Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[Tutorialsplanet.NET].url |
128B |
1.1 67 - Domain 3 - Cyber Incident Response.pdf.pdf |
1.39MB |
1.1 CompTIA CySA+ (Study Notes).pdf.pdf |
7.01MB |
1.1 Domain 1 - Threat Management.pdf.pdf |
60.03MB |
1.1 Domain 2 - Vulnerability Management.pdf.pdf |
164.64MB |
1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf |
85.15MB |
1.2 40 - Domain 2 - Vulnerability Management.pdf.pdf |
1.39MB |
1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf |
498.48KB |
1.2 Domain 3 - Cyber Incident Response.pdf.pdf |
62.00MB |
1. Domain 1 Threat Management.mp4 |
4.80MB |
1. Domain 1 Threat Management.vtt |
2.28KB |
1. Domain 2 Vulnerability Management.mp4 |
10.17MB |
1. Domain 2 Vulnerability Management.vtt |
5.73KB |
1. Domain 3 Cyber Incident Response.mp4 |
7.61MB |
1. Domain 3 Cyber Incident Response.vtt |
3.46KB |
1. Domain 4 Security Architecture and Tool Sets.mp4 |
2.88MB |
1. Domain 4 Security Architecture and Tool Sets.vtt |
1.47KB |
1. How to Schedule Your Exam.mp4 |
70.46MB |
1. How to Schedule Your Exam.vtt |
7.12KB |
1. Simulations and Performance-Based Questions (PBQs).mp4 |
323.95MB |
1. Simulations and Performance-Based Questions (PBQs).vtt |
38.42KB |
1. Welcome to the Course.mp4 |
15.01MB |
1. Welcome to the Course.vtt |
8.40KB |
10.1 100 - Layered Network Design.pdf.pdf |
2.23MB |
10.1 13 - Network Perimeter Security.pdf.pdf |
3.14MB |
10.1 49 - Maintaining Scanners.pdf.pdf |
1.87MB |
10.1 75 - Network Monitoring Tools.pdf.pdf |
4.38MB |
10. Layered Network Defense.mp4 |
21.87MB |
10. Layered Network Defense.vtt |
9.80KB |
10. Maintaining Scanners.mp4 |
9.15MB |
10. Maintaining Scanners.vtt |
7.38KB |
10. Network Monitoring Tools.mp4 |
22.28MB |
10. Network Monitoring Tools.vtt |
10.53KB |
10. Network Perimeter Security.mp4 |
35.87MB |
10. Network Perimeter Security.vtt |
14.77KB |
11.1 101 - Layered Host Security.pdf.pdf |
1.87MB |
11.1 14 - Network Segmentation.pdf.pdf |
1.32MB |
11.1 50 - Standardizing Vulnerabilities.pdf.pdf |
3.17MB |
11.1 76 - Detecting Network Events.pdf.pdf |
2.04MB |
11. Detecting Network Events.mp4 |
27.07MB |
11. Detecting Network Events.vtt |
12.92KB |
11. Layered Host Security.mp4 |
14.59MB |
11. Layered Host Security.vtt |
6.77KB |
11. Network Segmentation.mp4 |
11.51MB |
11. Network Segmentation.vtt |
5.33KB |
11. Standardizing Vulnerabilities.mp4 |
9.06MB |
11. Standardizing Vulnerabilities.vtt |
6.65KB |
12.1 102 - Data Analytics.pdf.pdf |
1.92MB |
12.1 15 - Network Access Control.pdf.pdf |
1.77MB |
12.1 51 - Workflow for Remediation.pdf.pdf |
1.41MB |
12.1 77 - Network Probes and Attacks.pdf.pdf |
2.76MB |
12. Data Analytics.mp4 |
18.85MB |
12. Data Analytics.vtt |
8.97KB |
12. Network Access Control.mp4 |
26.94MB |
12. Network Access Control.vtt |
12.50KB |
12. Network Probes and Attacks.mp4 |
25.43MB |
12. Network Probes and Attacks.vtt |
13.75KB |
12. Workflow for Remediation.mp4 |
