_windows-processes-threads-and-handles/01_windows-processes-threads-and-handles.en.srt
6.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/09_dns-log/01_dns-log.en.srt
6.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/05_encryption-overview/01_encryption-overview.en.srt
6.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/01_running-software-on-linux.en.srt
6.1 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/11_alert-data/01_alert-data.en.srt
6.1 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/13_reflection-and-amplification-attacks/01_reflection-and-amplification-attacks.en.srt
6.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/03_windows-operating-system-architecture/01_windows-operating-system-architecture.en.srt
6.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/14_windows-net-command/02_windows-net-command_instructions.html
6.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/02_pki-overview.en.txt
6.0 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/10_csirt-incident-handling-services/01_csirt-incident-handling-services.en.srt
6.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.en.txt
6.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/01_pki-operations.en.txt
5.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/01_windows-file-system-overview.en.txt
5.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/06_compiling-code_instructions.html
5.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/06_full-packet-capture/01_full-packet-capture.en.srt
5.9 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/03_ip-vulnerabilities_instructions.html
5.9 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/01_security-incident-investigation-procedures.en.srt
5.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/06_viewing-and-configuring-routes_instructions.html
5.9 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/10_access-attacks/01_access-attacks.en.txt
5.8 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/03_kill-chain-phase-1-reconnaissance/01_kill-chain-phase-1-reconnaissance.en.srt
5.8 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/02_nat-fundamentals/01_nat-fundamentals.en.txt
5.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/04_attack-vectors_instructions.html
5.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/01_windows-networking.en.srt
5.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/05_log-data-search/01_log-data-search.en.txt
5.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/11_digital-signatures/01_digital-signatures.en.srt
5.8 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/03_hunting-maturity-model/01_hunting-maturity-model.en.srt
5.8 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/03_incident-response-life-cycle/01_incident-response-life-cycle.en.txt
5.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/15_controlling-startup-services-and-executing-system-shutdown/01_controlling-startup-services-and-executing-system-shutdown.en.txt
5.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/11_man-in-the-middle-attacks/01_man-in-the-middle-attacks.en.srt
5.7 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/01_event-sources.en.txt
5.7 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/06_reference-us-cert-incident-categories/01_reference-us-cert-incident-categories.en.srt
5.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/21_accessing-network-resources-with-windows/01_accessing-network-resources-with-windows.en.txt
5.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/01_windows-powershell.en.txt
5.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/02_windows-powershell_instructions.html
5.6 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/02_security-data-aggregation/01_security-data-aggregation.en.srt
5.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/07_editing-file-properties/01_editing-file-properties.en.txt
5.6 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/01_soc-wms-concepts.en.srt
5.6 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/15_personally-identifiable-information/01_personally-identifiable-information.en.srt
5.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/10_windows-gui/01_windows-gui.en.srt
5.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/05_the-lsof-command_instructions.html
5.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/12_windows-cli/01_windows-cli.en.srt
5.6 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.en.txt
5.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/07_packet-captures/01_packet-captures.en.srt
5.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/05_tcp-session-hijacking_instructions.html
5.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/21_gaining-access-via-web-based-attacks/02_gaining-access-via-web-based-attacks.en.srt
5.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/07_udp-vulnerabilities/02_udp-vulnerabilities.en.srt
5.5 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/11_diamond-model-overview/01_diamond-model-overview.en.txt
5.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/05_importing-powershell-functions_instructions.html
5.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/28_using-package-managers-to-install-software-in-linux/01_using-package-managers-to-install-software-in-linux.en.srt
5.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/03_disk-partitions_instructions.html
5.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/22_gaining-access-and-control/01_gaining-access-and-control.en.srt
5.3 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/05_security-data-normalization/01_security-data-normalization.en.srt
5.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/17_punycode/02_punycode.en.srt
5.3 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/07_course-exam/01_understanding-soc-metrics-course-exam_exam.html
5.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/01_dns-risk-and-mitigation-tool.en.txt
5.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/01_disks-and-file-systems.en.txt
5.2 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.en.txt
5.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/15_sql-injection/04_intrusion-prevention-system-signatures_instructions.html
5.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/11_security-intelligence/01_security-intelligence.en.srt
5.2 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/05_challenges-of-a-soc/01_challenges-of-a-soc.en.txt
5.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/15_cipher-suite/01_cipher-suite.en.txt
5.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/24_viewing-network-traffic/01_viewing-network-traffic.en.srt
5.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/08_firewall-log/01_firewall-log.en.srt
5.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/01_windows-domains-and-local-user-accounts.en.srt
5.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/06_file-properties-and-permissions/01_file-properties-and-permissions.en.txt
5.2 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.en.txt
5.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/08_root-and-sudo/01_root-and-sudo.en.srt
5.1 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/02_soc-defined/01_soc-defined.en.srt
5.1 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/01_veris-4-a-s.en.srt
5.1 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/01_other-data-types.en.txt
5.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/06_other-payloads_instructions.html
5.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/05_mounting-devices_instructions.html
5.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/15_sql-injection/02_sql-injection.en.srt
5.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/23_windows-management-instrumentation/01_windows-management-instrumentation.en.srt
5.0 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/09_publicly-available-threat-awareness-resources/01_publicly-available-threat-awareness-resources.en.srt
4.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/02_https-operations.en.srt
4.9 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/07_regulatory-compliance-incident-response-requirements/02_regulatory-compliance-incident-response-requirements_instructions.html
4.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/03_cryptography-overview/01_cryptography-overview.en.txt
4.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/01_network-security-monitoring-data-types.en.txt
4.9 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/01_host-based-malware-protection.en.txt
4.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/04_exploit-kits.en.srt
4.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/23_testing-name-resolution/03_testing-name-resolution_instructions.html
4.9 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.en.txt
4.9 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/05_incident-attack-categories/01_incident-attack-categories.en.srt
4.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/05_how-devices-are-represented-as-files-in-the-linux-file-system_instructions.html
4.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/04_the-awk-command_instructions.html
4.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/22_name-resolution-dns/01_name-resolution-dns.en.txt
4.8 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/08_network-based-malware-protection/01_network-based-malware-protection.en.txt
4.8 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/01_soc-wms-integration.en.srt
4.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/03_security-information-and-event-management-systems/01_security-information-and-event-management-systems.en.txt
4.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/11_digital-signatures/04_practical-example-digitally-signed-cisco-software_instructions.html
4.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/18_windows-boot-process/01_windows-boot-process.en.srt
4.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/02_impact-of-cryptography-on-security-investigations/02_impact-of-cryptography-on-security-investigations.en.txt
4.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/06_cryptanalysis/02_cryptanalysis.en.txt
4.8 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/03_veris-incidents-structure/01_veris-incidents-structure.en.srt
4.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/15_dhcp-attacks/01_dhcp-attacks.en.txt
4.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/01_networking.en.txt
4.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/01_hash-algorithms.en.srt
4.8 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/03_identifying-anomalies-and-suspicious-behaviors/01_identify-anomalies-and-suspicious-behaviors.en.srt
4.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/02_address-resolution-protocol/01_address-resolution-protocol.en.txt
4.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/05_ntfs-alternate-data-streams_instructions.html
4.7 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/07_cvss-v3-0-example/02_cvss-v3-0-example_instructions.html
4.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/16_cross-site-scripting/02_cross-site-scripting.en.srt
4.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/07_udp-vulnerabilities/03_udp-vulnerabilities_instructions.html
4.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.en.txt
4.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/05_tcpdump-command-options_instructions.html
4.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/03_security-onion.en.srt
4.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/04_smtp-terminology_instructions.html
4.6 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/03_legacy-tcp-ip-vulnerabilities/03_legacy-tcp-ip-vulnerabilities_instructions.html
4.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/01_netflow.en.txt
4.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/16_piping-command-output/02_piping-command-output_instructions.html
4.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/08_asymmetric-encryption-algorithms/01_asymmetric-encryption-algorithms.en.txt
4.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/01_common-third-party-tools.en.srt
4.6 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/04_cyber-threat-hunting-cycle/01_cyber-threat-hunting-cycle.en.srt
4.6 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.en.txt
4.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/02_web-scripting.en.srt
4.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/14_windows-net-command/01_windows-net-command.en.txt
4.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/14_applications-log/01_applications-log.en.srt
4.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/08_networking-practice-quiz_quiz.html
4.5 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/06_cvss-v3-0-scoring/01_cvss-v3-0-scoring.en.srt
4.5 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/05_host-based-malware-protection-practice-exam_quiz.html
4.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/05_domain-generation-algorithm_instructions.html
4.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/02_history-and-benefits-of-linux/01_history-and-benefits-of-linux.en.srt
4.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/22_windows-registry/01_windows-registry.en.txt
4.5 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/02_security-analytics/03_security-analytics-practice-quiz_quiz.html
4.5 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/05_access-control-models/01_access-control-models.en.txt
4.5 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/02_soc-tools-and-their-features.en.txt
4.5 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/04_acls-with-the-established-option/01_acls-with-the-established-option.en.txt
4.5 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/05_soc-metrics/01_soc-metrics.en.srt
4.5 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/03_incident-response-workflow/01_incident-response-workflow.en.txt
4.4 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/10_soc-relevant-data-and-security-event-data-practice-quiz_quiz.html
4.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/06_state-sponsored-nation-state-actors_instructions.html
4.4 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/03_host-based-antivirus/01_host-based-antivirus.en.txt
4.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/01_system-logs.en.txt
4.4 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/01_soc-workflow-automation-example.en.txt
