Torrent Info
Title [Tutorialsplanet.NET] Udemy - CompTIA CySA+ (CS0-001) Complete Course and Practice Exam
Category
Size 3.60GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[Tutorialsplanet.NET].url 128B
1.1 67 - Domain 3 - Cyber Incident Response.pdf.pdf 1.39MB
1.1 CompTIA CySA+ (Study Notes).pdf.pdf 7.01MB
1.1 Domain 1 - Threat Management.pdf.pdf 60.03MB
1.1 Domain 2 - Vulnerability Management.pdf.pdf 164.64MB
1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf 85.15MB
1.2 40 - Domain 2 - Vulnerability Management.pdf.pdf 1.39MB
1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf 498.48KB
1.2 Domain 3 - Cyber Incident Response.pdf.pdf 62.00MB
1. Domain 1 Threat Management.mp4 4.80MB
1. Domain 1 Threat Management.vtt 2.28KB
1. Domain 2 Vulnerability Management.mp4 10.17MB
1. Domain 2 Vulnerability Management.vtt 5.73KB
1. Domain 3 Cyber Incident Response.mp4 7.61MB
1. Domain 3 Cyber Incident Response.vtt 3.46KB
1. Domain 4 Security Architecture and Tool Sets.mp4 2.88MB
1. Domain 4 Security Architecture and Tool Sets.vtt 1.47KB
1. How to Schedule Your Exam.mp4 70.46MB
1. How to Schedule Your Exam.vtt 7.12KB
1. Simulations and Performance-Based Questions (PBQs).mp4 323.95MB
1. Simulations and Performance-Based Questions (PBQs).vtt 38.42KB
1. Welcome to the Course.mp4 15.01MB
1. Welcome to the Course.vtt 8.40KB
10.1 100 - Layered Network Design.pdf.pdf 2.23MB
10.1 13 - Network Perimeter Security.pdf.pdf 3.14MB
10.1 49 - Maintaining Scanners.pdf.pdf 1.87MB
10.1 75 - Network Monitoring Tools.pdf.pdf 4.38MB
10. Layered Network Defense.mp4 21.87MB
10. Layered Network Defense.vtt 9.80KB
10. Maintaining Scanners.mp4 9.15MB
10. Maintaining Scanners.vtt 7.38KB
10. Network Monitoring Tools.mp4 22.28MB
10. Network Monitoring Tools.vtt 10.53KB
10. Network Perimeter Security.mp4 35.87MB
10. Network Perimeter Security.vtt 14.77KB
11.1 101 - Layered Host Security.pdf.pdf 1.87MB
11.1 14 - Network Segmentation.pdf.pdf 1.32MB
11.1 50 - Standardizing Vulnerabilities.pdf.pdf 3.17MB
11.1 76 - Detecting Network Events.pdf.pdf 2.04MB
11. Detecting Network Events.mp4 27.07MB
11. Detecting Network Events.vtt 12.92KB
11. Layered Host Security.mp4 14.59MB
11. Layered Host Security.vtt 6.77KB
11. Network Segmentation.mp4 11.51MB
11. Network Segmentation.vtt 5.33KB
11. Standardizing Vulnerabilities.mp4 9.06MB
11. Standardizing Vulnerabilities.vtt 6.65KB
12.1 102 - Data Analytics.pdf.pdf 1.92MB
12.1 15 - Network Access Control.pdf.pdf 1.77MB
12.1 51 - Workflow for Remediation.pdf.pdf 1.41MB
12.1 77 - Network Probes and Attacks.pdf.pdf 2.76MB
12. Data Analytics.mp4 18.85MB
12. Data Analytics.vtt 8.97KB
12. Network Access Control.mp4 26.94MB
12. Network Access Control.vtt 12.50KB
12. Network Probes and Attacks.mp4 25.43MB
12. Network Probes and Attacks.vtt 13.75KB
12. Workflow for Remediation.mp4 11.88MB
12. Workflow for Remediation.vtt 6.17KB
13.1 103 - Personnel Security.pdf.pdf 3.73MB
13.1 16 - Defense Deception Methods.pdf.pdf 1.48MB
13.1 52 - Vulnerability Reporting.pdf.pdf 2.75MB
13.1 78 - Server and Host Events.pdf.pdf 2.52MB
