420.3 MB | 00:07:35 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 -Course Overview (8.97 MB)
2 -Understanding the Incident Response Process (12.03 MB)
3 -The Incident Handling Process (25.55 MB)
4 -Reviewing the Incident Response Process (19.07 MB)
5 -Identifying Assets for Incident Response (8.31 MB)
6 -Learning About Evidence Collection (4.37 MB)
7 -Profiling Servers and Assets (29.34 MB)
8 -Profiling Network Entities (22.93 MB)
10 -Understanding the Stakeholders (3.33 MB)
11 -Identifying Protected Data (23.59 MB)
12 -The Preparation Phase (19.72 MB)
9 -Incident Response Preparation (5.06 MB)
13 -Incident Response Detection and Analysis (7.53 MB)
14 -The Detection and Analysis Phase (27.42 MB)
15 -Pivoting with Detection Data (15.6 MB)
16 -Understanding Correlated Events (43.52 MB)
17 -Hunting for More Data (29.68 MB)
18 -The Detection and Analysis Phase (29.25 MB)
19 -Incident Response Containment, Eradication, and Recovery (5.08 MB)
20 -The Containment, Eradication, and Recovery Phase (31.39 MB)
21 -Incident Response Post-incident Analysis (5.1 MB)
22 -The Post-incident Analysis Phase (24.06 MB)
23 -Detailing SOC Metrics and Scopes (6.23 MB)
24 -Wrapping up IR Policies and Procedures (7.55 MB)
25 -Domain Summary (5.6 MB)
2 -Understanding the Incident Response Process (12.03 MB)
3 -The Incident Handling Process (25.55 MB)
4 -Reviewing the Incident Response Process (19.07 MB)
5 -Identifying Assets for Incident Response (8.31 MB)
6 -Learning About Evidence Collection (4.37 MB)
7 -Profiling Servers and Assets (29.34 MB)
8 -Profiling Network Entities (22.93 MB)
10 -Understanding the Stakeholders (3.33 MB)
11 -Identifying Protected Data (23.59 MB)
12 -The Preparation Phase (19.72 MB)
9 -Incident Response Preparation (5.06 MB)
13 -Incident Response Detection and Analysis (7.53 MB)
14 -The Detection and Analysis Phase (27.42 MB)
15 -Pivoting with Detection Data (15.6 MB)
16 -Understanding Correlated Events (43.52 MB)
17 -Hunting for More Data (29.68 MB)
18 -The Detection and Analysis Phase (29.25 MB)
19 -Incident Response Containment, Eradication, and Recovery (5.08 MB)
20 -The Containment, Eradication, and Recovery Phase (31.39 MB)
21 -Incident Response Post-incident Analysis (5.1 MB)
22 -The Post-incident Analysis Phase (24.06 MB)
23 -Detailing SOC Metrics and Scopes (6.23 MB)
24 -Wrapping up IR Policies and Procedures (7.55 MB)
25 -Domain Summary (5.6 MB)
Screenshot
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!