11.88MB |
12. Workflow for Remediation.vtt |
6.17KB |
13.1 103 - Personnel Security.pdf.pdf |
3.73MB |
13.1 16 - Defense Deception Methods.pdf.pdf |
1.48MB |
13.1 52 - Vulnerability Reporting.pdf.pdf |
2.75MB |
13.1 78 - Server and Host Events.pdf.pdf |
2.52MB |
13. Defense Deception Methods.mp4 |
16.01MB |
13. Defense Deception Methods.vtt |
7.60KB |
13. Personnel Security.mp4 |
27.37MB |
13. Personnel Security.vtt |
13.05KB |
13. Server and Host Events.mp4 |
22.79MB |
13. Server and Host Events.vtt |
11.28KB |
13. Vulnerability Reporting.mp4 |
18.72MB |
13. Vulnerability Reporting.vtt |
8.82KB |
14.1 104 - Outsourcing Concerns.pdf.pdf |
1.69MB |
14.1 17 - Secure Endpoint Management.pdf.pdf |
2.30MB |
14.1 53 - Remediation Reporting.pdf.pdf |
2.03MB |
14.1 79 - Service and Application Events.pdf.pdf |
2.86MB |
14. Outsourcing Concerns.mp4 |
13.93MB |
14. Outsourcing Concerns.vtt |
7.30KB |
14. Remediation Priority.mp4 |
18.97MB |
14. Remediation Priority.vtt |
8.57KB |
14. Secure Endpoint Management.mp4 |
32.66MB |
14. Secure Endpoint Management.vtt |
15.03KB |
14. Service and Application Events.mp4 |
23.04MB |
14. Service and Application Events.vtt |
11.35KB |
15.1 105 - User Awareness Training.pdf.pdf |
1.14MB |
15.1 18 - Penetration Testing.pdf.pdf |
2.32MB |
15.1 54 - Implementing and Testing.pdf.pdf |
1.69MB |
15. Implementing and Testing.mp4 |
23.68MB |
15. Implementing and Testing.vtt |
12.45KB |
15. Penetration Testing.mp4 |
34.70MB |
15. Penetration Testing.vtt |
16.26KB |
15. Quiz Symptoms of Cyber Attacks.html |
121B |
15. User Awareness Training.mp4 |
10.22MB |
15. User Awareness Training.vtt |
8.78KB |
16.1 106 - Analyzing Secure Architectures.pdf.pdf |
2.73MB |
16.1 19 - Security Exercises and Training.pdf.pdf |
1.39MB |
16.1 55 - Nessus-Scan-Report-Example.pdf.pdf |
1.12MB |
16.1 80 - Digital Forensics.pdf.pdf |
1.42MB |
16. Analyzing Secure Architectures.mp4 |
43.19MB |
16. Analyzing Secure Architectures.vtt |
18.25KB |
16. Digital Forensics.mp4 |
11.50MB |
16. Digital Forensics.vtt |
6.28KB |
16. Nessus Vulnerability Scanner A Walkthrough.mp4 |
16.74MB |
16. Nessus Vulnerability Scanner A Walkthrough.vtt |
18.12KB |
16. Security Exercises and Training.mp4 |
13.41MB |
16. Security Exercises and Training.vtt |
6.55KB |
17.1 20 - Reverse Engineering.pdf.pdf |
1.39MB |
17.1 81 - Forensic Toolkit Components.pdf.pdf |
6.02MB |
17. Forensic Toolkit Components.mp4 |
36.22MB |
17. Forensic Toolkit Components.vtt |
18.67KB |
17. Quiz Defense in Depth.html |
121B |
17. Quiz Vulnerability Management Program.html |
121B |
17. Reverse Engineering.mp4 |
27.88MB |
17. Reverse Engineering.vtt |
13.40KB |
18.1 107 - What is Identity.pdf.pdf |
2.60MB |
18.1 56 - Interpreting Scan Results.pdf.pdf |
4.43MB |
18.1 82 - Mobile Forensic Toolkits.pdf.pdf |
2.18MB |
18. Interpreting Scan Results.mp4 |
36.35MB |
18. Interpreting Scan Results.vtt |
18.12KB |
18. Mobile Forensic Toolkits.mp4 |
