FileMood

Download [ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management

CourseWikia com CompTIA Cybersecurity Analyst CySA CS0 003 Vulnerability Management

Name

[ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

614.3 MB

Total Files

172

Last Seen

2025-07-17 23:43

Hash

C81C902983E84CF7092623445B99B2242DBDC5F2

/

Get Bonus Downloads Here.url

0.2 KB

/01 - Introduction/

01 - Vulnerability management.mp4

4.6 MB

01 - Vulnerability management.srt

1.6 KB

02 - What you need to know.mp4

1.2 MB

02 - What you need to know.srt

1.3 KB

03 - Study resources.mp4

3.9 MB

03 - Study resources.srt

2.8 KB

/.../02 - 1. Creating a Vulnerability Management Program/

01 - What is vulnerability management.mp4

8.6 MB

01 - What is vulnerability management.srt

9.4 KB

02 - Identify scan targets.mp4

10.2 MB

02 - Identify scan targets.srt

11.3 KB

03 - Scan frequency.mp4

10.5 MB

03 - Scan frequency.srt

8.2 KB

/.../03 - 2. Network Mapping/

01 - Network scanning.mp4

4.3 MB

01 - Network scanning.srt

3.1 KB

02 - Install Nmap on Windows.mp4

11.0 MB

02 - Install Nmap on Windows.srt

10.4 KB

03 - Install Nmap on macOS.mp4

4.8 MB

03 - Install Nmap on macOS.srt

4.5 KB

04 - Run and interpret a simple Nmap scan.mp4

7.0 MB

04 - Run and interpret a simple Nmap scan.srt

6.7 KB

05 - Host discovery with Nmap.mp4

7.5 MB

05 - Host discovery with Nmap.srt

8.0 KB

06 - Operate system fingerprinting.mp4

6.8 MB

06 - Operate system fingerprinting.srt

7.3 KB

07 - Service version detection.mp4

3.0 MB

07 - Service version detection.srt

3.3 KB

/.../04 - 3. Configuring and Executing Vulnerability Scans/

01 - Security baseline scanning.mp4

2.0 MB

01 - Security baseline scanning.srt

1.7 KB

02 - Scan configuration.mp4

11.4 MB

02 - Scan configuration.srt

12.1 KB

03 - Scan perspective.mp4

9.2 MB

03 - Scan perspective.srt

9.4 KB

04 - Scanner maintenance.mp4

5.6 MB

04 - Scanner maintenance.srt

6.5 KB

05 - Vulnerability scanning tools.mp4

3.6 MB

05 - Vulnerability scanning tools.srt

2.2 KB

06 - Passive vulnerability scanning.mp4

3.1 MB

06 - Passive vulnerability scanning.srt

3.5 KB

/.../05 - 4. Analyzing Scan Results/

01 - SCAP.mp4

4.2 MB

01 - SCAP.srt

4.3 KB

02 - CVSS.mp4

5.7 MB

02 - CVSS.srt

6.3 KB

03 - Interpret CVSS scores.mp4

7.2 MB

03 - Interpret CVSS scores.srt

5.5 KB

04 - Analyze scan reports.mp4

8.1 MB

04 - Analyze scan reports.srt

7.5 KB

05 - Correlate scan results.mp4

4.8 MB

05 - Correlate scan results.srt

4.5 KB

/.../06 - 5. Common Vulnerabilities/

01 - Server vulnerabilities.mp4

13.0 MB

01 - Server vulnerabilities.srt

10.7 KB

02 - Endpoint vulnerabilities.mp4

6.1 MB

02 - Endpoint vulnerabilities.srt

3.2 KB

03 - Network vulnerabilities.mp4

8.0 MB

03 - Network vulnerabilities.srt

8.8 KB

/.../07 - 6. Software Security Issues/

01 - OWASP Top 10.mp4

10.9 MB

01 - OWASP Top 10.srt

10.2 KB

02 - Prevent SQL injection.mp4

8.4 MB

02 - Prevent SQL injection.srt

9.7 KB

03 - Understand cross-site scripting.mp4

8.9 MB

03 - Understand cross-site scripting.srt

9.3 KB

04 - Request forgery.mp4

9.4 MB

04 - Request forgery.srt

8.0 KB

05 - Privilege escalation.mp4

3.2 MB

05 - Privilege escalation.srt

3.7 KB

06 - Directory traversal.mp4

7.5 MB

06 - Directory traversal.srt

5.6 KB

07 - File inclusion.mp4

3.2 MB

07 - File inclusion.srt

3.5 KB

08 - Overflow attacks.mp4

9.9 MB

08 - Overflow attacks.srt

6.2 KB

09 - Cookies and attachments.mp4

8.4 MB

09 - Cookies and attachments.srt

8.1 KB

10 - Session hijacking.mp4

9.6 MB

10 - Session hijacking.srt

7.0 KB

11 - Race conditions.mp4

5.0 MB

11 - Race conditions.srt

4.2 KB

12 - Memory vulnerabilities.mp4

6.7 MB

12 - Memory vulnerabilities.srt

6.7 KB

13 - Code execution attacks.mp4

5.2 MB

13 - Code execution attacks.srt

5.1 KB

14 - Data poisoning.mp4

1.9 MB

14 - Data poisoning.srt

2.0 KB

15 - Third-party code.mp4

