资源详情

返回首页 | 相关搜索
Udemy - CompTIA SecurityX (CAS-005) Complete Course & Practice Exam 2025
大小 6.84 GB
文件数 569
Info Hash: 86A1EC6F4FE5DBFBB93071ACA7FB46B826FAD86F
收录时间 2026-01-01 10:57:53
更新时间 2026-01-01 10:57:53
文件列表 (569)
23. Vulnerabilities and Attacks/2. Injection Vulnerabilities (OBJ 4.2).mp4
67.29 MB
01. Introduction/1. Introduction.vtt
22.78 KB
01. Introduction/2. CompTIA SecurityX (CAS-005) - Study Guide.pdf
2.46 MB
01. Introduction/2. CompTIA SecurityX (CAS-005) Exam Objectives.pdf
191.99 KB
01. Introduction/2. CompTIA SecurityX (CAS-005) Study Plan .pdf
130.64 KB
01. Introduction/2. Download your free study guide.html
166 B
01. Introduction/3. Exam Tips.mp4
12.93 MB
01. Introduction/3. Exam Tips.vtt
8.83 KB
01. Introduction/4.1 Checkpoint Introduction.html
18.52 KB
02. Governance/1. Governance (OBJ. 1.1).mp4
21.12 MB
02. Governance/1. Governance (OBJ. 1.1).vtt
13.4 KB
02. Governance/2. Security Program Documentation (OBJ. 1.1).mp4
28 MB
02. Governance/2. Security Program Documentation (OBJ. 1.1).vtt
17.66 KB
02. Governance/3. Awareness and Training Considerations (OBJ. 1.1).mp4
26.69 MB
02. Governance/3. Awareness and Training Considerations (OBJ. 1.1).vtt
13.57 KB
02. Governance/4. Governance Frameworks (OBJ. 1.1).mp4
14.28 MB
02. Governance/4. Governance Frameworks (OBJ. 1.1).vtt
8.59 KB
02. Governance/5. Governance, Risk, and Compliance (GRC) Tools (OBJ. 1.1).mp4
16.93 MB
02. Governance/5. Governance, Risk, and Compliance (GRC) Tools (OBJ. 1.1).vtt
9.78 KB
02. Governance/6. Management Involvement (OBJ. 1.1).mp4
16.66 MB
02. Governance/6. Management Involvement (OBJ. 1.1).vtt
10.33 KB
02. Governance/7. Change and Configuration Management (OBJ. 1.1).mp4
17.22 MB
02. Governance/7. Change and Configuration Management (OBJ. 1.1).vtt
10.28 KB
02. Governance/8. The Data Lifecycle (OBJ. 1.1).mp4
19.95 MB
02. Governance/8. The Data Lifecycle (OBJ. 1.1).vtt
11.51 KB
02. Governance/9. Communication Considerations (OBJ. 1.1).mp4
16.49 MB
02. Governance/9. Communication Considerations (OBJ. 1.1).vtt
9.12 KB
02. Governance/10.2 Checkpoint Governance.html
24.92 KB
03. Risk Management/1. Risk Management (OBJ. 1.2).mp4
27.72 MB
03. Risk Management/1. Risk Management (OBJ. 1.2).vtt
16.18 KB
03. Risk Management/2. Confidentiality Risk Considerations (OBJ. 1.2).mp4
23.63 MB
03. Risk Management/2. Confidentiality Risk Considerations (OBJ. 1.2).vtt
14.45 KB
03. Risk Management/3. Integrity Risk Considerations (OBJ. 1.2).mp4
27.33 MB
03. Risk Management/3. Integrity Risk Considerations (OBJ. 1.2).vtt
12.93 KB
03. Risk Management/4. Availability Risk Considerations (OBJ. 1.2).mp4
26.39 MB
03. Risk Management/4. Availability Risk Considerations (OBJ. 1.2).vtt
15.62 KB
03. Risk Management/5. Privacy Risk Considerations (OBJ. 1.2).mp4
18.93 MB
03. Risk Management/5. Privacy Risk Considerations (OBJ. 1.2).vtt
11.31 KB
03. Risk Management/6. Risk Assessment Frameworks (OBJ. 1.2).mp4
17.5 MB
03. Risk Management/6. Risk Assessment Frameworks (OBJ. 1.2).vtt
9.97 KB
03. Risk Management/7. Risk Assessment (OBJ. 1.2).mp4
23.42 MB
03. Risk Management/7. Risk Assessment (OBJ. 1.2).vtt
15.23 KB
03. Risk Management/8. Risk Response (OBJ. 1.2).mp4
13.59 MB
03. Risk Management/8. Risk Response (OBJ. 1.2).vtt
8.33 KB
03. Risk Management/9. Impact Analysis (OBJ. 1.2).mp4
15.7 MB
03. Risk Management/9. Impact Analysis (OBJ. 1.2).vtt
9.93 KB
03. Risk Management/10. Third-Party Risk Management (OBJ. 1.2).mp4
15.06 MB
03. Risk Management/10. Third-Party Risk Management (OBJ. 1.2).vtt
9.14 KB
03. Risk Management/11.3 Checkpoint Risk Management.html
22.75 KB
04. Compliance/1. Compliance (OBJ. 1.3).mp4
29.03 MB
04. Compliance/1. Compliance (OBJ. 1.3).vtt
17.73 KB
04. Compliance/2. Industry Compliance (OBJ. 1.3).mp4
25.67 MB
04. Compliance/2. Industry Compliance (OBJ. 1.3).vtt
15.22 KB
04. Compliance/3. Industry Standards (OBJ. 1.3).mp4
20.7 MB
04. Compliance/3. Industry Standards (OBJ. 1.3).vtt
12.01 KB
04. Compliance/4. Security Frameworks (OBJ. 1.3).mp4
20.39 MB
04. Compliance/4. Security Frameworks (OBJ. 1.3).vtt
12.61 KB
04. Compliance/5. Security Organziation Control Type 2 (SOC 2) (OBJ. 1.3).mp4
14.61 MB
04. Compliance/5. Security Organziation Control Type 2 (SOC 2) (OBJ. 1.3).vtt
8.99 KB
04. Compliance/6. NIST Cybersecurity Framework (CSF) (OBJ. 1.3).mp4
12.2 MB
04. Compliance/6. NIST Cybersecurity Framework (CSF) (OBJ. 1.3).vtt
7.17 KB
04. Compliance/7. Cloud Security Alliance (CSA) (OBJ. 1.3).mp4
9.69 MB
04. Compliance/7. Cloud Security Alliance (CSA) (OBJ. 1.3).vtt
5.79 KB
04. Compliance/8. Privacy Regulations (OBJ. 1.3).mp4
26.74 MB
04. Compliance/8. Privacy Regulations (OBJ. 1.3).vtt
16.18 KB
04. Compliance/9. Security Reviews (OBJ. 1.3).mp4
19.86 MB
04. Compliance/9. Security Reviews (OBJ. 1.3).vtt
11.2 KB
04. Compliance/10. Cross-Jurisdictional Compliance (OBJ. 1.3).mp4
17.64 MB
04. Compliance/10. Cross-Jurisdictional Compliance (OBJ. 1.3).vtt
10.46 KB
04. Compliance/11.4 Checkpoint Compliance.html
25.88 KB
05. Resilient System Design/1. Resilient System Design (OBJ 2.1).mp4
29.16 MB
05. Resilient System Design/1. Resilient System Design (OBJ 2.1).vtt
17.75 KB
05. Resilient System Design/2. Security Devices (OBJ 2.1).mp4
30.72 MB
05. Resilient System Design/2. Security Devices (OBJ 2.1).vtt
16.85 KB
05. Resilient System Design/3. Monitoring and Detection (OBJ 2.1).mp4
35.13 MB
05. Resilient System Design/3. Monitoring and Detection (OBJ 2.1).vtt
17.32 KB
05. Resilient System Design/4. Network Traffic Management (OBJ 2.1).mp4
25.67 MB
05. Resilient System Design/4. Network Traffic Management (OBJ 2.1).vtt