12.25MB |
18. Mobile Forensic Toolkits.vtt |
7.17KB |
18. Quiz Defense Against Cyber Threats.html |
121B |
18. What Is Identity.mp4 |
22.05MB |
18. What Is Identity.vtt |
10.75KB |
19.1 108 - Identity Systems.pdf.pdf |
3.89MB |
19.1 21 - Reconnaissance and Intelligence.pdf.pdf |
499.20KB |
19.1 57 - Interpeting CVSS.pdf.pdf |
3.27MB |
19.1 83 - Forensic Software.pdf.pdf |
3.06MB |
19. Forensic Software.mp4 |
29.66MB |
19. Forensic Software.vtt |
14.84KB |
19. Identity Systems.mp4 |
50.49MB |
19. Identity Systems.vtt |
24.85KB |
19. Interpreting CVSS.mp4 |
27.48MB |
19. Interpreting CVSS.vtt |
13.17KB |
19. Reconnaissance and Intelligence.mp4 |
5.56MB |
19. Reconnaissance and Intelligence.vtt |
2.42KB |
2.1 02 - Exam Foundations.pdf.pdf |
1.83MB |
2.1 05 - CIA Triad.pdf.pdf |
2.80MB |
2.1 41 - Regulatory Requirements.pdf.pdf |
2.09MB |
2.1 68 - Security Incidents.pdf.pdf |
1.82MB |
2.1 93 - Policy Documents.pdf.pdf |
3.27MB |
2.1 CompTIA CySA+ Course (Conclusion).pdf.pdf |
2.26MB |
2. CIA Triad.mp4 |
36.25MB |
2. CIA Triad.vtt |
16.72KB |
2. CompTIA CSA+ Practice Certification Exam.html |
121B |
2. Conclusion.mp4 |
8.44MB |
2. Conclusion.vtt |
4.42KB |
2. Exam Foundations.mp4 |
18.77MB |
2. Exam Foundations.vtt |
7.83KB |
2. Policy Documents.mp4 |
29.69MB |
2. Policy Documents.vtt |
16.58KB |
2. Regulatory Requirements.mp4 |
19.54MB |
2. Regulatory Requirements.vtt |
15.46KB |
2. Security Incidents.mp4 |
15.93MB |
2. Security Incidents.vtt |
9.00KB |
20.1 109 - Threats to Identity Systems.pdf.pdf |
1.70MB |
20.1 22 - Footprinting the Network.pdf.pdf |
808.03KB |
20.1 58 - Calculating the CVSS Score.pdf.pdf |
2.10MB |
20.1 84 - Training and Certification.pdf.pdf |
819.90KB |
20. Calculating the CVSS Score.mp4 |
17.65MB |
20. Calculating the CVSS Score.vtt |
7.52KB |
20. Footprinting the Network.mp4 |
13.42MB |
20. Footprinting the Network.vtt |
6.10KB |
20. Threats to Identity Systems.mp4 |
14.19MB |
20. Threats to Identity Systems.vtt |
7.55KB |
20. Training and Certification.mp4 |
10.25MB |
20. Training and Certification.vtt |
5.29KB |
21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf |
2.74MB |
21.1 23 - Network Mapping.pdf.pdf |
1.14MB |
21.1 59 - CVSS Temporal Score.pdf.pdf |
2.59MB |
21.1 85 - Forensic Investigation Process.pdf.pdf |
1.33MB |
21. Attacking AAA Protocols and Systems.mp4 |
40.68MB |
21. Attacking AAA Protocols and Systems.vtt |
20.42KB |
21. CVSS Temporal Score.mp4 |
16.13MB |
21. CVSS Temporal Score.vtt |
7.53KB |
21. Forensic Investigation Process.mp4 |
21.89MB |
21. Forensic Investigation Process.vtt |
12.03KB |
21. Network Mapping.mp4 |
17.52MB |
21. Network Mapping.vtt |
7.81KB |
22.1 111 - Targeting Account Lifecycle.pdf.pdf |
1.47MB |
22.1 24 - Port Scanning.pdf.pdf |
1.78MB |
22.1 60 - Validation of Results.pdf.pdf |
2.51MB |
22.1 86 - Disk Imaging.pdf.pdf |
2.62MB |
22. Disk Imaging.mp4 |
21.07MB |
22. Disk Imaging.vtt |
11.00KB |
