magnet:?xt=urn:btih:FEFA0EA64A939F45215B17E226DBA7EBB2C1B171
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.mp4 49.6 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4 29.2 MB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.mp4 26.8 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4 26.4 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4 25.7 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4 25.5 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4 25.2 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4 24.8 MB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4 24.5 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.mp4 24.2 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4 24.2 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4 23.7 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4 23.6 MB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.mp4 23.6 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4 23.5 MB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.mp4 23.1 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4 23.0 MB
networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 23.0 MB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4 22.9 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4 22.7 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/03_work-with-variables-in-python.mp4 22.7 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/03_web-based-exploits/01_cross-site-scripting.mp4 22.5 MB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/02_string-operations.mp4 22.3 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/02_public-key-infrastructure.mp4 22.2 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/04_explore-built-in-functions.mp4 22.0 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/02_the-what-why-and-how-of-asset-security.mp4 21.8 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/02_the-nist-cybersecurity-framework.mp4 21.3 MB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/03_string-indices-and-slices.mp4 21.3 MB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/02_common-cybersecurity-tools.mp4 21.2 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/01_elements-of-a-security-plan.mp4 21.2 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/02_python-and-cybersecurity.mp4 21.1 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/02_toni-my-path-to-cybersecurity.mp4 21.0 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/03_defense-in-depth-strategy.mp4 20.9 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 20.8 MB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/05_ashley-my-path-to-cybersecurity.mp4 20.8 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/02_security-controls.mp4 20.5 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/01_vulnerability-assessments.mp4 20.4 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/01_data-types-in-python.mp4 20.3 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/01_core-skills-for-cybersecurity-professionals.mp4 20.3 MB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.mp4 20.3 MB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/02_work-with-lists-and-develop-algorithms/01_list-operations-in-python.mp4 20.3 MB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/03_secure-design.mp4 20.1 MB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/02_explore-the-cissp-security-domains-part-1.mp4 20.1 MB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/01_owasp-security-principles.mp4 20.0 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/02_automate-cybersecurity-tasks-with-python.mp4 20.0 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/02_code-readability.mp4 20.0 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 20.0 MB
prepare-for-cybersecurity-jobs/02_escalate-incidents/01_escalation-in-cybersecurity/02_the-importance-of-escalation.mp4 19.9 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.mp4 19.8 MB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/03_your-impact-on-data-protection/01_detect-and-protect-without-neglect.mp4 19.5 MB
networks-and-network-security/03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.mp4 19.5 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/05_karan-interview-tips-from-a-hiring-manager.mp4 19.4 MB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 19.2 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/01_access-controls-and-authentication-systems.mp4 19.2 MB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/01_from-simple-activity-to-major-data-breach.mp4 19.2 MB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/03_explore-the-cissp-security-domains-part-2.mp4 19.1 MB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/03_how-to-create-a-visual-dashboard.mp4 19.0 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/04_niru-adopt-an-attacker-mindset.mp4 19.0 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/01_introduction-to-course-7.mp4 18.9 MB
networks-and-network-security/04_security-hardening/02_os-hardening/01_os-hardening-practices.mp4 18.9 MB
manage-security-risks/02_security-frameworks-and-controls/03_nist-frameworks/01_nist-frameworks.mp4 18.9 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/03_digital-and-physical-assets/01_assets-in-a-digital-world.mp4 18.8 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/04_the-importance-of-cybersecurity.mp4 18.7 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 18.7 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/03_create-and-modify-directories-and-files.mp4 18.7 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/01_conditional-statements-in-python.mp4 18.5 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/06_congratulations-on-completing-course-5/01_course-wrap-up.mp4 18.5 MB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/02_work-with-lists-and-develop-algorithms/02_write-a-simple-algorithm.mp4 18.4 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/03_web-based-exploits/02_exploitable-gaps-in-databases.mp4 18.2 MB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 18.2 MB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/02_key-impacts-of-threats-risks-and-vulnerabilities.mp4 18.1 MB
prepare-for-cybersecurity-jobs/02_escalate-incidents/02_to-escalate-or-not-to-escalate/01_prepare-to-escalate-through-security-recognition.mp4 18.1 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/01_a-proactive-approach-to-security.mp4 17.9 MB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/01_threats-risks-and-vulnerabilities.mp4 17.9 MB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/02_communicate-for-impact/02_building-blocks-of-cybersecurity-communications.mp4 17.8 MB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/05_complete-a-security-audit.mp4 17.8 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/04_tri-life-in-asset-security.mp4 17.8 MB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/02_event-and-incident-detection/02_security-as-a-mindset.mp4 17.8 MB
networks-and-network-security/04_security-hardening/03_network-hardening/01_network-hardening-practices.mp4 17.7 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/05_security-starts-with-asset-classification.mp4 17.7 MB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/03_dion-my-personal-career-journey.mp4 17.7 MB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/05_heather-protect-sensitive-data-and-information.mp4 17.6 MB
networks-and-network-security/02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.mp4 17.6 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/01_file-permissions-and-ownership.mp4 17.5 MB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/04_plan-a-security-audit.mp4 17.5 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/03_angel-my-personal-career-journey.mp4 17.3 MB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/05_parisa-the-parallels-of-accessibility-and-security.mp4 17.2 MB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/04_nist-s-risk-management-framework.mp4 17.1 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/02_find-cybersecurity-jobs.mp4 17.1 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/04_why-we-audit-user-activity.mp4 17.0 MB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/03_filters-with-and-or-and-not.mp4 16.9 MB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/01_visual-storytelling-in-cybersecurity.mp4 16.9 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/01_introduction-to-course-5.mp4 16.8 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/04_nikki-a-day-in-the-life-of-a-security-engineer.mp4 16.8 MB
detection-and-response/01_introduction-to-detection-and-incident-response/02_the-incident-response-lifecycle/02_introduction-to-the-incident-response-lifecycle.mp4 16.8 MB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/05_data-exfiltration-attacks.mp4 16.3 MB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/04_victoria-continue-your-learning-journey.mp4 16.2 MB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/02_helpful-cybersecurity-resources.mp4 16.0 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/04_develop-a-parsing-algorithm-in-python.mp4 16.0 MB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/02_fatima-the-importance-of-communication-during-incident-response.mp4 15.9 MB
manage-security-risks/02_security-frameworks-and-controls/03_nist-frameworks/02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 15.9 MB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/01_understand-your-stakeholders/02_stakeholders-in-cybersecurity.mp4 15.9 MB
linux-and-sql/04_databases-and-sql/02_sql-queries/04_basic-filters-on-sql-queries.mp4 15.5 MB
manage-security-risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/01_explore-the-cia-triad.mp4 15.5 MB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/01_explore-common-siem-tools.mp4 15.4 MB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/02_build-your-cybersecurity-network/01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 15.4 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/01_security-monitoring-with-detection-tools.mp4 15.4 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/04_add-and-delete-users.mp4 15.4 MB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 15.3 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/05_heather-the-importance-of-protecting-pii.mp4 15.3 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 15.2 MB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/02_core-cybersecurity-knowledge-and-skills/01_introduction-to-linux-sql-and-python.mp4 15.2 MB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/01_welcome-to-week-3.mp4 15.2 MB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/05_alert-and-event-management-with-siem-and-soar-tools.mp4 15.2 MB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/02_robin-foster-cross-team-collaboration.mp4 14.8 MB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/03_controls.mp4 14.8 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/02_chantelle-the-value-of-diversity-in-cybersecurity.mp4 14.8 MB
linux-and-sql/01_introduction-to-operating-systems/04_the-user-interface/01_gui-versus-cli.mp4 14.8 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/01_explore-the-interview-process.mp4 14.7 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/04_emily-overcome-imposter-syndrome.mp4 14.6 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/04_da-queshia-my-path-to-cybersecurity.mp4 14.6 MB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/04_dave-grow-your-cybersecurity-career-with-mentors.mp4 14.6 MB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/02_casey-apply-soft-skills-in-cybersecurity.mp4 14.6 MB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/05_sean-keep-your-cool-during-a-data-breach.mp4 14.6 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/02_introduction-to-functions.mp4 14.5 MB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/05_adedayo-sql-in-cybersecurity.mp4 14.4 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/02_return-statements.mp4 14.4 MB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/04_reexamine-the-fields-of-a-packet-header.mp4 14.3 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/06_build-rapport-with-interviewers.mp4 14.3 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/01_damar-my-journey-into-linux-commands.mp4 14.2 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/02_apply-debugging-strategies.mp4 14.2 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/05_non-repudiation-and-hashing.mp4 14.2 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.mp4 14.1 MB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/04_mk-changes-in-the-cybersecurity-industry.mp4 14.0 MB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/01_introduction-to-course-8.mp4 13.8 MB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/02_document-evidence-with-chain-of-custody-forms.mp4 13.7 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/01_develop-an-elevator-pitch.mp4 13.6 MB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/04_the-value-of-cybersecurity-playbooks.mp4 13.6 MB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/02_when-and-how-to-escalate-a-security-incident.mp4 13.5 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/03_components-of-a-detection-signature.mp4 13.4 MB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/03_the-importance-of-network-traffic-flows.mp4 13.4 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/02_the-importance-of-logs.mp4 13.4 MB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/02_introduction-to-linux.mp4 13.2 MB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/03_phil-learn-and-grow-in-the-cybersecurity-field.mp4 13.2 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/05_conduct-pre-interview-research.mp4 13.2 MB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/01_incident-response-teams.mp4 13.0 MB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__Linux-in-a-Nutshell-6th-Edition.pdf 13.0 MB
linux-and-sql/01_introduction-to-operating-systems/04_the-user-interface/03_ellen-my-path-into-cybersecurity.mp4 13.0 MB
linux-and-sql/04_databases-and-sql/04_sql-joins/01_join-tables-in-sql.mp4 12.9 MB
networks-and-network-security/04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.mp4 12.8 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/03_for-loops.mp4 12.8 MB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/02_communicate-for-impact/01_clear-and-concise-communication.mp4 12.7 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/01_use-strategies-to-answer-interview-questions.mp4 12.6 MB
networks-and-network-security/02_network-operations/02_system-identification/03_security-zones.mp4 12.6 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/03_create-a-resume.mp4 12.5 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/05_variations-of-logs.mp4 12.5 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/05_congratulations-on-completing-course-7/01_course-wrap-up.mp4 12.4 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/04_review-vulnerabilities-in-systems/01_wrap-up.mp4 12.4 MB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/04_linux-architecture.mp4 12.4 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/05_garvey-cover-letter-tips.mp4 12.2 MB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/01_the-role-of-triage-in-incident-response.mp4 12.1 MB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.mp4 12.1 MB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/03_introduction-to-operating-systems.mp4 12.1 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 11.9 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/01_modules-and-libraries.mp4 11.9 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/04_clancy-continual-learning-and-python.mp4 11.9 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.mp4 11.9 MB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/02_network-protocols.mp4 11.8 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/03_core-commands-for-navigation-and-reading-files.mp4 11.8 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/03_garvey-technical-interview-tips.mp4 11.8 MB
networks-and-network-security/02_network-operations/02_system-identification/05_proxy-servers.mp4 11.8 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/02_veronica-my-path-to-working-in-cybersecurity.mp4 11.5 MB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/02_the-value-of-documentation.mp4 11.5 MB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/01_filter-dates-and-numbers.mp4 11.5 MB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/02_kim-my-journey-into-computing.mp4 11.4 MB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/03_siem-dashboards.mp4 11.3 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/01_find-what-you-need-with-linux.mp4 11.2 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/01_use-parameters-in-functions.mp4 11.1 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/01_access-a-text-file-in-python.mp4 11.0 MB