4.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/25_altered-disk-image/02_software-image-verification_instructions.html
4.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/06_file-properties-and-permissions/02_file-properties-and-permissions_instructions.html
4.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/18_data-loss-detection-using-netflow-example/01_data-loss-detection-using-netflow-example.en.txt
4.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/20_managing-services-in-sysv-environments/02_managing-services-in-sysv-environments_instructions.html
4.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/04_uri-and-url_instructions.html
4.4 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/10_csirt-incident-handling-services/03_csirt-incident-handling-services-practice-quiz_quiz.html
4.4 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/04_incident-response-policy-elements/02_incident-response-policy-elements_instructions.html
4.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/02_dns-operations.en.txt
4.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/07_cvss-v3-0-example/01_cvss-v3-0-example.en.srt
4.3 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/08_csirt-categories/01_csirt-categories.en.srt
4.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/20_managing-services-in-sysv-environments/03_systemd-service-manager_instructions.html
4.3 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/07_sandboxing/01_sandboxing.en.srt
4.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/18_overview-of-secure-shell-protocol/01_overview-of-secure-shell-protocol.en.srt
4.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/15_controlling-startup-services-and-executing-system-shutdown/03_windows-system-shutdown_instructions.html
4.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/01_system-initialization.en.txt
4.3 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/10_applying-the-kill-chain-model/01_applying-the-kill-chain-model.en.txt
4.3 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/06_authentication-authorization-and-account/01_authentication-authorization-and-accounting.en.txt
4.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/10_web-proxy-log/01_web-proxy-log.en.srt
4.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/06_exploit-kits_instructions.html
4.3 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/01_other-security-data-manipulation.en.srt
4.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/08_sql-operations/04_sql-commands_instructions.html
4.3 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/06_soc-types-and-staffing-considerations-practice-quiz_quiz.html
4.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/05_cvss-v3-0-environmental-metrics_instructions.html
4.2 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/03_legacy-tcp-ip-vulnerabilities/02_legacy-tcp-ip-vulnerabilities.en.txt
4.2 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/07_soc-tools-and-their-features-practice-quiz_quiz.html
4.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/02_cyber-threat-hunting-concepts/01_cyber-threat-hunting-concepts.en.srt
4.2 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/06_veris-community-database/03_veris-community-database-practice-quiz_quiz.html
4.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/01_linux-architecture.en.txt
4.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/16_piping-command-output/01_piping-command-output.en.srt
4.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/27_executables-vs-interpreters/03_executables-vs-interpreters-practice-quiz_instructions.html
4.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/17_network-behavior-anomaly-detection/01_network-behavior-anomaly-detection.en.txt
4.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/02_common-metasploit-payloads.en.txt
4.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/17_intellectual-property/04_a-pervasive-security-culture_instructions.html
4.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/08_hot-threat-dashboard/02_hot-threat-dashboard_instructions.html
4.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/02_smtp-operations.en.txt
4.2 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/05_icmp-vulnerabilities/02_icmp-vulnerabilities.en.txt
4.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/09_session-data/01_session-data.en.srt
4.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/14_use-case-ssl-tls/01_use-case-ssl-tls.en.txt
4.2 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/05_application-allowed-lists-and-blocked-lists/01_application-allowed-lists-and-blocked-lists.en.txt
4.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/07_windows-event-viewer/01_windows-event-viewer.en.srt
4.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/27_executables-vs-interpreters/01_executables-vs-interpreters.en.txt
4.1 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/09_mitre-attack-tm-framework-practice-exam_quiz.html
4.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/10_http-operations-practice-exam_quiz.html
4.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/10_use-case-ssh/02_use-case-ssh_instructions.html
4.1 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/04_host-intrusion-prevention-system/01_host-intrusion-prevention-system.en.txt
4.1 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/01_what-is-in-a-play.en.txt
4.1 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/13_security-tools-reference/01_security-tools-reference.en.txt
4.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/11_emergency-alternate-startup-options/01_emergency-alternate-startup-options.en.txt
4.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/05_types-of-files-used-in-compiling-software_instructions.html
4.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/04_local-users-and-user-groups_instructions.html
4.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/02_reconnaissance-attacks_instructions.html
4.0 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/03_threat-investigation-example-china-chopper-remote-access-trojan/02_threat-investigation-example-china-chopper-remote-access-trojan.en.srt
4.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/03_environment-variables-and-shell-variables_instructions.html
4.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/12_shutting-down-the-system/01_shutting-down-the-system.en.srt
4.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/06_key-management-practice-quiz_quiz.html
4.0 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/13_correlating-nsm-data/01_correlating-nsm-data.en.txt
4.0 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/09_security-incident-investigation-procedures-practice-quiz_quiz.html
4.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/09_dns-log/01_dns-log.en.txt
4.0 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/13_correlating-nsm-data/03_correlating-nsm-data-practice-quiz_quiz.html
3.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/01_key-management.en.txt
3.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/14_information-security-confidentiality-integrity-and-availability/03_information-security-confidentiality-integrity-and-availability-practice-quiz_quiz.html
3.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/14_interacting-with-linux/03_gui-vs-shell_instructions.html
3.9 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/05_soc-workflow-automation-example.en.txt
3.9 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/01_common-vulnerability-scoring-system.en.txt
3.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/03_special-file-system-structures_instructions.html
3.9 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/09_network-security-monitoring-tools/01_network-security-monitoring-tools.en.srt
3.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/20_http-302-cushioning/02_http-302-cushioning.en.txt
3.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/04_windows-processes-threads-and-handles/02_windows-processes-threads-and-handles_instructions.html
3.9 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/06_common-vulnerability-scoring-system-practice-quiz_quiz.html
3.9 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/09_network-security-monitoring-tools/02_network-security-monitoring-tools_instructions.html
3.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/06_windows-services/01_windows-services.en.srt
3.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/05_log-data-search/04_log-data-search-practice-quiz_quiz.html
3.9 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/04_pcap-analysis/01_pcap-analysis.en.srt
3.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/03_windows-operating-system-architecture/03_user-mode_instructions.html
3.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/14_information-security-confidentiality-integrity-and-availability/01_information-security-overview.en.srt
3.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/01_running-software-on-linux.en.txt
3.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/11_alert-data/01_alert-data.en.txt
3.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/01_ips-evasion-techniques.en.txt
3.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/18_overview-of-secure-shell-protocol/03_securely-copying-files-between-hosts_instructions.html
3.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/03_windows-operating-system-architecture/04_kernel-mode_instructions.html
3.8 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/05_repeatable-tasks_instructions.html
3.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/20_http-302-cushioning/05_http-302-cushioning-practice-exam_quiz.html
3.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/16_cross-site-scripting/03_topic-introduction_instructions.html
3.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/05_encryption-overview/04_encryption-overview-practice-quiz_quiz.html
3.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/05_basic-file-system-navigation-and-management-commands/01_basic-file-system-navigation-and-management-commands.en.txt
3.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/11_obfuscated-javascript/03_obfuscated-javascript_instructions.html
3.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/12_shutting-down-the-system/02_shutting-down-the-system_instructions.html
3.8 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/10_applying-the-kill-chain-model/03_applying-the-kill-chain-model-practice-quiz_quiz.html
3.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/08_sql-operations/02_sql-operations.en.srt
3.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/04_file-naming-conventions_instructions.html
3.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/17_intellectual-property/02_information-assets_instructions.html
3.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/11_diamond-model-overview/03_diamond-model-overview-practice-quiz_quiz.html
3.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/07_http-status-codes_instructions.html
3.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/13_reflection-and-amplification-attacks/01_reflection-and-amplification-attacks.en.txt
3.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/12_shellcode-and-exploits/02_shellcode-and-exploits.en.txt
3.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/04_file-system-types_instructions.html
3.7 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/04_external-stakeholders-practice-quiz_quiz.html
3.7 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/03_packet-filtering-with-acls/01_packet-filtering-with-acls.en.txt
3.7 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/08_file-integrity-checking/02_file-integrity-checking_instructions.html
3.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/02_windows-file-system-overview_instructions.html
3.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/15_cipher-suite/04_cipher-suite-practice-quiz_quiz.html
3.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/05_selector-syntax_instructions.html
3.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/02_windows-operating-system-history/02_windows-operating-system-history_instructions.html
3.7 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/12_threat-analytic-systems/01_threat-analytic-systems.en.txt
3.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/20_managing-services-in-sysv-environments/01_managing-services-in-sysv-environments.en.txt
3.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/14_interacting-with-linux/01_interacting-with-linux.en.txt
3.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/11_obfuscated-javascript/01_obfuscated-javascript.en.txt
3.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/15_personally-identifiable-information/01_personally-identifiable-information.en.txt
3.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/10_transaction-data/01_transaction-data.en.srt
3.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/06_full-packet-capture/01_full-packet-capture.en.txt
3.6 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/06_security-onion-overview-practice-quiz_quiz.html
3.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/04_https-operations_instructions.html
3.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/11_digital-signatures/01_digital-signatures.en.txt
3.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/01_windows-networking.en.txt
3.6 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.en.txt
3.6 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/01_soc-wms-concepts.en.txt
3.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/29_system-applications/04_database_instructions.html
3.6 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/02_veris-overview/03_practice-quiz_quiz.html
3.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/25_configuring-remote-syslog/01_configuring-remote-syslog.en.srt
3.6 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/10_transaction-data/03_transaction-data-practice-quiz_quiz.html
3.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/03_dynamic-dns/02_dynamic-dns.en.srt
3.6 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/03_soc-models-and-their-consumers_instructions.html
3.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/06_cryptanalysis/03_cryptanalysis-practice-quiz_quiz.html
3.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/29_system-applications/01_system-applications.en.srt
3.6 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/11_man-in-the-middle-attacks/01_man-in-the-middle-attacks.en.txt
