FileMood

Download [FreeCourseLab.com] Udemy - CompTIA CySA+ (CS0-001) Complete Course and Practice Exam

FreeCourseLab com Udemy CompTIA CySA CS0 001 Complete Course and Practice Exam

Name

[FreeCourseLab.com] Udemy - CompTIA CySA+ (CS0-001) Complete Course and Practice Exam

 DOWNLOAD Copy Link

Total Size

3.9 GB

Total Files

413

Hash

BE59A9DDA63C4D04C3D528A9F41457960044DF26

/1. Welcome and Introduction/

1. Welcome to the Course.mp4

15.7 MB

1. Welcome to the Course.vtt

8.6 KB

1.1 CompTIA CySA+ (Study Notes).pdf.pdf

7.3 MB

2. Exam Foundations.mp4

19.7 MB

2. Exam Foundations.vtt

8.0 KB

2.1 02 - Exam Foundations.pdf.pdf

1.9 MB

3. A Special Message From Jason Dion.mp4

40.3 MB

3. A Special Message From Jason Dion.vtt

4.2 KB

/2. Domain 1 Threat Management (27%)/

1. Domain 1 Threat Management.mp4

5.0 MB

1. Domain 1 Threat Management.vtt

2.3 KB

1.1 Domain 1 - Threat Management.pdf.pdf

62.9 MB

10. Network Perimeter Security.mp4

37.6 MB

10. Network Perimeter Security.vtt

15.1 KB

10.1 13 - Network Perimeter Security.pdf.pdf

3.3 MB

11. Network Segmentation.mp4

12.1 MB

11. Network Segmentation.vtt

5.5 KB

11.1 14 - Network Segmentation.pdf.pdf

1.4 MB

12. Network Access Control.mp4

28.2 MB

12. Network Access Control.vtt

12.8 KB

12.1 15 - Network Access Control.pdf.pdf

1.9 MB

13. Defense Deception Methods.mp4

16.8 MB

13. Defense Deception Methods.vtt

7.8 KB

13.1 16 - Defense Deception Methods.pdf.pdf

1.5 MB

14. Secure Endpoint Management.mp4

34.2 MB

14. Secure Endpoint Management.vtt

15.4 KB

14.1 17 - Secure Endpoint Management.pdf.pdf

2.4 MB

15. Penetration Testing.mp4

36.4 MB

15. Penetration Testing.vtt

16.6 KB

15.1 18 - Penetration Testing.pdf.pdf

2.4 MB

16. Security Exercises and Training.mp4

14.1 MB

16. Security Exercises and Training.vtt

6.7 KB

16.1 19 - Security Exercises and Training.pdf.pdf

1.5 MB

17. Reverse Engineering.mp4

29.2 MB

17. Reverse Engineering.vtt

13.7 KB

17.1 20 - Reverse Engineering.pdf.pdf

1.5 MB

18. Quiz Defense Against Cyber Threats.html

0.1 KB

19. Reconnaissance and Intelligence.mp4

5.8 MB

19. Reconnaissance and Intelligence.vtt

2.5 KB

19.1 21 - Reconnaissance and Intelligence.pdf.pdf

511.2 KB

2. CIA Triad.mp4

38.0 MB

2. CIA Triad.vtt

17.1 KB

2.1 05 - CIA Triad.pdf.pdf

2.9 MB

20. Footprinting the Network.mp4

14.1 MB

20. Footprinting the Network.vtt

6.2 KB

20.1 22 - Footprinting the Network.pdf.pdf

827.4 KB

21. Network Mapping.mp4

18.4 MB

21. Network Mapping.vtt

8.0 KB

21.1 23 - Network Mapping.pdf.pdf

1.2 MB

22. Port Scanning.mp4

25.6 MB

22. Port Scanning.vtt

11.1 KB

22.1 24 - Port Scanning.pdf.pdf

1.9 MB

23. Other Port Scanners.mp4

9.9 MB

23. Other Port Scanners.vtt

4.0 KB

23.1 25 - Other Port Scanners.pdf.pdf

827.6 KB

24. NMAP - Demonstration of the world's most popular port scanning tool.mp4

10.4 MB