linux-and-sql/01_introduction-to-operating-systems/03_the-operating-system-at-work/01_inside-the-operating-system.mp4 11.0 MB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/02_introduction-to-databases.mp4 10.9 MB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/02_frameworks.mp4 10.8 MB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/01_linux-distributions.mp4 10.8 MB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/02_build-your-cybersecurity-network/03_sarah-network-in-the-cybersecurity-community.mp4 10.8 MB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/01_packets-and-packet-captures.mp4 10.7 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/02_linux-commands-via-the-bash-shell.mp4 10.7 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/04_while-loops.mp4 10.7 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/01_welcome-to-week-1.mp4 10.7 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/03_parse-a-text-file-in-python.mp4 10.5 MB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 10.4 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/04_omad-my-learning-journey-into-cybersecurity.mp4 10.4 MB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 10.3 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/01_welcome-to-week-2.mp4 10.3 MB
networks-and-network-security/04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.mp4 10.2 MB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/03_herbert-manage-threats-risks-and-vulnerabilities.mp4 10.1 MB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/03_talya-myths-about-the-cybersecurity-field.mp4 10.0 MB
linux-and-sql/01_introduction-to-operating-systems/03_the-operating-system-at-work/03_resource-allocation-via-the-os.mp4 9.9 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/02_congratulations-on-completing-the-google-cybersecurity-certificate-program.mp4 9.9 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/02_change-permissions.mp4 9.9 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/04_rebecca-learn-new-tools-and-technologies.mp4 9.8 MB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/01_the-benefits-of-documentation.mp4 9.8 MB
detection-and-response/02_network-monitoring-and-analysis/03_packet-inspection/01_packet-captures-with-tcpdump.mp4 9.8 MB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/04_incident-response-plans.mp4 9.8 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/02_query-for-events-with-splunk.mp4 9.7 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/01_welcome-to-week-3.mp4 9.6 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/01_reexamine-siem-tools.mp4 9.5 MB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/04_review-communicate-effectively-to-influence-stakeholders/01_wrap-up.mp4 9.5 MB
networks-and-network-security/01_network-architecture/03_network-communication/02_the-tcp-ip-model.mp4 9.4 MB
linux-and-sql/04_databases-and-sql/02_sql-queries/01_basic-queries.mp4 9.4 MB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/02_logs-and-siem-tools.mp4 9.3 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/01_recap-of-the-google-cybersecurity-certificate-program.mp4 9.3 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/08_cloud-networks.mp4 9.2 MB
linux-and-sql/01_introduction-to-operating-systems/01_get-started-with-the-course/01_introduction-to-course-4.mp4 9.1 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/01_welcome-to-week-4.mp4 9.0 MB
linux-and-sql/02_the-linux-operating-system/03_the-shell/02_input-and-output-in-the-shell.mp4 9.0 MB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/02_the-detection-and-analysis-phase-of-the-lifecycle.mp4 9.0 MB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/03_query-databases-with-sql.mp4 8.9 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/04_create-a-basic-python-script.mp4 8.8 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/04_examine-signatures-with-suricata.mp4 8.8 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/04_review-protect-organizational-assets/01_wrap-up.mp4 8.6 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/03_query-for-events-with-chronicle.mp4 8.6 MB
detection-and-response/03_incident-investigation-and-response/04_post-incident-actions/01_the-post-incident-activity-phase-of-the-lifecycle.mp4 8.6 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/05_review-threats-in-cybersecurity/01_wrap-up.mp4 8.5 MB
networks-and-network-security/02_network-operations/02_system-identification/02_virtual-private-networks-vpns.mp4 8.5 MB
linux-and-sql/04_databases-and-sql/04_sql-joins/02_types-of-joins.mp4 8.4 MB
manage-security-risks/01_security-domains/01_get-started-with-the-course/01_introduction-to-course-2.mp4 8.3 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/04_ask-the-interviewer-questions.mp4 8.3 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/01_welcome-to-week-1.mp4 8.2 MB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/04_congratulations-on-completing-course-1/01_course-wrap-up.mp4 8.1 MB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/03_interpret-network-communications-with-packets.mp4 8.0 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/01_welcome-to-week-5.mp4 7.9 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/05_examine-suricata-logs.mp4 7.7 MB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/03_review-the-evolution-of-cybersecurity/01_wrap-up.mp4 7.7 MB
networks-and-network-security/01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.mp4 7.7 MB
networks-and-network-security/01_network-architecture/03_network-communication/01_introduction-to-network-communication.mp4 7.6 MB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/01_introduction-to-course-6.mp4 7.6 MB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/02_kali-linux-tm.mp4 7.5 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/03_create-a-basic-function.mp4 7.5 MB
manage-security-risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/01_wrap-up.mp4 7.4 MB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/01_welcome-to-week-4.mp4 7.4 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/06_network-tools.mp4 7.4 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/05_tim-finding-purpose-in-protecting-assets.mp4 7.3 MB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf 7.3 MB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__physical-access-control.pdf 7.3 MB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/01_welcome-to-week-4.mp4 7.2 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/05_review-introduction-to-asset-security/01_wrap-up.mp4 7.2 MB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/01_welcome-to-week-2.mp4 7.0 MB
networks-and-network-security/04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.mp4 7.0 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/03_man-pages-within-the-shell.mp4 6.9 MB
networks-and-network-security/01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.mp4 6.8 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/03_what-are-networks.mp4 6.5 MB
prepare-for-cybersecurity-jobs/02_escalate-incidents/01_escalation-in-cybersecurity/01_welcome-to-week-2.mp4 6.4 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/02_the-linux-community.mp4 6.3 MB
linux-and-sql/02_the-linux-operating-system/03_the-shell/01_introduction-to-the-shell.mp4 6.3 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/05_congratulations-on-completing-course-6/01_course-wrap-up.mp4 6.1 MB
detection-and-response/01_introduction-to-detection-and-incident-response/02_the-incident-response-lifecycle/01_welcome-to-week-1.mp4 6.1 MB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__NIST.SP.800-53r5.pdf 6.1 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/06_akash-python-and-the-cybersecurity-professional.mp4 6.0 MB
networks-and-network-security/03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.mp4 5.8 MB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/01_incident-response-tools.mp4 5.7 MB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/01_welcome-to-week-2.mp4 5.7 MB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/03_intrusion-detection-systems.mp4 5.6 MB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/01_welcome-to-week-4.mp4 5.5 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/01_course-wrap-up.mp4 5.5 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/01_welcome-to-week-4.mp4 5.4 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/01_welcome-to-week-3.mp4 5.4 MB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.mp4 5.4 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/01_welcome-to-week-2.mp4 5.2 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/01_welcome-to-week-4.mp4 5.2 MB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/01_welcome-to-week-3.mp4 5.1 MB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/01_wrap-up.mp4 4.9 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/04_welcome-to-week-1.mp4 4.9 MB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.mp4 4.8 MB
prepare-for-cybersecurity-jobs/02_escalate-incidents/04_review-escalate-incidents/01_wrap-up.mp4 4.7 MB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/01_welcome-to-week-1.mp4 4.7 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/01_wrap-up.mp4 4.6 MB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/01_welcome-to-week-3.mp4 4.5 MB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__nist_small_business_fundamentals_july_2019.pptx 4.4 MB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/04_review-protect-assets-and-communicate-incidents/01_wrap-up.mp4 4.3 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/01_wrap-up.mp4 4.2 MB
manage-security-risks/01_security-domains/04_review-security-domains/01_wrap-up.mp4 4.1 MB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/03_review-engage-with-the-cybersecurity-community/01_wrap-up.mp4 4.0 MB
networks-and-network-security/04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.mp4 4.0 MB
linux-and-sql/04_databases-and-sql/06_congratulations-on-completing-course-4/01_course-wrap-up.mp4 3.9 MB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/04_review-write-effective-python-code/01_wrap-up.mp4 3.9 MB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/01_understand-your-stakeholders/01_welcome-to-week-3.mp4 3.9 MB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/01_welcome-to-week-2.mp4 3.9 MB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/04_review-work-with-strings-and-lists/01_wrap-up.mp4 3.8 MB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/05_investigate-packet-details_instructions.html 3.8 MB
networks-and-network-security/01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.mp4 3.8 MB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/01_welcome-to-week-3.mp4 3.7 MB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/01_wrap-up.mp4 3.6 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/05_review-introduction-to-python/01_wrap-up.mp4 3.6 MB
linux-and-sql/04_databases-and-sql/05_review-databases-and-sql/01_wrap-up.mp4 3.5 MB
linux-and-sql/03_linux-commands-in-the-bash-shell/05_review-linux-commands-in-the-bash-shell/01_wrap-up.mp4 3.5 MB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/01_welcome-to-week-2.mp4 3.4 MB
detection-and-response/02_network-monitoring-and-analysis/04_review-network-monitoring-and-analysis/01_wrap-up.mp4 3.4 MB
linux-and-sql/01_introduction-to-operating-systems/05_review-introduction-to-operating-systems/01_wrap-up.mp4 3.3 MB
networks-and-network-security/04_security-hardening/05_review-security-hardening/01_wrap-up.mp4 3.3 MB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf 3.1 MB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__gcat_threathorizons_full_sept2022.pdf 3.1 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/01_welcome-to-week-4.mp4 3.1 MB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/01_welcome-to-week-1.mp4 3.1 MB
networks-and-network-security/03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.mp4 3.1 MB
networks-and-network-security/04_security-hardening/03_network-hardening/02_network-security-applications_instructions.html 3.0 MB
automate-cybersecurity-tasks-with-python/04_python-in-practice/04_review-python-in-practice/01_wrap-up.mp4 3.0 MB
detection-and-response/03_incident-investigation-and-response/05_review-incident-investigation-and-response/01_wrap-up.mp4 3.0 MB
linux-and-sql/02_the-linux-operating-system/04_review-the-linux-operating-system/01_wrap-up.mp4 3.0 MB
networks-and-network-security/02_network-operations/03_review-network-operations/01_wrap-up.mp4 2.9 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/03_course-wrap-up.mp4 2.9 MB
manage-security-risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/01_wrap-up.mp4 2.7 MB
detection-and-response/01_introduction-to-detection-and-incident-response/05_review-introduction-to-detection-and-incident-response/01_wrap-up.mp4 2.5 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.mp4 2.4 MB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/03_review-cybersecurity-tools-and-programming-languages/01_wrap-up.mp4 2.2 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/01_wrap-up.mp4 2.1 MB
manage-security-risks/01_security-domains/01_get-started-with-the-course/02_course-2-overview_instructions.html 1.9 MB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__sp800-179r1-draft.pdf 1.9 MB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/02_event-and-incident-detection/01_welcome-to-week-1.mp4 1.9 MB
networks-and-network-security/01_network-architecture/05_review-network-architecture/01_wrap-up.mp4 1.8 MB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/07_network-components-devices-and-diagrams_instructions.html 1.8 MB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__nistspecialpublication800-92.pdf 1.8 MB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__index.html 1.7 MB
networks-and-network-security/01_network-architecture/03_network-communication/04_learn-more-about-the-tcp-ip-model_instructions.html 1.6 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/03_security-guidelines-in-action_Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf 1.6 MB
linux-and-sql/04_databases-and-sql/04_sql-joins/03_compare-types-of-joins_instructions.html 1.6 MB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__cis-controls-and-the-hph.pdf 1.6 MB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__nist.sp.800-61r2.pdf 1.5 MB
prepare-for-cybersecurity-jobs/06_Resources/03_course-8-resources-and-citations/01__nist.sp.800-61r2.pdf 1.5 MB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/06_analyze-indicators-of-compromise-with-investigative-tools_instructions.html 1.5 MB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__FULL_TEXT.pdf 1.5 MB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/02_course-8-overview_instructions.html 1.4 MB
networks-and-network-security/03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.mp4 1.4 MB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__R46536.pdf 1.4 MB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/02_course-6-overview_instructions.html 1.3 MB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/03_course-1-overview_instructions.html 1.3 MB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/02_course-5-overview_instructions.html 1.3 MB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf 1.3 MB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/06_more-about-security-audits_Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf 1.3 MB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf 1.3 MB
networks-and-network-security/01_network-architecture/01_get-started-with-the-course/02_course-3-overview_instructions.html 1.3 MB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/02_course-7-overview_instructions.html 1.3 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf 1.3 MB
linux-and-sql/01_introduction-to-operating-systems/01_get-started-with-the-course/02_course-4-overview_instructions.html 1.3 MB
linux-and-sql/04_databases-and-sql/06_congratulations-on-completing-course-4/02_course-4-glossary_Course_4_glossary.docx 1.2 MB
linux-and-sql/05_Resources/05_course-4-glossary/01__Course_4_glossary.docx 1.2 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/04_course-8-glossary_Course_8_glossary.docx 1.2 MB
prepare-for-cybersecurity-jobs/06_Resources/02_course-8-glossary/01__Course_8_glossary.docx 1.2 MB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf 1.1 MB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/03_showcase-your-work_instructions.html 920.8 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
assets-threats-and-vulnerabilities/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
automate-cybersecurity-tasks-with-python/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
detection-and-response/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
linux-and-sql/01_introduction-to-operating-systems/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
linux-and-sql/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
manage-security-risks/01_security-domains/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
manage-security-risks/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