3.6 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/04_security-orchestration-automation-and-response/04_security-orchestration-automation-and-response-practice-quiz_quiz.html
3.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/14_use-case-ssl-tls/04_web-browser-security-warnings_instructions.html
3.5 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/01_introduction/02_i_instructions.html
3.5 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/04_interaction-of-different-roles-within-the-soc-practice-quiz_quiz.html
3.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/04_general-command-structure_instructions.html
3.5 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/03_report-identification_instructions.html
3.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/07_packet-captures/01_packet-captures.en.txt
3.5 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/08_hot-threat-dashboard/01_hot-threat-dashboard.en.txt
3.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/16_regulatory-compliance/01_regulatory-compliance.en.srt
3.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/04_hacktivists_instructions.html
3.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/08_root-and-sudo/02_root-and-sudo_instructions.html
3.5 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/05_challenges-of-a-soc/03_challenges-of-a-soc-practice-quiz_quiz.html
3.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/05_server-side-and-client-side-scripting_instructions.html
3.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/04_fully-qualified-vs-relative-file-references_instructions.html
3.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/14_directory-traversal/02_directory-traversal.en.txt
3.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/22_gaining-access-and-control/01_gaining-access-and-control.en.txt
3.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/13_next-generation-firewall-log/01_next-generation-firewall-log.en.srt
3.4 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/03_cryptography-overview/02_cryptography-overview_instructions.html
3.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/17_monitoring-system-resources/01_monitoring-system-resources.en.txt
3.4 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/01_introduction/03_overview-of-cryptography_instructions.html
3.4 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/04_internal-stakeholders-practice-quiz_quiz.html
3.4 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/03_evidence/01_evidence.en.txt
3.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/06_action-syntax_instructions.html
3.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/06_https-operations-practice-exam_quiz.html
3.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/02_history-and-benefits-of-linux/02_history-and-benefits-of-linux_instructions.html
3.4 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/07_regulatory-compliance-incident-response-requirements/01_regulatory-compliance-incident-response-requirements.en.srt
3.4 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/12_threat-analytic-systems/03_threat-analytic-systems-practice-quiz_quiz.html
3.4 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/02_soc-roles/05_soc-roles-practice-quiz_quiz.html
3.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/11_security-intelligence/03_security-intelligence-practice-quiz_quiz.html
3.3 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/04_soc-tools-and-their-features-cont.en.srt
3.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/03_windows-operating-system-architecture/05_windows-operating-system-architecture-practice-quiz_quiz.html
3.3 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/04_soc-models-and-their-consumers-practice-quiz_quiz.html
3.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/01_windows-domains-and-local-user-accounts.en.txt
3.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/09_diffie-hellman-key-agreement/01_diffie-hellman-key-agreement.en.txt
3.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/24_encapsulation/01_encapsulation_instructions.html
3.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/05_encryption-overview/03_encryption-algorithm-features_instructions.html
3.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/09_ips-evasion-techniques-practice-quiz_quiz.html
3.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/09_publicly-available-threat-awareness-resources/03_spamhaus-project_instructions.html
3.3 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/03_time-to-detection/01_time-to-detection.en.srt
3.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/17_punycode/02_punycode.en.txt
3.2 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/02_nat-fundamentals/03_nat-requirements_instructions.html
3.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/05_encryption-overview/01_encryption-overview.en.txt
3.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/07_exploit-kits-practice-exam_quiz.html
3.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/24_common-windows-server-functions/01_common-windows-server-functions.en.txt
3.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/24_viewing-network-traffic/01_viewing-network-traffic.en.txt
3.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/04_packet-capture-using-tcpdump-cont_instructions.html
3.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/02_understanding-the-network-design/02_topic-introduction_instructions.html
3.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/03_windows-operating-system-architecture/01_windows-operating-system-architecture.en.txt
3.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/03_dynamic-dns/04_dynamic-dns_instructions.html
3.2 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/10_csirt-incident-handling-services/01_csirt-incident-handling-services.en.txt
3.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/15_sql-injection/02_sql-injection.en.txt
3.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/04_windows-processes-threads-and-handles/01_windows-processes-threads-and-handles.en.txt
3.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/15_sql-injection/03_topic-introduction_instructions.html
3.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/03_topic-introduction_instructions.html
3.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/04_configuring-syslog_instructions.html
3.2 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/03_threat-investigation-example-china-chopper-remote-access-trojan/04_threat-investigation-example-china-chopper-remote-access-trojan-practice-quiz_quiz.html
3.2 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/05_delivery/01_delivery.en.srt
3.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/12_windows-cli/03_file-and-directory-references-from-the-command-line_instructions.html
3.2 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/05_incident-attack-categories/01_incident-attack-categories.en.txt
3.2 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/02_soc-defined/01_soc-defined.en.txt
3.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/12_applying-the-diamond-model/01_applying-the-diamond-model.en.srt
3.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/08_asymmetric-encryption-algorithms/03_asymmetric-encryption-algorithms-practice-quiz_quiz.html
3.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/05_controlling-services-and-processes-practice-quiz_quiz.html
3.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/30_lightweight-directory-access-protocol/02_lightweight-directory-access-protocol_instructions.html
3.2 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/02_soc-interaction-with-other-departments/01_soc-interaction-with-other-departments.en.srt
3.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/28_using-package-managers-to-install-software-in-linux/02_using-package-managers-to-install-software-in-linux_instructions.html
3.1 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/02_address-resolution-protocol/03_the-arp-a-command_instructions.html
3.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/30_lightweight-directory-access-protocol/01_lightweight-directory-access-protocol.en.srt
3.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/06_x-509_instructions.html
3.1 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/09_what-is-in-a-play-practice-quiz_quiz.html
3.1 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/03_veris-incidents-structure/03_veris-incidents-structure-practice-quiz_quiz.html
3.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/23_testing-name-resolution/01_testing-name-resolution.en.srt
3.1 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/09_csirt-framework/03_csirt-framework-practice-quiz_quiz.html
3.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/05_log-data-search/03_modeling-network-attacks_instructions.html
3.1 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/06_cvss-v3-0-scoring/02_cvss-v3-0-scoring_instructions.html
3.1 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/03_kill-chain-phase-1-reconnaissance/01_kill-chain-phase-1-reconnaissance.en.txt
3.1 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/04_kill-chain-phase-2-weaponization/01_weaponization.en.srt
3.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/05_netflow-as-a-security-tool-practice-quiz_quiz.html
3.1 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/08_hot-threat-dashboard/05_hot-threat-dashboard-practice-quiz_quiz.html
3.1 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/05_windows-virtual-memory-address-space/01_windows-virtual-memory-address-space.en.srt
3.1 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/06_reference-us-cert-incident-categories/01_reference-us-cert-incident-categories.en.txt
3.1 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/01_security-incident-investigation-procedures.en.txt
3.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/23_peer-to-peer-networks/05_detecting-malicious-encrypted-p2p-traffic_instructions.html
3.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/08_firewall-log/03_firewall-log-practice-quiz_quiz.html
3.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/07_pki-overview-practice-quiz_quiz.html
3.1 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/02_security-data-aggregation/01_security-data-aggregation.en.txt
3.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/18_dns-tunneling/02_dns-tunneling.en.srt
3.1 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/02_soc-wms-concepts_instructions.html
3.1 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/02_cyber-threat-hunting-concepts/02_cyber-threat-hunting-concepts_instructions.html
3.0 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/03_hunting-maturity-model/01_hunting-maturity-model.en.txt
3.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/02_topic-introduction_instructions.html
3.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/02_exploit-kits.en.srt
3.0 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/06_bpf-syntax-examples_instructions.html
3.0 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/05_soc-metrics/03_soc-metrics-practice-quiz_quiz.html
3.0 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/03_common-soc-services/03_common-soc-services-practice-quiz_quiz.html
3.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/14_directory-traversal/04_directory-traversal-practice-exam_quiz.html
3.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/07_dns-rr-types_instructions.html
3.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/11_obfuscated-javascript/04_obfuscated-javascript-practice-exam_quiz.html
3.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/02_understanding-the-network-design/01_understanding-network-design.en.srt
3.0 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/05_common-vulnerability-scoring-system/02_common-vulnerability-scoring-system_instructions.html
3.0 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/03_common-soc-services/01_common-soc-services.en.srt
3.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/12_shellcode-and-exploits/04_shellcode-and-exploits-practice-exam_quiz.html
3.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/21_gaining-access-via-web-based-attacks/04_gaining-access-via-web-based-attacks-practice-exam_quiz.html
3.0 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/06_full-packet-capture/03_full-packet-capture-practice-quiz_quiz.html
3.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/06_disks-and-file-systems-practice-quiz_quiz.html
3.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/05_basic-file-system-navigation-and-management-commands/03_changing-directories_instructions.html
3.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/07_udp-vulnerabilities/02_udp-vulnerabilities.en.txt
3.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/01_hash-algorithms.en.txt
3.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/17_nsa-suite-b/03_nsa-suite-b-practice-quiz_quiz.html
3.0 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/02_address-resolution-protocol/04_address-resolution-protocol-practice-quiz_quiz.html
3.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/03_file-system-paths_instructions.html
2.9 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/06_soc-workflow-automation-example-practice-quiz_quiz.html
2.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/04_security-orchestration-automation-and-response/02_soar-capabilities_instructions.html
2.9 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/05_wms-integration-approaches_instructions.html
2.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/21_gaining-access-via-web-based-attacks/02_gaining-access-via-web-based-attacks.en.txt
2.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/10_windows-gui/01_windows-gui.en.txt
2.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/23_peer-to-peer-networks/06_peer-to-peer-networks-practice-quiz_quiz.html
2.9 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/04_incident-response-policy-elements/01_incident-response-policy-elements.en.srt
2.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/03_system-initialization_instructions.html
2.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/02_windows-operating-system-history/03_windows-operating-system-history-practice-quiz_quiz.html
2.9 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/05_soc-metrics/01_soc-metrics.en.txt
2.9 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/02_cyber-threat-hunting-concepts/03_cyber-threat-hunting-concepts-practice-quiz_quiz.html
