kingers Posted March 16 Report Share Posted March 16 4.19 GB | 00:02:18 | mp4 | 1280X720 | 16:9Genre:eLearning |Language:EnglishFiles Included :01 introduction-to-course-5.mp4 (16.06 MB)04 da-queshia-my-path-to-cybersecurity.mp4 (13.9 MB)01 welcome-to-module-1.mp4 (10.16 MB)02 the-what-why-and-how-of-asset-security.mp4 (20.75 MB)04 tri-life-in-asset-security.mp4 (16.96 MB)05 security-starts-with-asset-classification.mp4 (16.89 MB)01 assets-in-a-digital-world.mp4 (17.96 MB)01 elements-of-a-security-plan.mp4 (20.22 MB)02 the-nist-cybersecurity-framework.mp4 (20.35 MB)01 wrap-up.mp4 (6.83 MB)01 welcome-to-module-2.mp4 (9.84 MB)02 security-controls.mp4 (19.6 MB)06 heather-the-importance-of-protecting-pii.mp4 (14.55 MB)01 fundamentals-of-cryptography.mp4 (22.57 MB)02 public-key-infrastructure.mp4 (21.15 MB)07 non-repudiation-and-hashing.mp4 (13.51 MB)01 access-controls-and-authentication-systems.mp4 (18.28 MB)03 the-mechanisms-of-authorization.mp4 (25.17 MB)04 why-we-audit-user-activity.mp4 (16.24 MB)05 tim-finding-purpose-in-protecting-assets.mp4 (6.95 MB)01 wrap-up.mp4 (8.23 MB)01 welcome-to-module-3.mp4 (9.15 MB)02 vulnerability-management.mp4 (21.96 MB)03 defense-in-depth-strategy.mp4 (19.92 MB)04 common-vulnerabilities-and-exposures.mp4 (27.86 MB)01 vulnerability-assessments.mp4 (19.46 MB)04 omad-my-learning-journey-into-cybersecurity.mp4 (9.89 MB)01 protect-all-entry-points.mp4 (22.54 MB)04 niru-adopt-an-attacker-mindset.mp4 (18.08 MB)05 pathways-through-defenses.mp4 (22.4 MB)01 wrap-up.mp4 (11.83 MB)01 welcome-to-module-4.mp4 (8.59 MB)02 the-criminal-art-of-persuasion.mp4 (21.7 MB)04 phishing-for-information.mp4 (24.02 MB)01 malicious-software.mp4 (24.52 MB)03 the-rise-of-cryptojacking.mp4 (23.67 MB)01 cross-site-scripting-xss.mp4 (21.5 MB)02 exploitable-gaps-in-databases.mp4 (17.44 MB)01 a-proactive-approach-to-security.mp4 (17.07 MB)02 chantelle-the-value-of-diversity-in-cybersecurity.mp4 (13.42 MB)03 pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 (17.8 MB)01 wrap-up.mp4 (8.07 MB)02 course-wrap-up.mp4 (17.66 MB)01 introduction-to-course-7.mp4 (18.04 MB)03 angel-my-personal-career-journey.mp4 (16.51 MB)01 welcome-to-module-1.mp4 (7.8 MB)02 python-and-cybersecurity.mp4 (20.08 MB)04 create-a-basic-python-script.mp4 (8.44 MB)07 akash-python-and-the-cybersecurity-professional.mp4 (5.72 MB)01 data-types-in-python.mp4 (19.4 MB)03 work-with-variables-in-python.mp4 (21.69 MB)01 conditional-statements-in-python.mp4 (17.68 MB)03 for-loops.mp4 (12.2 MB)04 while-loops.mp4 (10.19 MB)01 wrap-up.mp4 (3.43 MB)01 welcome-to-module-2.mp4 (5.01 MB)02 introduction-to-functions.mp4 (13.82 MB)03 create-a-basic-function.mp4 (7.14 MB)01 use-parameters-in-functions.mp4 (10.62 MB)02 return-statements.mp4 (13.7 MB)04 explore-built-in-functions.mp4 (21 MB)01 modules-and-libraries.mp4 (11.35 MB)03 code-readability.mp4 (19.2 MB)05 dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 (11.39 MB)01 wrap-up.mp4 (3.75 MB)01 welcome-to-module-3.mp4 (4.89 MB)02 string-operations.mp4 (21.28 MB)03 string-indices-and-slices.mp4 (20.29 MB)01 list-operations-in-python.mp4 (19.31 MB)02 write-a-simple-algorithm.mp4 (16.32 MB)01 regular-expressions-in-python.mp4 (21.86 MB)01 wrap-up.mp4 (3.67 MB)01 welcome-to-module-4.mp4 (5.14 MB)02 automate-cybersecurity-tasks-with-python.mp4 (19.07 MB)04 clancy-continual-learning-and-python.mp4 (11.33 MB)01 access-a-text-file-in-python.mp4 (10.51 MB)03 parse-a-text-file-in-python.mp4 (10.01 MB)05 develop-a-parsing-algorithm-in-python.mp4 (15.23 MB)01 debugging-strategies.mp4 (23.1 MB)02 matt-learning-from-mistakes.mp4 (28.17 MB)03 apply-debugging-strategies.mp4 (13.56 MB)01 wrap-up.mp4 (2.89 MB)02 course-wrap-up.mp4 (11.84 MB)01 introduction-to-course-6.mp4 (7.17 MB)04 dave-grow-your-cybersecurity-career-with-mentors.mp4 (13.9 MB)01 welcome-to-module-1.mp4 (5.79 MB)02 introduction-to-the-incident-response-lifecycle.mp4 (16.65 MB)01 incident-response-teams.mp4 (12.64 MB)02 fatima-the-importance-of-communication-during-incident-response.mp4 (15.18 MB)04 incident-response-plans.mp4 (9.73 MB)01 incident-response-tools.mp4 (5.66 MB)02 the-value-of-documentation.mp4 (10.94 MB)03 intrusion-detection-systems.mp4 (5.61 MB)05 alert-and-event-management-with-siem-and-soar-tools.mp4 (14.97 MB)01 wrap-up.mp4 (2.42 MB)01 welcome-to-module-2.mp4 (3.79 MB)02 casey-apply-soft-skills-in-cybersecurity.mp4 (13.89 MB)03 the-importance-of-network-traffic-flows.mp4 (13.01 MB)05 data-exfiltration-attacks.mp4 (16.15 MB)01 packets-and-packet-captures.mp4 (10.78 MB)03 interpret-network-communications-with-packets.mp4 (8.03 MB)04 reexamine-the-fields-of-a-packet-header.mp4 (14.08 MB)01 packet-captures-with-tcpdump.mp4 (9.44 MB)01 wrap-up.mp4 (3.29 MB)01 welcome-to-module-3.mp4 (3.54 MB)02 the-detection-and-analysis-phase-of-the-lifecycle.mp4 (8.88 MB)04 mk-changes-in-the-cybersecurity-industry.mp4 (13.39 MB)01 the-benefits-of-documentation.mp4 (9.28 MB)02 document-evidence-with-chain-of-custody-forms.mp4 (13.04 MB)04 the-value-of-cybersecurity-playbooks.mp4 (13.57 MB)01 the-role-of-triage-in-incident-response.mp4 (12.2 MB)02 robin-foster-cross-team-collaboration.mp4 (14.14 MB)04 the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 (10.08 MB)01 the-post-incident-activity-phase-of-the-lifecycle.mp4 (8.73 MB)01 wrap-up.mp4 (2.85 MB)01 welcome-to-module-4.mp4 (5.03 MB)02 the-importance-of-logs.mp4 (13.59 MB)04 rebecca-learn-new-tools-and-technologies.mp4 (9.32 MB)05 variations-of-logs.mp4 (12.09 MB)01 security-monitoring-with-detection-tools.mp4 (12.87 MB)03 grace-security-mindset-in-detection-and-response.mp4 (13.85 MB)04 components-of-a-detection-signature.mp4 (12.93 MB)05 examine-signatures-with-suricata.mp4 (8.49 MB)06 examine-suricata-logs.mp4 (7.5 MB)01 reexamine-siem-tools.mp4 (9.55 MB)03 query-for-events-with-splunk.mp4 (9.51 MB)04 query-for-events-with-chronicle.mp4 (8.66 MB)01 wrap-up.mp4 (3.47 MB)02 course-wrap-up.mp4 (5.75 MB)01 welcome-to-the-google-cybersecurity-certificate.mp4 (47.29 MB)04 welcome-to-week-1.mp4 (4.67 MB)01 introduction-to-cybersecurity.mp4 (23.11 MB)02 toni-my-path-to-cybersecurity.mp4 (20 MB)03 responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 (14.5 MB)04 nikki-a-day-in-the-life-of-a-security-engineer.mp4 (16.05 MB)01 core-skills-for-cybersecurity-professionals.mp4 (19.65 MB)02 veronica-my-path-to-working-in-cybersecurity.mp4 (11.01 MB)04 the-importance-of-cybersecurity.mp4 (17.84 MB)01 wrap-up.mp4 (3.99 MB)01 welcome-to-module-2.mp4 (6.71 MB)02 past-cybersecurity-attacks.mp4 (22.5 MB)03 attacks-in-the-digital-age.mp4 (25.52 MB)05 sean-keep-your-cool-during-a-data-breach.mp4 (13.88 MB)01 introduction-to-the-eight-cissp-security-domains-part-1.mp4 (18.32 MB)02 introduction-to-the-eight-cissp-security-domains-part-2.mp4 (17.31 MB)01 wrap-up.mp4 (7.36 MB)01 welcome-to-module-3.mp4 (14.48 MB)02 introduction-to-security-frameworks-and-controls.mp4 (23.41 MB)03 secure-design.mp4 (18.58 MB)05 heather-protect-sensitive-data-and-information.mp4 (16.82 MB)01 ethics-in-cybersecurity.mp4 (22.54 MB)03 holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 (14.62 MB)01 wrap-up.mp4 (4.7 MB)01 welcome-to-module-4.mp4 (7.04 MB)02 common-cybersecurity-tools.mp4 (20.23 MB)01 introduction-to-linux-sql-and-python.mp4 (14.49 MB)01 wrap-up.mp4 (2.06 MB)02 course-wrap-up.mp4 (7.71 MB)01 introduction-to-course-4.mp4 (8.66 MB)01 welcome-to-module-1.mp4 (2.94 MB)02 kim-my-journey-into-computing.mp4 (10.92 MB)03 introduction-to-operating-systems.mp4 (11.51 MB)01 inside-the-operating-system.mp4 (10.46 MB)03 resource-allocation-via-the-os.mp4 (9.58 MB)01 gui-versus-cli.mp4 (14.08 MB)03 ellen-my-path-into-cybersecurity.mp4 (12.42 MB)01 wrap-up.mp4 (3.16 MB)01 welcome-to-module-2.mp4 (3.23 MB)02 introduction-to-linux.mp4 (12.6 MB)03 phil-learn-and-grow-in-the-cybersecurity-field.mp4 (12.59 MB)04 linux-architecture.mp4 (11.81 MB)01 linux-distributions.mp4 (10.3 MB)02 kali-linux-tm.mp4 (7.17 MB)01 introduction-to-the-shell.mp4 (5.98 MB)03 input-and-output-in-the-shell.mp4 (8.58 MB)01 wrap-up.mp4 (2.83 MB)01 welcome-to-module-3.mp4 (5.11 MB)02 linux-commands-via-the-bash-shell.mp4 (10.2 MB)03 core-commands-for-navigation-and-reading-files.mp4 (11.26 MB)01 find-what-you-need-with-linux.mp4 (10.87 MB)04 create-and-modify-directories-and-files.mp4 (17.8 MB)01 file-permissions-and-ownership.mp4 (16.73 MB)02 change-permissions.mp4 (9.4 MB)05 add-and-delete-users.mp4 (14.68 MB)01 damar-my-journey-into-linux-commands.mp4 (63.38 MB)02 the-linux-community.mp4 (5.99 MB)03 man-pages-within-the-shell.mp4 (6.58 MB)01 wrap-up.mp4 (3.36 MB)01 welcome-to-module-4.mp4 (5.29 MB)02 introduction-to-databases.mp4 (10.43 MB)03 query-databases-with-sql.mp4 (8.5 MB)05 adedayo-sql-in-cybersecurity.mp4 (13.7 MB)01 basic-queries.mp4 (8.95 MB)04 basic-filters-on-sql-queries.mp4 (14.77 MB)01 filter-dates-and-numbers.mp4 (10.99 MB)03 filters-with-and-or-and-not.mp4 (16.09 MB)01 join-tables-in-sql.mp4 (12.29 MB)02 types-of-joins.mp4 (7.97 MB)01 wrap-up.mp4 (3.38 MB)02 course-wrap-up.mp4 (3.76 MB)01 introduction-to-course-2.mp4 (7.91 MB)01 welcome-to-module-1.mp4 (4.46 MB)02 explore-the-cissp-security-domains-part-1.mp4 (19.14 MB)03 explore-the-cissp-security-domains-part-2.mp4 (18.52 MB)05 ashley-my-path-to-cybersecurity.mp4 (19.83 MB)01 threats-risks-and-vulnerabilities.mp4 (17.04 MB)02 key-impacts-of-threats-risks-and-vulnerabilities.mp4 (17.7 MB)03 herbert-manage-threats-risks-and-vulnerabilities.mp4 (9.61 MB)04 nist-s-risk-management-framework.mp4 (16.35 MB)01 wrap-up.mp4 (3.95 MB)01 welcome-to-module-2.mp4 (5.42 MB)02 frameworks.mp4 (10.33 MB)03 controls.mp4 (14.11 MB)01 explore-the-cia-triad.mp4 (14.74 MB)01 nist-frameworks.mp4 (18 MB)02 explore-the-six-functions-of-the-nist-cybersecurity-framework.mp4 (15.63 MB)01 owasp-security-principles.mp4 (19.01 MB)03 wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 (9.96 MB)04 plan-a-security-audit.mp4 (16.69 MB)05 complete-a-security-audit.mp4 (16.98 MB)01 wrap-up.mp4 (7.07 MB)01 welcome-to-module-3.mp4 (4.27 MB)02 logs-and-siem-tools.mp4 (8.88 MB)03 siem-dashboards.mp4 (10.76 MB)05 parisa-the-parallels-of-accessibility-and-security.mp4 (16.41 MB)01 explore-common-siem-tools.mp4 (14.71 MB)03 talya-myths-about-the-cybersecurity-field.mp4 (9.58 MB)01 wrap-up.mp4 (2.62 MB)01 welcome-to-module-4.mp4 (2.97 MB)02 phases-of-an-incident-response-playbook.mp4 (24.3 MB)04 zack-incident-response-and-the-value-of-playbooks.mp4 (13.81 MB)01 use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 (19.05 MB)02 erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 (19.88 MB)01 wrap-up.mp4 (4.37 MB)02 course-wrap-up.mp4 (5.22 MB)01 introduction-to-course-3.mp4 (3.6 MB)01 welcome-to-module-1.mp4 (2.3 MB)02 chris-my-path-to-cybersecurity.mp4 (18.89 MB)03 what-are-networks.mp4 (6.22 MB)04 tina-working-in-network-security.mp4 (11.31 MB)05 emmanuel-useful-skills-for-network-security.mp4 (13.33 MB)06 network-tools.mp4 (7.03 MB)08 cloud-networks.mp4 (8.77 MB)01 introduction-to-network-communication.mp4 (7.25 MB)02 the-tcp-ip-model.mp4 (8.96 MB)03 the-four-layers-of-the-tcp-ip-model.mp4 (6.47 MB)01 ip-addresses-and-network-communication.mp4 (7.31 MB)01 wrap-up.mp4 (1.71 MB)01 welcome-to-module-2.mp4 (4.6 MB)02 network-protocols.mp4 (11.29 MB)05 antara-working-in-network-security.mp4 (16.1 MB)06 wireless-protocols.mp4 (5.11 MB)01 firewalls-and-network-security-measures.mp4 (16.81 MB)02 virtual-private-networks-vpns.mp4 (8.06 MB)03 security-zones.mp4 (12 MB)05 proxy-servers.mp4 (11.21 MB)01 wrap-up.mp4 (2.77 MB)01 welcome-to-module-3.mp4 (1.32 MB)02 the-case-for-securing-networks.mp4 (5.52 MB)04 matt-a-professional-on-dealing-with-attacks.mp4 (16.81 MB)01 denial-of-service-dos-attacks.mp4 (18.55 MB)01 malicious-packet-sniffing.mp4 (19.32 MB)02 ip-spoofing.mp4 (11.52 MB)01 wrap-up.mp4 (2.93 MB)01 welcome-to-module-4.mp4 (3.84 MB)02 security-hardening.mp4 (12.25 MB)01 os-hardening-practices.mp4 (18.03 MB)01 network-hardening-practices.mp4 (16.9 MB)01 network-security-in-the-cloud.mp4 (9.73 MB)02 kelsey-cloud-security-explained.mp4 (21.94 MB)01 wrap-up.mp4 (3.14 MB)02 course-wrap-up.mp4 (6.64 MB)01 introduction-to-course-8.mp4 (13.12 MB)03 dion-my-personal-career-journey.mp4 (16.87 