24. NMAP - Demonstration of the world's most popular port scanning tool.vtt

11.5 KB

25. Passive Reconnaissance.mp4

12.9 MB

25. Passive Reconnaissance.vtt

5.9 KB

25.1 27 - Passive Reconnaissance.pdf.pdf

825.6 KB

26. Passive Recon - Network Devices.mp4

39.9 MB

26. Passive Recon - Network Devices.vtt

16.8 KB

26.1 28 - Passive Recon - Network Devices.pdf.pdf

3.5 MB

27. Passive Recon - Netstat.mp4

23.3 MB

27. Passive Recon - Netstat.vtt

9.6 KB

27.1 29 - Passive Recon - Netstat.pdf.pdf

2.1 MB

28. DHCP Logs and Configs.mp4

15.5 MB

28. DHCP Logs and Configs.vtt

6.0 KB

28.1 30 - DHCP Logs and Configs.pdf.pdf

1.5 MB

29. Firewall Logs and Configs.mp4

18.5 MB

29. Firewall Logs and Configs.vtt

7.4 KB

29.1 Example Firewall Logs from CISCO.html

0.1 KB

29.2 31 - Firewall Logs and Configs.pdf.pdf

1.5 MB

3. Risk Consideration.mp4

26.4 MB

3. Risk Consideration.vtt

12.0 KB

3.1 06 - Risk Considerations.pdf.pdf

3.1 MB

30. System and Host Log Files.mp4

12.4 MB

30. System and Host Log Files.vtt

5.3 KB

30.1 32 - System and Host Log Files.pdf.pdf

1.1 MB

31. DNS Harvesting.mp4

17.2 MB

31. DNS Harvesting.vtt

6.3 KB

31.1 33 - DNS Harvesting.pdf.pdf

2.0 MB

32. Domain Names and IP Ranges.mp4

12.6 MB

32. Domain Names and IP Ranges.vtt

5.3 KB

32.1 34 - Domain Names and IP Ranges.pdf.pdf

827.3 KB

33. DNS Zone Transfers.mp4

16.7 MB

33. DNS Zone Transfers.vtt

7.1 KB

33.1 35 - DNS Zone Transfers.pdf.pdf

1.1 MB

34. Whois and Host Commands.mp4

14.8 MB

34. Whois and Host Commands.vtt

6.5 KB

34.1 36 - Whois and Host Commands.pdf.pdf

1.6 MB

35. Information Gathering and Aggregation.mp4

20.3 MB

35. Information Gathering and Aggregation.vtt

8.9 KB

35.1 37 - Information Gathering and Aggregation.pdf.pdf

2.1 MB

36. Organizational Intelligence.mp4

35.9 MB

36. Organizational Intelligence.vtt

17.4 KB

36.1 38 - Organizational Intelligence.pdf.pdf

2.6 MB

37. Detecting, Preventing, and Responding to Reconnaissance.mp4

31.1 MB

37. Detecting, Preventing, and Responding to Reconnaissance.vtt

15.4 KB

37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf

2.1 MB

38. Quiz Reconnaissance and Intelligence Gathering.html

0.1 KB

4. Risk Assessment.mp4

16.3 MB

4. Risk Assessment.vtt

7.0 KB

4.1 07 - Risk Assessment.pdf.pdf

1.5 MB

5. Identify Threats.mp4

30.8 MB

5. Identify Threats.vtt

14.0 KB

5.1 08 - Identify Threats.pdf.pdf

3.0 MB

6. Identify Vulnerabilities.mp4

11.3 MB

6. Identify Vulnerabilities.vtt

4.9 KB

6.1 09 - Identify Vulnerabilities.pdf.pdf

1.7 MB

7. Likelihood, Impact, and Risk.mp4

14.3 MB

7. Likelihood, Impact, and Risk.vtt

6.1 KB

7.1 10 - Likelihood, Impact, and Risk.pdf.pdf

1.7 MB

8. Qualitative and Quantitative Assessments.mp4

19.5 MB

8. Qualitative and Quantitative Assessments.vtt

11.3 KB

8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf

2.3 MB

9. Reviewing Controls.mp4

33.3 MB

9. Reviewing Controls.vtt