14.91 KB
05. Resilient System Design/5. Application Layer Security (OBJ 2.1).mp4
15.69 MB
05. Resilient System Design/5. Application Layer Security (OBJ 2.1).vtt
9.93 KB
05. Resilient System Design/6. Availability Considerations (OBJ 2.1).mp4
18.85 MB
05. Resilient System Design/6. Availability Considerations (OBJ 2.1).vtt
11.21 KB
05. Resilient System Design/7. Scaling Considerations (OBJ 2.1).mp4
18.92 MB
05. Resilient System Design/7. Scaling Considerations (OBJ 2.1).vtt
10.64 KB
05. Resilient System Design/8. Recovery Strategies (OBJ 2.1).mp4
15.03 MB
05. Resilient System Design/8. Recovery Strategies (OBJ 2.1).vtt
8.25 KB
05. Resilient System Design/9. Deployment Strategies (OBJ 2.1).mp4
15.36 MB
05. Resilient System Design/9. Deployment Strategies (OBJ 2.1).vtt
8.27 KB
05. Resilient System Design/10.5 Checkpoint Resilient System Design.html
22.21 KB
06. Secure Architecture Design/1. Secure Architecture Design (OBJ 2.3).mp4
26.28 MB
06. Secure Architecture Design/1. Secure Architecture Design (OBJ 2.3).vtt
16.67 KB
06. Secure Architecture Design/2. Data States (OBJ 2.3).mp4
18.68 MB
06. Secure Architecture Design/2. Data States (OBJ 2.3).vtt
11.12 KB
06. Secure Architecture Design/3. Data Classification (OBJ 2.3).mp4
24.5 MB
06. Secure Architecture Design/3. Data Classification (OBJ 2.3).vtt
14.04 KB
06. Secure Architecture Design/4. Data Labeling and Tagging (OBJ 2.3).mp4
22.84 MB
06. Secure Architecture Design/4. Data Labeling and Tagging (OBJ 2.3).vtt
13.63 KB
06. Secure Architecture Design/5. Data Loss Prevention (DLP) (OBJ 2.3).mp4
18.33 MB
06. Secure Architecture Design/5. Data Loss Prevention (DLP) (OBJ 2.3).vtt
9.78 KB
06. Secure Architecture Design/6. Hybrid Infrastrucutres (OBJ 2.3).mp4
24.24 MB
06. Secure Architecture Design/6. Hybrid Infrastrucutres (OBJ 2.3).vtt
14.21 KB
06. Secure Architecture Design/7. Third-Party Integrations (OBJ 2.3).mp4
19.69 MB
06. Secure Architecture Design/7. Third-Party Integrations (OBJ 2.3).vtt
11 KB
06. Secure Architecture Design/8. Attack Surface Management (OBJ 2.3).mp4
35.27 MB
06. Secure Architecture Design/8. Attack Surface Management (OBJ 2.3).vtt
17.89 KB
06. Secure Architecture Design/9. Control Effectiveness (OBJ 2.3).mp4
24.53 MB
06. Secure Architecture Design/9. Control Effectiveness (OBJ 2.3).vtt
14.83 KB
06. Secure Architecture Design/10.6 Checkpoint Secure Architecture Design.html
23.19 KB
07. Security in Systems/1. Security in Systems (OBJ 2.2).mp4
34.34 MB
07. Security in Systems/1. Security in Systems (OBJ 2.2).vtt
21.33 KB
07. Security in Systems/2. Hardware Assurance (OBJ 2.2).mp4
24.17 MB
07. Security in Systems/2. Hardware Assurance (OBJ 2.2).vtt
13.59 KB
07. Security in Systems/3. Security Requirements (OBJ 2.2).mp4
26.45 MB
07. Security in Systems/3. Security Requirements (OBJ 2.2).vtt
14.82 KB
07. Security in Systems/4. Software Assurance (OBJ 2.2).mp4
30.74 MB
07. Security in Systems/4. Software Assurance (OBJ 2.2).vtt
15.31 KB
07. Security in Systems/5. Supply Chain Assurance (OBJ 2.2).mp4
23.57 MB
07. Security in Systems/5. Supply Chain Assurance (OBJ 2.2).vtt
12.21 KB
07. Security in Systems/6. Pre-Deployment Testing (OBJ 2.2).mp4
32.26 MB
07. Security in Systems/6. Pre-Deployment Testing (OBJ 2.2).vtt
18.04 KB
07. Security in Systems/7. Post-Deployment Testing (OBJ 2.2).mp4
27.5 MB
07. Security in Systems/7. Post-Deployment Testing (OBJ 2.2).vtt
13.54 KB
07. Security in Systems/8. Continuous IntegrationContinuous Deployment (CICD) Management (OBJ 2.2).mp4
18.38 MB
07. Security in Systems/8. Continuous IntegrationContinuous Deployment (CICD) Management (OBJ 2.2).vtt
9.24 KB
07. Security in Systems/9. Continuous IntegrationContinuous Deployment (CICD) Testing (OBJ 2.2).mp4
18.79 MB
07. Security in Systems/9. Continuous IntegrationContinuous Deployment (CICD) Testing (OBJ 2.2).vtt
9.54 KB
07. Security in Systems/10. End-of-Life (EOL) Considerations (OBJ 2.2).mp4
22.21 MB
07. Security in Systems/10. End-of-Life (EOL) Considerations (OBJ 2.2).vtt
12.21 KB
07. Security in Systems/11.7 Checkpoint Security in Systems.html
23.29 KB
08. Access, Authentication, Authorization/1. Access, Authentication, Authorization (OBJ 2.4).mp4
25.55 MB
08. Access, Authentication, Authorization/1. Access, Authentication, Authorization (OBJ 2.4).vtt
15.34 KB
08. Access, Authentication, Authorization/2. Access Control Systems (OBJ 2.4).mp4
23.46 MB
08. Access, Authentication, Authorization/2. Access Control Systems (OBJ 2.4).vtt
12.38 KB
08. Access, Authentication, Authorization/3. Access Provision (OBJ 2.4).mp4
15.9 MB
08. Access, Authentication, Authorization/3. Access Provision (OBJ 2.4).vtt
8.82 KB
08. Access, Authentication, Authorization/4. Rule-Based Access Control (OBJ 2.4).mp4
32.95 MB
08. Access, Authentication, Authorization/4. Rule-Based Access Control (OBJ 2.4).vtt
17.55 KB
08. Access, Authentication, Authorization/5. Role-Based Access Control (RBAC) (OBJ 2.4).mp4
10.01 MB
08. Access, Authentication, Authorization/5. Role-Based Access Control (RBAC) (OBJ 2.4).vtt
5.22 KB
08. Access, Authentication, Authorization/6. Identity and Authentication (OBJ 2.4).mp4
25.44 MB
08. Access, Authentication, Authorization/6. Identity and Authentication (OBJ 2.4).vtt
14.3 KB
08. Access, Authentication, Authorization/7. Access Control Policies (OBJ 2.4).mp4
13 MB
08. Access, Authentication, Authorization/7. Access Control Policies (OBJ 2.4).vtt
7.27 KB
08. Access, Authentication, Authorization/8. Monitoring and Oversight (OBJ 2.4).mp4
21.86 MB
08. Access, Authentication, Authorization/8. Monitoring and Oversight (OBJ 2.4).vtt
