|  

Security Analyst Fundamentals Specialization



Size :1.6 GB
Peers : Seeders : 0      Leechers : 0
Added : 1 year ago » by tutsnode » in Other
Language : English
Last Updated :6 months ago
Info_Hash :13C152F4C46CE4C0EA9D6741D2819964B5FFB12F

Torrent File Contents

Security Analyst Fundamentals Specialization
  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/03_incident-response-detection-analysis.mp4
  -  161.01 MB

  TutsNode.net.txt
  -  63 Bytes

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/01_siem-concepts-and-benefits.en.srt
  -  21.44 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/01_ibm-x-force-iris-cyberattack-framework.en.srt
  -  20.03 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/02_mobile-endpoint-protection/01_mobile-endpoint-protection.en.srt
  -  19.65 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/01_target-attack-timeline.en.srt
  -  19.55 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/05_network-data.en.srt
  -  19.33 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/01_application-security-defects-writing-secure-code.en.srt
  -  19.27 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/03_cross-site-scripting-effective-defenses.en.srt
  -  18.86 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/03_incident-response-detection-analysis.en.srt
  -  18.56 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/03_user-behavior-analysis/02_user-behavior-analytics.en.srt
  -  18.42 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.en.srt
  -  17.75 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/02_soc-cyber-threat-hunting.en.srt
  -  17.44 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/03_operating-system-data.en.srt
  -  17.2 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/01_incident-response-overview/02_what-is-incident-response.en.srt
  -  16.73 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/01_data-files.en.srt
  -  16.47 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/02_siem-deployment.en.srt
  -  16.31 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/01_vulnerability-assessment-tools/01_vulnerability-assessment-tools.en.srt
  -  16.31 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/04_application-data.en.srt
  -  16.25 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/03_siem-solutions-vendors.en.srt
  -  16.09 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/01_overview-of-incident-management-response/01_nist-incident-response-lifecycle-teams.en.srt
  -  15.85 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/01_what-is-data-security-and-protection.en.srt
  -  15.82 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/02_threat-intelligence-frameworks/01_threat-intelligence-frameworks.en.srt
  -  15.64 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/06_critical-data-protection-capabilities.en.srt
  -  15.32 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/01_application-security-overview.en.srt
  -  14.17 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/03_threat-intelligence-platforms.en.srt
  -  14.04 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/01_phishing-scams-overview.en.srt
  -  14.04 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/02_cross-site-scripting-common-attacks.en.srt
  -  13.88 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/02_case-study/01_phishing-case-study-google-facebook.en.srt
  -  13.71 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/07_data-protection-industry-example.en.srt
  -  13.63 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/01_overview-of-incident-management-response/02_nist-incident-response-lifecycle.en.srt
  -  13.59 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/05_capabilities-of-data-protection.en.srt
  -  13.51 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/02_cross-site-scripting-common-attacks.en.txt
  -  7.32 KB

  .pad/0
  -  2 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/01_introduction-to-penetration-testing/02_what-is-penetration-testing.mp4
  -  124 MB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/02_target-attack-vulnerabilities.en.txt
  -  3.18 KB