networks-and-network-security/01_network-architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
networks-and-network-security/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/05_google-cybersecurity-certificate-glossary_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
prepare-for-cybersecurity-jobs/06_Resources/04_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
foundations-of-cybersecurity/05_Resources/04_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.2 kB
automate-cybersecurity-tasks-with-python/05_Resources/03_course-7-glossary/01__Course_7_glossary.docx 890.7 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/05_congratulations-on-completing-course-7/02_course-7-glossary_Course_7_glossary.docx 890.7 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/06_congratulations-on-completing-course-5/02_course-5-glossary_Course_5_glossary.docx 883.1 kB
assets-threats-and-vulnerabilities/05_Resources/05_course-5-glossary/01__Course_5_glossary.docx 883.1 kB
detection-and-response/05_Resources/04_course-6-glossary/01__Course_6_glossary.docx 880.4 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/05_congratulations-on-completing-course-6/02_course-6-glossary_Course_6_glossary.docx 880.3 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/04_congratulations-on-completing-course-1/02_course-1-glossary_Course_1_glossary.docx 879.5 kB
foundations-of-cybersecurity/05_Resources/02_course-1-glossary/01__Course_1_glossary.docx 879.3 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/02_course-2-glossary_Course_2_glossary.docx 879.1 kB
manage-security-risks/05_Resources/03_course-2-glossary/01__Course_2_glossary.docx 879.1 kB
networks-and-network-security/04_security-hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_Course_3_glossary.docx 878.1 kB
networks-and-network-security/05_Resources/03_course-3-glossary/01__Course_3_glossary.docx 878.1 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/06_more-about-security-audits_Control_categories.docx 858.1 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/05_congratulations-on-completing-course-7/03_get-started-on-the-next-course_instructions.html 825.4 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/04_congratulations-on-completing-course-1/03_get-started-on-the-next-course_instructions.html 815.3 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/06_congratulations-on-completing-course-5/03_get-started-on-the-next-course_instructions.html 813.8 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/03_get-started-on-the-next-course_instructions.html 812.2 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/05_congratulations-on-completing-course-6/03_get-started-on-the-next-course_instructions.html 808.4 kB
networks-and-network-security/04_security-hardening/06_congratulations-on-completing-course-3/03_get-started-on-the-next-course_instructions.html 805.3 kB
linux-and-sql/04_databases-and-sql/06_congratulations-on-completing-course-4/03_get-started-on-the-next-course_instructions.html 803.0 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__ncsam_eskimming_508.pdf 799.6 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/05_manage-common-threats-risks-and-vulnerabilities_instructions.html 797.8 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/02_learn-more-about-packet-captures_instructions.html 753.5 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__NIST.SP.800-218.pdf 739.9 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/09_cloud-computing-and-software-defined-networks_instructions.html 710.8 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/03_tools-for-protecting-business-operations_instructions.html 667.2 kB
networks-and-network-security/01_network-architecture/04_local-and-wide-network-communication/02_components-of-network-layer-communication_instructions.html 657.6 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/03_showcase-your-work_overview.html 651.7 kB
prepare-for-cybersecurity-jobs/06_Resources/03_course-8-resources-and-citations/01__overview.html 651.7 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/06_the-evolution-of-hash-functions_instructions.html 599.4 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__IntroToCybersecurityEthics.pdf 592.2 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/02_google-cybersecurity-certificate-overview_instructions.html 512.5 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/03_types-of-threat-actors_instructions.html 505.2 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/03_security-guidelines-in-action_instructions.html 483.8 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/04_search-methods-with-siem-tools_instructions.html 425.5 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/02_the-rise-of-sso-and-mfa_instructions.html 378.4 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf 368.9 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/02_detection-tools-and-techniques_instructions.html 351.0 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/05_types-of-phishing_instructions.html 347.5 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/04_understand-attackers_instructions.html 320.8 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__NIST.FIPS.140-3.pdf 310.6 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/06_identity-and-access-management_instructions.html 310.1 kB
networks-and-network-security/01_network-architecture/03_network-communication/05_the-osi-model_instructions.html 310.1 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/04_maintain-awareness-with-network-monitoring_instructions.html 300.8 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__RAID4.pdf 291.5 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/05_work-with-built-in-functions_functions.html 275.6 kB
automate-cybersecurity-tasks-with-python/05_Resources/04_course-7-resources-and-citations/01__functions.html 275.6 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-owasp-top-10.html 253.5 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__dod85.pdf 245.5 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_suricata-yaml.html 242.3 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__suricata-yaml.html 242.3 kB
detection-and-response/03_incident-investigation-and-response/04_post-incident-actions/02_post-incident-review_instructions.html 239.0 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__why-splunk.html 232.9 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__why-splunk.html 232.9 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/03_determine-the-type-of-attack_instructions.html 230.4 kB
prepare-for-cybersecurity-jobs/06_Resources/03_course-8-resources-and-citations/01__R0239.pdf 225.9 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__network-operations-center.html 224.9 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__malware.html 216.8 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/02_approach-cybersecurity-with-an-attacker-mindset_instructions.html 210.9 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/03_more-about-playbooks_instructions.html 205.2 kB
linux-and-sql/01_introduction-to-operating-systems/04_the-user-interface/02_the-command-line-in-use_instructions.html 201.8 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__paper.pdf 201.5 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__hipaa.html 200.6 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__hipaa.html 200.6 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/04_security-domains-cybersecurity-analysts-need-to-know_instructions.html 200.0 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/06_prepare-for-interviews-with-interview-warmup_instructions.html 187.5 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/03_social-engineering-tactics_instructions.html 179.5 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__5-signs-youve-been-hit-with-an-apt.html 176.6 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__question525.htm 174.4 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-cve-its-definition-and-purpose.html 173.2 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/02_an-introduction-to-malware_instructions.html 167.8 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-phishing-examples-types-and-techniques.html 165.3 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html 163.4 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/07_the-evolution-of-wireless-security-protocols_instructions.html 163.0 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__csos-guide-to-phishing-and-phishing-kits.html 159.6 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__ssrf-attacks-explained-and-how-to-defend-against-them.html 159.3 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html 159.2 kB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__operating-system2.htm 157.3 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/06_fortify-against-brute-force-cyber-attacks_instructions.html 156.8 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/04_controls-frameworks-and-compliance_instructions.html 155.5 kB
networks-and-network-security/03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/02_read-tcpdump-logs_instructions.html 150.2 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf 145.8 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/05_the-owasp-top-10_instructions.html 145.3 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/03_digital-and-physical-assets/02_the-emergence-of-cloud-security_instructions.html 144.7 kB
linux-and-sql/01_introduction-to-operating-systems/03_the-operating-system-at-work/02_requests-to-the-operating-system_instructions.html 137.1 kB
networks-and-network-security/02_network-operations/02_system-identification/04_subnetting-and-cidr_instructions.html 137.1 kB
detection-and-response/02_network-monitoring-and-analysis/03_packet-inspection/02_overview-of-tcpdump_instructions.html 135.7 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/04_information-privacy-regulations-and-compliance_instructions.html 132.3 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/05_indicators-of-compromise_instructions.html 130.8 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_instructions.html 127.4 kB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__ShellIntro.pdf 127.2 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/04_traits-of-an-effective-threat-model_instructions.html 123.8 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__sql_injection.asp 112.8 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/04_resources-for-completing-labs_instructions.html 111.1 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/06_resources-for-completing-labs_instructions.html 111.1 kB
linux-and-sql/05_Resources/03_resources-for-completing-linux-labs/01__resources.html 111.1 kB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/04_resources-for-completing-linux-labs_instructions.html 111.1 kB
linux-and-sql/04_databases-and-sql/02_sql-queries/03_resources-for-completing-sql-labs_instructions.html 111.1 kB
linux-and-sql/05_Resources/04_resources-for-completing-sql-labs/01__resources.html 111.1 kB
assets-threats-and-vulnerabilities/05_Resources/03_resources-for-completing-labs/01__resources.html 111.1 kB
detection-and-response/05_Resources/03_resources-for-completing-labs/01__resources.html 111.1 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/02_import-files-into-python_instructions.html 109.9 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/06_common-classification-requirements_instructions.html 108.8 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/04_navigate-linux-and-read-file-content_instructions.html 107.4 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__xml_whatis.asp 91.5 kB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/03_roles-in-response_instructions.html 86.4 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__vulnerability-vs-threat-vs-risk.html 78.6 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__rules-and-security-requirements.html 76.6 kB
detection-and-response/02_network-monitoring-and-analysis/03_packet-inspection/02_overview-of-tcpdump_tcpdump.1.html 74.3 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__tcpdump.1.html 74.3 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/05_indicators-of-compromise_the-pyramid-of-pain.html 68.7 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__the-pyramid-of-pain.html 68.7 kB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__thegnuproject.html 66.6 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__Cyber-Incident-Response-Standard.docx 64.8 kB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__01-intro.html 64.8 kB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__article.asp 64.3 kB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__what-is-a-firewall.html 62.8 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__resources.html 61.6 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/02_apply-the-star-method-during-interviews_instructions.html 52.2 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/03_prepare-for-interviews_vol01iss13.cfm 46.6 kB
prepare-for-cybersecurity-jobs/06_Resources/03_course-8-resources-and-citations/01__vol01iss13.cfm 46.6 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__encryption-explained.html 46.3 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__55.html 43.5 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__resources.html 37.9 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__display.cfm 37.9 kB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__aa494182vexchg.140 34.8 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__resources.html 33.8 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_index.html 33.3 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__index.html 33.3 kB
foundations-of-cybersecurity/05_Resources/03_course-1-resources-and-citations/01__resources.html 28.8 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__16-software-updates.html 26.1 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_suricata-update.html 24.0 kB
detection-and-response/05_Resources/05_course-6-resources-and-citations/01__suricata-update.html 24.0 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_eve-json-examplesjq.html 23.5 kB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__index.html 23.5 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__index.html 21.8 kB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__resources.html 20.2 kB
foundations-of-cybersecurity/05_Resources/01_frequently-asked-questions/01__resources.html 19.9 kB
automate-cybersecurity-tasks-with-python/05_Resources/01_frequently-asked-questions/01__resources.html 19.1 kB
manage-security-risks/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
detection-and-response/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
linux-and-sql/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
assets-threats-and-vulnerabilities/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
prepare-for-cybersecurity-jobs/06_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
networks-and-network-security/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__resources.html 18.0 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/03_more-about-playbooks_guidelines.html 17.8 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__guidelines.html 17.8 kB
manage-security-risks/05_Resources/04_course-2-resources-and-citations/01__Format-Security-plus-Study-Guide.pdf 17.2 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/06_overview-of-log-file-formats_instructions.html 16.8 kB
assets-threats-and-vulnerabilities/05_Resources/06_frequently-asked-questions/01__resources.html 16.3 kB
automate-cybersecurity-tasks-with-python/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
detection-and-response/05_Resources/06_frequently-asked-questions/01__resources.html 16.3 kB
foundations-of-cybersecurity/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
linux-and-sql/05_Resources/07_frequently-asked-questions/01__resources.html 16.3 kB
manage-security-risks/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
networks-and-network-security/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
prepare-for-cybersecurity-jobs/06_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/05_more-on-loops-in-python_instructions.html 16.0 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/03_permission-commands_instructions.html 15.9 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.en.srt 15.6 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/02_more-on-conditionals-in-python_instructions.html 15.5 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/04_strings-and-the-security-analyst_instructions.html 13.8 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/02_work-with-lists-and-develop-algorithms/03_lists-and-the-security-analyst_instructions.html 13.4 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/03_explore-debugging-techniques_instructions.html 13.3 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/02_more-about-data-types_instructions.html 12.5 kB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__7.1 11.9 kB