11.53 KB
08. Access, Authentication, Authorization/9.8 Checkpoint Access, Authentication, Authorization.html
22.91 KB
09. Zero Trust Design/1. Zero Trust Design (OBJ 2.6).mp4
30.39 MB
09. Zero Trust Design/1. Zero Trust Design (OBJ 2.6).vtt
18.16 KB
09. Zero Trust Design/2. Security Boundaries (OBJ 2.6).mp4
21.95 MB
09. Zero Trust Design/2. Security Boundaries (OBJ 2.6).vtt
11.6 KB
09. Zero Trust Design/3. VPN Architecture (OBJ 2.6).mp4
24.99 MB
09. Zero Trust Design/3. VPN Architecture (OBJ 2.6).vtt
13.15 KB
09. Zero Trust Design/4. Segmentation (OBJ 2.6).mp4
19.07 MB
09. Zero Trust Design/4. Segmentation (OBJ 2.6).vtt
9.76 KB
09. Zero Trust Design/5. Deperimeterization (OBJ 2.6).mp4
26.78 MB
09. Zero Trust Design/5. Deperimeterization (OBJ 2.6).vtt
15.26 KB
09. Zero Trust Design/6. Access Management (OBJ 2.6).mp4
18.6 MB
09. Zero Trust Design/6. Access Management (OBJ 2.6).vtt
9.38 KB
09. Zero Trust Design/7. Application Programming Interface (API) Integeration and Validation (OBJ 2.6).mp4
23.27 MB
09. Zero Trust Design/7. Application Programming Interface (API) Integeration and Validation (OBJ 2.6).vtt
11.78 KB
09. Zero Trust Design/8. Asset Control (OBJ 2.6).mp4
19.77 MB
09. Zero Trust Design/8. Asset Control (OBJ 2.6).vtt
9.93 KB
09. Zero Trust Design/9.9 Checkpoint Zero Trust Design.html
23.37 KB
10. Hardware Security/1. Hardware Security (OBJ 3.4).mp4
27.47 MB
10. Hardware Security/1. Hardware Security (OBJ 3.4).vtt
16.1 KB
10. Hardware Security/2. Roots of Trust (OBJ 3.4).mp4
24.81 MB
10. Hardware Security/2. Roots of Trust (OBJ 3.4).vtt
12.62 KB
10. Hardware Security/3. Boot Options (OBJ 3.4).mp4
21.28 MB
10. Hardware Security/3. Boot Options (OBJ 3.4).vtt
12.09 KB
10. Hardware Security/4. Security Coprocessors (OBJ 3.4).mp4
18.25 MB
10. Hardware Security/4. Security Coprocessors (OBJ 3.4).vtt
9.39 KB
10. Hardware Security/5. Self-Encrypting Drives (SED) (OBJ 3.4).mp4
13.63 MB
10. Hardware Security/5. Self-Encrypting Drives (SED) (OBJ 3.4).vtt
7.37 KB
10. Hardware Security/6. Host-Based Encryption (OBJ 3.4).mp4
24.98 MB
10. Hardware Security/6. Host-Based Encryption (OBJ 3.4).vtt
12.16 KB
10. Hardware Security/7. Self-Healing Hardware (OBJ 3.4).mp4
12.56 MB
10. Hardware Security/7. Self-Healing Hardware (OBJ 3.4).vtt
7.38 KB
10. Hardware Security/8. Virtual Hardware (OBJ 3.4).mp4
15.92 MB
10. Hardware Security/8. Virtual Hardware (OBJ 3.4).vtt
8.82 KB
10. Hardware Security/9.10 Checkpoint Hardware Security.html
22.77 KB
11. Endpoint and Server Security/1. Endpoint and Server Security (OBJ 3.2).mp4
25.69 MB
11. Endpoint and Server Security/1. Endpoint and Server Security (OBJ 3.2).vtt
15.27 KB
11. Endpoint and Server Security/2. Configuration and Privilege Management (OBJ 3.2).mp4
16.03 MB
11. Endpoint and Server Security/2. Configuration and Privilege Management (OBJ 3.2).vtt
9.14 KB
11. Endpoint and Server Security/3. Operating System Security (OBJ 3.2).mp4
25 MB
11. Endpoint and Server Security/3. Operating System Security (OBJ 3.2).vtt
12.26 KB
11. Endpoint and Server Security/4. Threat Protection (OBJ 3.2).mp4
26.47 MB
11. Endpoint and Server Security/4. Threat Protection (OBJ 3.2).vtt
13.82 KB
11. Endpoint and Server Security/5. Application Management (OBJ 3.2).mp4
16.19 MB
11. Endpoint and Server Security/5. Application Management (OBJ 3.2).vtt
9.08 KB
11. Endpoint and Server Security/6. Monitoring and Response (OBJ 3.2).mp4
37.43 MB
11. Endpoint and Server Security/6. Monitoring and Response (OBJ 3.2).vtt
19.79 KB
11. Endpoint and Server Security/7. Mobile Management (OBJ 3.2).mp4
20.6 MB
11. Endpoint and Server Security/7. Mobile Management (OBJ 3.2).vtt
11.17 KB
11. Endpoint and Server Security/8. Attack Surface Management (OBJ 3.2).mp4
34.17 MB
11. Endpoint and Server Security/8. Attack Surface Management (OBJ 3.2).vtt
18.65 KB
11. Endpoint and Server Security/9.11 Checkpoint Endpoint and Server Security.html
23.23 KB
12. Data Security Concepts/1. Data Security Concepts (OBJ 3.8).mp4
32 MB
12. Data Security Concepts/1. Data Security Concepts (OBJ 3.8).vtt
18.5 KB
12. Data Security Concepts/2. Data Integrity (OBJ 3.8).mp4
26.63 MB
12. Data Security Concepts/2. Data Integrity (OBJ 3.8).vtt
13.87 KB
12. Data Security Concepts/3. Integrity Use Cases (OBJ 3.8).mp4
24.14 MB
12. Data Security Concepts/3. Integrity Use Cases (OBJ 3.8).vtt
12.26 KB
12. Data Security Concepts/4. Blockchain (OBJ 3.8).mp4
43.56 MB
12. Data Security Concepts/4. Blockchain (OBJ 3.8).vtt
22.55 KB
12. Data Security Concepts/5. Data Protection (OBJ 3.8).mp4
36.04 MB
12. Data Security Concepts/5. Data Protection (OBJ 3.8).vtt
18.99 KB
12. Data Security Concepts/6. Data State Protection (OBJ 3.8).mp4
37.09 MB
12. Data Security Concepts/6. Data State Protection (OBJ 3.8).vtt
19.19 KB
12. Data Security Concepts/7. Data Handling and Management (OBJ 3.8).mp4
28.57 MB
12. Data Security Concepts/7. Data Handling and Management (OBJ 3.8).vtt
15.7 KB
12. Data Security Concepts/8. Data Compliance and Privacy (OBJ 3.8).mp4
29.28 MB
12. Data Security Concepts/8. Data Compliance and Privacy (OBJ 3.8).vtt
13.96 KB
12. Data Security Concepts/9.12 Checkpoint Data Security Concepts.html
23.25 KB
13. Cryptographic Types/1. Cryptographic Types (OBJ 3.8).mp4
30.57 MB
13. Cryptographic Types/1. Cryptographic Types (OBJ 3.8).vtt
18.14 KB
13. Cryptographic Types/2. Symmetric Cryptography (OBJ 3.8).mp4
23.13 MB
13. Cryptographic Types/2. Symmetric Cryptography (OBJ 3.8).vtt
10.71 KB
13. Cryptographic Types/3. Symmetric Algorithms (OBJ 3.8).mp4
40.98 MB
13. Cryptographic Types/3. Symmetric Algorithms (OBJ 3.8).vtt