  .pad/1
  -  24 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/01_data-files.mp4
  -  41.02 MB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/02_case-study/01_3rd-party-breach-quest-diagnostics.en.srt
  -  13.49 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/04_industry-specific-data-security-challenges.en.srt
  -  13.42 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/02_incident-response-demo-part-2.en.srt
  -  13.33 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/03_application-security-threats-and-attacks.en.srt
  -  13.26 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/02_data-security-top-challenges.en.srt
  -  13.08 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/03_data-security-common-pitfalls.en.srt
  -  13.05 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/02_case-study/01_pos-case-study-home-depot.en.srt
  -  13 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/02_ransomware-case-study-city-of-atlanta/01_ransomware-case-study-city-of-atlanta.en.srt
  -  12.81 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/02_mobile-endpoint-protection/01_mobile-endpoint-protection.en.txt
  -  12.64 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/02_python-getting-started.en.srt
  -  12.22 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/01_characteristics-of-a-security-architecture.en.srt
  -  12.13 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/04_application-security-standards-and-regulations.en.srt
  -  12.12 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/01_incident-response-demo-part-1.en.srt
  -  12.11 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/01_incident-response-preparation.en.srt
  -  12 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/01_introduction-to-penetration-testing/02_what-is-penetration-testing.en.srt
  -  11.51 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/03_cyber-threat-hunting-an-industry-example.en.srt
  -  11.45 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/03_watering-hole-attack.en.srt
  -  11.37 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/02_high-level-architectural-models.en.srt
  -  11.35 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/01_siem-concepts-and-benefits.en.txt
  -  11.26 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/03_devsecops-security-automation/01_devsecops-overview.en.srt
  -  11.19 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/02_soc-cyber-threat-hunting.en.txt
  -  11.09 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/01_python-basics.en.srt
  -  10.8 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/04_security-patterns.en.txt
  -  2.55 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/01_ibm-x-force-iris-cyberattack-framework.en.txt
  -  10.64 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/01_vulnerability-assessment-tools/01_vulnerability-assessment-tools.en.txt
  -  10.37 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/01_target-attack-timeline.en.txt
  -  10.29 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/05_network-data.en.txt
  -  10.28 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/03_siem-solutions-vendors.en.txt
  -  10.25 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/02_the-forensic-process/01_data-collection-examination.en.srt
  -  10.19 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/01_application-security-defects-writing-secure-code.en.txt
  -  10.15 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/01_3rd-party-breach-overview/01_3rd-party-breach-overview.en.srt
  -  10.13 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/01_forensics-course-overview/02_what-are-forensics.en.srt
  -  10.07 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/03_incident-response-detection-analysis.en.txt
  -  9.92 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/03_cross-site-scripting-effective-defenses.en.txt
  -  9.74 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/03_incident-response-demo-part-3.en.srt
  -  9.68 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/03_user-behavior-analysis/02_user-behavior-analytics.en.txt
  -  9.67 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/01_ransomware-overview/03_examples-of-ransomware.en.srt
  -  9.61 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/02_threat-intelligence-strategy-and-external-sources.en.srt
  -  9.61 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/01_introduction-to-point-of-sale-attacks/01_point-of-sale-breach-overview.en.srt
  -  9.59 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/01_threat-intelligence-overview.en.srt
  -  9.53 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/04_containment-eradication-recovery.en.srt
  -  9.51 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/02_the-forensic-process/03_analysis-reporting.en.srt
  -  9.49 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/02_port-scanning/01_port-scanning.en.srt
  -  9.38 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/04_scripting-languages.en.srt
  -  9.37 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/09_penetration-testing-reporting.en.srt
  -  9.3 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/01_forensics-course-overview/01_module-overview.en.srt
  -  720 Bytes

