FileMood

Download UD67

UD67

Name

UD67

 DOWNLOAD Copy Link

Total Size

3.2 GB

Total Files

129

Hash

CA9E471C56B0CA0463172F1EEA36C233B13FF840

/01 Welcome and Introduction/

001 Welcome to the Course.mp4

15.7 MB

002 CompTIA-CySA-Study-Guide.pdf

7.3 MB

002 Download the Study Guide.html

1.1 KB

003 Exam Foundations.mp4

19.7 MB

/02 Domain 1 Threat Management (27)/

004 Domain 1 Threat Management.mp4

5.0 MB

005 CIA Triad.mp4

38.0 MB

006 Risk Consideration.mp4

26.4 MB

007 Risk Assessment.mp4

16.2 MB

008 Identify Threats.mp4

30.8 MB

009 Identify Vulnerabilities.mp4

11.3 MB

010 Likelihood Impact and Risk.mp4

14.3 MB

011 Qualitative and Quantitative Assessments.mp4

19.5 MB

012 Reviewing Controls.mp4

33.3 MB

013 Network Perimeter Security.mp4

37.6 MB

014 Network Segmentation.mp4

12.1 MB

015 Network Access Control.mp4

28.2 MB

016 Defense Deception Methods.mp4

16.8 MB

017 Secure Endpoint Management.mp4

34.2 MB

018 Penetration Testing.mp4

36.4 MB

019 Security Exercises and Training.mp4

14.1 MB

020 Reverse Engineering.mp4

29.2 MB

021 Reconnaissance and Intelligence.mp4

5.8 MB

022 Footprinting the Network.mp4

14.1 MB

023 Network Mapping.mp4

18.4 MB

024 Port Scanning.mp4

25.5 MB

025 Other Port Scanners.mp4

9.8 MB

026 NMAP - Demonstration of the worlds most popular port scanning tool.mp4

10.4 MB

027 Passive Reconnaissance.mp4

12.9 MB

028 Passive Recon - Network Devices.mp4

39.9 MB

029 Passive Recon - Netstat.mp4

23.3 MB

030 DHCP Logs and Configs.mp4

15.5 MB

031 Firewall Logs and Configs.mp4

18.5 MB

032 System and Host Log Files.mp4

12.4 MB

033 DNS Harvesting.mp4

17.2 MB

034 Domain Names and IP Ranges.mp4

12.6 MB

035 DNS Zone Transfers.mp4

16.6 MB

036 Whois and Host Commands.mp4

14.8 MB

037 Information Gathering and Aggregation.mp4

20.3 MB

038 Organizational Intelligence.mp4

35.9 MB

039 Detecting Preventing and Responding to Reconnaissance.mp4

111.0 MB

external-assets-links.txt

0.1 KB

/03 Domain 2 Vulnerability Management (26)/

040 Domain 2 Vulnerability Management.mp4

10.7 MB

041 Regulatory Requirements.mp4

20.5 MB

042 Corporate Requirements.mp4

21.4 MB

043 Scanning Tools.mp4

10.9 MB

044 Scoping Scans.mp4

10.4 MB

045 Configuring Scans.mp4

2.9 MB

046 Scanning Sensitivity.mp4

17.0 MB

047 Scanning Perspective.mp4

4.5 MB

048 Authenticated Scanning.mp4

10.1 MB

049 Maintaining Scanners.mp4

9.6 MB

050 Standardizing Vulnerabilities.mp4

9.5 MB

051 Workflow for Remediation.mp4

12.5 MB

052 Vulnerability Reporting.mp4

19.6 MB

053 Remediation Priority.mp4

19.9 MB

054 Implementing and Testing.mp4

24.8 MB

055 Nessus Vulnerability Scanner A Walkthrough.mp4

17.6 MB

056 Interpreting Scan Results.mp4

38.1 MB

057 Interpreting CVSS.mp4

28.8 MB

058 Calculating the CVSS Score.mp4

18.5 MB

059 CVSS Temporal Score.mp4

16.9 MB

060 Validation of Results.mp4

30.2 MB

061 Common Vulnerabilities.mp4

12.9 MB

062 Server and Host Vulnerabilities.mp4

19.4 MB

063 Network Vulnerabilities.mp4