22. Port Scanning.mp4 |
24.37MB |
22. Port Scanning.vtt |
10.80KB |
22. Targeting Account Lifecycle.mp4 |
14.95MB |
22. Targeting Account Lifecycle.vtt |
14.96MB |
22. Validation of Results.mp4 |
28.81MB |
22. Validation of Results.vtt |
14.71KB |
23.1 112 - Identity Exploits.pdf.pdf |
1.85MB |
23.1 25 - Other Port Scanners.pdf.pdf |
808.19KB |
23.1 61 - Common Vulnerabilities.pdf.pdf |
1.16MB |
23. Common Vulnerabilities.mp4 |
12.30MB |
23. Common Vulnerabilities.vtt |
5.53KB |
23. Disk Imaging Using dd.mp4 |
8.14MB |
23. Disk Imaging Using dd.vtt |
5.30KB |
23. Identity Exploits.mp4 |
13.48MB |
23. Identity Exploits.vtt |
6.17KB |
23. Other Port Scanners.mp4 |
9.40MB |
23. Other Port Scanners.vtt |
3.95KB |
24.1 113 - Credential Theft.pdf.pdf |
2.31MB |
24.1 62 - Server and Host Vulnerabilities.pdf.pdf |
4.11MB |
24. Credential Theft.mp4 |
15.44MB |
24. Credential Theft.vtt |
7.43KB |
24. Disk Imaging Using FTK Imager.mp4 |
17.80MB |
24. Disk Imaging Using FTK Imager.vtt |
11.00KB |
24. NMAP - Demonstration of the world's most popular port scanning tool.mp4 |
9.93MB |
24. NMAP - Demonstration of the world's most popular port scanning tool.vtt |
11.25KB |
24. Server and Host Vulnerabilities.mp4 |
18.53MB |
24. Server and Host Vulnerabilities.vtt |
14.04KB |
25.1 114 - Securing Authentication and Authorization.pdf.pdf |
2.13MB |
25.1 27 - Passive Reconnaissance.pdf.pdf |
806.22KB |
25.1 63 - Network Vulnerabilities.pdf.pdf |
4.40MB |
25. Network Vulnerabilities.mp4 |
17.23MB |
25. Network Vulnerabilities.vtt |
12.07KB |
25. Passive Reconnaissance.mp4 |
12.27MB |
25. Passive Reconnaissance.vtt |
5.77KB |
25. Quiz Digital Forensics.html |
121B |
25. Securing Authentication and Authorization System.mp4 |
26.71MB |
25. Securing Authentication and Authorization System.vtt |
13.13KB |
26.1 115 - Identity as a Service (IDaaS).pdf.pdf |
1.09MB |
26.1 28 - Passive Recon - Network Devices.pdf.pdf |
3.31MB |
26.1 64 - Virtualization Vulnerabilities.pdf.pdf |
2.36MB |
26.1 89 - Incident Containment.pdf.pdf |
2.56MB |
26. Identity as a Service (IDaaS).mp4 |
9.70MB |
26. Identity as a Service (IDaaS).vtt |
4.67KB |
26. Incident Containment.mp4 |
30.61MB |
26. Incident Containment.vtt |
14.92KB |
26. Passive Recon - Network Devices.mp4 |
38.07MB |
26. Passive Recon - Network Devices.vtt |
16.42KB |
26. Virtualization Vulnerabilities.mp4 |
12.71MB |
26. Virtualization Vulnerabilities.vtt |
9.30KB |
27.1 116 - Detecting Identity Attacks.pdf.pdf |
807.09KB |
27.1 29 - Passive Recon - Netstat.pdf.pdf |
1.99MB |
27.1 65 - Web Application Vulnerabilities.pdf.pdf |
2.31MB |
27.1 90 - Eradication and Recovery.pdf.pdf |
2.76MB |
27. Detecting Identity Attacks.mp4 |
7.08MB |
27. Detecting Identity Attacks.vtt |
3.37KB |
27. Eradication and Recovery.mp4 |
28.99MB |
27. Eradication and Recovery.vtt |
15.55KB |
27. Passive Recon - Netstat.mp4 |
22.18MB |
27. Passive Recon - Netstat.vtt |
9.38KB |