15.5 KB

9.1 12 - Revieiwing Controls.pdf.pdf

2.1 MB

/3. Domain 2 Vulnerability Management (26%)/

1. Domain 2 Vulnerability Management.mp4

10.7 MB

1. Domain 2 Vulnerability Management.vtt

5.9 KB

1.1 Domain 2 - Vulnerability Management.pdf.pdf

172.6 MB

1.2 40 - Domain 2 - Vulnerability Management.pdf.pdf

1.5 MB

10. Maintaining Scanners.mp4

9.6 MB

10. Maintaining Scanners.vtt

7.6 KB

10.1 49 - Maintaining Scanners.pdf.pdf

2.0 MB

11. Standardizing Vulnerabilities.mp4

9.5 MB

11. Standardizing Vulnerabilities.vtt

6.8 KB

11.1 50 - Standardizing Vulnerabilities.pdf.pdf

3.3 MB

12. Workflow for Remediation.mp4

12.5 MB

12. Workflow for Remediation.vtt

6.3 KB

12.1 51 - Workflow for Remediation.pdf.pdf

1.5 MB

13. Vulnerability Reporting.mp4

19.6 MB

13. Vulnerability Reporting.vtt

9.0 KB

13.1 52 - Vulnerability Reporting.pdf.pdf

2.9 MB

14. Remediation Priority.mp4

19.9 MB

14. Remediation Priority.vtt

8.8 KB

14.1 53 - Remediation Reporting.pdf.pdf

2.1 MB

15. Implementing and Testing.mp4

24.8 MB

15. Implementing and Testing.vtt

12.7 KB

15.1 54 - Implementing and Testing.pdf.pdf

1.8 MB

16. Nessus Vulnerability Scanner A Walkthrough.mp4

17.6 MB

16. Nessus Vulnerability Scanner A Walkthrough.vtt

18.6 KB

16.1 55 - Nessus-Scan-Report-Example.pdf.pdf

1.2 MB

17. Quiz Vulnerability Management Program.html

0.1 KB

18. Interpreting Scan Results.mp4

38.1 MB

18. Interpreting Scan Results.vtt

18.6 KB

18.1 56 - Interpreting Scan Results.pdf.pdf

4.6 MB

19. Interpreting CVSS.mp4

28.8 MB

19. Interpreting CVSS.vtt

13.5 KB

19.1 57 - Interpeting CVSS.pdf.pdf

3.4 MB

2. Regulatory Requirements.mp4

20.5 MB

2. Regulatory Requirements.vtt

15.8 KB

2.1 41 - Regulatory Requirements.pdf.pdf

2.2 MB

20. Calculating the CVSS Score.mp4

18.5 MB

20. Calculating the CVSS Score.vtt

7.7 KB

20.1 58 - Calculating the CVSS Score.pdf.pdf

2.2 MB

21. CVSS Temporal Score.mp4

16.9 MB

21. CVSS Temporal Score.vtt

7.7 KB

21.1 59 - CVSS Temporal Score.pdf.pdf

2.7 MB

22. Validation of Results.mp4

30.2 MB

22. Validation of Results.vtt

15.1 KB

22.1 60 - Validation of Results.pdf.pdf

2.6 MB

23. Common Vulnerabilities.mp4

12.9 MB

23. Common Vulnerabilities.vtt

5.7 KB

23.1 61 - Common Vulnerabilities.pdf.pdf

1.2 MB

24. Server and Host Vulnerabilities.mp4

19.4 MB

24. Server and Host Vulnerabilities.vtt

14.4 KB

24.1 62 - Server and Host Vulnerabilities.pdf.pdf

4.3 MB

25. Network Vulnerabilities.mp4

18.1 MB

25. Network Vulnerabilities.vtt

12.4 KB

25.1 63 - Network Vulnerabilities.pdf.pdf

4.6 MB

26. Virtualization Vulnerabilities.mp4

13.3 MB

26. Virtualization Vulnerabilities.vtt

9.5 KB

26.1 64 - Virtualization Vulnerabilities.pdf.pdf

2.5 MB

27. Web Application Vulnerabilities.mp4

26.2 MB

27. Web Application Vulnerabilities.vtt

11.3 KB

27.1 65 - Web Application Vulnerabilities.pdf.pdf

2.4 MB

28. Internet of Things (IoT) Vulnerabilities.mp4

