DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4_exiftool_tmp |
0 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 |
1.8 GB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 Course-Pledge-App-Brewery-100-Days-of-Python.pdf |
72 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 Course-Pledge-App-Brewery-100-Days-of-Python.pdf_original |
72 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 START HERE.mp4 |
36 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 START HERE.mp4_original |
36 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 12-Rules-to-Learn-to-Code-eBook-Copyright-App-Brewery.pdf |
2.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 12-Rules-to-Learn-to-Code-eBook-Copyright-App-Brewery.pdf_original |
2.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 100-Days-of-Python-Check-Off-Posters.pdf |
176 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 100-Days-of-Python-Check-Off-Posters.pdf_original |
176 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Coding-Notebook-Sheets-to-Print.pdf |
346 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Coding-Notebook-Sheets-to-Print.pdf_original |
346 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Downloadable Resources and Tips for Taking the Course.mp4 |
95.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Downloadable Resources and Tips for Taking the Course.mp4_original |
95.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 FAQ-I-Cant-Open-the-Course-Resource-Links.url |
111 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Join-the-Student-Community-on-Discord.url |
53 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Python-Syntax-Cheat-Sheet-Booklet-v2.pdf |
273 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Python-Syntax-Cheat-Sheet-Booklet-v2.pdf_original |
273 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Study-With-Me-Video.url |
99 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Syllabus-for-100-Days-of-Python.pdf |
163 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Syllabus-for-100-Days-of-Python.pdf_original |
163 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Wallpapers.zip |
31.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/004 Day 1 Goals what we will make by the end of the day.mp4 |
9.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/004 Day 1 Goals what we will make by the end of the day.mp4_original |
9.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/004 Press-Run-to-see-the-final-project.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/005 FAQ Can I Use PyCharmVSCode Another Local Code Editor.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Create-a-Replit-Account.url |
49 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Fork-the-Day-1-Starting-Repl.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Printing to the Console in Python.mp4 |
35.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Printing to the Console in Python.mp4_original |
35.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/007 Join Our Class on Coding Rooms.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/008 [Interactive Coding Exercise] Printing.mp4 |
43.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/008 Step-1-Sign-Up-to-Coding-Rooms-First-Register-for-Free-Student-Account.url |
51 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/008 Step-2-Join-Our-Coding-Room-Course.url |
92 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/009 String Manipulation and Code Intelligence.mp4 |
29.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/010 [Interactive Coding Exercise] Debugging Practice.mp4 |
48.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/010 Exercise-2-Debugging-Practice.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/010 Join-Our-Coding-Rooms.url |
92 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/011 The Python Input Function.mp4 |
17.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 [Interactive Coding Exercise] Input Function.mp4 |
35.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Exercise-3-Input-Functions.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Join-Our-Coding-Rooms.url |
92 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Step-Through-Execution-with-Python-Tutor.url |
47 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Step-Through-Execution-with-Thonny-IDE.url |
43 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/013 Python Variables.mp4 |
12.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/013 Variables-Ending-Repl.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/013 Variables-Starting-Repl.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/014 [Interactive Coding Exercise] Variables.mp4 |
19.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/014 Exercise-4-Variables.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/015 Day-1-Ending-Code.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/015 Variable Naming.mp4 |
7.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Band-Name-Generator-Starting-Code-replit.com-.url |
84 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Course-Fixes-Report-an-Issue.url |
137 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Day 1 Project Band Name Generator.mp4 |
19.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Solution-Band-Name-Generator-Ending-Code.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/017 Congratulations! Well done!.mp4 |
9.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/external-links.txt |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/001 Day 2 Goals what we will make by the end of the day.mp4 |
2.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/001 Press-Run-to-see-the-final-project.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/002 Fork-the-Day-2-Starting-Repl.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/002 Python Primitive Data Types.mp4 |
16 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/003 Type Error, Type Checking and Type Conversion.mp4 |
16.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/004 [Interactive Coding Exercise] Data Types.mp4 |
29.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/004 Exercise-1-Data-Types.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/005 Mathematical Operations in Python.mp4 |
14.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/006 [Interactive Coding Exercise] BMI Calculator.mp4 |
47 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/006 BMI-Explained.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/006 Exercise-2-BMI-Calculator.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/007 Number Manipulation and F Strings in Python.mp4 |
17.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/008 [Interactive Coding Exercise] Life in Weeks.mp4 |
43.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/008 Exercise-3-Life-in-Weeks.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/008 Tim-Urbans-Life-in-Weeks.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Day 2 Project Tip Calculator.mp4 |
123.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 FAQ-How-to-Get-2-Decimal-Places-.url |
111 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Floating-Point-Arithmetic.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Solution-Tip-Calculator-Ending-Code.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Tip-Calculator-Start-replit.com-.url |
79 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/010 You are already in the top 50%.mp4 |
5.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/001 Day 3 Goals what we will make by the end of the day.mp4 |
3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/001 Day-3-Goal-Click-Run-to-see-the-final-project.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/002 Control Flow with if else and Conditional Operators.mp4 |
38.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/002 Fork-the-Day-3-Starting-Repl.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/002 Ticketing-Flow-Chart-Version-1-if-else-statements.url |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/003 [Interactive Coding Exercise] Odd or Even Introducing the Modulo.mp4 |
23.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/003 Exercise-1-Odd-or-Even.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/004 Nested if statements and elif statements.mp4 |
18.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/004 Ticketing-Flow-Chart-Version-2-nested-if-else-statements.url |
221 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/004 Ticketing-Flow-Chart-Version-3-if-elif-else-statements.url |
234 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/005 [Interactive Coding Exercise] BMI 2.0.mp4 |
48.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/005 Exercise-2-BMI-Calculator-2.0.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 [Interactive Coding Exercise] Leap Year.mp4 |
63.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 Exercise-3-Leap-Year.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 For-the-Curious-How-Leap-Years-Work.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 Leap-Year-Flow-Chart.url |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/007 Multiple If Statements in Succession.mp4 |
52.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/007 Multiple-if-statements-Ending-Code.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/007 Ticketing-Flow-Chart-Version-4-Multiple-if-statements.url |
234 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/008 [Interactive Coding Exercise] Pizza Order Practice.mp4 |
28 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/008 Coding-Exercise-3.4-Pizza-Order-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/009 Day-3-Ending-Code.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/009 Logical Operators.mp4 |
23.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/009 Ticketing-Flow-Chart-Version-5-with-Midlife-Crisis.url |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/010 [Interactive Coding Exercise] Love Calculator.mp4 |
104.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/010 Coding-Exercise-3.5-Love-Calculator-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Add-your-own-ASCII-art.url |
47 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Day 3 Project Treasure Island.mp4 |
136.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Solution-Treasure-Island-Ending-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Treasure-Island-Flowchart-pdf.pdf |
31 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Treasure-Island-Flowchart-website-.url |
249 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Treasure-Island-Starting-Code-replit.com-.url |
80 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/012 Share and Show off your Project!.mp4 |
8.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/external-links.txt |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/001 Day 4 Goals what we will make by the end of the day.mp4 |
2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/001 Day-4-Goal-Click-Run-to-see-the-final-project.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 AskPythons-Documentation-on-Random.url |
119 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 For-the-Curious-Random-vs-Pseudorandom-Numbers.url |
140 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 For-the-Curious-The-Mersenne-Twister.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 Fork-the-Day-4-Starting-Repl.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 Random Module.mp4 |
65.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/003 [Interactive Coding Exercise] Heads or Tails.mp4 |
5.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/003 Exercise-4.1-Heads-or-Tails-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/004 List-Practice-Repl-US-States-Veg-.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/004 Things-that-lists-can-do-in-Python.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/004 Understanding the Offset and Appending Items to Lists.mp4 |
78.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 [Interactive Coding Exercise] Banker Roulette - Who will pay the bill.mp4 |
66.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 Convert-a-String-to-a-List.url |
96 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 Documentation-on-random.choice-.url |
119 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 Exercise-4.2-Whos-Paying-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/006 For-the-Curious-The-Dirty-Dozen.url |
95 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/006 IndexErrors and Working with Nested Lists.mp4 |
29 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/007 [Interactive Coding Exercise] Treasure Map.mp4 |
78.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/007 Exercise-4.3-Treasure-Map-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Day 4 Project Rock Paper Scissors.mp4 |
111 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Rock-Paper-Scissors-Starter-Code.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Solution-Rock-Paper-Scissors-Completed-Code.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 The-World-Rock-Paper-Scissors-Association.url |
46 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/009 Programming is like going to the Gym.mp4 |
17.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/external-links.txt |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/001 Day 5 Goals what we will make by the end of the day.mp4 |
26 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/001 Day-5-Goal-Click-Run-to-see-the-final-project.url |
81 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/001 Have-I-been-pwned-.url |
51 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/002 For-Loop-Practice-Completed-Code.url |
79 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/002 Fork-the-Day-5-Starting-Repl.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/002 Using the for loop with Python Lists.mp4 |
16.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/003 [Interactive Coding Exercise] Average Height.mp4 |
46.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/003 Exercise-5.1-Average-Height-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/004 [Interactive Coding Exercise] High Score.mp4 |
34.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/004 Exercise-5.2-High-Score-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/005 for loops and the range() function.mp4 |
11.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/006 [Interactive Coding Exercise] Adding Even Numbers.mp4 |
14 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/006 Coding-Exercise-START-HERE.url |
68 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/006 Exercise-5.3-Adding-Even-Numbers-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/007 [Interactive Coding Exercise] The FizzBuzz Job Interview Question.mp4 |
18.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/007 Day-5-Completed-Code.url |
61 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/007 Exercise-5.4-FizzBuzz-START-HERE.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Day 5 Project Create a Password Generator.mp4 |
80.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Password-Generator-Start.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Solution-Password-Generator-Completed-Code.url |
74 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/009 Hard Work and Perseverance beats Raw Talent Every Time.mp4 |
19.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/001 Day 6 Goals what we will make by the end of the day.mp4 |
1.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Built-in-Python-Functions.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Defining and Calling Python Functions.mp4 |
41.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 FAQ-I-Cant-Access-Reborgs-World.url |
111 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Fork-the-Day-6-Starting-Repl.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Reeborgs-World-Start.url |
168 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/003 Reeborgs-World-Hurdles-Challenge.url |
175 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/003 The Hurdles Loop Challenge.mp4 |
44 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/004 Indentation in Python.mp4 |
46.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/004 PEP-8-The-Python-Style-Guide.url |
65 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/005 Reeborgs-World-Hurdles-2-Challenge.url |
175 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/005 While Loops.mp4 |
71.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/006 Hurdles Challenge using While Loops.mp4 |
50.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/006 Reeborgs-World-Hurdles-3-Challenge.url |
175 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/007 Jumping over Hurdles with Variable Heights.mp4 |
29.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/007 Reeborgs-World-Hurdles-4-Challenge.url |
175 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Final Project Escaping the Maze.mp4 |
92.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Reeborg-World-Tests.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Reeborgs-World-Maze-Challenge.url |
167 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/009 Why is this so Hard! Can I really do this.mp4 |
24.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/external-links.txt |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/001 Day 7 Goals what we will make by the end of the day.mp4 |
2.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/001 Day-7-Goal-Click-Run-to-see-the-final-project.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 How to break a Complex Problem down into a Flow Chart.mp4 |
14.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 How-the-Hangman-Game-works.url |
68 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 Play-Hangman-with-Friends-Online.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 Solution-Hangman-Flowchart-1.png |
264 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Challenge 1 - Picking a Random Words and Checking Answers.mp4 |
6.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Challenge-1-Starting-Code.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Challenge-1-Target-Behaviour.url |
96 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Hint-Python-List-Documentation.url |
81 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/004 Challenge 1 Solution - How to Check the User's Answer.mp4 |
48.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/004 Challenge-1-Completed-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Challenge 2 - Replacing Blanks with Guesses.mp4 |
11.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Challenge-2-Starting-Code.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Challenge-2-Target-Behaviour.url |
96 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Hint-Python-Lists-and-Range-.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/006 Challenge 2 Solution - How to Replace the Blanks.mp4 |
80.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/006 Challenge-2-Completed-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/007 Challenge 3 - Checking if the Player has Won.mp4 |
19.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/007 Challenge-3-Starting-Code.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/007 Challenge-3-Target-Behaviour.url |
96 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/008 Challenge 3 Solution - How to Check if the Player Won.mp4 |
14.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/008 Challenge-3-Completed-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Amended-Hangman-Flowchart.png |
160 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Challenge 4 - Keeping Track of the Player's Lives.mp4 |
7.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Challenge-4-Starting-Code.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Challenge-4-Target-Behaviour.url |
96 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/010 Challenge 4 Solution - How to Keep Track of the Player's Lives.mp4 |
44.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/010 Challenge-4-Completed-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Challenge 5 - Improving the User Experience.mp4 |
24.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Challenge-5-Starting-Code.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Challenge-5-Target-Behaviour.url |
96 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Hint-Flow-Chart-for-Hangman.url |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Hint-Importing-Modules.url |
80 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Challenge 5 Solution - How to Add ASCII Art and Improve the UI.mp4 |
18.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Challenge-5-Completed-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Final-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/013 The Benefits of Daily Practice.mp4 |
13.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/external-links.txt |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/001 Day 8 Goals what we will make by the end of the day.mp4 |
8.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/001 Day-8-Goal-Click-Run-to-see-the-final-project.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/002 Fork-the-Day-8-Starting-Repl.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/002 Functions with Inputs.mp4 |
19.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/003 Day-8-Ending-Code.url |
61 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/003 Positional vs. Keyword Arguments.mp4 |
46.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/004 [Interactive Coding Exercise] Paint Area Calculator.mp4 |
53.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/004 Exercise-1-Paint-Area-Calculator.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/005 [Interactive Coding Exercise] Prime Number Checker.mp4 |
49 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/005 Exercise-2-Prime-Numbers.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/005 Primer-on-Prime-Numbers.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Caesar Cipher Part 1 - Encryption.mp4 |
132.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Caesar-Cipher-1-End.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Caesar-Cipher-1-Start.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Python-List-index-Method.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/007 Caesar Cipher Part 2 - Decryption.mp4 |
54 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/007 Caesar-Cipher-2-End.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/007 Caesar-Cipher-2-Start.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/008 Caesar Cipher Part 3 - Reorganising our Code.mp4 |
85.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/008 Caesar-Cipher-3-End.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/008 Caesar-Cipher-3-Start.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Caesar Cipher Part 4 - User Experience Improvements & Final Touches.mp4 |
120 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Caesar-Cipher-4-End.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Caesar-Cipher-4-Start.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/010 How You Can Stay Motivated.mp4 |
12.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/001 Day 9 Goals what we will make by the end of the day.mp4 |
3.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/001 Day-9-Goal-Click-Run-to-see-the-final-project.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/002 Fork-the-Day-9-Starting-Repl.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/002 The Python Dictionary Deep Dive.mp4 |
48.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/003 [Interactive Coding Exercise] Grading Program.mp4 |
33.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/003 Exercise-1-Grading-Program.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/004 Day-9-Ending-Code.url |
61 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/004 Nesting Lists and Dictionaries.mp4 |
28.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/005 [Interactive Coding Exercise] Dictionary in List.mp4 |
43.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/005 Exercise-2-Dictionary-in-List.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 Hint-Flowchart-of-Secret-Auction.url |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 Press-Run-to-see-the-final-project.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 Secret-Auction-Starting-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 The Secret Auction Program Instructions and Flow Chart.mp4 |
12.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Solution and Complete Code for the Secret Auction Program.mp4 |
127.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Solution-Secret-Auction-Completed-Code.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Step-Through-Execution-with-Python-Tutor.url |
51 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/008 Motivation and the Accountability Trick.mp4 |
11.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/external-links.txt |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/001 Day 10 Goals what we will make by the end of the day.mp4 |
3.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/001 Day-10-Goal-Click-Run-to-see-the-final-project.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/002 Fork-the-Day-10-Starting-Repl.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/002 Functions with Outputs.mp4 |
64.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/002 How-to-Convert-Strings-to-Title-Case.url |
113 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/003 Completed-Example-Code-for-Day-10.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/003 Multiple return values.mp4 |
8.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/004 [Interactive Coding Exercise] Days in Month.mp4 |
40.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/004 Exercise-1-Days-in-Month.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/005 Docstrings.mp4 |
9.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/006 Calculator Part 1 Combining Dictionaries and Functions.mp4 |
24.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/006 Starting-Code-for-the-Calculator-on-Repl.it.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/007 Debugging-Solution.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/007 Print vs. Return.mp4 |
18.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/008 While Loops, Flags and Recursion.mp4 |
65.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/009 Calculator Finishing Touches and Bug Fixes.mp4 |
12.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/009 Solution-Calculator-Completed-Code.url |
68 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/010 How to Get a Good Night's Sleep.mp4 |
17.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/external-links.txt |
857 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/001 Day 11 Goals what we will make by the end of the day.mp4 |
8.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/001 Day-11-Goal-Click-Run-to-see-the-final-project.url |
74 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/001 Try-out-an-online-Blackjack-game.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/002 Blackjack Program Requirements and Game Rules.mp4 |
63.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/002 Fork-the-Day-11-Starting-Repl.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/003 Hint 4 & 5 Solution Walkthrough.mp4 |
32.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/004 Hint 6-8 Solution Walkthrough.mp4 |
34.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/004 Python-list-methods.url |
83 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/004 Python-sum-Function.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/005 Hint 9 Solution Walkthrough Refactoring and calling calculate_score().mp4 |
19 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/006 Hint 10-12 Solution Walkthrough.mp4 |
58.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/007 Blackjack-Completed-Code.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/007 Hint 13 Solution Walkthrough.mp4 |
31.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/008 A Solid Foundation goes a Long Way.mp4 |
19 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/external-links.txt |
598 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/001 Fork-the-Day-12-Starting-Repl.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/001 Namespaces Local vs. Global Scope.mp4 |
37.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/002 Does Python Have Block Scope.mp4 |
5.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/002 Fork-the-Day-12-Starting-Repl.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/003 How to Modify a Global Variable.mp4 |
9.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/004 Day-12-Ending-Code.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/004 Python Constants and Global Scope.mp4 |
3.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Day-12-Goal-Click-Run-to-see-the-final-project.url |
81 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Get-your-own-ASCII-Text-from-Patorjk.url |
100 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Introducing the Final Project The Number Guessing Game.mp4 |
11.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Starting-Repl-for-the-Number-Guessing-Game.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Solution & Walkthrough to the Number Guessing Game.mp4 |
130.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Solution-Guess-the-Number-Completed-Code.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Using-Python-Tutor-to-Step-Through-your-Code.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/007 Don't be too hard on yourself.mp4 |
12.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/external-links.txt |
863 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/001 Describe the Problem.mp4 |
14.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/001 Fork-the-Day-13-Starting-Repl.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/002 Reproduce the Bug.mp4 |
11.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/003 Play Computer and Evaluate Each Line.mp4 |
10.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/004 Fixing Errors and Watching for Red Underlines.mp4 |
18.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/005 Squash bugs with a print() Statement.mp4 |
14 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/006 Bringing out the BIG Gun Using a Debugger.mp4 |
24.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/006 Debug-your-code-online-with-Python-Tutor.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/007 Day-13-Ending-Code.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/007 Final Debugging Tips.mp4 |
23.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/007 Search-Stack-Overflow-for-Errors.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/008 [Interactive Coding Exercise] Debugging Odd or Even.mp4 |
6.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/008 Exercise-1-Debugging-Odd-or-Even.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/009 [Interactive Coding Exercise] Debugging Leap Year.mp4 |
8.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/009 Exercise-2-Debugging-Leap-Year.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/010 [Interactive Coding Exercise] Debugging FizzBuzz.mp4 |
26.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/010 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/010 Exercise-3-Debugging-FizzBuzz.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/011 Building Confidence.mp4 |
17.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/external-links.txt |
729 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Day-14-Goal-Click-Run-to-see-the-final-project.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Fork-the-Day-14-Starting-Repl.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Introduction & Program Requirements for the Higher Lower Game.mp4 |
36.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Try-out-the-Online-Higher-Lower-Game.url |
55 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/002 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/002 Day-14-Ending-Code.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/002 Solution & Walkthrough of the Higher Lower Game.mp4 |
269.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/003 Study Tip Set Reminders in Your Calendar to Review.mp4 |
18.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/external-links.txt |
418 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/001 Installing Python Locally on Your Computer.mp4 |
25.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/001 Step-1-Install-Python-3-on-your-Machine.url |
57 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/002 Download PyCharm for Windows or Mac.mp4 |
5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/002 Step-2-Download-Install-Pycharm.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/003 PyCharm's Charming Features (while you wait for the download to finish).mp4 |
66.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/003 Python-PEP8-Style-Guide.url |
65 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/004 How to Install PyCharm on Windows.mp4 |
12 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/005 Installing PyCharm on Mac.mp4 |
8.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Add-a-Coffee-Emoji-from-Emojipedia.org.url |
60 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Coffee-Machine-Program-Requirements.pdf |
69 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Day-15-Goal-Press-Play-button-bottom-right-.url |
97 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Fork-the-Day-15-Starting-Repl.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 How-to-bring-up-the-Emoji-Keyboard-on-Mac.url |
84 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 How-to-bring-up-the-Emoji-Keyboard-on-Windows-10.url |
108 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Introduction & Requirements for the Coffee Machine Project.mp4 |
50.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 PyCharm-Keyboard-Shortcuts.url |
124 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/007 Day-15-Ending-Code.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/007 Solution & Walkthrough for the Coffee Machine Code.mp4 |
214.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/008 Location, Location, Location - Pavlov's Coding Corner.mp4 |
19.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/001 Why do we need OOP and how does it work.mp4 |
39.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/002 How to use OOP Classes and Objects.mp4 |
6.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/003 Constructing Objects and Accessing their Attributes and Methods.mp4 |
72.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/003 Turtle-Colours-cs111.wellesley.edu-.url |
68 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/003 Turtle-Graphics-Documentation.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 How to Add Python Packages and use PyPi.mp4 |
37.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 Pokemon-Pokedex.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 PrettyTable-Package-Documentation.url |
89 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 PrettyTable-Package.url |
61 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 Python-Package-Index.url |
41 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/005 Practice Modifying Object Attributes and Calling Methods.mp4 |
45.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Building the Coffee Machine in OOP.mp4 |
48 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Coffee-Machine-Classes-Documentation.pdf |
76 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Coffee-Machine-Program-Requirements.pdf |
68 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 OOP-Coffee-Machine-Project-Starting-Code.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 oop-coffee-machine-start.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Steve-Jobs-on-Object-Oriented-Programming.url |
128 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/007 OOP-Coffee-Machine-Project-Final-Code.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/007 Walkthrough and Solution for the OOP Coffee Machine.mp4 |
37.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/008 Don't forget to review occasionally.mp4 |
16.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/external-links.txt |
886 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/001 Day 17 Goals what we will make by the end of the day.mp4 |
2.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/001 Day-17-Goal-Click-Run-to-see-the-final-project.url |
74 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/002 How to create your own Class in Python.mp4 |
9.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/003 Working with Attributes, Class Constructors and the __init__() Function.mp4 |
22.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/004 Adding Methods to a Class.mp4 |
22.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/005 Download-or-Fork-the-Quiz-Game-Starting-Code.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/005 Quiz Project Part 1 Creating the Question Class.mp4 |
16.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/005 quiz-game-start.zip |
995 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/006 Quiz Project Part 2 Creating the List of Question Objects from the Data.mp4 |
45 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/007 Quiz Project Part 3 The QuizBrain and the next_question() Method.mp4 |
41.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/008 Quiz Project Part 4 How to continue showing new Questions.mp4 |
25.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/009 Quiz Project Part 5 Checking Answers and Keeping Score.mp4 |
29.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 Open-Trivia-Database.url |
44 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 Quiz-Project-Final-Code.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 The Benefits of OOP Use Open Trivia DB to Get New Questions.mp4 |
36 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/011 Run for that Bus!.mp4 |
22.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/external-links.txt |
402 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/001 Day 18 Goals what we will make by the end of the day.mp4 |
2.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Trinket-Turtle-Colours.url |
54 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Turtle-Colours.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Turtle-Graphics-Documentation.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Understanding Turtle Graphics and How to use the Documentation.mp4 |
84.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/003 Challenge-1-Draw-a-Square-Starting-Code.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/003 Solution-to-Challenge-1.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/003 Turtle Challenge 1 - Draw a Square.mp4 |
5.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/004 Importing Modules, Installing Packages, and Working with Aliases.mp4 |
39 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/005 Challenge-2-Draw-a-Dashed-Line-Starting-Code.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/005 Solution-to-Challenge-2.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/005 Turtle Challenge 2 - Draw a Dashed Line.mp4 |
19.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/006 Challenge-3-Drawing-Different-Shapes-Starting-Code.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/006 Solution-to-Challenge-3.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/006 Turtle Challenge 3 - Drawing Different Shapes.mp4 |
31.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 Challenge-4-Generate-a-Random-Walk-Starting-Code.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 Solution-to-Challenge-4.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 Turtle Challenge 4 - Generate a Random Walk.mp4 |
45.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 What-is-a-Random-Walk-.url |
65 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/008 Python Tuples and How to Generate Random RGB Colours.mp4 |
45.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/008 RGB-Tool-from-W3Schools.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/009 Challenge-5-Create-a-Spirograph-Starting-Code.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/009 Solution-to-Challenge-5-Day-18-Ending-Code-.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/009 Turtle Challenge 5 - Draw a Spirograph.mp4 |
61.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/010 Colorgram-Package.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/010 hirst-painting-start.zip |
19 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/010 The Hirst Painting Project Part 1 - How to Extract RGB Values from Images.mp4 |
87 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/011 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/011 Hirst-Painting-Project-Final-Code.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/011 The Hirst Painting Project Part 2 - Drawing the Dots.mp4 |
76 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/012 Space out your study sessions and stay consistent.mp4 |
26.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/001 Day 19 Goals what we will make by the end of the day.mp4 |
6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/002 Python Higher Order Functions & Event Listeners.mp4 |
28 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/002 The-listen-method.url |
83 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/003 Challenge Make an Etch-A-Sketch App.mp4 |
17.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/003 etch-a-sketch-start.zip |
260 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/003 Solution-etch-a-sketch-final.zip |
376 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/004 Object State and Instances.mp4 |
5.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/005 turtle-race-start.zip |
197 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/005 Turtle.textinput-documentation.url |
88 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/005 Understanding the Turtle Coordinate System.mp4 |
69.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/006 Aaaand, we're off to the races!.mp4 |
60.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/006 Solution-turtle-race-final.zip |
707 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/007 Expand on the Solutions.mp4 |
29.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/external-links.txt |
263 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/001 Day 20 Goals what we will make by the end of the day.mp4 |
15.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/002 Screen Setup and Creating a Snake Body.mp4 |
21.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/003 Animating the Snake Segments on Screen.mp4 |
78.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/003 The-tracer-method.url |
102 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/004 Create a Snake Class & Move to OOP.mp4 |
24.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/005 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/005 How to Control the Snake with a Keypress.mp4 |
39.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/005 snake-game-part-1-final.zip |
947 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/006 Programming is not Memorising.mp4 |
50.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/external-links.txt |
178 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/001 Day 21 Goals what we will make by the end of the day.mp4 |
4.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/002 Class Inheritance.mp4 |
39.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/002 Inheritance-Repl.it-Example-Code.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/003 Detect Collisions with Food.mp4 |
51.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/003 The-shape-and-shapesize-methods.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/004 Create a Scoreboard and Keep Score.mp4 |
47.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/004 The-write-method.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/005 Detect Collisions with the Wall.mp4 |
11.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/006 Detect Collisions with your own Tail.mp4 |
20.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 How to Slice Lists & Tuples in Python.mp4 |
20.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 Piano-Keys-List-Slicing-Repl.it.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 snake-game-part-2-final.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/008 Stay motivated by remembering the reason you signed up.mp4 |
18.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/external-links.txt |
419 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/001 Day 22 Goals what you will make by the end of the day.mp4 |
7.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/002 Set up the Main Screen.mp4 |
4.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/003 Create a Paddle that responds to Key Presses.mp4 |
31.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/004 Write the Paddle Class and Create the Second Paddle.mp4 |
23.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/005 Write the Ball Class and Make the Ball Move.mp4 |
12.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/006 Add the Ball Bouncing Logic.mp4 |
18.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/007 How to Detect Collisions with the Paddle.mp4 |
13.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/008 How to Detect when the Ball goes Out of Bounds.mp4 |
17 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/009 Score Keeping and Changing the Ball Speed.mp4 |
34.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/009 Solution-pong-game-final.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/010 Picturing fears even the worst-case scenario is not so scary.mp4 |
28.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/001 Day 23 Goals what you will make by the end of the day.mp4 |
4.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/002 Choose Your Difficulty.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/002 turtle-crossing-start.zip |
921 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/003 How to use the Starter Code.mp4 |
9.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/004 Step 1 - Check out how the game play works.html |
802 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/005 Step 2 - Break down the Problem.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/006 Solution to Step 3 - Create the Player Behaviour.mp4 |
10.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/007 Solution to Step 4 - Create the Car Behaviour.mp4 |
26.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/008 Solution to Step 5 - Detect when the Turtle collides with a Car squish.mp4 |
5.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/009 Solution to Step 6 - Detect when the Player has reached the other side.mp4 |
14.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/010 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/010 Solution to Step 7 - Add the Scoreboard and Game Over sequence.mp4 |
22.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/010 Solution-turtle-crossing-final.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/011 This course is not about typing out code.mp4 |
29.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/001 Day 24 Goals what you will make by the end of the day.mp4 |
8.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/002 Add a High Score to the Snake Game.mp4 |
32.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/002 Snake-Project-Code-from-Day-21.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/003 How to Open, Read, and Write to Files using the with Keyword.mp4 |
32 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/003 The-open-method.url |
101 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/004 Challenge Read and Write the High Score to a File in Snake.mp4 |
21.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/004 Solution-snake-game-high-score-final.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/005 Day-24-Ending-Code.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/005 Understand Relative and Absolute File Paths.mp4 |
67.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Hint-1.url |
79 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Hint-2.url |
79 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Hint-3.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Introducing the Mail Merge Challenge.mp4 |
17 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Mail-Merge-Project-Start.zip |
9 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/007 Mail-Merge-Project-Completed.zip |
15 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/007 Solution & Walkthrough for the Mail Merge Project.mp4 |
58.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/008 What's the correct solution What's the best answer What's the right way.mp4 |
33.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/external-links.txt |
452 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/001 Day 25 Goals what we will make by the end of the day.mp4 |
11.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Fork-the-Day-25-Starting-Repl.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Pandas-API-Reference.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Pandas-Documentation.url |
55 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Reading CSV Data in Python.mp4 |
64.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 weather-data.csv |
144 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/003 DataFrames & Series Working with Rows & Columns.mp4 |
91.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 2018-Central-Park-Squirrel-Census-Squirrel-Data.csv |
730 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 Central-Park-Squirrel-Census-Data.url |
123 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 Day-25-End-Code.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 The Great Squirrel Census Data Analysis (with Pandas!).mp4 |
89.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/005 Sporcles-Name-the-States-Game.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/005 U.S. States Game Part 1 Setup.mp4 |
58.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/005 us-states-game-start.zip |
43 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/006 U.S. States Game Part 2 Challenge with .csv.mp4 |
115.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/007 Solution-us-states-game-end.zip |
44 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/007 U.S. States Game Part 3 Saving Data to .csv.mp4 |
20 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/external-links.txt |
584 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/001 Day 26 Goals what you will make by the end of the day.mp4 |
2.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/002 How to Create Lists using List Comprehension.mp4 |
68.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/003 [Interactive Coding Exercise] Squaring Numbers.mp4 |
9.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/003 Exercise-1-Squaring-Numbers.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/004 [Interactive Coding Exercise] Filtering Even Numbers.mp4 |
7.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/004 Exercise-2-Filtering-Even-Numbers.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/005 [Interactive Coding Exercise] Data Overlap.mp4 |
16.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/005 Exercise-3-Data-Overlap.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/006 Apply List Comprehension to the U.S. States Game.mp4 |
7.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/007 How to use Dictionary Comprehension.mp4 |
28.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/008 [Interactive Coding Exercise] Dictionary Comprehension 1.mp4 |
15.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/008 Exercise-4-Dictionary-Comprehension-1.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/009 [Interactive Coding Exercise] Dictionary Comprehension 2.mp4 |
11.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/009 Exercise-5-Dictionary-Comprehension-2.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/010 Day-26-End-Code.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/010 How to Iterate over a Pandas DataFrame.mp4 |
24.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/011 Introducing the NATO Alphabet Project.mp4 |
16.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/011 NATO-alphabet-start.zip |
860 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/012 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/012 Solution & Walkthrough for the NATO Alphabet Project.mp4 |
20.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/012 Solution-NATO-alphabet-end.zip |
815 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/external-links.txt |
673 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/001 Day 27 Goals what we will make by the end of the day.mp4 |
10.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/002 History of GUI and Introduction to Tkinter.mp4 |
26.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/003 Creating Windows and Labels with Tkinter.mp4 |
41.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/003 Python-Docs-The-Packer.url |
81 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/003 TCL-tk-Docs-pack-.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/004 Setting Default Values for Optional Arguments inside a Function Header.mp4 |
31.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/005 args Many Positional Arguments.mp4 |
14.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/006 kwargs Many Keyword Arguments.mp4 |
50 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/006 Playground.py-Completed-Code.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/007 Buttons, Entry, and Setting Component Options.mp4 |
58.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/007 TCL-tk-Docs-Entry-.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/008 Other Tkinter Widgets Radiobuttons, Scales, Checkbuttons and more.mp4 |
28.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/008 Tkinter-Widget-Example-Code-Palette.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/009 Day-27-End-Code.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/009 Tkinter Layout Managers pack(), place() and grid().mp4 |
36 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/010 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/010 Mile to Kilometers Converter Project.mp4 |
72.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/external-links.txt |
534 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/001 Day 28 Goals what we will make by the end of the day.mp4 |
4.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/002 How to work with the Canvas Widget and Add Images to Tkinter.mp4 |
71.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/002 pomodoro-start.zip |
10 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/002 Use-Color-Hunt-to-Choose-a-Nice-Colour.url |
45 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/003 Challenge - Complete the Application's User Interface (UI).mp4 |
51.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/004 Add a Count Down Mechanism.mp4 |
68.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/004 TCL-tk-Docs-after-.url |
65 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/005 Dynamic Typing Explained.mp4 |
36.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/005 Python-as-a-Strongly-and-Dynamically-Typed-Programming-Language.url |
93 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/006 Setting Different Timer Sessions and Values.mp4 |
26.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/007 Adding Checkmarks and Resetting the Application.mp4 |
37.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/007 Solution-pomodoro-end.zip |
13 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/external-links.txt |
353 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/001 Day 29 Goals what we will make by the end of the day.mp4 |
19 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/002 Canvas-Documentation-on-tkdocs.com.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/002 Challenge 1 - Working with Images and Setting up the Canvas.mp4 |
24.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/002 password-manager-start.zip |
14 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/003 Challenge 2 - Use grid() and columnspan to Complete the User Interface.mp4 |
12.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/003 Tkinter-Grid-columnspan-Demo-Repl.url |
80 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/004 Solution to the Creating the Grid Layout.mp4 |
25.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/005 Challenge 3 - Saving Data to File.mp4 |
70.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/005 Entry-Widget-Docs-on-tkdocs.com.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/005 w3schools-Python-Writing-to-File-Documentation.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/006 Dialog Boxes and Pop-Ups in Tkinter.mp4 |