13. Defense Deception Methods.mp4 16.01MB
13. Defense Deception Methods.vtt 7.60KB
13. Personnel Security.mp4 27.37MB
13. Personnel Security.vtt 13.05KB
13. Server and Host Events.mp4 22.79MB
13. Server and Host Events.vtt 11.28KB
13. Vulnerability Reporting.mp4 18.72MB
13. Vulnerability Reporting.vtt 8.82KB
14.1 104 - Outsourcing Concerns.pdf.pdf 1.69MB
14.1 17 - Secure Endpoint Management.pdf.pdf 2.30MB
14.1 53 - Remediation Reporting.pdf.pdf 2.03MB
14.1 79 - Service and Application Events.pdf.pdf 2.86MB
14. Outsourcing Concerns.mp4 13.93MB
14. Outsourcing Concerns.vtt 7.30KB
14. Remediation Priority.mp4 18.97MB
14. Remediation Priority.vtt 8.57KB
14. Secure Endpoint Management.mp4 32.66MB
14. Secure Endpoint Management.vtt 15.03KB
14. Service and Application Events.mp4 23.04MB
14. Service and Application Events.vtt 11.35KB
15.1 105 - User Awareness Training.pdf.pdf 1.14MB
15.1 18 - Penetration Testing.pdf.pdf 2.32MB
15.1 54 - Implementing and Testing.pdf.pdf 1.69MB
15. Implementing and Testing.mp4 23.68MB
15. Implementing and Testing.vtt 12.45KB
15. Penetration Testing.mp4 34.70MB
15. Penetration Testing.vtt 16.26KB
15. Quiz Symptoms of Cyber Attacks.html 121B
15. User Awareness Training.mp4 10.22MB
15. User Awareness Training.vtt 8.78KB
16.1 106 - Analyzing Secure Architectures.pdf.pdf 2.73MB
16.1 19 - Security Exercises and Training.pdf.pdf 1.39MB
16.1 55 - Nessus-Scan-Report-Example.pdf.pdf 1.12MB
16.1 80 - Digital Forensics.pdf.pdf 1.42MB
16. Analyzing Secure Architectures.mp4 43.19MB
16. Analyzing Secure Architectures.vtt 18.25KB
16. Digital Forensics.mp4 11.50MB
16. Digital Forensics.vtt 6.28KB
16. Nessus Vulnerability Scanner A Walkthrough.mp4 16.74MB
16. Nessus Vulnerability Scanner A Walkthrough.vtt 18.12KB
16. Security Exercises and Training.mp4 13.41MB
16. Security Exercises and Training.vtt 6.55KB
17.1 20 - Reverse Engineering.pdf.pdf 1.39MB
17.1 81 - Forensic Toolkit Components.pdf.pdf 6.02MB
17. Forensic Toolkit Components.mp4 36.22MB
17. Forensic Toolkit Components.vtt 18.67KB
17. Quiz Defense in Depth.html 121B
17. Quiz Vulnerability Management Program.html 121B
17. Reverse Engineering.mp4 27.88MB
17. Reverse Engineering.vtt 13.40KB
18.1 107 - What is Identity.pdf.pdf 2.60MB
18.1 56 - Interpreting Scan Results.pdf.pdf 4.43MB
18.1 82 - Mobile Forensic Toolkits.pdf.pdf 2.18MB
18. Interpreting Scan Results.mp4 36.35MB
18. Interpreting Scan Results.vtt 18.12KB
18. Mobile Forensic Toolkits.mp4 12.25MB
18. Mobile Forensic Toolkits.vtt 7.17KB
18. Quiz Defense Against Cyber Threats.html 121B
18. What Is Identity.mp4 22.05MB
18. What Is Identity.vtt 10.75KB
19.1 108 - Identity Systems.pdf.pdf 3.89MB
19.1 21 - Reconnaissance and Intelligence.pdf.pdf 499.20KB
19.1 57 - Interpeting CVSS.pdf.pdf 3.27MB
19.1 83 - Forensic Software.pdf.pdf 3.06MB
19. Forensic Software.mp4 29.66MB
19. Forensic Software.vtt 14.84KB
19. Identity Systems.mp4 50.49MB
19. Identity Systems.vtt 24.85KB
19. Interpreting CVSS.mp4 27.48MB
19. Interpreting CVSS.vtt 13.17KB
19. Reconnaissance and Intelligence.mp4 5.56MB
19. Reconnaissance and Intelligence.vtt 2.42KB