MB)01 welcome-to-module-1.mp4 (1.79 MB)02 security-as-a-mindset.mp4 (16.95 MB)01 detect-and-protect-without-neglect.mp4 (18.6 MB)01 wrap-up.mp4 (4.09 MB)01 welcome-to-module-2.mp4 (6.07 MB)02 the-importance-of-escalation.mp4 (18.97 MB)01 prepare-to-escalate-through-security-recognition.mp4 (17.27 MB)01 from-simple-activity-to-major-data-breach.mp4 (18.28 MB)02 when-and-how-to-escalate-a-security-incident.mp4 (12.83 MB)01 wrap-up.mp4 (4.5 MB)01 welcome-to-module-3.mp4 (3.69 MB)02 stakeholders-in-cybersecurity.mp4 (15.13 MB)01 clear-and-coNCISe-communication.mp4 (12.14 MB)02 building-blocks-of-cybersecurity-communications.mp4 (17 MB)01 visual-storytelling-in-cybersecurity.mp4 (16.07 MB)03 how-to-create-a-visual-dashboard.mp4 (18.13 MB)01 wrap-up.mp4 (9.05 MB)01 welcome-to-module-4.mp4 (6.84 MB)02 helpful-cybersecurity-resources.mp4 (15.26 MB)04 victoria-continue-your-learning-journey.mp4 (15.43 MB)01 engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 (14.69 MB)03 sarah-network-in-the-cybersecurity-community.mp4 (10.28 MB)01 wrap-up.mp4 (3.85 MB)01 welcome-to-module-5.mp4 (7.55 MB)02 find-cybersecurity-jobs.mp4 (16.32 MB)03 what-is-your-career-identity.mp4 (61.8 MB)04 create-a-resume.mp4 (11.92 MB)07 garvey-cover-letter-tips.mp4 (11.61 MB)01 explore-the-interview-process.mp4 (14 MB)03 garvey-technical-interview-tips.mp4 (11.21 MB)05 conduct-pre-interview-research.mp4 (12.58 MB)06 build-rapport-with-interviewers.mp4 (13.6 MB)01 use-strategies-to-answer-interview-questions.mp4 (12.02 MB)05 ask-the-interviewer-questions.mp4 (7.91 MB)06 karan-interview-tips-from-a-hiring-manager.mp4 (18.5 MB)01 develop-an-elevator-pitch.mp4 (13 MB)05 emily-overcome-imposter-syndrome.mp4 (13.95 MB)01 wrap-up.mp4 (1.96 MB)03 course-wrap-up.mp4 (2.75 MB)02 luis-driving-impact-with-ai-in-the-workplace.mp4 (36.56 MB)04 boost-your-cybersecurity-skills-with-ai.mp4 (59.17 MB)05 decode-complex-security-frameworks-with-ai.mp4 (49.35 MB)06 use-ai-to-help-identify-bugs.mp4 (34.67 MB)07 refine-code-with-help-from-ai.mp4 (25.73 MB)08 understand-system-vulnerabilities-with-ai.mp4 (53.24 MB)09 prioritize-alerts-with-ai.mp4 (30.66 MB)11 introducing-google-ai-essentials.mp4 (5.91 MB)01 recap-of-the-google-cybersecurity-certificate-program.mp4 (8.85 MB)02 congratulations-on-completing-the-google-cybersecurity-certificate-program.mp4 (9.41 MB)]Screenshot https://rapidgator.net/file/5cecc1b875a0051aed2e8b4f6241bb9d/Coursera.-.Google.Cybersecurity.Professional.Certificate.part1.rarhttps://rapidgator.net/file/ca116037c71cdbf80b410d655fbb15f5/Coursera.-.Google.Cybersecurity.Professional.Certificate.part2.rarhttps://rapidgator.net/file/26a0fa53c9d2e076ef876d4b4640857c/Coursera.-.Google.Cybersecurity.Professional.Certificate.part3.rarhttps://rapidgator.net/file/52ca0dace7775effcafec2b83e36256b/Coursera.-.Google.Cybersecurity.Professional.Certificate.part4.rarhttps://rapidgator.net/file/d921e206040a7ba7a1fd55abf009eed1/Coursera.-.Google.Cybersecurity.Professional.Certificate.part5.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now