37.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Day-5-Password-Generator-Project-Code.zip |
502 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Generate a Password & Copy it to the Clipboard.mp4 |
73.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Pyperclip-documentation-on-PyPi.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Solution-password-manager-end.zip |
16 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 w3schools-Python-join-method-Documentation.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/external-links.txt |
632 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/001 Day 30 Goals what you will make by the end of the day.mp4 |
3.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/002 Catching Exceptions The try catch except finally Pattern.mp4 |
47.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/003 Completed-Day-30-Practice-Code.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/003 Raising your own Exceptions.mp4 |
13.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/004 [Interactive Coding Exercise] IndexError Handling.mp4 |
9.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/004 Exercise-1-IndexError-Handling.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/005 [Interactive Coding Exercise] KeyError Handling.mp4 |
10.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/005 Exercise-2-KeyError-Handling.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/006 Code Exercise Exception Handling in the NATO Phonetic Alphabet Project.mp4 |
26.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/006 NATO-Phonetic-Alphabet-for-the-Code-Exercise.zip |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/006 Solution-NATO-alphabet-improved-end.zip |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/007 Password-Manager-End-of-Day-29.zip |
16 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/007 Python-JSON-Module-Documentation.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/007 Write, read and update JSON data in the Password Manager.mp4 |
52.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/008 Challenge 1 - Handling Exceptions in the Password Manager.mp4 |
23.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/009 Challenge 2 - Search for a Website in the Password Manager.mp4 |
125.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/009 Solution-password-manager-improved-end.zip |
16 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/external-links.txt |
454 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 2018-Frequency-Lists-from-Hermit-Dave.url |
93 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Day 31 Goals what you will make by the end of the day.mp4 |
73 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 flash-card-project-start.zip |
46 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Google-Sheets.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Google-Translate-for-Google-Sheets.url |
79 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Google-Translate-Language-Codes.url |
79 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Open-Subtitles.url |
68 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Wiktionary-Frequency-Lists.url |
81 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/002 Step 1 - Create the User Interface (UI) with Tkinter.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/003 Solution & Walkthrough for Creating the UI.mp4 |
44.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/004 Step 2 - Create New Flash Cards.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/005 Solution & Walkthrough for Creating New Flash Cards.mp4 |
64.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/006 Step 3 - Flip the Cards!.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/007 Solution & Walkthrough for Flipping Cards.mp4 |
70.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/008 Step 4 - Save Your Progress.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/009 Solution & Walkthrough for Saving Progress.mp4 |
60.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/009 Solution-flash-card-project-end.zip |
47 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/external-links.txt |
606 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/001 Day 32 Goals what we will make by the end of the day.mp4 |
5.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/002 A Note About the Next Lesson Google SMTP Port.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/003 Birthday-Wisher-Day-32-start.zip |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/003 How to Send Emails with Python using SMTP.mp4 |
99.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/003 Python-smtplib-Documentation.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/004 Python-datetime-Documentation.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/004 Working with the datetime Module.mp4 |
18 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/005 101-Monday-Motivational-Quotes-from-the-Positivity-Blog.url |
80 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/005 Challenge 1 - Send Motivational Quotes on Mondays via Email.mp4 |
60.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/005 Day-32-Ending-Code.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 Automated Birthday Wisher Project Challenge.mp4 |
23.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 birthday-wisher-extrahard-start.zip |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 birthday-wisher-hard-start.zip |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 birthday-wisher-normal-start.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/007 Solution & Walkthrough for the Automated Birthday Wisher.mp4 |
149.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/007 Solution-birthday-wisher-end.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/008 Host-your-Code-in-the-Cloud-with-pythonanywhere.url |
55 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/008 Run Your Python Code in the Cloud!.mp4 |
46.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/external-links.txt |
526 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/001 Day 33 Goals what you will make by the end of the day.mp4 |
13.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/001 What-is-the-ISS-.url |
81 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/002 Application-Programming-Interface-Wikipedia-Entry.url |
87 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/002 What are Application Programming Interfaces (APIs).mp4 |
18.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 API Endpoints and Making API Calls.mp4 |
33.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 ISS-Current-Location-API-Documentation.url |
80 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 JSON-Viewer-Extension.url |
110 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 or-just-use-Firefox-to-view-JSON-.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 HTTP-Status-Codes.url |
49 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 Latitude-and-Longitude-to-Address-Tool.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 Python-Requests-Module-Documentation.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 Working with Responses HTTP Codes, Exceptions & JSON Data.mp4 |
44.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 Challenge - Build a Kanye Quotes App using the Kanye Rest API.mp4 |
19.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 Kanye-Quotes-API.url |
43 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 kanye-quotes-start.zip |
46 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 Solution-kanye-quotes-end.zip |
46 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/006 Sunrise-and-Sunset-Times-API.url |
54 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/006 Understand API Parameters Match Sunset Times with the Current Time.mp4 |
82.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/006 w3schools-Python-split-method-Documentation.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 Find-Your-Current-Latitude-and-Longitude-Tool.url |
47 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 ISS Overhead Notifier Project - Challenge & Solution.mp4 |
78.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 issoverhead-start.zip |
720 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 Solution-issoverhead-end.zip |
846 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/001 Day 34 Goals what you will make by the end of the day.mp4 |
18.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/001 The-Open-Trivia-Database.url |
44 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/002 quizzler-app-start.zip |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/002 Trivia Question API Challenge.mp4 |
38.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/003 Solution & Walkthrough for getting Trivia Questions.mp4 |
13.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 Documentation-on-HTML-Entities.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 FreeFormatter-HTML-Unescape-Tool.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 StackOverflow-Answer-on-Unescaping-HTML-Entities-in-Python.url |
105 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 Unescaping HTML Entities.mp4 |
17.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/005 Class based Tkinter UI.mp4 |
38.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/006 How-to-Get-TKinter-Canvas-Text-to-Wrap.url |
197 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/006 Python Typing & Showing the Next Question in the GUI.mp4 |
31.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/007 Python Typing Type Hints and Arrows -.mp4 |
11.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/007 Type-Hints-demo-Day-34-end.zip |
297 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/008 Check the Answer.mp4 |
16.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 Give Feedback to the Player, Keep Score and Fix the Bugs =).mp4 |
37.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 How-to-Disable-Tkinter-Buttons.url |
176 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 Solution-quizzler-app-end.zip |
8 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/external-links.txt |
865 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/001 Day 35 Goals what you will make by the end of the day.mp4 |
8.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/002 Create-a-free-account-on-OpenWeatherMap.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/002 What is API Authentication and Why Do We Need to Authenticate Ourselves.mp4 |
33.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Find-Your-Latitude-longitude.url |
48 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Link-to-Your-OpenWeatherMap-API-Key-req.login.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Online-JSON-Viewer.url |
51 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 OpenWeatherMap-Current-Weather-API-Documentation.url |
58 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 OpenWeatherMap-OneCall-Api-Documentation.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Using API Keys to Authenticate and Get the Weather from OpenWeatherMap.mp4 |
96.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Challenge - Check if it Will Rain in the Next 12 Hours.mp4 |
141.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Find-a-Place-thats-raining-using-Ventusky.url |
49 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 OpenWeatherMap-Condition-IDs-and-Condition-Codes.url |
95 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Python-Slice-Function.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Python-Slice-Operator-with-Square-Brackets.url |
95 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/005 Sending SMS via the Twilio API.mp4 |
86.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/005 Signup-for-Twilio.url |
57 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/005 Twilio-SMS-Quickstart-Documentation-for-Python.url |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/006 How-to-Get-Twilio-to-Work-on-PythonAnywhere-Free-Accounts.url |
83 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/006 PythonAnywhere.url |
55 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/006 Use PythonAnywhere to Automate the Python Script.mp4 |
61.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Environment-Variables-Wikipedia-Entry.url |
74 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Other-APIs-to-Explore.url |
44 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Solution-rain-alert-end.zip |
851 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Understanding Environment Variables and Hiding API Keys.mp4 |
74.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/001 Day 36 Goals what you will make by the end of the day.mp4 |
62.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/001 TSLA-Stock-Price.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 Choose Your Destiny!.html |
396 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 News-API.url |
44 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 stock-news-extrahard-start.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 stock-news-hard-start.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 stock-news-normal-start.zip |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 Stock-Price-API.url |
52 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 Twilio-API.url |
47 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/003 Solution & Walkthrough for Step 1 - Check for Stock Price Movements.mp4 |
117.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/004 Solution & Walkthrough for Step 2 - Get the News Articles.mp4 |
65.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/005 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/005 Solution & Walkthrough for Step 3 - Send the SMS Messages.mp4 |
85.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/005 Solution-stock-news-end.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/external-links.txt |
280 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/001 Day 37 Goals what you will make by the end of the day.mp4 |
17.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 HTTP Post Requests.mp4 |
41.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 Pixela-API-Documentation.url |
45 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 Pixela-Website.url |
40 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 Requests-Module-Documentation.url |
70 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/003 Advanced Authentication using an HTTP Header.mp4 |
88.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/004 Challenge Add a Pixel to the Habit Tracker using a Post Request.mp4 |
24 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/005 Autofilling today's date using strftime.mp4 |
17.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/005 w3schools-Python-Date-Formatting-with-strftime.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/006 How to use HTTP Put and Delete Requests.mp4 |
39.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/006 Solution-habit-tracking-end.zip |
713 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/external-links.txt |
361 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/001 Day 38 Goals what you will make by the end of the day.mp4 |
9.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/001 OpenAi-GPT-3.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/002 Nutritionix-API.url |
64 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/002 Step 1 - Setup API Credentials and Google Spreadsheet.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/003 Nutritionix-API-Documentation.url |
111 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/003 Step 2 - Get Exercise Stats with Natural Language Queries.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/004 Sheety-API.url |
42 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/004 Step 3 - Setup Your Google Sheet with Sheety.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/005 Step 4 - Saving Data into Google Sheets.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/006 Step 5 - Authenticate Your Sheety API.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/007 Solution-Exercise-Tracker.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/007 Step 6 - Environment Variables in Repl.it.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/external-links.txt |
359 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/001 Day 39 Goals what you will make by the end of the day.mp4 |
33.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/002 flight-deals-start.zip |
25.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/002 Step 1 - Choose Your Path and Download the Starting Project.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/003 flight-deals-step-2-solution.zip |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/003 Step 2 - Use Sheety to Read and Write Data to the Google Sheet.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/004 Step 3 - Get the IATA Codes using the Kiwi Partners API.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/005 Step 4 - Search for Cheap Flights.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/006 Step 5 - If Flight Price Lower than in Google Sheet send an SMS.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/001 Day 40 Goals what you will make by the end of the day.mp4 |
13.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/001 Project-Inspiration-Jacks-Flight-Club.url |
52 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/002 Step 1 - Create the Customer Acquisition Code.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/003 flight-deals-end.zip |
25.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/003 Step 2 - Download the Starting Project.html |
526 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/004 Step 3 - Exception Handling for Destinations without Flights.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/005 Step 4 - Destinations without Direct Flights.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/006 Step 5 - Email all our customers.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/external-links.txt |
148 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/001 How Does the Internet Actually Work.mp4 |
43.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/001 Submarine-Cable-Map.url |
58 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/002 How Do Websites Actually Work.mp4 |
36.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/003 Download the Required Software.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/004 What is HTML.mp4 |
22.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 2.1-Heading-Element.zip |
282 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 HTML Heading Elements.mp4 |
65.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 MDN-Docs-Headings.url |
98 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 Unzip-in-Windows.url |
80 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 Unzip-on-Mac.url |
84 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/006 2.2-Paragraph-Element.zip |
1.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/006 HTML Paragraph Elements.mp4 |
78.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/007 2.3-Void-Elements.zip |
1.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/007 Diff-Checker.url |
52 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/007 Self Closing Tags.mp4 |
83.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/008 2.4-Movie-Ranking-Project.zip |
389 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/008 Day 41 Project - Movie Ranking.mp4 |
27.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/external-links.txt |
378 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/001 HTML Boilerplate.mp4 |
58.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/002 3.0-List-Elements.zip |
230 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/002 The List Element.mp4 |
77.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/003 3.1-Nesting-and-Indentation.zip |
38 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/003 Nesting and Indentation.mp4 |
32.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/004 3.2-Anchor-Elements.zip |
228 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/004 Anchor Elements.mp4 |
29.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/005 3.3-Image-Elements.zip |
2.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/005 Image Elements.mp4 |
45.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/006 3.4-Birthday-Invite-Project.zip |
1.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/006 Day 42 Project - Birthday Invite Website.mp4 |
35.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/001 Why do we need CSS.mp4 |
86.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/002 5.1-Adding-CSS.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/002 How to add CSS.mp4 |
31.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/003 5.3-CSS-Selectors.zip |
138 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/003 CSS Selectors.mp4 |
128.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/004 5.4-Color-Vocab-Project.zip |
874 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/004 Day 43 Project - Colour Vocab Website.mp4 |
33 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 6.0-CSS-Colors.zip |
18 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 CSS Colours.mp4 |
33.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 Named-Colours.url |
84 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 RGB-Colour-Mixer.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/002 6.1-Font-Properties.zip |
334 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/002 Font Properties.mp4 |
102.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/003 Inspecting CSS.mp4 |
43 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/003 Pesticide.url |
119 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/004 6.3-CSS-Box-Model.zip |
803 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/004 The CSS Box Model - Margin, Padding and Border.mp4 |
100.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/005 6.4-Motivation-Meme-Project.zip |
4.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/005 Day 44 Project - Motivational Poster Website.mp4 |
72.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/external-links.txt |
281 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/001 Day 45 Goals what you will make by the end of the day.mp4 |
28.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/002 Beautiful-Soup-Documentation.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/002 bs4-start.zip |
668 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/002 Parsing HTML and Making Soup.mp4 |
59 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/003 Finding and Selecting Particular Elements with BeautifulSoup.mp4 |
79.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/004 Scraping a Live Website.mp4 |
149.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/004 SOLUTION.url |
82 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/004 Y-Combinator-Hacker-News.url |
53 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/005 Is Web Scraping Legal.mp4 |
70.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 100 Movies that You Must Watch.mp4 |
80.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Empires-Top-100-Movies-of-All-Time-from-Web-Archive-.url |
126 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Solution-100-movies-to-watch-end.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Starting-Code-100-movies-to-watch-start.zip |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/external-links.txt |
468 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/001 Day 46 Goals what you will make by the end of the day.mp4 |
19.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/002 Step 1 - Scraping the Billboard Hot 100.html |
827 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/003 Step 2 - Authentication with Spotify.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/004 Step 3 - Search Spotify for the Songs from Step 1.html |
987 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/005 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/005 Step 4 - Creating and Adding to Spotify Playlist.html |
802 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/001 Day 47 Goals what you will make by the end of the day.mp4 |
46.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/002 Step 1 - Use BeautifulSoup to Scrape the Product Price.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/003 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/003 Step 2 - Email Alert When Price Below Preset Value.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/001 Addiction-Warning-The-Cookie-Clicker-Game.url |
65 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/001 Day 48 Goals what you will make by the end of the day.mp4 |
14.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/002 Download-and-Install-Selenium-ChromeDriver.url |
67 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/002 Download-and-Install-the-Chrome-Browser.url |
65 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/002 How to Install & Set Up Selenium.mp4 |
57.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/003 How to Find and Select Elements on a Website with Selenium.mp4 |
102.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/003 Selenium-Documentation.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/003 w3schools-XPath-Tutorial.url |
69 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/004 Challenge Use Selenium to Scrape Website Data.mp4 |
61 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/004 Python.org.url |
47 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/005 Challenge Use Selenium in a Blank Project & Scrape a Different Piece of Data.mp4 |
39.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/005 Wikipedia-Main-Page.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 Challenge-URL-Form-Sign-Up.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 How to Automate Filling Out Forms and Clicking Buttons with Selenium.mp4 |
92.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 My-Web-Dev-Course.url |
125 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 Our-Actual-Newsletter.url |
62 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/007 The Cookie Clicker Project.mp4 |
28.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/007 The-Cookie-Clicker-Game.url |
65 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/008 Challenge Create an Automated Game Playing Bot.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/008 Solution-cookie-clicker-end.zip |
1021 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/external-links.txt |
960 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/001 Day 49 Goals what you will make by the end of the day.mp4 |
10.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/001 LinkedIn-Jobs.url |
79 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/002 Step 1 - Setup Your LinkedIn Account.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/003 Step 2 - Automatically Login.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/004 Step 3 - Apply for a Job.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/005 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/005 Solution-LinkedIn-Job-Application-Automation.zip |
43.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/005 Step 4 - Apply for all the jobs.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/external-links.txt |
151 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 Day 50 Goals what you will make by the end of the day.mp4 |
16 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 Machine-Learning-Generated-Profile-Pictures.url |
63 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 NY-Times-Tinder-Article.url |
128 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 Tinder.url |
43 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/002 Step 1 - Setup your account on Tinder.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/003 Step 2 - Navigate to Login Page.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/004 Step 3 - Login with Facebook.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/005 Step 4 - Dismiss all requests.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/006 Solution-auto-tinder-swiper-end.zip |
831 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/006 Step 5 - Hit Like!.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/external-links.txt |
337 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Comcast-Twitter-Bot.url |
145 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Day 51 Goals what you will make by the end of the day.mp4 |
35.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Huffington-Post-Comcast-Call-from-Hell.url |
105 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Internet-Speed-Checker.url |
50 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Time-Does-Tweeting-at-Companies-Really-Work-.url |
76 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/002 Step 1 - Setup Your Twitter Account.html |
811 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/003 Step 2 - Create a Class.html |
923 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/004 Step 3 - Get Internet Speeds.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/005 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/005 Solution-internet-speed-twitter-bot-end.zip |
944 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/005 Step 4 - Building a Twitter Bot to Tweet at your Internet Provider.html |
930 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/external-links.txt |
516 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/001 Day 52 Goals what you will make by the end of the day.mp4 |
21.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/001 Follow-your-competitors-followers-to-grow-your-instagram-account.url |
196 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/001 Instagram.url |
50 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/002 Step 1 - Get Your Instagram Credentials.html |
565 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/003 Step 2 - Create a Class.html |
619 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/004 Step 3 - Login to Instagram.html |
466 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/005 Step 4 - Find the followers of the target account.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/006 Solution-instagram-follower-end.zip |
860 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/006 Step 5 - Follow all the followers.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/external-links.txt |
364 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Automated-Job-Story.url |
144 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Automating-Your-Job-Reddit.url |
114 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Data-Entry-Jobs-on-Indeed.url |
75 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Day 53 Goals what you will make by the end of the day.mp4 |
59.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Google-Forms.url |
53 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Zillow-Property-search.url |
890 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/002 Capstone Project Program Requirements.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/003 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/003 HINTS & SOLUTION.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/003 Solution-Zillow-Rental-Research.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/external-links.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/001 Understanding Backend Web Development with Python.mp4 |
26.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/002 Create your First Web Server with Flask.mp4 |
61.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/002 Flask-Package-on-PyPi.url |
55 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/002 Flask-Quick-Start-Documentation.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/003 Mac-Linux-Terminal-Cheat-Sheet.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/003 Understand the Command Line on Windows and Mac.mp4 |
125.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/003 Windows-Command-Prompt-Cheat-Sheet.url |
117 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/004 __name__ and __main__ Special Attributes built into Python.mp4 |
18.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/004 Python-Built-In-Attributes-e.g.name-.url |
109 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/004 What-is-main-.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/005 Python Functions as First Class Objects Passing & Nesting Functions.mp4 |
31 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/005 Python-Decorators-Repl.it-Code.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/005 Visualising-Nested-Function-Return-on-PythonTutor.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/006 Completed-Code-for-day-54-end.zip |
270 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/006 Interactive-Coding-Exercise-Day-54.1-Decorators.url |
77 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/006 Understanding Python Decorator Functions and the @ Syntax.mp4 |
39.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/007 [Interactive Coding Exercise] Create Your Own Python Decorator.html |
309 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/external-links.txt |
977 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/001 Day 55 Goals what you will make by the end of the day.mp4 |
6.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/002 Flask-Docs-Routing.url |
86 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/002 Flask-Docs-Variable-Rules.url |
93 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/002 Working Flask URL Paths and the Flask Debugger.mp4 |
86.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/003 giphy.com.url |
42 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/003 Rendering HTML Elements with Flask.mp4 |
49.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/004 Challenge Use Python Decorators to Style HTML Tags.mp4 |
14.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/004 SOLUTION.url |
92 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/005 Advanced Decorators with args and kwargs.mp4 |
35.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/005 Advanced-Python-Decorators-Repl.it-Code.url |
86 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/005 Solution-Completed-Code-for-day-55-end.zip |
707 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/006 [Interactive Coding Exercise] Advanced Decorators.html |
311 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/007 Final Project - Higher or Lower URLs.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/external-links.txt |
501 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/001 Day 56 Goals what you will make by the end of the day.mp4 |
4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/002 Flask-Docs-Rendering-Templates.url |
98 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/002 My-CV-Website-Hosted-on-GitHub.url |
57 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/002 Rendering HTML Files with Flask.mp4 |
50.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/003 Serving Static Files using Flask.mp4 |
48.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/004 How to Use Website Templates to Speed Up Web Development.mp4 |
134.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/004 HTML5-UP-Website-Templates.url |
44 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/004 personal-site-html-and-css-files.zip |
125 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/005 Check-out-html5up.nets-live-demo-sites.url |
44 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/005 Final Project - Name Card Website Template.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/005 html5up-identity.zip |
644 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/006 Solution and Walkthrough for the Name Card Final Project.mp4 |
76.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/006 unsplash.com-beautiful-images.url |
45 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/external-links.txt |
444 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/001 Day 57 Goals what you will make by the end of the day.mp4 |
3.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 day-57-start.zip |
263 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Jinja-Documentation.url |
78 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Rendering-Templates-in-Flask.url |
98 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Update-Your-Footer.url |
52 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Using Jinja to Produce Dynamic HTML Pages.mp4 |
77.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/003 Agify-API.url |
41 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/003 Challenge Combining Jinja Templating with APIs.mp4 |
59.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/003 Genderize-API.url |
45 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 blog-data.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 Create-your-own-bin-with-npoint.io.url |
46 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 Flask-Docs-Routing.url |
86 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 Multiline Statements with Jinja.mp4 |
51.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 npoint-example-blog-data.url |
71 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/005 day-57-end.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/005 URL Building with Flask.mp4 |
27.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 Blog Capstone Project Part 1 - Templating.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 blog-templating-start.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 Solution-blog-templating-end.zip |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/external-links.txt |
641 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/001 Day 58 Goals What You'll Learn By the End of Today.html |
812 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/002 11.0-Bootstrap-Intro.zip |
1.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/002 What is Bootstrap.mp4 |
123.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/003 Bootstrap Layout.mp4 |
65.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/004 11.2-Bootstrap-Components.zip |
1.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/004 Bootstrap Components.mp4 |
339.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/005 11.3-TinDog-Project.zip |
1.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/005 Day 58 Project - A Startup Website for TinDog.mp4 |
377.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/001 Day 59 Goals What you'll make by the end of today.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/002 Step 1 - Download the starting project.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/003 Step 2 - Get the home page to work.html |
511 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/004 Step 3 - Fix the header and footer.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/005 Step 4 - Using Jinja Include fo Render Templates.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/006 Step 5 - Make the About and Contact Pages Work.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/007 blog-data.txt |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/007 Step 6 - Fetch and render the blog posts from an API.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/008 Solution-Completed-Code-day-59-end-updated.zip |
5.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/008 Step 7 - Rendering Individual Posts.html |
936 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/001 Day 60 goals - Make the Contact Form Work.html |
975 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/002 HTML Forms Revision - Creating a Form from Scratch.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/003 Handle POST Requests with Flask Servers.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/004 POST Requests in Flask Solution.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/005 Getting the Contact Form to Work.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/006 Sending Email with smtplib.html |
684 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/006 Solution-Completed-Code-day-60-end.zip |
8.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/001 Day 61 Goals Building Advanced Forms.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/002 Installing Flask-WTF.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/002 Starting-Files-flask-secrets.zip |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/003 Creating Forms with Flask-WTF.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/004 Code Improvements for Our WTForms.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/005 Adding Validation to Forms with Flask-WTF.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/006 Receiving Form Data with WTForms.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/007 Inheriting Templates Using Jinja2.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/008 Using Flask-Bootstrap as an Inherited Template.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/009 Flask-Bootstrap Supports WTForms.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/009 Solution-Completed-Code-day-61-end.zip.zip |
13 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/001 Download the Starting Project.html |
478 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/001 Starting-Files-coffee-and-wifi.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/002 Look at the Desired Final Product.html |
125 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/003 Check Off Each Requirement.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/003 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/001 Day 63 Goals Creating a Virtual Bookshelf.html |
712 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/002 Download the Starting Project.html |
286 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/002 Starting-Files-library-start.zip |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/003 Make the Website Work.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/004 What Happens When You Refresh the Server.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/005 SQLite Databases.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/006 SQLAlchemy.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/007 CRUD Operations with SQLAlchemy.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/008 Build a SQLite Database into the Flask Website.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/001 Day 64 Goals What We'll Build.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/002 Download the Starting Project.html |
303 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/002 Starting-Files-movie-project-start.zip |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/003 Requirement 1 - Be Able to View Movie List Items.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/004 Requirement 2 - Be Able to Edit a Movie's Rating and Review.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/005 Requirement 3 - Be Able to Delete Movies from the Database.html |
437 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/006 Requirement 4 - Be Able to Add New Movies Via the Add Page.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/007 Requirement 5 - Be Able to Sort and Rank the Movies By Rating.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/001 Day 64 Goals What We'll Build.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/002 Download the Starting Project.html |
303 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/002 Starting-Files-movie-project-start.zip |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/003 Requirement 1 - Be Able to View Movie List Items.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/004 Requirement 2 - Be Able to Edit a Movie's Rating and Review.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/005 Requirement 3 - Be Able to Delete Movies from the Database.html |
437 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/006 Requirement 4 - Be Able to Add New Movies Via the Add Page.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/007 Requirement 5 - Be Able to Sort and Rank the Movies By Rating.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/001 Introduction to Web Design.mp4 |
34.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/001 Penny-Juice-Rebranded.url |
84 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/001 Penny-Juices-Website.url |
51 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/002 Adobe-Color-Wheel.url |
66 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/002 Color-Hunt.url |
45 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/002 Understanding Color Theory.mp4 |
138.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/003 Understanding Typography and How to Choose Fonts.mp4 |
147.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/004 Manage ATTENTION with effective User Interface (UI) Design.mp4 |
69.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/005 User Experience (UX) Design.mp4 |
156.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Build-a-design-using-canva.com.url |
46 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Design-Challenges-on-Daily-UI.url |
47 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Page-inspirations-on-Collect-UI.url |
46 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Web Design in Practice - Let's apply what we've learnt!.mp4 |
299.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/external-links.txt |
518 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/001 Day 66 Goals Build Your Own REST API Service.html |
971 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/002 What is REST.mp4 |
44.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/003 Download the Starting Project.html |
674 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/003 Starting-Files-cafe-api-start.zip |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/004 HTTP GET - a Random Cafe.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/005 HTTP GET - All the Cafes.html |
818 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/006 HTTP GET - Find a Cafe.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/007 Postman - The all in one API Testing Tool.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/008 HTTP POST - A New Cafe.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/009 HTTP PUT vs. PATCH.mp4 |
4.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/010 HTTP PATCH - A Cafe's Coffee Price.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/011 HTTP DELETE - A Cafe that's Closed.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/012 Build Documentation for Your API.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/012 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/001 Day 67 Goals Building a RESTful Blog with Editing!.html |
408 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/002 Download the Starting Project.html |
739 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/002 Starting-Files-RESTful-blog-start.zip |
6.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/003 Requirement 1 - Be Able to GET Blog Post Items.html |
956 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/004 Requirement 2 - Be Able to POST a New Blog Post.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/005 Requirement 3 - Be Able to Edit Existing Blog Posts.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/006 Requirement 4- Be Able DELETE Blog Posts.html |
790 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/001 Day 68 Goals - Login and Registering Users with Authentication.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/002 What is Authentication.mp4 |
6.8 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/003 Download the Starting Project.html |
832 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/003 Starting-Files-flask-auth-start.zip |
57 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/004 Register New Users.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/005 Downloading Files.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 Cryptii-Online-Encryption.url |
44 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 Encryption and Hashing.mp4 |
70.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 How-the-Enigma-Machine-Works.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 The-Flaw-in-the-Enigma-Machine.url |
90 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 -have-i-been-pwned-.url |
60 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 How to Hack Passwords 101.mp4 |
72.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 Most-Common-Passwords.url |
87 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 Password-Complexity-Checker.url |
72 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 Plain-Text-Offenders.url |
55 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/008 Salting Passwords.mp4 |
13.6 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/009 Hashing Passwords using Werkzeug.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/010 Authenticating Users with Flask-Login.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/011 Flask Flash Messages.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/012 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/012 Passing Authentication Status to Templates.html |
1013 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/external-links.txt |
643 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/001 Day 69 Goals - Adding Users to Our Blog Project.html |
537 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/002 Download the Starting Project.html |
836 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/002 Starting-Files-blog-with-users-start.zip |
6.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/003 Requirement 1 - Register New Users.html |
943 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/004 Requirement 2 - Login Registered Users.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/005 Requirement 3 - Protect Routes.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/006 Creating Relational Databases.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/007 Requirement 4 - Allow Any User to Add Comments to BlogPosts.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/001 Day 70 Goals - Learn to Deploy Your Website.mp4 |
3.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/002 Version Control and Git.mp4 |
171.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/003 What is GitHub.mp4 |
42.5 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/004 Step 1 - Upload Your Project to GitHub.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/005 Step 2 - Use gunicorn and Heroku to host your website.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/006 Step 3 - Setup a WSGI server with gunicorn.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/007 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/007 Step 4 - Upgrade SQLite Database to PostgreSQL.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/001 Day 71 Goals what you will make by the end of the day.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/002 Getting Set Up for Data Science.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/003 salaries-by-college-major.csv |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/003 Upload the Data and Read the .csv File.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/004 Preliminary Data Exploration and Data Cleaning with Pandas.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/005 Accessing Columns and Individual Cells in a Dataframe.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/006 Solution Highest and Lowest Earning Degrees.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/007 Sorting Values & Adding Columns Majors with the Most Potential vs Lowest Risk.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/008 Solution Degrees with the Highest Potential.html |
1004 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/009 Grouping and Pivoting Data with Pandas.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/010 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/010 Data-Exploration-Pandas-College-Major-complete.zip |
9 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/010 Learning Points & Summary.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/001 Day 72 Goals what you will make by the end of the day.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/002 Download and Open the Starter Notebook.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/002 Programming-Languages-start.ipynb.zip |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/002 QueryResults.csv |
72 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/003 Solution Preliminary Data Exploration.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/004 Solution Analysis by Programming Language.html |
851 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/005 Data Cleaning Working with Time Stamps.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/006 Data Manipulation Pivoting DataFrames.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/007 Data Visualisation with Matplotlib.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/008 Multi-Line Charts with Matplotib.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/009 Smoothing out Time-Series Data.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/010 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/010 Learning Points & Summary.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/010 Programming-Languages-complete.ipynb.zip |
568 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/001 Day 73 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/001 LEGO-Notebook-and-Data-start.zip |
2.9 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/002 Use HTML Markdown to Make Your Notebook Look Pretty.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/003 Solution Exploring the LEGO Brick Colours.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/004 Find the Oldest and Largest LEGO Sets.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/005 Visualise the Number of Sets Published over Time.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/006 How to use the Pandas .agg() function.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/007 Superimposing Line Charts with Separate Axes.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/008 Scatter Plots Average Number of Parts per LEGO Set.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/009 Relational Database Schemas Primary and Foreign Keys.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/010 How to Merge DataFrames and Create Bar Charts.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/011 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/011 Learning Points & Summary.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/011 LEGO-Notebook-and-Data-completed.zip |
3.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/001 Day 74 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/001 Google-Trends-Data-Viz-start.zip |
41 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/002 Data Exploration - Making Sense of Google Search Data.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/003 Data Cleaning - Resampling Time Series Data.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/004 Data Visualisation - Tesla Line Charts in Matplotlib.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/005 Using Locators and DateFormatters to generate Tick Marks on a Time Line.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/006 Data Visualisation - Bitcoin Line Style and Markers.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/007 Data Visualisation - Unemployment How to use Grids.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/008 Data Visualisation - Unemployment The Effect of New Data.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/009 Google-Trends-Data-Viz-complete.zip |
766 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/009 Learning Points & Summary.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/001 Day 75 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/001 Google-Play-Store-Project-Start.zip |
285 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/002 Data Cleaning Removing NaN Values and Duplicates.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/003 Preliminary Exploration The Highest Ratings, Most Reviews, and Largest Size.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/004 Data Visualisation with Plotly Create Pie and Donut Charts.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/005 Numeric Type Conversions for the Installations & Price Data.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/006 Plotly Bar Charts & Scatter Plots The Most Competitive & Popular App Categories.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/007 Extracting Nested Column Data using .stack().html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/008 Grouped Bar Charts and Box Plots with Plotly.html |
9 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/009 Google-Play-Store-Analysis-Complete.zip |
314 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/009 Learning Points & Summary.html |
