Jump to content

Recommended Posts

Does anyone know if Resilio is up and working?  I installed it and I think it might be working but it isnt showing anything available.  Thanks

Share this post


Link to post
Share on other sites
Posted (edited)

Added PDF:

  • SEC504 (2019).

 

Resilio took down the sync share.
I'mma post the magnet soon. Stay tuned.

Edited by whatareyou
  • Like 5

Share this post


Link to post
Share on other sites
5 hours ago, whatareyou said:

Torrent:

Hidden Content

 

Hidden Content

    Give reaction to this post to see the hidden content.

 

 

@whatareyou is the magnet working ? I can't even retrieve the metadata.

Has the download started for anyone ?

Share this post


Link to post
Share on other sites
1 hour ago, Seanway said:

@whatareyou is the magnet working ? I can't even retrieve the metadata.

Has the download started for anyone ?

It takes time to download the metadata..it did work for me.

Share this post


Link to post
Share on other sites
On 6/13/2018 at 12:53 AM, whatareyou said:

Only SANS text and video materials.

 

PDF:

  • ICS410 - ICS/SCADA Security Essentials
    • 2018
  • AUD507 - Auditing & Monitoring Networks, Perimeters & Systems
    • 2016
  • DEV540 - Secure DevOps and Cloud Application Security
    • 2017
  • FOR500 - Windows Forensic Analysis
    • 2017
  • FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
    • 2019
  • FOR518 - Mac and iOS Forensic Analysis and Incident Response
    • 2015
  • FOR526 - Advanced Memory Forensics and Threat Detection
    • 2018
  • FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response
    • 2017
  • FOR578 - Cyber Threat Intelligence
    • 2018
  • FOR585 - Advanced Smartphone Forensics
    • 2017
  • FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques
    • 2017
  • MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression
    • 2011
  • MGT514 - Security Strategic Planning, Policy, and Leadership
    • 2016
  • MGT517 - Managing Security Operations Detection, Response, and Intelligence
    • 2018
  • SEC201 - Computing & Technology Essentials
    • 2017
  • SEC401 - Security Essentials Bootcamp Style
    • 2017
  • SEC460 - Enterprise Threat and Vulnerability Assessment
    • 2018
  • SEC487 - Open-Source Intelligence (OSINT) Gathering and Analysis
    • 2018
  • SEC501 - Advanced Security Essentials - Enterprise Defender
    • 2016
  • SEC503 - Intrusion Detection In-Depth
    • 2015
  • SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling
    • 2019
  • SEC505 - Securing Windows and PowerShell Automation
    • 2020
  • SEC506 - Securing Linux-Unix
    • 2017
  • SEC511 - Continuous Monitoring and Security Operations
    • 2016
  • SEC524 - Cloud Security Fundamentals
    • 2012
  • SEC542 - Web App Penetration Testing and Ethical Hacking
    • 2016
  • SEC545 - Cloud Security Architecture and Operations
    • 2017
  • SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception
    • 2016
  • SEC555 - SIEM with Tactical Analytics
    • 2017
  • SEC560 - Network Penetration Testing and Ethical Hacking
    • 2018
  • SEC561 - Immersive Hands-On Hacking Techniques
    • 2015
  • SEC564 - Red Team Operations and Threat Emulation
    • 2020
  • SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth
    • 2016
  • SEC573 - Automating Information Security with Python
    • 2017
  • SEC579 - Virtualization and Software-Defined Security
    • 2016
  • SEC580 - Metasploit Kung Fu for Enterprise Pen Testing
    • 2016
  • SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses
    • 2019
  • SEC617 - Wireless Penetration Testing and Ethical Hacking
    • 2019
  • SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
    • 2017
  • SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
    • 2019
  • SEC760 - Advanced Exploit Development for Penetration Testers
    • 2019

Video:

  • AUD507 - Auditing & Monitoring Networks, Perimeters & Systems
    • 2013
  • FOR500 - Windows Forensic Analysis
    • 2018
  • FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
    • 2019
  • FOR610 - Reverse-Engineering Malware: Malware Analysis Tools and Techniques
    • 2015
  • FOR526 - Advanced Memory Forensics and Threat Detection
    • 2018
  • SEC401 - Security Essentials Bootcamp Style
    • 2017
  • SEC503 - Network Intrusion Detection
    • 2018
  • SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling
    • 2018
  • SEC505 - Securing Windows and PowerShell Automation
    • 2020
  • SEC506 - Securing Linux-Unix
    • 2011
  • SEC542 - Web App Penetration Testing and Ethical Hacking
    • 2018
  • SEC560 - Network Penetration Testing and Ethical Hacking
    • 2018
  • SEC564 - Red Team Exercises and Adversary Emulation
    • 2020
  • SEC575 - Mobile Device Security and Ethical Hacking
    • 2017
  • SEC580 - Metasploit Kung Fu for Enterprise Pen Testing
    • 2011
  • SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses
    • 2019
  • SEC617 - Wireless Penetration Testing and Ethical Hacking
    • 2019
  • SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
    • 2018
  • SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
    • 2019

Hidden Content

 

Size: 93.1 GB

Hidden Content

    Give reaction to this post to see the hidden content.