19.84 KB
13. Cryptographic Types/4. Symmetric Cryptography Considerations (OBJ 3.8).mp4
26.24 MB
13. Cryptographic Types/4. Symmetric Cryptography Considerations (OBJ 3.8).vtt
12.92 KB
13. Cryptographic Types/5. Asymmetric Cryptography (OBJ 3.8).mp4
26.56 MB
13. Cryptographic Types/5. Asymmetric Cryptography (OBJ 3.8).vtt
13.88 KB
13. Cryptographic Types/6. Asymmetric Algorithms (OBJ 3.8).mp4
36.05 MB
13. Cryptographic Types/6. Asymmetric Algorithms (OBJ 3.8).vtt
18.88 KB
13. Cryptographic Types/7. Digital Signatures (OBJ 3.8).mp4
28.4 MB
13. Cryptographic Types/7. Digital Signatures (OBJ 3.8).vtt
14.39 KB
13. Cryptographic Types/8. Asymmetric Cryptography Use Cases (OBJ 3.8).mp4
35.91 MB
13. Cryptographic Types/8. Asymmetric Cryptography Use Cases (OBJ 3.8).vtt
18.75 KB
13. Cryptographic Types/9.13 Checkpoint Cryptographic Types.html
22.82 KB
14. PKI Architecture/1. Public Key Infrastructure (PKI) Architecture (OBJ 2.4).mp4
22.37 MB
14. PKI Architecture/1. Public Key Infrastructure (PKI) Architecture (OBJ 2.4).vtt
13.32 KB
14. PKI Architecture/2. Certificate Management (OBJ 2.4).mp4
45.84 MB
14. PKI Architecture/2. Certificate Management (OBJ 2.4).vtt
24.47 KB
14. PKI Architecture/3. Certificate Authority (CA) Functions (OBJ 2.4).mp4
42.34 MB
14. PKI Architecture/3. Certificate Authority (CA) Functions (OBJ 2.4).vtt
22.11 KB
14. PKI Architecture/4. Certificate Validation (OBJ 2.4).mp4
39.25 MB
14. PKI Architecture/4. Certificate Validation (OBJ 2.4).vtt
21.31 KB
14. PKI Architecture/5. Certificate Deployment (OBJ 2.4).mp4
22.18 MB
14. PKI Architecture/5. Certificate Deployment (OBJ 2.4).vtt
12.1 KB
14. PKI Architecture/6.14 Checkpoint PKI Architecture.html
23.17 KB
15. Advanced Cryptographic Concepts/1. Advanced Cryptographic Concepts (OBJ 3.7).mp4
35.78 MB
15. Advanced Cryptographic Concepts/1. Advanced Cryptographic Concepts (OBJ 3.7).vtt
20.27 KB
15. Advanced Cryptographic Concepts/2. Cryptographic Blockers (OBJ 3.7).mp4
15.66 MB
15. Advanced Cryptographic Concepts/2. Cryptographic Blockers (OBJ 3.7).vtt
8.11 KB
15. Advanced Cryptographic Concepts/3. Key Management (OBJ 3.7).mp4
23.43 MB
15. Advanced Cryptographic Concepts/3. Key Management (OBJ 3.7).vtt
12.31 KB
15. Advanced Cryptographic Concepts/4. Encryption Techniques (OBJ 3.7).mp4
18.16 MB
15. Advanced Cryptographic Concepts/4. Encryption Techniques (OBJ 3.7).vtt
9.47 KB
15. Advanced Cryptographic Concepts/5. Security Properties (OBJ 3.7).mp4
25.84 MB
15. Advanced Cryptographic Concepts/5. Security Properties (OBJ 3.7).vtt
12.55 KB
15. Advanced Cryptographic Concepts/6. Collaborative Considerations (OBJ 3.7).mp4
26.42 MB
15. Advanced Cryptographic Concepts/6. Collaborative Considerations (OBJ 3.7).vtt
12.61 KB
15. Advanced Cryptographic Concepts/7. Performance Considerations (OBJ 3.7).mp4
30.57 MB
15. Advanced Cryptographic Concepts/7. Performance Considerations (OBJ 3.7).vtt
15.34 KB
15. Advanced Cryptographic Concepts/8. Post-Quantum Cryptography (PQC) (OBJ 3.7).mp4
31.51 MB
15. Advanced Cryptographic Concepts/8. Post-Quantum Cryptography (PQC) (OBJ 3.7).vtt
16.54 KB
15. Advanced Cryptographic Concepts/9. Post-Quantum Implications (OBJ 3.7).mp4
22.25 MB
15. Advanced Cryptographic Concepts/9. Post-Quantum Implications (OBJ 3.7).vtt
12.34 KB
15. Advanced Cryptographic Concepts/10.15 Checkpoint Advanced Cryptographic Concepts.html
22.99 KB
16. Troubleshooting IAM/1. Troubleshooting IAM (OBJ 3.1).mp4
41.9 MB
16. Troubleshooting IAM/1. Troubleshooting IAM (OBJ 3.1).vtt
23.74 KB
16. Troubleshooting IAM/2. Management Frameworks (OBJ 3.1).mp4
23.16 MB
16. Troubleshooting IAM/2. Management Frameworks (OBJ 3.1).vtt
11.74 KB
16. Troubleshooting IAM/3. Subject Access Control (OBJ 3.1).mp4
17.57 MB
16. Troubleshooting IAM/3. Subject Access Control (OBJ 3.1).vtt
8.55 KB
16. Troubleshooting IAM/4. User Identity Control (OBJ 3.1).mp4
31.72 MB
16. Troubleshooting IAM/4. User Identity Control (OBJ 3.1).vtt
16.19 KB
16. Troubleshooting IAM/5. Secrets Management (OBJ 3.1).mp4
43 MB
16. Troubleshooting IAM/5. Secrets Management (OBJ 3.1).vtt
21.75 KB
16. Troubleshooting IAM/6. Authentication and Authorization (OBJ 3.1).mp4
40.19 MB
16. Troubleshooting IAM/6. Authentication and Authorization (OBJ 3.1).vtt
21.12 KB
16. Troubleshooting IAM/7. Cloud IAM access and Trust Policies (OBJ 3.1).mp4
19.55 MB
16. Troubleshooting IAM/7. Cloud IAM access and Trust Policies (OBJ 3.1).vtt
10.15 KB
16. Troubleshooting IAM/8. WiFi Authentication (OBJ 3.1).mp4
45.97 MB
16. Troubleshooting IAM/8. WiFi Authentication (OBJ 3.1).vtt
22.2 KB
16. Troubleshooting IAM/9. Access Control (OBJ 3.1).mp4
36.3 MB
16. Troubleshooting IAM/9. Access Control (OBJ 3.1).vtt
17.63 KB
16. Troubleshooting IAM/10. Conditional Access (OBJ 3.1).mp4
27.45 MB
16. Troubleshooting IAM/10. Conditional Access (OBJ 3.1).vtt
13.31 KB
16. Troubleshooting IAM/11. Logging and Monitoring (OBJ 3.1).mp4
19.03 MB
16. Troubleshooting IAM/11. Logging and Monitoring (OBJ 3.1).vtt
10.24 KB
16. Troubleshooting IAM/12.16 Checkpoint Troubleshooting IAM.html
22.4 KB
17. Troubleshooting Network Infrastructure/1. Troubleshooting Network Infrastructure (OBJ 3.3).mp4
45.39 MB
17. Troubleshooting Network Infrastructure/1. Troubleshooting Network Infrastructure (OBJ 3.3).vtt
26.55 KB
17. Troubleshooting Network Infrastructure/2. Observability (OBJ 3.3).mp4
16.57 MB
17. Troubleshooting Network Infrastructure/2. Observability (OBJ 3.3).vtt
8.45 KB
17. Troubleshooting Network Infrastructure/3. Network Errors (OBJ 3.3).mp4
39.05 MB
17. Troubleshooting Network Infrastructure/3. Network Errors (OBJ 3.3).vtt