prepare-for-cybersecurity-jobs/06_Resources/03_course-8-resources-and-citations/01__resources.html 11.8 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/02_more-about-regular-expressions_instructions.html 11.7 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/04_helpful-resources-and-tips_instructions.html 11.5 kB
manage-security-risks/01_security-domains/01_get-started-with-the-course/03_helpful-resources-and-tips_instructions.html 11.5 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/03_helpful-resources-and-tips_instructions.html 11.5 kB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/03_helpful-resources-and-tips_instructions.html 11.5 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/04_helpful-resources-and-tips_instructions.html 11.5 kB
networks-and-network-security/01_network-architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_instructions.html 11.5 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/05_helpful-resources-and-tips_instructions.html 11.5 kB
linux-and-sql/01_introduction-to-operating-systems/01_get-started-with-the-course/03_helpful-resources-and-tips_instructions.html 11.4 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/05_responsible-use-of-sudo_instructions.html 11.4 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/03_create-and-modify-directories-and-files.en.srt 11.4 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/04_additional-network-protocols_instructions.html 11.3 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/01_file-permissions-and-ownership.en.srt 11.3 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/03_functions-and-variables_instructions.html 11.1 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.en.srt 10.6 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/03_work-with-variables-in-python.en.srt 10.2 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/01_conditional-statements-in-python.en.srt 9.9 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/04_manage-directories-and-files_instructions.html 9.9 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/03_ensure-proper-syntax-and-readability-in-python_instructions.html 9.8 kB
networks-and-network-security/04_security-hardening/05_review-security-hardening/03_weekly-challenge-4_exam.html 9.7 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/04_overview-of-detection-tools_instructions.html 9.7 kB
networks-and-network-security/03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/03_weekly-challenge-3_exam.html 9.5 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/03_symmetric-and-asymmetric-encryption_instructions.html 9.4 kB
networks-and-network-security/04_security-hardening/04_cloud-hardening/03_secure-the-cloud_instructions.html 9.2 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/04_add-and-delete-users.en.srt 9.1 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/06_more-about-security-audits_instructions.html 9.0 kB
linux-and-sql/04_databases-and-sql/02_sql-queries/02_query-a-database_instructions.html 9.0 kB
assets-threats-and-vulnerabilities/05_Resources/07_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
automate-cybersecurity-tasks-with-python/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
detection-and-response/05_Resources/07_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
linux-and-sql/05_Resources/08_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
manage-security-risks/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
networks-and-network-security/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
prepare-for-cybersecurity-jobs/06_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/02_core-cybersecurity-knowledge-and-skills/03_create-a-cybersecurity-portfolio_instructions.html 8.9 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/02_public-key-infrastructure.en.srt 8.9 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/02_filter-content-in-linux_instructions.html 8.9 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/03_common-network-protocols_instructions.html 8.9 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__2-4-3.html 8.8 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/04_use-siem-tools-to-protect-organizations_instructions.html 8.8 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/04_explore-built-in-functions.en.srt 8.7 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/03_string-indices-and-slices.en.srt 8.7 kB
linux-and-sql/04_databases-and-sql/04_sql-joins/01_join-tables-in-sql.en.srt 8.7 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.en.srt 8.7 kB
networks-and-network-security/02_network-operations/03_review-network-operations/03_weekly-challenge-2_exam.html 8.7 kB
networks-and-network-security/02_network-operations/02_system-identification/06_virtual-networks-and-privacy_instructions.html 8.6 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/04_common-attacks-and-their-effectiveness_instructions.html 8.6 kB
networks-and-network-security/01_network-architecture/05_review-network-architecture/03_weekly-challenge-1_exam.html 8.6 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/02_work-with-lists-and-develop-algorithms/02_write-a-simple-algorithm.en.srt 8.6 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/03_best-practices-for-log-collection-and-management_instructions.html 8.5 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/02_work-with-lists-and-develop-algorithms/01_list-operations-in-python.en.srt 8.5 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/03_the-triage-process_instructions.html 8.5 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/03_essential-python-components-for-automation_instructions.html 8.4 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__7.5 8.4 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/04_assign-and-reassign-variables-in-python_instructions.html 8.4 kB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/03_filters-with-and-or-and-not.en.srt 8.4 kB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__bootup.html 8.3 kB
networks-and-network-security/04_security-hardening/02_os-hardening/02_brute-force-attacks-and-os-hardening_instructions.html 8.3 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.en.srt 8.3 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/04_while-loops.en.srt 8.3 kB
linux-and-sql/04_databases-and-sql/02_sql-queries/05_the-where-clause-and-basic-operators_instructions.html 8.3 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.en.srt 8.3 kB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.en.srt 8.2 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.en.txt 8.2 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/05_review-threats-in-cybersecurity/02_glossary-terms-from-week-4_instructions.html 8.1 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/02_apply-debugging-strategies.en.srt 8.1 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html 8.1 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.en.srt 8.1 kB
networks-and-network-security/03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.en.srt 8.0 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/02_string-operations.en.srt 8.0 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/04_reexamine-the-fields-of-a-packet-header.en.srt 8.0 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/03_cybersecurity-incident-detection-methods_instructions.html 7.9 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/03_principle-of-least-privilege_instructions.html 7.9 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/01_core-skills-for-cybersecurity-professionals.en.srt 7.8 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/03_core-commands-for-navigation-and-reading-files.en.srt 7.8 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/01_data-types-in-python.en.srt 7.8 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/03_for-loops.en.srt 7.8 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.en.srt 7.8 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/01_find-what-you-need-with-linux.en.srt 7.7 kB
networks-and-network-security/04_security-hardening/02_os-hardening/01_os-hardening-practices.en.srt 7.7 kB
networks-and-network-security/05_Resources/04_course-3-resources-and-citations/01__7.2 7.7 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.en.srt 7.7 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/02_approaches-to-vulnerability-scanning_instructions.html 7.6 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/05_work-with-built-in-functions_instructions.html 7.6 kB
networks-and-network-security/02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.en.srt 7.6 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.en.srt 7.6 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.en.srt 7.5 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/03_transferable-and-technical-cybersecurity-skills_instructions.html 7.5 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/03_web-based-exploits/01_cross-site-scripting.en.srt 7.5 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/05_data-exfiltration-attacks.en.srt 7.4 kB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/03_overview-of-interception-tactics_instructions.html 7.4 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/02_change-permissions.en.srt 7.3 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/03_the-importance-of-updates_instructions.html 7.3 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.en.srt 7.3 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/02_common-cybersecurity-tools.en.srt 7.3 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/04_review-protect-organizational-assets/02_glossary-terms-from-week-2_instructions.html 7.2 kB
detection-and-response/02_network-monitoring-and-analysis/03_packet-inspection/01_packet-captures-with-tcpdump.en.srt 7.2 kB
automate-cybersecurity-tasks-with-python/05_Resources/04_course-7-resources-and-citations/01__resources.html 7.2 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/02_query-for-events-with-splunk.en.srt 7.2 kB
linux-and-sql/01_introduction-to-operating-systems/04_the-user-interface/01_gui-versus-cli.en.srt 7.1 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/04_plan-a-security-audit.en.srt 7.1 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/02_the-what-why-and-how-of-asset-security.en.srt 7.1 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/04_develop-a-parsing-algorithm-in-python.en.srt 7.0 kB
manage-security-risks/02_security-frameworks-and-controls/03_nist-frameworks/01_nist-frameworks.en.srt 7.0 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/04_python-functions-in-cybersecurity_instructions.html 7.0 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.en.srt 7.0 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/03_secure-design.en.srt 7.0 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/05_variations-of-logs.en.srt 6.9 kB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/02_operators-for-filtering-dates-and-numbers_instructions.html 6.9 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/01_understand-your-stakeholders/02_stakeholders-in-cybersecurity.en.srt 6.9 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/03_explore-the-cissp-security-domains-part-2.en.srt 6.9 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/03_query-for-events-with-chronicle.en.srt 6.8 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.en.srt 6.8 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/03_components-of-a-detection-signature.en.srt 6.8 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/01_escalation-in-cybersecurity/02_the-importance-of-escalation.en.srt 6.8 kB
networks-and-network-security/03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/03_how-intrusions-compromise-your-system_instructions.html 6.8 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/05_security-starts-with-asset-classification.en.srt 6.8 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/03_digital-and-physical-assets/01_assets-in-a-digital-world.en.srt 6.8 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/01_owasp-security-principles.en.srt 6.7 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/02_core-cybersecurity-knowledge-and-skills/02_use-tools-to-protect-business-operations_instructions.html 6.7 kB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/04_the-relationship-between-frameworks-and-controls_instructions.html 6.7 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.en.srt 6.7 kB
assets-threats-and-vulnerabilities/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
automate-cybersecurity-tasks-with-python/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
detection-and-response/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
foundations-of-cybersecurity/05_Resources/04_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
linux-and-sql/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
manage-security-risks/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
networks-and-network-security/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/05_google-cybersecurity-certificate-glossary_instructions.html 6.7 kB
prepare-for-cybersecurity-jobs/06_Resources/04_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.en.srt 6.7 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/05_linux-architecture-explained_instructions.html 6.7 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/06_congratulations-on-completing-course-5/02_course-5-glossary_instructions.html 6.6 kB
assets-threats-and-vulnerabilities/05_Resources/05_course-5-glossary/01__resources.html 6.6 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/05_congratulations-on-completing-course-7/02_course-7-glossary_instructions.html 6.6 kB
automate-cybersecurity-tasks-with-python/05_Resources/03_course-7-glossary/01__resources.html 6.6 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/05_congratulations-on-completing-course-6/02_course-6-glossary_instructions.html 6.6 kB
detection-and-response/05_Resources/04_course-6-glossary/01__resources.html 6.6 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/04_congratulations-on-completing-course-1/02_course-1-glossary_instructions.html 6.6 kB
foundations-of-cybersecurity/05_Resources/02_course-1-glossary/01__resources.html 6.6 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/02_course-2-glossary_instructions.html 6.6 kB
manage-security-risks/05_Resources/03_course-2-glossary/01__resources.html 6.6 kB
linux-and-sql/04_databases-and-sql/06_congratulations-on-completing-course-4/02_course-4-glossary_instructions.html 6.6 kB
linux-and-sql/05_Resources/05_course-4-glossary/01__resources.html 6.6 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.en.txt 6.6 kB
networks-and-network-security/04_security-hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_instructions.html 6.6 kB
networks-and-network-security/05_Resources/03_course-3-glossary/01__resources.html 6.6 kB
detection-and-response/01_introduction-to-detection-and-incident-response/02_the-incident-response-lifecycle/02_introduction-to-the-incident-response-lifecycle.en.srt 6.6 kB
linux-and-sql/04_databases-and-sql/02_sql-queries/04_basic-filters-on-sql-queries.en.srt 6.6 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/04_course-8-glossary_instructions.html 6.6 kB
prepare-for-cybersecurity-jobs/06_Resources/02_course-8-glossary/01__resources.html 6.6 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/03_understand-risks-threats-and-vulnerabilities_instructions.html 6.6 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/04_nist-s-risk-management-framework.en.srt 6.6 kB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/04_more-on-filters-with-and-or-and-not_instructions.html 6.5 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/01_explore-the-interview-process.en.srt 6.5 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.en.srt 6.5 kB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/04_compare-operating-systems_instructions.html 6.4 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/03_defense-in-depth-strategy.en.srt 6.4 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/05_business-continuity-considerations_instructions.html 6.3 kB
networks-and-network-security/04_security-hardening/03_network-hardening/01_network-hardening-practices.en.srt 6.3 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/01_elements-of-a-security-plan.en.srt 6.3 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/03_create-a-resume.en.srt 6.3 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/01_access-controls-and-authentication-systems.en.srt 6.3 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/02_explore-the-cissp-security-domains-part-1.en.srt 6.3 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/01_conditional-statements-in-python.en.txt 6.3 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/02_code-readability.en.srt 6.3 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt 6.2 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/01_security-monitoring-with-detection-tools.en.srt 6.2 kB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/04_the-value-of-cybersecurity-playbooks.en.srt 6.2 kB
