09-22-2025, 07:14 PM
![[Image: 539499712_359020115_tuto.jpg]](https://img100.pixhost.to/images/617/539499712_359020115_tuto.jpg)
2.18 GB | 8min 56s | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
FileName :001 Welcome to the Course!.mp4 | Size: (14.81 MB)
FileName :002 Meet Your Instructor.mp4 | Size: (3.84 MB)
FileName :001 Module 1 - Foundations of Digital Defense.mp4 | Size: (6.67 MB)
FileName :002 Cybersecurity Defined.mp4 | Size: (17.58 MB)
FileName :003 The CIA Triad.mp4 | Size: (12.61 MB)
FileName :004 Vulnerabilities, Threats, Exploits, and Risks.mp4 | Size: (7.08 MB)
FileName :005 Cybersecurity Terminology.mp4 | Size: (16.53 MB)
FileName :006 Defense-in-Depth.mp4 | Size: (29.39 MB)
FileName :007 Network Security Solutions.mp4 | Size: (27.49 MB)
FileName :008 Endpoint Security Solutions.mp4 | Size: (14.22 MB)
FileName :009 Application Security Solutions.mp4 | Size: (11.49 MB)
FileName :010 Agent-Based vs Agentless Security Solutions.mp4 | Size: (24.88 MB)
FileName :011 SIEM and SOAR.mp4 | Size: (16.45 MB)
FileName :012 Virtualized Solutions.mp4 | Size: (30.04 MB)
FileName :013 Cloud-Based Solutions.mp4 | Size: (15.26 MB)
FileName :014 Access Control Model Options.mp4 | Size: (21.3 MB)
FileName :015 Common Vulnerability Scoring System (CVSS).mp4 | Size: (17.73 MB)
FileName :016 Data Visibility Considerations.mp4 | Size: (8.42 MB)
FileName :017 Data Loss Analysis.mp4 | Size: (13.65 MB)
FileName :018 The 5-Tuple Approach.mp4 | Size: (11.22 MB)
FileName :019 Detection Methods.mp4 | Size: (10.22 MB)
FileName :001 Module 2 - Threat Detection and Surveillance.mp4 | Size: (6.51 MB)
FileName :002 Attack Surfaces.mp4 | Size: (5.94 MB)
FileName :003 Monitoring Sources.mp4 | Size: (25.23 MB)
FileName :004 Data Visibility Comparison.mp4 | Size: (21.02 MB)
FileName :005 Categories of Data Types.mp4 | Size: (9.32 MB)
FileName :006 Denial of Service (DoS) Attacks.mp4 | Size: (15.24 MB)
FileName :007 Man-in-the-Middle Attacks.mp4 | Size: (30.39 MB)
FileName :008 Protocol-Based Attacks.mp4 | Size: (21.19 MB)
FileName :009 SQL Injection Attacks.mp4 | Size: (29.61 MB)
FileName :010 Cross-Site Scripting (XSS) Attacks.mp4 | Size: (16.87 MB)
FileName :011 Command Injection Attacks.mp4 | Size: (4.72 MB)
FileName :012 Social Engineering Attacks.mp4 | Size: (27.14 MB)
FileName :013 AI-Based Social Engineering Attacks.mp4 | Size: (8.12 MB)
FileName :014 Malware and Ransomware Attacks.mp4 | Size: (12.33 MB)
FileName :015 Buffer Overflow Attacks.mp4 | Size: (6.08 MB)
FileName :016 Command and Control (C2) Attacks.mp4 | Size: (6.59 MB)
FileName :017 Comparison of Obfuscation Techniques.mp4 | Size: (7.01 MB)
FileName :018 Encryption with Digital Certificates.mp4 | Size: (12.88 MB)
FileName :019 Digital Certificate Components.mp4 | Size: (20.63 MB)
FileName :001 Module 3 - Endpoint Protection and Analysis.mp4 | Size: (6.49 MB)
FileName :002 Host-Based Protection.mp4 | Size: (12.4 MB)
FileName :003 Microsoft Windows Security Considerations.mp4 | Size: (34.45 MB)
FileName :004 macOS Security Considerations.mp4 | Size: (29.53 MB)
FileName :005 Linux Security Considerations.mp4 | Size: (29.4 MB)
FileName :006 Determining Responsibility.mp4 | Size: (9.93 MB)
FileName :007 Evidence Identification.mp4 | Size: (30.81 MB)
FileName :008 System Log Interpretation.mp4 | Size: (22.68 MB)
FileName :009 Malware Analysis.mp4 | Size: (24.09 MB)
FileName :001 Module 4 - Network Traffic Analysis and Interpretation.mp4 | Size: (4.84 MB)