20.05 KB
17. Troubleshooting Network Infrastructure/4. Network Misconfigurations (OBJ 3.3).mp4
22.18 MB
17. Troubleshooting Network Infrastructure/4. Network Misconfigurations (OBJ 3.3).vtt
12.15 KB
17. Troubleshooting Network Infrastructure/5. IPSIDS Issues (OBJ 3.3).mp4
26.97 MB
17. Troubleshooting Network Infrastructure/5. IPSIDS Issues (OBJ 3.3).vtt
14.1 KB
17. Troubleshooting Network Infrastructure/6. Alert Analysis (OBJ 3.3).mp4
23.1 MB
17. Troubleshooting Network Infrastructure/6. Alert Analysis (OBJ 3.3).vtt
11.82 KB
17. Troubleshooting Network Infrastructure/7. DNS Security (OBJ 3.3).mp4
42.02 MB
17. Troubleshooting Network Infrastructure/7. DNS Security (OBJ 3.3).vtt
20.89 KB
17. Troubleshooting Network Infrastructure/8. Email Security (OBJ 3.3).mp4
42 MB
17. Troubleshooting Network Infrastructure/8. Email Security (OBJ 3.3).vtt
22.33 KB
17. Troubleshooting Network Infrastructure/9. Network Issues (OBJ 3.3).mp4
25.95 MB
17. Troubleshooting Network Infrastructure/9. Network Issues (OBJ 3.3).vtt
13.65 KB
17. Troubleshooting Network Infrastructure/10. Cryptographic Issues (OBJ 3.3).mp4
31.46 MB
17. Troubleshooting Network Infrastructure/10. Cryptographic Issues (OBJ 3.3).vtt
15.34 KB
17. Troubleshooting Network Infrastructure/11. PKI Issues (OBJ 3.3).mp4
37.41 MB
17. Troubleshooting Network Infrastructure/11. PKI Issues (OBJ 3.3).vtt
18.04 KB
17. Troubleshooting Network Infrastructure/12.17 Checkpoint Troubleshooting Network Infrastructure.html
22.67 KB
18. Cloud Security/1. Cloud Security (OBJ 2.5).mp4
38.55 MB
18. Cloud Security/1. Cloud Security (OBJ 2.5).vtt
23.01 KB
18. Cloud Security/2. Cloud Implementation (OBJ 2.5).mp4
20.74 MB
18. Cloud Security/2. Cloud Implementation (OBJ 2.5).vtt
10.06 KB
18. Cloud Security/3. Cloud Management (OBJ 2.5).mp4
23.53 MB
18. Cloud Security/3. Cloud Management (OBJ 2.5).vtt
11.34 KB
18. Cloud Security/4. Connectivity and Integration (OBJ 2.5).mp4
33.4 MB
18. Cloud Security/4. Connectivity and Integration (OBJ 2.5).vtt
15.34 KB
18. Cloud Security/5. Cloud Security Considerations (OBJ 2.5).mp4
36.97 MB
18. Cloud Security/5. Cloud Security Considerations (OBJ 2.5).vtt
17.64 KB
18. Cloud Security/6. API Security (OBJ 2.5).mp4
27.78 MB
18. Cloud Security/6. API Security (OBJ 2.5).vtt
13.19 KB
18. Cloud Security/7. Cloud Access Security Broker (CASB) (OBJ 2.5).mp4
25.82 MB
18. Cloud Security/7. Cloud Access Security Broker (CASB) (OBJ 2.5).vtt
11.94 KB
18. Cloud Security/8. Development and Deployment (OBJ 2.5).mp4
31.75 MB
18. Cloud Security/8. Development and Deployment (OBJ 2.5).vtt
15.54 KB
18. Cloud Security/9. CICD Pipeline (OBJ 2.5).mp4
23.06 MB
18. Cloud Security/9. CICD Pipeline (OBJ 2.5).vtt
11.56 KB
18. Cloud Security/10. Container Management (OBJ 2.5).mp4
21.01 MB
18. Cloud Security/10. Container Management (OBJ 2.5).vtt
10.02 KB
18. Cloud Security/11. Serverless Computing (OBJ 2.5).mp4
27.73 MB
18. Cloud Security/11. Serverless Computing (OBJ 2.5).vtt
16.35 KB
18. Cloud Security/12.18 Checkpoint Cloud Security.html
22.39 KB
19. Specialized System Security/1. Specialized System Security (OBJ 3.5).mp4
34.47 MB
19. Specialized System Security/1. Specialized System Security (OBJ 3.5).vtt
21.18 KB
19. Specialized System Security/2. Specialized Systems (OBJ 3.5).mp4
27.59 MB
19. Specialized System Security/2. Specialized Systems (OBJ 3.5).vtt
14.93 KB
19. Specialized System Security/3. Operational Technology (OT) (OBJ 3.5).mp4
28.47 MB
19. Specialized System Security/3. Operational Technology (OT) (OBJ 3.5).vtt
14.98 KB
19. Specialized System Security/4. Characteristics of SpecializedLegacy Systems (OBJ 3.5).mp4
32.2 MB
19. Specialized System Security/4. Characteristics of SpecializedLegacy Systems (OBJ 3.5).vtt
18.18 KB
19. Specialized System Security/5. Security Practices (OBJ 3.5).mp4
17.77 MB
19. Specialized System Security/5. Security Practices (OBJ 3.5).vtt
10.71 KB
19. Specialized System Security/6. Data Management (OBJ 3.5).mp4
26.45 MB
19. Specialized System Security/6. Data Management (OBJ 3.5).vtt
14.39 KB
19. Specialized System Security/7. Compliance and Regulatory Considerations (OBJ 3.5).mp4
20.73 MB
19. Specialized System Security/7. Compliance and Regulatory Considerations (OBJ 3.5).vtt
11.35 KB
19. Specialized System Security/8. Critical Services Challenges (OBJ 3.5).mp4
20.31 MB
19. Specialized System Security/8. Critical Services Challenges (OBJ 3.5).vtt
11.55 KB
19. Specialized System Security/9. Commercial and Government Challenges (OBJ 3.5).mp4
26.45 MB
19. Specialized System Security/9. Commercial and Government Challenges (OBJ 3.5).vtt
15.64 KB
19. Specialized System Security/10.19 Checkpoint Specialized System Security.html
22.61 KB
20. Automated Security Operations/1. Automated Security Operations (OBJ 3.6).mp4
30.51 MB
20. Automated Security Operations/1. Automated Security Operations (OBJ 3.6).vtt
18.4 KB
20. Automated Security Operations/2. Vulnerability Scanning and Reporting (OBJ 3.6).mp4
22.94 MB
20. Automated Security Operations/2. Vulnerability Scanning and Reporting (OBJ 3.6).vtt
12.35 KB
20. Automated Security Operations/3. Scripting (OBJ 3.6).mp4
26.46 MB
20. Automated Security Operations/3. Scripting (OBJ 3.6).vtt
15.02 KB
20. Automated Security Operations/4. Bash (OBJ 3.6).mp4
24.05 MB
20. Automated Security Operations/4. Bash (OBJ 3.6).vtt
13.51 KB
20. Automated Security Operations/5. PowerShell (OBJ 3.6).mp4
26.5 MB
20. Automated Security Operations/5. PowerShell (OBJ 3.6).vtt
13.69 KB
20. Automated Security Operations/6. Python (OBJ 3.6).mp4
26.65 MB
20. Automated Security Operations/6. Python (OBJ 3.6).vtt
