[ CourseWikia.com ] Oreilly - Secure Operations and Protections, 2nd Edition
File List
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 114.7 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 112.4 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 101.1 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 85.1 MB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 83.1 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 72.5 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 49.6 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 47.8 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 41.6 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.mp4 37.4 MB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.mp4 32.8 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).mp4 31.7 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.mp4 31.6 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.mp4 26.1 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.mp4 25.1 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.mp4 23.4 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.mp4 23.0 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.mp4 22.7 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.mp4 21.0 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.mp4 19.7 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.mp4 19.4 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.mp4 19.4 MB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.mp4 18.3 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.mp4 17.3 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.mp4 17.1 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.mp4 16.7 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.mp4 16.4 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.mp4 16.1 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.mp4 14.8 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.mp4 14.8 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.mp4 14.6 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.mp4 13.7 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.mp4 11.8 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.mp4 11.7 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).mp4 11.4 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.mp4 10.6 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).mp4 8.9 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.mp4 7.2 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.mp4 6.3 MB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.mp4 4.2 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.mp4 4.0 MB
- ~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.mp4 3.3 MB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.mp4 2.6 MB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.mp4 2.5 MB
- ~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.mp4 1.3 MB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.en.srt 54.8 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.en.srt 48.8 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.en.srt 42.0 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.en.srt 33.8 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.en.srt 23.3 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.en.srt 22.9 KB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.en.srt 22.4 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.en.srt 22.1 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.en.srt 17.4 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.en.srt 16.3 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).en.srt 15.1 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.en.srt 13.1 KB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.en.srt 12.7 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.en.srt 10.7 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.en.srt 9.5 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.en.srt 9.4 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.en.srt 8.7 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.en.srt 7.9 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.en.srt 7.5 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.en.srt 7.4 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.en.srt 7.4 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.en.srt 7.2 KB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.en.srt 6.9 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.en.srt 6.8 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.en.srt 6.6 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.en.srt 6.4 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.en.srt 6.3 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.en.srt 6.1 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.en.srt 6.0 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.en.srt 5.8 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.en.srt 5.4 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.en.srt 4.8 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.en.srt 4.5 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).en.srt 4.1 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.en.srt 4.1 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).en.srt 3.6 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.en.srt 3.6 KB
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.en.srt 2.9 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.en.srt 2.4 KB
- ~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.en.srt 1.2 KB
- ~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.en.srt 1.1 KB
- ~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.en.srt 1.1 KB
- ~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.en.srt 736 bytes
- ~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.en.srt 571 bytes
- ~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.en.srt 433 bytes
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 181 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.