2.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/02_web-scripting.en.txt
2.9 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/07_load-balancing/03_load-balancing-practice-quiz_quiz.html
2.9 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/12_windows-cli/01_windows-cli.en.txt
2.9 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/02_security-data-aggregation/03_security-data-aggregation-practice-quiz_quiz.html
2.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/07_insider-threat_instructions.html
2.9 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/04_kill-chain-phase-2-weaponization/03_kill-chain-phase-2-weaponization-practice-quiz_quiz.html
2.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/10_use-case-ssh/01_use-case-ssh.en.srt
2.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/12_aaa-server-log/01_aaa-server-log.en.srt
2.9 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/01_topic-introduction_instructions.html
2.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/06_web-scripting-practice-exam_quiz.html
2.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/11_digital-signatures/05_digital-signatures-practice-quiz_quiz.html
2.8 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/01_introduction/01_introduction-to-conducting-security-incident-investigations_instructions.html
2.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/03_dynamic-dns/05_dynamic-dns-practice-exam_quiz.html
2.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/28_using-package-managers-to-install-software-in-linux/01_using-package-managers-to-install-software-in-linux.en.txt
2.8 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/04_security-controls-detection-effectiveness/01_security-controls-detection-effectiveness.en.srt
2.8 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/02_http-2-operations_instructions.html
2.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/02_understanding-the-network-design/03_understanding-the-network-design-practice-quiz_quiz.html
2.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/11_network-security-monitoring-data-types_instructions.html
2.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/02_windows-operating-system-history/01_windows-operating-system-history.en.srt
2.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/06_dns-risk-and-mitigation-tool-practice-quiz_quiz.html
2.8 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/05_security-data-normalization/01_security-data-normalization.en.txt
2.8 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/11_security-intelligence/01_security-intelligence.en.txt
2.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/05_key-length-issues_instructions.html
2.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/17_intellectual-property/01_intellectual-property_instructions.html
2.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/12_network-security-monitoring-data-types-practice-quiz_quiz.html
2.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/30_lightweight-directory-access-protocol/03_lightweight-directory-access-protocol-practice-quiz_quiz.html
2.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/08_firewall-log/01_firewall-log.en.txt
2.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/03_legacy-tcp-ip-vulnerabilities/04_legacy-tcp-ip-vulnerabilities-practice-quiz_quiz.html
2.8 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/01_other-security-data-manipulation.en.txt
2.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/02_impact-of-cryptography-on-security-investigations/05_impact-of-cryptography-on-security-investigations-practice-quiz_quiz.html
2.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/06_linux-command-shell-concepts-practice-quiz_quiz.html
2.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/23_peer-to-peer-networks/02_bittorrent-application_instructions.html
2.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/23_windows-management-instrumentation/02_windows-management-instrumentation_instructions.html
2.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/07_tcp-vulnerabilities-practice-quiz_quiz.html
2.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/10_web-proxy-log/01_web-proxy-log.en.txt
2.8 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/08_file-integrity-checking/03_file-integrity-checking-practice-exam_quiz.html
2.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/24_encapsulation/04_encapsulation-practice-quiz_quiz.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/05_windows-virtual-memory-address-space/03_windows-virtual-memory-address-space-practice-quiz_quiz.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/07_editing-file-properties/03_editing-file-properties-practice-quiz_quiz.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/05_configuring-basic-properties-ip-subnet-mask-gateway_instructions.html
2.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/13_mitre-attack-tm-framework/03_getting-started-with-the-mitre-att-ck-framework_instructions.html
2.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/08_kill-chain-phase-6-command-and-control/01_kill-chain-phase-6-command-and-control.en.srt
2.7 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/07_analysis_instructions.html
2.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/05_icmp-vulnerabilities/01_icmp-protocol_instructions.html
2.7 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/02_cyber-threat-hunting-concepts/01_cyber-threat-hunting-concepts.en.txt
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/25_configuring-remote-syslog/03_testing-your-logging-configuration_instructions.html
2.7 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/03_soc-environment-today_quiz.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/05_basic-file-system-navigation-and-management-commands/04_copying-and-moving-files_instructions.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/02_history-and-benefits-of-linux/01_history-and-benefits-of-linux.en.txt
2.7 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/05_application-allowed-lists-and-blocked-lists/04_application-allowed-lists-and-blocked-lists-practice-exam_quiz.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/08_root-and-sudo/01_root-and-sudo.en.txt
2.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/18_dns-tunneling/04_dns-tunneling-practice-exam_quiz.html
2.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/11_email-proxy-log/01_email-proxy-log.en.srt
2.7 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/03_host-based-antivirus/03_host-based-antivirus-practice-exam_quiz.html
2.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/17_intellectual-property/03_threat-spectrum_instructions.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/11_run-as-administrator/03_run-as-administrator-practice-quiz_quiz.html
2.7 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/01_veris-4-a-s.en.txt
2.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/03_kill-chain-phase-1-reconnaissance/03_kill-chain-phase-1-reconnaissance-practice-quiz_quiz.html
2.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/09_session-data/01_session-data.en.txt
2.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/07_pki-operations-practice-quiz_quiz.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/05_run-levels_instructions.html
2.7 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/08_csirt-categories/01_csirt-categories.en.txt
2.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/11_alert-data/03_alert-data-practice-quiz_quiz.html
2.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/07_practice-quiz_quiz.html
2.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/15_personally-identifiable-information/03_personally-identifiable-information-practice-quiz_quiz.html
2.7 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/03_host-based-personal-firewall-practice-exam_quiz.html
2.7 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/06_event-correlation/03_event-correlation-practice-quiz_quiz.html
2.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/11_man-in-the-middle-attacks/03_man-in-the-middle-attacks-practice-quiz_quiz.html
2.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/10_access-attacks/02_access-attacks_instructions.html
2.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/05_organized-crime_instructions.html
2.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/05_kill-chain-phase-3-delivery/03_kill-chain-phase-3-delivery-practice-quiz_quiz.html
2.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/08_kill-chain-phase-6-command-and-control/03_kill-chain-phase-6-delivery-practice-quiz_quiz.html
2.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/04_recursive-dns-query/02_recursive-dns-query.en.srt
2.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/12_system-processes-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/05_netflow-practice-quiz_quiz.html
2.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/11_digital-signatures/02_digital-signatures_instructions.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/07_sandboxing/04_sandboxing-practice-exam_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/02_https-operations.en.txt
2.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/05_public-key-cryptography-standards_instructions.html
2.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/04_exploit-kits.en.txt
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/03_practice-quiz_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/04_linux-process-creation_instructions.html
2.6 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/12_denial-of-service-and-distributed-denial-of-service/04_denial-of-service-and-distributed-denial-of-service-practice-quiz_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/07_windows-networking-practice-quiz_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/12_windows-cli/04_practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/14_applications-log/03_applications-log-practice-quiz_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/05_testing-network-connectivity_instructions.html
2.6 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/04_cyber-threat-hunting-cycle/03_cyber-threat-hunting-cycle-practice-quiz_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/06_windows-services/03_windows-services-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/11_email-proxy-log/03_email-proxy-log-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/09_publicly-available-threat-awareness-resources/01_publicly-available-threat-awareness-resources.en.txt
2.6 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/04_workflow-types_instructions.html
2.6 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/06_cvss-v3-0-scoring/03_practice-quiz_quiz.html
2.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/09_diffie-hellman-key-agreement/03_diffie-hellman-key-agreement-practice-quiz_quiz.html
2.6 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/01_soc-wms-integration.en.txt
2.6 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/06_soc-wms-integration-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/22_gaining-access-and-control/03_nyetya-ransomware-event_instructions.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/08_file-integrity-checking/01_file-integrity-checking.en.srt
2.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/15_sql-injection/01_sql-injection_instructions.html
2.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/19_pivoting/04_pivoting-practice-exam_quiz.html
2.6 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/02_incident-response-planning/01_incident-response-planning.en.srt
2.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/07_symmetric-encryption-algorithms/05_symmetric-encryption-algorithms-practice-quiz_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/09_practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/06_kill-chain-phase-4-exploitation/03_kill-chain-phase-4-delivery-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/06_kill-chain-phase-4-exploitation/01_kill-chain-phase-4-exploitation.en.srt
2.6 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/12_applying-the-diamond-model/03_applying-the-diamond-model-practice-exam_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/18_overview-of-secure-shell-protocol/01_overview-of-secure-shell-protocol.en.txt
2.6 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/05_operational-based-soc_instructions.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/18_windows-boot-process/01_windows-boot-process.en.txt
2.6 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/03_veris-incidents-structure/01_veris-incidents-structure.en.txt
2.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/06_linux-architecture-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/06_kill-chain-phase-4-exploitation/02_kill-chain-phase-4-exploitation_instructions.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/23_windows-management-instrumentation/01_windows-management-instrumentation.en.txt
2.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/23_peer-to-peer-networks/03_risks-of-p2p-file-sharing_instructions.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/04_host-intrusion-prevention-system/03_host-intrusion-prevention-system-practice-exam_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/24_common-windows-server-functions/03_common-windows-server-functions-practice-quiz_quiz.html
2.6 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/02_soc-wms-concepts/06_soc-wms-concepts-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/08_sql-operations/05_sql-operations-practice-exam_quiz.html
2.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/18_windows-boot-process/04_monitoring-system-resources-practice-quiz_quiz.html
2.6 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/03_identifying-anomalies-and-suspicious-behaviors/01_identify-anomalies-and-suspicious-behaviors.en.txt
2.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/09_system-initialization-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/02_classic-kill-chain-model-overview/03_classic-kill-chain-model-overview-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/16_cross-site-scripting/02_cross-site-scripting.en.txt
2.5 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/03_incident-response-life-cycle/03_practice-quiz_quiz.html
2.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/02_impact-of-cryptography-on-security-investigations/03_impact-of-cryptography-on-security-investigations_instructions.html