13.49 KB
20. Automated Security Operations/7. CronScheduled Tasks (OBJ 3.6).mp4
38.11 MB
20. Automated Security Operations/7. CronScheduled Tasks (OBJ 3.6).vtt
18.6 KB
20. Automated Security Operations/8. Workflow Automation (OBJ 3.6).mp4
20.42 MB
20. Automated Security Operations/8. Workflow Automation (OBJ 3.6).vtt
10.06 KB
20. Automated Security Operations/9.20 Checkpoint Automated Security Operations.html
21.93 KB
21. Integrated Security and Automation/1. Integrated Security and Automation (OBJ 3.6).mp4
40.86 MB
21. Integrated Security and Automation/1. Integrated Security and Automation (OBJ 3.6).vtt
24.47 KB
21. Integrated Security and Automation/2. Configuration Files (OBJ 3.6).mp4
26.32 MB
21. Integrated Security and Automation/2. Configuration Files (OBJ 3.6).vtt
12.22 KB
21. Integrated Security and Automation/3. Automated Patching (OBJ 3.6).mp4
26.39 MB
21. Integrated Security and Automation/3. Automated Patching (OBJ 3.6).vtt
13.13 KB
21. Integrated Security and Automation/4. Dynamic Security Controls (OBJ 3.6).mp4
23.42 MB
21. Integrated Security and Automation/4. Dynamic Security Controls (OBJ 3.6).vtt
11.77 KB
21. Integrated Security and Automation/5. Security Orchestration, Automation, and Response (SOAR) (OBJ 3.6).mp4
33.99 MB
21. Integrated Security and Automation/5. Security Orchestration, Automation, and Response (SOAR) (OBJ 3.6).vtt
18.03 KB
21. Integrated Security and Automation/6. Cloud Automation (OBJ 3.6).mp4
29.95 MB
21. Integrated Security and Automation/6. Cloud Automation (OBJ 3.6).vtt
15.25 KB
21. Integrated Security and Automation/7. Cloud APIsSoftware Development Kits (SDKs) (OBJ 3.6).mp4
20.75 MB
21. Integrated Security and Automation/7. Cloud APIsSoftware Development Kits (SDKs) (OBJ 3.6).vtt
10.13 KB
21. Integrated Security and Automation/8. Vulnerability Management (OBJ 3.6).mp4
24.81 MB
21. Integrated Security and Automation/8. Vulnerability Management (OBJ 3.6).vtt
12.43 KB
21. Integrated Security and Automation/9. Security Content Automation Protocol (SCAP) (OBJ 3.6).mp4
22.2 MB
21. Integrated Security and Automation/9. Security Content Automation Protocol (SCAP) (OBJ 3.6).vtt
10.94 KB
21. Integrated Security and Automation/10.21 Checkpoint Integrated Security and Automation.html
23.48 KB
22. Artificial Intelligence/1. Artificial Intelligence (AI) (OBJ 1.5, OBJ 3.6).mp4
42.28 MB
22. Artificial Intelligence/1. Artificial Intelligence (AI) (OBJ 1.5, OBJ 3.6).vtt
24.38 KB
22. Artificial Intelligence/2. Generative AI (OBJ 3.6).mp4
26.64 MB
22. Artificial Intelligence/2. Generative AI (OBJ 3.6).vtt
13.52 KB
22. Artificial Intelligence/3. Ethical and Governance Considerations (OBJ 1.5).mp4
25.03 MB
22. Artificial Intelligence/3. Ethical and Governance Considerations (OBJ 1.5).vtt
12.39 KB
22. Artificial Intelligence/4. Legal and Privacy Risks (OBJ 1.5).mp4
23.67 MB
22. Artificial Intelligence/4. Legal and Privacy Risks (OBJ 1.5).vtt
11.63 KB
22. Artificial Intelligence/5. Threats to the Model (OBJ 1.5).mp4
23.75 MB
22. Artificial Intelligence/5. Threats to the Model (OBJ 1.5).vtt
12.14 KB
22. Artificial Intelligence/6. AI-enabled Attacks (OBJ 1.5).mp4
28.78 MB
22. Artificial Intelligence/6. AI-enabled Attacks (OBJ 1.5).vtt
14.61 KB
22. Artificial Intelligence/7. AI Manipulation Attacks (OBJ 1.5).mp4
26.5 MB
22. Artificial Intelligence/7. AI Manipulation Attacks (OBJ 1.5).vtt
12.43 KB
22. Artificial Intelligence/8. AI Usage Risks (OBJ 1.5).mp4
29.92 MB
22. Artificial Intelligence/8. AI Usage Risks (OBJ 1.5).vtt
15.46 KB
22. Artificial Intelligence/9. AI Bots (OBJ 1.5).mp4
25.46 MB
22. Artificial Intelligence/9. AI Bots (OBJ 1.5).vtt
13.87 KB
22. Artificial Intelligence/10.22 Checkpoint Artificial Intelligence.html
23.11 KB
23. Vulnerabilities and Attacks/1. Vulnerabilities and Attacks (OBJ 3.4, OBJ 4.2).mp4
42.55 MB
23. Vulnerabilities and Attacks/1. Vulnerabilities and Attacks (OBJ 3.4, OBJ 4.2).vtt
24.7 KB
01. Introduction/1. Introduction.mp4
31.66 MB
23. Vulnerabilities and Attacks/2. Injection Vulnerabilities (OBJ 4.2).vtt
34.77 KB
23. Vulnerabilities and Attacks/3. Memory-related Vulnerabilities (OBJ 4.2).mp4
41.33 MB
23. Vulnerabilities and Attacks/3. Memory-related Vulnerabilities (OBJ 4.2).vtt
21.85 KB
23. Vulnerabilities and Attacks/4. Configuration Vulnerabilities (OBJ 4.2).mp4
40.92 MB
23. Vulnerabilities and Attacks/4. Configuration Vulnerabilities (OBJ 4.2).vtt
22.49 KB
23. Vulnerabilities and Attacks/5. Authorization Vulnerabilities (OBJ 4.2).mp4
26.26 MB
23. Vulnerabilities and Attacks/5. Authorization Vulnerabilities (OBJ 4.2).vtt
14.03 KB
23. Vulnerabilities and Attacks/6. Malicious Code Attacks (OBJ 4.2).mp4
17.87 MB
23. Vulnerabilities and Attacks/6. Malicious Code Attacks (OBJ 4.2).vtt
9.8 KB
23. Vulnerabilities and Attacks/7. Hardware and Firmware Attacks (OBJ 3.4).mp4
24.62 MB
23. Vulnerabilities and Attacks/7. Hardware and Firmware Attacks (OBJ 3.4).vtt
12.65 KB
23. Vulnerabilities and Attacks/8. Memory-based Attacks (OBJ 3.4).mp4
22.64 MB
23. Vulnerabilities and Attacks/8. Memory-based Attacks (OBJ 3.4).vtt
12.09 KB
23. Vulnerabilities and Attacks/9. Electro-magnetic Attacks (OBJ 3.4).mp4
18.24 MB
23. Vulnerabilities and Attacks/9. Electro-magnetic Attacks (OBJ 3.4).vtt
9.48 KB
23. Vulnerabilities and Attacks/10.23 Checkpoint Vulnerabilities and Attacks.html
22.79 KB
24. Detection and Mitigation/1. Detection and Mitigation (OBJ 3.4, OBJ 4.2).mp4
31.18 MB
24. Detection and Mitigation/1. Detection and Mitigation (OBJ 3.4, OBJ 4.2).vtt
19.11 KB
24. Detection and Mitigation/2. Tamper Detection and Countermeasures (OBJ 3.4).mp4