27. Web Application Vulnerabilities.mp4 |
25.01MB |
27. Web Application Vulnerabilities.vtt |
11.02KB |
28.1 117 - Federated Identity Systems.pdf.pdf |
3.59MB |
28.1 30 - DHCP Logs and Configs.pdf.pdf |
1.47MB |
28.1 66 - Internet of Things (IoT) Vulnerabilities.pdf.pdf |
1.58MB |
28.1 91 - Finishing the Response.pdf.pdf |
1.69MB |
28. DHCP Logs and Configs.mp4 |
14.77MB |
28. DHCP Logs and Configs.vtt |
5.85KB |
28. Federated Identity Systems.mp4 |
46.82MB |
28. Federated Identity Systems.vtt |
23.25KB |
28. Finishing the Response.mp4 |
22.55MB |
28. Finishing the Response.vtt |
11.56KB |
28. Internet of Things (IoT) Vulnerabilities.mp4 |
16.43MB |
28. Internet of Things (IoT) Vulnerabilities.vtt |
7.41KB |
29.1 Example Firewall Logs from CISCO.html |
147B |
29.2 31 - Firewall Logs and Configs.pdf.pdf |
1.46MB |
29. Firewall Logs and Configs.mp4 |
17.63MB |
29. Firewall Logs and Configs.vtt |
7.19KB |
29. Quiz Analyzing Vulnerability Reports.html |
121B |
29. Quiz Identity and Access Management.html |
121B |
29. Quiz Incident Containment and Eradication.html |
121B |
3.1 06 - Risk Considerations.pdf.pdf |
2.94MB |
3.10 CompTIA Security+ (SY0-501) Complete Course & Practice Exam.html |
116B |
3.11 ITIL Foundation Complete ITIL Exam Preparation Course.html |
119B |
3.12 CompTIA Security+ (SY0-501) 5 Practice Exams & Simulations!.html |
135B |
3.13 PRINCE2 Foundation Practice Certification Exams (6 Exams).html |
122B |
3.1 42 - Corporate Requirements.pdf.pdf |
4.23MB |
3.14 ITIL Foundation Cram to Pass the ITIL Exam in 7 Days!.html |
127B |
3.15 #UNOFFICIAL# Certified Ethical Hacker (CEH) Practice Exams.html |
117B |
3.1 69 - Incident Response Teams.pdf.pdf |
1.99MB |
3.16 Risk Management for Cybersecurity and IT Managers.html |
137B |
3.17 PRINCE2 Agile Foundation (Get certified in the next 7 days!).html |
128B |
3.18 CompTIA Network+ (N10-007) 5 Practice Exams & Simulations.html |
121B |
3.1 94 - Standard Frameworks.pdf.pdf |
3.74MB |
3.19 ITIL Foundation Practice Certification Exams (6 Exams).html |
123B |
3.1 CompTIA CySA+ (CS0-001) 5 Practice Certification Exams.html |
114B |
3.20 How to Pass Certification Exams with Strategic Test Taking!.html |
118B |
3.21 Introduction to Cloud Security with Microsoft Azure.html |
117B |
3.2 CompTIA Network+ Cert (N10-007) Full Course & Practice Exam.html |
115B |
3.3 Introduction to Malware Analysis for Incident Responders.html |
120B |
3.4 CompTIA CySA+ (CS0-001) Complete Course and Practice Exam.html |
118B |
3.5 PRINCE2 Foundation Cram to Pass the PRINCE2 Exam in 7 Days!.html |
116B |
3.6 WiFi Hacking Wireless Penetration Testing for Beginners.html |
119B |
3.7 CompTIA Pentest+ (PT0-001) Complete Course & Practice Exam.html |
115B |
3.8 Anatomy of a Cyber Attack Beginner Hacking with Metasploit.html |
124B |
3.9 Udemy Coupon Codes (Graduate).pdf.pdf |
2.76MB |
3. A Special Message From Jason Dion.mp4 |
38.39MB |
3. A Special Message From Jason Dion.vtt |