2.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/07_windows-event-viewer/03_system-logs-practice-quiz_quiz.html
2.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/05_metadata_instructions.html
2.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/03_log-file-locations-and-log-files_instructions.html
2.5 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/07_kill-chain-phase-5-installation/03_kill-chain-phase-5-delivery-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/05_veris-records/01_veris-records.en.srt
2.5 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/09_kill-chain-phase-7-actions-on-objectives/03_kill-chain-phase-7-delivery-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/16_cross-site-scripting/05_cross-site-scripting-practice-exam_quiz.html
2.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/01_ip-protocol_instructions.html
2.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/10_web-proxy-log/03_web-proxy-log-practice-quiz_quiz.html
2.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/06_windows-services/01_windows-services.en.txt
2.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/15_controlling-startup-services-and-executing-system-shutdown/04_windows-net-command-practice-quiz_quiz.html
2.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/07_testing-connectivity_instructions.html
2.5 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/04_security-controls-detection-effectiveness/03_security-controls-detection-effectiveness-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/17_punycode/04_punycode-practice-exam_quiz.html
2.5 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/03_time-to-detection/03_time-to-detection-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/25_altered-disk-image/03_secure-boot_instructions.html
2.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/13_windows-powershell/06_windows-cli-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/08_csirt-categories/03_csirt-categories-practice-quiz_quiz.html
2.5 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/10_event-sources-practice-quiz_quiz.html
2.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/03_security-onion.en.txt
2.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/06_attack-surface-and-attack-vectors-practice-quiz_quiz.html
2.5 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/09_session-data/03_session-data-practice-quiz_quiz.html
2.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/01_common-third-party-tools.en.txt
2.5 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/04_cyber-threat-hunting-cycle/01_cyber-threat-hunting-cycle.en.txt
2.5 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/09_network-security-monitoring-tools/01_network-security-monitoring-tools.en.txt
2.4 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/02_network-baselining/01_network-baselining.en.srt
2.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/04_ip-vulnerabilities-practice-quiz_quiz.html
2.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/28_using-package-managers-to-install-software-in-linux/04_package-managers_instructions.html
2.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/14_information-security-confidentiality-integrity-and-availability/01_information-security-overview.en.txt
2.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/16_piping-command-output/03_piping-command-output-practice-quiz_quiz.html
2.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/08_sql-operations/02_sql-operations.en.txt
2.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/05_icmp-vulnerabilities/04_icmp-vulnerabilities-practice-quiz_quiz.html
2.4 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/02_nat-fundamentals/05_nat-fundamentals-practice-quiz_quiz.html
2.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/17_intellectual-property/05_intellectual-property-practice-quiz_quiz.html
2.4 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/03_soc-types-and-staffing-considerations_instructions.html
2.4 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/06_cvss-v3-0-scoring/01_cvss-v3-0-scoring.en.txt
2.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/17_monitoring-system-resources/04_practice-quiz_quiz.html
2.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/14_applications-log/01_applications-log.en.txt
2.4 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/02_pki-operations_instructions.html
2.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/09_reconnaissance-attacks-practice-quiz_quiz.html
2.4 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/04_wrap-up/02_wrap-up.en.srt
2.4 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/01_introduction/01_introduction-to-using-a-playbook-model-to-organize-security-monitoring_instructions.html
2.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/06_practice-quiz_quiz.html
2.4 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/04_pcap-analysis/01_pcap-analysis.en.txt
2.4 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/05_data-query_instructions.html
2.4 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/03_playbook-definition/01_playbook-definition.en.srt
2.4 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/07_kill-chain-phase-5-installation/02_kill-chain-phase-5-installation_instructions.html
2.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/03_windows-domains_instructions.html
2.4 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/18_wrap-up/02_wrap-up.en.srt
2.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/03_overview-of-the-process-for-compiling-code_instructions.html
2.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/06_file-properties-and-permissions/05_file-properties-and-permissions-practice-quiz_quiz.html
2.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/04_windows-processes-threads-and-handles/04_windows-processes-threads-and-handles-practice-quiz_quiz.html
2.4 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/07_packet-capture-using-tcpdump-practice-quiz_quiz.html
2.4 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/05_kill-chain-phase-3-delivery/01_kill-chain-phase-3-delivery.en.srt
2.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/10_windows-gui/05_windows-domains-and-local-user-accounts-practice-quiz_quiz.html
2.4 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/07_kill-chain-phase-5-installation/01_kill-chain-phase-5-installation.en.srt
2.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/25_configuring-remote-syslog/04_configuring-remote-syslog-practice-quiz_quiz.html
2.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/17_network-behavior-anomaly-detection/03_network-behavior-anomaly-detection-practice-quiz_quiz.html
2.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/15_dhcp-attacks/03_dhcp-attacks-practice-quiz_quiz.html
2.3 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/06_extracted-content_instructions.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/08_other-useful-command-line-tools-practice-quiz_quiz.html
2.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/07_cvss-v3-0-example/01_cvss-v3-0-example.en.txt
2.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/03_key-management-components_instructions.html
2.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/07_cvss-v3-0-example/03_cvss-v3-0-scoring-practice-quiz_quiz.html
2.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/14_use-case-ssl-tls/05_use-case-ssl-tls-practice-quiz_quiz.html
2.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/17_nsa-suite-b/02_nsa-suite-b_instructions.html
2.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/14_spoofing-attacks/03_spoofing-attacks-practice-quiz_quiz.html
2.3 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/01_security-onion-overview.en.srt
2.3 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/07_sandboxing/01_sandboxing.en.txt
2.3 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/01_introduction/02_introduction-to-describing-incident-response_instructions.html
2.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/10_access-attacks/03_access-attacks-practice-quiz_quiz.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/11_run-as-administrator/01_run-as-administrator.en.srt
2.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/21_accessing-network-resources-with-windows/04_windows-netstat-command-practice-quiz_quiz.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/07_practice-quiz_quiz.html
2.3 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/01_tcp-protocol_instructions.html
2.3 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/03_evidence/03_evidence-practice-quiz_quiz.html
2.3 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/07_veris-4-a-s-practice-quiz_quiz.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/08_root-and-sudo/03_root-and-sudo-practice-quiz_quiz.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/24_common-windows-server-functions/02_common-windows-server-functions_instructions.html
2.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/13_pki-operations/06_certificate-revocation-check-methods_instructions.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/10_monitoring-i-o_instructions.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/06_practice-quiz_quiz.html
2.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/18_data-loss-detection-using-netflow-example/03_data-loss-detection-using-netflow-example-practice-quiz_quiz.html
2.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/10_other-external-threat-intelligence-sources-and-feeds-reference/01_other-external-threat-intelligence-sources-and-feeds-reference_sneak.php
2.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/17_nsa-suite-b/01_nsa-suite-b.en.srt
2.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/29_system-applications/03_web_instructions.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/23_testing-name-resolution/04_testing-name-resolution_quiz.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/06_windows-file-system-overview-practice-quiz_quiz.html
2.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/01_topic-introduction_instructions.html
2.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/21_the-onion-router/04_the-onion-router-practice-quiz_quiz.html
2.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/14_windows-net-command/03_practice-quiz_quiz.html
2.2 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/02_soc-defined/02_soc-defined_instructions.html
2.2 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/06_event-correlation/01_event-correlation.en.srt
2.2 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/04_security-controls-detection-effectiveness/02_security-controls-detection-effectiveness_instructions.html
2.2 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/09_publicly-available-threat-awareness-resources/04_alexa_instructions.html
2.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/11_emergency-alternate-startup-options/04_live-cd_instructions.html
2.2 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/06_wrap-up/02_wrap-up_instructions.html
2.2 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/02_security-analytics/01_security-analytics.en.srt
2.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/04_hash-algorithms/06_hash-algorithms-practice-quiz_quiz.html
2.2 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/09_csirt-framework/01_csirt-framework.en.srt
2.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/18_overview-of-secure-shell-protocol/04_overview-of-secure-shell-protocol-practice-quiz_quiz.html
2.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/16_regulatory-compliance/03_regulatory-compliance-practice-quiz_quiz.html
2.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/23_emotet-advanced-persistent-threat/02_emotet-advanced-persistent-threat-practice-exam_quiz.html
2.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/16_piping-command-output/01_piping-command-output.en.txt
2.2 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/08_reference_instructions.html
2.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/29_system-applications/05_system-applications-practice-quiz_quiz.html
2.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/22_gaining-access-and-control/04_gaining-access-and-control-practice-quiz_quiz.html
2.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/03_topic-introduction_instructions.html
2.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/09_kill-chain-phase-7-actions-on-objectives/01_kill-chain-phase-7-actions-on-objectives.en.srt
2.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/25_configuring-remote-syslog/02_configuring-remote-syslog_instructions.html
2.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/22_windows-registry/04_security-concerns-regarding-the-windows-registry_instructions.html
2.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/19_pivoting/02_pivoting.en.srt
2.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/16_regulatory-compliance/01_regulatory-compliance.en.txt
2.2 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/06_the-nslookup-command_instructions.html
2.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/07_windows-event-viewer/01_windows-event-viewer.en.txt
2.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/10_network-time-protocol_instructions.html
2.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/02_packet-capture-using-tcpdump_instructions.html
2.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/03_singles_instructions.html
2.2 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/07_statistical-data_instructions.html
2.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/06_kernel-user-relationship-to-the-hardware_instructions.html
2.2 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/08_alert-data_instructions.html
2.1 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/03_playbook-definition/03_playbook-definition-practice-quiz_quiz.html
2.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/05_other-features-of-http-2_instructions.html
2.1 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/02_network-baselining/04_network-baselining-practice-quiz_quiz.html
2.1 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/03_goal-of-a-soc_quiz.html
2.1 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/04_whois_instructions.html
2.1 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/02_soc-wms-integration-overeview_instructions.html
2.1 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/03_threat-investigation-example-china-chopper-remote-access-trojan/02_threat-investigation-example-china-chopper-remote-access-trojan.en.txt
2.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/15_sql-injection/05_sql-injection-practice-exam_quiz.html
2.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/26_wrap-up/02_wrap-up.en.srt
2.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/02_linux-architecture_instructions.html
2.1 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/09_wrap-up/02_wrap-up.en.srt
2.1 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/04_full-packet-capture_instructions.html
2.1 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/04_pki-terminology-and-components_instructions.html
2.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/03_identifying-the-processes_instructions.html
2.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/12_shutting-down-the-system/01_shutting-down-the-system.en.txt
2.1 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/05_playbook-management-system/01_playbook-management-system.en.srt
2.1 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/16_wrap-up/02_wrap-up.en.srt
2.1 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/01_external-stakeholders_instructions.html
2.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/26_wrap-up/02_wrap-up.en.srt
2.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/08_http-2-operations-practice-exam_quiz.html
2.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/07_common-metasploit-payloads-practice-exam_quiz.html
2.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/12_aaa-server-log/03_aaa-server-log-practice-quiz_quiz.html
2.0 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/03_incident-response-workflow/04_incident-response-workflow-practice-quiz_quiz.html
2.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/04_user-space_instructions.html
2.0 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/01_introduction/02_introduction-to-developing-key-relationships-with-internal-and-external.en.srt
2.0 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/18_dns-tunneling/02_dns-tunneling.en.txt
2.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/02_history-and-benefits-of-linux/03_history-and-benefits-of-linux-practice-quiz_quiz.html
2.0 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/14_wrap-up/02_wrap-up.en.srt
2.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/03_zero-trust-model/05_zero-trust-model-security-vision_instructions.html
2.0 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/04_kill-chain-phase-2-weaponization/01_weaponization.en.txt
2.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/24_encapsulation/03_other-tunnels_instructions.html
2.0 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/06_wrap-up/01_wrap-up.en.srt
2.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/09_dns-log/03_dns-log-practice-quiz_quiz.html
2.0 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/05_assets_instructions.html
2.0 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/05_transaction-data_instructions.html
2.0 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/04_how-linux-controls-the-boot-process_instructions.html
2.0 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/01_introduction/01_introduction-to-identifying-malicious-activity_instructions.html
2.0 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/06_authentication-authorization-and-account/03_authentication-authorization-and-account-practice-quiz_quiz.html
2.0 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/10_wrap-up/02_wrap-up.en.srt
2.0 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/06_wrap-up/02_wrap-up.en.srt
2.0 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/06_other-data-types-practice-quiz_quiz.html
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/03_session-data_instructions.html
1.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/07_http-2-operations/07_http-2-vulnerabilities_instructions.html
1.9 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/03_dynamic-dns/02_dynamic-dns.en.txt
1.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/07_packet-captures/03_packet-capture-practice-quiz_quiz.html
1.9 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/03_identifying-anomalies-and-suspicious-behaviors/03_identifying-anomalies-and-suspicious-behaviors-practice-quiz_quiz.html
1.9 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/06_wrap-up/02_wrap-up.en.srt
1.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/10_transaction-data/01_transaction-data.en.txt
1.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/13_next-generation-firewall-log/03_next-generation-firewall-log-practice-quiz_quiz.html
1.9 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/11_wrap-up/02_wrap-up.en.srt
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/02_goal-of-a-soc_instructions.html
1.9 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/02_classic-kill-chain-model-overview/01_classic-kill-chain-model-overview.en.srt
1.9 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/09_network-security-monitoring-tools/03_network-security-monitoring-tools_quiz.html
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/04_compliance-based-soc_instructions.html
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/09_external-data_instructions.html
1.9 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/08_attack-surface-and-attack-vectors/02_attack-surface-and-attack-vectors_instructions.html
1.9 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/05_delivery/03_delivery-practice-quiz_quiz.html
1.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/02_understanding-the-network-design/01_understanding-network-design.en.txt
1.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/25_configuring-remote-syslog/01_configuring-remote-syslog.en.txt
1.9 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/14_wrap-up/02_wrap-up.en.srt
1.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/25_altered-disk-image/01_altered-disk-image_instructions.html
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/01_internal-stakeholders_instructions.html
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/02_soc-roles/01_topic-introduction-to-soc-roles_instructions.html
1.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/29_system-applications/01_system-applications.en.txt
1.9 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/07_running-software-on-linux-practice-quiz_quiz.html
1.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/09_indicator-of-compromise_instructions.html
1.9 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/05_encryption-and-tunneling_instructions.html
1.9 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/01_introduction/01_introduction.en.srt
1.9 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/05_playbook-management-system/03_playbook-management-system-quiz_quiz.html
1.9 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/04_transaction-data_instructions.html
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/05_soc-workflow-automation-example/04_wms-products_instructions.html
1.9 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/01_introduction/02_introduction-to-soc-deployment-models-and-types.en.srt
1.9 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/10_use-case-ssh/01_use-case-ssh.en.txt
1.8 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/08_network-based-malware-protection/03_network-based-malware-protection-practice-quiz_quiz.html
1.8 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/04_incident-response-policy-elements/01_incident-response-policy-elements.en.txt
1.8 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/07_udp-vulnerabilities/01_udp-protocol_instructions.html
1.8 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/04_wrap-up/02_wrap-up.en.srt
1.8 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/08_wrap-up/02_wrap-up.en.srt
1.8 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/12_pki-overview/01_pki-overview_instructions.html
1.8 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/02_soc-interaction-with-other-departments/02_soc-interaction-with-other-departments_instructions.html
1.8 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/01_introduction/02_introduction-to-identifying-resources-for-hunting-cyber-threats_instructions.html
1.8 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/07_windows-file-system-overview/03_ntfs-basics_instructions.html
1.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/25_altered-disk-image/04_altered-disk-image_quiz.html
1.8 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/01_introduction/02_introduction-to-staffing-an-effective-soc-team.en.srt
1.8 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/13_next-generation-firewall-log/01_next-generation-firewall-log.en.txt
1.8 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/07_regulatory-compliance-incident-response-requirements/01_regulatory-compliance-incident-response-requirements.en.txt
1.8 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/03_packet-filtering-with-acls/04_packet-filtering-with-acls-practice-quiz_quiz.html
1.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/01_lesson-introduction/02_course-introduction-to-understanding-linux-operating-system-basics.en.srt
1.8 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/06_wrap-up/02_wrap-up.en.srt
1.8 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/06_wrap-up/01_wrap-up.en.srt
1.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/05_basic-file-system-navigation-and-management-commands/05_basic-file-system-navigation-and-management-commands-practice-quiz_quiz.html
1.8 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/08_kill-chain-phase-6-command-and-control/01_kill-chain-phase-6-command-and-control.en.txt
1.8 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/04_wrap-up/02_wrap-up.en.srt
1.8 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/04_soc-tools-and-their-features-cont.en.txt
1.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/20_managing-services-in-sysv-environments/04_managing-services-in-sysv-environments-practice-quiz_quiz.html
1.8 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/04_soc-wms-integration/04_wms-integration-with-siem_instructions.html
1.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/03_security-information-and-event-management-systems/03_security-information-and-event-management-systems-practice-quiz_quiz.html
1.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/12_shutting-down-the-system/03_shutting-down-the-system-practice-quiz_quiz.html
1.8 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/02_running-software-on-linux_instructions.html
1.8 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/06_veris-community-database/01_veris-community-database.en.srt
1.8 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/03_hunting-maturity-model/03_hunting-maturity-model-practice-quiz_quiz.html
1.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/07_alert-data_instructions.html
1.8 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/01_introduction/01_introduction-to-understanding-the-use-of-veris_instructions.html
1.8 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/02_session-data_instructions.html
1.8 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/06_host-based-malware-protection/02_host-based-malware-protection_instructions.html
1.7 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/03_actors-or-agents_instructions.html
1.7 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/04_acls-with-the-established-option/04_acls-with-the-established-option-practice-quiz_quiz.html
1.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/07_udp-vulnerabilities/04_udp-vulnerabilities-practice-quiz_quiz.html
1.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/06_system-logs/02_system-logs_instructions.html
1.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/03_full-packet-capture_instructions.html
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/02_soc-interaction-with-other-departments/03_soc-interaction-with-other-departments-practice-quiz_quiz.html
1.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/11_email-proxy-log/01_email-proxy-log.en.txt
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/04_wrap-up/01_wrap-up_instructions.html
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/04_security-controls-detection-effectiveness/01_security-controls-detection-effectiveness.en.txt
1.7 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/05_delivery/01_delivery.en.txt
1.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/13_reflection-and-amplification-attacks/03_reflection-and-amplification-attacks-practice-quiz_quiz.html
1.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/07_smtp-operations-practice-exam_quiz.html
1.7 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/10_use-case-ssh/03_use-case-ssh-practice-quiz_quiz.html
1.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/02_exploit-kits.en.txt
1.7 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/03_zero-trust-model/06_zero-trust-model-practice-quiz_quiz.html
1.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/05_http-request-methods_instructions.html
1.7 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/04_pcap-analysis/03_pcap-analysis-practice-quiz_quiz.html
1.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/04_recursive-dns-query/02_recursive-dns-query.en.txt
1.7 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/02_incident-response-planning/03_incident-response-planning-practice-quiz_quiz.html
1.7 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/01_lesson-introduction/02_lesson-introduction_instructions.html
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/03_time-to-detection/01_time-to-detection.en.txt
1.7 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/04_incident-response-policy-elements/03_incident-response-life-cycle-practice-quiz_quiz.html
1.7 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/08_file-integrity-checking/01_file-integrity-checking.en.txt
1.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/04_viewing-connection-status_instructions.html
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/01_introduction/02_introduction-to-security-operations-center.en.srt
1.7 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/01_introduction/02_introduction-to-conducting-security-incident-investigations.en.srt
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/04_wrap-up/02_wrap-up.en.srt
1.7 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/01_lesson-introduction/02_introduction-to-exploring-data-type-categories.en.srt