839 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/001 Computation-with-NumPy-start.zip |
118 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/001 Day 76 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/002 NumPy's ndarray - Incredible Power at Your Fingertips!.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/003 Generating and Manipulating ndarrays.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/004 Broadcasting, Scalars and Matrix Multiplication.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/005 Manipulating Images as ndarrays.html |
8 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/006 Computation-with-NumPy-complete.zip |
1.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/006 Learning Points & Summary.html |
796 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/001 Day 77 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/001 Seaborn-Linear-Regression-start.zip |
148 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/002 Explore and Clean the Data.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/003 Investigate the Films that had Zero Revenue.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/004 Filter on Multiple Conditions International Films.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/005 Seaborn Data Visualisation Bubble Charts.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/006 Floor Division A Trick to Convert Years to Decades.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/007 Plotting Linear Regressions with Seaborn.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/008 Use scikit-learn to Run Your Own Regression.html |
8 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/009 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/009 Learning Points & Summary.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/009 Seaborn-Linear-Regression-complete.zip |
1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/001 Day 78 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/001 Nobel-Prize-Analysis-Start.zip |
69 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/002 Update Packages in Google Colab & Explore and Clean the Dataset.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/003 plotly Bar & Donut Charts Analyse Prize Categories & Women Winning Prizes.html |
9 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/004 Using Matplotlib to Visualise Trends over Time.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/005 A Choropleth Map and the Countries with the Most Prizes.html |
12 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/006 Create Sunburst Charts for a Detailed Regional Breakdown of Research Locations.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/007 Unearthing Patterns in the Laureate Age at the Time of the Award.html |
10 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/008 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/008 Learning Points & Summary.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/008 Nobel-Prize-Analysis-Complete.zip |
1.2 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/001 Day 79 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/001 Dr-Semmelweis-Analysis-start.zip |
8 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/002 Preliminary Data Exploration and Visualising Births & Deaths at Vienna Hospital.html |
7 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/003 Analysing the Yearly Data Split By Clinic.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/004 The Effect of Handwashing.html |
6 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/005 Visualising Distributions and Testing for Statistical Significance.html |
10 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/006 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/006 Dr-Semmelweis-Analysis-complete.zip |
1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/006 Learning Points & Summary.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/001 Day 80 Goals what you will make by the end of the day.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/001 Multivariable-Regression-Start.zip |
52 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/002 Course-Fixes-Report-an-Issue.url |
59 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/002 Multivariable-Regression-Complete.zip |
1.7 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/002 Solution & Learning Points.html |
1 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/external-links.txt |
73 B |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/81 - Day 81 - Professional Portfolio Project - [Python Scripting]/001 [assignment_info] Text to Morse Code Converter.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/81 - Day 81 - Professional Portfolio Project - [Python Scripting]/001 The Road to Becoming a Professional Developer.html |
2 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/82 - Day 82 - Professional Portfolio Project - [Python Web Development]/001 [assignment_info] Portfolio Website.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/82 - Day 82 - Professional Portfolio Project - [Python Web Development]/001 Where are the Videos and the Solution Code.mp4 |
47.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/83 - Day 83 - Professional Portfolio Project - [Python Scripting]/001 [assignment_info] Tic Tac Toe.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/84 - Day 84 - Professional Portfolio Project - [GUI]/001 [assignment_info] Image Watermarking Desktop App.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/85 - Day 85 - Professional Portfolio Project - [GUI]/001 [assignment_info] Typing Speed Test.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/86 - Day 86 - Professional Portfolio Project - [Game]/001 [assignment_info] Breakout Game.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/87 - Day 87 - Professional Portfolio Project - [Web Development]/001 [assignment_file] Cafe and Wifi Website.db |
56 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/87 - Day 87 - Professional Portfolio Project - [Web Development]/001 [assignment_info] Cafe and Wifi Website.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/88 - Day 88 - Professional Portfolio Project - [Web Development]/001 [assignment_info] Todo List.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/89 - Day 89 - Professional Portfolio Project - [GUI Desktop App]/001 [assignment_info] Disappearing Text Writing App.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/90 - Day 90 - Professional Portfolio Project - [HTTP Requests & APIs]/001 [assignment_info] Convert PDF to Audiobook.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/91 - Day 91 - Professional Portfolio Project - [Image Processing & Data Science]/001 [assignment_info] Image Colour Palette Generator.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/92 - Day 92 - Professional Portfolio Project - [Web Scraping]/001 [assignment_info] Custom Web Scraper.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/93 - Day 93 - Professional Portfolio Project - [GUI Automation]/001 [assignment_info] Automate the Google Dinosaur Game.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/94 - Day 94 - Professional Portfolio Project - [Game]/001 [assignment_info] Space Invaders.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/95 - Day 95 - Professional Portfolio Project - [HTTP Requests & APIs]/001 [assignment_info] Custom API Based Website.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/96 - Day 96 - Professional Portfolio Project - [Web Development]/001 [assignment_info] An Online Shop.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/97 - Day 97 - Professional Portfolio Project - [Python Automation]/001 [assignment_info] Custom Automation.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/98 - Day 98 - Professional Portfolio Project - [Data Science]/001 [assignment_file] Analyse and Visualise the Space Race.zip |
107 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/98 - Day 98 - Professional Portfolio Project - [Data Science]/001 [assignment_info] Analyse and Visualise the Space Race.html |
4 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/99 - Day 99 - Professional Portfolio Project - [Data Science]/001 [assignment_file] Analyse Deaths involving Police in the United States.zip |
1.1 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/99 - Day 99 - Professional Portfolio Project - [Data Science]/001 [assignment_info] Analyse Deaths involving Police in the United States.html |
3 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/100 - Day 100 - Professional Portfolio Project - [Data Science]/001 [assignment_file] Predict Earnings using Multivariable Regression.zip |
187 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/100 - Day 100 - Professional Portfolio Project - [Data Science]/001 [assignment_info] Predict Earnings using Multivariable Regression.html |
5 KB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 |
680.4 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/001 What you're going to get from this course.mp4 |
63.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/001 What you're going to get from this course.mp4_original |
63.3 MB |
DIY Cybersecurity Degree/100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/003 Bonus Lecture Check out my other courses.html |
3 KB |
DIY Cybersecurity Degree/Books/Cloud/9781801075930-AWS_CERTIFIED_CLOUD_PRACTITIONER_EXAM_GUIDE.pdf |
13.3 MB |
DIY Cybersecurity Degree/Books/Cloud/bb-.isc.2.ccsp.certified.cloud.security.professional.official.study.guide.epub |
4.6 MB |
DIY Cybersecurity Degree/Books/Cloud/Cheshire J. Exam Ref AZ-900 Microsoft Azure Fundamentals 3ed 2023.pdf |
41.6 MB |
DIY Cybersecurity Degree/Books/Cloud/Lab Guide, IPSpecialist. Hands-On Labs. CLF-C01. AWS Certified Cloud...2ed 2023.pdf |
84.8 MB |
DIY Cybersecurity Degree/Books/CompTIA/A+/bb-comptia.a.certification.study.guide.eleventh.edition.exams.220.1101.and.220.1102..epub |
28.4 MB |
DIY Cybersecurity Degree/Books/CompTIA/A+/Docter Q. CompTIA A+ Complete Study Guide...5ed 2022.pdf |
92.3 MB |
DIY Cybersecurity Degree/Books/CompTIA/CySA+/bb-comptia.cysa.practice.tests.ex.epub |
48.1 MB |
DIY Cybersecurity Degree/Books/CompTIA/CySA+/Chapple M. CompTIA CySA+ Study Guide Exam CS0-002 2ed 2020.pdf |
21.3 MB |
DIY Cybersecurity Degree/Books/CompTIA/CySA+/lc-mcgraw-hill.comptia.cysaplus.cybersecurity.analyst.certification.bundle.exam.cs0-002.2021.epub |
30 MB |
DIY Cybersecurity Degree/Books/CompTIA/Data+/Dodd С. CompTIA Data+. DAO-001 Certification Guide 2022.pdf |
23.5 MB |
DIY Cybersecurity Degree/Books/CompTIA/IT Fundamentals+/CompTIA IT Fundamentals Study Guide Exam FC0-U51 (1).pdf |
233.6 MB |
DIY Cybersecurity Degree/Books/CompTIA/Linux+/Blum R. CompTIA Linux+ Study Guide. Exam XK0-005 5ed 2022.pdf |
32.4 MB |
DIY Cybersecurity Degree/Books/CompTIA/Linux+/Jordan T. CompTIA Linux+ Certification All-in-One Exam Guide...XK0-005 2ed 2023.pdf |
122.8 MB |
DIY Cybersecurity Degree/Books/CompTIA/Linux+/Rothwell W. CompTIA Linux+ XK0-005 Exam Cram 2023.pdf |
33.2 MB |
DIY Cybersecurity Degree/Books/CompTIA/Network+/CompTIA Network+ Practice Tests - Exam N10-008, 2nd Edition.epub |
7.1 MB |
DIY Cybersecurity Degree/Books/CompTIA/Network+/CompTIA Network+ Practice Tests - Exam N10-008, 2nd Edition.pdf |
9 MB |
DIY Cybersecurity Degree/Books/CompTIA/Network+/CompTIANetworkCertificationAll-in-OneExamGuideEighthEditionExamN10-008.pdf |
239.1 MB |
DIY Cybersecurity Degree/Books/CompTIA/Pentest+/Chapple M. CompTIA PenTest+ Study Guide Exam PT0-002 2ed 2022.pdf |
23.5 MB |
DIY Cybersecurity Degree/Books/CompTIA/Pentest+/Clarke G. CompTIA PenTest+ Certification For Dummies 2022.pdf |
26.7 MB |
DIY Cybersecurity Degree/Books/CompTIA/Pentest+/lc-mcgraw.hill.comptia.pentestplus.certification.all-in-one.exam.guide.exam.pt0-002.2022.epub |
21.8 MB |
DIY Cybersecurity Degree/Books/CompTIA/Pentest+/lc-wiley.comptia.pentestplus.certification.for.dummies.2020.epub |
15.5 MB |
DIY Cybersecurity Degree/Books/CompTIA/Pentest+/lc-wiley.comptia.pentestplus.certification.for.dummies.2022.epub |
14.6 MB |
DIY Cybersecurity Degree/Books/CompTIA/Pentest+/lc-wiley.comptia.pentestplus.study.guide.exam.pt0-002.2022.epub |
39.7 MB |
DIY Cybersecurity Degree/Books/CompTIA/Security+/Clarke G.CompTIA Security+ Certification Bundle.SY0-601 4ed 2022.pdf |
64.6 MB |
DIY Cybersecurity Degree/Books/CompTIA/Security+/CompTIA Security+ All-in-One Exam Guide, Sixth Edition (1).pdf |
13.6 MB |
DIY Cybersecurity Degree/Books/CompTIA/Security+/lc-wiley.comptia.securityplus.study.guide.exam.sy0-601.2021.epub |
46.9 MB |
DIY Cybersecurity Degree/Books/CompTIA/Security+/Marty M. Weiss - Pearson - CompTIA Security+ SY0-601 Exam Cram 6th Edition.epub |
12.8 MB |
DIY Cybersecurity Degree/Books/CompTIA/Security+/Stewart J. CompTIA Security+ Review Guide. Exam SY0-601 5ed 2021.pdf |
14 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Introduction/001. AWS Certified Cloud Practitioner (CLF-C01) Introduction.mp4 |
20.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/001. Module introduction.mp4 |
3.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/001. Learning objectives.mp4 |
3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/002. 1.1 Introduction.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/003. 1.2 Target Candidate Description.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/004. 1.3 Exam Content.mp4 |
10.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/005. 1.4 Exam Question Domains.mp4 |
20.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/001. Learning objectives.mp4 |
3.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/002. 2.1 Testing Center Registration.mp4 |
10.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/003. 2.2 Testing Center Strategies.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/004. 2.3 Online Proctoring Registration.mp4 |
6.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/005. 2.4 Online Proctoring Strategies.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/006. 2.5 Exam Question Format.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/007. 2.6 Exam Answer Strategies.mp4 |
14.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/001. Module introduction.mp4 |
4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/001. Learning objectives.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/002. 3.1 AWS Cloud Definition.mp4 |
13 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/003. 3.2 Cloud Value Proposition Part 1.mp4 |
14.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/004. 3.3 Cloud Value Proposition Part 2.mp4 |
15 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/005. 3.4 Question Breakdown 1.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/006. 3.5 Cloud Business Value.mp4 |
17.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/007. 3.6 Question Breakdown 2.mp4 |
15.6 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/001. Learning objectives.mp4 |
3.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/002. 4.1 Total Cost of Ownership.mp4 |
20 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/003. 4.2 CapEx vs OpEx.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/004. 4.3 Question Breakdown 1.mp4 |
10.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/005. 4.4 On-premises (KTLO) Operations.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/006. 4.5 Cloud Cost Benefits Part 1.mp4 |
14 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/007. 4.6 Cloud Cost Benefits Part 2.mp4 |
20.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/008. 4.7 Question Breakdown 2.mp4 |
15.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/001. Learning objectives.mp4 |
3.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/002. 5.1 Simple Design Principles.mp4 |
17.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/003. 5.2 Well-Architected Framework Basics.mp4 |
11.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/004. 5.3 Well-Architected Framework Pillars Part 1.mp4 |
27.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/005. 5.4 Well-Architected Framework Pillars Part 2.mp4 |
24.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/006. 5.5 Question Breakdown 1.mp4 |
13.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/001. Module introduction.mp4 |
5.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/001. Learning objectives.mp4 |
3.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/002. 6.1 Shared Responsibility Model Purpose.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/003. 6.2 Customer Responsibility.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/004. 6.3 AWS Responsibility.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/005. 6.4 Question Breakdown 1.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/001. Learning objectives.mp4 |
3.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/002. 7.1 Compliance Information.mp4 |
15.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/003. 7.2 Compliance Strategies.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/004. 7.3 Question Breakdown 1.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/005. 7.4 Auditing and Reporting.mp4 |
14.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/006. 7.5 Least Privilege Concepts and Strategies.mp4 |
15.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/007. 7.6 Question Breakdown 2.mp4 |
11.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/001. Learning objectives.mp4 |
4.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/002. 8.1 User and Identity Management Basics.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/003. 8.2 AWS Credentials and MFA.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/004. 8.3 AWS Root Account.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/005. 8.4 AWS IAM Users and Groups.mp4 |
26.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/006. 8.5 AWS IAM Roles and Policies.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/007. 8.6 Question Breakdown 1.mp4 |
12 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/001. Learning objectives.mp4 |
5.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/002. 9.1 AWS Network Security Capabilities.mp4 |
17.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/003. 9.2 Security Documentation Types.mp4 |
11.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/004. 9.3 AWS Trusted Advisor.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/005. 9.4 Question Breakdown 1.mp4 |
12.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/001. Module introduction.mp4 |
4.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/001. Learning objectives.mp4 |
4.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/002. 10.1 AWS Interaction Options.mp4 |
19.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/003. 10.2 Question Breakdown 1.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/004. 10.3 Cloud Deployment Models.mp4 |
12.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/005. 10.4 AWS Network Connectivity Options.mp4 |
10.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/006. 10.5 Question Breakdown 2.mp4 |
16 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/001. Learning objectives.mp4 |
3.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/002. 11.1 Data Centers.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/003. 11.2 Availability Zones.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/004. 11.3 Regions.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/005. 11.4 Edge Locations.mp4 |
18.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/006. 11.5 Question Breakdown 1.mp4 |
10.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/001. Module introduction.mp4 |
4.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/001. Learning objectives.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/002. 12.1 Core Service Categories.mp4 |
6.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/003. 12.2 Compute Service Summary.mp4 |
10 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/004. 12.3 Elastic Compute Cloud (EC2).mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/005. 12.4 EC2 Auto Scaling.mp4 |
19.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/006. 12.5 Elastic Load Balancing (ELB).mp4 |
20.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/007. 12.6 Question Breakdown 1.mp4 |
12.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/008. 12.7 Storage Service Summary.mp4 |
8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/009. 12.8 Simple Storage Service (S3) and Glacier.mp4 |
20.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/010. 12.9 Elastic Block Store (EBS).mp4 |
10.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/011. 12.10 AWS Snowball and Storage Gateway.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/012. 12.11 Elastic File System (EFS).mp4 |
11.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/013. 12.12 Question Breakdown 2.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/001. Learning objectives.mp4 |
7.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/002. 13.1 Network Service Summary.mp4 |
8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/003. 13.2 Virtual Private Cloud (VPC).mp4 |
34.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/004. 13.3 VPC Security Groups.mp4 |
12.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/005. 13.4 Route 53.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/006. 13.5 VPN and AWS Direct Connect.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/007. 13.6 Question Breakdown 1.mp4 |
14.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/008. 13.7 Database Service Summary.mp4 |
12.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/009. 13.8 Relational Database Service (RDS).mp4 |
18 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/010. 13.9 DynamoDB.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/011. 13.10 Redshift.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/012. 13.11 Question Breakdown 2.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/001. Learning objectives.mp4 |
4.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/002. 14.1 Technology Support Documentation.mp4 |
12.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/003. 14.2 AWS Support and Partner Network.mp4 |
13.6 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/004. 14.3 AWS Trusted Advisor.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/005. 14.4 Question Breakdown 1.mp4 |
15.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/001. Module introduction.mp4 |
4.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/001. Learning objectives.mp4 |
3.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/002. 15.1 Pricing Model Summary.mp4 |
28.7 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/003. 15.2 On-Demand Scenario.mp4 |
9.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/004. 15.3 Reserved-Instance Scenario.mp4 |
18.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/005. 15.4 Spot Instance Scenario.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/006. 15.5 Question Breakdown 1.mp4 |
13.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/001. Learning objectives.mp4 |
3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/002. 16.1 AWS Organizations.mp4 |
18.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/003. 16.2 AWS Organizations Benefits.mp4 |
20.4 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/004. 16.3 Multiple Account Cost Allocation.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/005. 16.4 Question Breakdown 1.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/001. Learning objectives.mp4 |
4.2 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/002. 17.1 Cost Explorer.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/003. 17.2 Cost and Usage Report.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/004. 17.3 AWS Pricing Calculator and Pricing API.mp4 |
15.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/005. 17.4 Free Tier and Free Tier Usage Dashboard.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/006. 17.5 Budgets.mp4 |
16.8 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/007. 17.6 Cost Allocation Tags.mp4 |
10.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/008. 17.7 Cost Optimization Fundamental Principles.mp4 |
22.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/009. 17.8 Question Breakdown 1.mp4 |
20.6 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/001. Module introduction.mp4 |
3.9 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/001. Learning objectives.mp4 |
4.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/002. 18.1 Documentation.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/003. 18.2 Hands-on Learning.mp4 |
16.3 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/004. 18.3 Sample Questions.mp4 |
16.1 MB |
DIY Cybersecurity Degree/Cloud/AWS Certified Cloud Practitioner CLF-C01/Summary/001. AWS Certified Cloud Practitioner (CLF-C01) Summary.mp4 |
6.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Introduction/001. Certified Cloud Security Professional (CCSP) Introduction.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/001. Module introduction.mp4 |
1.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/001. Learning objectives.mp4 |
3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/002. 1.1 Key Cloud Computing Definitions.mp4 |
40 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/003. 1.2 Roles and Responsibilities in Cloud Computing.mp4 |
19.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/004. 1.3 Core Cloud Computing Characteristics.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/005. 1.4 Cloud Building Block Technologies.mp4 |
77.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/006. 1.5 Cloud Computing Activities and Capabilities.mp4 |
107.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/007. 1.6 Categories of Cloud Services.mp4 |
32.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/008. 1.7 Cloud Deployment Models.mp4 |
35.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/009. 1.8 Shared Considerations for the Cloud.mp4 |
23.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/010. 1.9 Impact of Cloud and Related Technologies.mp4 |
48 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/001. Learning objectives.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/002. 2.1 Cryptography and Key Management.mp4 |
41.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/003. 2.2 Identity and Access Control.mp4 |
23.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/004. 2.3 Network and Virtualization Security.mp4 |
47.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/005. 2.4 Common Cloud Threats.mp4 |
20.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/006. 2.5 Cloud Security Hygiene.mp4 |
30.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/007. 2.6 Cloud Business Continuity and Disaster Recovery.mp4 |
19.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/008. 2.7 Functional Security Requirements in the Cloud.mp4 |
40.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/009. 2.8 Security Considerations for Cloud Service Types.mp4 |
31.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/010. 2.9 Cloud Design Patterns.mp4 |
30.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/011. 2.10 DevOps Security.mp4 |
12.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/001. Module introduction.mp4 |
1.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/001. Learning objectives.mp4 |
2.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/002. 3.1 Phase 1 Create.mp4 |
14.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/003. 3.2 Phase 2 Store.mp4 |
8.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/004. 3.3 Phase 3 Use.mp4 |
9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/005. 3.4 Phase 4 Share.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/006. 3.5 Phase 5 Archive.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/007. 3.6 Phase 6 Destroy.mp4 |
5.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/008. 3.7 Cloud Data Flows.mp4 |
53.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/001. Learning objectives.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/002. 4.1 Concepts of Cloud Data Security.mp4 |
23 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/003. 4.2 Data Obfuscation.mp4 |
15.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/004. 4.3 Information Rights Management.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/005. 4.4 Keys, Secrets, and Certificate Management.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/006. 4.5 Data Discovery.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/007. 4.6 Data Classification and Policy.mp4 |
20.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/008. 4.7 Auditability, Traceability, and Accountability.mp4 |
18.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/001. Module introduction.mp4 |
1.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/001. Learning objectives.mp4 |
2.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/002. 5.1 Physical Cloud Environments.mp4 |
23.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/003. 5.2 Network Cloud Environments.mp4 |
51.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/004. 5.3 Cloud Communications.mp4 |
13.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/005. 5.4 Core Cloud Compute Resources.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/006. 5.5 Cloud Virtualization Resources.mp4 |
15.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/007. 5.6 Core Cloud Storage Components.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/008. 5.7 Management Plane Cloud Solutions.mp4 |
63.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/001. Learning objectives.mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/002. 6.1 Secure Data Center Logical Design.mp4 |
31.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/003. 6.2 Physical Data Center Design.mp4 |
95.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/004. 6.3 Data Center Environmental Design.mp4 |
33.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/005. 6.4 Design Resilient Environments.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/006. 6.5 Cloud Infrastructure Risk Assessment.mp4 |
52.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/007. 6.6 Cloud Vulnerabilities, Threats, and Attacks.mp4 |
14.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/008. 6.7 Cloud Infrastructure Risk Mitigation Strategies.mp4 |
61.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/001. Learning objectives.mp4 |
2.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/002. 7.1 Business Continuity Planning.mp4 |
24.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/003. 7.2 Business Impact Analysis.mp4 |
29.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/004. 7.3 Backup and Restore Policies.mp4 |
10.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/005. 7.4 Disaster Recovery Planning.mp4 |
23 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/006. 7.5 Disaster Recovery Plan Testing Strategies.mp4 |
50.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/001. Module introduction.mp4 |
1.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/001. Learning objectives.mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/002. 8.1 Cloud Application Architecture Elements.mp4 |
31.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/003. 8.2 Cloud Development.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/004. 8.3 SDLC Business Requirements and Phases.mp4 |
74.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/005. 8.4 Common Software Vulnerabilities.mp4 |
23.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/006. 8.5 Software Threat Modeling Methods.mp4 |
33.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/007. 8.6 Secure Coding Methodologies.mp4 |
21.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/008. 8.7 Software Configuration Management and Versioning.mp4 |
19.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/001. Learning objectives.mp4 |
2.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/002. 9.1 Functional vs. Non-functional Testing.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/003. 9.2 Security Testing Methodologies.mp4 |
18.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/004. 9.3 Abuse Case Testing.mp4 |
8.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/005. 9.4 OWASP API Security.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/006. 9.5 Supply Chain Management.mp4 |
66.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/007. 9.6 Third-party Software Management.mp4 |
20.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/001. Learning objectives.mp4 |
2.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/002. 10.1 Cloud IAM Services.mp4 |
31.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/003. 10.2 Federated Identity.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/004. 10.3 Identity Providers.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/005. 10.4 Single Sign-on.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/006. 10.5 Multi-factor Authentication.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/007. 10.6 Cloud Access Security Brokers.mp4 |
7.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/008. 10.7 Managed Security Service Providers.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/001. Module introduction.mp4 |
1.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/001. Learning objectives.mp4 |
4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/002. 11.1 Hardware-specific Security Configuration.mp4 |
11.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/003. 11.2 Installation and Configuration of Management Tools.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/004. 11.3 SDS and Securing Storage Area Networks.mp4 |
26.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/005. 11.4 Installation of Guest OS Virtualization Tools.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/006. 11.5 Secure Network Configuration.mp4 |
127 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/007. 11.6 Network Security Controls.mp4 |
50.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/008. 11.7 Operating System Hardening.mp4 |
5.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/009. 11.8 Patch Management and Infrastructure as Code (IaC).mp4 |
16.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/010. 11.9 Clustered Host Availability.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/011. 11.10 Performance and Capacity Monitoring.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/001. Learning objectives.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/002. 12.1 Configuration and Change Management.mp4 |
27.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/003. 12.2 Continuity Management.mp4 |
8.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/004. 12.3 Information Security Management.mp4 |
4.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/005. 12.4 Service Level Management.mp4 |
13.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/006. 12.5 Incident and Problem Management.mp4 |
26.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/007. 12.6 Release and Deployment Management.mp4 |
9.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/008. 12.7 Availability Management.mp4 |
8.2 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/009. 12.8 Capacity Management.mp4 |
4.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/010. 12.9 Security Operations Centers (SOC).mp4 |
88.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/011. 12.10 Intelligent Security Control Monitoring.mp4 |
49.8 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/012. 12.11 Vulnerability Assessment.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/001. Module introduction.mp4 |
1.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/001. Learning objectives.mp4 |
3.4 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/002. 13.1 Conflicting International Legislation.mp4 |
29.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/003. 13.2 eDiscovery and Forensics.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/004. 13.3 Issues with PHI and PII in the Cloud.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/005. 13.4 Standard Privacy Requirements.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/006. 13.5 Privacy Impact Assessments (PIAs).mp4 |
9.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/007. 13.6 Risk Treatment.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/008. 13.7 Provider Risk Assessment Programs.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/009. 13.8 Regulatory Transparency Requirements.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/001. Learning objectives.mp4 |
3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/002. 14.1 Audit Controls, Reports, and Their Impact.mp4 |
7 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/003. 14.2 Gap Analysis and Internal InfoSec Management Systems.mp4 |
9.9 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/004. 14.3 Policies and Stakeholder Involvement.mp4 |
13.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/005. 14.4 Specialized Compliance Requirements.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/006. 14.5 The Impact of Distributed IT.mp4 |
12.5 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/007. 14.6 Business Agreement Requirements.mp4 |
10.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/008. 14.7 Supply Chain Management.mp4 |
5.1 MB |
DIY Cybersecurity Degree/Cloud/Certified Cloud Security Professional (CCSP)/Summary/001. Certified Cloud Security Professional (CCSP) Summary.mp4 |
2.3 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Introduction/001. Exam AZ-900 Microsoft Azure Fundamentals Introduction.mp4 |
29.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/001. Module introduction.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/001. Learning objectives.mp4 |
5.3 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/002. 1.1 Define cloud computing.mp4 |
2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/003. 1.2 Describe the shared responsibility model.mp4 |
3.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/004. 1.3 Define cloud models.mp4 |
16.6 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/005. 1.4 Consumption-based model.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/001. Learning objectives.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/002. 2.1 Explain high availability and scalability.mp4 |
8.9 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/003. 2.2 Define reliability and predictability.mp4 |
5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/004. 2.3 Describe security and governance.mp4 |
5.6 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/005. 2.4 Explain manageability in the cloud.mp4 |
7.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/001. Learning objectives.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/002. 3.1 Describe infrastructure as a service (IaaS).mp4 |
5.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/003. 3.2 Describe platform as a service (PaaS).mp4 |
5.8 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/004. 3.3 Describe software as a service (SaaS).mp4 |
4.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/001. Module introduction.mp4 |
7.3 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/001. Learning objectives.mp4 |
6.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/002. 4.1 Define Azure regions, region pairs, and sovereign regions.mp4 |
14 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/003. 4.2 Explain availability zones.mp4 |
5.8 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/004. 4.3 Describe Azure datacenters.mp4 |
3.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/005. 4.4 Describe Azure resources and resource groups.mp4 |
5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/006. 4.5 Describe management groups.mp4 |
3.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/001. Learning objectives.mp4 |
6.1 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/002. 5.1 Compare compute types.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/003. 5.2 Describe VM options.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/004. 5.3 Describe resources required for virtual machines.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/005. 5.4 Describe application hosting options.mp4 |
46.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/006. 5.5 Describe virtual networking.mp4 |
21.8 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/007. 5.6 Define public and private endpoints.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/001. Learning objectives.mp4 |
7.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/002. 6.1 Compare Azure storage services.mp4 |
9.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/003. 6.2 Describe storage tiers.mp4 |
5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/004. 6.3 Describe redundancy options.mp4 |
9.1 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/005. 6.4 Describe storage account options.mp4 |
3.9 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/006. 6.5 Identify options for moving files.mp4 |
22 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/007. 6.6 Describe migration options.mp4 |
19 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/001. Learning objectives.mp4 |
9.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/002. 7.1 Describe directory services in Azure.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/003. 7.2 Describe authentication methods in Azure.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/004. 7.3 Describe Azure AD Conditional Access.mp4 |
6.3 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/005. 7.4 Describe Azure role-based access control (RBAC).mp4 |
18.9 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/006. 7.5 Describe Zero-Trust and defense in depth.mp4 |
6.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/007. 7.6 Describe Microsoft Defender for Cloud.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/001. Module introduction.mp4 |
12.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/001. Learning objectives.mp4 |
5.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/002. 8.1 Describe factors that can affect costs.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/003. 8.2 Compare the Pricing calculator and the Total Cost of Ownership (TCO) calculator.mp4 |
26.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/004. 8.3 Describe the Azure Cost Management and Billing tool.mp4 |
10.6 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/005. 8.4 Describe tags.mp4 |
12.1 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/001. Learning objectives.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/002. 9.1 Describe Azure Blueprints.mp4 |
5.9 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/003. 9.2 Describe Azure Policy.mp4 |
5.4 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/004. 9.3 Describe resource locks.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/001. Learning objectives.mp4 |
6.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/002. 10.1 Describe the Azure portal.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/003. 10.2 Describe command-line tools.mp4 |
31.9 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/004. 10.3 Describe Azure Arc.mp4 |
7 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/005. 10.4 Describe Azure Resource Manager (ARM).mp4 |
13.3 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/001. Learning objectives.mp4 |
5.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/002. 11.1 Describe Azure Advisor.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/003. 11.2 Describe Azure Service Health.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/004. 11.3 Describe Azure Monitor.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Cloud/Microsoft Azure Fundamentals AZ-900/Summary/001. Exam AZ-900 Microsoft Azure Fundamentals Summary.mp4 |
41.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.1 Overview.mp4 |
60.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 |
501.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.3 Mobile Device Ports and Accessories.mp4 |
332.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.4. Mobile Device Displays.mp4 |
276.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.5 Mobile Device Network Connections.mp4 |
224.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.6 Mobile Device Application Support.mp4 |
137.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.1 Ports and Protocols.mp4 |
284.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.2 Networking Hardware.mp4 |
300.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.3 Wireless Protocols.mp4 |
239.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.4 Networked Hosts and Services.mp4 |
248.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.5 Domain Name System (DNS).mp4 |
141.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.6 Dynamic Host Configuration Protocol (DHCP).mp4 |
159.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.7 IP Address Format.mp4 |
238.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.8 IP Address Configuration.mp4 |
102.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.9 Internet Connection Types.mp4 |
271.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.10 Network Types.mp4 |
145.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.11 Network Tools.mp4 |
355.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 |
607.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 |
463.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.3 Storage Device Cables.mp4 |
246 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 |
552.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 |
503.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 |
515.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.7 BIOS and UEFI.mp4 |
150.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.8 Processors.mp4 |
328.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.9 Expansion Cards.mp4 |
408 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.10 Power Supplies.mp4 |
327.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.11 Printer Configuration.mp4 |
334.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.12 Printers.mp4 |
230.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/4. Virtualization and Cloud Computing/4.1 Cloud Models and Services.mp4 |
250.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/4. Virtualization and Cloud Computing/4.2 Virtualization.mp4 |
348.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.1 Troubleshooting Methodology.mp4 |
274.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 |
665.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.3 Troubleshooting Storage.mp4 |
201.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.4 Troubleshooting Display Issues.mp4 |
239.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.5 Troubleshooting Printers.mp4 |
277.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.6 Troubleshooting Mobile Devices.mp4 |
222 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.7 Troubleshooting Networks.mp4 |
226.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.1 Overview.mp4 |
71.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.2 Mobile Operating Systems.mp4 |
249.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.3 Windows OS.mp4 |
131.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.4 Installation Requirements.mp4 |
208 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.5 OS Boot and Installation Methods.mp4 |
205 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.6 Partitioning and File Systems.mp4 |
228.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.7 Post Installation Tasks.mp4 |
223.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.8 Windows Client Networking Configuration.mp4 |
279.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.9 Windows Command Line Tools.mp4 |
297.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.10 Windows Network Commands.mp4 |
255 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.11 Using Microsoft System Utilities.mp4 |
200.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.12 Desktop Operating Systems.mp4 |
304.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.13 macOS Tools and Features.mp4 |
167.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.14 Linux Commands.mp4 |
239 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.15 Using Microsoft Control Panel Utilities.mp4 |
280.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.1 Implementing Physical Security Measures.mp4 |
222.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.2 Logical User Security Concepts.mp4 |
340.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.3 Logical Device and Network Security Concepts.mp4 |
228.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.4 Wireless SOHO Security.mp4 |
364 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.5 Malware Types.mp4 |
362.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.6 Social Engineering Techniques and Exploits.mp4 |
405.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.7 Microsoft OS Security - Permissions.mp4 |
242 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.8 Microsoft OS Security Features.mp4 |
197.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.9 Workstation Security Best Practices.mp4 |
218.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.10 Mobile Device Security Solutions.mp4 |
252.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.11 Securing Web Browsers.mp4 |
245.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.1 Windows OS Issues.mp4 |
320.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.2 Additional Windows OS Issues.mp4 |
185.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.3 PC Security Issues.mp4 |
296.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.4 Malware Removal Best Practices.mp4 |
161.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.5 Mobile OS and Application Issues.mp4 |
318.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.6 Mobile OS and Application Security Issues.mp4 |
282.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.1 Organizational Documentation.mp4 |
190.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.2 Basic Change Management Best Practices.mp4 |
201.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.3 Workstation Backup and Recovery Methods.mp4 |
314.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.4 Equipment and Personal Safety Procedures.mp4 |
323.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.5 Environmental Variables and Controls.mp4 |
202.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.6 Privacy and Licensing Concepts.mp4 |
146.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.7 Incident Response Policies and Procedures.mp4 |
291.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.8 Communication and Professionalism Techniques.mp4 |
428.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.9 Introduction to Basic Scripting Techniques.mp4 |
138.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.10 Implementing Remote Access Technologies.mp4 |
240.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/comptia-cysaplus-cs0002.zip |
2.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.1 Overview.mp4 |
80 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.2 Intelligence Sources.mp4 |
241.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.3 Indicator Management.mp4 |
230.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.4 Confidence Levels.mp4 |
108.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.5 Threat Classification.mp4 |
318.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.6 Threat Actors.mp4 |
360.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.7 Intelligence Cycle.mp4 |
304.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.8 Commodity Malware.mp4 |
205.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.9 Information Sharing and Analysis Centers.mp4 |
272.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.10 Attack Frameworks.mp4 |
239 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.11 Threat Research.mp4 |
323 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.12 Threat Modeling Methodologies.mp4 |
315.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.13 Threat Intelligence Sharing, Supported Functions.mp4 |
230.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.14 Vulnerability Identification and Validation.mp4 |
349.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.15 Vulnerability Remediation and Mitigation.mp4 |
363.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.16 Vulnerability Scanning Parameters and Criteria.mp4 |
311.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.17 Inhibitors to Remediation.mp4 |
330.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.18 Web App Scanners.mp4 |
226.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.19 Infrastructure Vulnerability Scanners.mp4 |
194 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.20 Software Assessment Tools and Techniques.mp4 |
255 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.21 Vulnerability Enumeration.mp4 |
179.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.22 Wireless Assessment Tools.mp4 |
227.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.23 Cloud Infrastructure Assessment Tools.mp4 |
192.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.24 Mobile Technology Threats.mp4 |
291.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.25 Premises and Vehicle Systems Threats.mp4 |
301.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.26 Controller System Threats.mp4 |
287.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.27 IoT and Embedded System Threats.mp4 |
283.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.28 CVSS Metrics.mp4 |
182.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.29 Cloud Deployment Model Threats.mp4 |
323.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.30 Cloud Service Model Threats.mp4 |
330.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.31 Other Cloud Service Threats.mp4 |
433.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.32 Mitigate Specific Attack Types.mp4 |
425 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.33 Mitigate Vulnerability Types.mp4 |
354 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.1 Asset Tagging and Change Management.mp4 |
282.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.2 Network Architecture and Segmentation.mp4 |
423.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.3 Identity and Access Management.mp4 |
403.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.4 Virtual Desktop Infrastructure, Containerization.mp4 |
199.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.5 Honeypots and Active Defense.mp4 |
262.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.6 Cloud Access Security Broker.mp4 |
160.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.7 Certificate Management.mp4 |
216.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.8 Hardware Assurance.mp4 |
367.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.9 Software Assurance and Secure Coding.mp4 |
358.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.1 Trend Analysis.mp4 |
323.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.2 URL Analysis.mp4 |
220.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.3 DNS Analysis.mp4 |
211.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.4 Packet and Protocol Analysis.mp4 |
148.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.5 Flow Analysis.mp4 |
256.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.6 Endpoint Behavior Analysis.mp4 |
313.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.7 Malware Analysis.mp4 |
235.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.8 Log Review.mp4 |
313 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.9 Impact Analysis.mp4 |
226.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.10 SIEM Review.mp4 |
229.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.11 Email Analysis.mp4 |
337.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.12 File System Permissions.mp4 |
202.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.13 Blacklisting and Whitelisting.mp4 |
278.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.14 Firewall Configurations.mp4 |
315.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.15 Data Loss Prevention.mp4 |
287.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.16 Network Access Control.mp4 |
233.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.17 Blackholes and Sinkholes.mp4 |
219.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.18 Malware Signatures.mp4 |
197.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.19 Threat Hunting.mp4 |
272.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.20 Scripting.mp4 |
222.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.21 AI and Machine Learning.mp4 |
233.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.22 Continuous Integration and Deployment.mp4 |
212.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.1 Incident Response Communication.mp4 |
325.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.2 Incident Response Phases.mp4 |
342.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.3 Indicators of Compromise.mp4 |
266.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.4 Digital Forensics.mp4 |