FileName :002 Security Event Sources.mp4 | Size: (18.94 MB)
FileName :003 Alert Classification.mp4 | Size: (14.8 MB)
FileName :004 Deep Packet Inspection (DPI).mp4 | Size: (12.32 MB)
FileName :005 Comparing Traffic Capture Methods and NetFlow Analysis.mp4 | Size: (15.42 MB)
FileName :006 Wireshark PCAP File Analysis for Telnet Flow.mp4 | Size: (12.03 MB)
FileName :007 Wireshark PCAP File Analysis for Malware Infection.mp4 | Size: (54.69 MB)
FileName :008 Interpreting Protocol Headers.mp4 | Size: (25.24 MB)
FileName :009 Artifact Elements.mp4 | Size: (25.21 MB)
FileName :010 Regular Expressions.mp4 | Size: (16.08 MB)
FileName :001 Module 5 - Cybersecurity Governance and Best Practices.mp4 | Size: (3.9 MB)
FileName :002 Cybersecurity Management Considerations.mp4 | Size: (15.21 MB)
FileName :003 Incident Response Plans.mp4 | Size: (16.02 MB)
FileName :004 Incident Response Example.mp4 | Size: (19.05 MB)
FileName :005 Evidence Collection Recommendations.mp4 | Size: (15.8 MB)
FileName :006 Network Profiling.mp4 | Size: (13.27 MB)
FileName :007 Server Profiling.mp4 | Size: (12.62 MB)
FileName :008 Categorizing Data Protection.mp4 | Size: (15.72 MB)
FileName :009 Cyber Kill Chain.mp4 | Size: (12.52 MB)
FileName :010 Diamond Model.mp4 | Size: (9.61 MB)
FileName :011 SOC Metrics and Scope Analysis.mp4 | Size: (11.83 MB)
FileName :001 Module 6 - Exam Preparation.mp4 | Size: (2.14 MB)
FileName :002 Registering for the Exam.mp4 | Size: (16.85 MB)
FileName :003 Study Strategies.mp4 | Size: (28.18 MB)
FileName :004 What to do on Exam Day.mp4 | Size: (8.09 MB)
FileName :001 Congratulations and Next Steps.mp4 | Size: (8.34 MB)]
Screenshot
![[Image: KeZWAfXi_o.jpg]](https://images2.imgbox.com/c2/bc/KeZWAfXi_o.jpg)
FileName :001 Welcome to the Course!.mp4 | Size: (14.81 MB)
FileName :002 Meet Your Instructor.mp4 | Size: (3.84 MB)
FileName :001 Module 1 - Foundations of Digital Defense.mp4 | Size: (6.67 MB)
FileName :002 Cybersecurity Defined.mp4 | Size: (17.58 MB)
FileName :003 The CIA Triad.mp4 | Size: (12.61 MB)
FileName :004 Vulnerabilities, Threats, Exploits, and Risks.mp4 | Size: (7.08 MB)
FileName :005 Cybersecurity Terminology.mp4 | Size: (16.53 MB)
FileName :006 Defense-in-Depth.mp4 | Size: (29.39 MB)
FileName :007 Network Security Solutions.mp4 | Size: (27.49 MB)
FileName :008 Endpoint Security Solutions.mp4 | Size: (14.22 MB)
FileName :009 Application Security Solutions.mp4 | Size: (11.49 MB)
FileName :010 Agent-Based vs Agentless Security Solutions.mp4 | Size: (24.88 MB)
FileName :011 SIEM and SOAR.mp4 | Size: (16.45 MB)
FileName :012 Virtualized Solutions.mp4 | Size: (30.04 MB)
FileName :013 Cloud-Based Solutions.mp4 | Size: (15.26 MB)
FileName :014 Access Control Model Options.mp4 | Size: (21.3 MB)
FileName :015 Common Vulnerability Scoring System (CVSS).mp4 | Size: (17.73 MB)
FileName :016 Data Visibility Considerations.mp4 | Size: (8.42 MB)
FileName :017 Data Loss Analysis.mp4 | Size: (13.65 MB)
FileName :018 The 5-Tuple Approach.mp4 | Size: (11.22 MB)
FileName :019 Detection Methods.mp4 | Size: (10.22 MB)
FileName :001 Module 2 - Threat Detection and Surveillance.mp4 | Size: (6.51 MB)
FileName :002 Attack Surfaces.mp4 | Size: (5.94 MB)
FileName :003 Monitoring Sources.mp4 | Size: (25.23 MB)
FileName :004 Data Visibility Comparison.mp4 | Size: (21.02 MB)
FileName :005 Categories of Data Types.mp4 | Size: (9.32 MB)