networks-and-network-security/02_network-operations/02_system-identification/03_security-zones.en.srt 6.2 kB
manage-security-risks/02_security-frameworks-and-controls/03_nist-frameworks/02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt 6.2 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/01_the-role-of-triage-in-incident-response.en.srt 6.2 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/02_network-protocols.en.srt 6.2 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/05_alert-and-event-management-with-siem-and-soar-tools.en.srt 6.1 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/02_the-importance-of-logs.en.srt 6.1 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.en.srt 6.1 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/06_build-rapport-with-interviewers.en.srt 6.1 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/04_examine-signatures-with-suricata.en.srt 6.1 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.en.srt 6.1 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/02_introduction-to-databases.en.srt 6.1 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/01_threats-risks-and-vulnerabilities.en.srt 6.0 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/01_vulnerability-assessments.en.srt 6.0 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt 6.0 kB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/03_best-practices-for-effective-documentation_instructions.html 6.0 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/03_create-and-modify-directories-and-files.en.txt 6.0 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/02_communicate-for-impact/02_building-blocks-of-cybersecurity-communications.en.srt 6.0 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/01_file-permissions-and-ownership.en.txt 5.9 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/02_the-nist-cybersecurity-framework.en.srt 5.9 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/04_linux-architecture.en.srt 5.9 kB
linux-and-sql/01_introduction-to-operating-systems/03_the-operating-system-at-work/01_inside-the-operating-system.en.srt 5.9 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/03_your-impact-on-data-protection/01_detect-and-protect-without-neglect.en.srt 5.9 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/02_event-and-incident-detection/03_data-and-asset-classification_instructions.html 5.9 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.en.srt 5.9 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/02_automate-cybersecurity-tasks-with-python.en.srt 5.9 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/05_ashley-my-path-to-cybersecurity.en.srt 5.9 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt 5.8 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/01_understand-your-stakeholders/03_the-purpose-and-impact-of-stakeholders_instructions.html 5.8 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/04_prepare-for-technical-interviews_instructions.html 5.8 kB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/02_document-evidence-with-chain-of-custody-forms.en.srt 5.7 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/03_tips-for-interviewing-remotely_instructions.html 5.7 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/02_to-escalate-or-not-to-escalate/01_prepare-to-escalate-through-security-recognition.en.srt 5.7 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/05_common-cybersecurity-terminology_instructions.html 5.7 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/02_find-cybersecurity-jobs.en.srt 5.7 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/03_escalation-timing_instructions.html 5.7 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/02_toni-my-path-to-cybersecurity.en.srt 5.7 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/02_more-about-cybersecurity-tools_instructions.html 5.6 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/03_your-impact-on-data-protection/02_disaster-recovery-and-business-continuity_instructions.html 5.6 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/03_strategies-for-engaging-with-the-cybersecurity-community_instructions.html 5.6 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/03_prepare-for-interviews_instructions.html 5.6 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/01_from-simple-activity-to-major-data-breach.en.srt 5.6 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/04_why-we-audit-user-activity.en.srt 5.6 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/01_use-parameters-in-functions.en.srt 5.6 kB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/03_controls.en.srt 5.5 kB
assets-threats-and-vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__5.2 5.5 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/02_more-about-owasp-security-principles_instructions.html 5.5 kB
linux-and-sql/04_databases-and-sql/04_sql-joins/04_continuous-learning-in-sql_instructions.html 5.5 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/05_complete-a-security-audit.en.srt 5.4 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt 5.4 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/02_the-interview-process_instructions.html 5.4 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/03_work-with-variables-in-python.en.txt 5.4 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/03_how-to-create-a-visual-dashboard.en.srt 5.4 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/02_python-and-cybersecurity.en.srt 5.3 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt 5.3 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/02_security-controls.en.srt 5.3 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/02_work-with-lists-and-develop-algorithms/01_list-operations-in-python.en.txt 5.3 kB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/01_filter-dates-and-numbers.en.srt 5.3 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/02_core-cybersecurity-knowledge-and-skills/01_introduction-to-linux-sql-and-python.en.srt 5.3 kB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.en.srt 5.3 kB
networks-and-network-security/03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/04_real-life-ddos-attack_instructions.html 5.2 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/01_packets-and-packet-captures.en.srt 5.2 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/04_linux-resources_instructions.html 5.2 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/03_web-based-exploits/02_exploitable-gaps-in-databases.en.srt 5.2 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/02_linux-commands-via-the-bash-shell.en.srt 5.2 kB
networks-and-network-security/02_network-operations/03_review-network-operations/02_glossary-terms-from-week-2_instructions.html 5.2 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/02_event-and-incident-detection/02_security-as-a-mindset.en.srt 5.2 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/04_the-future-of-siem-tools_instructions.html 5.2 kB
linux-and-sql/04_databases-and-sql/04_sql-joins/02_types-of-joins.en.srt 5.2 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/05_conduct-pre-interview-research.en.srt 5.2 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/02_communicate-for-impact/03_communicate-effectively-with-stakeholders_instructions.html 5.2 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/03_your-impact-on-data-protection/03_julianas-story-asset-protection_instructions.html 5.1 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/02_learn-more-about-developing-an-elevator-pitch_instructions.html 5.1 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/05_garvey-cover-letter-tips.en.srt 5.1 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/02_create-visual-dashboards-for-impactful-cybersecurity-communications_instructions.html 5.1 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/02_introduction-to-linux.en.srt 5.1 kB
linux-and-sql/02_the-linux-operating-system/04_review-the-linux-operating-system/02_glossary-terms-from-week-2_instructions.html 5.1 kB
manage-security-risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/02_glossary-terms-from-week-2_instructions.html 5.1 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/05_non-repudiation-and-hashing.en.srt 5.1 kB
networks-and-network-security/02_network-operations/02_system-identification/05_proxy-servers.en.srt 5.1 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/01_a-proactive-approach-to-security.en.srt 5.1 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/05_karan-interview-tips-from-a-hiring-manager.en.srt 5.0 kB
linux-and-sql/02_the-linux-operating-system/03_the-shell/02_input-and-output-in-the-shell.en.srt 5.0 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.en.srt 5.0 kB
networks-and-network-security/01_network-architecture/03_network-communication/06_test-your-knowledge-network-communication_quiz.html 5.0 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.en.srt 5.0 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/03_angel-my-personal-career-journey.en.srt 5.0 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/01_escalation-in-cybersecurity/03_escalate-with-a-purpose_instructions.html 5.0 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/04_julianas-story-attention-to-detail_instructions.html 4.9 kB
detection-and-response/03_incident-investigation-and-response/05_review-incident-investigation-and-response/02_glossary-terms-from-week-3_instructions.html 4.9 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/02_return-statements.en.srt 4.9 kB
manage-security-risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/01_explore-the-cia-triad.en.srt 4.9 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/01_introduction-to-course-7.en.srt 4.9 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/04_add-and-delete-users.en.txt 4.8 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/02_build-your-cybersecurity-network/01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt 4.8 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/04_emily-overcome-imposter-syndrome.en.srt 4.8 kB
linux-and-sql/04_databases-and-sql/02_sql-queries/01_basic-queries.en.srt 4.8 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/03_garvey-technical-interview-tips.en.srt 4.8 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/04_niru-adopt-an-attacker-mindset.en.srt 4.7 kB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/01_incident-response-teams.en.srt 4.7 kB
networks-and-network-security/04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.en.srt 4.7 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/02_the-value-of-documentation.en.srt 4.7 kB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/02_fatima-the-importance-of-communication-during-incident-response.en.srt 4.7 kB
linux-and-sql/04_databases-and-sql/04_sql-joins/01_join-tables-in-sql.en.txt 4.7 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/02_public-key-infrastructure.en.txt 4.6 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/03_string-indices-and-slices.en.txt 4.6 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/03_the-importance-of-network-traffic-flows.en.srt 4.6 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt 4.6 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/04_explore-built-in-functions.en.txt 4.6 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/03_web-based-exploits/01_cross-site-scripting.en.txt 4.6 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/02_glossary-terms-from-week-4_instructions.html 4.6 kB
networks-and-network-security/01_network-architecture/05_review-network-architecture/02_glossary-terms-from-week-1_instructions.html 4.6 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/06_network-tools.en.srt 4.6 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/01_develop-an-elevator-pitch.en.srt 4.6 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/04_claim-your-google-cybersecurity-certificate-badge_instructions.html 4.6 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/04_julianas-story-effective-communication_instructions.html 4.6 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/04_omad-my-learning-journey-into-cybersecurity.en.srt 4.5 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.en.txt 4.5 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/04_da-queshia-my-path-to-cybersecurity.en.srt 4.5 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/03_siem-dashboards.en.srt 4.5 kB
networks-and-network-security/01_network-architecture/03_network-communication/02_the-tcp-ip-model.en.srt 4.5 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/06_congratulations-on-completing-course-5/01_course-wrap-up.en.srt 4.5 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.srt 4.5 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/01_introduction-to-course-5.en.srt 4.5 kB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/03_more-linux-distributions_instructions.html 4.5 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt 4.5 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/03_explore-the-cissp-security-domains-part-2.en.txt 4.5 kB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/03_filters-with-and-or-and-not.en.txt 4.5 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/02_work-with-lists-and-develop-algorithms/02_write-a-simple-algorithm.en.txt 4.5 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/01_explore-common-siem-tools.en.srt 4.5 kB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/04_dave-grow-your-cybersecurity-career-with-mentors.en.srt 4.4 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/01_use-strategies-to-answer-interview-questions.en.srt 4.4 kB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/03_introduction-to-operating-systems.en.srt 4.4 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/02_to-escalate-or-not-to-escalate/02_recognize-roles-and-responsibilities-during-escalation_instructions.html 4.4 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/04_develop-a-parsing-algorithm-in-python.en.txt 4.4 kB
linux-and-sql/05_Resources/06_course-4-resources-and-citations/01__subsection3.1.html 4.4 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/04_mk-changes-in-the-cybersecurity-industry.en.srt 4.4 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.en.txt 4.4 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.en.txt 4.4 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.en.txt 4.4 kB
networks-and-network-security/02_network-operations/02_system-identification/02_virtual-private-networks-vpns.en.srt 4.4 kB
manage-security-risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/02_use-the-cia-triad-to-protect-organizations_instructions.html 4.4 kB
networks-and-network-security/02_network-operations/02_system-identification/07_test-your-knowledge-system-identification_quiz.html 4.4 kB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.en.txt 4.4 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/03_get-to-know-python_instructions.html 4.4 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt 4.4 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/02_the-what-why-and-how-of-asset-security.en.txt 4.4 kB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/01_linux-distributions.en.srt 4.4 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/04_while-loops.en.txt 4.4 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/04_tips-for-finding-and-applying-for-a-job_instructions.html 4.3 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/02_build-your-cybersecurity-network/02_connect-with-other-cybersecurity-professionals_instructions.html 4.3 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/03_review-the-evolution-of-cybersecurity/02_glossary-terms-from-week-2_instructions.html 4.3 kB
networks-and-network-security/03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.en.txt 4.3 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.en.txt 4.3 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/04_sql-filtering-versus-linux-filtering_instructions.html 4.3 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/02_apply-debugging-strategies.en.txt 4.3 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.en.txt 4.3 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/02_helpful-cybersecurity-resources.en.srt 4.3 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/05_python-environments_instructions.html 4.3 kB
networks-and-network-security/01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.en.srt 4.3 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/04_reexamine-the-fields-of-a-packet-header.en.txt 4.3 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.en.txt 4.2 kB
detection-and-response/01_introduction-to-detection-and-incident-response/05_review-introduction-to-detection-and-incident-response/02_glossary-terms-from-week-1_instructions.html 4.2 kB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/01_introduction-to-course-6.en.srt 4.2 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt 4.2 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/02_string-operations.en.txt 4.2 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt 4.2 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/01_core-skills-for-cybersecurity-professionals.en.txt 4.2 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.en.txt 4.2 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/04_the-importance-of-cybersecurity.en.srt 4.2 kB