355.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.1 Privacy vs. Security.mp4 |
348.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 |
464 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 |
502 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 |
525.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.5 Technical Controls - The Rest.mp4 |
382.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.6 What is Risk.mp4 |
403.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.7 How do we Calculate Risk.mp4 |
234.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 |
485.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 |
439.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 |
450.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.11 Apply Risk Management to our Supply Chains.mp4 |
243.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.12 Controls.mp4 |
389 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.13 Policies and Procedures.mp4 |
379.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 |
451.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 |
441.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/1. Understanding Data and Information .mp4 |
11.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/2. Data and Information .mp4 |
37.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/3. Structured and Unstructured Data .mp4 |
47.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/4. Tabular Data .mp4 |
22.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/5. KeyValue Pairs .mp4 |
70.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/6. Bonus Materials .mp4 |
186.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/1. Data Concepts and Environments .mp4 |
10.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/2. Numeric Data .mp4 |
49.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/3. Text Data .mp4 |
37 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/4. Discrete and Continuous Data .mp4 |
34.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/5. Dates and Times .mp4 |
30 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/6. Multimedia .mp4 |
20.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/1. Introduction .mp4 |
23.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/2. Text Data .mp4 |
53.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/3. JSON Files .mp4 |
40.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/4. HTML .mp4 |
80.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/5. XML .mp4 |
37.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/6. Challenge .mp4 |
37.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/1. Introduction .mp4 |
14.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/2. Relational Databases .mp4 |
41.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/3. OLTP and OLAP .mp4 |
52.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/4. Non-Relational Databases .mp4 |
35.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/5. Schemas and Dimensions .mp4 |
41.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/6. Extra Resources .mp4 |
18.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/1. Introduction .mp4 |
21.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/2. ETL and ELT .mp4 |
35 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/3. Public Datasets .mp4 |
69.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/4. APIs .mp4 |
64.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/5. Web Scraping .mp4 |
117.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/6. Surveys and Observations .mp4 |
27.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/7. Sampling .mp4 |
60 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/1. Introduction .mp4 |
40.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/2. Handling Duplicate Data .mp4 |
88.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/3. Null or Missing Values .mp4 |
69.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/4. Errors and Outliers .mp4 |
76.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/5. Working with Outliers .mp4 |
38.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/1. Introduction .mp4 |
13.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/2. Working with Strings .mp4 |
53.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/3. Working with Dates .mp4 |
73.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/4. Base and Derived Data .mp4 |
49.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/5. Joining Datasets .mp4 |
34.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/6. Bonus Resources .mp4 |
25.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/1. Introduction .mp4 |
19.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/2. Recoding Data .mp4 |
48 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/3. Sorting Data .mp4 |
69.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/4. Filtering Data .mp4 |
46.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/5. Aggregating Data .mp4 |
43.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/6. Challenge .mp4 |
56.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/1. Introduction .mp4 |
11.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/2. Indexing .mp4 |
89.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/3. Subsets .mp4 |
79.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/4. Query Execution Plans .mp4 |
122.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/5. Parameterization .mp4 |
65.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/1. Introduction .mp4 |
11.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/2. Measures of Central Tendency .mp4 |
41.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/3. Mode .mp4 |
27.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/4. Median .mp4 |
52.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/5. Mean .mp4 |
49 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/6. Centrality and Distributions .mp4 |
42.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/7. Centrality and Outliers .mp4 |
46.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/8. Challenge .mp4 |
55.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/1. Introduction .mp4 |
13.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/2. Range .mp4 |
75.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/3. Variance Part 1 .mp4 |
23 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/4. Variance Part 2 .mp4 |
44.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/5. Standard Deviation .mp4 |
72.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/6. Z-score .mp4 |
44.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/7. Percentages .mp4 |
50.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/1. Introduction .mp4 |
21.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/2. Confidence Intervals Part 1 .mp4 |
36.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/3. Confidence Intervals Part 2 .mp4 |
51.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/4. Hypothesis Testing Part 1 .mp4 |
60.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/5. Hypothesis Testing Part 2 .mp4 |
55.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/6. T-test Part 1 .mp4 |
35.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/7. T-test Part 2 .mp4 |
30.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/1. Introduction -3.mp4 |
85.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/2. AA Testing .mp4 |
87.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/3. AB Testing Part 1 .mp4 |
114 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/4. AB Testing Part 2 .mp4 |
64.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/5. Correlation Testing .mp4 |
67.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/6. Simple Linear Regression .mp4 |
35.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/1. Introduction -5.mp4 |
19.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/2. Business Questions .mp4 |
52.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/3. EDA (Exploratory Data Analysis) .mp4 |
89.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/4. Excel EDA .mp4 |
125.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/5. Python EDA .mp4 |
43.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/6.Analysis Types .mp4 |
51.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/1. Introduction .mp4 |
18.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/2. Spreadsheets .mp4 |
27.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/3. Programming Languages Part 1 .mp4 |
41.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/4. Programming Languages Part 2 .mp4 |
21.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/5. SQL (Structures Query Language) .mp4 |
52.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/6. Machine Learning .mp4 |
50.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/7. Other Analytics Tools .mp4 |
57 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/8. Bonus Resources .mp4 |
34.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/1. Introduction .mp4 |
16.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/2. Meeting Requirements Part 1 .mp4 |
22.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/3. Meeting Requirements Part 2 .mp4 |
26.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/4. Building Cover Pages .mp4 |
78.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/5. Applying Design Basics .mp4 |
92.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/6. Including Documentation .mp4 |
39 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/1. Introduction .mp4 |
17.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/2. Dashboard Basics .mp4 |
55.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/3. Dashboard Design .mp4 |
22.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/4. Building Dashboards .mp4 |
31.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/5. Presenting Dashboards .mp4 |
24.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/6. Bonus Resource .mp4 |
96.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/1. Introduction .mp4 |
16.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/2. Line Charts .mp4 |
32.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/3. Scatterplots and Bubble Charts .mp4 |
42.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/4. Pie Charts and Heat Maps .mp4 |
74.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/5. Bar Charts and Histograms .mp4 |
40.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/6. Tree Maps, Word Clouds, and Infographics .mp4 |
41.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/1. Introduction .mp4 |
24.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/2. Data Governance .mp4 |
40.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/3. Data Governance Roles .mp4 |
39.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/4. Data Owner .mp4 |
96.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/5. Data Steward .mp4 |
48.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/6. Data Custodian .mp4 |
79.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/7. Challenge .mp4 |
37.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/1. Introduction .mp4 |
15.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/2. Master Data Management .mp4 |
104.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/3. Data Dictionary .mp4 |
36.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/4. Maintaining Data Quality .mp4 |
81.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/5. Data Quality Validation .mp4 |
87.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/1. Introduction .mp4 |
15.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/2. What is Data Security .mp4 |
49.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/3. Data Confidentiality .mp4 |
80.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/4. Access Management .mp4 |
64.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/5. Access Control Models .mp4 |
92.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/1. Introduction -3.mp4 |
20.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/2. What is Data Privacy .mp4 |
34.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/3. Data Privacy Principles .mp4 |
79.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/4. Anonymized Data .mp4 |
57.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/5. Data Obfuscation .mp4 |
42.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/1. Introduction -5.mp4 |
27.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/2. Regulatory Compliance Concepts .mp4 |
77.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/3. Data Breaches .mp4 |
78.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/4. The Gramm-Leach-Biley Act (GLBA) .mp4 |
41.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/5. Health Insurance Portability and Accountability Act (HIPAA) .mp4 |
50.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/6. Family Educational Rights and Privacy Act (FERPA) .mp4 |
36.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/7. International Data Transfers .mp4 |
71.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/comptia-itfunfc0u61.zip |
6.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.1 Overview.mp4 |
66 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.2 Computer Operating Systems.mp4 |
122.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.3 Microsoft Windows.mp4 |
142.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.4 Apple macOS.mp4 |
152.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.5 GNU Linux.mp4 |
171.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.1 Software Usage Requirements.mp4 |
224.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.2 Business and Productivity Software.mp4 |
146.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.3 Business and Productivity Software Part 2.mp4 |
129.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.4 Collaboration Software.mp4 |
161.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.5 Web Browser Settings.mp4 |
152.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.6 Web Browser Settings Part 2.mp4 |
145 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/3. Software Development/3.1 Programming Concepts.mp4 |
155.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/3. Software Development/3.2 Programming Concepts Part 2.mp4 |
142.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/3. Software Development/3.3 Developing with Python.mp4 |
150.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.1 Central Processing Unit (CPU).mp4 |
201.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.2 Common Hardware.mp4 |
236.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.3 Common Hardware Part 2.mp4 |
146.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.4 Peripheral Devices.mp4 |
202.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.5 Peripheral Devices Part 2.mp4 |
141 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.6 Display Hardware.mp4 |
214.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.7 Storage Hardware.mp4 |
240.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.1 Basic Networking Concepts.mp4 |
153.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.2 Basic Networking Concepts Part 2.mp4 |
182 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.3 Configuring a Wireless Router.mp4 |
179.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.4 Configuring a Wireless Router Part 2.mp4 |
121.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.5 Connection and Service Types.mp4 |
121.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.6 Connection and Service Types Part 2.mp4 |
177.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/6. Databases/6.1 Database Concepts.mp4 |
164.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/6. Databases/6.2 Querying a Database.mp4 |
139.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/6. Databases/6.3 Table Design.mp4 |
157.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.1 Basic Security Principles.mp4 |
172.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.2 Basic Security Principles Part 2.mp4 |
152.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.3 Security Best Practices.mp4 |
141.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.4 Security Best Practices Part 2.mp4 |
146.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.5 Security Best Practices Part 3.mp4 |
120.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/8. Troubleshooting/8.1 Troubleshooting Methodology.mp4 |
140.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/8. Troubleshooting/8.2 Troubleshooting Methodology Part 2.mp4 |
100 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/8. Troubleshooting/8.3 Troubleshooting Example.mp4 |
80 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/0. Introduction/001. CompTIA Linux+ XK0-005 Introduction.mp4 |
9.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/001. Module introduction.mp4 |
1.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/001. Learning objectives.mp4 |
1.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/002. 1.1 Managing ACLs.mp4 |
23.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/003. 1.2 Managing File System Attributes.mp4 |
8.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/004. 1.3 Configuring sudo.mp4 |
20.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/005. 1.4 Using Policykit and pkexec.mp4 |
8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/006. Lesson 1 Lab Managing sudo.mp4 |
1.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/007. Lesson 1 Lab Solution Managing sudo.mp4 |
6.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/001. Learning objectives.mp4 |
2.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/002. 2.1 Configuring Interfaces.mp4 |
32.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/003. 2.2 Creating Static Routes.mp4 |
51.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/004. 2.3 Managing DNS Clients.mp4 |
3.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/005. 2.4 Understanding Name Service Switch.mp4 |
10.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/006. 2.5 Understanding Network Bridges.mp4 |
6.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/007. 2.6 Analyzing Network Socket.mp4 |
10.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/008. 2.7 Analyzing Network Traffic with tcpdump and nmap.mp4 |
40.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/009. Lesson 2 Lab Managing Custom Routes.mp4 |
1.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/010. Lesson 2 Lab Solution Managing Custom Routes.mp4 |
9.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/001. Learning objectives.mp4 |
2.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/002. 3.1 Understanding Systemd.mp4 |
5.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/003. 3.2 Managing Unit State with systemd.mp4 |
17.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/004. 3.3 Creating Custom systemd Service Configuration.mp4 |
18.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/005. 3.4 Managing Targets.mp4 |
21.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/006. 3.5 Understanding and Managing Unit Dependencies.mp4 |
13 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/007. 3.6 Using Systemd Timers.mp4 |
25.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/008. 3.7 Managing Systemd Sockets.mp4 |
14.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/009. 3.8 Mounting File Systems with Systemd.mp4 |
7.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/010. Lesson 3 Lab Managing Systemd Dependencies.mp4 |
1.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/011. Lesson 3 Lab Solution Managing Systemd Dependencies.mp4 |
13.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/001. Module introduction.mp4 |
2.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/001. Learning objectives.mp4 |
3.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/002. 4.1 Understanding Computer Hardware Components.mp4 |
19.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/003. 4.2 Listing and Identifying Hardware Components.mp4 |
9.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/004. 4.3 Managing Kernel Modules.mp4 |
15 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/005. 4.4 Understanding systemd-udevd.mp4 |
15.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/006. 4.5 Managing Udev Rules.mp4 |
13.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/007. 4.6 Understanding dev, sys and proc Usage.mp4 |
17.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/008. Lesson 4 Lab Monitoring Hardware.mp4 |
1002 KB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/009. Lesson 4 Lab Solution Monitoring Hardware.mp4 |
5.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/001. Learning objectives.mp4 |
3.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/002. 5.1 Understanding MBR and GPT.mp4 |
7.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/003. 5.2 Understanding Storage Device Names.mp4 |
11.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/004. 5.3 Managing MBR Primary Partitions with fdisk.mp4 |
16.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/005. 5.4 Managing MBR Extended and Logical Partitions with fdisk.mp4 |
29.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/006. 5.5 Managing GPT Partitions with parted.mp4 |
12.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/007. 5.6 Creating File Systems.mp4 |
24.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/008. 5.7 Using UUIDs and Labels.mp4 |
20.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/009. 5.8 Creating Swap Partitions.mp4 |
18.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/010. 5.9 Creating LVM Volumes.mp4 |
43.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/011. 5.10 Creating Software RAID Devices.mp4 |
23.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/012. Lesson 5 Lab Managing Partitions.mp4 |
1.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/013. Lesson 5 Lab Solution Managing Partitions.mp4 |
15.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/001. Learning objectives.mp4 |
3.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/002. 6.1 Understanding File Systems.mp4 |
6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/003. 6.2 Automating File System Mounts through etcfstab.mp4 |
13.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/004. 6.3 Using Labels and UUIDs.mp4 |
24.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/005. 6.4 Monitoring Available Disk Space.mp4 |
6.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/006. 6.5 Monitoring File Systems.mp4 |
10.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/007. 6.6 Repairing File Systems.mp4 |
5.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/008. 6.7 Managing Btrfs.mp4 |
18 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/009. Lesson 6 Lab Managing File Systems.mp4 |
1.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/010. Lesson 6 Lab Solution Managing File Systems.mp4 |
6.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/001. Module introduction.mp4 |
2.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/001. Learning objectives.mp4 |
2.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/002. 7.1 Understanding Logging.mp4 |
18.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/003. 7.2 Managing rsyslogd.mp4 |
23.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/004. 7.3 Managing with Logrotate.mp4 |
11.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/005. 7.4 Working with systemd-journald.mp4 |
17 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/006. 7.5 Using the logger Command.mp4 |
3.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/007. Lesson 7 Lab Configuring Logging.mp4 |
1.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/008. Lesson 7 Lab Solution Configuring Logging.mp4 |
6.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/001. Learning objectives.mp4 |
2.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/002. 8.1 Analyzing top Output.mp4 |
28.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/003. 8.2 Interpreting Memory Statistics.mp4 |
35.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/004. 8.3 Understanding Cgroups.mp4 |
36.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/005. 8.4 Managing Process Priority and Cgroups.mp4 |
5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/006. 8.5 Tuning Kernel Parameters.mp4 |
14 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/007. Lesson 8 Lab Managing Performance.mp4 |
1.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/008. Lesson 8 Lab Solution Managing Performance.mp4 |
4.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/001. Learning objectives.mp4 |
4.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/002. 9.1 Understanding the Boot Procedure.mp4 |
11.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/003. 9.2 Understanding BIOS and UEFI.mp4 |
6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/004. 9.3 Managing and Accessing UEFI from Linux.mp4 |
6.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/005. 9.4 Managing GRUB2 Configuration.mp4 |
12.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/006. 9.5 Installing a new GRUB Bootloader.mp4 |
27.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/007. 9.6 Booting into Non-default Targets.mp4 |
8.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/008. 9.7 Troubleshooting the Boot Procedure.mp4 |
24 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/009. 9.8 Managing Initramfs.mp4 |
12.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/010. 9.9 Understanding System V Init Legacy Boot.mp4 |
14.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/011. Lesson 9 Lab Managing Initramfs.mp4 |
887 KB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/012. Lesson 9 Lab Solution Managing Initramfs.mp4 |
5.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/001. Learning objectives.mp4 |
2.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/002. 10.1 Understanding Backup Strategies.mp4 |
6.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/003. 10.2 Working with cpio.mp4 |
12.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/004. 10.3 Managing Clones with dd.mp4 |
14.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/005. 10.4 Storing Backup Offsite.mp4 |
11.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/006. 10.5 Checking File Integrity.mp4 |
7.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/007. Lesson 10 Lab Managing Backups.mp4 |
2.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/008. Lesson 10 Lab Solution Managing Backups.mp4 |
7.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/001. Learning objectives.mp4 |
2.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/002. 11.1 Understanding Display Servers.mp4 |
4.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/003. 11.2 Graphics Server Installation and Configuration.mp4 |
5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/004. 11.3 Understanding Graphical Desktops.mp4 |
6.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/005. 11.4 Understanding Remote Access Protocols.mp4 |
2.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/006. 11.5 Configuring Accessibility Features.mp4 |
4.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/007. 11.6 Configuring Console Redirection.mp4 |
14.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/008. Lesson 11 Lab Remotely Accessing the GUI.mp4 |
875 KB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/009. Lesson 11 Lab Solution Remotely Accessing the GUI.mp4 |
8.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/001. Learning objectives.mp4 |
2.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/002. 12.1 Troubleshooting Networking.mp4 |
13.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/003. 12.2 Troubleshooting Storage Problems.mp4 |
20.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/004. 12.3 Troubleshooting CPU Performance.mp4 |
20.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/005. 12.4 Understanding Linux Memory Use.mp4 |
21.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/006. 12.5 Troubleshooting Linux Memory.mp4 |
14.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/007. 12.6 Resetting a Lost Root Password.mp4 |
24.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/008. Lesson 12 Lab Analyzing Memory Use.mp4 |
1.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/009. Lesson 12 Lab Solution Analyzing Memory Use.mp4 |
3.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/001. Module introduction.mp4 |
2.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/001. Learning objectives.mp4 |
2.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/002. 13.1 Understanding Network Ports.mp4 |
10.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/003. 13.2 Understanding Firewalling.mp4 |
21.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/004. 13.3 Managing ufw Firewalling.mp4 |
15.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/005. 13.4 Managing firewalld.mp4 |
18.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/006. 13.5 Managing iptables Firewalls.mp4 |
20.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/007. Lesson 13 Lab Configuring Firewalling.mp4 |
1.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/008. Lesson 13 Lab Solution Configuring Firewalling.mp4 |
10.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/001. Learning objectives.mp4 |
2.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/002. 14.1 Managing Boot Loader Password.mp4 |
18.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/003. 14.2 Understanding and Managing chroot Jails.mp4 |
11.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/004. 14.3 An Introduction to Auditing.mp4 |
28.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/005. 14.4 Configuring MOTD.mp4 |
4.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/006. 14.5 Managing LUKS Disk Encryption.mp4 |
33.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/007. Lesson 14 Lab Configuring Auditing.mp4 |
1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/008. Lesson 14 Lab Solution Configuring Auditing.mp4 |
5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/001. Learning objectives.mp4 |
1.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/002. 15.1 Understanding PAM.mp4 |
25.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/003. 15.2 Managing TCP Wrappers.mp4 |
8.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/004. Lesson 15 Lab Configuring PAM.mp4 |
979 KB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/005. Lesson 15 Lab Solution Configuring PAM.mp4 |
14.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/001. Learning objectives.mp4 |
3.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/002. 16.1 Understanding the Need for Mandatory Access Control (MAC).mp4 |
5.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/003. 16.2 SELinux vs. AppArmor.mp4 |
4.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/004. 16.3 Configuring AppArmor.mp4 |
28.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/005. 16.4 Troubleshooting AppArmor.mp4 |
4.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/006. 16.5 Configuring SELinux Mode.mp4 |
11.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/007. 16.6 Working with SELinux Labels.mp4 |
32.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/008. 16.7 Managing SELinux Booleans.mp4 |
14 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/009. 16.8 Troubleshooting SELinux.mp4 |
21.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/010. Lesson 16 Lab Configuring SELinux.mp4 |
1.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/011. Lesson 16 Lab Solution Configuring SELinux.mp4 |
9.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/001. Module introduction.mp4 |
2.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/001. Learning objectives.mp4 |
2.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/002. 17.1 Understanding and Managing Time Services.mp4 |
17.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/003. 17.2 Understanding and Managing Certificate Services.mp4 |
25.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/004. 17.3 Creating Self-Signed Certificates.mp4 |
25.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/005. 17.4 Understanding Self-Signed Certificate Creation.mp4 |
17.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/006. 17.5 Managing Datacenter Storage.mp4 |
34.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/007. 17.6 Understanding and Managing NFS File Services.mp4 |
21.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/008. 17.7 Understanding and Managing SMB File Services.mp4 |
29.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/009. Lesson 17 Lab Creating Self-Signed Certificates.mp4 |
799 KB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/010. Lesson 17 Lab Solution Creating Self-Signed Certificates.mp4 |
12.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/001. Learning objectives.mp4 |
2.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/002. 18.1 Understanding Bash Shell Scripts.mp4 |
6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/003. 18.2 Essential Shell Script Components.mp4 |
12.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/004. 18.3 Using Conditional Statements in Shell Scripts.mp4 |
19.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/005. 18.4 Using Advanced Scripting Options.mp4 |
19.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/006. Lesson 18 Lab Writing a Shell Script.mp4 |
2.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/007. Lesson 18 Lab Solution Writing a Shell Script.mp4 |
17.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/001. Learning objectives.mp4 |
2.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/002. 19.1 Understanding Git.mp4 |
29.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/003. 19.2 Creating Git Repositories.mp4 |
24.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/004. 19.3 Using Git Repositories.mp4 |
8.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/005. 19.4 Undoing Changes.mp4 |
11.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/006. 19.5 Working with Branches.mp4 |
12.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/007. 19.6 Merging Changes.mp4 |
5.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/008. 19.7 Using gitignore.mp4 |
6.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/009. Lesson 19 Lab Using Git with Branches.mp4 |
2.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/010. Lesson 19 Lab Solution Using Git with Branches.mp4 |
16 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/001. Learning objectives.mp4 |
3.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/002. 20.1 Understanding Configuration Management.mp4 |
5.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/003. 20.2 Understanding Configuration Management Solutions.mp4 |
5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/004. 20.3 Understanding CICD.mp4 |
7.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/005. 20.4 Setting up Ansible for Configuration Management.mp4 |
17.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/006. 20.5 Using Ansible Ad-hoc Commands.mp4 |
15.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/007. 20.6 Using Ansible Playbooks.mp4 |
21.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/008. Lesson 20 Lab Using Configuration Management.mp4 |
1.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/009. Lesson 20 Lab Solution Using Configuration Management.mp4 |
15.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/001. Learning objectives.mp4 |
3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/002. 21.1 Understanding Containers.mp4 |
5.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/003. 21.2 Understanding Container Runtimes.mp4 |
9.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/004. 21.3 Running Containers in Docker and Podman.mp4 |
25.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/005. 21.4 Managing Container Images.mp4 |
15.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/006. 21.5 Understanding Kubernetes.mp4 |
3.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/007. 21.6 Running a Container in Kubernetes.mp4 |
14.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/008. Lesson 21 Lab Running Containers.mp4 |
1.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/009. Lesson 21 Lab Solution Running Containers.mp4 |
7.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Summary/001. CompTIA Linux+ XK0-005 Summary.mp4 |
1.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Linux+ (XK0-005)/Summary/001. Linux Fundamentals Summary.mp4 |
3.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/comptia-netplusn10008.zip |
72.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.1 Overview.mp4 |
132.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.2 OSI Model.mp4 |
297 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.3 OSI and TCP-IP Models.mp4 |
266.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.4 Encapsulation.mp4 |
232.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.5 Network Topologies.mp4 |
221.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.6 Network Types.mp4 |
222.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.7 Virtualization.mp4 |
209.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.8 Service Provider Links.mp4 |
220.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.9 Copper Cables and Connections.mp4 |
238.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.10 Fiber Cables and Connections.mp4 |
251.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.11 Ethernet Standards.mp4 |
244.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.12 Cable Management.mp4 |
203.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.13 IP Addressing Schemes and Contexts.mp4 |
219.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.14 IP Addressing IPv4.mp4 |
218 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.15 IP Addressing Subnetting Basics.mp4 |
85.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.16 IP Addressing Subnetting Example.mp4 |
179.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.17 IP Addressing Subnetting Scenarios.mp4 |
192.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.18 IP Addressing IPv6.mp4 |
221.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.19 Protocols and Ports.mp4 |
211 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.20 Network Services.mp4 |
211.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.21 Network Services DNS.mp4 |
204.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.22 Datacenter Network Architecture.mp4 |
224 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.23 Cloud and Networking Concepts.mp4 |
252.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.1 Networking and Networked Devices.mp4 |
184.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.2 Routing and Bandwidth Management.mp4 |
211.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.3 Ethernet Switching.mp4 |
209.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.4 Wireless Infrastructure.mp4 |
244.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.5 Wireless Encryption Standards.mp4 |
179.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.6 802.11 Standards.mp4 |
186.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.7 Cellular Technologies.mp4 |
164.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.1 Performance Metrics.mp4 |
171.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.2 Interface Statistics.mp4 |
143.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.3 Device Logs.mp4 |
167.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.4 SNMP.mp4 |
163.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.5 Environmental Factors.mp4 |
192.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.6 Plans and Procedures.mp4 |
181.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.7 Plans and procedures - BCDR.mp4 |
182.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.8 Security Policies.mp4 |
275.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.9 Organizational Documentation.mp4 |
244.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.10 High Availability and Disaster Recovery.mp4 |
226.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.1 Security Concepts.mp4 |
247.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.2 Security - Cryptography Basics.mp4 |
246.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.3 Security - Defense in Depth.mp4 |
248.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.4 Security - Authentication Methods.mp4 |
230.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.5 Security - Assessment Types.mp4 |
204.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.6 Technology-based Attacks.mp4 |
184.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.7 Remote Connections.mp4 |
194.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.8 Social Engineering.mp4 |
185.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.9 Virtual Private Networks.mp4 |
199.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.10 Physical Security.mp4 |
200.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.11 Network Hardening - Best Practices.mp4 |
312.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.12 Network Hardening - Wireless Security.mp4 |
177.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.1 Troubleshooting - Identify the problem.mp4 |
164.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.2 Troubleshooting - Establish and Test a Theory.mp4 |
178.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.3 Troubleshooting - Plan and Implement a Solution.mp4 |
208.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.4 Troubleshooting - Verify System Functionality.mp4 |
144.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.5 Troubleshooting - Document the Issue.mp4 |
128.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.6 Cabling Tools.mp4 |
197.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.7 Cabling Issues.mp4 |
172.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.8 Network Software Tools.mp4 |
188.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.9 Troubleshooting with Ping.mp4 |
182.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.10 IP Addressing Commands.mp4 |
199.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.11 DNS Troubleshooting Commands.mp4 |
176.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.12 Route Troubleshooting Commands.mp4 |
198.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.13 Information Gathering Commands.mp4 |
176.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.14 Additional Network Commands.mp4 |
222.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.15 Wireless Network Issues.mp4 |
143.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.16 Addressing Issues.mp4 |
177.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.17 Network Service Issues.mp4 |
206.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.18 Routing and Switching Issues.mp4 |
177.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/comptia-pentestplus-pt0002.zip |
4.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.1 Overview.mp4 |
141.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.2 Regulation and Compliance.mp4 |
302.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.3 Common Pentest Restrictions.mp4 |
259.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.4 Legal Concepts and Documents.mp4 |
405.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.5 Standards and Methodologies.mp4 |
322.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.6 Scoping an Engagement.mp4 |
285.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.7 Professionalism and Integrity.mp4 |
397.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.1 DNS Recon.mp4 |
211.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.2 Target Recon.mp4 |
321 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.3 Host Discovery and Enumeration.mp4 |
269.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.4 Web and Cloud Discovery and Enumeration.mp4 |
347.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.5 Defense Detection and Avoidance.mp4 |
321.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.6 Vulnerability Scanning.mp4 |
385.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.7 Nmap.mp4 |
337.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.1 Exploit Resources.mp4 |
369.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.2 Denial of Service.mp4 |
376.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.3 ARP and DNS Poisoning.mp4 |
310.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.4 Password Attacks.mp4 |
325.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.5 VLAN Hopping.mp4 |
173.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.6 MAC Spoofing.mp4 |
225.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.7 Wireless Attacks.mp4 |
362.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.8 OWASP Top 10 Web App Security Risks.mp4 |
372.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.9 SSRF Attacks.mp4 |
210.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.10 Business Logic Flaws.mp4 |
178.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.11 SQL Injection Attacks.mp4 |
320.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.12 Other Injection Attacks.mp4 |
290.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.13 XSS Attacks.mp4 |
195.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.14 Session Attacks.mp4 |
328.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.15 API Attacks.mp4 |
291.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.16 Cloud Attacks.mp4 |
434.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.17 Mobile Attacks.mp4 |
419.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.18 IoT Hacking.mp4 |
357.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.19 Data Storage System Vulnerabilities.mp4 |
259.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.20 ICS SCADA and IIOT Vulnerabilities.mp4 |
410.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.21 Virtual Environment Vulnerabilities.mp4 |
201.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.22 Container Vulnerabilities.mp4 |
214.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 |
475.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.24 Post Exploitation Enumeration and Tools.mp4 |
264.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.25 Network Segmentation Testing.mp4 |
183.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.26 Privilege Escalation.mp4 |
338.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.27 Persistence.mp4 |
289 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.28 Detection Avoidance.mp4 |
314.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.1 Components of Written Reports.mp4 |
405.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.2 Recommended Remediations.mp4 |
422 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 |
455.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.4 Post Report Delivery Activities.mp4 |
327.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/5. Tools and Code Analysis/5.1 Basic Programming Concepts.mp4 |
369.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/5. Tools and Code Analysis/5.2 Analyze Scripts Or Code For Use In A Pentest.mp4 |
325.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA PenTest + (PT0-002)/5. Tools and Code Analysis/5.3 Opportunities for Automation.mp4 |
190.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/comptia-secplusy0601.zip |
166.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.1 Overview.mp4 |
76.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.2 Social Engineering Techniques.mp4 |
214.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.3 Malware.mp4 |
234.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.4 Password Attacks - Types.mp4 |
142.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.5 Password Attacks - Tools.mp4 |
150.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.6 Application Attacks - Injections.mp4 |
168.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.7 Application Attacks - System Resources.mp4 |
228 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.8 Application Attacks - XSS and XSRF.mp4 |
112.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.9 Application Attacks - Replay Attacks.mp4 |
141.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.10 Network Attacks - DNS Attacks.mp4 |
243.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.11 Network Attacks - Layer 2 Attacks.mp4 |
214.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.12 Network Attacks - DoS and DDoS.mp4 |
142.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.13 Network Attacks - MiTM and MiTB.mp4 |
132.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.14 Network Attacks - Wireless.mp4 |
256.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.15 Vulnerabilities.mp4 |
243.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.16 Threat Intelligence - OSINT.mp4 |
133.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.17 Threat Intelligence - Threat Maps and Feeds.mp4 |
175.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.18 Threat Intelligence Vulnerability Databases Feed.mp4 |
247 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.19 Threat Actors and Vectors.mp4 |
292.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.1 Cryptography Concepts.mp4 |
184.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.2 Encryption and Steganography.mp4 |
176.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.3 Hashing.mp4 |
207.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.4 Secure Protocols.mp4 |
304.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.5 Symmetric vs. Asymmetric Encryption.mp4 |
271.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.6 PKI Concepts.mp4 |
237.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.7 Certificates.mp4 |
244.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.8 Keys.mp4 |
277.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.9 IPSec.mp4 |
247.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.1 Authentication and Authorization.mp4 |
246.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.2 Authentication Methods.mp4 |
246.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.3 Additional Authentication Methods.mp4 |
118 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.4 Biometrics.mp4 |
181.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.5 Authentication Protocols - PAP and CHAP.mp4 |
117.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.6 Authentication Protocols - EAP and 802.1X.mp4 |
171.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.7 Authentication Protocols - RADIUS and TACACS.mp4 |
122.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.8 Authentication Protocols - Kerberos.mp4 |
128.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.9 Access Control Schemes.mp4 |
232.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.10 Account Management - Account Types.mp4 |
204.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.11 Account Management - Password Policies.mp4 |
155.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.12 Account Management - Account Policies.mp4 |
139.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.1 Application Security.mp4 |
201.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.2 Physical Security.mp4 |
259.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.3 Wireless Security.mp4 |
237.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.4 Secure Data Destruction.mp4 |
194.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.5 Host Security - Endpoint Protection.mp4 |
241.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.6 Host Security - Hardening.mp4 |
248.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.7 Mobile Device Deployment.mp4 |
226.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.8 Mobile Device Management and Enforcement.mp4 |
245.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.9 Mobile Device Connections.mp4 |
162.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.10 Specialized Systems.mp4 |
199.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.11 Network Security - Segmentation.mp4 |
234.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.12 Network Security - VPNs.mp4 |
200.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.13 Network Security - Proxies and Load Balancing.mp4 |
195.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.14 Network Security - Port Security.mp4 |
191.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.15 Network Security - Firewalls.mp4 |
164.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.16 Network Security - NIDS and NIPS.mp4 |
85.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.1 Virtualization.mp4 |
189.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.2 Cloud Concepts.mp4 |
229.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.3 Cloud Services.mp4 |
168.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.4 Cloud Models.mp4 |
144.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.5 Computing Types.mp4 |
221 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.6 Cloud Security Controls.mp4 |
186.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.1 Hardware Redundancy.mp4 |
264.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.2 Site Redundancy.mp4 |
161.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.3 Non-persistence Concepts.mp4 |
199.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.4 Backup and Recovery.mp4 |
223.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.1 Network Reconnaissance and Discovery.mp4 |
191.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.2 Packet Capture and Replay.mp4 |
272 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.3 Vulnerability Scans.mp4 |
194.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.4 SIEM and SOAR Systems.mp4 |
149.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.5 Pentesting Techniques.mp4 |
236.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.6 Pentesting Exercise Types.mp4 |
197.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.7 Digital Forensics Concepts.mp4 |
265.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.8 Investigational Data Sources.mp4 |
275.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.9 Incident Response Process.mp4 |
170.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.10 Incident Response Plans.mp4 |
160 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.11 Attack Frameworks.mp4 |
164.4 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.1 Security Controls.mp4 |
217.1 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.2 Regulations, Standards and Frameworks.mp4 |
271.3 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.3 Spotlight on General Data Protection Regulation.mp4 |
259.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.4 Organizational Security Policies - Personnel.mp4 |
253.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.5 Organizational Security Policies - 3rd Party Risk.mp4 |
240.5 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.6 Organizational Security Policies - Data.mp4 |
182.7 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.7 Organizational Security Policies - Other Areas.mp4 |
146 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.8 Risk Management Concepts - Vocabulary.mp4 |
177.8 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.9 Risk Management Concepts - Types & Strategies.mp4 |
248.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.10 Risk Management Concepts - Risk Analysis.mp4 |
196.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.11 Risk Management Concepts Business Impact Analysis.mp4 |
263.9 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.12 Privacy and Data Sensitivity - Breaches & Data Types.mp4 |
189.6 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.13 Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 |
214.2 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.14 Privacy, Data Sensitivity, Roles, Responsibilities.mp4 |
162 MB |
DIY Cybersecurity Degree/CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.15 Privacy and Data Sensitivity - Other Areas.mp4 |
214.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/01. Welcome to the Penetration Tester Career Path/Module 1 - Welcome to the Penetration Tester Career Path/1.1 Welcome to the Penetration Tester Career Path.mp4 |
41.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 1 - Introduction/1.1 Introduction.mp4 |
54.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.1 Module 2 Overview - Theory.mp4 |
2.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.2 What is OSINT.mp4 |
41 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.3 Types of OSINT.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.4 Who Uses OSINT.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.5 The OSINT Cycle.mp4 |
15.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.6 OSINT Ethics and Moral Dilemmas.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.7 Module 2 Summary.mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.1 Module 3 Overview - OSINT Playground.mp4 |
6.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.2 Computer-Secure Environment.mp4 |
18.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.3 Notes, Notes, Notes.mp4 |