21.08 MB
24. Detection and Mitigation/2. Tamper Detection and Countermeasures (OBJ 3.4).vtt
11.37 KB
24. Detection and Mitigation/3. Design Mitigations (OBJ 4.2).mp4
28.74 MB
24. Detection and Mitigation/3. Design Mitigations (OBJ 4.2).vtt
14.54 KB
24. Detection and Mitigation/4. Validation Mitigations (OBJ 4.2).mp4
21.73 MB
24. Detection and Mitigation/4. Validation Mitigations (OBJ 4.2).vtt
11.57 KB
24. Detection and Mitigation/5. Safe Functions (OBJ 4.2).mp4
26.62 MB
24. Detection and Mitigation/5. Safe Functions (OBJ 4.2).vtt
14.34 KB
24. Detection and Mitigation/6. Access Control Mitigations (OBJ 4.2).mp4
29.35 MB
24. Detection and Mitigation/6. Access Control Mitigations (OBJ 4.2).vtt
15.21 KB
24. Detection and Mitigation/7. Confidentiality Management (OBJ 4.2).mp4
30.33 MB
24. Detection and Mitigation/7. Confidentiality Management (OBJ 4.2).vtt
16.08 KB
24. Detection and Mitigation/8. Update Management (OBJ 4.2).mp4
31.16 MB
24. Detection and Mitigation/8. Update Management (OBJ 4.2).vtt
16.59 KB
24. Detection and Mitigation/9. Fail-Safe Mechanisms (OBJ 4.2).mp4
18.16 MB
24. Detection and Mitigation/9. Fail-Safe Mechanisms (OBJ 4.2).vtt
9.2 KB
24. Detection and Mitigation/10.24 Checkpoint Detection and Mitigation.html
23.38 KB
25. Threat Modeling Considerations/1. Threat Modeling Considerations (OBJ 1.4 ).mp4
28.06 MB
25. Threat Modeling Considerations/1. Threat Modeling Considerations (OBJ 1.4 ).vtt
17.77 KB
25. Threat Modeling Considerations/2. Threat Actor Motivation (OBJ 1.4 ).mp4
34.79 MB
25. Threat Modeling Considerations/2. Threat Actor Motivation (OBJ 1.4 ).vtt
18.29 KB
25. Threat Modeling Considerations/3. Threat Actor Resources (OBJ 1.4 ).mp4
18.39 MB
25. Threat Modeling Considerations/3. Threat Actor Resources (OBJ 1.4 ).vtt
9.51 KB
25. Threat Modeling Considerations/4. Threat Actor Capabilities (OBJ 1.4 ).mp4
28.13 MB
25. Threat Modeling Considerations/4. Threat Actor Capabilities (OBJ 1.4 ).vtt
14.69 KB
25. Threat Modeling Considerations/5. Attack Patterns (OBJ 1.4 ).mp4
27.07 MB
25. Threat Modeling Considerations/5. Attack Patterns (OBJ 1.4 ).vtt
14.31 KB
25. Threat Modeling Considerations/6. Threat Actor Methods (OBJ 1.4 ).mp4
21.21 MB
25. Threat Modeling Considerations/6. Threat Actor Methods (OBJ 1.4 ).vtt
12.26 KB
25. Threat Modeling Considerations/7. Initial Access and Escalation Methods (OBJ 3.2).mp4
37.77 MB
25. Threat Modeling Considerations/7. Initial Access and Escalation Methods (OBJ 3.2).vtt
17.83 KB
25. Threat Modeling Considerations/8. Post-exploitation and Evasion Methods (OBJ 3.2).mp4
25.96 MB
25. Threat Modeling Considerations/8. Post-exploitation and Evasion Methods (OBJ 3.2).vtt
16.47 KB
25. Threat Modeling Considerations/9.25 Checkpoint Threat Modeling Considerations.html
22.65 KB
26. Threat Modeling Frameworks/1. Threat Modeling Frameworks.mp4
30.9 MB
26. Threat Modeling Frameworks/1. Threat Modeling Frameworks.vtt
19.45 KB
26. Threat Modeling Frameworks/2. Cyber Kill Chain (OBJ 1.4 ).mp4
22.87 MB
26. Threat Modeling Frameworks/2. Cyber Kill Chain (OBJ 1.4 ).vtt
12.58 KB
26. Threat Modeling Frameworks/3. CAPEC (OBJ 1.4 ).mp4
18.52 MB
26. Threat Modeling Frameworks/3. CAPEC (OBJ 1.4 ).vtt
9.56 KB
26. Threat Modeling Frameworks/4. MITRE ATT&CK (OBJ 1.4 ).mp4
28.02 MB
26. Threat Modeling Frameworks/4. MITRE ATT&CK (OBJ 1.4 ).vtt
14.34 KB
26. Threat Modeling Frameworks/5. Diamond Model of Intrusion Analysis (OBJ 1.4 ).mp4
18.02 MB
26. Threat Modeling Frameworks/5. Diamond Model of Intrusion Analysis (OBJ 1.4 ).vtt
10.7 KB
26. Threat Modeling Frameworks/6. STRIDE.mp4
15.88 MB
26. Threat Modeling Frameworks/6. STRIDE.vtt
9.17 KB
26. Threat Modeling Frameworks/7. OWASP (OBJ 1.4 ).mp4
17.41 MB
26. Threat Modeling Frameworks/7. OWASP (OBJ 1.4 ).vtt
9.25 KB
26. Threat Modeling Frameworks/8.26 Checkpoint Threat Modeling Frameworks.html
23.15 KB
27. Attack Surface Determination/1. Attack Surface Determination (OBJ 1.4).mp4
32.4 MB
27. Attack Surface Determination/1. Attack Surface Determination (OBJ 1.4).vtt
20.31 KB
27. Attack Surface Determination/2. Technical Attack Surface (OBJ 1.4 ).mp4
33.89 MB
27. Attack Surface Determination/2. Technical Attack Surface (OBJ 1.4 ).vtt
17.74 KB
27. Attack Surface Determination/3. Operational Attack Surface (OBJ 1.4 ).mp4
25.01 MB
27. Attack Surface Determination/3. Operational Attack Surface (OBJ 1.4 ).vtt
14.46 KB
27. Attack Surface Determination/4. Organizational Attack Surface (OBJ 1.4 ).mp4
18.64 MB
27. Attack Surface Determination/4. Organizational Attack Surface (OBJ 1.4 ).vtt
10.11 KB
27. Attack Surface Determination/5. Cloud Attack Surface (OBJ 1.4 ).mp4
27.6 MB
27. Attack Surface Determination/5. Cloud Attack Surface (OBJ 1.4 ).vtt
14.95 KB
27. Attack Surface Determination/6. Organizational Change Attack Surface (OBJ 1.4 ).mp4
24.91 MB
27. Attack Surface Determination/6. Organizational Change Attack Surface (OBJ 1.4 ).vtt
13.63 KB
27. Attack Surface Determination/7. Modeling with an Existing System (OBJ 1.4 ).mp4
20.02 MB
27. Attack Surface Determination/7. Modeling with an Existing System (OBJ 1.4 ).vtt
9.96 KB
27. Attack Surface Determination/8. Modeling without an Existing System (OBJ 1.4 ).mp4
22.87 MB
27. Attack Surface Determination/8. Modeling without an Existing System (OBJ 1.4 ).vtt
11.43 KB
27. Attack Surface Determination/9.27 Checkpoint Attack Surface Determination.html
22.83 KB
28. Monitoring and Response/1. Monitoring and Response (OBJ 4.1).mp4
40.87 MB
28. Monitoring and Response/1. Monitoring and Response (OBJ 4.1).vtt
25.35 KB
