Тёмный

Managing Incident Response Mitigation and Recovery 

O-Line Security
Подписаться 4,6 тыс.
Просмотров 6 тыс.
50% 1

Опубликовано:

 

30 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 25   
@GodofThought
@GodofThought 9 месяцев назад
thank alot bro...first time doing anything of this magnitude....basically struggling with imposter syndrome....no IT experience...my typing needs work...but i am glad to learn. This experience is both scary and exciting for me and you helped a billion bro,my words cant thankyou enuf. #gratefulinbarbados
@o-linesecurity7109
@o-linesecurity7109 9 месяцев назад
Oh wow! Congrats on taking the first step. So happy we could help you on this journey. When you get a chance check out our Security Fundamentals Academy. It’s for ppl with 0 experience trying to break into IT.
@GodofThought
@GodofThought 9 месяцев назад
@@o-linesecurity7109 as time permits...ill give it a shot...
@rashidimakemak3wizzylover603
@rashidimakemak3wizzylover603 9 месяцев назад
Incoming from Barbados Just completed a speedrun of these with a little assistance from your videos took 4 days at average response time of 39mins. First time I'm going into cyber security as well.
@o-linesecurity7109
@o-linesecurity7109 9 месяцев назад
@@rashidimakemak3wizzylover603 we’re happy to have you here!
@mariesties
@mariesties 9 месяцев назад
Excuse me! How did you add the symbol | inside the terminal?
@o-linesecurity7109
@o-linesecurity7109 9 месяцев назад
Good question. It is a combination of 2 keys. You have to hold "shift" and then the "\" key. Holding shift and then selecting \ will give you this "|".
@mariesties
@mariesties 9 месяцев назад
@@o-linesecurity7109 Thanks a million! I'm going to try it!
@o-linesecurity7109
@o-linesecurity7109 9 месяцев назад
@@mariesties you are very welcome!
@dre3576
@dre3576 Год назад
Centralized log files are easier to search, parse, and archive.
@o-linesecurity7109
@o-linesecurity7109 Год назад
Great answer!
@sishibly
@sishibly 3 года назад
Num 3: Centralized log files are easier to search, parse, and archive.
@o-linesecurity7109
@o-linesecurity7109 3 года назад
Absolutely! Good job!
@FailingStreetBridge
@FailingStreetBridge Год назад
Finished all the labs! Thanks for your help
@o-linesecurity7109
@o-linesecurity7109 Год назад
You are very welcome! Hopefully this can help others!
@mohdhasan4785
@mohdhasan4785 Год назад
Thank you very much for the great efforts.
@o-linesecurity7109
@o-linesecurity7109 Год назад
You are very welcome sir!
@scoremode1
@scoremode1 3 года назад
I'm learning a lot with these labs and great practice. Thanks again.
@o-linesecurity7109
@o-linesecurity7109 3 года назад
Anytime Craig! Thanks for your comment!
@zoebmaredia1830
@zoebmaredia1830 2 года назад
What key in a keyboard you use to save and quit VIM file ?
@o-linesecurity7109
@o-linesecurity7109 2 года назад
Good question. Hit the “:” and then “wq” to quit and save or “q!” to quit without saving.
@zoebmaredia1830
@zoebmaredia1830 2 года назад
@@o-linesecurity7109 I tried but it’s giving me an error
@o-linesecurity7109
@o-linesecurity7109 2 года назад
@@zoebmaredia1830 you may have to join us on a Cyber Thursday so we can help you troubleshoot.
@zoebmaredia1830
@zoebmaredia1830 2 года назад
@@o-linesecurity7109 I’m sorry I found the problem i forgot su - root
@o-linesecurity7109
@o-linesecurity7109 2 года назад
@@zoebmaredia1830 good job troubleshooting.
Далее
Managing Data Sources for Incident Response
20:00
Просмотров 3,2 тыс.
Applied Lab Identifying Application Attacks
17:12
Просмотров 4,6 тыс.
skibidi army returns (skibidi toilet 77)
00:49
Просмотров 2,5 млн
What does an Incident Response Consultant Do?
8:28
Просмотров 5 тыс.
Applied Lab Securing the Network Infrastructure
32:14
Backing up and Restoring Data in Windows and Linux
24:15
Windows Recall (was) a Security Nightmare
37:04
Просмотров 159 тыс.
Configuring Mitigation Controls
12:43
Просмотров 2,3 тыс.