31.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.4 Password Manager.mp4 |
39.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.5 Validation (True or False).mp4 |
7.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.6 Module 3 Summary.mp4 |
3.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.1 Module 4 Overview - Tools and Techniques.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.2 Search Engines.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.3 Social Networks.mp4 |
29.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.4 Emails and Usernames.mp4 |
11.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.5 Leaks and Data Breaches.mp4 |
11.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.6 OSINT the Systems.mp4 |
44.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.7 Module 4 Summary.mp4 |
5.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.1 Module 5 Overview - Sock Puppets.mp4 |
4.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.2 What is a Sock Puppet.mp4 |
18.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.3 How to Spot a Sock Puppet.mp4 |
5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.4 Module 5 Summary.mp4 |
2.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.1 Module 6 Overview - Defense.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.2 Operations Security (OPSEC).mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.3 OSINT Awareness.mp4 |
11.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.4 Module 6 Summary.mp4 |
2.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 7 - Conclusion/7.1 Final Thoughts.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Resources/OSINT_Fundamentals_Glossary.pdf |
112 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Resources/OSINT_Fundamentals_Quiz.pdf |
135 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Resources/OSINT_Fundamentals_Syllabus_and_Outline.pdf |
134 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.1 Nmap - What It Is and Why It's Important - NM.mp4 |
20.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.2 About the Instructor - NM.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.3 Course Overview and Prerequisites - NM.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.4 Ethics and Legality of Scanning - NM.mp4 |
32.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.1 Installing Nmap on Windows - NM.mp4 |
37.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.2 Installing Nmap on Linux - NM.mp4 |
36.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.3 Installing Nmap on Mac - NM.mp4 |
44.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.4 Kali Linux - A Hacker's Best Friend - NM.mp4 |
22.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.5 Kali Linux Lab - Running it Live - NM.mp4 |
46.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.6 Removing Nmap from Windows - NM.mp4 |
32.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.7 Removing Nmap from Linux - NM.mp4 |
12.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.8 Removing Nmap from Mac - NM.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.9 Getting Help - NM.mp4 |
60.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.10 Phases of the Nmap Scan - NM.mp4 |
46 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.11 Constructing an Nmap Scan - NM.mp4 |
38.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.12 Constructing an Nmap Scan Lab Part 1 - NM.mp4 |
31.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.13 Constructing an Nmap Scan Lab Part 2 - NM.mp4 |
47 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.14 General Considerations - NM.mp4 |
56.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.15 Custom Scan Profiles Part 1 - NM.mp4 |
31 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.16 Custom Scan Profiles Part 2 - NM.mp4 |
50.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.1 IPv4 for Nmap - NM.mp4 |
25.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.2 IP, TCP, UDP, and ICMP Headers - NM.mp4 |
53.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.3 Nmap and Wireshark Part 1 - NM.mp4 |
44.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.4 Nmap and Wireshark Part 2 - NM.mp4 |
85.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.5 Nmap & IPv6 - NM.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.1 Target Specification Review+ - NM.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.2 Target Specification Lab Part 1 - NM.mp4 |
39.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.3 Target Specification Lab Part 2 - NM.mp4 |
29.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.4 Scan Techniques - NM.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.5 Scan Techniques Lab - NM.mp4 |
56.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.6 Host Discovery Part 1 - NM.mp4 |
37.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.7 Host Discovery Part 2 - NM.mp4 |
37.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.8 TCP & UDP Port Scanning - NM.mp4 |
33 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.9 TCP & UDP Port Scanning Lab Part 1 - NM.mp4 |
30 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.10 TCP & UDP Port Scanning Lab Part 2.mp4 |
36 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.11 Service and Application Version Detection Part 1 - NM.mp4 |
69.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.12 Service and Application Version Detection Part 2 - NM.mp4 |
44.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.13 Operating System Detection and Fingerprinting Part 1 - NM.mp4 |
34 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.14 Operating System Detection and Fingerprinting Part 2 - NM.mp4 |
74.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.15 NSE, Vulnerability Testing & Exploitation Part 1 - NM.mp4 |
26.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.16 NSE, Vulnerability Testing & Exploitation Part 2 - NM.mp4 |
63.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.17 NSE, Vulnerability Testing & Exploitation - NM.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.18 Timing and Performance Part 1 - NM.mp4 |
23.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.19 Timing and Performance Part 2 - NM.mp4 |
31.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Resources/Glossary_Nmap.pdf |
110 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Resources/Nmap_Study_Guide.pdf |
320 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Resources/NMAP_Syllabus_and_Outline__1_.pdf |
254 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 1 - Introduction/1.1 Introduction.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 1 - Introduction/1.2 Introduction to Social Engineering Part 1.mp4 |
17.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 1 - Introduction/1.3 Introduction to Social Engineering Part 2.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 2 - Social Engineering Labs/2.1 Phishing Lab Overview.mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 2 - Social Engineering Labs/2.2 EC-Council Certified Ethical Hacker v10 Social Engineering Lab Overview.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 3 - Conclusion/3.1 Conclusion.mp4 |
6.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Resources/Glossary_-_Social_Engineering__1_.pdf |
231 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Resources/Social_Engineering_Study_Guide__1_.pdf |
166 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Resources/Social_Engineering_Syllabus_and_Outline__1_.pdf |
103 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 1 - Introduction/1.1 Intro-Instructor Welcome and Objectives(KL).mp4 |
4.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 1 - Introduction/1.2 Intro-Disclaimer(KL).mp4 |
5.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.1 The Beginning (KL).mp4 |
21.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.2 Getting Kali up and Running (KL).mp4 |
22 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.3 Moving Around (KL).mp4 |
41.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.4 Module Summary (KL).mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.1 The Terminal (KL).mp4 |
32.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.2 File System (KL).mp4 |
26.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.3 Useful Commands (KL).mp4 |
35.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.4 Summary (KL).mp4 |
4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.1 Basic Network Commands (KL).mp4 |
32.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.2 Services (KL).mp4 |
22.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.3 Managing Users (KL).mp4 |
12.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.4 Summary (KL).mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 5/5.1 Troubleshooting Basics (KL).mp4 |
31.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 5/5.2 The Tools Chest (KL).mp4 |
25.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 5/5.3 Summary (KL).mp4 |
1.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_-_Robert_Smith_-_Module_2_Quiz.pdf |
33 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_-_Robert_Smith_-_Module_3_Quiz.pdf |
33 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_-_Robert_Smith_-_Module_4_Quiz.pdf |
31 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_Fundamentals_Glossary__1_.pdf |
177 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_Fundamentals_Study_Guide__1_.pdf |
171 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Robert_Smith_-_Syllabus_Kali_Fundamentals_-_Updated.pdf |
63 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.1 Introduction.mp4 |
17.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.2 Recon.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.3 The Harvester.mp4 |
28.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.4 Recon-NG.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.5 Using Recon-NG.mp4 |
19 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.6 Scanning With Recon-NG.mp4 |
43.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 2 - Getting Organized/2.1 Common Phishing Techniques.mp4 |
15.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 2 - Getting Organized/2.2 Time to Go Phishing.mp4 |
12.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 3 - Automating Your Emails/3.1 Social Engineer's Toolkit (SET).mp4 |
22 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 3 - Automating Your Emails/3.2 Attacking With SET.mp4 |
25.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 3 - Automating Your Emails/3.3 Watching the Attack.mp4 |
26.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 4 - Stopping Phishing Attacks/4.1 Stopping Phishing Attacks.mp4 |
18.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 4 - Stopping Phishing Attacks/4.2 Conclusion.mp4 |
13.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Course_Resources_Cybrary_New__1_.pdf |
681 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Cybrary_Phishing_Assessment_Lab_Cybrary_New.pdf |
449 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Phishing__1_.pdf |
190 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Phishing_Crafting_the_Perfect_Email.pdf |
382 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Phishing_Crafting_The_Perfect_Email_Glossary_New__2_.pdf |
146 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Recon-ng_Cheat_Sheet_Cybrary_New.pdf |
641 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 01 - Introduction/1.1 Course Introduction.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 01 - Introduction/1.2 Introduction to the CEH Certification.mp4 |
40.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.1 Fundamental Security Concepts.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.2 Information Security Threats and Attacks.mp4 |
14.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.3 Introduction to Ethical Hacking.mp4 |
16 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.4 Introduction to the Cyber Kill Chain.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.5 Introduction to Security Controls.mp4 |
10.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.6 Introduction to Security Laws and Standards.mp4 |
17.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.1 Introduction to Footprinting.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.2 Website Footprinting.mp4 |
9.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.3 DNS Footprinting.mp4 |
7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.4 HTTrack (Demo).mp4 |
25.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.5 Shodan (Demo).mp4 |
26.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.6 Google Hacking Database (Demo).mp4 |
8.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.7 LinkedIn (Demo).mp4 |
18 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.8 Job Boards (Demo).mp4 |
35.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.9 whois (Demo).mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.10 Banner Grabbing (Demo).mp4 |
15.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.11 theHarvester (Demo).mp4 |
12.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.12 Footprinting Countermeasures.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.1 Introduction to Network Scanning.mp4 |
37.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.2 Ping Command (Demo).mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.3 NMAP (Demo).mp4 |
51.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.4 Hping3 (Demo).mp4 |
20.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.5 Introduction to Enumeration.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.6 Enumeration Countermeasures.mp4 |
8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.7 SMB Enumeration (Demo).mp4 |
10.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.8 NetBIOS Enumeration (Demo).mp4 |
9.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.9 DNS Enumeration (Demo).mp4 |
14.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.1 Introduction to Vulnerabilities.mp4 |
18.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.2 Vulnerability Assessment Phases and Tools.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.3 Types of Password Attacks and Defenses.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.4 Password Cracking with Medusa (Demo).mp4 |
27.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.5 Privilege Escalation.mp4 |
9.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.6 Malware - Keyloggers.mp4 |
12.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.7 Malware - Rootkits.mp4 |
24.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.8 Malware - Trojans.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.9 Malware - Introduction to Viruses.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.10 Malware - Types of Viruses.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.11 Malware - Worms.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.12 Detecting Malware.mp4 |
16.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.13 Malware Countermeasures.mp4 |
7.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.1 Introduction to Sniffing.mp4 |
7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.2 Sniffing Attacks.mp4 |
16.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.3 Sniffing Tools.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.4 Sniffing Countermeasures.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.5 Introduction to Social Engineering.mp4 |
37.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.6 Social Engineering Countermeasures.mp4 |
29.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.7 Introduction to DoS and DDoS Attacks.mp4 |
10.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.8 Types of DoS and DDoS Attacks.mp4 |
32.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.9 DDoS Tools and Countermeasures.mp4 |
22.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.10 Introduction to Session Hijacking.mp4 |
15.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.11 Network Level Session Hijacking.mp4 |
20.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.12 IDS and Firewall Evasion Techniques.mp4 |
9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.13 WAF Detection with WAFW00F (Demo).mp4 |
7.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.14 Gaining Remote Access (Demo).mp4 |
13.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.1 Web Server Attack Methodology.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.2 Types of Web Server Attacks and Countermeasures.mp4 |
36.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.3 Web Application Threats.mp4 |
25.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.4 Web Application Hacking Methodology.mp4 |
10.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.5 Introduction to SQL Injection Attacks.mp4 |
15.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.6 Command Injection Attack (Demo).mp4 |
20.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.7 Web Attack Countermeasures.mp4 |
17.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 08 - Wireless Network Hacking/8.1 Introduction to Wireless.mp4 |
12.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 08 - Wireless Network Hacking/8.2 Wireless Attacks and Countermeasures.mp4 |
8.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 09 - Mobile Hacking/9.1 OWASP Top 10 for Mobile.mp4 |
16.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 09 - Mobile Hacking/9.2 Mobile Attacks and Countermeasures.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.1 Introduction to IoT Hacking.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.2 IoT Communication Models and Operating Systems.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.3 IoT Attacks and Threats.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.4 IoT Attack Countermeasures.mp4 |
12.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.5 OT Concepts.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.6 OT Attacks and Countermeasures.mp4 |
12.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.1 Introduction to Cloud Environments.mp4 |
15.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.2 Cloud Computing Services.mp4 |
12.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.3 Benefits of Cloud Computing.mp4 |
13.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.4 Cloud Threats and Attacks.mp4 |
10.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.5 Cloud Security Considerations.mp4 |
10.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 12 - Cryptography/12.1 Introduction to Cryptography.mp4 |
6.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 12 - Cryptography/12.2 Hashing, Digital Certificates and Digital Signatures.mp4 |
26.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 12 - Cryptography/12.3 Cryptography Attacks and Countermeasures.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 13 - Conclusion/13.1 Conclusion.mp4 |
7.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Resources/CEH_Notes.pdf |
983 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Resources/Penetration_Testing_and_Ethical_Hacking_Syllabus_and_Outline__1___2_.pdf |
146 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.1 Password Cracking Foundations.mp4 |
20 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.2 John the Ripper Introduction.mp4 |
22 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.3 John the Ripper Demonstration.mp4 |
15.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.4 Hash Suite.mp4 |
11.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.5 Cain and Abel.mp4 |
33.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.6 Securing Your Password.mp4 |
10.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 1 - Introduction/1.1 Introduction.pdf |
32 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 2 - Password Cracking/2.1 Identifying Hash Types.pdf |
381 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 2 - Password Cracking/2.2 Cracking Hashes.pdf |
445 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 2 - Password Cracking/2.3 Mitigation.pdf |
29 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 1 - Introduction/1.1 Introduction.mp4 |
8.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.1 Wireshark Lab Part 1.mp4 |
40.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.2 Wireshark Lab Part 2.mp4 |
46.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.3 Wireshark Lab Part 3.mp4 |
36.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.5 Packet Sniffing Lab Part 1.mp4 |
44.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.6 Packet Sniffing Lab Part 2.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.8 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4 |
53 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.9 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 |
76.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.10 TCPDUMP Lab.mp4 |
50.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 3 - Conclusion/3.1 Capstone Lab Navigation.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 3 - Conclusion/3.2 Conclusion.mp4 |
6.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Glossary.pdf |
366 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Cheat_Sheet_Sources.pdf |
112 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_1_Wireshark__1_.pdf |
142 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_2_Packet_Sniffing__1_.pdf |
137 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_3_Applying_Filters_to_TCPDump_and_Wireshark__1_.pdf |
142 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_4_TCPDump__1_.pdf |
130 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_TCPDump_Cheat_Sheet.pdf |
162 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Wireshark__TCPDump_Study_Guide__1_.pdf |
532 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Wireshark_Cheat_Sheet.pdf |
273 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Wireshark_Filters__1_.pdf |
190 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Study_Guide__1_.pdf |
325 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Syllabus_and_Outline-v1.0_Watermark__1_.pdf |
244 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.1 Introduction.mp4 |
18.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.2 Tools.mp4 |
52.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.3 Packets.mp4 |
67.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.4 HTTP Basics.mp4 |
68 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.5 Why Sites Get Hacked.mp4 |
43.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.6 Why Sites Get Hacked.mp4 |
58.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.7 Why Sites Get Hacked.mp4 |
52.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.8 Why Sites Get Hacked.mp4 |
47.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.9 Why Sites Get Hacked.mp4 |
24.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.10 Best Practices.mp4 |
54.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.11 Best Practices.mp4 |
39.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.12 Environment Setup.mp4 |
49.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.1 What is SQL Injection.mp4 |
63.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.2 Spidering.mp4 |
24.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.3 Spidering.mp4 |
19.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.4 Spidering.mp4 |
17.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.5 Spidering.mp4 |
14.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.6 Discovering SQLI.mp4 |
18.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.7 Discovering SQLI.mp4 |
23.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.8 Discovering SQLI.mp4 |
43.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.9 Discovering SQLI.mp4 |
15.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.10 Discovering SQLI.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.11 Discovering SQLI.mp4 |
38.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.12 Exploiting SQLI.mp4 |
15.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.13 Exploiting SQLI.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.14 Exploiting SQLI.mp4 |
20.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.15 Exploiting SQLI.mp4 |
23.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.16 SQLI Lab.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.1 What is XSS.mp4 |
69.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.2 What is XSS.mp4 |
24.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.3 Discovering XSS.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.4 Discovering XSS.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.5 Discovering XSS.mp4 |
13.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.6 Discovering XSS.mp4 |
25.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.7 Discovering XSS.mp4 |
21.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.8 Discovering XSS.mp4 |
5.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.9 Exploiting XSS.mp4 |
38.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.10 Exploiting XSS.mp4 |
56.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.11 XSS Lab.mp4 |
10.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.1 LFI & RFI.mp4 |
20 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.2 LFI & RFI.mp4 |
21.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.3 LFI & RFI.mp4 |
25.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.4 LFI & RFI Lab.mp4 |
14.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 5/5.1 Report Creation.mp4 |
58.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 5/5.2 Report Creation.mp4 |
37.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 5/5.3 Wrap Up.mp4 |
11 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Resources/Glossary_Web_Application_Penetration_Testing___2_.pdf |
243 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Resources/Web_Application_Penetration_Testing_Study_Guide__1___1_.pdf |
332 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Resources/Web_Application_Penetration_Testing_Syllabus__6_.pdf |
173 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 1 - Introduction/1.1 Course Introduction and Objectives.mp4 |
6.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 2 - Configuration and Functionality/2.1 Burp Suite Configuration and Interface Overview.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 3 - Scan/3.1 Crawling, Scope, and Auditing (Performing the Scan).mp4 |
23.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 4 - Conclusion/4.1 Scan Review and Conclusion.mp4 |
37.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Burp_Suite_Power_Point.pdf |
3.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Cybrary_Burp_Outline__v2__1_.pdf |
241 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Intro_to_Burp_Suite_Pro_Glossary__1_.pdf |
156 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Intro_to_Burp_Suite_Pro_Study_Guide__1_.pdf |
162 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.1 Linux (part 1).mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.2 Linux (part 2) Kali Linux Commands.mp4 |
34.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.3 Linux (part 3) - Directories, myfile and Nano.mp4 |
32.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.4 Linux (part 4) chmod, manipulation and packages.mp4 |
37.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.5 Linux (part 5) IP Addressing and netcat.mp4 |
49 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.6 Linux (part 6) Copy Commands and crontab.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.1 Programming (part 1) Fundamentals for Pen Testers.mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.2 Programming (part 2) Bash Scripting and If_Then Command.mp4 |
25 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.3 Programming (part 3) Network Pings.mp4 |
24 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.4 Programming (part 4) Python for Port Scanning.mp4 |
33 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.5 Programming (part 5) Python Import Command.mp4 |
27.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.1 Metasploit (part 1) Introduction.mp4 |
2.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.2 Metasploit (part 2) Fundamentals.mp4 |
44.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.3 Metasploit (part 3) Operation.mp4 |
70 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.4 Metasploit (part 4) Auxiliary Module.mp4 |
13.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.5 Metasploit (part 5) msfcli.mp4 |
24 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.6 Metasploit (part 6) msfvenom.mp4 |
36.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.1 Information Gathering Intro (part 1).mp4 |
2.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.2 Information Gathering (part 2) Domain Name Services.mp4 |
41.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.3 Information Gathering (part 3) Targeting Email and Maltego.mp4 |
54.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.4 Information Gathering (part 4) recon-ng and google operators.mp4 |
17.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.5 Information Gathering (part 5) NMAP and PortScanning.mp4 |
98 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.1 Vulnerability Scanning Intro (part 1).mp4 |
2.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.2 Vulnerability Scanning (part 2) Nessus.mp4 |
42.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.3 Vulnerability Scanning (part 3) Nmap Scripting Engine.mp4 |
32.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.4 Vulnerability Scanning (part 4) Metasploit.mp4 |
28.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.5 Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto.mp4 |
37.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.6 Vulnerability Scanning (part 6) Directory Transversals.mp4 |
22.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.1 Traffic Capture Introduction (part 1).mp4 |
2.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.2 Traffic Capture (part 2) Analyzing Network Protocol with Wireshark.mp4 |
29.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.3 Traffic Capture (part 3) Address Resolution Protocol ARP.mp4 |
39.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.4 Traffic Capture (part 4) DNS.mp4 |
13.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.5 Traffic Capture (part 5) ettercap.mp4 |
42 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.6 Traffic Capture (part 6) SSL Stripping.mp4 |
34.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.1 Exploitation (part 1) Direct Exploitation.mp4 |
46.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.2 Exploitation (part 2) SQL Commands.mp4 |
35.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.3 Exploitation (part 3) Directory Traversal.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.4 Exploitation (part 4) Open Source Vulnerability.mp4 |
20.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.5 Exploitation (part 5) Using Backdoor to Access an FTP Server.mp4 |
20.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.6 Exploitation (part 6) Attaching to an IP Address.mp4 |
18.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.1 Passwords (part 1) Password Attacks.mp4 |
45.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.2 Passwords (part 2) Online Password Cracking.mp4 |
17.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.3 Passwords (part 3) Offline Password Attacks.mp4 |
46.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.4 Passwords (part 4) Using oclhashcat.mp4 |
58.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.1 Advanced Exploitation (part 1) Introduction.mp4 |
2.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.2 Advanced Exploitation (part 2) Client Side Attacks.mp4 |
36.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.3 Advanced Exploitation (part 3) Exploiting Java.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.4 Advanced Exploitation (part 4) Social Engineering.mp4 |
68.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.5 Advanced Exploitation (part 5) Bypassing Antivirus Software.mp4 |
64.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.1 Post Exploitation (part 1) File Transfer without and Interactive Shell.mp4 |
57.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.2 Post Exploitation (part 2) Exploit Development.mp4 |
57.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.3 Post Exploitation (part 3) Pivoting.mp4 |
26.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.4 Post Exploitation (part 4) Setting Up a Domain Controller.mp4 |
37.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.1 WebApp Introduction (part 1) Web App Testing.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.2 WebApp (part 2) Vulnerable Web Applications.mp4 |
34.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.3 WebApp (part 3) SQL Injection.mp4 |
48.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.4 WebApp (part 4) File Inclusion.mp4 |
21.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.5 WebApp (part 5) Cross Site Scripting XSS.mp4 |
20.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.1 Exploit Development Introduction (part 1).mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.2 Exploit Development (part 2) A Program in Memory.mp4 |
25.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.3 Exploit Development (part 3) Stack Frame for Function.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.4 Exploit Development (part 4) GNU Compilers.mp4 |
55.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.5 Exploit Development (part 5) Python.mp4 |
26.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.6 Exploit Development (part 6) Executing Unintended Code.mp4 |
41.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.7 Exploit Development (part 7) Network Based Exploits and Debuggers.mp4 |
47.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.8 Exploit Development (part 8) Creating a Cyclic Pattern.mp4 |
87.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.9 Exploit Development (part 9) Verifying Offsets.mp4 |
76.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.10 Exploit Development (part 10) Creating Shell Code in Kali Linux.mp4 |
57.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.11 Exploit Development (part 11) Fuzzing.mp4 |
54.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.12 Exploit Development (part 12) Public Exploits and Perl.mp4 |
60.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.13 Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module.mp4 |
57.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.14 Exploit Development (part 14) Structured Exception Handler Over-Write.mp4 |
144.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.1 SPF Introduction (part 1).mp4 |
3.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.2 SPF (part 2) Attach to Smartphone Based Apps.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.3 SPF (part 3) Turning an Android App into a SPF Agent.mp4 |
22.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.4 SPF (part 4) Functionality for Agents.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.5 SPF (part 5) Pentesting Mobile Devices.mp4 |
45.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Advanced_Penetration_Testing_Glossary__2_.pdf |
218 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Advanced_Penetration_Testing_Notes_Task_2__2_.pdf |
2.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Advanced_Penetration_Testing_Study_Guide__1_.pdf |
429 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Copy_of__Syllabus_and_Outline_Template__1_.pdf |
245 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/CybraryAdvancedPenSlidesnew__1_.pdf |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/14. How to Use Unicornscan (BSWR)/Module 1 - Unicornscan (BSWR)/1.1 Unicornscan (BSWR).mp4 |
42.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/14. How to Use Unicornscan (BSWR)/Resources/How_To_Guide_Unicornscan_by_Tahir_Ibrahim.pdf |
157 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 01 - Course Introduction/1.1 Course Overview.mp4 |
38.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.1 Understanding the Penetration Test Report.mp4 |
41 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.2 Penetration Test Report Demo.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.3 Note Taking and Mind Mapping.mp4 |
29.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.4 Finding Resources to Prepare for the Offensive Penetration Testing.mp4 |
27.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.1 Setting up the Kali Linux VM.mp4 |
52.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.2 Overview of Tools in Kali Linux.mp4 |
51.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.3 Understanding the Command Line.mp4 |
30 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.4 Who, What, When, Where and How of the Linux Command Line.mp4 |
19.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.5 Windows Command Lab.mp4 |
19.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.6 Command Line Lab.mp4 |
4.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.7 Command Line Lab Walkthrough.mp4 |
25.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.1 Scanning Network Protocols.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.2 Scanning with Nmap.mp4 |
32.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.3 Scanning with Masscan.mp4 |
28.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.4 Scanning with Netcat.mp4 |
47.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.5 Using Wireshark.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.6 Wireshark and Encrypted Traffic.mp4 |
22.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.7 Weaponizing Wireshark.mp4 |
31.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.8 SMB Enumeration.mp4 |
26.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.9 SMB Enumeration Demo.mp4 |
57.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.10 NFS Enumeration.mp4 |
36.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.11 SMTP Enumeration.mp4 |
25.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.12 SNMP Enumeration.mp4 |
19.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.13 FTP Enumeration.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.14 FTP Enumeration Demo.mp4 |
40.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.15 SSH Enumeration.mp4 |
55.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.16 Protocol Tips.mp4 |
19.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.17 Network Protocols Lab.mp4 |
2.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.1 Web Application Enumeration.mp4 |
76.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.2 Using Intercepting Proxies Part 1.mp4 |
31.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.3 Using Intercepting Proxies Part 2.mp4 |
49.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.4 SQL Injections.mp4 |
44.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.5 SQL Injection Authentication Bypass.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.6 Cross-Site Scripting (XSS).mp4 |
28.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.7 BeEF Framework Demo.mp4 |
32.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.8 File Inclusion Vulnerabilities.mp4 |
28.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.9 File Inclusion Demo.mp4 |
30.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.10 File Upload Vulnerabilities.mp4 |
19.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.11 XXE Attacks.mp4 |
43.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.12 Content Management Systems.mp4 |
27.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.13 Content Management Systems Demo.mp4 |
61 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.14 Web Application Lab.mp4 |
1.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.15 Web Application Lab Walkthrough.mp4 |
102.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.1 How to Practice Buffer Overflows.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.2 Setting up the Environment.mp4 |
27.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.3 Fuzzing the Application.mp4 |
50.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.4 Finding Bad Characters.mp4 |
22.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.5 Finding the Return Address.mp4 |
33.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.6 Getting a Shell.mp4 |
27.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.7 Buffer Overflow Lab.mp4 |
21.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.1 Where to Look for Public Exploits.mp4 |
29.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.2 Understanding the Code.mp4 |
24.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.3 Modifying the Code to Fit the Environment.mp4 |
44.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.4 Introduction to Metasploit.mp4 |
65.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.5 Using Metasploit or Not.mp4 |
21.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.6 Public Exploit Lab.mp4 |
1.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.7 Public Exploit Lab Walkthrough.mp4 |
46.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.1 The Different Types of Shells.mp4 |
39.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.2 How to Upgrade a Shell.mp4 |
27.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.3 Transferring Files to and from Kali Linux.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.4 Transferring Files Demo.mp4 |
55.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.1 Linux Privilege Escalation.mp4 |
24.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.2 Windows Privilege Escalation.mp4 |
39.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.3 A Word on Privilege Escalation Enumeration Scripts.mp4 |
15.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.4 Privilege Escalation Lab.mp4 |
4.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.5 Privilege Escalation Walkthrough - Windows.mp4 |
70.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.6 Privilege Escalation Walkthrough - Linux.mp4 |
42.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.1 Introduction to Password Cracking Tools.mp4 |
24.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.2 Introduction to Login Brute-Forcing Tools.mp4 |
11.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.3 Password Brute-Forcing Web Logins.mp4 |
47.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.4 Password Brute-Forcing Tips.mp4 |
64 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.5 Brute-Force and Password Cracking Lab.mp4 |
1.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.6 Brute-Force and Password Cracking Lab Walkthrough.mp4 |
77.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 11 - Putting it All Together/11.1 Hands-on Penetration Test Lab.mp4 |
938 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 11 - Putting it All Together/11.2 Hands-on Penetration Test Lab Walkthrough.mp4 |
70.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 11 - Putting it All Together/11.3 Writing the Report.mp4 |
23.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 12 - Developing the Hacker Mindset/12.1 Understanding the Hacker Mindset.mp4 |
20.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 12 - Developing the Hacker Mindset/12.2 Tips on Harnessing the Hacker Mindset.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Resources/Offensive_Penetration_Testing_Syllabus.docx.pdf |
180 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.1 What is the Penetration Testing Execution Standard (PTES).mp4 |
93.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.2 Who and Why.mp4 |
34.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.3 Course Use.mp4 |
60.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.4 Pre-Engagement Interactions Overview Part 1.mp4 |
19.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.5 Pre-Engagement Interactions Overview Part 2.mp4 |
31.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.6 Introduction to Scope Part 1.mp4 |
32 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.7 Introduction to Scope Part 2.mp4 |
21.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.8 Metrics for Time Estimation Part 1.mp4 |
34.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.9 Metrics for Time Estimation Part 2.mp4 |
23.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.10 Scoping Meeting Part 1.mp4 |
25.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.11 Scoping Meeting Part 2.mp4 |
32.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.12 Additional Support Part 1.mp4 |
30.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.13 Additional Support Part 2.mp4 |
35.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.14 PTES Questionnaires Part 1.mp4 |
24.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.15 PTES Questionnaires Part 2.mp4 |
32.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.16 Scope Creep.mp4 |
33.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.17 Start and End Dates.mp4 |
38.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.18 Specify IP Ranges and Domains.mp4 |
47.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.19 Dealing With Third Parties.mp4 |
53.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.20 Define Acceptable Sociable Engineering Pretexts Part 1.mp4 |
33.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.21 Define Acceptable Sociable Engineering Pretexts Part 2.mp4 |
23.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.22 DoS Testing.mp4 |
27.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.23 Payment Terms Part 1.mp4 |
42.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.24 Payment Terms Part 2.mp4 |
17 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.25 Goals.mp4 |
26.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.26 Establish Lines of Communication Part 1.mp4 |
27.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.27 Establishing Lines of Communication Part 2.mp4 |
29.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.28 Rules of Engagement Part 1.mp4 |
46.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.29 Rules of Engagement Part 2.mp4 |
19.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.30 Capabilities and Technology in Place.mp4 |
37.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.31 Module 1 Summary.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.1 Intelligence Gathering Overview.mp4 |
6.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.2 General Background Concepts.mp4 |
56.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.3 Business Asset Analyst.mp4 |
28 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.4 Intelligence Gathering Basics.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.5 Target Selection.mp4 |
35.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.6 OSINT Part 1.mp4 |
38 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.7 OSINT Part 2.mp4 |
26.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.8 OSINT Part 3.mp4 |
20.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.9 Covert Gathering.mp4 |
18.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.10 Footprinting - External.mp4 |
26.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.11 Footprinting - Internal.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.12 Identity Protection Mechanisms.mp4 |
15.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.13 Module 2 Summary.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.1 Threat Modeling Overview.mp4 |
5.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.2 General - Modeling Process.mp4 |
24.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.3 Business Asset Analysis.mp4 |
27.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.4 Business Process Analysis.mp4 |
22.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.5 Threat Agent or Community Analysis.mp4 |
19.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.6 Threat Capability Analysis.mp4 |
20.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.7 Motivation Modeling.mp4 |
9.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.8 Finding Relevant News.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.9 Module 3 Summary.mp4 |
6.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.1 Vulnerability Analysis Overview.mp4 |
4.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.2 Vulnerability Testing.mp4 |
23.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.3 Active Testing.mp4 |
30.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.4 Passive Testing.mp4 |
15.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.5 Validation.mp4 |
30.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.6 Research.mp4 |
30.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.7 Module 4 Summary.mp4 |
5.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.1 Exploitation Overview.mp4 |
5.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.2 Purpose.mp4 |
21.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.3 Countermeasures.mp4 |
26.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.4 Evasion.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.5 Precision Strike.mp4 |
12.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.6 Customized Exploitation Avenue.mp4 |
23 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.7 Zero Day Angle.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.8 Example Avenues of Attack.mp4 |
19.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.9 Overall Objectives.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.10 Module 5 Summary.mp4 |
6.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.1 Post-Exploitation Overview.mp4 |
4.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.2 Purpose.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.3 Rules of Engagement - Post-Exploitation.mp4 |
15.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.4 Infrastructure Analysis.mp4 |
20 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.5 Pillaging Part 1.mp4 |
25.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.6 Pillaging Part 2.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.7 High Value or Profile Targets.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.8 Data Infiltration.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.9 Persistence.mp4 |
12.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.10 Further Penetration Into Infrastructure.mp4 |
9.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.11 Cleanup.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.12 Module 6 Summary.mp4 |
7.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.1 Reporting Overview.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.2 Reporting Structure.mp4 |
6.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.3 The Executive Summary.mp4 |
25 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.4 Technical Support.mp4 |
24.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.5 Module 7 Summary.mp4 |
4.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 8 - Summary/8.1 Course Summary.mp4 |
6.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Resources/Penetration_Testing_Execution_Standard__PTES__Glossary__1_.pdf |
160 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Resources/Penetration_Testing_Execution_Standard__PTES__Syllabus_and_Outline__1_.pdf |
81 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Resources/Penetration_Testing_Execution_Standard_Study_Guide__1_.pdf |
506 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/01. Welcome to the SOC Analyst Level 1 Career Path/1.1 Welcome to the SOC Analyst Level 1 Career Path.mp4 |
42 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 1 - Introduction/1.1 Intro-Instructor Welcome and Objectives(KL).mp4 |
4.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 1 - Introduction/1.2 Intro-Disclaimer(KL).mp4 |
5.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.1 The Beginning (KL).mp4 |
21.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.2 Getting Kali up and Running (KL).mp4 |
22 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.3 Moving Around (KL).mp4 |
41.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.4 Module Summary (KL).mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.1 The Terminal (KL).mp4 |
32.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.2 File System (KL).mp4 |
26.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.3 Useful Commands (KL).mp4 |
35.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.4 Summary (KL).mp4 |
4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.1 Basic Network Commands (KL).mp4 |
32.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.2 Services (KL).mp4 |
22.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.3 Managing Users (KL).mp4 |
12.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.4 Summary (KL).mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 5/5.1 Troubleshooting Basics (KL).mp4 |
31.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 5/5.2 The Tools Chest (KL).mp4 |
25.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 5/5.3 Summary (KL).mp4 |
1.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Glossary.pdf |
177 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Module 2 - Quiz.pdf |
33 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Module 3 - Quiz.pdf |
33 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Module 4 - Quiz.pdf |
31 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Study Guide.pdf |
171 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Syllabus and Outline.pdf |
63 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 1 - Introduction to the Command Line/1.1 Introduction and Setup.mp4 |
44.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 1 - Introduction to the Command Line/1.2 Opening the Command Line.mp4 |
33.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 1 - Introduction to the Command Line/1.3 Asking for Help.mp4 |
71.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.1 Command Line Survival Part 1.mp4 |
55.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.2 Command Line Survival Part 2.mp4 |
41.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.3 Changing Directories.mp4 |
46.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.4 Common Linux Tools.mp4 |
89.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.5 Windows Common Tools.mp4 |
46.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.6 Copy and Paste in Windows Command.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.1 Linux Basics Part 1.mp4 |
34 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.2 Linux Basics Part 2.mp4 |
37.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.3 Linux Basics Part 3.mp4 |
43.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.4 Linux Files Part 1.mp4 |
31.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.5 Linux Files Part 2.mp4 |
36.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.6 Linux Files Part 3.mp4 |
42.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.7 Linux Files Part 4.mp4 |
31.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.8 Linux Files Part 5.mp4 |
35.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.9 Linux System Part 1.mp4 |
33.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.10 Linux System Part 2.mp4 |
38.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.11 Linux Networking Part 1.mp4 |
45.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.12 Linux Networking Part 2.mp4 |
69.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.1 Windows Basis.mp4 |
36.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.2 Windows Files Part 1.mp4 |
30.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.3 Windows Files Part 2.mp4 |
37.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.4 Windows System Part 1.mp4 |
27.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.5 Windows System Part 2.mp4 |
38.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.6 Windows System Part 3.mp4 |
24 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.7 Windows Networking Part 1.mp4 |
41.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.8 Windows Networking Part 2.mp4 |
31.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.9 Windows Networking Part 3.mp4 |
28.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.10 Net Command.mp4 |
40.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.1 Windows Advanced Piping and Ampersands.mp4 |
35.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.2 Windows Command Redirection.mp4 |
44 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.3 For and While Loops.mp4 |
32.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.4 Linux Shell Scripting.mp4 |
21.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.5 Windows Batch Scripting.mp4 |
20.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.6 Conclusion.mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Command_Line_Basics_Command_Categories__1_.pdf |
96 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Command_Line_Basics_Study_Guide__1_.pdf |
389 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Command_Line_Basics_Syllabus_and_Outline__1_.pdf |
204 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Commandline_Basics_Glossary.pdf |