1.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/05_windows-virtual-memory-address-space/01_windows-virtual-memory-address-space.en.txt
1.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/09_dns-operations-practice-exam_quiz.html
1.7 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/08_wrap-up/02_wrap-up.en.srt
1.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/09_disks-and-file-systems/02_disks-and-file-systems_instructions.html
1.7 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/22_exploit-kits/01_exploit-kits_instructions.html
1.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/23_testing-name-resolution/01_testing-name-resolution.en.txt
1.7 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/07_traditional-system-v-bootup_instructions.html
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/01_introduction/01_introduction-to-security-operations-center-processes-and-services.en.srt
1.7 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/09_reconnaissance-attacks/08_vulnerability-scanners_instructions.html
1.7 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/01_introduction/02_introduction-to-understanding-soc-metrics_instructions.html
1.7 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/23_windows-management-instrumentation/03_windows-registry-practice-quiz_quiz.html
1.7 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/12_applying-the-diamond-model/01_applying-the-diamond-model.en.txt
1.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/04_recursive-dns-query/04_recursive-dns-query-practice-exam_quiz.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/24_viewing-network-traffic/02_viewing-network-traffic_instructions.html
1.6 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/15_netflow/04_references_instructions.html
1.6 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/05_incident-attack-categories/03_practice-quiz_quiz.html
1.6 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/02_soc-interaction-with-other-departments/01_soc-interaction-with-other-departments.en.txt
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/28_using-package-managers-to-install-software-in-linux/03_using-package-managers-to-install-software-in-linux_instructions.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/31_wrap-up/02_wrap-up.en.srt
1.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/04_web-scripting_instructions.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/22_windows-registry/05_practice-quiz_quiz.html
1.6 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/05_veris-records/01_veris-records.en.txt
1.6 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/03_common-soc-services/01_common-soc-services.en.txt
1.6 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/09_publicly-available-threat-awareness-resources/05_publicly-available-threat-awareness-resources-practice-quiz_instructions.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/01_introduction/02_introduction-to-understanding-windows-operating-system-basics_instructions.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/11_emergency-alternate-startup-options/05_emergency-alternate-startup-options-practice-quiz_quiz.html
1.6 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/04_chain-of-custody/03_chain-of-custody-practice-quiz_quiz.html
1.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/01_introduction/02_introduction-to-understanding-basic-cryptography-concepts.en.srt
1.6 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/07_regulatory-compliance-incident-response-requirements/03_regulatory-compliance-incident-response-requirements-practice-quiz_quiz.html
1.6 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/01_introduction/02_introduction-to-security-events-data-and-soc-analyst-tools.en.srt
1.6 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/01_introduction/02_introduction-to-using-a-playbook-model-to-organize-security-monitoring.en.srt
1.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/10_web-scripting/01_web-scripting_instructions.html
1.6 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/02_event-sources/09_application-logs_instructions.html
1.6 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/05_stages_instructions.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/30_lightweight-directory-access-protocol/01_lightweight-directory-access-protocol.en.txt
1.6 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/06_statistical-data_instructions.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/24_viewing-network-traffic/04_viewing-network-traffic-practice-quiz_quiz.html
1.6 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/04_wrap-up/02_wrap-up.en.srt
1.6 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/01_introduction/02_introduction-to-understanding-the-use-of-veris.en.srt
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/06_viewing-running-network-services-practice-quiz_quiz.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/22_name-resolution-dns/05_name-resolution-dns-practice-quiz_quiz.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/14_interacting-with-linux/04_interacting-with-linux-practice-quiz_quiz.html
1.6 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/03_cryptography-overview/05_cryptography-overview-practice-quiz_quiz.html
1.6 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/01_lesson-introduction/02_introduction-to-understanding-common-tcp-ip-attacks.en.srt
1.6 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/06_other-security-data-manipulation-practice-quiz_quiz.html
1.6 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/02_windows-operating-system-history/01_windows-operating-system-history.en.txt
1.6 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/04_chain-of-custody/01_chain-of-custody.en.srt
1.6 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/28_using-package-managers-to-install-software-in-linux/05_using-package-managers-to-install-software-in-linux-practice-quiz_quiz.html
1.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/24_wrap-up/02_wrap-up.en.srt
1.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/02_viewing-running-network-services_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/08_sql-operations/01_sql-operations_instructions.html
1.5 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/02_veris-overview/01_veris-overview.en.srt
1.5 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/02_impact-of-cryptography-on-security-investigations/01_impact-of-cryptography-on-security-investigations_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/19_dns-risk-and-mitigation-tool/04_double-ip-flux_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/20_http-302-cushioning/01_http-302-cushioning_instructions.html
1.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/26_running-software-on-linux/04_overview-of-the-process-for-compiling-code_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/17_punycode/01_punycode_instructions.html
1.5 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/01_introduction/02_introduction-to-understanding-network-infrastructure-and-network-security_instructions.html
1.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/07_process-monitor_instructions.html
1.5 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/03_soc-tools-and-their-features/01_introduction-to-soc-tools-and-their-features_instructions.html
1.5 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/01_introduction/01_introduction-to-understanding-windows-operating-system-basics.en.srt
1.5 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/06_tcp-vulnerabilities/03_tcp-vulnerabilities_instructions.html
1.5 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/04_veris-4-a-s/06_attributes_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/12_aaa-server-log/01_aaa-server-log.en.txt
1.5 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/01_introduction/01_introduction-to-security-operations-center_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/05_kill-chain-phase-3-delivery/01_kill-chain-phase-3-delivery.en.txt
1.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/01_introduction/02_introduction-to-identifying-malicious-activity.en.srt
1.5 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/02_security-incident-investigation-procedures/03_when-when-did-the-events-occur_instructions.html
1.5 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/08_the-systemd-command_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/20_http-302-cushioning/03_topic-introduction_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/12_shellcode-and-exploits/01_shellcode-and-exploits_instructions.html
1.5 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/04_identifying-possible-threat-actors/03_script-kiddies_instructions.html
1.5 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/05_challenges-of-a-soc/02_challenges-of-a-soc_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/04_stagers_instructions.html
1.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/03_linux-architecture/05_kernel-space_instructions.html
1.4 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/06_event-correlation/01_event-correlation.en.txt
1.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/11_run-as-administrator/01_run-as-administrator.en.txt
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/01_introduction/02_introduction-to-identifying-common-attack-vectors.en.srt
1.4 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/01_introduction/01_introduction-to-understanding-soc-metrics.en.srt
1.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/27_executables-vs-interpreters/02_topic-introduction_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/23_peer-to-peer-networks/01_peer-to-peer-networks_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/06_kill-chain-phase-4-exploitation/01_kill-chain-phase-4-exploitation.en.txt
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/19_pivoting/01_pivoting_instructions.html
1.4 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/01_introduction/01_introduction-to-soc-deployment-models-and-types_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/01_introduction/01_introduction-to-understanding-incident-analysis-in-a-threat-centric-soc.en.srt
1.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/01_lesson-introduction/01_introduction-to-understanding-common-tcp-ip-attacks_instructions.html
1.4 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/01_lesson-introduction/01_lesson-introduction.en.srt
1.4 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/01_introduction/01_introduction-to-staffing-an-effective-soc-team_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/14_directory-traversal/01_directory-traversal_instructions.html
1.4 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/01_introduction/02_introduction-to-understanding-event-correlation-and-normalization.en.srt
1.4 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/06_common-boot-management-processes_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/04_dns-ports_instructions.html
1.4 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/02_incident-response-planning/01_incident-response-planning.en.txt
1.4 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/09_windows-domains-and-local-user-accounts/02_windows-domains-and-local-user-accounts_instructions.html
1.4 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/04_objective_instructions.html
1.4 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/05_access-control-models/02_access-conrtol-models-introduction_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/19_pivoting/02_pivoting.en.txt
1.4 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/01_introduction/01_introduction-to-understanding-basic-cryptography-concepts_instructions.html
1.4 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/07_resource-exhaustion_instructions.html
1.4 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/04_wrap-up/02_wrap-up.en.srt
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/18_dns-tunneling/01_dns-tunneling_instructions.html
1.4 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/03_legacy-tcp-ip-vulnerabilities/01_legacy-tcp-ip_instructions.html
1.4 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/01_introduction/02_introduction-to-understanding-soc-workflow-and-automation_instructions.html
1.4 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/01_introduction/01_introduction-to-understanding-network-infrastructure-and-network-security.en.srt
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/09_smtp-operations/01_smtp-operations_instructions.html
1.4 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/09_csirt-framework/01_csirt-framework.en.txt
1.4 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/03_dynamic-dns/01_dynamic-dns_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/06_https-operations/01_https-operations_instructions.html
1.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/08_hot-threat-dashboard/04_hot-threat-challenges_instructions.html
1.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/02_system-processes_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/02_network-baselining/01_network-baselining.en.txt
1.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/23_testing-name-resolution/02_topic-introduction_instructions.html
1.3 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/01_introduction/01_introduction-to-understanding-event-correlation-and-normalization_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/02_dns-operations/01_dns-operations_instructions.html
1.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/25_common-third-party-tools/02_common-third-party-tools_instructions.html
1.3 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/04_wrap-up/02_wrap-up.en.txt
1.3 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/03_threat-investigation-example-china-chopper-remote-access-trojan/01_introduction_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/02_ips-evasion-techniques_instructions.html
1.3 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/01_introduction/01_introduction-to-security-events-data-and-soc-analyst-tools_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/01_introduction/01_introduction-to-identifying-common-attack-vectors_instructions.html
1.3 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/04_what-is-in-a-play/06_action_instructions.html
1.3 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/18_wrap-up/02_wrap-up.en.txt
1.3 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/02_network-security-monitoring-data-types/05_extracted-content_instructions.html