17.2 MB

28. Internet of Things (IoT) Vulnerabilities.vtt

7.6 KB

28.1 66 - Internet of Things (IoT) Vulnerabilities.pdf.pdf

1.7 MB

29. Quiz Analyzing Vulnerability Reports.html

0.1 KB

3. Corporate Requirements.mp4

21.4 MB

3. Corporate Requirements.vtt

15.5 KB

3.1 42 - Corporate Requirements.pdf.pdf

4.4 MB

4. Scanning Tools.mp4

10.9 MB

4. Scanning Tools.vtt

7.9 KB

4.1 43 - Scanning Tools.pdf.pdf

4.8 MB

5. Scoping Scans.mp4

10.5 MB

5. Scoping Scans.vtt

7.6 KB

5.1 44 - Scoping Scans.pdf.pdf

1.4 MB

6. Configuring Scans.mp4

2.9 MB

6. Configuring Scans.vtt

1.2 KB

6.1 45 - Configuring Scans.pdf.pdf

510.6 KB

7. Scanning Sensitivity.mp4

17.0 MB

7. Scanning Sensitivity.vtt

7.3 KB

7.1 46 - Scanning Sensitivity.pdf.pdf

2.3 MB

8. Scanning Perspective.mp4

4.5 MB

8. Scanning Perspective.vtt

3.0 KB

8.1 47 - Scanning Perspective.pdf.pdf

1.5 MB

9. Authenticated Scanning.mp4

10.2 MB

9. Authenticated Scanning.vtt

8.6 KB

9.1 48 - Authenticated Scanning.pdf.pdf

1.6 MB

/4. Domain 3 Cyber Incident Response (23%)/

1. Domain 3 Cyber Incident Response.mp4

8.0 MB

1. Domain 3 Cyber Incident Response.vtt

3.5 KB

1.1 67 - Domain 3 - Cyber Incident Response.pdf.pdf

1.5 MB

1.2 Domain 3 - Cyber Incident Response.pdf.pdf

65.0 MB

10. Network Monitoring Tools.mp4

23.4 MB

10. Network Monitoring Tools.vtt

10.8 KB

10.1 75 - Network Monitoring Tools.pdf.pdf

4.6 MB

11. Detecting Network Events.mp4

28.4 MB

11. Detecting Network Events.vtt

13.2 KB

11.1 76 - Detecting Network Events.pdf.pdf

2.1 MB

12. Network Probes and Attacks.mp4

26.7 MB

12. Network Probes and Attacks.vtt

14.1 KB

12.1 77 - Network Probes and Attacks.pdf.pdf

2.9 MB

13. Server and Host Events.mp4

23.9 MB

13. Server and Host Events.vtt

11.6 KB

13.1 78 - Server and Host Events.pdf.pdf

2.6 MB

14. Service and Application Events.mp4

24.2 MB

14. Service and Application Events.vtt

11.6 KB

14.1 79 - Service and Application Events.pdf.pdf

3.0 MB

15. Quiz Symptoms of Cyber Attacks.html

0.1 KB

16. Digital Forensics.mp4

12.1 MB

16. Digital Forensics.vtt

6.4 KB

16.1 80 - Digital Forensics.pdf.pdf

1.5 MB

17. Forensic Toolkit Components.mp4

38.0 MB

17. Forensic Toolkit Components.vtt

19.1 KB

17.1 81 - Forensic Toolkit Components.pdf.pdf

6.3 MB

18. Mobile Forensic Toolkits.mp4

12.8 MB

18. Mobile Forensic Toolkits.vtt

7.3 KB

18.1 82 - Mobile Forensic Toolkits.pdf.pdf

2.3 MB

19. Forensic Software.mp4

31.1 MB

19. Forensic Software.vtt

15.2 KB

19.1 83 - Forensic Software.pdf.pdf

3.2 MB

2. Security Incidents.mp4

16.7 MB

2. Security Incidents.vtt

9.2 KB

2.1 68 - Security Incidents.pdf.pdf

1.9 MB

20. Training and Certification.mp4

10.7 MB

20. Training and Certification.vtt

5.4 KB

20.1 84 - Training and Certification.pdf.pdf

839.6 KB

21. Forensic Investigation Process.mp4

23.0 MB

21. Forensic Investigation Process.vtt