  .pad/2
  -  100 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/03_operating-system-data.mp4
  -  34.05 MB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/08_penetration-testing-attack.en.srt
  -  9.25 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.en.txt
  -  9.24 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/03_phishing-email-study.en.srt
  -  9.07 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/03_operating-system-data.en.txt
  -  9 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/03_threat-intelligence-platforms.en.txt
  -  8.95 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/02_what-is-a-breach.en.srt
  -  8.93 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/01_incident-response-overview/02_what-is-incident-response.en.txt
  -  8.84 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/02_threat-intelligence-frameworks/02_security-intelligence.en.srt
  -  8.73 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/01_introduction-to-point-of-sale-attacks/02_pos-malware.en.srt
  -  8.69 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/01_data-files.en.txt
  -  8.61 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/01_3rd-party-breach-overview/02_3rd-party-breach-impacts.en.srt
  -  8.6 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/01_overview-of-incident-management-response/02_nist-incident-response-lifecycle.en.txt
  -  8.6 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/04_application-data.en.txt
  -  8.6 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/02_siem-deployment.en.txt
  -  8.59 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/01_what-is-data-security-and-protection.en.txt
  -  8.51 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/02_history-of-scripting.en.srt
  -  8.48 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/02_case-study/01_pos-case-study-home-depot.en.txt
  -  8.42 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/01_overview-of-incident-management-response/01_nist-incident-response-lifecycle-teams.en.txt
  -  8.37 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/02_data-security-top-challenges.en.txt
  -  8.33 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/04_artificial-intelligence-in-siems/02_ai-and-siem-an-industry-example.en.txt
  -  2.88 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/03_data-security-common-pitfalls.en.txt
  -  8.31 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/02_ransomware-case-study-city-of-atlanta/01_ransomware-case-study-city-of-atlanta.en.txt
  -  8.31 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/02_incident-response-demo-part-2.en.txt
  -  8.27 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/02_threat-intelligence-frameworks/01_threat-intelligence-frameworks.en.txt
  -  8.23 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/06_critical-data-protection-capabilities.en.txt
  -  8.07 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/01_ransomware-overview/01_ransomware-overview.en.srt
  -  8.06 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/03_solutions-architecture.en.srt
  -  7.99 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/04_application-security-standards-and-regulations.en.txt
  -  7.89 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/05_impact-of-phishing.en.srt
  -  7.84 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/04_artificial-intelligence-in-siems/01_ai-and-siem.en.srt
  -  7.75 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/02_an-industry-siem-solution/01_qradar-siem-an-industry-example.en.srt
  -  7.65 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/01_application-security-overview.en.txt
  -  7.44 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/03_network-protocol-analyzers/01_network-protocol-analyzers-overview.en.srt
  -  7.42 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/03_scripting-concepts.en.srt
  -  7.36 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/03_cyber-threat-hunting-an-industry-example.en.txt
  -  7.35 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/01_phishing-scams-overview.en.txt
  -  7.34 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/02_case-study/01_phishing-case-study-google-facebook.en.txt
  -  7.29 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/03_watering-hole-attack.en.txt
  -  7.21 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/03_devsecops-security-automation/01_devsecops-overview.en.txt
  -  7.16 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/06_post-incident-activities.en.srt
  -  7.14 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/02_case-study/01_3rd-party-breach-quest-diagnostics.en.txt
  -  7.13 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/05_capabilities-of-data-protection.en.txt
  -  7.12 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/03_application-security-threats-and-attacks.en.txt
  -  7.08 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/07_data-protection-industry-example.en.txt
  -  7.07 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/04_industry-specific-data-security-challenges.en.txt
  -  7.03 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/03_data-structures.en.srt
  -  6.78 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/03_penetration-testing-discovery.en.srt
  -  6.6 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/03_devsecops-security-automation/02_devsecops-deployment.en.srt
  -  6.55 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/01_3rd-party-breach-overview/01_3rd-party-breach-overview.en.txt
  -  6.51 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/01_incident-response-demo-part-1.en.txt
  -  6.47 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/01_characteristics-of-a-security-architecture.en.txt
  -  6.46 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/01_forensics-course-overview/02_what-are-forensics.en.txt
  -  6.42 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/02_python-getting-started.en.txt
  -  6.38 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/01_incident-response-preparation.en.txt
  -  6.27 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/03_penetration-testing/01_tools.en.srt
  -  6.21 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/02_threat-intelligence-strategy-and-external-sources.en.txt
  -  6.2 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/01_introduction-to-penetration-testing/02_what-is-penetration-testing.en.txt
  -  6.19 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/04_containment-eradication-recovery.en.txt
  -  6.13 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/02_high-level-architectural-models.en.txt
  -  6.09 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/01_threat-intelligence-overview.en.txt
  -  6.08 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/05_impact-of-phishing.en.txt
  -  4.12 KB