FileName :006 Denial of Service (DoS) Attacks.mp4 | Size: (15.24 MB)
FileName :007 Man-in-the-Middle Attacks.mp4 | Size: (30.39 MB)
FileName :008 Protocol-Based Attacks.mp4 | Size: (21.19 MB)
FileName :009 SQL Injection Attacks.mp4 | Size: (29.61 MB)
FileName :010 Cross-Site Scripting (XSS) Attacks.mp4 | Size: (16.87 MB)
FileName :011 Command Injection Attacks.mp4 | Size: (4.72 MB)
FileName :012 Social Engineering Attacks.mp4 | Size: (27.14 MB)
FileName :013 AI-Based Social Engineering Attacks.mp4 | Size: (8.12 MB)
FileName :014 Malware and Ransomware Attacks.mp4 | Size: (12.33 MB)
FileName :015 Buffer Overflow Attacks.mp4 | Size: (6.08 MB)
FileName :016 Command and Control (C2) Attacks.mp4 | Size: (6.59 MB)
FileName :017 Comparison of Obfuscation Techniques.mp4 | Size: (7.01 MB)
FileName :018 Encryption with Digital Certificates.mp4 | Size: (12.88 MB)
FileName :019 Digital Certificate Components.mp4 | Size: (20.63 MB)
FileName :001 Module 3 - Endpoint Protection and Analysis.mp4 | Size: (6.49 MB)
FileName :002 Host-Based Protection.mp4 | Size: (12.4 MB)
FileName :003 Microsoft Windows Security Considerations.mp4 | Size: (34.45 MB)
FileName :004 macOS Security Considerations.mp4 | Size: (29.53 MB)
FileName :005 Linux Security Considerations.mp4 | Size: (29.4 MB)
FileName :006 Determining Responsibility.mp4 | Size: (9.93 MB)
FileName :007 Evidence Identification.mp4 | Size: (30.81 MB)
FileName :008 System Log Interpretation.mp4 | Size: (22.68 MB)
FileName :009 Malware Analysis.mp4 | Size: (24.09 MB)
FileName :001 Module 4 - Network Traffic Analysis and Interpretation.mp4 | Size: (4.84 MB)
FileName :002 Security Event Sources.mp4 | Size: (18.94 MB)
FileName :003 Alert Classification.mp4 | Size: (14.8 MB)
FileName :004 Deep Packet Inspection (DPI).mp4 | Size: (12.32 MB)
FileName :005 Comparing Traffic Capture Methods and NetFlow Analysis.mp4 | Size: (15.42 MB)
FileName :006 Wireshark PCAP File Analysis for Telnet Flow.mp4 | Size: (12.03 MB)
FileName :007 Wireshark PCAP File Analysis for Malware Infection.mp4 | Size: (54.69 MB)
FileName :008 Interpreting Protocol Headers.mp4 | Size: (25.24 MB)
FileName :009 Artifact Elements.mp4 | Size: (25.21 MB)
FileName :010 Regular Expressions.mp4 | Size: (16.08 MB)
FileName :001 Module 5 - Cybersecurity Governance and Best Practices.mp4 | Size: (3.9 MB)
FileName :002 Cybersecurity Management Considerations.mp4 | Size: (15.21 MB)
FileName :003 Incident Response Plans.mp4 | Size: (16.02 MB)
FileName :004 Incident Response Example.mp4 | Size: (19.05 MB)
FileName :005 Evidence Collection Recommendations.mp4 | Size: (15.8 MB)
FileName :006 Network Profiling.mp4 | Size: (13.27 MB)
FileName :007 Server Profiling.mp4 | Size: (12.62 MB)
FileName :008 Categorizing Data Protection.mp4 | Size: (15.72 MB)
FileName :009 Cyber Kill Chain.mp4 | Size: (12.52 MB)
FileName :010 Diamond Model.mp4 | Size: (9.61 MB)
FileName :011 SOC Metrics and Scope Analysis.mp4 | Size: (11.83 MB)
FileName :001 Module 6 - Exam Preparation.mp4 | Size: (2.14 MB)
FileName :002 Registering for the Exam.mp4 | Size: (16.85 MB)
FileName :003 Study Strategies.mp4 | Size: (28.18 MB)
FileName :004 What to do on Exam Day.mp4 | Size: (8.09 MB)
FileName :001 Congratulations and Next Steps.mp4 | Size: (8.34 MB)]
Screenshot
![[Image: KeZWAfXi_o.jpg]](https://images2.imgbox.com/c2/bc/KeZWAfXi_o.jpg)
![[Image: signature.png]](https://softwarez.info/images/avsg/signature.png)