12.3 KB

21.1 85 - Forensic Investigation Process.pdf.pdf

1.4 MB

22. Disk Imaging.mp4

22.1 MB

22. Disk Imaging.vtt

11.3 KB

22.1 86 - Disk Imaging.pdf.pdf

2.7 MB

23. Disk Imaging Using dd.mp4

8.5 MB

23. Disk Imaging Using dd.vtt

5.4 KB

24. Disk Imaging Using FTK Imager.mp4

18.7 MB

24. Disk Imaging Using FTK Imager.vtt

11.3 KB

25. Quiz Digital Forensics.html

0.1 KB

26. Incident Containment.mp4

32.1 MB

26. Incident Containment.vtt

15.3 KB

26.1 89 - Incident Containment.pdf.pdf

2.7 MB

27. Eradication and Recovery.mp4

30.4 MB

27. Eradication and Recovery.vtt

15.9 KB

27.1 90 - Eradication and Recovery.pdf.pdf

2.9 MB

28. Finishing the Response.mp4

23.6 MB

28. Finishing the Response.vtt

11.8 KB

28.1 91 - Finishing the Response.pdf.pdf

1.8 MB

29. Quiz Incident Containment and Eradication.html

0.1 KB

3. Incident Response Teams.mp4

38.0 MB

3. Incident Response Teams.vtt

20.5 KB

3.1 69 - Incident Response Teams.pdf.pdf

2.1 MB

4. Incident Response Phases.mp4

52.3 MB

4. Incident Response Phases.vtt

24.7 KB

4.1 70 - Incident Response Phases.pdf.pdf

6.1 MB

5. Incident Response Policy and Procedures.mp4

21.8 MB

5. Incident Response Policy and Procedures.vtt

11.2 KB

5.1 71 - Incident Response Policy & Procedures.pdf.pdf

2.0 MB

6. Communication and Info Sharing.mp4

19.8 MB

6. Communication and Info Sharing.vtt

11.4 KB

6.1 72 - Communication and Information Sharing.pdf.pdf

2.6 MB

7. Incident Classification.mp4

36.9 MB

7. Incident Classification.vtt

18.9 KB

7.1 73 - Incident Classification.pdf.pdf

3.7 MB

8. Quiz Cyber Incident Response Program.html

0.1 KB

9. Network Event Monitoring.mp4

34.8 MB

9. Network Event Monitoring.vtt

16.8 KB

9.1 74 - Network Event Monitoring.pdf.pdf

4.4 MB

/5. Domain 4 Security Architecture and Toolsets (24%)/

1. Domain 4 Security Architecture and Tool Sets.mp4

3.0 MB

1. Domain 4 Security Architecture and Tool Sets.vtt

1.5 KB

1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf

89.3 MB

1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf

510.4 KB

10. Layered Network Defense.mp4

22.9 MB

10. Layered Network Defense.vtt

10.0 KB

10.1 100 - Layered Network Design.pdf.pdf

2.3 MB

11. Layered Host Security.mp4

15.3 MB

11. Layered Host Security.vtt

6.9 KB

11.1 101 - Layered Host Security.pdf.pdf

2.0 MB

12. Data Analytics.mp4

19.8 MB

12. Data Analytics.vtt

9.2 KB

12.1 102 - Data Analytics.pdf.pdf

2.0 MB

13. Personnel Security.mp4

28.7 MB

13. Personnel Security.vtt

13.4 KB

13.1 103 - Personnel Security.pdf.pdf

3.9 MB

14. Outsourcing Concerns.mp4

14.6 MB

14. Outsourcing Concerns.vtt

7.5 KB

14.1 104 - Outsourcing Concerns.pdf.pdf

1.8 MB

15. User Awareness Training.mp4

10.7 MB

15. User Awareness Training.vtt

9.0 KB

15.1 105 - User Awareness Training.pdf.pdf

1.2 MB

16. Analyzing Secure Architectures.mp4

45.3 MB

16. Analyzing Secure Architectures.vtt

18.7 KB

16.1 106 - Analyzing Secure Architectures.pdf.pdf

2.9 MB

17. Quiz Defense in Depth.html

0.1 KB

18. What Is Identity.mp4

23.1 MB

18. What Is Identity.vtt

11.0 KB

18.1 107 - What is Identity.pdf.pdf

2.7 MB

19. Identity Systems.mp4

52.9 MB

19. Identity Systems.vtt

25.4 KB

19.1 108 - Identity Systems.pdf.pdf

4.1 MB

2. Policy Documents.mp4

31.1 MB

2. Policy Documents.vtt

17.0 KB

2.1 93 - Policy Documents.pdf.pdf

3.4 MB

20. Threats to Identity Systems.mp4

14.9 MB

20. Threats to Identity Systems.vtt

7.7 KB

20.1 109 - Threats to Identity Systems.pdf.pdf

1.8 MB

21. Attacking AAA Protocols and Systems.mp4

42.7 MB

21. Attacking AAA Protocols and Systems.vtt

20.9 KB

21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf

2.9 MB

22. Targeting Account Lifecycle.mp4

15.7 MB

22. Targeting Account Lifecycle.vtt

15.7 MB

22.1 111 - Targeting Account Lifecycle.pdf.pdf

1.5 MB

23. Identity Exploits.mp4

14.1 MB

23. Identity Exploits.vtt

6.3 KB

23.1 112 - Identity Exploits.pdf.pdf

1.9 MB

24. Credential Theft.mp4

16.2 MB

24. Credential Theft.vtt

7.6 KB

24.1 113 - Credential Theft.pdf.pdf

2.4 MB

25. Securing Authentication and Authorization System.mp4

28.0 MB

25. Securing Authentication and Authorization System.vtt

13.4 KB

25.1 114 - Securing Authentication and Authorization.pdf.pdf

2.2 MB

26. Identity as a Service (IDaaS).mp4

10.2 MB

26. Identity as a Service (IDaaS).vtt

4.8 KB

26.1 115 - Identity as a Service (IDaaS).pdf.pdf

1.1 MB

27. Detecting Identity Attacks.mp4

7.4 MB

27. Detecting Identity Attacks.vtt

3.5 KB

27.1 116 - Detecting Identity Attacks.pdf.pdf

826.5 KB

28. Federated Identity Systems.mp4

49.1 MB

28. Federated Identity Systems.vtt

23.8 KB

28.1 117 - Federated Identity Systems.pdf.pdf

3.8 MB

29. Quiz Identity and Access Management.html

0.1 KB

3. Standard Frameworks.mp4

36.1 MB

3. Standard Frameworks.vtt

17.4 KB

3.1 94 - Standard Frameworks.pdf.pdf

3.9 MB

30. Software Development Life Cycle (SDLC).mp4

38.6 MB

30. Software Development Life Cycle (SDLC).vtt

19.4 KB

30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf

7.1 MB

31. Software Development Models.mp4

51.3 MB

31. Software Development Models.vtt

26.3 KB

31.1 119 - Software Development Models.pdf.pdf

3.9 MB

32. Coding for Security.mp4

33.5 MB

32. Coding for Security.vtt

17.2 KB

32.1 120 - Coding for Security.pdf.pdf

2.3 MB

33. Testing Application Security.mp4

27.6 MB

33. Testing Application Security.vtt

12.9 KB

33.1 121 - Testing Application Code.pdf.pdf

3.7 MB

34. Finding Security Flaws.mp4

31.7 MB

34. Finding Security Flaws.vtt

15.0 KB

34.1 122 - Finding Security Flaws.pdf.pdf

3.8 MB

35. Web Application Vulnerability Scanners.mp4

27.6 MB

35. Web Application Vulnerability Scanners.vtt

13.0 KB

35.1 123 - Web Application Vulnerability Scanning.pdf.pdf

3.3 MB