155 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/04. How to Use binwalk (BSWJ)/Module 1 - BSWJ - binwalk/1.1 BSWJ - binwalk.mp4 |
39.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 1 - Introduction/1.1 Introduction.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 1 - Introduction/1.2 Malware Introduction.mp4 |
24.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.1 Analyze and Classify Malware Lab Part 1.mp4 |
40.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.2 Analyze and Classify Malware Lab Part 2.mp4 |
18.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.3 Rootkit Lab Part 1.mp4 |
56.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.4 Rootkit Lab Part 2.mp4 |
59.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.5 Rootkit Lab Part 3.mp4 |
51.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 3 - Conclusion/3.1 Conclusion.mp4 |
7.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Resources/Malware_Threats_Analyze_and_Classify_Malware_Lab__1___1_.pdf |
102 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Resources/Malware_Threats_Rootkit_Lab__1_.pdf |
117 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Resources/Malware_Threats_Syllabus_and_Outline__1_.pdf |
101 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.1 Introduction.mp4 |
8.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.2 The Cyber Kill Chain.mp4 |
22 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.1 Reconnaissance 1.mp4 |
58.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.2 Reconnaissance 2.mp4 |
32.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.3 Reconnaissance 3.mp4 |
27.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.4 Weaponization.mp4 |
29 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.5 Delivery.mp4 |
30.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.6 Exploitation and Installation.mp4 |
25.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.7 Command and Control.mp4 |
27.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.8 Action on Objectives.mp4 |
35.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 3 - Defense in Depth Using the Cyber Kill Chain/3.1 Defense in Depth.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 4 - Conclusion/4.1 Conclusion.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Additional Resources.pdf |
147 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Fingerprinting Using Nmap Step by Step Guide.pdf |
208 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Footprinting Using Passive Tools - NsLookup Step by Step Guide.pdf |
212 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Footprinting Using Passive Tools - Websites Step by Step Guide.pdf |
252 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Footprinting Using Passive Tools - Whois Step by Step Guide.pdf |
224 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Glossary.pdf |
202 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Module 2 - Weaponization Lab Using MSFvenom Step by Step Guide.pdf |
209 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Study Guide.pdf |
378 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Syllabus and Outline.pdf |
241 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 1 - Introduction/1.1 Scanning & Enumeration Introduction.mp4 |
12.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.1 Checking for Live Systems Lab Part 1.mp4 |
38.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.2 Checking for Live Systems Lab Part 2.mp4 |
41.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.3 Checking for Open Ports Lab Part 1.mp4 |
34.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.4 Checking for Open Ports Lab Part 2.mp4 |
26.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.1 Scanning Introduction.mp4 |
21.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.2 Scanning with NMAP Half Connect Scan.mp4 |
20.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.3 Scanning with NMAP Full Connect Scan.mp4 |
11.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.4 Scanning with XMAS Scan Part 1.mp4 |
16.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.5 Scanning with XMAS Scan Part 2.mp4 |
20.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.6 Scanning with NMAP ACK Scan.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.7 Scanning with NMAP ACK Scan and Windows Firewall.mp4 |
25.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.8 Scanning with hping3 and SYN Scan.mp4 |
32.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.9 Scanning with hping3 and ACK Scan.mp4 |
19.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.10 Scanning with hping3 and XMAS Scan.mp4 |
30.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.11 Scanning with hping3, ACK Scan, and Windows Firewall.mp4 |
27.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.1 OS Fingerprinting.mp4 |
41.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.2 Banner Grabbing.mp4 |
44.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.1 Zenmap.mp4 |
45 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.2 Dig and Finger Commands.mp4 |
35.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.1 Vulnerability Scanner Setup and Configuration of Core Impact Part 1.mp4 |
35.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.2 Vulnerability Scanner Setup and Configuration of Core Impact Part 2.mp4 |
34.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.3 Vulnerability Scanner Setup and Configuration of OpenVAS Part 1.mp4 |
35.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.4 Vulnerability Scanner Setup and Configuration of OpenVAS Part 2.mp4 |
56 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.1 Vulnerability Scan Assessment Overview.mp4 |
6.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.2 Scanning, Enumerations, & Vulnerabilities Conclusion.mp4 |
17.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Resources/Scanning & Enumeration Glossary.pdf |
230 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Resources/Scanning & Enumeration Scanning Assessment.pdf |
113 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Resources/Scanning & Enumeration Study Guide.pdf |
198 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.2 Introduction.mp4 |
36.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.3 An Introduction to OWASP.mp4 |
23.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.4 The OWASP Top 10.mp4 |
38.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.5 OWASP Web Security Testing Guide (WSTG).mp4 |
20.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.6 Using Intercepting Proxies in Web Application Security Testing.mp4 |
48.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.7 Video Demonstration of Using Intercepting Proxies.mp4 |
79.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.8 Video Demonstration of Using OWASP Mutillidae.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Resources/OWASP Top 10 2021 Complete Syllabus.pdf |
306 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 1 - Introduction/1.1 Introduction.mp4 |
8.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.1 Wireshark Lab Part 1.mp4 |
40.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.2 Wireshark Lab Part 2.mp4 |
46.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.3 Wireshark Lab Part 3.mp4 |
36.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.4 Packet Sniffing Lab Part 1.mp4 |
44.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.5 Packet Sniffing Lab Part 2.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.6 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4 |
53 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.7 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 |
76.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.8 TCPDUMP Lab.mp4 |
50.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 3 - Conclusion/3.1 Capstone Lab Navigation.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 3 - Conclusion/3.2 Conclusion.mp4 |
6.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Glossary.pdf |
366 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 1 Wireshark - Step by Step Guide.pdf |
142 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 2 Packet Sniffing - Step by Step Guide.pdf |
137 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 3 Applying Filters to TCPDump and Wireshark - Step by Step Guide.pdf |
142 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 4 TCPDump - Step by Step Guide.pdf |
130 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Study Guide.pdf |
325 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Syllabus and Outline.pdf |
244 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/TCPDump Cheat Sheet.pdf |
162 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark & TCPDump - Instructor Notes.pdf |
532 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark & TCPDump Sources.pdf |
112 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark Cheat Sheet.pdf |
273 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark Filters.pdf |
190 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 1 - Introduction/1.1 Welcome.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 1 - Introduction/1.2 What is Splunk.mp4 |
17 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 1 - Introduction/1.3 Splunk and Your Career.mp4 |
29.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.1 Splunk Products, Resources, and Certifications.mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.2 Splunk Website.mp4 |
25.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.3 Splunk Products.mp4 |
19.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.1 Setting Up Splunk.mp4 |
9.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.2 Parts of Splunk.mp4 |
17.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.3 Installing Splunk on Linux.mp4 |
40.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.4 Installing Splunk on Windows.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.5 Installing a Universal Forwarder.mp4 |
19.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.1 Data.mp4 |
1.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.2 Web Interface Tour.mp4 |
35.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.3 Ways to Get Data.mp4 |
48.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.4 Inputs Monitoring.mp4 |
28.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.1 Using Data.mp4 |
2.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.2 Searches.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.3 Alerts.mp4 |
36.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.4 Reports and Dashboards.mp4 |
23.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.5 App Basics.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 6 - Conclusion/6.1 More to Learn.mp4 |
9.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 6 - Conclusion/6.2 Final Review.mp4 |
9.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/1.2 Slide Handout.pdf |
4.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/1.3 Slide Handout.pdf |
3.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/2.3 Slide Handout.pdf |
4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/3.2 Slide Handout.pdf |
3.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/3.3 Slide Handout.pdf |
2.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/3.4 Slide Handout.pdf |
1.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/4.3 Slide Handout.pdf |
1.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/4.4 Slide Handout.pdf |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.2 Slide Handout.pdf |
1.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.3 Slide Handout.pdf |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.4 Slide Handout.pdf |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.5 Slide Handout.pdf |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/6.1 Slide Handout.pdf |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/6.2 Slide Handout.pdf |
1.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Additional Readings.pdf |
231 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Cheat Sheet.pdf |
108 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Glossary.pdf |
139 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Lab Info.pdf |
417 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Quiz Questions.pdf |
159 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Study Guide.pdf |
673 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Syllabus and Outline.pdf |
236 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.1 Course Introduction.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.2 Web Applications Architecture Review Part 1.mp4 |
26.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.3 Web Applications Architecture Review Part 2.mp4 |
25.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.4 Web Server Logs Review Part 1.mp4 |
20.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.5 Web Server Logs Review Part 2.mp4 |
22.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.6 Tips and Common Issues Part 1.mp4 |
23 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.7 Tips and Common Issues Part 2.mp4 |
25 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.1 Web Application Attacks Review.mp4 |
29.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.2 Vulnerability Scans.mp4 |
30.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.3 Brute Force Attacks.mp4 |
26.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.4 SQL Injection.mp4 |
35.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.5 File Inclusion.mp4 |
23 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.6 XSS - Cross-Site Scripting.mp4 |
26.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.7 CSRF - Cross Site Request Forgery.mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.8 Other Log Sources Part 1.mp4 |
34.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.9 Other Log Sources Part 2.mp4 |
25.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.10 Course Summary.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Glossary.pdf |
186 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Internet Logs.zip |
454 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Lab logs.zip |
1.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Quiz.pdf |
920 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Study Guide.pdf |
4.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Syllabus and Outline.pdf |
108 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.1 1.0.1 Course Introduction - IP.mp4 |
15.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.2 1.0.2 Background Information - IP.mp4 |
30.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.3 Logic Part 1 - IP.mp4 |
33.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.4 Logic Part 2 - IP.mp4 |
30.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.5 Variables - IP.mp4 |
21.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.6 If Statements - IP.mp4 |
29.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.7 For Loops - IP.mp4 |
36.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.8 While Loops - IP.mp4 |
25.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.9 Turning Logic into Pseudocode Part 1 - IP.mp4 |
33.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.10 Turning Logic into Pseudocode Part 2 - IP.mp4 |
31.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.11 Turning Logic into Pseudocode Part 3 - IP.mp4 |
35.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.12 Python Basics Part 1 - IP.mp4 |
20.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.13 Python Basics Part 2 - IP.mp4 |
33.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.14 Summary and Review - IP.mp4 |
8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.1 Data Types and Logic Introduction - IP.mp4 |
8.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.2 If_Elif_Else - IP.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.3 For_Else - IP.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.4 While in Python - IP.mp4 |
9.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.5 Python Logical Escapes - IP.mp4 |
10.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.6 Python Functions - IP.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.7 Strings (Deep-Dive) Part 1 - IP.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.8 Strings (Deep-Dive) Part 2 - IP.mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.9 Numbers (Deep-Dive) - IP.mp4 |
8.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.10 Lists (Deep-Dive) - IP.mp4 |
15.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.11 Dictionaries (Deep-Dive) - IP.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.12 Summary and Review - IP.mp4 |
5.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_dictionaries.pdf |
342 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_files_exceptions.pdf |
427 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_functions.pdf |
326 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_if_while.pdf |
342 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_lists.pdf |
352 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Challenges.pdf |
55 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python-Syllabus_update_-5_5_2022-.pdf |
131 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python_Glossary__1_.pdf |
153 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python_Solutions__1_.pdf |
144 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python_study_guide__1_.pdf |
774 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.1 What is PowerShell.mp4 |
23.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.2 Working with P2.mp4 |
23.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.3 Command Line.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.4 Getting Help.mp4 |
33.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.5 Additional Piping.mp4 |
18.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.6 Additional Help.mp4 |
17.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.7 Scripting Basics.mp4 |
33.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.8 Common Commands Part 1.mp4 |
30.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.9 Common Commands Part 2.mp4 |
55.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.10 Common Commands Part 3.mp4 |
14.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.11 Common Commands Part 4.mp4 |
24.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.1 Why Security+.mp4 |
23.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.2 Risk Management and Security Basics.mp4 |
10.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.3 Risk Management Overview.mp4 |
10.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.4 Use and Misuse Cases.mp4 |
8.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.5 Risk Assessment.mp4 |
18.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.6 Risk Mitigation.mp4 |
13.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.7 Risk Monitoring.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.8 Security Principles - Confidentiality.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.9 Integrity and Availability Threats and Mitigation.mp4 |
6.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.10 Security Principles Wrap-Up.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.1 Understanding Attacks.mp4 |
9.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.2 Social Engineering.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.3 Malware.mp4 |
6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.4 Network-Based Attacks.mp4 |
21.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.5 Spoofing and Redirection.mp4 |
7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.6 DNS Service.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.7 Passwords.mp4 |
12.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.8 Wireless Security Part 1.mp4 |
21.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.9 Wireless Security Part 2.mp4 |
15.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.10 Application Attacks.mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.11 Code Injection and Cross Site Scripting.mp4 |
21 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.12 XSRF Race Conditions and Memory Issues.mp4 |
12.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.1 Cryptography Introduction and Services.mp4 |
9.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.2 Cryptography Definitions_ Initialization Vectors.mp4 |
21.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.3 Algorithms and Keys.mp4 |
6.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.4 Desirable Qualities of Algorithms and Keys.mp4 |
10.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.5 Symmetric Cryptography.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.6 Symmetric Ciphers Stream and Block.mp4 |
12.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.7 Asymmetric Cryptography.mp4 |
9.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.8 Hashing for Integrity.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.9 MAC Message Authentication Code.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.10 Hybrid Cryptography SSL and TLS.mp4 |
10.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.11 SSL, TLS and PKI Introduction.mp4 |
8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.12 PKI Continued.mp4 |
17.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.13 PGP and SMIME.mp4 |
10.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.1 Networking Concepts.mp4 |
17.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.2 Network Connectivity.mp4 |
13.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.3 Network Services Continued - DHCP and IPAM.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.4 OSI Model Introduction and Encapsulation.mp4 |
24.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.5 OSI Layers 1 and 2.mp4 |
39.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.6 OSI Layers 3 and 4.mp4 |
20 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.7 OSI Layers 5, 6, 7 and Summary.mp4 |
19.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.8 Ports and Protocols Introduction.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.9 Protocols of the TCPIP Suite Part 1.mp4 |
28.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.10 Protocols of the TCPIP Suite Part 2.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.11 Network Services DNS.mp4 |
19.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.12 Network Storage.mp4 |
14.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.13 Remote Access.mp4 |
12 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.14 Tunneling and IPSec Part 1.mp4 |
18 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.15 Tunneling and IPSec Part 2.mp4 |
18.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.1 Network Connectivity Devices Part 1.mp4 |
25.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.2 Network Connectivity Devices Part 2.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.3 Switch and VLAN Configuration Part 1.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.4 Switch and VLAN Configuration Part 2.mp4 |
9.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.5 Routing.mp4 |
28.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.6 Network Address Translation.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.7 Firewalls.mp4 |
27.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.8 Firewall Best Practices.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.9 Intrusion Detection and Prevention.mp4 |
27.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.1 Introduction and Policy.mp4 |
8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.2 Policies and Best Practices Part 1.mp4 |
21.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.3 Policies and Best Practices Part 2.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.4 Scanning, Monitoring and Patching.mp4 |
22.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.5 Patch Lifecycle Baselines and Traffic Analysis.mp4 |
20.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.6 Fault Management.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.7 RAID and Data Backups.mp4 |
20.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.8 Business Continuity and Disaster Recovery Part 1.mp4 |
25.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.9 Business Continuity and Disaster Recovery Part 2.mp4 |
11 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.10 Virtualization Part 1.mp4 |
19.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.11 Virtualization Part 2.mp4 |
18.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.12 Cloud Computing.mp4 |
11.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.13 Cloud Services.mp4 |
31 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.14 Cloud Deployment Models and Cloud Wrap-Up.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.15 IoT Introduction.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.16 OWASP IoT and Wrap-Up.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.17 Hardening the System Part 1.mp4 |
7.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.18 Hardening the System Part 2.mp4 |
9.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.19 Vulnerability Assessments and Penetration Tests.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.20 Incident Response.mp4 |
8.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.21 Forensic Investigations.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.1 Identity and Access Management Introduction.mp4 |
9.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.2 Authentication.mp4 |
30.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.3 Single Sign-On Kerberos Part 1.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.4 Single Sign-On Kerberos Part 2.mp4 |
10.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.5 Single Sign-On with Federated Services Part 1.mp4 |
17.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.6 Single Sign-On with Federated Services Part 2.mp4 |
14.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.7 Network Access Control and Authentication Wrap-Up.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.8 Authorization.mp4 |
27.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.9 Auditing and Wrap-Up.mp4 |
6.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Resources/CompTIA Security Plus Syllabus and Outline.pdf |
308 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.1 Nmap - What It Is and Why It's Important - NM.mp4 |
20.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.2 About the Instructor - NM.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.3 Course Overview and Prerequisites - NM.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.4 Ethics and Legality of Scanning - NM.mp4 |
32.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.1 Installing Nmap on Windows - NM.mp4 |
37.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.2 Installing Nmap on Linux - NM.mp4 |
36.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.3 Installing Nmap on Mac - NM.mp4 |
44.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.4 Kali Linux - A Hacker's Best Friend - NM.mp4 |
22.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.5 Kali Linux Lab - Running it Live - NM.mp4 |
46.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.6 Removing Nmap from Windows - NM.mp4 |
32.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.7 Removing Nmap from Linux - NM.mp4 |
12.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.8 Removing Nmap from Mac - NM.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.9 Getting Help - NM.mp4 |
60.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.10 Phases of the Nmap Scan - NM.mp4 |
46 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.11 Constructing an Nmap Scan - NM.mp4 |
38.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.12 Constructing an Nmap Scan Lab Part 1 - NM.mp4 |
31.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.13 Constructing an Nmap Scan Lab Part 2 - NM.mp4 |
47 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.14 General Considerations - NM.mp4 |
56.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.15 Custom Scan Profiles Part 1 - NM.mp4 |
31 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.16 Custom Scan Profiles Part 2 - NM.mp4 |
50.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.1 IPv4 for Nmap - NM.mp4 |
25.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.2 IP, TCP, UDP, and ICMP Headers - NM.mp4 |
53.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.3 Nmap and Wireshark Part 1 - NM.mp4 |
44.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.4 Nmap and Wireshark Part 2 - NM.mp4 |
85.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.5 Nmap & IPv6 - NM.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.1 Target Specification Review+ - NM.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.2 Target Specification Lab Part 1 - NM.mp4 |
39.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.3 Target Specification Lab Part 2 - NM.mp4 |
29.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.4 Scan Techniques - NM.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.5 Scan Techniques Lab - NM.mp4 |
56.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.6 Host Discovery Part 1 - NM.mp4 |
37.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.7 Host Discovery Part 2 - NM.mp4 |
37.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.8 TCP & UDP Port Scanning - NM.mp4 |
33 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.9 TCP & UDP Port Scanning Lab Part 1 - NM.mp4 |
30 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.10 TCP & UDP Port Scanning Lab Part 2.mp4 |
36 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.11 Service and Application Version Detection Part 1 - NM.mp4 |
69.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.12 Service and Application Version Detection Part 2 - NM.mp4 |
44.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.13 Operating System Detection and Fingerprinting Part 1 - NM.mp4 |
34 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.14 Operating System Detection and Fingerprinting Part 2 - NM.mp4 |
74.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.15 NSE, Vulnerability Testing & Exploitation Part 1 - NM.mp4 |
26.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.16 NSE, Vulnerability Testing & Exploitation Part 2 - NM.mp4 |
63.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.17 NSE, Vulnerability Testing & Exploitation - NM.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.18 Timing and Performance Part 1 - NM.mp4 |
23.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.19 Timing and Performance Part 2 - NM.mp4 |
31.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Resources/Glossary.pdf |
110 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Resources/Study Guide.pdf |
320 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Resources/Syllabus and Outline.pdf |
254 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.1 Introduction to ATT&CK®.mp4 |
20 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.2 Matrices or Platforms.mp4 |
13.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.3 Tactics.mp4 |
8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.4 Techniques and Sub-Techniques.mp4 |
15.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.5 Mitigations.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.6 Data Sources and Detections.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.7 Groups and Software.mp4 |
14.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.8 How ATT&CK® Grows and Evolves.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.1 Community Perspective.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.2 Common Language.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.3 Quantitative Scorecard.mp4 |
9.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.4 ATT&CK® Navigator.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.1 Cyber Threat Intelligence.mp4 |
11.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.2 Detection and Analysis.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.3 Threat Emulation.mp4 |
14.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.4 Assessment and Engineering.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.5 Putting it all Together into Threat-Informed Defense.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.6 Course Summary.mp4 |
2.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Resources/MITRE_ATT_CK_Defender_____MAD__ATT_CK___Fundamentals_Badge_Training_Syllabus_and_Outline__1_.pdf |
126 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.1 Course Overview.mp4 |
6.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.2 What is the MITRE ATT&CK Framework.mp4 |
23.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.3 Where is the MITRE ATT&CK Framework Being Used.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.4 Navigation and Review.mp4 |
93.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.1 What is Initial Access.mp4 |
11 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.2 External Remote Services.mp4 |
28 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.3 Spearphishing Link.mp4 |
48.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.4 Supply Chain Compromise Part 1.mp4 |
28.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.5 Supply Chain Compromise Part 2.mp4 |
15.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.6 Trusted Relationship.mp4 |
30.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.7 Valid Accounts Part 1.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.8 Valid Accounts Part 2.mp4 |
18 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.9 Initial Access Case Study.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.10 Module 2 Summary.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.1 What is Execution.mp4 |
5.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.2 Command Line Interface.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.3 Execution Through API.mp4 |
14.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.4 Control Panel Items.mp4 |
29.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.5 Powershell.mp4 |
25.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.6 Scripting.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.7 User Execution.mp4 |
22.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.8 Execution Case Study.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.9 Module 3 Summary.mp4 |
10.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.1 What is Persistence.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.2 Accessibility Features.mp4 |
26.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.3 Bootkit.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.4 Browser Extension.mp4 |
25.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.5 Component Firmware.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.6 Create Account.mp4 |
24.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.7 Hooking.mp4 |
8.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.8 New Service.mp4 |
19 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.9 Persistence Case Study.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.10 Module 4 Summary.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.1 What is Privilege Escalation.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.2 Access Token Manipulation.mp4 |
19.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.3 Elevation Escalation with Prompt.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.4 Exploitation for Privilege Escalation.mp4 |
21.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.5 File System Permission Weakness.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.6 Scheduled Task.mp4 |
15 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.7 Sudo.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.8 Web Shell.mp4 |
23.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.9 Privilege Escalation Case Study.mp4 |
48.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.10 Module 5 Summary.mp4 |
4.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.1 What is Defense Evasion.mp4 |
5.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.2 Clear Command History.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.3 Compile After Delivery.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.4 Disabling Security Tools.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.5 Hidden Files and Directories.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.6 Hidden Users.mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.7 Process Hollowing.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.8 Software Packing.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.9 Defense Evasion Case Study.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.10 Module 6 Summary.mp4 |
5.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.1 What is Credential Access.mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.2 Bash History.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.3 Brute Forces.mp4 |
15.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.4 Credential Dumping.mp4 |
9.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.5 Steal Web Session Cookie.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.6 Credential Access Case Study.mp4 |
8.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.7 Module 7 Summary.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.1 What is Discovery.mp4 |
3.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.2 Account Discovery.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.3 Browser Bookmark Discovery.mp4 |
15 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.4 System Owner or User Discovery.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.5 Discovery Case Study.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.6 Module 8 Summary.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.1 What is Lateral Movement.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.2 Application Deployment Software.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.3 Exploitation of Remote Services.mp4 |
18 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.4 SSH Hijacking.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.5 Lateral Movement Case Study.mp4 |
18.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.6 Module 9 Summary.mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.1 What is Collection.mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.2 Audio Capture.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.3 Clipboard Data.mp4 |
18.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.4 Data from Local System.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.5 Collection Case Study.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.6 Module 10 Summary.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.1 What is Command Control.mp4 |
2.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.2 Commonly Used Port.mp4 |
8.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.3 Custom Command and Control Protocol.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.4 Uncommonly Used Ports.mp4 |
9.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.5 Command and Control Case Study.mp4 |
6.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.6 Module 11 Summary.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.1 What is Exfiltration.mp4 |
1.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.2 Automated Exfiltration.mp4 |
8.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.3 Data Compressed.mp4 |
6.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.4 Data Transfer Size or Limits.mp4 |
6.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.5 Exfiltration Case Study.mp4 |
7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.6 Module 12 Summary.mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.1 What is Impact.mp4 |
2.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.2 Account Access Removal.mp4 |
7.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.3 Defacement.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.4 Impact Case Study.mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.5 Module 13 Summary.mp4 |
1.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 14 - Conclusion/14.1 Course Summary.mp4 |
5.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Glossary__1_.pdf |
238 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Study_Guide__2___1_.pdf |
1.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Syllabus_and_Outline.pdf |
124 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 1 - Introduction/1.1 Course Introduction.mp4 |
17.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 1 - Introduction/1.2 Introduction to the Intelligence Lifecycle.mp4 |
15.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.1 Introduction to Data Collection.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.2 Internal Data Acquisition.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.3 External Data Sources.mp4 |
17.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.4 Private Data Sources Part 1.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.5 Private Data Sources Part 2.mp4 |
8.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.6 Community Data Sources.mp4 |
22.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.7 Public Data Sources Part 1.mp4 |
20.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.8 Public Data Sources Part 2.mp4 |
9.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.9 Leveraging OSINT Part 1.mp4 |
22.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.10 Leveraging OSINT Part 2.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.1 Introduction to Data Processing.mp4 |
12.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.2 Common CTI Standards Part 1.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.3 Common CTI Standards Part 2.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.4 Storage and Integration.mp4 |
5.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.5 Threat Intelligence Platforms.mp4 |
19.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.1 Introduction to Analysis.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.2 Analysis of Competing Hypothesis.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.3 Cyber Kill Chain and Diamond Model.mp4 |
23 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.4 Cyber Kill Chain and Courses of Action Matrix.mp4 |
20 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.1 Introduction to Campaigns.mp4 |
10.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.2 Heatmap Analysis.mp4 |
16 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.3 Visual Analysis.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.4 MITRE ATT&CK and the MITRE Threat Groups Track.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.5 Threat Intelligence Naming Conventions.mp4 |
15.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.1 Introduction to Attribution.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.2 Cognitive Biases.mp4 |
14.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.3 Logical Fallacies.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.4 How to Manage Biases.mp4 |
12.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.5 Nation-State Attribution Part 1.mp4 |
19.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.6 Nation-State Attribution Part 2.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.1 Introduction to Dissemination.mp4 |
20.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.2 Tactical Intelligence.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.3 Operational Intelligence.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.4 Strategic Intelligence.mp4 |
21.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 8 - Summary/8.1 Summary.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Glossary__1___1_.pdf |
151 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Resources.pdf |
127 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Study_Guide__1_.pdf |
1.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Syllabus_and_Outline__1___1_.pdf |
135 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 1 - Introduction to Incident Response/1.1 An Overall View of the Course.mp4 |
45.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 1 - Introduction to Incident Response/1.2 The Humans Behind Cyber Security Incidents.mp4 |
50.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 1 - Introduction to Incident Response/1.3 The Sony Hack Case Study.mp4 |
44.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.1 An Overview of Incident Response Policy.mp4 |
36.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.2 The Elements of an Incident Response Policy.mp4 |
62.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.3 The Role of Communication with Law Enforcement when it comes to security.mp4 |
52.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.4 The Different Types of Incident Response Teams.mp4 |
62.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.5 Outsourcing Considerations.mp4 |
52.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.6 The Role of the Incident Response Manager.mp4 |
58.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.7 What does an Incident Response team do.mp4 |
34.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.1 An Introduction to Incident Handling.mp4 |
44.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.2 CIRC Team Composition.mp4 |
35.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.3 Incident Response Policies.mp4 |
25.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.4 The REACT Principle.mp4 |
37.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.5 Maintaining the Integrity of the Scene following an incident.mp4 |
34.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.6 The Respond Part of Incident Response.mp4 |
25 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.1 An Introduction to legal considerations of incident response.mp4 |
39.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.2 Expectation of Privacy.mp4 |
39.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.3 Personally Identifiable Information (PII).mp4 |
57.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.4 Giving notice to individuals.mp4 |
55.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.5 Benefits of Information Sharing.mp4 |
24.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.1 Forensics in Support of an Incident Response.mp4 |
42.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.2 The Phases of Investigation.mp4 |
39.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.3 The Preservation Phase of Investigation.mp4 |
52.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.4 Keys of Preservation.mp4 |
48.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.5 Volatile Data Considerations.mp4 |
45.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.6 Capturing the data.mp4 |
42.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.7 Imaging concepts.mp4 |
51.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.8 Volatile Memory Capture.mp4 |
60.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.9 Forensics in Support of Incident Response.mp4 |
47.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.10 Formatting a disk for Incident Response.mp4 |
53.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.11 Using the FTK Imaging Software.mp4 |
43.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.12 The Forensic Acquisition of Data from a PC.mp4 |
44.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.13 Navigating the H Drive.mp4 |
47.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.14 Obtaining the Windows Bitlocker Encryption Keys.mp4 |
29.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.15 Obtaining the Windows Bitlocker Encryption Keys (continued).mp4 |
27.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.16 The Autopsy Program.mp4 |
53.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.1 What is Insider Threat.mp4 |
54.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.2 American Superconductor Case Study.mp4 |
35.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.3 Indicators to identify an insider threat.mp4 |
92.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.4 Using Automated processes to look for indicators of in insider threats.mp4 |
61.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.5 Policy Enforcement.mp4 |
60.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.6 Policies and procedures.mp4 |
64.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.7 Policies and procedures (continued).mp4 |
59 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.8 Policies and procedures (continued).mp4 |
54.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 7 - Malware/7.1 Malware incidents.mp4 |
48.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 7 - Malware/7.2 Setting up a Virtual Machine.mp4 |
36.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 7 - Malware/7.3 Dynamic Analysis.mp4 |
54.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 8 - Incident Recovery/8.1 Incident Recovery.mp4 |
85.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 8 - Incident Recovery/8.2 Resiliency - The Answer to the Cyber Security Paradox.mp4 |
58.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.1 Incident Recovery.mp4 |
33.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.2 Incident Documentation.mp4 |
51.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.3 Legal Concerns.mp4 |
33.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.4 Lessons Learned Part 1.mp4 |
33.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.5 Lessons Learned Part 2.mp4 |
66.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.1 Course Introduction.mp4 |
20.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.2 Computer Forensics Today Part 1.mp4 |
17 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.3 Computer Forensics Today Part 2.mp4 |
20 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.4 Computer Forensics Today Part 3.mp4 |
26 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.5 Analyze Photos Lab Part 1.mp4 |
58.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.6 Analyze Photos Lab Part 2.mp4 |
24.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.7 Analyze Photos Lab Part 3.mp4 |
41.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 02 - Computer Forensics Investigation Process/2.1 Computer Forensics Investigation Process Part 1.mp4 |
32.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 02 - Computer Forensics Investigation Process/2.2 Computer Forensics Investigation Process Part 2.mp4 |
22.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.1 Hard Disks and File Systems Part 1.mp4 |
11.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.2 Hard Disks and File Systems Part 2.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.3 Hard Disks and File Systems Part 3.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.4 Hard Disks and File Systems Part 4.mp4 |
7.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.5 Hard Disks and File Systems Part 5.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.6 Hard Disks and File Systems Part 6.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.7 Recovering Graphics Files Lab Part 1.mp4 |
29 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.8 Recovering Graphics Files Lab Part 2.mp4 |
57.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.9 Recovering Graphics Files Lab Part 3.mp4 |
55.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.1 Data Acquisition Part 1.mp4 |
19 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.2 Data Acquisition Part 2.mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.3 Forensics Lab Part 1.mp4 |
45.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.4 Forensics Lab Part 2.mp4 |
45.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 05 - Anti-Forensics Techniques/5.1 Anti-Forensics Techniques Part 1.mp4 |
14.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 05 - Anti-Forensics Techniques/5.2 Anti-Forensics Techniques Part 2.mp4 |
15.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 06 - Operating System Forensics/6.1 Operating System Forensics Part 1 (FI).mp4 |
9.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 06 - Operating System Forensics/6.2 Operating System Forensics Part 2 (FI).mp4 |
7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 06 - Operating System Forensics/6.3 Operating System Forensics Part 3 (FI).mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 07 - Network Forensics/7.1 Network Forensics.mp4 |
14.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 08 - Web Attack Investigation/8.1 Web Attack Investigation Part 1.mp4 |
7.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 08 - Web Attack Investigation/8.2 Web Attack Investigation Part 2.mp4 |
22.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 08 - Web Attack Investigation/8.3 Web Attack Investigation Part 3.mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 09 - Database Forensics/9.1 Database Forensics.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 10 - Forensics with the Cloud/10.1 Forensics with the Cloud Part 1.mp4 |
15.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 10 - Forensics with the Cloud/10.2 Forensics with the Cloud Part 2.mp4 |
12.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 11 - Malware/11.1 Malware Part 1 (FI).mp4 |
13.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 11 - Malware/11.2 Malware Part 2 (FI).mp4 |
5.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 11 - Malware/11.3 Malware Part 3 (FI).mp4 |
14.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 12 - Email Investigation/12.1 Email Investigation Part 1.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 12 - Email Investigation/12.2 Email Investigation Part 2.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.1 Mobile Part 1.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.2 Mobile Part 2.mp4 |
8.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.3 Mobile Part 3.mp4 |
7.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.4 Mobile Part 4.mp4 |
8.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.5 Mobile Part 5.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 14 - Forensic Reporting/14.1 Forensic Reporting.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 15 - Course Summary/15.1 Course Summary.mp4 |
5.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Additional Tools to Know.pdf |
356 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Cisco Router Log Information.pdf |
226 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Course Notes.pdf |
46.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Glossary.pdf |
233 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Module 1 - Analyze Photos Lab - Step by Step Guide.pdf |
762 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Module 3 - Recovering Graphics Files Lab - Step by Step Guide.pdf |
484 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Module 4 - Live Data Acquisition Lab - Step by Step Guide.pdf |
455 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Recommended Labs.pdf |
175 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Study Guide.pdf |
546 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Syllabus & Outline.pdf |
3.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Tool Notes.pdf |
514 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 1 - About the Exam and Certification/1.1 Course Welcome and Introduction.mp4 |
9.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 1 - About the Exam and Certification/1.2 CASP+ Overview.mp4 |
15 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 1 - About the Exam and Certification/1.3 CASP+ Course Overview.mp4 |
6.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.1 Network Security Architecture Part 1.mp4 |
55.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.2 Network Security Architecture Part 2.mp4 |
37.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.3 Secure Infrastructure Design.mp4 |
35 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.4 Integrating Software Applications Part 1.mp4 |
16.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.5 Integrating Software Applications Part 2.mp4 |
26.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.6 Software Development Activities.mp4 |
27.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.7 Data Security and the Data Life Cycle.mp4 |
27.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.8 Authentication.mp4 |
24.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.9 Authorization Controls.mp4 |
34.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.10 Virtualization and Cloud Technology.mp4 |
36 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.11 Emerging Technologies.mp4 |
33.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.1 Threat Management.mp4 |
45.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.2 Threat Management Frameworks.mp4 |
21.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.3 Indicators of Compromise.mp4 |
24.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.4 Vulnerability Management.mp4 |
36.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.5 Vulnerability Assessments.mp4 |
51.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.6 Vulnerability Risk Mitigation Part 1.mp4 |
