资源详情

返回首页 | 相关搜索
[ CourseWikia.com ] Oreilly - Secure Operations and Protections, 2nd Edition
大小 1.26 GB
文件数 92
Info Hash: 878D9423C340EEE69E4A1A864DFA808D4B4AE78E
收录时间 2026-01-25 10:44:52
更新时间 2026-01-25 10:44:52
文件列表 (92)
Get Bonus Downloads Here.url
181 B
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.en.srt
1.07 KB
~Get Your Files Here !/Introduction/001. Secure Operations and Protections Introduction.mp4
3.34 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.en.srt
1.18 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/001. Learning objectives.mp4
3.99 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.en.srt
48.79 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4
101.11 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.en.srt
54.81 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4
112.42 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.en.srt
22.15 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4
49.64 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.en.srt
23.32 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4
85.14 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.en.srt
22.86 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4
47.8 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.en.srt
42 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4
114.75 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.en.srt
33.83 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4
72.5 MB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.en.srt
8.72 KB
~Get Your Files Here !/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/009. 1.8 Sensitive data protection.mp4
20.97 MB
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.en.srt
736 B
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/001. Learning objectives.mp4
2.56 MB
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.en.srt
12.68 KB
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/002. 2.1 Standardize processes.mp4
32.75 MB
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.en.srt
6.92 KB
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/003. 2.2 Streamline operations.mp4
18.28 MB
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.en.srt
22.37 KB
~Get Your Files Here !/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4
83.1 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.en.srt
1.14 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/001. Learning objectives.mp4
4.23 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.en.srt
4.13 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/002. 3.1 Cross-site scripting.mp4
11.82 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.en.srt
5.75 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/003. 3.2 Overflow vulnerabilities.mp4
17.11 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.en.srt
6.33 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/004. 3.3 Data poisoning.mp4
16.08 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.en.srt
6.39 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/005. 3.4 Broken access control.mp4
16.44 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.en.srt
7.91 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/006. 3.5 Cryptographic failures.mp4
22.66 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.en.srt
5.99 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/007. 3.6 Injection flaws.mp4
16.69 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.en.srt
6.07 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/008. 3.7 Cross-site request forgery.mp4
17.28 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.en.srt
7.54 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/009. 3.8 Directory traversal.mp4
19.35 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.en.srt
4.84 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/010. 3.9 Insecure design.mp4
14.77 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.en.srt
2.45 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/011. 3.10 Security misconfiguration.mp4
6.33 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.en.srt
5.41 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/012. 3.11 End-of-life or outdated components.mp4
13.75 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.en.srt
9.38 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/013. 3.12 Identification and authentication failures.mp4
26.14 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.en.srt
3.62 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/014. 3.13 Server-side request forgery.mp4
11.66 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.en.srt
6.77 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/015. 3.14 Remote code execution.mp4
19.36 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.en.srt
9.54 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/016. 3.15 Privilege escalation.mp4
25.06 MB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).en.srt
4.15 KB
~Get Your Files Here !/Lesson 3 Recommend Controls to Mitigate Attacks and Software Vulnerabilities/017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).mp4
11.37 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.en.srt
571 B
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/001. Learning objectives.mp4
2.54 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.en.srt
2.88 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/002. 4.1 Compensating controls.mp4
7.18 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.en.srt
10.73 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/003. 4.2 Control types.mp4
23.02 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.en.srt
7.36 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/004. 4.3 Patching and configuration management.mp4
14.8 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.en.srt
7.24 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/005. 4.4 Maintenance windows.mp4
19.69 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.en.srt
7.41 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/006. 4.5 Exceptions.mp4
14.64 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.en.srt
13.12 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/007. 4.6 Risk management principles.mp4
31.59 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).en.srt
3.64 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/008. 4.7 Policies, governance, and service-level objectives (SLOs).mp4
8.92 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.en.srt
4.46 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/009. 4.8 Prioritization and escalation.mp4
10.63 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.en.srt
6.57 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/010. 4.9 Attack surface management.mp4
23.43 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.en.srt
16.29 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/011. 4.10 Secure coding best practices.mp4
37.37 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).en.srt
15.09 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/012. 4.11 Secure software development life cycle (SDLC).mp4
31.73 MB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.en.srt
17.43 KB
~Get Your Files Here !/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4
41.61 MB
~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.en.srt
433 B
~Get Your Files Here !/Summary/001. Secure Operations and Protections Summary.mp4
1.29 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。