  .pad/3
  -  51 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/01_incident-response-overview/02_what-is-incident-response.mp4
  -  33.23 MB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/02_the-forensic-process/03_analysis-reporting.en.txt
  -  6.04 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/06_apply-your-skill-data-breaches/01_applied-project-data-breaches/01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.srt
  -  6.01 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/01_introduction-to-point-of-sale-attacks/01_point-of-sale-breach-overview.en.txt
  -  5.93 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/08_penetration-testing-attack.en.txt
  -  5.76 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/01_python-basics.en.txt
  -  5.71 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/02_the-forensic-process/01_data-collection-examination.en.txt
  -  5.45 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/04_artificial-intelligence-in-siems/02_ai-and-siem-an-industry-example.en.srt
  -  5.29 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/01_ransomware-overview/01_ransomware-overview.en.txt
  -  5.18 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/01_ransomware-overview/03_examples-of-ransomware.en.txt
  -  5.14 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/03_incident-response-demo-part-3.en.txt
  -  5.1 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/03_solutions-architecture.en.txt
  -  5.04 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/04_scripting-languages.en.txt
  -  4.97 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/09_penetration-testing-reporting.en.txt
  -  4.96 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/02_an-industry-siem-solution/01_qradar-siem-an-industry-example.en.txt
  -  4.94 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/02_port-scanning/01_port-scanning.en.txt
  -  4.94 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/03_phishing-email-study.en.txt
  -  4.91 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/02_target-attack-vulnerabilities.en.srt
  -  4.83 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/02_what-is-a-breach.en.txt
  -  4.73 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/04_security-patterns.en.srt
  -  4.73 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/02_threat-intelligence-frameworks/02_security-intelligence.en.txt
  -  4.71 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/01_introduction-to-point-of-sale-attacks/02_pos-malware.en.txt
  -  4.66 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/01_3rd-party-breach-overview/02_3rd-party-breach-impacts.en.txt
  -  4.54 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/02_history-of-scripting.en.txt
  -  4.45 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/05_penetration-testing-additional-discovery-details.en.srt
  -  4.32 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/03_scripting-concepts.en.txt
  -  4.25 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/04_artificial-intelligence-in-siems/01_ai-and-siem.en.txt
  -  4.2 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/01_penetration-testing-planning.en.srt
  -  4.09 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/03_network-protocol-analyzers/01_network-protocol-analyzers-overview.en.txt
  -  3.94 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/06_post-incident-activities.en.txt
  -  3.79 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/06_apply-your-skill-data-breaches/01_applied-project-data-breaches/01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.txt
  -  3.87 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/01_introduction-to-penetration-testing/01_introduction-to-penetration-testing.en.srt
  -  823 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/01_introduction-to-penetration-testing/01_introduction-to-penetration-testing.en.txt
  -  527 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/03_penetration-testing/01_tools.en.txt
  -  3.76 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/03_data-structures.en.txt
  -  3.57 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/03_devsecops-security-automation/02_devsecops-deployment.en.txt
  -  3.53 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/03_penetration-testing-discovery.en.txt
  -  3.52 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/05_python-libraries.en.srt
  -  3.11 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/01_penetration-testing-planning.en.txt
  -  2.21 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/04_functions-and-methods.en.srt
  -  2.82 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/05_penetration-testing-additional-discovery-details.en.txt
  -  2.57 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/04_functions-and-methods.en.txt
  -  1.77 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/05_python-libraries.en.txt
  -  1.62 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/01_incident-response-overview/01_incident-response-overview.en.srt
  -  890 Bytes

  [TGx]Downloaded from torrentgalaxy.buzz .txt
  -  585 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/01_incident-response-overview/01_incident-response-overview.en.txt
  -  560 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/01_module-overview.en.srt
  -  428 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/01_forensics-course-overview/01_module-overview.en.txt
  -  390 Bytes

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/01_module-overview.en.txt
  -  264 Bytes

  .pad/4
  -  92.14 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/01_incident-response-preparation.mp4
  -  30.29 MB

  .pad/5
  -  219.17 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/02_incident-response-demo-part-2.mp4
  -  28.14 MB

  .pad/6
  -  373.3 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/04_containment-eradication-recovery.mp4
  -  27.81 MB

