RAR-files |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.rar |
600,000,000 |
61F96CB8 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r00 |
600,000,000 |
AEBD11BB |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r01 |
600,000,000 |
2B02F24B |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r02 |
600,000,000 |
BC8B7286 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r03 |
600,000,000 |
DF23C64F |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r04 |
600,000,000 |
89338DAB |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r05 |
600,000,000 |
8CA32CF1 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r06 |
600,000,000 |
8B9F234A |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r07 |
600,000,000 |
809B3DA3 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r08 |
600,000,000 |
F437B306 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r09 |
600,000,000 |
7FE2577B |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r10 |
600,000,000 |
E7E20652 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r11 |
600,000,000 |
B6011F92 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r12 |
600,000,000 |
E01B5F83 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r13 |
600,000,000 |
BE765524 |
linkedin.learning.casp.cas-004.cert.prep.2.security.operations-xqzt.r14 |
279,436,755 |
EC06D267 |
|
Total size: |
9,279,436,755 |
|
|
Archived
files |
01.01-welcome.mkv
[6d8be2e02906d2fa]
|
76,868,603 |
77EC4038 |
01.02-about_the_exam.mkv
[14efb7e4767fad5b]
|
121,339,156 |
B53995B0 |
02.01-threat_and_vulnerability_management.mkv
[747968e1b953285d]
|
39,155,012 |
33B06A82 |
02.02-threat_intelligence.mkv
[23093c345b5b6e7a]
|
124,646,114 |
D91157C3 |
02.03-threat_hunting.mkv
[4544dc84188c6139]
|
132,332,806 |
A4444B99 |
02.04-intelligence_collection.mkv
[39415546f9dc4f22]
|
219,721,755 |
82A4FBB9 |
02.05-threat_actors.mkv
[5f658cc144fe2563]
|
186,399,063 |
C5C20DF8 |
02.06-threat_management_frameworks.mkv
[7db2ef5e604ff835]
|
239,024,490 |
C49B9B82 |
02.07-vulnerability_management_activities.mkv
[b54e3029d0874f3e]
|
232,057,618 |
9C60B64C |
02.08-security_content_automation_protocol.mkv
[3d13c4f7d42f3329]
|
145,247,560 |
92F67422 |
03.01-vulnerability_assessments.mkv
[f6d9e31ae3241789]
|
31,021,656 |
649BFA5D |
03.02-penetration_test.mkv
[20c6e497ba0c75b5]
|
95,079,901 |
91979946 |
03.03-pen_test_steps.mkv
[87fc634035ef5cbe]
|
140,924,310 |
47D1E2CE |
03.04-pen_test_requirements.mkv
[5dbfcb32f28b5e53]
|
227,027,453 |
DEC96DF6 |
03.05-code_analysis.mkv
[915a69479f0cfb75]
|
167,881,425 |
C6D54461 |
03.06-protocol_analysis.mkv
[af82b8a6dd8225c5]
|
155,167,271 |
02325AFC |
03.07-analysis_utilities.mkv
[e7daeb56106c04bb]
|
105,068,278 |
A8CC91CC |
04.01-risk_reduction.mkv
[d52196e5e929c97]
|
30,150,505 |
BF007B6D |
04.02-deceptive_technologies.mkv
[438378a24f6a9521]
|
99,481,520 |
0A9807AC |
04.03-security_data_analytics.mkv
[3bcf41dde2840faf]
|
159,660,672 |
FF0249C9 |
04.04-preventative_controls.mkv
[cc0b975478e35be2]
|
102,187,463 |
42ACB6DF |
04.05-application_controls.mkv
[5d106620ccdf5ab0]
|
191,399,617 |
0892257B |
04.06-security_automation.mkv
[9386cdf6c16a6fb3]
|
211,402,466 |
C76E3B2C |
04.07-physical_security.mkv
[e23f36aec39eb1e2]
|
131,948,977 |
CA297A6E |
05.01-analyzing_vulnerabilities.mkv
[91e9e9a0b099983c]
|
26,750,120 |
1927867E |
05.02-race_conditions.mkv