18.1 MB

064 Virtualization Vulnerabilities.mp4

13.3 MB

065 Web Application Vulnerabilities.mp4

26.2 MB

066 Internet of Things (IoT) Vulnerabilities.mp4

17.2 MB

/04 Domain 3 Cyber Incident Response (23)/

067 Domain 3 Cyber Incident Response.mp4

8.0 MB

068 Security Incidents.mp4

16.7 MB

069 Incident Response Teams.mp4

38.0 MB

070 Incident Response Phases.mp4

52.3 MB

071 Incident Response Policy and Procedures.mp4

21.8 MB

072 Communication and Info Sharing.mp4

19.8 MB

073 Incident Classification.mp4

36.9 MB

074 Network Event Monitoring.mp4

34.8 MB

075 Network Monitoring Tools.mp4

23.3 MB

076 Detecting Network Events.mp4

28.4 MB

077 Network Probes and Attacks.mp4

26.7 MB

078 Server and Host Events.mp4

23.9 MB

079 Service and Application Events.mp4

24.2 MB

080 Digital Forensics.mp4

12.1 MB

081 Forensic Toolkit Components.mp4

38.0 MB

082 Mobile Forensic Toolkits.mp4

12.8 MB

083 Forensic Software.mp4

31.1 MB

084 Training and Certification.mp4

10.7 MB

085 Forensic Investigation Process.mp4

23.0 MB

086 Disk Imaging.mp4

22.1 MB

087 Disk Imaging Using dd.mp4

8.5 MB

088 Disk Imaging Using FTK Imager.mp4

18.6 MB

089 Incident Containment.mp4

32.1 MB

090 Eradication and Recovery.mp4

30.4 MB

091 Finishing the Response.mp4

23.6 MB

/05 Domain 4 Security Architecture and Toolsets (24)/

092 Domain 4 Security Architecture and Tool Sets.mp4

3.0 MB

093 Policy Documents.mp4

31.1 MB

094 Standard Frameworks.mp4

36.1 MB

095 Policy-based Controls.mp4

16.9 MB

096 Audits and Assessments.mp4

10.6 MB

097 Laws and Regulations.mp4

25.5 MB

098 Defense in Depth.mp4

26.3 MB

099 Types of Controls.mp4

22.8 MB

100 Layered Network Defense.mp4

22.9 MB

101 Layered Host Security.mp4

15.3 MB

102 Data Analytics.mp4

19.8 MB

103 Personnel Security.mp4

28.7 MB

104 Outsourcing Concerns.mp4

14.6 MB

105 User Awareness Training.mp4

10.7 MB

106 Analyzing Secure Architectures.mp4

45.3 MB

107 What Is Identity.mp4

23.1 MB

108 Identity Systems.mp4

52.9 MB

109 Threats to Identity Systems.mp4

14.9 MB

110 Attacking AAA Protocols and Systems.mp4

42.7 MB

111 Targeting Account Lifecycle.mp4

15.7 MB

112 Identity Exploits.mp4

14.1 MB

113 Credential Theft.mp4

16.2 MB

114 Securing Authentication and Authorization System.mp4

28.0 MB

115 Identity as a Service (IDaaS).mp4

10.2 MB

116 Detecting Identity Attacks.mp4

7.4 MB

117 Federated Identity Systems.mp4

49.1 MB

118 Software Development Life Cycle (SDLC).mp4

38.6 MB

119 Software Development Models.mp4

51.3 MB

120 Coding for Security.mp4

33.5 MB

121 Testing Application Security.mp4

27.6 MB

122 Finding Security Flaws.mp4

31.7 MB

123 Web Application Vulnerability Scanners.mp4

27.6 MB

/06 Conclusion/

124 Conclusion.mp4

8.8 MB

125 BONUS Where to go from here.mp4

62.8 MB

external-assets-links.txt

0.2 KB

/07 Practice Exam/

126 Simulations and Performance-Based Questions (PBQs).mp4

339.7 MB

 

Total files 129


Copyright © 2024 FileMood.com