2.1 02 - Exam Foundations.pdf.pdf 1.83MB
2.1 05 - CIA Triad.pdf.pdf 2.80MB
2.1 41 - Regulatory Requirements.pdf.pdf 2.09MB
2.1 68 - Security Incidents.pdf.pdf 1.82MB
2.1 93 - Policy Documents.pdf.pdf 3.27MB
2.1 CompTIA CySA+ Course (Conclusion).pdf.pdf 2.26MB
2. CIA Triad.mp4 36.25MB
2. CIA Triad.vtt 16.72KB
2. CompTIA CSA+ Practice Certification Exam.html 121B
2. Conclusion.mp4 8.44MB
2. Conclusion.vtt 4.42KB
2. Exam Foundations.mp4 18.77MB
2. Exam Foundations.vtt 7.83KB
2. Policy Documents.mp4 29.69MB
2. Policy Documents.vtt 16.58KB
2. Regulatory Requirements.mp4 19.54MB
2. Regulatory Requirements.vtt 15.46KB
2. Security Incidents.mp4 15.93MB
2. Security Incidents.vtt 9.00KB
20.1 109 - Threats to Identity Systems.pdf.pdf 1.70MB
20.1 22 - Footprinting the Network.pdf.pdf 808.03KB
20.1 58 - Calculating the CVSS Score.pdf.pdf 2.10MB
20.1 84 - Training and Certification.pdf.pdf 819.90KB
20. Calculating the CVSS Score.mp4 17.65MB
20. Calculating the CVSS Score.vtt 7.52KB
20. Footprinting the Network.mp4 13.42MB
20. Footprinting the Network.vtt 6.10KB
20. Threats to Identity Systems.mp4 14.19MB
20. Threats to Identity Systems.vtt 7.55KB
20. Training and Certification.mp4 10.25MB
20. Training and Certification.vtt 5.29KB
21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf 2.74MB
21.1 23 - Network Mapping.pdf.pdf 1.14MB
21.1 59 - CVSS Temporal Score.pdf.pdf 2.59MB
21.1 85 - Forensic Investigation Process.pdf.pdf 1.33MB
21. Attacking AAA Protocols and Systems.mp4 40.68MB
21. Attacking AAA Protocols and Systems.vtt 20.42KB
21. CVSS Temporal Score.mp4 16.13MB
21. CVSS Temporal Score.vtt 7.53KB
21. Forensic Investigation Process.mp4 21.89MB
21. Forensic Investigation Process.vtt 12.03KB
21. Network Mapping.mp4 17.52MB
21. Network Mapping.vtt 7.81KB
22.1 111 - Targeting Account Lifecycle.pdf.pdf 1.47MB
22.1 24 - Port Scanning.pdf.pdf 1.78MB
22.1 60 - Validation of Results.pdf.pdf 2.51MB
22.1 86 - Disk Imaging.pdf.pdf 2.62MB
22. Disk Imaging.mp4 21.07MB
22. Disk Imaging.vtt 11.00KB
22. Port Scanning.mp4 24.37MB
22. Port Scanning.vtt 10.80KB
22. Targeting Account Lifecycle.mp4 14.95MB
22. Targeting Account Lifecycle.vtt 14.96MB
22. Validation of Results.mp4 28.81MB
22. Validation of Results.vtt 14.71KB
23.1 112 - Identity Exploits.pdf.pdf 1.85MB
23.1 25 - Other Port Scanners.pdf.pdf 808.19KB
23.1 61 - Common Vulnerabilities.pdf.pdf 1.16MB
23. Common Vulnerabilities.mp4 12.30MB
23. Common Vulnerabilities.vtt 5.53KB
23. Disk Imaging Using dd.mp4 8.14MB
23. Disk Imaging Using dd.vtt 5.30KB
23. Identity Exploits.mp4 13.48MB
23. Identity Exploits.vtt 6.17KB
23. Other Port Scanners.mp4 9.40MB
23. Other Port Scanners.vtt 3.95KB
24.1 113 - Credential Theft.pdf.pdf 2.31MB
24.1 62 - Server and Host Vulnerabilities.pdf.pdf 4.11MB
24. Credential Theft.mp4 15.44MB
24. Credential Theft.vtt 7.43KB
24. Disk Imaging Using FTK Imager.mp4 17.80MB
24. Disk Imaging Using FTK Imager.vtt 11.00KB
24. NMAP - Demonstration of the world's most popular port scanning tool.mp4 9.93MB
24. NMAP - Demonstration of the world's most popular port scanning tool.vtt 11.25KB