36. Quiz Software Development and SDLC.html

0.1 KB

4. Policy-based Controls.mp4

16.9 MB

4. Policy-based Controls.vtt

7.7 KB

4.1 95 - Policy-Based Controls.pdf.pdf

2.7 MB

5. Audits and Assessments.mp4

10.6 MB

5. Audits and Assessments.vtt

5.1 KB

5.1 96 - Audits and Assessments.pdf.pdf

1.2 MB

6. Laws and Regulations.mp4

25.5 MB

6. Laws and Regulations.vtt

11.4 KB

6.1 97 - Laws and Regulations.pdf.pdf

5.1 MB

7. Quiz Policies, Standards, Procedures, and Frameworks.html

0.1 KB

8. Defense in Depth.mp4

26.3 MB

8. Defense in Depth.vtt

11.8 KB

8.1 98 - Defense in Depth.pdf.pdf

3.6 MB

9. Types of Controls.mp4

22.9 MB

9. Types of Controls.vtt

10.6 KB

9.1 99 - Types of Controls.pdf.pdf

3.6 MB

/6. Conclusion/

1. How to Schedule Your Exam.mp4

73.9 MB

1. How to Schedule Your Exam.vtt

7.3 KB

2. Conclusion.mp4

8.8 MB

2. Conclusion.vtt

4.5 KB

2.1 CompTIA CySA+ Course (Conclusion).pdf.pdf

2.4 MB

3. BONUS A Special Thank You Message From Jason.mp4

11.9 MB

3. BONUS A Special Thank You Message From Jason.vtt

1.8 KB

3.1 CompTIA CySA+ (CS0-001) 5 Practice Certification Exams.html

0.1 KB

3.10 CompTIA Security+ (SY0-501) Complete Course & Practice Exam.html

0.1 KB

3.11 ITIL Foundation Complete ITIL Exam Preparation Course.html

0.1 KB

3.12 CompTIA Security+ (SY0-501) 5 Practice Exams & Simulations!.html

0.1 KB

3.13 PRINCE2 Foundation Practice Certification Exams (6 Exams).html

0.1 KB

3.14 ITIL Foundation Cram to Pass the ITIL Exam in 7 Days!.html

0.1 KB

3.15 #UNOFFICIAL# Certified Ethical Hacker (CEH) Practice Exams.html

0.1 KB

3.16 Risk Management for Cybersecurity and IT Managers.html

0.1 KB

3.17 PRINCE2 Agile Foundation (Get certified in the next 7 days!).html

0.1 KB

3.18 CompTIA Network+ (N10-007) 5 Practice Exams & Simulations.html

0.1 KB

3.19 ITIL Foundation Practice Certification Exams (6 Exams).html

0.1 KB

3.2 CompTIA Network+ Cert (N10-007) Full Course & Practice Exam.html

0.1 KB

3.20 How to Pass Certification Exams with Strategic Test Taking!.html

0.1 KB

3.21 Introduction to Cloud Security with Microsoft Azure.html

0.1 KB

3.3 Introduction to Malware Analysis for Incident Responders.html

0.1 KB

3.4 CompTIA CySA+ (CS0-001) Complete Course and Practice Exam.html

0.1 KB

3.5 PRINCE2 Foundation Cram to Pass the PRINCE2 Exam in 7 Days!.html

0.1 KB

3.6 WiFi Hacking Wireless Penetration Testing for Beginners.html

0.1 KB

3.7 CompTIA Pentest+ (PT0-001) Complete Course & Practice Exam.html

0.1 KB

3.8 Anatomy of a Cyber Attack Beginner Hacking with Metasploit.html

0.1 KB

3.9 Udemy Coupon Codes (Graduate).pdf.pdf

2.9 MB

/7. Practice Exam/

1. Simulations and Performance-Based Questions (PBQs).mp4

339.7 MB

1. Simulations and Performance-Based Questions (PBQs).vtt

39.3 KB

2. CompTIA CSA+ Practice Certification Exam.html

0.1 KB

/

[FreeCourseLab.com].url

0.1 KB

 

Total files 413


Copyright © 2024 FileMood.com