FileMood

Download UD66

UD66

Name

UD66

 DOWNLOAD Copy Link

Total Size

5.5 GB

Total Files

68

Hash

1D13A0D65E08C5E4086C11AB68FC92B34E63647C

/01 Introduction/

001 CSA-Objectives-E7.pdf

122.4 KB

001 Introduction.mp4

42.8 MB

/02 Conducting Reconnaissance/

002 CSA-Notes-Chapter-01.pdf

394.0 KB

002 Thinking Like the Enemy.mp4

211.0 MB

003 Tools of the Trade.mp4

115.2 MB

/03 Analyzing Reconnaissance Results/

004 CSA-Notes-Chapter-02.pdf

190.8 KB

004 Recon Results Part 1.mp4

187.6 MB

005 Recon Results Part 2.mp4

74.3 MB

006 Data Output.mp4

44.8 MB

/04 Responding to Network-Based Threats/

007 CSA-Notes-Chapter-03.pdf

196.6 KB

007 Protecting Your Territory.mp4

79.5 MB

008 Hardening Strategies.mp4

163.1 MB

/05 Securing a Corporate Environment/

009 CSA-Notes-Chapter-04.pdf

201.1 KB

009 Pen Testing.mp4

77.0 MB

010 Training.mp4

41.4 MB

011 Reverse Engineering.mp4

95.2 MB

012 Risk Evaluation.mp4

43.6 MB

/06 Vulnerability Management/

013 CSA-Notes-Chapter-05.pdf

417.5 KB

013 Requirements Identification.mp4

58.8 MB

014 Scanning.mp4

62.2 MB

015 Configuring and Executing Scans.mp4

64.0 MB

016 Reporting and Remediating.mp4

107.3 MB

/07 Analyzing Vulnerabilities Scan Results/

017 Common Vulnerabilities Part 1.mp4

122.5 MB

017 CSA-Notes-Chapter-06.pdf

1.1 MB

018 Common Vulnerabilities Part 2.mp4

100.7 MB

/08 Incident Response/

019 CSA-Notes-Chapter-07.pdf

122.9 KB

019 Incident Response Process.mp4

92.2 MB

020 IR Roles and Responsibilities.mp4

59.6 MB

/09 Preparation Phase/

021 CSA-Notes-Chapter-08.pdf

1.2 MB

021 IR Active Preparation.mp4

114.8 MB

022 Threat Trends.mp4

88.0 MB

/10 Forensic Tools/

023 CSA-Notes-Chapter-09.pdf

595.1 KB

023 Digital Forensics.mp4

141.0 MB

024 Seizure and Acquisitions.mp4

68.3 MB

025 Forensics Acquisition Tools.mp4

84.4 MB

026 Forensics Analysis Part 1.mp4

35.2 MB

027 Forensics Analysis Part 2.mp4

88.9 MB

/11 Common Symptoms of Compromise/

028 CSA-Notes-Chapter-10.pdf

504.0 KB

028 Network Symptoms.mp4

49.8 MB

029 Host Symptoms.mp4

93.0 MB

030 Application Symptoms.mp4

72.3 MB

/12 Incident Recovery and Post-Incident Response Process/

031 CSA-Notes-Chapter-11.pdf

291.1 KB

031 Moving Forward Part 1.mp4

140.3 MB

032 Moving Forward Part 2.mp4

87.1 MB

/13 Frameworks Common Policies Controls and Procedures/

033 CSA-Notes-Chapter-12.pdf

2.7 MB

033 Frameworks.mp4

131.0 MB

034 Policies.mp4

114.2 MB

035 Controls Procedures.mp4

98.9 MB

036 Verifications.mp4

66.7 MB

/14 Identity and Access Management/

037 Context-Based Authentication.mp4

87.8 MB

037 CSA-Notes-Chapter-13.pdf

994.3 KB

038 Identities.mp4

193.1 MB

039 Managing Identities.mp4

172.6 MB

040 Exploits.mp4

102.4 MB

/15 Defense Strategies/

041 CSA-Notes-Chapter-14.pdf

391.0 KB

041 Data Analytics.mp4

122.8 MB

042 Defense in Depth.mp4

189.3 MB

/16 Software Development Life Cycle (SDLC)/

043 CSA-Notes-Chapter-15.pdf

112.2 KB

043 Secure Software Development.mp4

134.1 MB

044 Best Coding Practices.mp4

70.5 MB

/17 Tools and Technologies/

045 CSA-Notes-Chapter-16.pdf

200.9 KB

045 Preventative Tools Part 1.mp4

263.1 MB

046 Preventative Tools Part 2.mp4

94.8 MB

047 Collective Tools.mp4

135.1 MB

048 Vulnerability Scanning.mp4

166.5 MB

049 Packet Capture.mp4

153.8 MB

050 Connectivity Tools.mp4

115.8 MB

051 Pen Testing Tools.mp4

178.7 MB

 

Total files 68


Copyright © 2024 FileMood.com