Похожие видео
array(20) {
["yt-xTzRgEns"]=>
object(stdClass)#5791 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "yt-xTzRgEns"
["related_video_title"]=>
string(52) "Pentesting for Supply Chains and the Role of the MSP"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["20fdE4aJyDI"]=>
object(stdClass)#5799 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "20fdE4aJyDI"
["related_video_title"]=>
string(101) "Cybersecurity Incident Response Tabletop Exercise Scenario | Cybersecurity Leadership | Day 3 – Ep3"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["MsGl6lX-YaI"]=>
object(stdClass)#5789 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "MsGl6lX-YaI"
["related_video_title"]=>
string(83) "Cybersecurity IDR: Incident Detection & Response | Google Cybersecurity Certificate"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["nVR8qr2ivOg"]=>
object(stdClass)#5801 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "nVR8qr2ivOg"
["related_video_title"]=>
string(64) "How to Conduct a Tabletop Exercise for Better Emergency Response"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["CutAmBVwON4"]=>
object(stdClass)#5783 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "CutAmBVwON4"
["related_video_title"]=>
string(165) "CyberCamp 2023. Бой с тенью: как киберразведка помогает сократить время реагирования на инцидент"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["Pz7enIMx39s"]=>
object(stdClass)#5795 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Pz7enIMx39s"
["related_video_title"]=>
string(80) "NIST CSF 2.0 Framework Training - IT/Cybersecurity Audit and Compliance Training"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["-uwENcQzXj8"]=>
object(stdClass)#5787 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "-uwENcQzXj8"
["related_video_title"]=>
string(91) "CertMike объясняет процесс реагирования на инциденты"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["EdSYsC6sSNA"]=>
object(stdClass)#5800 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "EdSYsC6sSNA"
["related_video_title"]=>
string(122) "⚡️ Удар «Кинжалами» по Киеву || Срочный вылет Зеленского из страны"
["posted_time"]=>
string(23) "9 часов назад"
["channelName"]=>
NULL
}
["T-gRbVj3ebw"]=>
object(stdClass)#5777 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "T-gRbVj3ebw"
["related_video_title"]=>
string(109) "Самый мощный ОБВАЛ у ВСУ! Сотни трупов! Военные сводки 14.11.2025"
["posted_time"]=>
string(21) "4 часа назад"
["channelName"]=>
NULL
}
["zXmZnU2GdVk"]=>
object(stdClass)#5798 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "zXmZnU2GdVk"
["related_video_title"]=>
string(42) "When Cybercriminals with Good OpSec Attack"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
NULL
}
["-g_CRiaS6-4"]=>
object(stdClass)#5790 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "-g_CRiaS6-4"
["related_video_title"]=>
string(49) "Backdoors & Breaches: Live Tabletop Exercise Demo"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["0M55onu7mVI"]=>
object(stdClass)#5796 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "0M55onu7mVI"
["related_video_title"]=>
string(53) "Handling Ransomware Incidents: What YOU Need to Know!"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["QAqSEI1ETEY"]=>
object(stdClass)#5784 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "QAqSEI1ETEY"
["related_video_title"]=>
string(71) "Cyber Security: A Practical Application of NIST Cybersecurity Framework"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
NULL
}
["Jk79QJCxPkM"]=>
object(stdClass)#5782 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Jk79QJCxPkM"
["related_video_title"]=>
string(36) "Cybersecurity Architecture: Response"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["9X069Ez_hFg"]=>
object(stdClass)#5780 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "9X069Ez_hFg"
["related_video_title"]=>
string(92) "Incident Response in Cyber Security Mini Course | Learn Incident Response in Under Two Hours"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["HGebdyahHs0"]=>
object(stdClass)#5781 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "HGebdyahHs0"
["related_video_title"]=>
string(48) "NIST Cybersecurity Framework: A Beginner's Guide"
["posted_time"]=>
string(27) "8 месяцев назад"
["channelName"]=>
NULL
}
["GDUwVp1-8DM"]=>
object(stdClass)#5778 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "GDUwVp1-8DM"
["related_video_title"]=>
string(63) "Webinar: Simulating a Cyber Attack – Table-Top Best Practices"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
NULL
}
["EjY26pq9yME"]=>
object(stdClass)#5779 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "EjY26pq9yME"
["related_video_title"]=>
string(52) "Mastering Phishing Email Analysis: Incident Response"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["BenNxrg_VJw"]=>
object(stdClass)#5767 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "BenNxrg_VJw"
["related_video_title"]=>
string(49) "Cyber Day | A TABLE-TOP CRISIS-RESPONSE EXERCISE"
["posted_time"]=>
string(19) "9 лет назад"
["channelName"]=>
NULL
}
["Q1IoGX--814"]=>
object(stdClass)#5768 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Q1IoGX--814"
["related_video_title"]=>
string(0) ""
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
NULL
}
}
Pentesting for Supply Chains and the Role of the MSP
Cybersecurity Incident Response Tabletop Exercise Scenario | Cybersecurity Leadership | Day 3 – Ep3
Cybersecurity IDR: Incident Detection & Response | Google Cybersecurity Certificate
How to Conduct a Tabletop Exercise for Better Emergency Response
CyberCamp 2023. Бой с тенью: как киберразведка помогает сократить время реагирования на инцидент
NIST CSF 2.0 Framework Training - IT/Cybersecurity Audit and Compliance Training
CertMike объясняет процесс реагирования на инциденты
⚡️ Удар «Кинжалами» по Киеву || Срочный вылет Зеленского из страны
Самый мощный ОБВАЛ у ВСУ! Сотни трупов! Военные сводки 14.11.2025
When Cybercriminals with Good OpSec Attack
Backdoors & Breaches: Live Tabletop Exercise Demo
Handling Ransomware Incidents: What YOU Need to Know!
Cyber Security: A Practical Application of NIST Cybersecurity Framework
Cybersecurity Architecture: Response
Incident Response in Cyber Security Mini Course | Learn Incident Response in Under Two Hours
NIST Cybersecurity Framework: A Beginner's Guide
Webinar: Simulating a Cyber Attack – Table-Top Best Practices
Mastering Phishing Email Analysis: Incident Response
Cyber Day | A TABLE-TOP CRISIS-RESPONSE EXERCISE