linux-and-sql/04_databases-and-sql/02_sql-queries/04_basic-filters-on-sql-queries.en.txt 4.1 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/03_core-commands-for-navigation-and-reading-files.en.txt 4.1 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/04_conditional-and-iterative-statements/03_for-loops.en.txt 4.1 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/01_access-a-text-file-in-python.en.srt 4.1 kB
detection-and-response/02_network-monitoring-and-analysis/04_review-network-monitoring-and-analysis/02_glossary-terms-from-week-2_instructions.html 4.1 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/02_logs-and-siem-tools.en.srt 4.1 kB
detection-and-response/01_introduction-to-detection-and-incident-response/02_the-incident-response-lifecycle/02_introduction-to-the-incident-response-lifecycle.en.txt 4.1 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/05_review-introduction-to-python/02_glossary-terms-from-week-1_instructions.html 4.1 kB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/05_test-your-knowledge-network-interception-attack-tactics_quiz.html 4.1 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/02_introduction-to-functions.en.srt 4.1 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.en.txt 4.1 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/02_explore-the-cissp-security-domains-part-1.en.txt 4.1 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/03_man-pages-within-the-shell.en.srt 4.1 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/01_elements-of-a-security-plan.en.txt 4.1 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.en.txt 4.1 kB
networks-and-network-security/04_security-hardening/02_os-hardening/01_os-hardening-practices.en.txt 4.1 kB
networks-and-network-security/02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.en.txt 4.0 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.en.txt 4.0 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/03_create-a-resume.en.txt 4.0 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/04_victoria-continue-your-learning-journey.en.srt 4.0 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/01_access-controls-and-authentication-systems.en.txt 4.0 kB
linux-and-sql/01_introduction-to-operating-systems/01_get-started-with-the-course/01_introduction-to-course-4.en.srt 4.0 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/02_manage-file-content-in-bash/01_find-what-you-need-with-linux.en.txt 4.0 kB
manage-security-risks/01_security-domains/04_review-security-domains/02_glossary-terms-from-week-1_instructions.html 4.0 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/01_recap-of-the-google-cybersecurity-certificate-program.en.srt 4.0 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/03_core-python-components/01_data-types-in-python.en.txt 4.0 kB
linux-and-sql/01_introduction-to-operating-systems/03_the-operating-system-at-work/03_resource-allocation-via-the-os.en.srt 4.0 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/05_data-exfiltration-attacks.en.txt 4.0 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/02_glossary-terms-from-week-3_instructions.html 4.0 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/03_query-databases-with-sql.en.srt 4.0 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/02_code-readability.en.txt 3.9 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/01_introduction-to-course-8.en.srt 3.9 kB
networks-and-network-security/03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html 3.9 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.en.txt 3.9 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/05_adedayo-sql-in-cybersecurity.en.srt 3.9 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/01_welcome-to-week-3.en.srt 3.9 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt 3.9 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.en.txt 3.9 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/02_robin-foster-cross-team-collaboration.en.srt 3.9 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/04_tri-life-in-asset-security.en.srt 3.9 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/05_parisa-the-parallels-of-accessibility-and-security.en.srt 3.9 kB
networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.en.srt 3.9 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/02_common-cybersecurity-tools.en.txt 3.9 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/01_visual-storytelling-in-cybersecurity.en.srt 3.9 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/03_authenticate-and-authorize-users/02_change-permissions.en.txt 3.9 kB
networks-and-network-security/04_security-hardening/03_network-hardening/04_test-your-knowledge-network-hardening_quiz.html 3.9 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/02_query-for-events-with-splunk.en.txt 3.9 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt 3.9 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/04_examine-signatures-with-suricata.en.txt 3.9 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.en.txt 3.8 kB
linux-and-sql/01_introduction-to-operating-systems/04_the-user-interface/03_ellen-my-path-into-cybersecurity.en.srt 3.8 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/01_threats-risks-and-vulnerabilities.en.txt 3.8 kB
networks-and-network-security/03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/02_glossary-terms-from-week-3_instructions.html 3.8 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/02_the-importance-of-logs.en.txt 3.8 kB
linux-and-sql/01_introduction-to-operating-systems/04_the-user-interface/01_gui-versus-cli.en.txt 3.8 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/05_alert-and-event-management-with-siem-and-soar-tools.en.txt 3.8 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/06_participate-in-program-surveys_instructions.html 3.8 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/03_dion-my-personal-career-journey.en.srt 3.8 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/01_damar-my-journey-into-linux-commands.en.srt 3.8 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt 3.8 kB
networks-and-network-security/04_security-hardening/02_os-hardening/04_test-your-knowledge-os-hardening_quiz.html 3.8 kB
detection-and-response/02_network-monitoring-and-analysis/03_packet-inspection/01_packet-captures-with-tcpdump.en.txt 3.8 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/04_create-a-basic-python-script.en.srt 3.8 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/02_introduction-to-databases.en.txt 3.8 kB
networks-and-network-security/01_network-architecture/04_local-and-wide-network-communication/03_test-your-knowledge-local-and-wide-network-communication_quiz.html 3.8 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/03_create-a-basic-function.en.srt 3.8 kB
networks-and-network-security/01_network-architecture/03_network-communication/01_introduction-to-network-communication.en.srt 3.8 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/02_communicate-for-impact/01_clear-and-concise-communication.en.srt 3.7 kB
manage-security-risks/02_security-frameworks-and-controls/03_nist-frameworks/01_nist-frameworks.en.txt 3.7 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/01_reexamine-siem-tools.en.srt 3.7 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/04_review-vulnerabilities-in-systems/02_glossary-terms-from-week-3_instructions.html 3.7 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/04_risk-and-asset-security/02_the-nist-cybersecurity-framework.en.txt 3.7 kB
networks-and-network-security/04_security-hardening/04_cloud-hardening/04_test-your-knowledge-cloud-hardening_quiz.html 3.7 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/03_secure-design.en.txt 3.7 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/04_plan-a-security-audit.en.txt 3.7 kB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/04_incident-response-plans.en.srt 3.7 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/05_variations-of-logs.en.txt 3.7 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.en.txt 3.7 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/01_understand-your-stakeholders/02_stakeholders-in-cybersecurity.en.txt 3.7 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/08_cloud-networks.en.srt 3.7 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/05_congratulations-on-completing-course-6/01_course-wrap-up.en.srt 3.7 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/04_clancy-continual-learning-and-python.en.srt 3.7 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/05_security-starts-with-asset-classification.en.txt 3.7 kB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/01_the-benefits-of-documentation.en.srt 3.7 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/04_review-vulnerabilities-in-systems/01_wrap-up.en.srt 3.7 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.en.txt 3.7 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/01_escalation-in-cybersecurity/02_the-importance-of-escalation.en.txt 3.6 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/05_congratulations-on-completing-course-7/01_course-wrap-up.en.srt 3.6 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/03_query-for-events-with-chronicle.en.txt 3.6 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/03_digital-and-physical-assets/01_assets-in-a-digital-world.en.txt 3.6 kB
detection-and-response/03_incident-investigation-and-response/04_post-incident-actions/01_the-post-incident-activity-phase-of-the-lifecycle.en.srt 3.6 kB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/02_kali-linux-tm.en.srt 3.6 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/03_parse-a-text-file-in-python.en.srt 3.6 kB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/02_document-evidence-with-chain-of-custody-forms.en.txt 3.6 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/02_build-your-cybersecurity-network/03_sarah-network-in-the-cybersecurity-community.en.srt 3.6 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/10_test-your-knowledge-introduction-to-networks_quiz.html 3.6 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/01_owasp-security-principles.en.txt 3.6 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/03_components-of-a-detection-signature.en.txt 3.6 kB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/02_kim-my-journey-into-computing.en.srt 3.5 kB
networks-and-network-security/04_security-hardening/05_review-security-hardening/04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html 3.5 kB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/02_frameworks.en.srt 3.5 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/05_test-your-knowledge-recognize-different-network-protocols_quiz.html 3.5 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/04_nist-s-risk-management-framework.en.txt 3.5 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/05_review-introduction-to-asset-security/02_glossary-terms-from-week-1_instructions.html 3.5 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/01_explore-the-interview-process.en.txt 3.5 kB
networks-and-network-security/01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.en.srt 3.5 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/05_complete-a-security-audit.en.txt 3.5 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/02_when-and-how-to-escalate-a-security-incident.en.srt 3.5 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt 3.5 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/03_defense-in-depth-strategy.en.txt 3.4 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.en.txt 3.4 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/01_use-parameters-in-functions.en.txt 3.4 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt 3.4 kB
networks-and-network-security/04_security-hardening/03_network-hardening/01_network-hardening-practices.en.txt 3.4 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/01_welcome-to-week-1.en.srt 3.4 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/02_python-and-cybersecurity.en.txt 3.4 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/02_security-controls.en.txt 3.4 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/05_heather-the-importance-of-protecting-pii.en.srt 3.4 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/01_security-monitoring-with-detection-tools.en.txt 3.3 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/02_network-protocols.en.txt 3.3 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/05_examine-suricata-logs.en.srt 3.3 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/01_modules-and-libraries.en.srt 3.3 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/03_web-based-exploits/02_exploitable-gaps-in-databases.en.txt 3.3 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/01_the-role-of-triage-in-incident-response.en.txt 3.3 kB
networks-and-network-security/02_network-operations/02_system-identification/03_security-zones.en.txt 3.3 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/05_review-linux-commands-in-the-bash-shell/02_glossary-terms-from-week-3_instructions.html 3.3 kB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/04_the-value-of-cybersecurity-playbooks.en.txt 3.3 kB
linux-and-sql/04_databases-and-sql/03_more-sql-filters/01_filter-dates-and-numbers.en.txt 3.3 kB
manage-security-risks/02_security-frameworks-and-controls/03_nist-frameworks/02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt 3.3 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt 3.3 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/06_build-rapport-with-interviewers.en.txt 3.2 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/03_intrusion-detection-systems.en.srt 3.2 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/03_how-to-create-a-visual-dashboard.en.txt 3.2 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/05_heather-protect-sensitive-data-and-information.en.srt 3.2 kB
networks-and-network-security/02_network-operations/02_system-identification/05_proxy-servers.en.txt 3.2 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/01_a-proactive-approach-to-security.en.txt 3.2 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/01_welcome-to-week-2.en.srt 3.2 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/01_vulnerability-assessments.en.txt 3.2 kB
linux-and-sql/01_introduction-to-operating-systems/03_the-operating-system-at-work/01_inside-the-operating-system.en.txt 3.2 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/02_build-your-cybersecurity-network/01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt 3.2 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/03_playbooks-siem-tools-and-soar-tools_instructions.html 3.2 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/03_your-impact-on-data-protection/01_detect-and-protect-without-neglect.en.txt 3.2 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/02_introduction-to-linux.en.txt 3.2 kB
manage-security-risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/01_explore-the-cia-triad.en.txt 3.2 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/03_talya-myths-about-the-cybersecurity-field.en.srt 3.2 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/05_non-repudiation-and-hashing.en.txt 3.2 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/02_veronica-my-path-to-working-in-cybersecurity.en.srt 3.1 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/02_communicate-for-impact/02_building-blocks-of-cybersecurity-communications.en.txt 3.1 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt 3.1 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.en.srt 3.1 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/03_herbert-manage-threats-risks-and-vulnerabilities.en.srt 3.1 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt 3.1 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/04_review-write-effective-python-code/02_glossary-terms-from-week-2_instructions.html 3.1 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/05_ashley-my-path-to-cybersecurity.en.txt 3.1 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/01_welcome-to-week-4.en.srt 3.1 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/05_review-introduction-to-asset-security/01_wrap-up.en.srt 3.1 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/02_the-eight-cissp-security-domains/02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt 3.1 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/02_automate-cybersecurity-tasks-with-python.en.txt 3.1 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/04_linux-architecture.en.txt 3.1 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/02_work-with-functions/02_return-statements.en.txt 3.1 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/01_introduction-to-course-7.en.txt 3.1 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/05_garvey-cover-letter-tips.en.txt 3.1 kB