  .pad/7
  -  196.56 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/02_the-forensic-process/03_analysis-reporting.mp4
  -  27.56 MB

  .pad/8
  -  445.58 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/01_vulnerability-assessment-tools/01_vulnerability-assessment-tools.mp4
  -  26.13 MB

  .pad/9
  -  379.67 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/01_forensics-course-overview/02_what-are-forensics.mp4
  -  24.39 MB

  .pad/10
  -  108.88 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/02_the-forensic-process/01_data-collection-examination.mp4
  -  23.8 MB

  .pad/11
  -  208.16 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/05_network-data.mp4
  -  21.88 MB

  .pad/12
  -  119.39 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/01_siem-concepts-and-benefits.mp4
  -  20.03 MB

  .pad/13
  -  478.3 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/01_application-security-defects-writing-secure-code.mp4
  -  20.01 MB

  .pad/14
  -  500.48 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/08_penetration-testing-attack.mp4
  -  19.77 MB

  .pad/15
  -  233.64 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/03_siem-solutions-vendors.mp4
  -  19.27 MB

  .pad/16
  -  235.83 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/01_ibm-x-force-iris-cyberattack-framework.mp4
  -  18.85 MB

  .pad/17
  -  157.16 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/02_mobile-endpoint-protection/01_mobile-endpoint-protection.mp4
  -  18.24 MB

  .pad/18
  -  263.7 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.mp4
  -  17.72 MB

  .pad/19
  -  291.65 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/01_phishing-scams-overview.mp4
  -  17.6 MB

  .pad/20
  -  407.78 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/02_soc-cyber-threat-hunting.mp4
  -  17.52 MB

  .pad/21
  -  493.46 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/01_target-attack-timeline.mp4
  -  17.43 MB

  .pad/22
  -  67.5 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/04_scripting-languages.mp4
  -  17.38 MB

  .pad/23
  -  120.73 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/03_cross-site-scripting-effective-defenses.mp4
  -  17.28 MB

  .pad/24
  -  228.26 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/03_user-behavior-analysis/02_user-behavior-analytics.mp4
  -  17.21 MB

  .pad/25
  -  296.92 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/01_3rd-party-breach-overview/01_3rd-party-breach-overview.mp4
  -  16.33 MB

  .pad/26
  -  170.63 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/02_ransomware-case-study-city-of-atlanta/01_ransomware-case-study-city-of-atlanta.mp4
  -  15.94 MB

  .pad/27
  -  56.6 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/07_data-protection-industry-example.mp4
  -  15.64 MB

  .pad/28
  -  373.45 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/02_case-study/01_pos-case-study-home-depot.mp4
  -  14.83 MB

  .pad/29
  -  169.76 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/01_siem-concepts/02_siem-deployment.mp4
  -  14.81 MB

  .pad/30
  -  194.06 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/01_what-is-data-security-and-protection.mp4
  -  14.81 MB

  .pad/31
  -  196.02 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/03_incident-response-demo-part-3.mp4
  -  14.69 MB

  .pad/32
  -  317.55 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/03_threat-intelligence-platforms.mp4
  -  14.54 MB

  .pad/33
  -  474.9 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/06_critical-data-protection-capabilities.mp4
  -  14.43 MB

  .pad/34
  -  69.46 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/09_penetration-testing-reporting.mp4
  -  14.43 MB

  .pad/35
  -  69.83 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/02_port-scanning/01_port-scanning.mp4
  -  14.43 MB

  .pad/36
  -  75.33 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/01_application-security-overview.mp4
  -  14.32 MB

  .pad/37
  -  189.28 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/02_threat-intelligence-frameworks/01_threat-intelligence-frameworks.mp4
  -  14.24 MB

  .pad/38
  -  262.47 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/01_introduction-to-point-of-sale-attacks/01_point-of-sale-breach-overview.mp4
  -  14.15 MB

  .pad/39
  -  353.98 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/03_application-security-threats-and-attacks.mp4
  -  14.08 MB