28.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.7 Vulnerability Risk Mitigation Part 2.mp4 |
29.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.8 Techniques for Risk Reduction.mp4 |
24 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.9 Incident Response.mp4 |
18.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.10 Forensics Concepts.mp4 |
22.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.11 Forensics Tools.mp4 |
28.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.1 Enterprise Mobility Security Part 1.mp4 |
36.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.2 Enterprise Mobility Security Part 2.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.3 Endpoint Security - Hardening Part 1.mp4 |
35.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.4 Endpoint Security - Hardening Part 2.mp4 |
41 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.5 Sector-Specific Technology Security Concerns.mp4 |
29.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.6 ICS Protocols.mp4 |
28.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.7 Security Implications of Cloud Technology Adoption.mp4 |
45.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.8 Cryptography.mp4 |
46.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.9 Implementing Public Key Infrastructure.mp4 |
29.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.10 Implementing PKI Solutions.mp4 |
48.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.11 Common Certificate Implementation Issues.mp4 |
21.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.1 Understanding Risk.mp4 |
50.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.2 The Risk Life Cycle.mp4 |
45.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.3 Vendor Risk.mp4 |
43.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.4 Governance and Compliance Part 1.mp4 |
51.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.5 Governance and Compliance Part 2.mp4 |
38.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.6 Business Impact Analysis.mp4 |
39.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.7 Disaster Recovery Plans.mp4 |
21.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 6 - Preparing for Your Exam/6.1 Course Recap.mp4 |
40.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 6 - Preparing for Your Exam/6.2 Study Strategies.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 6 - Preparing for Your Exam/6.3 Exam Time - Strategies for Success.mp4 |
20.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Resources/CASP__Glossary.pdf |
360 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Resources/CASP__Resources.pdf |
30 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Resources/CASP__Syllabus.pdf |
292 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.1 Introduction.mp4 |
30.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.2 An Introduction to OWASP.mp4 |
23.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.3 The OWASP Top 10.mp4 |
38.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.4 OWASP Web Security Testing Guide (WSTG).mp4 |
20.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.5 Using Intercepting Proxies in Web Application Security Testing.mp4 |
38.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.6 Video Demonstration of Using Intercepting Proxies.mp4 |
69.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.7 Video Demonstration of Using OWASP Mutillidae.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Resources/OWASP_Top_10_2021_Complete_Syllabus.pdf |
306 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 1 - Introduction/1.1 Intro Part 1.mp4 |
73.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 1 - Introduction/1.2 Intro Part 2.mp4 |
43.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 1 - Introduction/1.3 Intro Part 3.mp4 |
30.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 2 - Lab Setup/2.1 Lab Setup Part 1.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 2 - Lab Setup/2.2 Lab Setup Part 2.mp4 |
113.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 2 - Lab Setup/2.3 Lab Setup Part 3.mp4 |
64.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 3 - Dynamic Analysis Part 1/3.1 Dynamic Analysis Part 1.1.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 3 - Dynamic Analysis Part 1/3.2 Dynamic Analysis Part 1.2.mp4 |
203.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 3 - Dynamic Analysis Part 1/3.3 Dynamic Analysis Part 1.3.mp4 |
44.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 4 - Dynamic Analysis Part 2/4.1 Dynamic Analysis Part 2.1.mp4 |
42.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 4 - Dynamic Analysis Part 2/4.2 Dynamic Analysis Part 2.2.mp4 |
173.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.1 Basic Static Analysis Part 1.mp4 |
145 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.2 Basic Static Analysis Part 2.mp4 |
118.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.3 Basic Static Analysis Part 3.mp4 |
247.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.4 Basic Static Analysis Part 4A.mp4 |
173 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.5 Basic Static Analysis Part 4B.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.6 Basic Static Analysis Part 5.mp4 |
150.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.7 Basic Static Analysis Part 6.mp4 |
193.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.1 Packers Part 1.mp4 |
78.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.2 Packers Part 2.mp4 |
58.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.3 Packers Part 3.mp4 |
147.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.4 Packers Part 4.mp4 |
201.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.5 Packers Part 5.mp4 |
34 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 7 - Malware Defenses/7.1 Malware Defenses Part 1.mp4 |
42.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 7 - Malware Defenses/7.2 Malware Defenses Part 2.mp4 |
368.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 7 - Malware Defenses/7.3 Malware Defenses Part 3.mp4 |
106.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Resources/Intro_to_Malware_Analysis_and_Reverse_Engineering_Glossary__1_.pdf |
147 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Resources/Intro_to_Malware_Analysis_and_Reverse_Engineering_Study_Guide__1_.pdf |
1.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.1 Template and Setup.mp4 |
42.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.2 Introduction to Assembly.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.3 Architecture, Registers, and Protected Mode.mp4 |
35.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.4 Binary, 2's Complement and Hexadecimal.mp4 |
20.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.5 Assembly Template.mp4 |
20.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.6 Instructions, Directives and Generating a Listing.mp4 |
57.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.7 Logical Operators and Memory Layout.mp4 |
45.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.8 Segments and Functions.mp4 |
31.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.9 Sign Extend, Zero Extend, Multiple, Divide.mp4 |
32.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.10 Multiply and Divide Examples.mp4 |
47.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.11 Compare, Conditionals and Jumps.mp4 |
35.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.12 Skeleton and Loop Example.mp4 |
42.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.13 Shift Left and Right.mp4 |
37.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.14 Arithmetic Shift.mp4 |
52.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.15 Module 1 Review.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.1 Indirect Addressing and Variables Part 1.mp4 |
17.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.2 Indirect Addressing and Variables Part 2.mp4 |
10.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.3 Slack Intro Part 1.mp4 |
34.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.4 Slack Intro Part 2.mp4 |
5.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.5 Stack Usage.mp4 |
25.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.6 Simple Function Example.mp4 |
56.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.7 Function Prologue.mp4 |
8.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.8 Function Epilogue.mp4 |
39.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.9 Function Arguments.mp4 |
26.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.10 Saving Registers.mp4 |
31.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.11 More Complicated Function.mp4 |
45.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.12 Calling Conventions.mp4 |
30.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.13 Local Variables.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.14 Local Variables Example.mp4 |
40.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.15 Enter and Leave.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.16 Enter and Leave Example Conversion.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.17 Floating Point.mp4 |
26.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.18 Floating Point Circle Example.mp4 |
38.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.19 Floating Point Comparison.mp4 |
16.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.20 Floating Point Comparison Example.mp4 |
31.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.21 Max of Three Numbers.mp4 |
48.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.22 Conditional Move.mp4 |
25.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.23 Conditional Move Max Example.mp4 |
24.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.24 Arrays.mp4 |
33.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.25 Arrays Examples.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.26 String Instructions.mp4 |
19.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.27 Strings Uppercase Example.mp4 |
38.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.1 ARM Intro.mp4 |
43.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.2 ARM Template.mp4 |
20.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.3 ARM Math and Data Movement.mp4 |
27.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.4 Branching, If, While, Shift.mp4 |
31.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.5 Shift Example.mp4 |
18.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.6 Memory, Offsets, Debugging and Listing.mp4 |
46.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.7 Pushing and Popping.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.8 Push Example.mp4 |
16 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.9 Array Indexing.mp4 |
24.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.10 Array Indexing Example.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.11 ARM Multiple Load and Store.mp4 |
21.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.12 ARM Load and Store Multiple Examples.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.13 VFP and Neon.mp4 |
56.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.14 Neon Example.mp4 |
35.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.15 Neon Floating Point.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.16 Neon Floating Point Example.mp4 |
22 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.17 SIMD Load and Store Data.mp4 |
32.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.18 SIMD Process Data.mp4 |
32.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.19 SIMD Encryption Example.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.20 Thumb Mode.mp4 |
15.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.21 Thumb Mode Example.mp4 |
49.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.22 Conditional Execution.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.23 Conditional Execution Example.mp4 |
27.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.24 IT Block Assembly.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.25 IT Block Example.mp4 |
22.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.1 Tools for Code, Reverse Engineering.mp4 |
33.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.2 Reverse Engineering Process.mp4 |
25.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.3 Setup Reverse Engineering Lab.mp4 |
32.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.4 Structures and Unions.mp4 |
17.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.5 Structure Layout.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.6 Structure Creation - Reverse Engineering.mp4 |
24.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.7 Structures, Unions and Malloc.mp4 |
36.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.8 Structures, Unions and Malloc Example.mp4 |
56.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.9 Jump Tables and Switch Statements.mp4 |
19.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.10 Jump Table Example.mp4 |
26 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.11 Function Pointers.mp4 |
25.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.12 Function Pointers Example.mp4 |
23.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.13 Inline Assembly.mp4 |
35 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.14 Inline Assembly Example.mp4 |
34.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.15 Assembly with C.mp4 |
28.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.16 SysCall and Interrupts.mp4 |
28.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.17 Interrupts Example Use Fork.mp4 |
29.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.18 Strings in C.mp4 |
28.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.19 Integers in Assembly.mp4 |
34 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.20 64-Bit Assembly.mp4 |
36 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.21 MMX, SSE, AES-NI.mp4 |
32 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.22 AES Implementations.mp4 |
49.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.23 Implement Dump Registers.mp4 |
64.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.24 Static and Dynamic Linking Assembly.mp4 |
26 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.25 Shared Library.mp4 |
28.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.26 Shared Library Example.mp4 |
46.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_1.1_Installing_the_Lab_Software_Step-by-Step_Guide.pdf |
156 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_Glossary__1_.pdf |
153 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_Study_Guide__1_.pdf |
219 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_Syllabus_and_Outline.pdf |
112 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/figures.zip |
284 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Thumb___16-bit_Instruction_Set.pdf |
58 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Vector_Floating_Point_Instruction_Set.pdf |
99 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/5. How to Use binwalk (BSWJ)/Module 1 - BSWJ - binwalk/1.1 BSWJ - binwalk.mp4 |
39.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.mp4 |
77.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.2 Finding and Researching the Behavior.mp4 |
44.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.3 Translating the Behavior into a Tactic.mp4 |
66 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.4 Identifying Techniques or Sub-Techniques.mp4 |
68.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.5 Mapping to a Narrative Point.mp4 |
61 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.6 Hedging Your Biases.mp4 |
51.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.1 The Process of Mapping from Raw Data.mp4 |
33.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.2 Identify and Research Behaviors.mp4 |
25.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4 |
23.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.4 Raw Data to Narrative Reporting.mp4 |
47.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.1 Storing and Displaying ATT&CK®-Mapped Data.mp4 |
16 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.2 Expressing and Storing ATT&CK®-Mapped Data.mp4 |
22.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.3 Analyzing ATT&CK®-Mapped Data.mp4 |
30.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4 |
10.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.1 The Defensive Recommendations Process.mp4 |
26 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.mp4 |
48.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4 |
54.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.4 Make Defensive Recommendations.mp4 |
69.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39 and Cobalt Kitty Techniques.pdf |
137 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Exercise Answers.pdf |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Exercise Hints.pdf |
2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Exercise.pdf |
2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Original Report.pdf |
6.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/FireEye APT39 - Exercise Answers.pdf |
542 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/FireEye APT39 - Exercise.pdf |
453 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/FireEye APT39 - Original Report.pdf |
416 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making Defensive Recommendations Guided Exercise.rtf |
50 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making Defensive Recommendations Unguided Exercise.rtf |
54 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Syllabus and Outline.pdf |
96 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822 answers.pdf |
84 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822.rtf |
1 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845 answers.pdf |
112 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845.rtf |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.1 Incident Response Steps Introduction.mp4 |
21.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.1 Incident Response Steps Introduction.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.2 Incident Response Steps.mp4 |
21.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.2 Incident Response Steps.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.3 Incident Response Steps Breakdown.mp4 |
24.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.3 Incident Response Steps Breakdown.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.1 Incident Response Kits Introduction.mp4 |
37.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.1 Incident Response Kits Introduction.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.2 Incident Response Kits Hardware.mp4 |
35.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.2 Incident Response Kits Hardware.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.3 Incident Response Kits Software.mp4 |
31.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.3 Incident Response Kits Software.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.4 Incident Response Team Models.mp4 |
37.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.4 Incident Response Team Models.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.5 Incident Response Team Members.mp4 |
35.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.5 Incident Response Team Members.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.1 Incident Identification.mp4 |
35.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.1 Incident Identification.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.2 First Steps in Incident Response.mp4 |
31.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.2 First Steps in Incident Response.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.3 Chain of Custody Part 1.mp4 |
37.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.3 Chain of Custody Part 1.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.4 Chain of Custody Part 2.mp4 |
38.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.4 Chain of Custody Part 2.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.5 Incident Containment.mp4 |
34.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.5 Incident Containment.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.6 Recovery.mp4 |
35.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.6 Recovery.vtt |
15 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.1 Incident Recovery.mp4 |
33.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.1 Incident Recovery.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.2 Incident Documentation.mp4 |
51.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.2 Incident Documentation.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.3 Legal Concerns.mp4 |
33.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.3 Legal Concerns.vtt |
15 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.4 Lessons Learned Part 1.mp4 |
33.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.4 Lessons Learned Part 1.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.5 Lessons Learned Part 2.mp4 |
66.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.5 Lessons Learned Part 2.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.1 Seeking the Truth.mp4 |
33.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.1 Seeking the Truth.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.2 Facts vs. Expert Witness.mp4 |
10.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.2 Facts vs. Expert Witness.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.1 Evidence Identification.mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.1 Evidence Identification.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.2 Evidence Preservation.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.2 Evidence Preservation.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.3 Evidence Handling and Storage.mp4 |
26.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.3 Evidence Handling and Storage.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.4 Chain of Custody.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.4 Chain of Custody.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.5 Examination Notes and Analysis Documentation.mp4 |
20.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.5 Examination Notes and Analysis Documentation.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.1 Investigation Planning.mp4 |
21.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.1 Investigation Planning.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.2 Investigation Bias.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.2 Investigation Bias.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.3 Checklists and Standard Procedure.mp4 |
8.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.3 Checklists and Standard Procedure.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.4 Drawing Conclusions.mp4 |
6.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.4 Drawing Conclusions.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.1 Format of the Expert Report.mp4 |
17.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.1 Format of the Expert Report.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.2 Importance of Every Word.mp4 |
8.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.2 Importance of Every Word.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.3 Drawing Conclusions Revisited.mp4 |
4.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.3 Drawing Conclusions Revisited.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.4 The Importance of Peer Review.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.4 The Importance of Peer Review.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.5 Supplemental Reports.mp4 |
7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.5 Supplemental Reports.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.1 US Constitution.mp4 |
19.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.1 US Constitution.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.2 Original vs. Appellate Jurisdiction.mp4 |
4.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.2 Original vs. Appellate Jurisdiction.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.3 State Courts and Federalism.mp4 |
12.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.3 State Courts and Federalism.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.1 Judge vs. Jury Trial.mp4 |
5.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.1 Judge vs. Jury Trial.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.2 Anatomy of a Trial.mp4 |
10.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.2 Anatomy of a Trial.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.1 Federal Rule of Evidence 702.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.1 Federal Rule of Evidence 702.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.2 Federal Rule of Civil Procedure 26.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.2 Federal Rule of Civil Procedure 26.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.3 Federal Criminal Rule of Procedure 16.mp4 |
3.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.3 Federal Criminal Rule of Procedure 16.vtt |
1 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.4 State and Local Rules.mp4 |
4.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.4 State and Local Rules.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.5 Work Product Doctrine.mp4 |
12.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.5 Work Product Doctrine.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.1 Written vs. Oral Testimony.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.1 Written vs. Oral Testimony.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.2 Affidavits vs. Declarations.mp4 |
6.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.2 Affidavits vs. Declarations.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.1 Voire Dire of Experts.mp4 |
31.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.1 Voire Dire of Experts.vtt |
10 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.2 Consulting vs. Testifying.mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.2 Consulting vs. Testifying.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.3 Direct Examination.mp4 |
6.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.3 Direct Examination.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.4 Cross Examination.mp4 |
8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.4 Cross Examination.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.5 Redirect Examination.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.5 Redirect Examination.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 10 - Testimony Do’s and Don’ts/10.1 Expert Testimony Do's and Don'ts.mp4 |
21.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 10 - Testimony Do’s and Don’ts/10.1 Expert Testimony Do's and Don'ts.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 11 - Course Review and Next Steps/11.1 Course Wrap-Up and Next Steps.mp4 |
13.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 11 - Course Review and Next Steps/11.1 Course Wrap-Up and Next Steps.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Resources/DFIR_Investigation_and_Witness_Testimony_Syllabus.pdf |
114 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Resources/DFIR_Investigations_and_Witness_Testimony_Glossary__1_.pdf |
142 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Resources/DFIR_Investigations_and_Witness_Testimony_Study_Guide__1_.pdf |
244 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.1 Introduction to Memory Analysis.mp4 |
33.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.1 Introduction to Memory Analysis.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.2 Memory Analysis Explanation.mp4 |
40.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.2 Memory Analysis Explanation.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.3 Using FTK for Memory Analysis.mp4 |
35 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.3 Using FTK for Memory Analysis.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.4 Lab Introduction.mp4 |
36.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.4 Lab Introduction.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.5 Redline Lab.mp4 |
36.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.5 Redline Lab.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.6 VM and Malware Lab.mp4 |
50.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.6 VM and Malware Lab.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.7 Redline Analysis Lab Part 1.mp4 |
58.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.7 Redline Analysis Lab Part 1.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.8 Redline Analysis Lab Part 2.mp4 |
92.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.8 Redline Analysis Lab Part 2.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.1 Reconnaissance.mp4 |
37 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.1 Reconnaissance.vtt |
20 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.2 Job Boards, Certificates, and Company Websites.mp4 |
60.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.2 Job Boards, Certificates, and Company Websites.vtt |
22 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.3 Social Media Lab Part 1.mp4 |
58.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.3 Social Media Lab Part 1.vtt |
20 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.4 Social Media Lab Part 2.mp4 |
49.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.4 Social Media Lab Part 2.vtt |
19 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.5 Social Media Lab Part 3.mp4 |
47 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.5 Social Media Lab Part 3.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.6 Whois Lab.mp4 |
24.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.6 Whois Lab.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.1 Scanning and Enumeration.mp4 |
36.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.1 Scanning and Enumeration.vtt |
22 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.2 NMAP Lab Part 1.mp4 |
55.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.2 NMAP Lab Part 1.vtt |
21 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.3 NMAP Lab Part 2.mp4 |
48.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.3 NMAP Lab Part 2.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.1 Course Overview.mp4 |
6.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.1 Course Overview.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.2 What is the MITRE ATT&CK Framework.mp4 |
23.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.2 What is the MITRE ATT&CK Framework.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.3 Where is the MITRE ATT&CK Framework Being Used.mp4 |
31.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.3 Where is the MITRE ATT&CK Framework Being Used.vtt |
18 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.4 Navigation and Review.mp4 |
93.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.4 Navigation and Review.vtt |
15 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.1 What is Initial Access.mp4 |
11 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.1 What is Initial Access.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.2 External Remote Services.mp4 |
28 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.2 External Remote Services.vtt |
20 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.3 Spearphishing Link.mp4 |
48.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.3 Spearphishing Link.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.4 Supply Chain Compromise Part 1.mp4 |
28.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.4 Supply Chain Compromise Part 1.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.5 Supply Chain Compromise Part 2.mp4 |
15.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.5 Supply Chain Compromise Part 2.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.6 Trusted Relationship.mp4 |
30.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.6 Trusted Relationship.vtt |
23 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.7 Valid Accounts Part 1.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.7 Valid Accounts Part 1.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.8 Valid Accounts Part 2.mp4 |
18 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.8 Valid Accounts Part 2.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.9 Initial Access Case Study.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.9 Initial Access Case Study.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.10 Module 2 Summary.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.10 Module 2 Summary.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.1 What is Execution.mp4 |
5.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.1 What is Execution.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.2 Command Line Interface.mp4 |
40.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.2 Command Line Interface.vtt |
18 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.3 Execution Through API.mp4 |
14.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.3 Execution Through API.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.4 Control Panel Items.mp4 |
29.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.4 Control Panel Items.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.5 Powershell.mp4 |
25.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.5 Powershell.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.6 Scripting.mp4 |
22.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.6 Scripting.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.7 User Execution.mp4 |
22.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.7 User Execution.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.8 Execution Case Study.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.8 Execution Case Study.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.9 Module 3 Summary.mp4 |
10.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.9 Module 3 Summary.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.1 What is Persistence.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.1 What is Persistence.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.2 Accessibility Features.mp4 |
26.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.2 Accessibility Features.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.3 Bootkit.mp4 |
18.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.3 Bootkit.vtt |
15 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.4 Browser Extension.mp4 |
25.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.4 Browser Extension.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.5 Component Firmware.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.5 Component Firmware.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.6 Create Account.mp4 |
24.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.6 Create Account.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.7 Hooking.mp4 |
8.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.7 Hooking.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.8 New Service.mp4 |
19 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.8 New Service.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.9 Persistence Case Study.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.9 Persistence Case Study.vtt |
10 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.10 Module 4 Summary.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.10 Module 4 Summary.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.1 What is Privilege Escalation.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.1 What is Privilege Escalation.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.2 Access Token Manipulation.mp4 |
19.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.2 Access Token Manipulation.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.3 Elevation Escalation with Prompt.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.3 Elevation Escalation with Prompt.vtt |
10 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.4 Exploitation for Privilege Escalation.mp4 |
21.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.4 Exploitation for Privilege Escalation.vtt |
15 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.5 File System Permission Weakness.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.5 File System Permission Weakness.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.6 Scheduled Task.mp4 |
15 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.6 Scheduled Task.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.7 Sudo.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.7 Sudo.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.8 Web Shell.mp4 |
23.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.8 Web Shell.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.9 Privilege Escalation Case Study.mp4 |
48.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.9 Privilege Escalation Case Study.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.10 Module 5 Summary.mp4 |
4.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.10 Module 5 Summary.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.1 What is Defense Evasion.mp4 |
5.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.1 What is Defense Evasion.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.2 Clear Command History.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.2 Clear Command History.vtt |
10 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.3 Compile After Delivery.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.3 Compile After Delivery.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.4 Disabling Security Tools.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.4 Disabling Security Tools.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.5 Hidden Files and Directories.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.5 Hidden Files and Directories.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.6 Hidden Users.mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.6 Hidden Users.vtt |
6 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.7 Process Hollowing.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.7 Process Hollowing.vtt |
10 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.8 Software Packing.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.8 Software Packing.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.9 Defense Evasion Case Study.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.9 Defense Evasion Case Study.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.10 Module 6 Summary.mp4 |
5.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.10 Module 6 Summary.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.1 What is Credential Access.mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.1 What is Credential Access.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.2 Bash History.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.2 Bash History.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.3 Brute Forces.mp4 |
15.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.3 Brute Forces.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.4 Credential Dumping.mp4 |
9.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.4 Credential Dumping.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.5 Steal Web Session Cookie.mp4 |
10 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.5 Steal Web Session Cookie.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.6 Credential Access Case Study.mp4 |
8.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.6 Credential Access Case Study.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.7 Module 7 Summary.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.7 Module 7 Summary.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.1 What is Discovery.mp4 |
3.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.1 What is Discovery.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.2 Account Discovery.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.2 Account Discovery.vtt |
10 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.3 Browser Bookmark Discovery.mp4 |
15 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.3 Browser Bookmark Discovery.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.4 System Owner or User Discovery.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.4 System Owner or User Discovery.vtt |
6 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.5 Discovery Case Study.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.5 Discovery Case Study.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.6 Module 8 Summary.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.6 Module 8 Summary.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.1 What is Lateral Movement.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.1 What is Lateral Movement.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.2 Application Deployment Software.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.2 Application Deployment Software.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.3 Exploitation of Remote Services.mp4 |
18 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.3 Exploitation of Remote Services.vtt |
14 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.4 SSH Hijacking.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.4 SSH Hijacking.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.5 Lateral Movement Case Study.mp4 |
18.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.5 Lateral Movement Case Study.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.6 Module 9 Summary.mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.6 Module 9 Summary.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.1 What is Collection.mp4 |
2.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.1 What is Collection.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.2 Audio Capture.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.2 Audio Capture.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.3 Clipboard Data.mp4 |
18.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.3 Clipboard Data.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.4 Data from Local System.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.4 Data from Local System.vtt |
6 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.5 Collection Case Study.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.5 Collection Case Study.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.6 Module 10 Summary.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.6 Module 10 Summary.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.1 What is Command Control.mp4 |
2.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.1 What is Command Control.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.2 Commonly Used Port.mp4 |
8.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.2 Commonly Used Port.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.3 Custom Command and Control Protocol.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.3 Custom Command and Control Protocol.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.4 Uncommonly Used Ports.mp4 |
9.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.4 Uncommonly Used Ports.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.5 Command and Control Case Study.mp4 |
6.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.5 Command and Control Case Study.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.6 Module 11 Summary.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.6 Module 11 Summary.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.1 What is Exfiltration.mp4 |
1.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.1 What is Exfiltration.vtt |
1 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.2 Automated Exfiltration.mp4 |
8.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.2 Automated Exfiltration.vtt |
7 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.3 Data Compressed.mp4 |
6.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.3 Data Compressed.vtt |
6 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.4 Data Transfer Size or Limits.mp4 |
6.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.4 Data Transfer Size or Limits.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.5 Exfiltration Case Study.mp4 |
7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.5 Exfiltration Case Study.vtt |
5 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.6 Module 12 Summary.mp4 |
3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.6 Module 12 Summary.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.1 What is Impact.mp4 |
2.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.1 What is Impact.vtt |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.2 Account Access Removal.mp4 |
7.1 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.2 Account Access Removal.vtt |
6 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.3 Defacement.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.3 Defacement.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.4 Impact Case Study.mp4 |
6.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.4 Impact Case Study.vtt |
6 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.5 Module 13 Summary.mp4 |
1.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.5 Module 13 Summary.vtt |
1 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 14 - Conclusion/14.1 Course Summary.mp4 |
7.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 14 - Conclusion/14.1 Course Summary.vtt |
4 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Glossary__1_.pdf |
238 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Study_Guide__2___1_.pdf |
1.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Syllabus_and_Outline.pdf |
124 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.mp4 |
65.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.vtt |
19 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.2 Finding and Researching the Behavior.mp4 |
37.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.2 Finding and Researching the Behavior.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.3 Translating the Behavior into a Tactic.mp4 |
56.9 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.3 Translating the Behavior into a Tactic.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.4 Identifying Techniques or Sub-Techniques.mp4 |
57.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.4 Identifying Techniques or Sub-Techniques.vtt |
16 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.5 Mapping to a Narrative Point.mp4 |
52.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.5 Mapping to a Narrative Point.vtt |
12 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.6 Hedging Your Biases.mp4 |
42.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.6 Hedging Your Biases.vtt |
17 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.1 The Process of Mapping from Raw Data.mp4 |
28.5 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.1 The Process of Mapping from Raw Data.vtt |
11 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.2 Identify and Research Behaviors.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.2 Identify and Research Behaviors.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4 |
19 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.4 Raw Data to Narrative Reporting.mp4 |
39.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.4 Raw Data to Narrative Reporting.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.1 Storing and Displaying ATT&CK®-Mapped Data.mp4 |
13.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.1 Storing and Displaying ATT&CK®-Mapped Data.vtt |
6 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.2 Expressing and Storing ATT&CK®-Mapped Data.mp4 |
18.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.2 Expressing and Storing ATT&CK®-Mapped Data.vtt |
8 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.3 Analyzing ATT&CK®-Mapped Data.mp4 |
25.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.3 Analyzing ATT&CK®-Mapped Data.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4 |
8.4 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.vtt |
3 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.1 The Defensive Recommendations Process.mp4 |
21.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.1 The Defensive Recommendations Process.vtt |
9 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.mp4 |
40.7 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.vtt |
13 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4 |
46.2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.vtt |
15 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.4 Make Defensive Recommendations.mp4 |
57.8 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.4 Make Defensive Recommendations.vtt |
19 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39-and-Cobalt-Kitty-Techniques.pdf |
137 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39_Annotations.pdf |
453 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39_Answers.pdf |
542 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39_Original_Report.pdf |
416 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cobalt_Kitty_-_Exercise_Answers.pdf |
2.6 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cobalt_Kitty_-_Exercise_Hints.pdf |
2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cobalt_Kitty_-_Original_Report.pdf |
6.3 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cyber_Kitty_-_Exercise.pdf |
2 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making_Defensive_Recommendations_Guided_Exercise.rtf |
50 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making_Defensive_Recommendations_Unguided_Exercise.rtf |
54 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/MITRE_ATT_CK_Defender_____MAD__ATT_CK___Cyber_Threat_Intelligence_Certification_Training_Syllabus_and_Outline.pdf |
96 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822.rtf |
1 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822_answers.pdf |
84 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845.rtf |
2 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845_answers.pdf |
112 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/11. Evasion for Incident Handlers/Module 1 - Evasion for Incident Handlers/1.1 Evasion.mp4 |
14 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/11. Evasion for Incident Handlers/Module 1 - Evasion for Incident Handlers/1.1 Evasion.vtt |
10 KB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/12. Stealth Techniques for Incident Handlers/Module 1 - Stealth Techniques for Incident Handlers/1.1 Being Stealthy.mp4 |
43 MB |
DIY Cybersecurity Degree/Cybrary/Cybrary - Become an Incident Handler/12. Stealth Techniques for Incident Handlers/Module 1 - Stealth Techniques for Incident Handlers/1.1 Being Stealthy.vtt |
20 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/1. Welcome to the Google Cybersecurity Certificate.mp4 |
47.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/2. Google Cybersecurity Certificate overview.html |
500 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/3. Course 1 overview.html |
1.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/4. Welcome to week 1.mp4 |
4.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/5. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/6. Participate in program surveys.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/1. Introduction to cybersecurity.mp4 |
23.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/2. Toni - My path to cybersecurity.mp4 |
20 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/3. Responsibilities of an entry-level cybersecurity analyst.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/4. Nikki - A day in the life of a security engineer.mp4 |
16.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/5. Common cybersecurity terminology.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/1. Core skills for cybersecurity professionals.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/2. Veronica - My path to working in cybersecurity.mp4 |
11 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/3. Transferable and technical cybersecurity skills.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/4. The importance of cybersecurity.mp4 |
17.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/1. Wrap-up.mp4 |
4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/2. Glossary terms from week 1.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/1. Welcome to week 2.mp4 |
6.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/2. Past cybersecurity attacks.mp4 |
22 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/3. Attacks in the digital age.mp4 |
25.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/4. Common attacks and their effectiveness.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/5. Sean - Keep your cool during a data breach.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/1. Introduction to the eight CISSP security domains, Part 1.mp4 |
18.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/2. Introduction to the eight CISSP security domains, Part 2.mp4 |
17.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/3. Determine the type of attack.html |
225 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/4. Understand attackers.html |
313 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/03_review-the-evolution-of-cybersecurity/1. Wrap-up.mp4 |
7.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/03_review-the-evolution-of-cybersecurity/2. Glossary terms from week 2.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/1. Welcome to week 3.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/2. Introduction to security frameworks and controls.mp4 |
23.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/3. Secure design.mp4 |
19.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/4. Controls, frameworks, and compliance.html |
152 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/5. Heather - Protect sensitive data and information.mp4 |
16.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/02_ethics-in-cybersecurity/1. Ethics in cybersecurity.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/02_ethics-in-cybersecurity/2. Ethical concepts that guide cybersecurity decisions.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/02_ethics-in-cybersecurity/3. Holly - The importance of ethics as a cybersecurity professional.mp4 |
14.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/1. Wrap-up.mp4 |
4.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/2. Glossary terms from week 3.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/1. Welcome to week 4.mp4 |
7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/2. Common cybersecurity tools.mp4 |
20.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/3. Tools for protecting business operations.html |
652 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf |
3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/02_core-cybersecurity-knowledge-and-skills/1. Introduction to Linux, SQL, and Python.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/02_core-cybersecurity-knowledge-and-skills/2. Use tools to protect business operations.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/02_core-cybersecurity-knowledge-and-skills/3. Create a cybersecurity portfolio.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/03_review-cybersecurity-tools-and-programming-languages/1. Wrap-up.mp4 |
2.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/03_review-cybersecurity-tools-and-programming-languages/2. Glossary terms from week 4.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/1. Course wrap-up.mp4 |
7.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/2. Course 1 glossary.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/3. Get started on the next course.html |
796 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/02_course-1-glossary_Course_1_glossary.docx |
859 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/01_frequently-asked-questions/01__resources.html |
19 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/02_course-1-glossary/01__Course_1_glossary.docx |
859 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/02_course-1-glossary/01__resources.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__55.html |
42 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__cis-controls-and-the-hph.pdf |
1.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__display.cfm |
37 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__gcat_threathorizons_full_sept2022.pdf |
3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__hipaa.html |
196 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__index.html |
1.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__IntroToCybersecurityEthics.pdf |
579 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__ncsam_eskimming_508.pdf |
781 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__nist_small_business_fundamentals_july_2019.pptx |
4.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__R46536.pdf |