 

 

dude please seed it some of the files are not there please seed it 

 

  • Like 2

Share this post


Link to post
Share on other sites
On 6/12/2018 at 11:53 PM, whatareyou said:

Only SANS text and video materials.

 

PDF:

  • ICS410 - ICS/SCADA Security Essentials
    • 2018
  • AUD507 - Auditing & Monitoring Networks, Perimeters & Systems
    • 2016
  • DEV540 - Secure DevOps and Cloud Application Security
    • 2017
  • FOR500 - Windows Forensic Analysis
    • 2017
  • FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
    • 2019
  • FOR518 - Mac and iOS Forensic Analysis and Incident Response
    • 2015
  • FOR526 - Advanced Memory Forensics and Threat Detection
    • 2018
  • FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response
    • 2017
  • FOR578 - Cyber Threat Intelligence
    • 2018
  • FOR585 - Advanced Smartphone Forensics
    • 2017
  • FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques
    • 2017
  • MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression
    • 2011
  • MGT514 - Security Strategic Planning, Policy, and Leadership
    • 2016
  • MGT517 - Managing Security Operations Detection, Response, and Intelligence
    • 2018
  • SEC201 - Computing & Technology Essentials
    • 2017
  • SEC401 - Security Essentials Bootcamp Style
    • 2017
  • SEC460 - Enterprise Threat and Vulnerability Assessment
    • 2018
  • SEC487 - Open-Source Intelligence (OSINT) Gathering and Analysis
    • 2018
  • SEC501 - Advanced Security Essentials - Enterprise Defender
    • 2016
  • SEC503 - Intrusion Detection In-Depth
    • 2015
  • SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling
    • 2019
  • SEC505 - Securing Windows and PowerShell Automation
    • 2020
  • SEC506 - Securing Linux-Unix
    • 2017
  • SEC511 - Continuous Monitoring and Security Operations
    • 2016
  • SEC524 - Cloud Security Fundamentals
    • 2012
  • SEC542 - Web App Penetration Testing and Ethical Hacking
    • 2016
  • SEC545 - Cloud Security Architecture and Operations
    • 2017
  • SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception
    • 2016
  • SEC555 - SIEM with Tactical Analytics
    • 2017
  • SEC560 - Network Penetration Testing and Ethical Hacking
    • 2018
  • SEC561 - Immersive Hands-On Hacking Techniques
    • 2015
  • SEC564 - Red Team Operations and Threat Emulation
    • 2020
  • SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth
    • 2016
  • SEC573 - Automating Information Security with Python
    • 2017
  • SEC579 - Virtualization and Software-Defined Security
    • 2016
  • SEC580 - Metasploit Kung Fu for Enterprise Pen Testing
    • 2016
  • SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses
    • 2019
  • SEC617 - Wireless Penetration Testing and Ethical Hacking
    • 2019
  • SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
    • 2017
  • SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
    • 2019
  • SEC760 - Advanced Exploit Development for Penetration Testers
    • 2019

Video:

  • AUD507 - Auditing & Monitoring Networks, Perimeters & Systems
    • 2013
  • FOR500 - Windows Forensic Analysis
    • 2018
  • FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
    • 2019
  • FOR610 - Reverse-Engineering Malware: Malware Analysis Tools and Techniques
    • 2015
  • FOR526 - Advanced Memory Forensics and Threat Detection
    • 2018
  • SEC401 - Security Essentials Bootcamp Style
    • 2017
  • SEC503 - Network Intrusion Detection
    • 2018
  • SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling
    • 2018
  • SEC505 - Securing Windows and PowerShell Automation
    • 2020
  • SEC506 - Securing Linux-Unix
    • 2011
  • SEC542 - Web App Penetration Testing and Ethical Hacking
    • 2018
  • SEC560 - Network Penetration Testing and Ethical Hacking
    • 2018
  • SEC564 - Red Team Exercises and Adversary Emulation
    • 2020
  • SEC575 - Mobile Device Security and Ethical Hacking
    • 2017
  • SEC580 - Metasploit Kung Fu for Enterprise Pen Testing
    • 2011
  • SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses
    • 2019
  • SEC617 - Wireless Penetration Testing and Ethical Hacking
    • 2019
  • SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
    • 2018
  • SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
    • 2019

 

Hidden Content

  • Give reaction to this post to see the hidden content.

 

how to download - ICS410 - ICS/SCADA Security Essentials 

please help

  • Like 2
  • Thanks 1
  • Haha 1

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...