  .pad/40
  -  433.59 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/01_penetration-testing-planning.mp4
  -  13.79 MB

  .pad/41
  -  219.88 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/03_watering-hole-attack.mp4
  -  13.35 MB

  .pad/42
  -  151.94 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/03_scripting-concepts.mp4
  -  13.32 MB

  .pad/43
  -  179.38 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/04_industry-specific-data-security-challenges.mp4
  -  13.25 MB

  .pad/44
  -  257.01 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/01_ransomware-overview/03_examples-of-ransomware.mp4
  -  13.19 MB

  .pad/45
  -  318.68 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/03_data-security-common-pitfalls.mp4
  -  13.17 MB

  .pad/46
  -  337.3 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/06_threat-hunting/01_threat-hunting-overview/03_cyber-threat-hunting-an-industry-example.mp4
  -  13.17 MB

  .pad/47
  -  340.43 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/01_characteristics-of-a-security-architecture.mp4
  -  13.08 MB

  .pad/48
  -  428.64 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/02_case-study/01_3rd-party-breach-quest-diagnostics.mp4
  -  13.02 MB

  .pad/49
  -  493.79 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/02_high-level-architectural-models.mp4
  -  12.92 MB

  .pad/50
  -  82.41 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/02_case-study/01_phishing-case-study-google-facebook.mp4
  -  12.85 MB

  .pad/51
  -  151.9 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/02_application-security-techniques-and-risks/04_application-security-standards-and-regulations.mp4
  -  12.84 MB

  .pad/52
  -  167.22 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/01_threat-intelligence-overview.mp4
  -  12.72 MB

  .pad/53
  -  282.55 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/04_deep-dive-into-cross-site-scripting/02_cross-site-scripting-common-attacks.mp4
  -  12.68 MB

  .pad/54
  -  323.18 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/03_devsecops-security-automation/01_devsecops-overview.mp4
  -  12.62 MB

  .pad/55
  -  386.64 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/05_capabilities-of-data-protection.mp4
  -  12.59 MB

  .pad/56
  -  418.86 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/01_overview-of-incident-management-response/01_nist-incident-response-lifecycle-teams.mp4
  -  12.51 MB

  .pad/57
  -  502.29 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/01_overview-of-incident-management-response/02_nist-incident-response-lifecycle.mp4
  -  12.45 MB

  .pad/58
  -  47.35 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/03_forensic-data/04_application-data.mp4
  -  12.05 MB

  .pad/59
  -  460.11 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/03_point-of-sale-breach/01_introduction-to-point-of-sale-attacks/02_pos-malware.mp4
  -  12.04 MB

  .pad/60
  -  474.83 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/02_incident-response-process/06_post-incident-activities.mp4
  -  12 MB

  .pad/61
  -  508.45 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/01_threat-intelligence-and-cybersecurity/02_threat-intelligence-strategy-and-external-sources.mp4
  -  11.92 MB

  .pad/62
  -  80.27 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/02_data-loss-prevention-and-mobile-endpoint-protection/01_data-security-and-protection/02_data-security-top-challenges.mp4
  -  11.8 MB

  .pad/63
  -  202.56 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/02_python-getting-started.mp4
  -  11.59 MB

  .pad/64
  -  416.44 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/03_phishing-email-study.mp4
  -  11.57 MB

  .pad/65
  -  437.21 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/03_penetration-testing-discovery.mp4
  -  11.4 MB

  .pad/66
  -  104.49 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/03_scanning/03_network-protocol-analyzers/01_network-protocol-analyzers-overview.mp4
  -  11.4 MB

  .pad/67
  -  105.41 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/05_ransomware/01_ransomware-overview/01_ransomware-overview.mp4
  -  11.03 MB

  .pad/68
  -  480.13 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/03_solutions-architecture.mp4
  -  11.01 MB

  .pad/69
  -  503.76 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/02_phishing-scams/01_introduction-to-phishing-scams/05_impact-of-phishing.mp4
  -  10.9 MB