1.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__resources.html |
28 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__rules-and-security-requirements.html |
75 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__why-splunk.html |
227 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/04_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/04_google-cybersecurity-certificate-glossary/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/05_frequently-asked-questions/01__resources.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/1. Introduction to Course 2.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/2. Course 2 overview.html |
1.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/3. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/1. Welcome to week 1.mp4 |
4.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/2. Explore the CISSP security domains, Part 1.mp4 |
19.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/3. Explore the CISSP security domains, Part 2.mp4 |
18.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/4. Security domains cybersecurity analysts need to know.html |
195 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/5. Ashley - My path to cybersecurity.mp4 |
19.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/1. Threats, risks, and vulnerabilities.mp4 |
17 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/2. Key impacts of threats, risks, and vulnerabilities.mp4 |
17.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/3. Herbert - Manage threats, risks, and vulnerabilities.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/4. NIST’s Risk Management Framework.mp4 |
16.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/5. Manage common threats, risks, and vulnerabilities.html |
779 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/04_review-security-domains/1. Wrap-up.mp4 |
3.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/04_review-security-domains/2. Glossary terms from week 1.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/1. Welcome to week 2.mp4 |
5.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/2. Frameworks.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/3. Controls.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/4. The relationship between frameworks and controls.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf |
6.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/1. Explore the CIA triad.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/2. Use the CIA triad to protect organizations.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/03_nist-frameworks/1. NIST frameworks.mp4 |
18 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/03_nist-frameworks/2. Explore the five functions of the NIST Cybersecurity Framework.mp4 |
15.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/1. OWASP security principles.mp4 |
19.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/2. More about OWASP security principles.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/3. Wajih - Stay up-to-date on the latest cybersecurity threats.mp4 |
10 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/4. Plan a security audit.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/5. Complete a security audit.mp4 |
17 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/6. More about security audits.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/06_more-about-security-audits_Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf |
1.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/06_more-about-security-audits_Control_categories.docx |
838 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/1. Wrap-up.mp4 |
7.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/2. Glossary terms from week 2.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/1. Welcome to week 3.mp4 |
4.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/2. Logs and SIEM tools.mp4 |
8.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/3. SIEM dashboards.mp4 |
10.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/4. The future of SIEM tools.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/5. Parisa - The parallels of accessibility and security.mp4 |
16.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/1. Explore common SIEM tools.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/2. More about cybersecurity tools.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/3. Talya - Myths about the cybersecurity field.mp4 |
9.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/4. Use SIEM tools to protect organizations.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/1. Wrap-up.mp4 |
2.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/2. Glossary terms from week 3.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/1. Welcome to week 4.mp4 |
3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/2. Phases of an incident response playbook.mp4 |
24.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/3. More about playbooks.html |
200 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/03_more-about-playbooks_guidelines.html |
17 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/1. Use a playbook to respond to threats, risks, or vulnerabilities.mp4 |
19 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/2. Erin - The importance of diversity of perspective on a security team.mp4 |
19.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/3. Playbooks, SIEM tools, and SOAR tools.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/1. Wrap-up.mp4 |
4.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/2. Glossary terms from week 4.html |
1 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/1. Course wrap-up.mp4 |
5.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/2. Course 2 glossary.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/3. Get started on the next course.html |
793 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/02_course-2-glossary_Course_2_glossary.docx |
859 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/01_frequently-asked-questions/01__resources.html |
19 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/03_course-2-glossary/01__Course_2_glossary.docx |
859 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/03_course-2-glossary/01__resources.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf |
1.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Cyber-Incident-Response-Standard.docx |
63 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__dod85.pdf |
240 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf |
1.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Format-Security-plus-Study-Guide.pdf |
17 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__guidelines.html |
17 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__index.html |
21 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__NIST.SP.800-53r5.pdf |
5.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__NIST.SP.800-218.pdf |
723 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__physical-access-control.pdf |
6.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__resources.html |
33 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__why-splunk.html |
227 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/05_frequently-asked-questions/01__resources.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/1. Introduction to Course 3.mp4 |
3.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/2. Course 3 overview.html |
1.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/3. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/1. Welcome to week 1.mp4 |
2.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/2. Chris - My path to cybersecurity.mp4 |
18.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/3. What are networks.mp4 |
6.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/4. Tina - Working in network security.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/5. Emmanuel - Useful skills for network security.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/6. Network tools.mp4 |
7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/7. Network components, devices, and diagrams.html |
1.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/8. Cloud networks.mp4 |
8.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/9. Cloud computing and software-defined networks.html |
694 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/10. Test your knowledge - Introduction to networks.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/1. Introduction to network communication.mp4 |
7.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/2. The TCPIP model.mp4 |
9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/3. The four layers of the TCPIP model.mp4 |
6.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/4. Learn more about the TCPIP model.html |
1.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/5. The OSI model .html |
303 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/6. Test your knowledge - Network communication.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/04_local-and-wide-network-communication/1. IP addresses and network communication.mp4 |
7.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/04_local-and-wide-network-communication/2. Components of network layer communication.html |
642 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/04_local-and-wide-network-communication/3. Test your knowledge - Local and wide network communication.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/05_review-network-architecture/1. Wrap-up.mp4 |
1.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/05_review-network-architecture/2. Glossary terms from week 1.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/05_review-network-architecture/3. Weekly challenge 1.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/1. Welcome to week 2.mp4 |
4.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/2. Network protocols.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/3. Common network protocols.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/4. Additional network protocols.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/5. Test your knowledge - Recognize different network protocols.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/6. Wireless protocols.mp4 |
5.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/7. The evolution of wireless security protocols.html |
159 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/1. Firewalls and network security measures.mp4 |
16.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/2. Virtual private networks (VPNs).mp4 |
8.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/3. Security zones.mp4 |
12 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/4. Subnetting and CIDR.html |
134 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/5. Proxy servers.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/6. Virtual networks and privacy.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/7. Test your knowledge - System identification.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/03_review-network-operations/1. Wrap-up.mp4 |
2.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/03_review-network-operations/2. Glossary terms from week 2.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/03_review-network-operations/3. Weekly challenge 2.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/01_introduction-to-network-intrusion-tactics/1. Welcome to week 3.mp4 |
1.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/01_introduction-to-network-intrusion-tactics/2. The case for securing networks.mp4 |
5.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/01_introduction-to-network-intrusion-tactics/3. How intrusions compromise your system.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/1. Denial of Service (DoS) attacks.mp4 |
18.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/2. Read tcpdump logs.html |
147 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/3. Activity Exemplar - Analyze network layer communication.html |
1 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/4. Real-life DDoS attack.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/5. Test your knowledge - Secure networks against Denial of Service (DoS) attacks.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/1. Malicious packet sniffing.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/2. IP Spoofing.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/3. Overview of interception tactics.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/4. Activity Exemplar - Analyze network attacks.html |
1 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/5. Test your knowledge - Network interception attack tactics.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/04_review-secure-against-network-intrusion/1. Wrap-up.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/04_review-secure-against-network-intrusion/2. Glossary terms from week 3.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/04_review-secure-against-network-intrusion/3. Weekly challenge 3.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/01_introduction-to-security-hardening/1. Welcome to week 4.mp4 |
3.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/01_introduction-to-security-hardening/2. Security hardening.mp4 |
12.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/1. OS hardening practices.mp4 |
18 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/2. Brute force attacks and OS hardening.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/3. Activity - Apply OS hardening techniques.html |
1 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/4. Test your knowledge - OS hardening.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/1. Network hardening practices.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/2. Network security applications.html |
2.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/3. Activity - Analysis of network hardening.html |
1 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/4. Test your knowledge - Network hardening.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/1. Network security in the cloud.mp4 |
9.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/2. Kelsey - Cloud security explained.mp4 |
21.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/3. Secure the cloud.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/4. Test your knowledge - Cloud hardening.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/1. Wrap-up.mp4 |
3.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/2. Glossary terms from week 4.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/3. Weekly challenge 4.html |
10 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/4. Portfolio Activity - Use the NIST Cybersecurity Framework to respond to a security incident.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/1. Course wrap-up.mp4 |
6.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/2. Course 3 glossary.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/3. Get started on the next course.html |
786 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_Course_3_glossary.docx |
858 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/01_frequently-asked-questions/01__resources.html |
19 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/03_course-3-glossary/01__Course_3_glossary.docx |
858 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/03_course-3-glossary/01__resources.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__7.1 |
12 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__7.2 |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__aa494182vexchg.140 |
34 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__article.asp |
63 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__index.html |
23 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__resources.html |
18 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__sp800-179r1-draft.pdf |
1.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__what-is-a-firewall.html |
61 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/05_frequently-asked-questions/01__resources.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/1. Introduction to Course.mp4 |
8.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/2. Course 4 overview.html |
1.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/3. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/1. Welcome to week 1.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/2. Kim - My journey into computing.mp4 |
10.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/3. Introduction to operating systems.mp4 |
11.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/4. Compare operating systems.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/03_the-operating-system-at-work/1. Inside the operating system.mp4 |
10.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/03_the-operating-system-at-work/2. Requests to the operating system.html |
134 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/03_the-operating-system-at-work/3. Resource allocation via the OS.mp4 |
9.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/04_the-user-interface/1. GUI versus CLI.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/04_the-user-interface/2. The command line in use.html |
197 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/04_the-user-interface/3. Ellen - My path into cybersecurity.mp4 |
12.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/05_review-introduction-to-operating-systems/1. Wrap-up.mp4 |
3.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/05_review-introduction-to-operating-systems/2. Glossary terms from week 1.html |
2 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/1. Welcome to week 2.mp4 |
3.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/2. Introduction to Linux.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/3. Phil - Learn and grow in the cybersecurity field.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/4. Linux architecture.mp4 |
11.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/5. Linux architecture explained.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/1. Linux distributions.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/2. KALI LINUX.mp4 |
7.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/3. More Linux distributions.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/4. Resources for completing Linux labs.html |
109 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/03_the-shell/1. Introduction to the shell.mp4 |
6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/03_the-shell/2. Input and output in the shell.mp4 |
8.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/04_review-the-linux-operating-system/1. Wrap-up.mp4 |
2.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/04_review-the-linux-operating-system/2. Glossary terms from week 2.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/1. Welcome to week 3.mp4 |
5.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/2. Linux commands via the Bash shell.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/3. Core commands for navigation and reading files.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/4. Navigate Linux and read file content.html |
105 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/1. Find what you need with Linux.mp4 |
10.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/2. Filter content in Linux.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/3. Create and modify directories and files.mp4 |
17.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/4. Manage directories and files.html |
10 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/1. File permissions and ownership.mp4 |
16.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/2. Change permissions.mp4 |
9.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/3. Permission commands.html |
15 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/4. Add and delete users.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/5. Responsible use of sudo.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/1. Damar - My journey into Linux commands.mp4 |
13.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/2. The Linux community.mp4 |
6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/3. Man pages within the shell.mp4 |
6.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/4. Linux resources.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/05_review-linux-commands-in-the-bash-shell/1. Wrap-up.mp4 |
3.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/05_review-linux-commands-in-the-bash-shell/2. Glossary terms from week 3.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/1. Welcome to week 4.mp4 |
5.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/2. Introduction to databases.mp4 |
10.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/3. Query databases with SQL.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/4. SQL filtering versus Linux filtering.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/5. Adedayo - SQL in cybersecurity.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/1. Basic queries.mp4 |
9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/2. Query a database.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/3. Resources for completing SQL labs.html |
109 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/4. Basic filters on SQL queries.mp4 |
14.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/5. The WHERE clause and basic operators.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/1. Filter dates and numbers.mp4 |
11 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/2. Operators for filtering dates and numbers.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/3. Filters with AND, OR, and NOT.mp4 |
16.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/4. More on filters with AND, OR, and NOT.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/1. Join tables in SQL.mp4 |
12.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/2. Types of joins.mp4 |
8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/3. Compare types of joins.html |
1.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/4. Continuous learning in SQL.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/05_review-databases-and-sql/1. Wrap-up.mp4 |
3.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/05_review-databases-and-sql/2. Glossary terms from week 4.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/1. Course wrap-up.mp4 |
3.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/2. Course 4 glossary.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/3. Get started on the next course.html |
784 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/02_course-4-glossary_Course_4_glossary.docx |
1.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/01_frequently-asked-questions/01__resources.html |
19 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/03_resources-for-completing-linux-labs/01__resources.html |
109 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/04_resources-for-completing-sql-labs/01__resources.html |
109 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/05_course-4-glossary/01__Course_4_glossary.docx |
1.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/05_course-4-glossary/01__resources.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__01-intro.html |
63 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__bootup.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__Linux-in-a-Nutshell-6th-Edition.pdf |
12.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__operating-system2.htm |
154 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__resources.html |
20 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__ShellIntro.pdf |
124 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__subsection3.1.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__thegnuproject.html |
65 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/07_frequently-asked-questions/01__resources.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/08_create-a-cybersecurity-portfolio/01__resources.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/1. Introduction to Course 5.mp4 |
16.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/2. Course 5 overview.html |
1.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/3. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/4. Da'Queshia - My path to cybersecurity.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/1. Welcome to week 1.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/2. The what, why, and how of asset security.mp4 |
20.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/3. Understand risks, threats, and vulnerabilities.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/4. Tri - Life in asset security.mp4 |
17 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/5. Security starts with asset classification.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/6. Common classification requirements.html |
106 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/03_digital-and-physical-assets/1. Assets in a digital world.mp4 |
18 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/03_digital-and-physical-assets/2. The emergence of cloud security.html |
141 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/1. Elements of a security plan.mp4 |
20.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/2. The NIST Cybersecurity Framework.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/3. Security guidelines in action.html |
473 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/03_security-guidelines-in-action_Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf |
1.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/05_review-introduction-to-asset-security/1. Wrap-up.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/05_review-introduction-to-asset-security/2. Glossary terms from week 1.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/1. Welcome to week 2.mp4 |
9.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/2. Security controls.mp4 |
19.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/3. Principle of least privilege.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/4. Information privacy - Regulations and compliance.html |
129 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/5. Heather - The importance of protecting PII.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/1. Fundamentals of cryptography.mp4 |
22.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/2. Public key infrastructure.mp4 |
21.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/3. Symmetric and asymmetric encryption.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/4. Resources for completing labs.html |
109 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/5. Non-repudiation and hashing.mp4 |
13.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/6. The evolution of hash functions.html |
585 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/1. Access controls and authentication systems.mp4 |
18.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/2. The rise of SSO and MFA.html |
370 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/3. The mechanisms of authorization.mp4 |
25.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/4. Why we audit user activity.mp4 |
16.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/5. Tim - Finding purpose in protecting assets.mp4 |
7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/6. Identity and access management.html |
303 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/04_review-protect-organizational-assets/1. Wrap-up.mp4 |
8.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/04_review-protect-organizational-assets/2. Glossary terms from week 2.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/1. Welcome to week 3.mp4 |
9.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/2. Vulnerability management.mp4 |
22 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/3. Defense in depth strategy.mp4 |
19.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/4. Common vulnerabilities and exposures.mp4 |
27.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/5. The OWASP Top 10.html |
142 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/1. Vulnerability assessments.mp4 |
19.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/2. Approaches to vulnerability scanning.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/3. The importance of updates.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/4. Omad - My learning journey into cybersecurity.mp4 |
9.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/1. Protect all entry points.mp4 |
22.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/2. Approach cybersecurity with an attacker mindset.html |
206 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/3. Types of threat actors.html |
493 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/4. Niru - Adopt an attacker mindset.mp4 |
18.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/5. Pathways through defenses.mp4 |
22.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/6. Fortify against brute force cyber attacks.html |
153 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf |
1.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/04_review-vulnerabilities-in-systems/1. Wrap-up.mp4 |
11.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/04_review-vulnerabilities-in-systems/2. Glossary terms from week 3.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/1. Welcome to week 4.mp4 |
8.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/2. The criminal art of persuasion.mp4 |
21.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/3. Social engineering tactics.html |
175 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/4. Phishing for information.mp4 |
24 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/5. Types of phishing.html |
339 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/02_malware/1. Malicious software.mp4 |
24.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/02_malware/2. An introduction to malware.html |
164 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/02_malware/3. The rise of cryptojacking.mp4 |
23.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/03_web-based-exploits/1. Cross-site scripting.mp4 |
21.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/03_web-based-exploits/2. Exploitable gaps in databases.mp4 |
17.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/1. A proactive approach to security.mp4 |
17.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/2. Chantelle - The value of diversity in cybersecurity.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/3. PASTA - The Process for Attack Simulation and Threat Analysis.mp4 |
17.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/4. Traits of an effective threat model.html |
121 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/05_review-threats-in-cybersecurity/1. Wrap-up.mp4 |
8.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/05_review-threats-in-cybersecurity/2. Glossary terms from week 4.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/1. Course wrap-up.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/2. Course 5 glossary .html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/3. Get started on the next course.html |
795 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/02_course-5-glossary_Course_5_glossary.docx |
862 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/01_frequently-asked-questions/01__resources.html |
19 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/03_resources-for-completing-labs/01__resources.html |
108 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__2-4-3.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__5-signs-youve-been-hit-with-an-apt.html |
172 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__5.2 |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__7.5 |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__16-software-updates.html |
26 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__csos-guide-to-phishing-and-phishing-kits.html |
156 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__encryption-explained.html |
45 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__FULL_TEXT.pdf |
1.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html |
155 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html |
160 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__hipaa.html |
196 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__malware.html |
212 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__NIST.FIPS.140-3.pdf |
304 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__paper.pdf |
197 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__resources.html |
60 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__sql_injection.asp |
110 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__ssrf-attacks-explained-and-how-to-defend-against-them.html |
156 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf |
1.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__vulnerability-vs-threat-vs-risk.html |
77 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-cve-its-definition-and-purpose.html |
169 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-owasp-top-10.html |
248 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-phishing-examples-types-and-techniques.html |
161 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/05_course-5-glossary/01__Course_5_glossary.docx |
862 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/05_course-5-glossary/01__resources.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/06_frequently-asked-questions/01__resources.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/07_create-a-cybersecurity-portfolio/01__resources.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/1. Introduction to Course 6.mp4 |
7.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/2. Course 6 overview.html |
1.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/3. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/4. Dave - Grow your cybersecurity career with mentors.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/02_the-incident-response-lifecycle/1. Welcome to week 1.mp4 |
5.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/02_the-incident-response-lifecycle/2. Introduction to the incident response lifecycle.mp4 |
16 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/1. Incident response teams.mp4 |
12.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/2. Fatima - The importance of communication during incident response.mp4 |
15.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/3. Roles in response.html |
84 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/4. Incident response plans.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/1. Incident response tools.mp4 |
5.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/2. The value of documentation.mp4 |
11 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/3. Intrusion detection systems.mp4 |
5.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/4. Overview of detection tools.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/5. Alert and event management with SIEM and SOAR tools.mp4 |
14.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/05_review-introduction-to-detection-and-incident-response/1. Wrap-up.mp4 |
2.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/05_review-introduction-to-detection-and-incident-response/2. Glossary terms from week 1.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/1. Welcome to week 2.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/2. Casey - Apply soft skills in cybersecurity.mp4 |
13.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/3. The importance of network traffic flows.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/4. Maintain awareness with network monitoring.html |
294 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/5. Data exfiltration attacks.mp4 |
15.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/1. Packets and packet captures.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/2. Learn more about packet captures.html |
736 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/3. Interpret network communications with packets.mp4 |
7.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/4. Reexamine the fields of a packet header.mp4 |
13.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/5. Investigate packet details.html |
3.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/6. Resources for completing labs.html |
109 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/03_packet-inspection/1. Packet captures with tcpdump.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/03_packet-inspection/2. Overview of tcpdump.html |
132 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/03_packet-inspection/02_overview-of-tcpdump_tcpdump.1.html |
73 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/04_review-network-monitoring-and-analysis/1. Wrap-up.mp4 |
3.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/04_review-network-monitoring-and-analysis/2. Glossary terms from week 2.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/1. Welcome to week 3.mp4 |
3.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/2. The detection and analysis phase of the lifecycle.mp4 |
8.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/3. Cybersecurity incident detection methods.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/4. MK - Changes in the cybersecurity industry.mp4 |
13.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/5. Indicators of compromise.html |
128 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/6. Analyze indicators of compromise with investigative tools.html |
1.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/05_indicators-of-compromise_the-pyramid-of-pain.html |
67 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/1. The benefits of documentation.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/2. Document evidence with chain of custody forms.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/3. Best practices for effective documentation.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/4. The value of cybersecurity playbooks.mp4 |
13 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/1. The role of triage in incident response.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/2. Robin - Foster cross-team collaboration.mp4 |
14.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/3. The triage process.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/4. The containment, eradication, and recovery phase of the lifecycle.mp4 |
9.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/5. Business continuity considerations.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/04_post-incident-actions/1. The post-incident activity phase of the lifecycle.mp4 |
8.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/04_post-incident-actions/2. Post-incident review.html |
233 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/05_review-incident-investigation-and-response/1. Wrap-up.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/05_review-incident-investigation-and-response/2. Glossary terms from week 3.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/1. Welcome to week 4.mp4 |
5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/2. The importance of logs.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/3. Best practices for log collection and management.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/4. Rebecca - Learn new tools and technologies.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/5. Variations of logs.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/6. Overview of log file formats.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/1. Security monitoring with detection tools.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/2. Detection tools and techniques.html |
343 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/3. Components of a detection signature.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/4. Examine signatures with Suricata.mp4 |
8.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/5. Examine Suricata logs.mp4 |
7.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/6. Overview of Suricata.html |
124 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_eve-json-examplesjq.html |
23 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_index.html |
33 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_suricata-update.html |
23 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_suricata-yaml.html |
237 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/1. Reexamine SIEM tools.mp4 |
9.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/2. Query for events with Splunk.mp4 |
9.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/3. Query for events with Chronicle.mp4 |
8.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/4. Search methods with SIEM tools.html |
416 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/1. Wrap-up.mp4 |
3.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/2. Glossary terms from week 4.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/1. Course wrap-up.mp4 |
5.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/2. Course 6 glossary.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/3. Get started on the next course.html |
789 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/02_course-6-glossary_Course_6_glossary.docx |
860 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/01_frequently-asked-questions/01__resources.html |
19 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/03_resources-for-completing-labs/01__resources.html |
108 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/04_course-6-glossary/01__Course_6_glossary.docx |
860 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/04_course-6-glossary/01__resources.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf |
142 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf |
361 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__index.html |
33 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__network-operations-center.html |
220 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__nist.sp.800-61r2.pdf |
1.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__nistspecialpublication800-92.pdf |
1.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__question525.htm |
170 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__RAID4.pdf |
285 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__resources.html |
37 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__suricata-update.html |
23 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__suricata-yaml.html |
237 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__tcpdump.1.html |
73 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__the-pyramid-of-pain.html |
67 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__xml_whatis.asp |
89 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/06_frequently-asked-questions/01__resources.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/07_create-a-cybersecurity-portfolio/01__resources.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/1. Introduction to Course 7.mp4 |
18 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/2. Course 7 overview.html |
1.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/3. Ángel - My personal career journey.mp4 |
16.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/4. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/1. Welcome to week 1.mp4 |
7.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/2. Python and cybersecurity.mp4 |
20.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/3. Get to know Python.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/4. Create a basic Python script.mp4 |
8.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/5. Python environments.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/6. Akash - Python and the cybersecurity professional.mp4 |
5.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/1. Data types in Python.mp4 |
19.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/2. More about data types.html |
12 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/3. Work with variables in Python.mp4 |
21.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/4. Assign and reassign variables in Python.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/1. Conditional statements in Python.mp4 |
17.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/2. More on conditionals in Python.html |
15 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/3. For loops.mp4 |
12.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/4. While loops.mp4 |
10.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/5. More on loops in Python.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/05_review-introduction-to-python/1. Wrap-up.mp4 |
3.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/05_review-introduction-to-python/2. Glossary terms from week 1.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/1. Welcome to week 2.mp4 |
5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/2. Introduction to functions.mp4 |
13.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/3. Create a basic function.mp4 |
7.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/4. Python functions in cybersecurity.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/1. Use parameters in functions.mp4 |
10.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/2. Return statements.mp4 |
13.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/3. Functions and variables.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/4. Explore built-in functions.mp4 |
21 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/5. Work with built-in functions.html |
269 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/05_work-with-built-in-functions_instructions.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/1. Modules and libraries.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/2. Code readability.mp4 |
19 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/3. Ensure proper syntax and readability in Python.html |
10 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/4. Dorsa - Use Python efficiently on a cybersecurity team.mp4 |
11.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/04_review-write-effective-python-code/1. Wrap-up.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/04_review-write-effective-python-code/2. Glossary terms from week 2.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/1. Welcome to week 3.mp4 |
4.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/2. String operations.mp4 |
21.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/3. String indices and slices.mp4 |
20.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/4. Strings and the security analyst.html |
13 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/02_work-with-lists-and-develop-algorithms/1. List operations in Python.mp4 |
19.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/02_work-with-lists-and-develop-algorithms/2. Write a simple algorithm.mp4 |
17.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/02_work-with-lists-and-develop-algorithms/3. Lists and the security analyst.html |
13 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/03_regular-expressions/1. Regular expressions in Python.mp4 |
21.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/03_regular-expressions/2. More about regular expressions.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/04_review-work-with-strings-and-lists/1. Wrap-up.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/04_review-work-with-strings-and-lists/2. Glossary terms from week 3.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/1. Welcome to week 4.mp4 |
5.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/2. Automate cybersecurity tasks with Python.mp4 |
19.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/3. Essential Python components for automation.html |
8 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/4. Clancy - Continual learning and Python.mp4 |
11.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/1. Access a text file in Python.mp4 |
10.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/2. Import files into Python.html |
107 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/3. Parse a text file in Python.mp4 |
10 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/4. Develop a parsing algorithm in Python.mp4 |
15.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/03_debug-python-code/1. Debugging strategies.mp4 |
23.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/03_debug-python-code/2. Apply debugging strategies.mp4 |
13.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/03_debug-python-code/3. Explore debugging techniques.html |
13 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/04_review-python-in-practice/1. Wrap-up.mp4 |
2.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/04_review-python-in-practice/2. Glossary terms from week 4.html |
3 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/1. Course wrap-up.mp4 |
11.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/2. Course 7 glossary.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/3. Get started on the next course.html |
806 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/02_course-7-glossary_Course_7_glossary.docx |
870 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/01_frequently-asked-questions/01__resources.html |
19 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/03_course-7-glossary/01__Course_7_glossary.docx |
870 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/03_course-7-glossary/01__resources.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/04_course-7-resources-and-citations/01__functions.html |
269 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/04_course-7-resources-and-citations/01__resources.html |
7 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/05_frequently-asked-questions/01__resources.html |
16 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html |
9 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/1. Introduction to Course 8.mp4 |
13.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/2. Course 8 overview.html |
1.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/3. Dion - My personal career journey.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/4. Helpful resources and tips.html |
11 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
879 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/02_event-and-incident-detection/1. Welcome to week 1.mp4 |
1.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/02_event-and-incident-detection/2. Security as a mindse.mp4 |
16.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/02_event-and-incident-detection/3. Data and asset classification.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/03_your-impact-on-data-protection/1. Detect and protect without neglect.mp4 |
18.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/03_your-impact-on-data-protection/2. Disaster recovery and business continuity.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/03_your-impact-on-data-protection/3. Juliana's story - Asset protection.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/04_review-protect-assets-and-communicate-incidents/1. Wrap-up.mp4 |
4.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/04_review-protect-assets-and-communicate-incidents/2. Glossary terms from week 1.html |
2 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/01_escalation-in-cybersecurity/1. Welcome to week 2.mp4 |
6.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/01_escalation-in-cybersecurity/2. The importance of escalation.mp4 |
19 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/01_escalation-in-cybersecurity/3. Escalate with a purpose.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/02_to-escalate-or-not-to-escalate/1. Prepare to escalate through security recognition.mp4 |
17.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/02_to-escalate-or-not-to-escalate/2. Recognize roles and responsibilities during escalation.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/1. From simple activity to major data breach.mp4 |
18.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/2. When and how to escalate a security incident.mp4 |
12.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/3. Escalation timing.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/4. Juliana's story - Attention to detail.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/04_review-escalate-incidents/1. Wrap-up.mp4 |
4.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/04_review-escalate-incidents/2. Glossary terms from week 2.html |
2 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/01_understand-your-stakeholders/1. Welcome to week 3.mp4 |
3.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/01_understand-your-stakeholders/2. Stakeholders in cybersecurity.mp4 |
15.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/01_understand-your-stakeholders/3. The purpose and impact of stakeholders.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/02_communicate-for-impact/1. Clear and concise communication .mp4 |
12.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/02_communicate-for-impact/2. Building blocks of cybersecurity communications.mp4 |
17 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/02_communicate-for-impact/3. Communicate effectively with stakeholders.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/1. Visual storytelling in cybersecurity.mp4 |
16.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/2. Create visual dashboards for impactful cybersecurity communications.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/3. How to create a visual dashboard.mp4 |
18.1 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/4. Juliana’s story - Effective communication.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/04_review-communicate-effectively-to-influence-stakeholders/1. Wrap-up.mp4 |
9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/04_review-communicate-effectively-to-influence-stakeholders/2. Glossary terms from week 3.html |
1 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/1. Welcome to week 4.mp4 |
6.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/2. Helpful cybersecurity resources.mp4 |
15.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/3. Strategies for engaging with the cybersecurity community.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/4. Victoria - Continue your learning journey.mp4 |
15.4 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/02_build-your-cybersecurity-network/1. Engage with the cybersecurity community in a meaningful way.mp4 |
14.7 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/02_build-your-cybersecurity-network/2. Connect with other cybersecurity professionals.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/02_build-your-cybersecurity-network/3. Sarah - Network in the cybersecurity community.mp4 |
10.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/03_review-engage-with-the-cybersecurity-community/1. Wrap-up.mp4 |
3.8 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/03_review-engage-with-the-cybersecurity-community/2. Glossary terms from week 4.html |
1 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/1. Welcome to week 5.mp4 |
7.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/2. Find cybersecurity jobs.mp4 |
16.3 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/3. Create a resume.mp4 |
11.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/4. Tips for finding and applying for a job.html |
4 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/5. Garvey - Cover letter tips.mp4 |
11.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/1. Explore the interview process.mp4 |
14 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/2. The interview process.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/3. Garvey - Technical interview tips.mp4 |
11.2 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/4. Prepare for technical interviews.html |
6 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/5. Conduct pre-interview research.mp4 |
12.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/6. Build rapport with interviewers.mp4 |
13.6 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/1. Use strategies to answer interview questions.mp4 |
12 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/2. Apply the STAR method during interviews.html |
51 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/3. Prepare for interviews.html |
5 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/4. Ask the interviewer questions.mp4 |
7.9 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/5. Karan - Interview tips from a hiring manager.mp4 |
18.5 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/6. Prepare for interviews with Interview Warmup.html |
183 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/03_prepare-for-interviews_vol01iss13.cfm |
46 KB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/04_develop-an-elevator-pitch/1. Develop an elevator pitch.mp4 |
13 MB |
DIY Cybersecurity Degree/Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/04_develop-an-elevator-pitch/2. Learn more about developing an elevator pitch.html |
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |
|
0 B |