FileMood

Download Pluralsight - CompTIA Security+ (SY0-401) Threats and Vulnerabilities

Pluralsight CompTIA Security SY0 401 Threats and Vulnerabilities

Name

Pluralsight - CompTIA Security+ (SY0-401) Threats and Vulnerabilities

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

455.9 MB

Total Files

105

Hash

9D1D609DB3D5FE8078639781A709CF17FB109E22

/01. Types of Malware/

01_01-Course Overview and Adware.mp4

10.7 MB

01_02-Virus.mp4

8.6 MB

01_03-Spyware.mp4

2.1 MB

01_04-Trojans and Remote Access Tools RAT.mp4

10.3 MB

01_05-Rootkits.mp4

2.2 MB

01_06-Backdoors.mp4

1.8 MB

01_07-Logic Bombs.mp4

2.7 MB

01_08-Botnets and Ransomware.mp4

10.3 MB

01_09-Polymorphic Malware and Armored Virus.mp4

2.9 MB

/02. Types of Attacks/

02_01-Overview.mp4

3.8 MB

02_02-ManintheMiddle.mp4

6.2 MB

02_03-DDoS.mp4

13.2 MB

02_04-Spoofing.mp4

1.7 MB

02_05-Spam.mp4

2.8 MB

02_06-Phishing.mp4

3.5 MB

02_07-Spim.mp4

1.3 MB

02_08-Vishing.mp4

3.0 MB

02_09-Spear Phishing.mp4

1.9 MB

02_10-Xmas Attack.mp4

8.3 MB

02_11-Pharming.mp4

6.0 MB

02_12-Privilege Escalation.mp4

4.1 MB

02_13-Malicious Insider Threat.mp4

1.8 MB

02_14-Transitive Access.mp4

2.4 MB

02_15-ClientSide Attacks.mp4

3.9 MB

02_16-Password Attacks.mp4

14.6 MB

02_17-Typo SquattingURL Hijacking.mp4

2.1 MB

02_18-Watering Hole Attack.mp4

5.4 MB

02_19-Module Review.mp4

1.1 MB

/03. Effectiveness of Social Engineering Attacks/

03_01-Module Overview.mp4

2.8 MB

03_02-What Is Social Engineering.mp4

2.3 MB

03_03-Shoulder Surfing.mp4

5.5 MB

03_04-Dumpster Diving.mp4

4.8 MB

03_05-Tailgating.mp4

6.3 MB

03_06-Impersonation.mp4

3.5 MB

03_07-Hoaxes.mp4

6.3 MB

03_08-Whaling.mp4

2.1 MB

03_09-Vishing.mp4

1.9 MB

03_10-Principles Reasons for EffectivenessAuthority.mp4

2.9 MB

03_11-Intimidation.mp4

1.4 MB

03_12-ConsensusSocial Proof.mp4

1.8 MB

03_13-FamiliarityLiking.mp4

1.8 MB

03_14-Trust.mp4

1.6 MB

03_15-ScarcityUrgency.mp4

1.8 MB

03_16-Module Review.mp4

921.3 KB

/04. Wireless Attacks/

04_01-Rogue Access Points and Captive Portals.mp4

9.5 MB

04_02-War Driving and War Chalking.mp4

2.9 MB

04_03-Bluejacking and Bluesnarfing.mp4

7.9 MB

04_04-IV Attacks.mp4

5.4 MB

04_05-Packet Sniffing.mp4

6.8 MB

04_06-Near Field Communication.mp4

2.6 MB

04_07-Replay Attacks.mp4

3.5 MB

04_08-WPS Attacks.mp4

6.9 MB

04_09-WEP and WPA Attacks.mp4

3.3 MB

/05. Application Attacks/

05_01-Module Overview.mp4

3.1 MB

05_02-CrossSite Scripting.mp4

5.5 MB

05_03-CrossSite Request Forgery.mp4

5.0 MB

05_04-SQL and XML injection Attacks.mp4

12.5 MB

05_05-Directory TraversalCommand Injection.mp4

3.1 MB

05_06-Buffer Overflow Attacks.mp4

3.6 MB

05_07-Integer Overflow Attacks.mp4

3.1 MB

05_08-ZeroDay Attacks.mp4

3.3 MB

05_09-Cookies and Attachments.mp4

4.8 MB

05_10-Locally Shared Objects LSO.mp4

3.4 MB

05_11-Flash Cookies.mp4

2.2 MB

05_12-Malicious Addons.mp4

2.4 MB

05_13-Session Hijacking.mp4

3.9 MB

05_14-Header Manipulation.mp4

1.1 MB

05_15-ArbitraryRemote Code Execution.mp4

3.1 MB

/06. Mitigation and Deterrent Techniques/

06_01-Module Overview.mp4

3.9 MB

06_02-Monitoring System Logs.mp4

6.2 MB

06_03-Hardening Systems and Applications.mp4

9.2 MB

06_04-Network Security.mp4

6.4 MB

06_05-Disabling Unused Interfaces and Services.mp4

1.5 MB

06_06-Rogue Machine Detection.mp4

2.7 MB

06_07-Security Posture.mp4

9.4 MB

06_08-Reporting.mp4

2.7 MB

06_09-Detection vs. Prevention Controls.mp4

10.9 MB

06_10-Module Review.mp4

1.6 MB

/07. Discovering Security Threats and Vulnerabilities/

07_01-Module Overview and Interpreting Assessment Tools Results.mp4

7.8 MB

07_02-Protocol Analyzers and Vulnerability Scanners.mp4

6.7 MB

07_03-Honeypots and Honeynets.mp4

3.9 MB

07_04-Port Scanners.mp4

5.3 MB

07_05-Banner Grabbing.mp4

2.1 MB

07_06-Passive vs. Active Tools.mp4

2.6 MB

07_07-Risk Calculations.mp4

6.3 MB

07_08-Assessment Types.mp4

1.5 MB

07_09-Assessment Techniques and Baseline Reporting.mp4

2.1 MB

07_10-Code Review.mp4

2.8 MB

07_11-Determine Attack Surface.mp4

3.4 MB

07_12-Review Architecture.mp4

2.4 MB

07_13-Review Designs.mp4

2.4 MB

07_14-Module Review.mp4

881.6 KB

/08. Penetration Testing vs. Vulnerability Scanning/

08_01-Module Overview.mp4

2.7 MB

08_02-Verifying Threats and Bypassing Security Controls.mp4

5.8 MB

08_03-Actively Testing Security Controls.mp4

3.0 MB

08_04-Exploiting Vulnerabilities.mp4

2.1 MB

08_05-Vulnerability Scanning.mp4

1.4 MB

08_06-Testing Security Controls and Identifying Vulnerabilities.mp4

4.5 MB

08_07-Identify Common Misconfigurations.mp4

3.4 MB

08_08-Intrusive vs. Nonintrusive and Credentialed vs. Noncredentialed.mp4

5.2 MB

08_09-False Positive.mp4

2.1 MB

08_10-Black, White, and Gray Box Testing.mp4

2.7 MB

08_11-Things to Remember.mp4

4.3 MB

08_12-Module Review.mp4

1.4 MB

/Exercise files/

comptiasecurityplussy0401threatsvulnerabilities.zip

16.8 MB

 

Total files 105


Copyright © 2025 FileMood.com