4.07KB |
3. BONUS A Special Thank You Message From Jason.mp4 |
11.32MB |
3. BONUS A Special Thank You Message From Jason.vtt |
1.74KB |
3. Corporate Requirements.mp4 |
20.41MB |
3. Corporate Requirements.vtt |
15.16KB |
3. Incident Response Teams.mp4 |
36.25MB |
3. Incident Response Teams.vtt |
19.99KB |
3. Risk Consideration.mp4 |
25.14MB |
3. Risk Consideration.vtt |
11.70KB |
3. Standard Frameworks.mp4 |
34.46MB |
3. Standard Frameworks.vtt |
16.96KB |
30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf |
6.76MB |
30.1 32 - System and Host Log Files.pdf.pdf |
1.09MB |
30. Software Development Life Cycle (SDLC).mp4 |
36.79MB |
30. Software Development Life Cycle (SDLC).vtt |
18.96KB |
30. System and Host Log Files.mp4 |
11.78MB |
30. System and Host Log Files.vtt |
5.16KB |
31.1 119 - Software Development Models.pdf.pdf |
3.68MB |
31.1 33 - DNS Harvesting.pdf.pdf |
1.92MB |
31. DNS Harvesting.mp4 |
16.42MB |
31. DNS Harvesting.vtt |
6.16KB |
31. Software Development Models.mp4 |
48.88MB |
31. Software Development Models.vtt |
25.64KB |
32.1 120 - Coding for Security.pdf.pdf |
2.19MB |
32.1 34 - Domain Names and IP Ranges.pdf.pdf |
807.90KB |
32. Coding for Security.mp4 |
31.96MB |
32. Coding for Security.vtt |
16.78KB |
32. Domain Names and IP Ranges.mp4 |
12.01MB |
32. Domain Names and IP Ranges.vtt |
5.22KB |
33.1 121 - Testing Application Code.pdf.pdf |
3.49MB |
33.1 35 - DNS Zone Transfers.pdf.pdf |
1.09MB |
33. DNS Zone Transfers.mp4 |
15.88MB |
33. DNS Zone Transfers.vtt |
6.97KB |
33. Testing Application Security.mp4 |
26.29MB |
33. Testing Application Security.vtt |
12.58KB |
34.1 122 - Finding Security Flaws.pdf.pdf |
3.63MB |
34.1 36 - Whois and Host Commands.pdf.pdf |
1.56MB |
34. Finding Security Flaws.mp4 |
30.25MB |
34. Finding Security Flaws.vtt |
14.66KB |
34. Whois and Host Commands.mp4 |
14.15MB |
34. Whois and Host Commands.vtt |
6.31KB |
35.1 123 - Web Application Vulnerability Scanning.pdf.pdf |
3.10MB |
35.1 37 - Information Gathering and Aggregation.pdf.pdf |
1.97MB |
35. Information Gathering and Aggregation.mp4 |
19.39MB |
35. Information Gathering and Aggregation.vtt |
8.70KB |
35. Web Application Vulnerability Scanners.mp4 |
26.29MB |
35. Web Application Vulnerability Scanners.vtt |
12.66KB |
36.1 38 - Organizational Intelligence.pdf.pdf |
2.44MB |
36. Organizational Intelligence.mp4 |
34.28MB |
36. Organizational Intelligence.vtt |
17.00KB |
36. Quiz Software Development and SDLC.html |
121B |
37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf |
2.00MB |
37. Detecting, Preventing, and Responding to Reconnaissance.mp4 |
29.64MB |
37. Detecting, Preventing, and Responding to Reconnaissance.vtt |
15.06KB |
38. Quiz Reconnaissance and Intelligence Gathering.html |
121B |
4.1 07 - Risk Assessment.pdf.pdf |
1.44MB |
4.1 43 - Scanning Tools.pdf.pdf |
4.59MB |
4.1 70 - Incident Response Phases.pdf.pdf |
5.79MB |