linux-and-sql/04_databases-and-sql/05_review-databases-and-sql/02_glossary-terms-from-week-4_instructions.html 3.1 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/04_rebecca-learn-new-tools-and-technologies.en.srt 3.0 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/04_congratulations-on-completing-course-1/01_course-wrap-up.en.srt 3.0 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/02_find-cybersecurity-jobs.en.txt 3.0 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/02_the-value-of-documentation.en.txt 3.0 kB
networks-and-network-security/04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.en.srt 3.0 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/04_niru-adopt-an-attacker-mindset.en.txt 3.0 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/02_to-escalate-or-not-to-escalate/01_prepare-to-escalate-through-security-recognition.en.txt 3.0 kB
networks-and-network-security/04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.en.txt 3.0 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/03_garvey-technical-interview-tips.en.txt 3.0 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/04_why-we-audit-user-activity.en.txt 3.0 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/02_toni-my-path-to-cybersecurity.en.txt 3.0 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/04_review-python-in-practice/02_glossary-terms-from-week-4_instructions.html 3.0 kB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/01_incident-response-teams.en.txt 3.0 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/01_from-simple-activity-to-major-data-breach.en.txt 3.0 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/04_review-communicate-effectively-to-influence-stakeholders/01_wrap-up.en.srt 3.0 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/03_the-importance-of-network-traffic-flows.en.txt 3.0 kB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/03_controls.en.txt 3.0 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/01_welcome-to-week-1.en.srt 2.9 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/01_develop-an-elevator-pitch.en.txt 2.9 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/05_sean-keep-your-cool-during-a-data-breach.en.srt 2.9 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/03_review-cybersecurity-tools-and-programming-languages/02_glossary-terms-from-week-4_instructions.html 2.9 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/01_welcome-to-week-3.en.srt 2.9 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/01_explore-common-siem-tools.en.txt 2.9 kB
networks-and-network-security/04_security-hardening/05_review-security-hardening/02_glossary-terms-from-week-4_instructions.html 2.9 kB
networks-and-network-security/04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.en.srt 2.9 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.srt 2.9 kB
manage-security-risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/01_wrap-up.en.srt 2.9 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/02_linux-commands-via-the-bash-shell.en.txt 2.9 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/01_incident-response-tools.en.srt 2.9 kB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/03_introduction-to-operating-systems.en.txt 2.9 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/05_review-threats-in-cybersecurity/01_wrap-up.en.srt 2.9 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/01_introduction-to-course-5.en.txt 2.8 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/04_mk-changes-in-the-cybersecurity-industry.en.txt 2.8 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/01_packets-and-packet-captures.en.txt 2.8 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/01_use-strategies-to-answer-interview-questions.en.txt 2.8 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/02_core-cybersecurity-knowledge-and-skills/01_introduction-to-linux-sql-and-python.en.txt 2.8 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/02_glossary-terms-from-week-1_instructions.html 2.8 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/02_identify-system-vulnerabilities/04_omad-my-learning-journey-into-cybersecurity.en.txt 2.8 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.txt 2.8 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/02_casey-apply-soft-skills-in-cybersecurity.en.srt 2.8 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/06_congratulations-on-completing-course-5/01_course-wrap-up.en.txt 2.8 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/02_the-cybersecurity-job-interview-process/05_conduct-pre-interview-research.en.txt 2.8 kB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.en.txt 2.8 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/03_interpret-network-communications-with-packets.en.srt 2.8 kB
linux-and-sql/04_databases-and-sql/04_sql-joins/02_types-of-joins.en.txt 2.8 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/02_event-and-incident-detection/02_security-as-a-mindset.en.txt 2.8 kB
linux-and-sql/02_the-linux-operating-system/03_the-shell/01_introduction-to-the-shell.en.srt 2.7 kB
linux-and-sql/02_the-linux-operating-system/03_the-shell/02_input-and-output-in-the-shell.en.txt 2.7 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/03_what-are-networks.en.srt 2.7 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/01_welcome-to-week-3.en.srt 2.7 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/02_glossary-terms-from-week-3_instructions.html 2.7 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/05_karan-interview-tips-from-a-hiring-manager.en.txt 2.7 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/01_welcome-to-week-5.en.srt 2.7 kB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/01_linux-distributions.en.txt 2.7 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.en.txt 2.7 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/01_get-started-with-the-course/03_angel-my-personal-career-journey.en.txt 2.7 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/04_review-work-with-strings-and-lists/02_glossary-terms-from-week-3_instructions.html 2.6 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/04_the-importance-of-cybersecurity.en.txt 2.6 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/01_welcome-to-week-4.en.srt 2.6 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/01_welcome-to-week-4.en.srt 2.6 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/04_develop-an-elevator-pitch/04_emily-overcome-imposter-syndrome.en.txt 2.6 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/01_access-a-text-file-in-python.en.txt 2.6 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.en.txt 2.6 kB
detection-and-response/01_introduction-to-detection-and-incident-response/02_the-incident-response-lifecycle/01_welcome-to-week-1.en.srt 2.6 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/02_the-linux-community.en.srt 2.6 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/04_victoria-continue-your-learning-journey.en.txt 2.5 kB
linux-and-sql/04_databases-and-sql/02_sql-queries/01_basic-queries.en.txt 2.5 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/04_ask-the-interviewer-questions.en.srt 2.5 kB
linux-and-sql/01_introduction-to-operating-systems/05_review-introduction-to-operating-systems/02_glossary-terms-from-week-1_instructions.html 2.5 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/03_query-databases-with-sql.en.txt 2.5 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt 2.5 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt 2.5 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/05_parisa-the-parallels-of-accessibility-and-security.en.txt 2.5 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/04_review-escalate-incidents/02_glossary-terms-from-week-2_instructions.html 2.5 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/06_network-tools.en.txt 2.5 kB
linux-and-sql/01_introduction-to-operating-systems/04_the-user-interface/03_ellen-my-path-into-cybersecurity.en.txt 2.5 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt 2.5 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/01_introduction-to-course-8.en.txt 2.5 kB
detection-and-response/03_incident-investigation-and-response/03_response-and-recovery/02_robin-foster-cross-team-collaboration.en.txt 2.4 kB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/02_fatima-the-importance-of-communication-during-incident-response.en.txt 2.4 kB
manage-security-risks/01_security-domains/01_get-started-with-the-course/01_introduction-to-course-2.en.srt 2.4 kB
networks-and-network-security/01_network-architecture/03_network-communication/02_the-tcp-ip-model.en.txt 2.4 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/03_visual-communication-using-a-dashboard/01_visual-storytelling-in-cybersecurity.en.txt 2.4 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/01_welcome-to-week-3.en.txt 2.4 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/04_review-protect-organizational-assets/01_wrap-up.en.srt 2.4 kB
networks-and-network-security/01_network-architecture/03_network-communication/01_introduction-to-network-communication.en.txt 2.4 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/03_siem-dashboards.en.txt 2.4 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/08_cloud-networks.en.txt 2.4 kB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/04_dave-grow-your-cybersecurity-career-with-mentors.en.txt 2.4 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/04_tri-life-in-asset-security.en.txt 2.4 kB
networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.en.txt 2.4 kB
linux-and-sql/04_databases-and-sql/06_congratulations-on-completing-course-4/01_course-wrap-up.en.srt 2.4 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/04_review-protect-assets-and-communicate-incidents/02_glossary-terms-from-week-1_instructions.html 2.4 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/01_escalation-in-cybersecurity/01_welcome-to-week-2.en.srt 2.4 kB
detection-and-response/03_incident-investigation-and-response/02_create-and-use-documentation/01_the-benefits-of-documentation.en.txt 2.3 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/01_get-started-with-the-course/03_dion-my-personal-career-journey.en.txt 2.3 kB
networks-and-network-security/02_network-operations/02_system-identification/02_virtual-private-networks-vpns.en.txt 2.3 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/01_get-started-with-the-course/04_da-queshia-my-path-to-cybersecurity.en.txt 2.3 kB
linux-and-sql/02_the-linux-operating-system/02_linux-distributions/02_kali-linux-tm.en.txt 2.3 kB
detection-and-response/01_introduction-to-detection-and-incident-response/03_incident-response-operations/04_incident-response-plans.en.txt 2.3 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/01_damar-my-journey-into-linux-commands.en.txt 2.3 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt 2.3 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt 2.3 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/03_overview-of-security-information-event-management-siem/01_reexamine-siem-tools.en.txt 2.3 kB
linux-and-sql/04_databases-and-sql/05_review-databases-and-sql/01_wrap-up.en.srt 2.3 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/02_build-your-cybersecurity-network/03_sarah-network-in-the-cybersecurity-community.en.txt 2.3 kB
detection-and-response/03_incident-investigation-and-response/04_post-incident-actions/01_the-post-incident-activity-phase-of-the-lifecycle.en.txt 2.3 kB
networks-and-network-security/01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.en.txt 2.3 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/03_review-the-evolution-of-cybersecurity/01_wrap-up.en.srt 2.3 kB
networks-and-network-security/03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.en.srt 2.3 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt 2.2 kB
detection-and-response/01_introduction-to-detection-and-incident-response/01_get-started-with-the-course/01_introduction-to-course-6.en.txt 2.2 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/02_helpful-cybersecurity-resources.en.txt 2.2 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/01_welcome-to-week-4.en.srt 2.2 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/01_welcome-to-week-2.en.srt 2.2 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/01_welcome-to-week-4.en.srt 2.2 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/01_welcome-to-week-2.en.srt 2.2 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/02_introduction-to-functions.en.txt 2.2 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/02_logs-and-siem-tools.en.txt 2.2 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/01_recap-of-the-google-cybersecurity-certificate-program.en.txt 2.2 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/03_timing-is-everything/02_when-and-how-to-escalate-a-security-incident.en.txt 2.2 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.en.srt 2.2 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/03_man-pages-within-the-shell.en.txt 2.2 kB
linux-and-sql/01_introduction-to-operating-systems/03_the-operating-system-at-work/03_resource-allocation-via-the-os.en.txt 2.1 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/02_introduction-to-assets/01_welcome-to-week-1.en.txt 2.1 kB
linux-and-sql/01_introduction-to-operating-systems/01_get-started-with-the-course/01_introduction-to-course-4.en.txt 2.1 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/05_adedayo-sql-in-cybersecurity.en.txt 2.1 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/02_overview-of-intrusion-detection-systems-ids/05_examine-suricata-logs.en.txt 2.1 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/03_learn-from-the-python-community/01_modules-and-libraries.en.txt 2.1 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/05_tim-finding-purpose-in-protecting-assets.en.srt 2.1 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt 2.1 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/06_akash-python-and-the-cybersecurity-professional.en.srt 2.1 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.en.srt 2.0 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/04_threat-modeling/02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt 2.0 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/05_heather-protect-sensitive-data-and-information.en.txt 2.0 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/02_communicate-for-impact/01_clear-and-concise-communication.en.txt 2.0 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/04_create-a-basic-python-script.en.txt 2.0 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/01_welcome-to-week-4.en.srt 2.0 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/04_welcome-to-week-1.en.srt 2.0 kB
manage-security-risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/03_herbert-manage-threats-risks-and-vulnerabilities.en.txt 2.0 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/04_review-vulnerabilities-in-systems/01_wrap-up.en.txt 2.0 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/01_course-wrap-up.en.srt 2.0 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/01_welcome-to-week-3.en.srt 2.0 kB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/02_frameworks.en.txt 1.9 kB
manage-security-risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt 1.9 kB
linux-and-sql/01_introduction-to-operating-systems/05_review-introduction-to-operating-systems/01_wrap-up.en.srt 1.9 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/04_clancy-continual-learning-and-python.en.txt 1.9 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/03_create-a-basic-function.en.txt 1.9 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/02_work-with-files-in-python/03_parse-a-text-file-in-python.en.txt 1.9 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/05_congratulations-on-completing-course-7/01_course-wrap-up.en.txt 1.9 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/05_congratulations-on-completing-course-6/01_course-wrap-up.en.txt 1.9 kB
networks-and-network-security/04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.en.txt 1.9 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/01_welcome-to-week-2.en.srt 1.9 kB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/02_kim-my-journey-into-computing.en.txt 1.9 kB
networks-and-network-security/04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.en.txt 1.9 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/01_wrap-up.en.srt 1.9 kB
networks-and-network-security/01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.en.txt 1.9 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/04_rebecca-learn-new-tools-and-technologies.en.txt 1.9 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/04_review-work-with-strings-and-lists/01_wrap-up.en.srt 1.8 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/05_heather-the-importance-of-protecting-pii.en.txt 1.8 kB
networks-and-network-security/01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.en.srt 1.8 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/03_course-wrap-up.en.srt 1.8 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/04_review-write-effective-python-code/01_wrap-up.en.srt 1.8 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/01_safeguard-information/01_welcome-to-week-2.en.txt 1.7 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/03_intrusion-detection-systems.en.txt 1.7 kB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/01_welcome-to-week-3.en.txt 1.7 kB