  .pad/70
  -  106.88 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/02_history-of-scripting.mp4
  -  10.73 MB

  .pad/71
  -  278.19 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/02_penetration-testing-phases/05_penetration-testing-additional-discovery-details.mp4
  -  10.61 MB

  .pad/72
  -  395.08 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/04_3rd-party-breach/01_3rd-party-breach-overview/02_3rd-party-breach-impacts.mp4
  -  10.35 MB

  .pad/73
  -  152.18 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/03_incident-response-demo/01_incident-response-demo-part-1.mp4
  -  10.05 MB

  .pad/74
  -  460.24 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/02_an-industry-siem-solution/01_qradar-siem-an-industry-example.mp4
  -  9.75 MB

  .pad/75
  -  257.14 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/01_python-basics.mp4
  -  8.74 MB

  .pad/76
  -  266.51 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/01_threat-intelligence/02_threat-intelligence-frameworks/02_security-intelligence.mp4
  -  8.32 MB

  .pad/77
  -  182.18 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/04_artificial-intelligence-in-siems/01_ai-and-siem.mp4
  -  7.76 MB

  .pad/78
  -  245.68 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/03_penetration-testing/01_tools.mp4
  -  7.45 MB

  .pad/79
  -  53.56 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/02_what-is-a-breach.mp4
  -  6.91 MB

  .pad/80
  -  93.49 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/03_data-structures.mp4
  -  6.88 MB

  .pad/81
  -  119.21 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/01_incident-management-response-and-cyberattack-frameworks/03_real-world-case-studies/02_target-attack-vulnerabilities.mp4
  -  6.56 MB

  .pad/82
  -  450.97 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/03_devsecops-security-automation/02_devsecops-deployment.mp4
  -  6.14 MB

  .pad/83
  -  371.21 KB

  [TutsNode.net] - ibm-cybersecurity-breach-case-studies/06_apply-your-skill-data-breaches/01_applied-project-data-breaches/01_introduction-to-the-peer-to-peer-applied-project-data-breaches.mp4
  -  6.13 MB

  .pad/84
  -  381.56 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/04_application-security-and-testing/01_security-architecture-considerations/04_security-patterns.mp4
  -  5.65 MB

  .pad/85
  -  358.45 KB

  [TutsNode.net] - ibm-cyber-threat-intelligence/05_siem-platforms/04_artificial-intelligence-in-siems/02_ai-and-siem-an-industry-example.mp4
  -  5.51 MB

  .pad/86
  -  499.63 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/04_functions-and-methods.mp4
  -  3.53 MB

  .pad/87
  -  480.92 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/03_python-scripting/05_python-libraries.mp4
  -  3.33 MB

  .pad/88
  -  175.04 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/02_incident-response/01_incident-response-overview/01_incident-response-overview.mp4
  -  2.38 MB

  .pad/89
  -  125.06 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/01_penetration-testing/01_introduction-to-penetration-testing/01_introduction-to-penetration-testing.mp4
  -  1.89 MB

  .pad/90
  -  112.52 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/03_digital-forensics/01_forensics-course-overview/01_module-overview.mp4
  -  1.8 MB

  .pad/91
  -  206.82 KB

  [TutsNode.net] - ibm-penetration-testing-incident-response-forensics/04_introduction-to-scripting/01_scripting-overview/01_module-overview.mp4
  -  860.01 KB



Torrent Description


Description

Launch your career in Cybersecurity.. Acquire the knowledge you need to work as a Cybersecurity Analyst

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a cybersecurity analyst.

Throughout this specialization, you will learn concepts around digital forensics, penetration testing and incident response. You will learn about threat intelligence and tools to gather data to prevent an attack or in the event your organization is attacked. You will have the opportunity to review some of the largest breach cases and try your hand at reporting on a real world breach.

The content creators and instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems.

The completion of this specialization also makes you eligible to earn the System Analyst Fundamentals IBM digital badge. More information about the badge can be found here