Companies Home Search Profile

Certified Cybercop Blue Team

Focused View

13:43:27

112 View
  • 1 - Blue Team Introduction.mp4
    32:33
  • 2 - Blue Team Methodology.mp4
    44:23
  • 3 - Recruiting Blue Team Members.mp4
    20:22
  • 4 - Intro to Linux.mp4
    52:04
  • 5 - Linux Firewalls.mp4
    38:55
  • 6 - Bash Programming.mp4
    38:22
  • 7 - Kali Linux Bash Scripting.mp4
    26:47
  • 8 - Linux Package Management Part 1.mp4
    20:56
  • 9 - Linux Package Management Part 2.mp4
    43:46
  • 10 - What is a Linux Server Shifting through services.mp4
    01:23:04
  • 11 - Software Development Lifecycle SDLC.mp4
    33:53
  • 12 - Identity and Access IAM.mp4
    51:37
  • 13 - Vulnerability Scanning Part 1.mp4
    16:27
  • 14 - Vulnerability Scanning Part 2.mp4
    25:48
  • 15 - Security Information Event Management.mp4
    27:59
  • 16 - Incident Response Toolkit.mp4
    21:32
  • 17 - Security Orchestration Automation and Response SOAR.mp4
    27:59
  • 18 - Policies to Mitigate Risk.mp4
    19:20
  • 19 - Setting Localization Options.mp4
    19:42
  • 20 - Threat and Vulnerability Management.mp4
    36:47
  • 21 - Cryptography and PKI.mp4
    30:07
  • 22 - Mobile Device Hacking Part 1.mp4
    01:06:52
  • 23 - Mobile Device Hacking Part 2.mp4
    08:51
  • 24 - Digital Forensics.mp4
    35:21
  • 25 - Free Flashcards.html
  • 25 - blue-team-Flash-Crads-certcop.pdf
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 24
    • duration 13:43:27
    • Release Date 2023/05/16

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness