FileMood

Download CBT Nuggets - CompTIA CySA+ (CS0-001) [AhLaN]

CBT Nuggets CompTIA CySA CS0 001 AhLaN

Name

CBT Nuggets - CompTIA CySA+ (CS0-001) [AhLaN]

 DOWNLOAD Copy Link

Total Size

1.7 GB

Total Files

73

Last Seen

2024-10-15 23:34

Hash

791249E36F2777B67D733B73E802B5D979847F14

/level 1.0/

09 - 1.0 Threat Management_ Using NMAP for Host, Port, and OS Discovery_ VLab.mp4

80.8 MB

01 - 1.0 Threat Management_ Vocabulary Related to Threats and Attacks.mp4

23.6 MB

02 - 1.0 Threat Management_ Attack Categories, Types, and Vectors.mp4

18.0 MB

03 - 1.0 Threat Management_ Reconnaissance and Footprinting Overview.mp4

28.9 MB

04 - 1.0 Threat Management_ Using DNS for Reconnaissance.mp4

26.8 MB

05 - 1.0 Threat Management_ Direct Network Scanning Overview.mp4

16.0 MB

06 - 1.0 Threat Management_ Direct Network Scanning Methodology .mp4

27.6 MB

07 - 1.0 Threat Management_ Port Discovery Overview.mp4

26.6 MB

08 - 1.0 Threat Management_ OS and App Fingerprinting.mp4

25.4 MB

10 - 1.0 Threat Management_ Vulnerability Scanning Tools.mp4

21.8 MB

11 - 1. Threat Management_ Vulnerability Scan Scenario.mp4

14.5 MB

12 - 1. Threat Management_ Network Mapping.mp4

12.5 MB

13 - 1. Threat Management_ Understanding System Hacking.mp4

27.8 MB

14 - 1. Threat Management_ Honeypot Overview.mp4

25.1 MB

15 - 1. Threat Management_ Using a Network Scanner To See a Honeypot.mp4

32.2 MB

16 - 1. Threat Management_ Social Engineering Overview.mp4

16.4 MB

17 - 1. Threat Management_ Phases and Methods of Social Engineering.mp4

16.6 MB

18 - 1. Threat Management_ Phishing Overview.mp4

25.3 MB

19 - 1. Threat Management_ Defending Against Phishing.mp4

25.6 MB

20 - 1. Threat Management_ Packet Capture and Analysis Overview.mp4

20.1 MB

21 - 1. Threat Management_ Practicing Packet Capture and Protocol Analysis_ VLab.mp4

45.2 MB

22 - 1. Threat Management_ Logging Overview.mp4

29.1 MB

23 - 1. Threat Management_ Firewall_Router ACL Review.mp4

26.6 MB

24 - 1. Threat Management_ Trend Awareness.mp4

29.7 MB

25 - 1. Threat Management_ Hardening and Other Best Practices.mp4

23.0 MB

26 - 1. Threat Management_ Whitelisting and Access Control.mp4

17.2 MB

27 - 1. Threat Management_ Evaluating Risk.mp4

20.0 MB

28 - 1. Threat Management_ Network Access Control (NAC).mp4

26.4 MB

29 - 1. Threat Management_ Uncovering Vulnerabilities.mp4

25.9 MB

/

Seed Me!!.png

43.1 KB

AhLaN.txt

1.0 KB

/level 2.0/

30 - 2. Vulnerability Management_ Motivators for Vulnerability Management.mp4

19.5 MB

31 - 2. Vulnerability Management_ SCAP Overview.mp4

17.8 MB

32 - 2. Vulnerability Management_ What to Ask When Doing Focused Vulnerability Scanning.mp4

27.5 MB

33 - 2. Vulnerability Management_ Remediation Considerations.mp4

25.2 MB

34 - 2. Vulnerability Management_ Review and Interpret Output_ Web Server Version.mp4

23.1 MB

35 - 2. Vulnerability Management_ Analyzing Vulnerability Scan Output_ Enumeration of Shares.mp4