detection-and-response/02_network-monitoring-and-analysis/02_capture-and-view-network-traffic/03_interpret-network-communications-with-packets.en.txt 1.7 kB
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/01_wrap-up.en.srt 1.7 kB
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/01_welcome-to-week-2.en.srt 1.7 kB
linux-and-sql/02_the-linux-operating-system/03_the-shell/01_introduction-to-the-shell.en.txt 1.7 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/01_wrap-up.en.srt 1.7 kB
detection-and-response/03_incident-investigation-and-response/05_review-incident-investigation-and-response/01_wrap-up.en.srt 1.7 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.en.txt 1.7 kB
networks-and-network-security/01_network-architecture/02_introduction-to-networks/03_what-are-networks.en.txt 1.7 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/01_welcome-to-week-1.en.srt 1.7 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/04_congratulations-on-completing-course-1/01_course-wrap-up.en.txt 1.7 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/01_welcome-to-week-4.en.txt 1.7 kB
assets-threats-and-vulnerabilities/01_introduction-to-asset-security/05_review-introduction-to-asset-security/01_wrap-up.en.txt 1.7 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/03_answer-interview-questions/04_ask-the-interviewer-questions.en.txt 1.7 kB
detection-and-response/02_network-monitoring-and-analysis/04_review-network-monitoring-and-analysis/01_wrap-up.en.srt 1.6 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/04_review-escalate-incidents/01_wrap-up.en.srt 1.6 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/03_talya-myths-about-the-cybersecurity-field.en.txt 1.6 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/03_core-skills-for-cybersecurity-professionals/02_veronica-my-path-to-working-in-cybersecurity.en.txt 1.6 kB
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/01_welcome-to-week-2.en.srt 1.6 kB
detection-and-response/01_introduction-to-detection-and-incident-response/02_the-incident-response-lifecycle/01_welcome-to-week-1.en.txt 1.6 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/05_review-introduction-to-python/01_wrap-up.en.srt 1.6 kB
networks-and-network-security/04_security-hardening/05_review-security-hardening/01_wrap-up.en.srt 1.6 kB
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/01_welcome-to-week-3.en.srt 1.6 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/04_review-protect-assets-and-communicate-incidents/01_wrap-up.en.srt 1.6 kB
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/01_welcome-to-week-1.en.srt 1.6 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/04_review-protect-organizational-assets/01_wrap-up.en.txt 1.6 kB
detection-and-response/01_introduction-to-detection-and-incident-response/04_incident-response-tools/01_incident-response-tools.en.txt 1.6 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/04_review-communicate-effectively-to-influence-stakeholders/01_wrap-up.en.txt 1.5 kB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/05_review-threats-in-cybersecurity/01_wrap-up.en.txt 1.5 kB
manage-security-risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/01_wrap-up.en.txt 1.5 kB
networks-and-network-security/04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.en.srt 1.5 kB
manage-security-risks/01_security-domains/01_get-started-with-the-course/01_introduction-to-course-2.en.txt 1.5 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/02_glossary-terms-from-week-4_instructions.html 1.5 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/01_welcome-to-week-1.en.txt 1.5 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/04_review-python-in-practice/01_wrap-up.en.srt 1.5 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/05_sean-keep-your-cool-during-a-data-breach.en.txt 1.5 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/02_casey-apply-soft-skills-in-cybersecurity.en.txt 1.5 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/01_find-and-prepare-for-a-job-in-cybersecurity/01_welcome-to-week-5.en.txt 1.5 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/03_review-the-evolution-of-cybersecurity/01_wrap-up.en.txt 1.5 kB
manage-security-risks/01_security-domains/04_review-security-domains/01_wrap-up.en.srt 1.5 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/02_glossary-terms-from-week-5_instructions.html 1.4 kB
networks-and-network-security/03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.en.txt 1.4 kB
linux-and-sql/02_the-linux-operating-system/04_review-the-linux-operating-system/01_wrap-up.en.srt 1.4 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/01_navigate-the-linux-file-system/01_welcome-to-week-3.en.txt 1.4 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/06_certificate-wrap-up/02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.txt 1.4 kB
detection-and-response/01_introduction-to-detection-and-incident-response/05_review-introduction-to-detection-and-incident-response/01_wrap-up.en.srt 1.4 kB
linux-and-sql/04_databases-and-sql/01_introduction-to-sql-and-databases/01_welcome-to-week-4.en.txt 1.4 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/01_important-cybersecurity-tools/01_welcome-to-week-4.en.txt 1.4 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/01_reliable-sources-go-a-long-way/01_welcome-to-week-4.en.txt 1.4 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/03_review-engage-with-the-cybersecurity-community/01_wrap-up.en.srt 1.4 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/04_get-help-in-linux/02_the-linux-community.en.txt 1.4 kB
networks-and-network-security/03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.en.srt 1.4 kB
linux-and-sql/03_linux-commands-in-the-bash-shell/05_review-linux-commands-in-the-bash-shell/01_wrap-up.en.srt 1.4 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/01_overview-of-logs/01_welcome-to-week-4.en.txt 1.3 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/01_welcome-to-week-3.en.srt 1.3 kB
automate-cybersecurity-tasks-with-python/01_introduction-to-python/02_introduction-to-python-programming-in-cybersecurity/06_akash-python-and-the-cybersecurity-professional.en.txt 1.3 kB
networks-and-network-security/03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/03_activity-analyze-network-layer-communication_quiz.html 1.3 kB
networks-and-network-security/04_security-hardening/02_os-hardening/03_activity-apply-os-hardening-techniques_quiz.html 1.3 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/04_review-communicate-effectively-to-influence-stakeholders/02_glossary-terms-from-week-3_instructions.html 1.3 kB
linux-and-sql/04_databases-and-sql/06_congratulations-on-completing-course-4/01_course-wrap-up.en.txt 1.3 kB
networks-and-network-security/03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/04_activity-analyze-network-attacks_quiz.html 1.3 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/01_wrap-up.en.srt 1.3 kB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/01_course-wrap-up.en.txt 1.3 kB
networks-and-network-security/04_security-hardening/03_network-hardening/03_activity-analysis-of-network-hardening_quiz.html 1.3 kB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/05_tim-finding-purpose-in-protecting-assets.en.txt 1.3 kB
linux-and-sql/04_databases-and-sql/05_review-databases-and-sql/01_wrap-up.en.txt 1.2 kB
manage-security-risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/01_wrap-up.en.srt 1.2 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/01_escalation-in-cybersecurity/01_welcome-to-week-2.en.txt 1.2 kB
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/01_introduction-to-functions/01_welcome-to-week-2.en.txt 1.2 kB
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/01_understand-your-stakeholders/01_welcome-to-week-3.en.srt 1.2 kB
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/03_review-engage-with-the-cybersecurity-community/02_glossary-terms-from-week-4_instructions.html 1.2 kB
detection-and-response/04_network-traffic-and-logs-using-ids-and-siem-tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/01_wrap-up.en.txt 1.2 kB
foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/01_welcome-to-week-2.en.txt 1.2 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/03_course-wrap-up.en.txt 1.2 kB
linux-and-sql/01_introduction-to-operating-systems/05_review-introduction-to-operating-systems/01_wrap-up.en.txt 1.1 kB
networks-and-network-security/01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.en.txt 1.1 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.en.txt 1.1 kB
networks-and-network-security/02_network-operations/03_review-network-operations/01_wrap-up.en.srt 1.1 kB
networks-and-network-security/02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.en.txt 1.1 kB
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/01_wrap-up.en.srt 1.1 kB
detection-and-response/03_incident-investigation-and-response/05_review-incident-investigation-and-response/01_wrap-up.en.txt 1.1 kB
manage-security-risks/01_security-domains/02_more-about-the-cissp-security-domains/01_welcome-to-week-1.en.txt 1.1 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/01_working-with-strings/01_welcome-to-week-3.en.txt 1.1 kB
automate-cybersecurity-tasks-with-python/04_python-in-practice/01_python-for-automation/01_welcome-to-week-4.en.txt 1.1 kB
networks-and-network-security/01_network-architecture/05_review-network-architecture/01_wrap-up.en.srt 1.1 kB
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/04_welcome-to-week-1.en.txt 1.1 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/02_event-and-incident-detection/01_welcome-to-week-1.en.srt 1.0 kB
prepare-for-cybersecurity-jobs/02_escalate-incidents/04_review-escalate-incidents/01_wrap-up.en.txt 1.0 kB
detection-and-response/02_network-monitoring-and-analysis/01_understand-network-traffic/01_welcome-to-week-2.en.txt 1.0 kB
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/04_review-protect-assets-and-communicate-incidents/01_wrap-up.en.txt 1.0 kB
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/03_review-cybersecurity-tools-and-programming-languages/01_wrap-up.en.srt 1.0 kB
automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/04_review-work-with-strings-and-lists/01_wrap-up.en.txt 992 Bytes
detection-and-response/03_incident-investigation-and-response/01_incident-detection-and-verification/01_welcome-to-week-3.en.txt 954 Bytes
foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/01_wrap-up.en.txt 953 Bytes
automate-cybersecurity-tasks-with-python/02_write-effective-python-code/04_review-write-effective-python-code/01_wrap-up.en.txt 952 Bytes
manage-security-risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/01_welcome-to-week-2.en.txt 950 Bytes
automate-cybersecurity-tasks-with-python/01_introduction-to-python/05_review-introduction-to-python/01_wrap-up.en.txt 949 Bytes
networks-and-network-security/04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.en.txt 929 Bytes
foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/01_wrap-up.en.txt 925 Bytes
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/01_welcome-to-week-4.en.srt 912 Bytes
networks-and-network-security/04_security-hardening/05_review-security-hardening/01_wrap-up.en.txt 909 Bytes
linux-and-sql/02_the-linux-operating-system/01_all-about-linux/01_welcome-to-week-2.en.txt 889 Bytes
manage-security-risks/01_security-domains/04_review-security-domains/01_wrap-up.en.txt 882 Bytes
linux-and-sql/01_introduction-to-operating-systems/02_the-wonderful-world-of-operating-systems/01_welcome-to-week-1.en.txt 878 Bytes
linux-and-sql/03_linux-commands-in-the-bash-shell/05_review-linux-commands-in-the-bash-shell/01_wrap-up.en.txt 876 Bytes
detection-and-response/02_network-monitoring-and-analysis/04_review-network-monitoring-and-analysis/01_wrap-up.en.txt 872 Bytes
networks-and-network-security/01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.en.srt 863 Bytes
prepare-for-cybersecurity-jobs/04_engage-with-the-cybersecurity-community/03_review-engage-with-the-cybersecurity-community/01_wrap-up.en.txt 856 Bytes
manage-security-risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/01_wrap-up.en.txt 836 Bytes
manage-security-risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/01_welcome-to-week-3.en.txt 835 Bytes
automate-cybersecurity-tasks-with-python/04_python-in-practice/04_review-python-in-practice/01_wrap-up.en.txt 806 Bytes
detection-and-response/01_introduction-to-detection-and-incident-response/05_review-introduction-to-detection-and-incident-response/01_wrap-up.en.txt 788 Bytes
manage-security-risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/01_wrap-up.en.txt 780 Bytes
networks-and-network-security/03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.en.txt 747 Bytes
linux-and-sql/02_the-linux-operating-system/04_review-the-linux-operating-system/01_wrap-up.en.txt 735 Bytes
networks-and-network-security/02_network-operations/03_review-network-operations/01_wrap-up.en.txt 727 Bytes
prepare-for-cybersecurity-jobs/03_communicate-effectively-to-influence-stakeholders/01_understand-your-stakeholders/01_welcome-to-week-3.en.txt 715 Bytes
networks-and-network-security/03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.en.srt 710 Bytes
foundations-of-cybersecurity/04_cybersecurity-tools-and-programming-languages/03_review-cybersecurity-tools-and-programming-languages/01_wrap-up.en.txt 648 Bytes
networks-and-network-security/01_network-architecture/05_review-network-architecture/01_wrap-up.en.txt 620 Bytes
prepare-for-cybersecurity-jobs/05_find-and-apply-for-cybersecurity-jobs/05_review-find-and-apply-for-cybersecurity-jobs/01_wrap-up.en.txt 586 Bytes
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/01_welcome-to-week-4.en.txt 548 Bytes
prepare-for-cybersecurity-jobs/01_protect-data-and-communicate-incidents/02_event-and-incident-detection/01_welcome-to-week-1.en.txt 545 Bytes
networks-and-network-security/01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.en.txt 533 Bytes
networks-and-network-security/03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.en.txt 447 Bytes
0. Websites you may like/[CourserHub.com].url 123 Bytes
detection-and-response/0. Websites you may like/[CourserHub.com].url 123 Bytes
Readme.txt 51 Bytes
detection-and-response/Readme.txt 51 Bytes
Расширения в Google AdWords (Ad extensions Google... 658.1 MB
[ DevCourseWeb.com ] Udemy - Google My Business - Your... 2.2 GB
Basic SEO Guide For Google Blogger Be No 1 On Google 105.7 MB
Вместе лучше - Google AdWords + Google Analytics 258.5 MB
Lynda - Google Essential Training_Episode 4_Google Sites... 784.0 MB
Using Google's Cloud For Developers - Google BigQuery 312.3 MB
Lynda - Google Essential Training_Episode 4_Google Sites... 784.0 MB
Google Local Pack - Achieve Top Google Local Search Rankings 337.6 MB
Em chua 18 full.MP4 - Google Drive.MP4 - Google Drive.mp4 1.3 GB
[FreeCourseSite.com] Google Apps Google Script - Content... 687.3 MB
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-EniaHD.mkv 5077次下载
WEB
DL
DDP5
The.Super.Cube.S01E09.1080p.iQ.WEB-DL.AAC2.0.H.264-VARYG.mkv 5040次下载
WEB
DL
Cube
Star.Wars.Andor.S02E05.I.Have.Friends.Everywhere.1080p.DS... 4944次下载
WEB
DL
Star
新桥恋人.电影港 地址发布页 www.dygang.me 收藏不迷路 4365次下载
me
www
发布页
Night at the Museum Battle of the Smithsonian 2009 2160p... 4161次下载
KiNGDOM
WEB
DL
www.UIndex.org - ... 4126次下载
www
MeGusta
HEVC
Palma.2.2024.WEB-DL.1080p.ExKinoRay.mkv 4000次下载
WEB
DL
2.2024
Guns N' Roses - Greatest Hits Live Broadcast Collection... 3915次下载
Live
Remastered
Hits
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
(同人CG集) [白色絵の具 (無味ムスミ)] 友達の母が巨乳で金髪の淫乱美女でした.zip 6346次下载
zip
巨乳
CG
You.S05E02.720p.HEVC.x265-MeGusta[EZTVx.to].mkv 6221次下载
S05E02
HEVC
720p
up-mod-minecraft-play-with-friends-v1-21-80-28-... 6023次下载
982108028
mod
play
the.last.of.us.s02e02.1080p.web.h264-successful... 5335次下载
web
last
h264
异世降临.6v电影 地址发布页 www.6v123.net 收藏不迷路 5220次下载
www
发布页
6v123
Opasnaya.blizost.S01.2025.WEB-DL.1080p 5127次下载
WEB
DL
S01
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Andor.S02E02.Sagrona.Teema.1080p.HEVC.x265-MeGu... 5100次下载
HEVC
Andor
mkv
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-E... 5077次下载
WEB
DL
DDP5
Shoot.Paragon.1970.DVDRip.XviD-AFO [NO-RAR] -...
Shoot
www
AFO
DASS-041-U
DASS
041
www.UIndex.org - Andy Richter Controls...
www
Episode
S01E04
[AniDub]_Sora_Kara_Furu_Ichioku_no_Hoshi_[Oriko_Qbiq]
Furu
no
Oriko
[BEST-TORRENTS.COM]...
Cheese
DL
2160p
【成人抖音-黑料-换妻-直播-手机搜7t7a.cc】麻豆传媒映画・爆操黑丝车模小姐姐・超级圆润...
麻豆
小姐姐
车模
Por siempre [HDTV 720p][Cap.106]
siempre
720p
Cap
Workaholics.S04E01.Season.4.Episode.1.WEBRip.72...
Workaholics
Episode
HoC
MobLand.S01E01.1080P.ENG.ITA.H264-TheBlackKing.mkv
ENG
H264
ITA
43606101 - Public Dick Flash Compilation..mp4
Dick
..
Compilation
吃瓜!去欧美留学的林淑瑶 ️被欧美大鸡巴驯化3P大战被洋吊深喉狂艹!
欧美
3P
被洋
Hellraiser III Hell On Earth 1992 1080p BluRay...
5.1
1992
AAC
Ghosts S04E21 Kyle 1080p PMTP WEB-DL DDP5 1 H...
WEB
DL
STC
[Gecko] Araiguma Calcal-dan - S01E07...
WEB
DL
AAC
salamander-2-salamander-deluxe-pack-play-statio...
salamander
play
full
Catalina Cruz live cam show pack
Catalina
show
live
SDMU-534
534
SDMU
dccdom.com@MIDV111C
com
MIDV111C
dccdom