4.1 95 - Policy-Based Controls.pdf.pdf |
2.56MB |
4. Incident Response Phases.mp4 |
49.88MB |
4. Incident Response Phases.vtt |
24.08KB |
4. Policy-based Controls.mp4 |
16.09MB |
4. Policy-based Controls.vtt |
7.52KB |
4. Risk Assessment.mp4 |
15.50MB |
4. Risk Assessment.vtt |
6.83KB |
4. Scanning Tools.mp4 |
10.40MB |
4. Scanning Tools.vtt |
7.73KB |
5.1 08 - Identify Threats.pdf.pdf |
2.83MB |
5.1 44 - Scoping Scans.pdf.pdf |
1.37MB |
5.1 71 - Incident Response Policy & Procedures.pdf.pdf |
1.90MB |
5.1 96 - Audits and Assessments.pdf.pdf |
1.14MB |
5. Audits and Assessments.mp4 |
10.10MB |
5. Audits and Assessments.vtt |
4.99KB |
5. Identify Threats.mp4 |
29.40MB |
5. Identify Threats.vtt |
13.64KB |
5. Incident Response Policy and Procedures.mp4 |
20.79MB |
5. Incident Response Policy and Procedures.vtt |
10.94KB |
5. Scoping Scans.mp4 |
9.97MB |
5. Scoping Scans.vtt |
7.43KB |
6.1 09 - Identify Vulnerabilities.pdf.pdf |
1.62MB |
6.1 45 - Configuring Scans.pdf.pdf |
498.62KB |
6.1 72 - Communication and Information Sharing.pdf.pdf |
2.48MB |
6.1 97 - Laws and Regulations.pdf.pdf |
4.82MB |
6. Communication and Info Sharing.mp4 |
18.84MB |
6. Communication and Info Sharing.vtt |
11.09KB |
6. Configuring Scans.mp4 |
2.78MB |
6. Configuring Scans.vtt |
1.19KB |
6. Identify Vulnerabilities.mp4 |
10.82MB |
6. Identify Vulnerabilities.vtt |
4.79KB |
6. Laws and Regulations.mp4 |
24.36MB |
6. Laws and Regulations.vtt |
11.18KB |
7.1 10 - Likelihood, Impact, and Risk.pdf.pdf |
1.60MB |
7.1 46 - Scanning Sensitivity.pdf.pdf |
2.22MB |
7.1 73 - Incident Classification.pdf.pdf |
3.53MB |
7. Incident Classification.mp4 |
35.20MB |
7. Incident Classification.vtt |
18.41KB |
7. Likelihood, Impact, and Risk.mp4 |
13.59MB |
7. Likelihood, Impact, and Risk.vtt |
5.95KB |
7. Quiz Policies, Standards, Procedures, and Frameworks.html |
121B |
7. Scanning Sensitivity.mp4 |
16.18MB |
7. Scanning Sensitivity.vtt |
7.16KB |
8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf |
2.19MB |
8.1 47 - Scanning Perspective.pdf.pdf |
1.46MB |
8.1 98 - Defense in Depth.pdf.pdf |
3.47MB |
8. Defense in Depth.mp4 |
25.12MB |
8. Defense in Depth.vtt |
11.54KB |
8. Qualitative and Quantitative Assessments.mp4 |
18.60MB |
8. Qualitative and Quantitative Assessments.vtt |
11.03KB |
8. Quiz Cyber Incident Response Program.html |
121B |
8. Scanning Perspective.mp4 |
4.26MB |
8. Scanning Perspective.vtt |
2.94KB |
9.1 12 - Revieiwing Controls.pdf.pdf |
1.99MB |
9.1 48 - Authenticated Scanning.pdf.pdf |
1.57MB |
9.1 74 - Network Event Monitoring.pdf.pdf |
4.21MB |
9.1 99 - Types of Controls.pdf.pdf |
3.48MB |
9. Authenticated Scanning.mp4 |
9.69MB |
9. Authenticated Scanning.vtt |
8.42KB |
9. Network Event Monitoring.mp4 |
33.23MB |
9. Network Event Monitoring.vtt |
16.43KB |
9. Reviewing Controls.mp4 |
31.74MB |
9. Reviewing Controls.vtt |
15.09KB |
9. Types of Controls.mp4 |
21.79MB |
9. Types of Controls.vtt |
10.38KB |