21.5 MB

36 - 2. Vulnerability Management_ Vulnerabilities in Servers.mp4

33.7 MB

37 - 2. Vulnerability Management_ Vulnerabilities in Endpoints.mp4

24.8 MB

38 - 2. Vulnerability Management_ Vulnerabilities in Infrastructure Devices.mp4

24.1 MB

39 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Weak Policy.mp4

24.9 MB

40 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Traveling.mp4

23.9 MB

41 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Remote Wipe.mp4

20.2 MB

42 - 2. Vulnerability Management_ Vulnerabilities Regarding Interconnected Networks.mp4

19.9 MB

43 - 2. Vulnerability Management_ Physical and Virtual Device Vulnerabilities.mp4

26.3 MB

44 - 2. Vulnerability Management_ Using ACLs and VPNs to Reduce Vulnerabilities.mp4

19.2 MB

/level 3.0/

45 - 3. Cyber Incident Response_ Threat Classification.mp4

23.6 MB

46 - 3. Cyber Incident Response_ Factors Contributing to Incident Severity and Prioritization.mp4

22.7 MB

47 - 3. Cyber Incident Response_ Building a Forensic Tool Kit.mp4

26.1 MB

48 - 3. Cyber Incident Response_ Tool Categories in a Forensic Investigation Suite.mp4

20.8 MB

49 - 3. Cyber Incident Response_ Communication During an Incident Response.mp4

34.4 MB

50 - 3. Cyber Incident Response_ Abnormal Traffic Patterns that May Indicate a Cyber Incident.mp4

23.6 MB

51 - 3. Cyber Incident Response_ Network Scans as a Symptom of a Cyber Incident.mp4

16.1 MB

52 - 3. Cyber Incident Response_ Host-Related Cybersecurity Symptoms.mp4

27.2 MB

53 - 3. Cyber Incident Response_ Application-Related Cyber Incident Symptoms.mp4

13.2 MB

54 - 3. Cyber Incident Response_ Containment and Eradication Techniques.mp4

30.3 MB

55 - 3. Cyber Incident Response_ Validation of Post-Incident Remediation .mp4

20.8 MB

56 - 3. Cyber Incident Response_ Corrective Actions, Updates, and Reports.mp4

12.5 MB

/level 4.0/

57 - 4.0 Security Architecture_ Security Frameworks for IT.mp4

18.2 MB

58 - 4.0 Security Architecture_ Regulatory Compliance and Control Types.mp4

24.2 MB

59 - 4.0 Security Architecture_ Verification and Validation of Controls.mp4

15.1 MB

60 - 4.0 Security Architecture_ Having Policies to Improve Security.mp4

15.9 MB

61 - 4.0 Security Architecture_ Having Procedures to Improve Security.mp4

15.9 MB

62 - 4.0 Security Architecture_ Identity Context and Repositories .mp4

26.4 MB

63 - 4.0 Security Architecture_ SSO and Federations.mp4

21.9 MB

64 - 4.0 Security Architecture_ Exploits Related to Identity and Access.mp4

24.4 MB

65 - 4.0 Security Architecture_ Recommending Compensating Controls.mp4

26.1 MB

66 - 4.0 Security Architecture_ Best Practices During Software Development.mp4

24.8 MB

67 - 4.0 Security Architecture_ Secure Coding Best Practices.mp4

24.5 MB

68 - 4.0 Security Architecture_ Identifying Preventive Tools and Technologies.mp4

25.4 MB

69 - 4.0 Security Architecture_ Selecting and Applying Appropriate Preventive Tools.mp4

24.5 MB

70 - 4.0 Security Architecture_ Tools and Technologies for Information Collection.mp4

18.7 MB

71 - 4.0 Security Architecture_ Tools and Tech for Analysis, Exploits, and Forensics.mp4

20.3 MB

 

Total files 73


Copyright © 2024 FileMood.com