[dba213b334836931]
|
98,541,964 |
C9A27DCF |
05.03-buffer_overflows.mkv
[44594e0ecdd6c7fd]
|
245,580,470 |
9ABD6CCB |
05.04-authentication_and_references.mkv
[433ee1a629d55fdd]
|
116,910,831 |
38C34AD9 |
05.05-ciphers_and_certificates.mkv
[8d7f644782ddd5f7]
|
212,686,617 |
EF0DEEA6 |
05.06-improper_headers.mkv
[5d1066bdc5fe240e]
|
121,692,217 |
C25D55A4 |
05.07-software_composition.mkv
[7096b9d814c9748f]
|
193,787,717 |
67BAC5D0 |
05.08-vulnerable_web_applications.mkv
[592ab26122d6bf3a]
|
232,219,199 |
AD71F08A |
06.01-attacking_vulnerabilities.mkv
[3dc4520a3c279644]
|
24,542,866 |
A891CAAF |
06.02-directory_traversals.mkv
[17392614c5235d72]
|
195,429,401 |
D6051697 |
06.03-cross-site_scripting_(xss).mkv
[145b43912a82a6a5]
|
177,849,337 |
5595CB5B |
06.04-cross-site_request_forgery_(csrf).mkv
[a82eb941d80e9b6e]
|
143,018,086 |
34A08894 |
06.05-sql_injections.mkv
[a3a0ad90f34ad658]
|
140,362,503 |
01C58B01 |
06.06-xml_injections.mkv
[129ad99627f499ec]
|
128,259,797 |
E7FA56B6 |
06.07-other_injection_attacks.mkv
[8a7c490f35bdebf8]
|
86,137,280 |
B7351E6D |
06.08-authentication_bypass.mkv
[e9591678cf4f647a]
|
133,808,220 |
6D53D302 |
06.09-vm_attacks.mkv
[bf5f90e809eccd0b]
|
96,428,093 |
E20D208C |
06.10-network_attacks.mkv
[6bdbc1ce3fe90791]
|
218,100,544 |
98BFD8C4 |
06.11-social_engineering.mkv
[33f1ffbc55ca4134]
|
145,477,761 |
68DDC00D |
07.01-indicators_of_compromise.mkv
[ec66cfedd4f7ffdc]
|
35,661,687 |
714A1503 |
07.02-types_of_iocs.mkv
[d56ac1fe4647575c]
|
80,953,725 |
1F33A8FF |
07.03-pcap_files.mkv
[15ffddd18e3f7bd]
|
86,416,959 |
A674A249 |
07.04-netflow.mkv
[78a50cac76da4e43]
|
140,912,371 |
11AFE901 |
07.05-logs.mkv
[eecf39152b799652]
|
139,235,035 |
1B55B2B1 |
07.06-ioc_notifications.mkv
[15a1daf17693519f]
|
151,674,189 |
797E7231 |
07.07-response_to_iocs.mkv
[a3ae1a1abd3b6b19]
|
103,689,238 |
8312054B |
08.01-incident_response.mkv
[699b236b8262d392]
|
28,112,092 |
7E19D92E |
08.02-triage.mkv
[bede5a8016cdf437]
|
160,307,121 |
3C78D594 |
08.03-communication_plan.mkv
[33c7daad35505818]
|
199,036,195 |
BD92E225 |
08.04-stakeholder_management.mkv
[fc40df1e592e3117]
|
141,683,179 |
E33299DE |
08.05-incident_response_process.mkv
[e84efadbb2a7e374]
|
205,239,487 |
B050164A |
08.06-playbooks.mkv
[976a0239e671f079]
|
169,614,494 |
5F9C4A21 |
09.01-digital_forensics.mkv
[11c1b98bdab890b5]
|
20,625,979 |
7207442D |
09.02-forensic_process.mkv
[c4780b95800298a5]
|
85,082,487 |
66ECEA47 |
09.03-chain_of_custody.mkv
[7471585875a810a0]
|
140,759,019 |
CAD33A68 |
09.04-order_of_volatility.mkv
[b4b15dce1c636e7]
|
128,231,855 |
2CCC3A8D |
09.05-forensic_analysis.mkv
[7de14a8e49bedbb9]
|
131,976,336 |
6B00CF44 |
10.01-digital_forensic_tools.mkv
[9cb350fce89c55e2]
|
46,608,559 |
295E3718 |
10.02-forensic_workstations.mkv
[fbef8e66be54dc1d]
|
103,017,430 |
35029AF6 |
10.03-file_carving_tools.mkv
[9f732454fdbfa6c6]
|
71,359,990 |
50A0C11C |
10.04-binary_analysis_tools.mkv
[77e35c32d62a86bf]
|
142,057,767 |
E26B64FA |
10.05-forensic_analysis_tools.mkv
[a6ca18dbe18b9bbb]
|
161,721,131 |
8B9E44CE |
10.06-imaging_tools.mkv
[ffddb92bedecf40c]
|
154,849,800 |
3C6DA3CD |
10.07-collection_tools.mkv
[eed801b88777cea0]
|
124,555,980 |
AE85B921 |
11.01-conclusion.mkv
[69b36fdcd0a382b9]
|
222,036,318 |
52F3A93F |
Ex_Files_CASP_plus_CAS_004_Cert_Prep_2.zip |
1,235,366 |
6FEF4309 |
|
Total size: |
9,279,430,503 |
|
|