28. Monitoring and Response/2. Aggregate Data Analysis (OBJ 4.1).mp4
26.1 MB
28. Monitoring and Response/2. Aggregate Data Analysis (OBJ 4.1).vtt
13.17 KB
28. Monitoring and Response/3. Threat Intelligence Sources (OBJ 4.1).mp4
40.05 MB
28. Monitoring and Response/3. Threat Intelligence Sources (OBJ 4.1).vtt
20.56 KB
28. Monitoring and Response/4. System Log Sources (OBJ 4.1).mp4
36.97 MB
28. Monitoring and Response/4. System Log Sources (OBJ 4.1).vtt
17.83 KB
28. Monitoring and Response/5. Vulnerabilities and Data Security (OBJ 4.1).mp4
28.41 MB
28. Monitoring and Response/5. Vulnerabilities and Data Security (OBJ 4.1).vtt
14.3 KB
28. Monitoring and Response/6. Behavior Baselines and Analytics (OBJ 4.1).mp4
25.45 MB
28. Monitoring and Response/6. Behavior Baselines and Analytics (OBJ 4.1).vtt
12.38 KB
28. Monitoring and Response/7. SIEM Event Management (OBJ 4.1).mp4
26.32 MB
28. Monitoring and Response/7. SIEM Event Management (OBJ 4.1).vtt
13.1 KB
28. Monitoring and Response/8. SIEM Data Management (OBJ 4.1).mp4
21.1 MB
28. Monitoring and Response/8. SIEM Data Management (OBJ 4.1).vtt
10.14 KB
28. Monitoring and Response/9. Alerting (OBJ 4.1).mp4
36.2 MB
28. Monitoring and Response/9. Alerting (OBJ 4.1).vtt
18.45 KB
28. Monitoring and Response/10. Alert Prioritization Factors (OBJ 4.1).mp4
27.85 MB
28. Monitoring and Response/10. Alert Prioritization Factors (OBJ 4.1).vtt
13.84 KB
28. Monitoring and Response/11. Reporting and Metrics (OBJ 4.1).mp4
19.28 MB
28. Monitoring and Response/11. Reporting and Metrics (OBJ 4.1).vtt
9.78 KB
28. Monitoring and Response/12.28 Checkpoint Monitoring and Response.html
21.79 KB
29. Threat-hunting/1. Threat-hunting (OBJ 2.3, OBJ 4.3).mp4
35.11 MB
29. Threat-hunting/1. Threat-hunting (OBJ 2.3, OBJ 4.3).vtt
22.19 KB
29. Threat-hunting/2. Indicators of Attack (OBJ 4.3).mp4
28.73 MB
29. Threat-hunting/2. Indicators of Attack (OBJ 4.3).vtt
13.62 KB
29. Threat-hunting/3. Behavior and Data Analysis (OBJ 4.3).mp4
27.19 MB
29. Threat-hunting/3. Behavior and Data Analysis (OBJ 4.3).vtt
13.71 KB
29. Threat-hunting/4. Internal Intelligence Sources (OBJ 4.3).mp4
24.95 MB
29. Threat-hunting/4. Internal Intelligence Sources (OBJ 4.3).vtt
13.56 KB
29. Threat-hunting/5. Detection and Threat-hunting Enablers (OBJ 2.3).mp4
25.35 MB
29. Threat-hunting/5. Detection and Threat-hunting Enablers (OBJ 2.3).vtt
13.53 KB
29. Threat-hunting/6. External Intelligence Sources (OBJ 4.3).mp4
31.06 MB
29. Threat-hunting/6. External Intelligence Sources (OBJ 4.3).vtt
16.43 KB
29. Threat-hunting/7. Threat Intelligence Platforms (TIPs) (OBJ 4.3).mp4
20.98 MB
29. Threat-hunting/7. Threat Intelligence Platforms (TIPs) (OBJ 4.3).vtt
11.19 KB
29. Threat-hunting/8. IoC Sharing (OBJ 4.3).mp4
34.94 MB
29. Threat-hunting/8. IoC Sharing (OBJ 4.3).vtt
17.29 KB
29. Threat-hunting/9. Rule-Based Languages (OBJ 4.3).mp4
26.69 MB
29. Threat-hunting/9. Rule-Based Languages (OBJ 4.3).vtt
14.11 KB
29. Threat-hunting/10. Counterintelligence and Operational Security (OBJ 4.3).mp4
23.14 MB
29. Threat-hunting/10. Counterintelligence and Operational Security (OBJ 4.3).vtt
12.1 KB
29. Threat-hunting/11.29 Checkpoint Threat-hunting.html
21.53 KB
30. Indication Analysis/1. Indication Analysis (OBJ 4.4).mp4
30.51 MB
30. Indication Analysis/1. Indication Analysis (OBJ 4.4).vtt
18.52 KB
30. Indication Analysis/2. Infrastructure Analysis (OBJ 4.4).mp4
26.38 MB
30. Indication Analysis/2. Infrastructure Analysis (OBJ 4.4).vtt
13.52 KB
30. Indication Analysis/3. Metadata Analysis (OBJ 4.4).mp4
31.98 MB
30. Indication Analysis/3. Metadata Analysis (OBJ 4.4).vtt
15.47 KB
30. Indication Analysis/4. Volatile and Non-volatile Storage Analysis (OBJ 4.4).mp4
35.33 MB
30. Indication Analysis/4. Volatile and Non-volatile Storage Analysis (OBJ 4.4).vtt
17.22 KB
30. Indication Analysis/5. Reverse Engineering (OBJ 4.4).mp4
32.11 MB
30. Indication Analysis/5. Reverse Engineering (OBJ 4.4).vtt
16.37 KB
30. Indication Analysis/6. Malware Analysis (OBJ 4.4).mp4
22.53 MB
30. Indication Analysis/6. Malware Analysis (OBJ 4.4).vtt
11.26 KB
30. Indication Analysis/7. Code Stylometry (OBJ 4.4).mp4
23.62 MB
30. Indication Analysis/7. Code Stylometry (OBJ 4.4).vtt
12.49 KB
30. Indication Analysis/8. Cloud Workload Protection Platform (OBJ 4.4).mp4
21.18 MB
30. Indication Analysis/8. Cloud Workload Protection Platform (OBJ 4.4).vtt
10.97 KB
30. Indication Analysis/9.30 Checkpoint Indication Analysis.html
22.27 KB
31. Incident Response/1. Incident Response (OBJ 1.2, OBJ 4.4).mp4
22.39 MB
31. Incident Response/1. Incident Response (OBJ 1.2, OBJ 4.4).vtt
14.5 KB
31. Incident Response/2. Preparedness Exercises (OBJ 4.4).mp4
22.62 MB
31. Incident Response/2. Preparedness Exercises (OBJ 4.4).vtt
12.72 KB
31. Incident Response/3. Immediate Response (OBJ 1.2, OBJ 4.4).mp4
26 MB
31. Incident Response/3. Immediate Response (OBJ 1.2, OBJ 4.4).vtt
14.18 KB
31. Incident Response/4. Event Response (OBJ 1.2, OBJ 4.4).mp4
26.3 MB
31. Incident Response/4. Event Response (OBJ 1.2, OBJ 4.4).vtt
14.34 KB
31. Incident Response/5. Attribution (OBJ 4.4).mp4
20.04 MB
31. Incident Response/5. Attribution (OBJ 4.4).vtt
10.88 KB
31. Incident Response/6. Root Cause Analysis (OBJ 4.4).mp4
14.72 MB
31. Incident Response/6. Root Cause Analysis (OBJ 4.4).vtt
7.54 KB
31. Incident Response/7.31 Checkpoint Incident Response.html
22.38 KB
32. Conclusion/1. Conclusion.mp4
34.94 MB
32. Conclusion/1. Conclusion.vtt
24.24 KB
32. Conclusion/2.32 Checkpoint Conclusion.html
18.6 KB
32. Conclusion/3.1 Full-length Practice Exam.html
177.18 KB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。