9.0 MB

15 - Third-party code.srt

6.8 KB

16 - Interception proxies.mp4

13.7 MB

16 - Interception proxies.srt

9.2 KB

/.../08 - 7. Specialized Technology Vulnerabilities/

01 - Industrial control systems.mp4

11.5 MB

01 - Industrial control systems.srt

10.2 KB

02 - Internet of Things.mp4

7.7 MB

02 - Internet of Things.srt

5.7 KB

03 - Embedded systems.mp4

10.6 MB

03 - Embedded systems.srt

8.4 KB

/.../09 - 8. More Cybersecurity Tools/

01 - Exploitation frameworks.mp4

12.3 MB

01 - Exploitation frameworks.srt

11.6 KB

02 - Cloud auditing tools.mp4

13.0 MB

02 - Cloud auditing tools.srt

7.9 KB

03 - Debuggers.mp4

1.2 MB

03 - Debuggers.srt

1.5 KB

04 - Open-source reconnaissance.mp4

2.4 MB

04 - Open-source reconnaissance.srt

1.8 KB

05 - Control frameworks.mp4

21.9 MB

05 - Control frameworks.srt

13.6 KB

/.../10 - 9. Software Development Lifecycle/

01 - Software platforms.mp4

5.1 MB

01 - Software platforms.srt

4.2 KB

02 - Development methodologies.mp4

18.1 MB

02 - Development methodologies.srt

11.9 KB

03 - Maturity models.mp4

5.9 MB

03 - Maturity models.srt

6.6 KB

04 - Change management.mp4

8.2 MB

04 - Change management.srt

8.2 KB

/.../11 - 10. Secure Coding Practices/

01 - Input validation.mp4

5.2 MB

01 - Input validation.srt

5.4 KB

02 - Parameterized queries.mp4

7.3 MB

02 - Parameterized queries.srt

6.1 KB

03 - Authentication and session management issues.mp4

3.2 MB

03 - Authentication and session management issues.srt

3.6 KB

04 - Output encoding.mp4

6.9 MB

04 - Output encoding.srt

5.4 KB

05 - Error and exception handling.mp4

5.1 MB

05 - Error and exception handling.srt

6.0 KB

06 - Code signing.mp4

5.2 MB

06 - Code signing.srt

4.2 KB

07 - Database security.mp4

6.9 MB

07 - Database security.srt

7.4 KB

08 - Data de-identification.mp4

5.9 MB

08 - Data de-identification.srt

5.3 KB

09 - Data obfuscation.mp4

3.5 MB

09 - Data obfuscation.srt

4.2 KB

/.../12 - 11. Software Quality Assurance/

01 - Software testing.mp4

4.9 MB

01 - Software testing.srt

5.0 KB

02 - Code security tests.mp4

3.7 MB

02 - Code security tests.srt

4.3 KB

03 - Fuzzing.mp4

16.9 MB

03 - Fuzzing.srt

13.2 KB

04 - Reverse engineering software.mp4

7.5 MB

04 - Reverse engineering software.srt

7.4 KB

05 - Reverse engineering hardware.mp4

6.7 MB

05 - Reverse engineering hardware.srt

5.3 KB

/.../13 - 12. Threat Modeling/

01 - Threat research.mp4

3.8 MB

01 - Threat research.srt

2.9 KB

02 - Identify threats.mp4

4.1 MB

02 - Identify threats.srt

4.3 KB

03 - Understand attacks.mp4

8.4 MB

03 - Understand attacks.srt

9.2 KB

04 - Threat modeling.mp4

7.4 MB

04 - Threat modeling.srt

6.2 KB

05 - Attack surface management.mp4

2.2 MB

05 - Attack surface management.srt

2.4 KB

06 - Bug bounty.mp4

9.1 MB

06 - Bug bounty.srt

6.9 KB

/.../14 - 13. Security Governance/

01 - Align security with the business.mp4

6.2 MB

01 - Align security with the business.srt

5.7 KB

02 - Organizational processes.mp4

5.6 MB

02 - Organizational processes.srt

5.9 KB

03 - Security roles and responsibilities.mp4

4.4 MB

03 - Security roles and responsibilities.srt

4.4 KB

04 - Security control selection.mp4

8.7 MB

04 - Security control selection.srt

9.2 KB

/.../15 - 14. Risk Management/

01 - Risk assessment.mp4

8.2 MB

01 - Risk assessment.srt

8.7 KB

02 - Quantitative risk assessment.mp4

10.7 MB

02 - Quantitative risk assessment.srt

10.9 KB

03 - Risk treatment options.mp4

9.5 MB

03 - Risk treatment options.srt

7.6 KB

04 - Risk management frameworks.mp4

7.1 MB

04 - Risk management frameworks.srt

5.6 KB

05 - Risk visibility and reporting.mp4

12.7 MB

05 - Risk visibility and reporting.srt

8.4 KB

/16 - Conclusion/

01 - Continue your studies.mp4

2.3 MB

01 - Continue your studies.srt

1.2 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

 

Total files 172


Copyright © 2025 FileMood.com