1.3 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/19_windows-networking/02_windows-networking_instructions.html
1.3 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/18_wrap-up/02_wrap-up.en.srt
1.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/05_monitoring-running-processes_instructions.html
1.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/11_copy-of-monitoring-running-processes_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/07_kill-chain-phase-5-installation/01_kill-chain-phase-5-installation.en.txt
1.3 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/14_interacting-with-linux/02_interacting-with-linux_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/02_classic-kill-chain-model-overview/01_classic-kill-chain-model-overview.en.txt
1.3 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/03_playbook-definition/01_playbook-definition.en.txt
1.3 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/04_wrap-up/01_wrap-up_instructions.html
1.3 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/01_introduction-to-soc-models-and-their-consumers_instructions.html
1.3 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/01_introduction/01_introduction-to-describing-incident-response.en.srt
1.3 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/01_introduction/01_introduction-to-understanding-soc-workflow-and-automation.en.srt
1.3 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/10_wrap-up/02_wrap-up.en.txt
1.3 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/08_wrap-up/01_wrap-up_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/21_gaining-access-via-web-based-attacks/01_gaining-access-via-web-based-attacks_instructions.html
1.3 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/16_cross-site-scripting/01_cross-site-scripting_instructions.html
1.3 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/01_introduction/01_introduction-to-identifying-resources-for-hunting-cyber-threats.en.srt
1.3 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/04_wrap-up/01_wrap-up_instructions.html
1.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/16_key-management/04_key-spaces_instructions.html
1.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/18_wrap-up/01_wrap-up_instructions.html
1.2 kB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/01_introduction/02_introduction-to-developing-key-relationships-with-internal-and-external.en.txt
1.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/01_introduction/02_introduction-to-understanding-incident-analysis-in-a-threat-centric-soc_instructions.html
1.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/01_lesson-introduction/01_introduction-to-exploring-data-type-categories_instructions.html
1.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/01_topic-introduction_instructions.html
1.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/11_emergency-alternate-startup-options/02_emergency-alternate-startup-options_instructions.html
1.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/19_networking/02_networking_instructions.html
1.2 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/11_wrap-up/01_wrap-up_instructions.html
1.2 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/05_security-onion-overview/01_security-onion-overview.en.txt
1.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/29_system-applications/02_system-applications_instructions.html
1.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/09_kill-chain-phase-7-actions-on-objectives/01_kill-chain-phase-7-actions-on-objectives.en.txt
1.2 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/01_introduction/02_introduction-to-security-operations-center-processes-and-services_instructions.html
1.2 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/01_introduction-to-soc-types-and-staffing-considerations_instructions.html
1.2 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/04_wrap-up/01_wrap-up_instructions.html
1.2 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/14_wrap-up/01_wrap-up_instructions.html
1.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/10_system-initialization/02_system-initialization_instructions.html
1.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/05_basic-file-system-navigation-and-management-commands/02_basic-file-system-navigation-and-management-commands_instructions.html
1.2 kB
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/06_wrap-up/01_wrap-up.en.txt
1.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/01_lesson-introduction/01_introduction-to-understanding-linux-operating-system-basics_instructions.html
1.2 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/22_name-resolution-dns/02_name-resolution-dns_instructions.html
1.2 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/07_other-security-data-manipulation/02_other-security-data-manipulation_instructions.html
1.2 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/17_nsa-suite-b/01_nsa-suite-b.en.txt
1.2 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/02_soc-roles/02_soc-roles.en.srt
1.2 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/05_application-allowed-lists-and-blocked-lists/02_application-allowed-lists-and-blocked-lists-introduction_instructions.html
1.2 kB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/01_introduction-to-interaction-of-different-roles-within-the-soc_instructions.html
1.2 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/26_wrap-up/02_wrap-up.en.txt
1.2 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/02_security-analytics/01_security-analytics.en.txt
1.2 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/09_wrap-up/02_wrap-up.en.txt
1.2 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/04_recursive-dns-query/01_topic-introduction_instructions.html
1.1 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/06_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/20_ips-evasion-techniques/08_timing-attacks_instructions.html
1.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/31_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/13_common-metasploit-payloads/01_common-metasploit-payloads_instructions.html
1.1 kB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/09_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/08_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/02_linux-command-shell-concepts_instructions.html
1.1 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/14_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/17_other-useful-command-line-tools/02_other-useful-command-line-tools_instructions.html
1.1 kB
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/04_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/16_wrap-up/02_wrap-up.en.txt
1.1 kB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/04_wrap-up/02_wrap-up.en.txt
1.1 kB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/26_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/24_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/06_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/06_wrap-up/02_wrap-up.en.txt
1.1 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/05_playbook-management-system/01_playbook-management-system.en.txt
1.1 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/26_wrap-up/02_wrap-up.en.txt
1.1 kB
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/08_wrap-up/02_wrap-up.en.txt
1.1 kB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/06_wrap-up/01_wrap-up.en.txt
1.1 kB
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/06_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/12_other-data-types/02_other-data-types_instructions.html
1.1 kB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/16_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/14_wrap-up/02_wrap-up.en.txt
1.1 kB
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/10_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/04_wrap-up/01_wrap-up_instructions.html
1.1 kB
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/06_wrap-up/02_wrap-up.en.txt
1.1 kB
Coursera - Threat Response 2024-1/01_describing-incident-response/11_wrap-up/02_wrap-up.en.txt
1.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/18_wrap-up/01_wrap-up_instructions.html
1.0 kB
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/01_introduction/01_introduction-to-security-operations-center-processes-and-services.en.txt
1.0 kB
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/13_security-tools-reference/02_security-tools-reference_details.aspx
1.0 kB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/26_wrap-up/01_wrap-up_instructions.html
1.0 kB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/01_introduction/02_introduction-to-soc-deployment-models-and-types.en.txt
1.0 kB
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/14_wrap-up/02_wrap-up.en.txt
1.0 kB
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/08_wrap-up/02_wrap-up.en.txt
1.0 kB
Coursera - Data Security 2024-1/02_understanding-basic-cryptography-concepts/01_introduction/02_introduction-to-understanding-basic-cryptography-concepts.en.txt
999 Bytes
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/31_wrap-up/02_wrap-up.en.txt
992 Bytes
Coursera - Threat Investigation 2024-1/04_using-a-playbook-model-to-organize-security-monitoring/01_introduction/02_introduction-to-using-a-playbook-model-to-organize-security-monitoring.en.txt
988 Bytes
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/01_introduction/01_introduction.en.txt
984 Bytes
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/02_veris-overview/01_veris-overview.en.txt
978 Bytes
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/01_introduction/02_introduction-to-conducting-security-incident-investigations.en.txt
976 Bytes
Coursera - Security Operations Center (SOC) 2024-1/02_security-operations-center-processes-and-services/04_wrap-up/02_wrap-up.en.txt
972 Bytes
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/24_wrap-up/02_wrap-up.en.txt
970 Bytes
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/01_lesson-introduction/02_course-introduction-to-understanding-linux-operating-system-basics.en.txt
949 Bytes
Coursera - Threat Analysis 2024-1/04_identifying-patterns-of-suspicious-behavior/06_wrap-up/02_wrap-up.en.txt
949 Bytes
Coursera - Data Security 2024-1/01_exploring-data-type-categories/01_lesson-introduction/02_introduction-to-exploring-data-type-categories.en.txt
939 Bytes
Coursera - Threat Analysis 2024-1/01_understanding-incident-analysis-in-a-threat-centric-soc/01_introduction/01_introduction-to-understanding-incident-analysis-in-a-threat-centric-soc.en.txt
939 Bytes
Coursera - Threat Investigation 2024-1/03_conducting-security-incident-investigations/04_wrap-up/02_wrap-up.en.txt
938 Bytes
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/01_introduction/02_introduction-to-staffing-an-effective-soc-team.en.txt
927 Bytes
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/06_veris-community-database/01_veris-community-database.en.txt
924 Bytes
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/04_wrap-up/02_wrap-up.en.txt
907 Bytes
Coursera - Threat Response 2024-1/02_understanding-the-use-of-veris/01_introduction/02_introduction-to-understanding-the-use-of-veris.en.txt
904 Bytes
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/01_introduction/01_introduction-to-understanding-windows-operating-system-basics.en.txt
900 Bytes
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/01_introduction/02_introduction-to-identifying-malicious-activity.en.txt
890 Bytes
Coursera - Network Security 2024-1/01_understanding-network-infrastructure-and-network-security-monitoring-tools/01_introduction/01_introduction-to-understanding-network-infrastructure-and-network-security.en.txt
887 Bytes
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/01_introduction/02_introduction-to-security-operations-center.en.txt
877 Bytes
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/01_lesson-introduction/01_lesson-introduction.en.txt
858 Bytes
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/01_introduction/02_introduction-to-security-events-data-and-soc-analyst-tools.en.txt
855 Bytes
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/04_chain-of-custody/01_chain-of-custody.en.txt
852 Bytes
Coursera - Threat Investigation 2024-1/02_understanding-event-correlation-and-normalization/01_introduction/02_introduction-to-understanding-event-correlation-and-normalization.en.txt
850 Bytes
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/04_wrap-up/02_wrap-up.en.txt
829 Bytes
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/01_lesson-introduction/02_introduction-to-understanding-common-tcp-ip-attacks.en.txt
822 Bytes
Coursera - Threat Investigation 2024-1/01_identifying-resources-for-hunting-cyber-threats/01_introduction/01_introduction-to-identifying-resources-for-hunting-cyber-threats.en.txt
819 Bytes
Coursera - Security Operations Center (SOC) 2024-1/07_understanding-soc-metrics/01_introduction/01_introduction-to-understanding-soc-metrics.en.txt
789 Bytes
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/01_introduction/02_introduction-to-identifying-common-attack-vectors.en.txt
765 Bytes
Coursera - Security Operations Center (SOC) 2024-1/08_understanding-soc-workflow-and-automation/01_introduction/01_introduction-to-understanding-soc-workflow-and-automation.en.txt
764 Bytes
Coursera - Threat Response 2024-1/01_describing-incident-response/01_introduction/01_introduction-to-describing-incident-response.en.txt
699 Bytes
Coursera - Data Security 2024-1/01_exploring-data-type-categories/18_wrap-up/02_wrap-up.en.txt
691 Bytes
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/02_soc-roles/02_soc-roles.en.txt
627 Bytes
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/23_emotet-advanced-persistent-threat/01_emotet-advanced-persistent-threat_6824920-Full-Operational-Shutdown-Another-Cybercrime.html
415 Bytes
Coursera - Threat Analysis 2024-1/links.txt
274 Bytes
Coursera - Threat Investigation 2024-1/links.txt
261 Bytes
Coursera - Threat Response 2024-1/links.txt
196 Bytes
Coursera - Security Operations Center (SOC) 2024-1/Readme.txt
122 Bytes
Coursera - Endpoints and Systems 2024-1/Readme.txt
111 Bytes
Coursera - Threat Investigation 2024-1/Readme.txt
110 Bytes
Coursera - Network Security 2024-1/Readme.txt
106 Bytes
Coursera - Threat Analysis 2024-1/Readme.txt
105 Bytes
Coursera - Threat Response 2024-1/Readme.txt
105 Bytes
Coursera - Data Security 2024-1/Readme.txt
103 Bytes
Coursera - Endpoints and Systems 2024-1/links.txt
55 Bytes
Coursera - Data Security 2024-1/links.txt
45 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>