RAR-files |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.rar |
50,000,000 |
7074C1EC |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.r00 |
50,000,000 |
D5901750 |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.r01 |
50,000,000 |
39302D1E |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.r02 |
50,000,000 |
A0E15A43 |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.r03 |
50,000,000 |
25168CB1 |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.r04 |
50,000,000 |
E9C9B63D |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.r05 |
50,000,000 |
CE1D313A |
linkedin.learning.sscp.cert.prep.4.incident.response.and.recovery-xqzt.r06 |
21,875,140 |
184D60ED |
|
Total size: |
371,875,140 |
|
|
Archived
files |
01.01-respond_to_incidents.mkv
[2c8ea25427aed1e6]
|
22,993,685 |
03826579 |
01.02-what_you_need_to_know.mkv
[ff7f833d2fd59ac8]
|
1,098,596 |
802A5196 |
01.03-study_resources.mkv
[d9b24f1451c86093]
|
6,171,698 |
27A528E7 |
02.01-build_an_incident_response_program.mkv
[33575bc2cbb7d23a]
|
14,453,455 |
31AD45A2 |
02.02-creating_an_incident_response_team.mkv
[fb2047cfe68ae815]
|
9,534,931 |
482374AD |
02.03-incident_communications_plan.mkv
[3525f20bbe05ae3a]
|
10,154,008 |
E1D2A2FF |
02.04-incident_identification.mkv
[56390ba74ccabaa7]
|
13,657,838 |
1A49B73C |
02.05-escalation_and_notification.mkv
[21a9396a7fe3a80e]
|
6,235,272 |
0C69089F |
02.06-mitigation.mkv
[1c7b0cddf8603a98]
|
6,025,124 |
A927EBCE |
02.07-containment_techniques.mkv
[f88cae33cc0cf679]
|
7,220,528 |
F1608B69 |
02.08-incident_eradication_and_recovery.mkv
[cc3399a571f9b3f8]
|
15,269,110 |
29B8F830 |
02.09-validation.mkv
[11a977780ad8573d]
|
4,932,531 |
D6C1F7DA |
02.10-post-incident_activities.mkv
[c08c5e8fbf380691]
|
13,544,614 |
166E618A |
02.11-incident_response_exercises.mkv
[4eeb0a4f4eb914f5]
|
7,592,176 |
8B165B09 |
03.01-conducting_investigations.mkv
[a020b8fc196eea90]
|
12,866,776 |
4A2F6A32 |
03.02-evidence_types.mkv
[236821f084b87c36]
|
7,536,750 |
60E23270 |
03.03-introduction_to_forensics.mkv
[8dcad981e2a14e9e]
|
9,951,569 |
3705D993 |
03.04-system_and_file_forensics.mkv
[e117910fd6604ef4]
|
14,190,368 |
EB584F1E |
03.05-network_forensics.mkv
[8a7c47b45cf4bbb8]
|
14,141,929 |
DA967C6E |
03.06-software_forensics.mkv
[bad60a947ffbf12e]
|
22,132,477 |
FB71A8E1 |
03.07-mobile_device_forensics.mkv
[a0a340cc3c962040]
|
2,917,821 |
D6C247AA |
03.08-embedded_device_forensics.mkv
[6d3254b1379d57a6]
|
9,630,245 |
DDBCD349 |
03.09-chain_of_custody.mkv
[d24bafd59f31408e]
|
5,816,246 |
93E4BC08 |
03.10-reporting_and_documenting_incidents.mkv
[82967fb710edb423]
|
12,463,297 |
3FDB743E |
03.11-electronic_discovery_(ediscovery).mkv
[61e44355fc9f69a8]
|
12,437,007 |
BCC1E16D |
04.01-business_continuity_planning.mkv
[e514aaef1262b670]
|
8,319,260 |
C1914393 |
04.02-business_continuity_controls.mkv
[258d6640ee3a65c0]
|
11,178,731 |
0E3A905A |
04.03-high_availability_and_fault_tolerance.mkv
[54ee9339c1292876]
|
13,134,023 |
0C0696EE |
05.01-disaster_recovery_overview.mkv
[14151f5d6aaca551]
|
16,562,820 |
0F1C5BAD |
05.02-backups.mkv
[2c1b90e62d23a37e]
|
11,063,001 |
79B67BF7 |
05.03-restoring_backups.mkv
[d728b668f3df322d]
|
7,308,129 |
8FA995C1 |
05.04-disaster_recovery_sites.mkv
[946bb0d07d97745]
|
13,197,268 |
209E2A27 |
05.05-testing_bcdr_plans.mkv
[f84a1692f6fd0190]
|
10,064,724 |
3DD625ED |
05.06-after-action_reports.mkv
[4b89d1878f8dacc8]
|
11,073,586 |
ED2FCD93 |
06.01-building_an_emergency_response_plan.mkv
[a1e92ad8d4c2bcfe]
|
5,184,621 |
67E03B88 |
07.01-continuing_your_studies.mkv
[4fde5d3525937a89]
|
1,817,550 |
5DD79C2E |
|
Total size: |
371,871,764 |
|
|