24. Server and Host Vulnerabilities.mp4 18.53MB
24. Server and Host Vulnerabilities.vtt 14.04KB
25.1 114 - Securing Authentication and Authorization.pdf.pdf 2.13MB
25.1 27 - Passive Reconnaissance.pdf.pdf 806.22KB
25.1 63 - Network Vulnerabilities.pdf.pdf 4.40MB
25. Network Vulnerabilities.mp4 17.23MB
25. Network Vulnerabilities.vtt 12.07KB
25. Passive Reconnaissance.mp4 12.27MB
25. Passive Reconnaissance.vtt 5.77KB
25. Quiz Digital Forensics.html 121B
25. Securing Authentication and Authorization System.mp4 26.71MB
25. Securing Authentication and Authorization System.vtt 13.13KB
26.1 115 - Identity as a Service (IDaaS).pdf.pdf 1.09MB
26.1 28 - Passive Recon - Network Devices.pdf.pdf 3.31MB
26.1 64 - Virtualization Vulnerabilities.pdf.pdf 2.36MB
26.1 89 - Incident Containment.pdf.pdf 2.56MB
26. Identity as a Service (IDaaS).mp4 9.70MB
26. Identity as a Service (IDaaS).vtt 4.67KB
26. Incident Containment.mp4 30.61MB
26. Incident Containment.vtt 14.92KB
26. Passive Recon - Network Devices.mp4 38.07MB
26. Passive Recon - Network Devices.vtt 16.42KB
26. Virtualization Vulnerabilities.mp4 12.71MB
26. Virtualization Vulnerabilities.vtt 9.30KB
27.1 116 - Detecting Identity Attacks.pdf.pdf 807.09KB
27.1 29 - Passive Recon - Netstat.pdf.pdf 1.99MB
27.1 65 - Web Application Vulnerabilities.pdf.pdf 2.31MB
27.1 90 - Eradication and Recovery.pdf.pdf 2.76MB
27. Detecting Identity Attacks.mp4 7.08MB
27. Detecting Identity Attacks.vtt 3.37KB
27. Eradication and Recovery.mp4 28.99MB
27. Eradication and Recovery.vtt 15.55KB
27. Passive Recon - Netstat.mp4 22.18MB
27. Passive Recon - Netstat.vtt 9.38KB
27. Web Application Vulnerabilities.mp4 25.01MB
27. Web Application Vulnerabilities.vtt 11.02KB
28.1 117 - Federated Identity Systems.pdf.pdf 3.59MB
28.1 30 - DHCP Logs and Configs.pdf.pdf 1.47MB
28.1 66 - Internet of Things (IoT) Vulnerabilities.pdf.pdf 1.58MB
28.1 91 - Finishing the Response.pdf.pdf 1.69MB
28. DHCP Logs and Configs.mp4 14.77MB
28. DHCP Logs and Configs.vtt 5.85KB
28. Federated Identity Systems.mp4 46.82MB
28. Federated Identity Systems.vtt 23.25KB
28. Finishing the Response.mp4 22.55MB
28. Finishing the Response.vtt 11.56KB
28. Internet of Things (IoT) Vulnerabilities.mp4 16.43MB
28. Internet of Things (IoT) Vulnerabilities.vtt 7.41KB
29.1 Example Firewall Logs from CISCO.html 147B
29.2 31 - Firewall Logs and Configs.pdf.pdf 1.46MB
29. Firewall Logs and Configs.mp4 17.63MB
29. Firewall Logs and Configs.vtt 7.19KB
29. Quiz Analyzing Vulnerability Reports.html 121B
29. Quiz Identity and Access Management.html 121B
29. Quiz Incident Containment and Eradication.html 121B
3.1 06 - Risk Considerations.pdf.pdf 2.94MB
3.10 CompTIA Security+ (SY0-501) Complete Course & Practice Exam.html 116B
3.11 ITIL Foundation Complete ITIL Exam Preparation Course.html 119B
3.12 CompTIA Security+ (SY0-501) 5 Practice Exams & Simulations!.html 135B
3.13 PRINCE2 Foundation Practice Certification Exams (6 Exams).html 122B
3.1 42 - Corporate Requirements.pdf.pdf 4.23MB
3.14 ITIL Foundation Cram to Pass the ITIL Exam in 7 Days!.html 127B
3.15 #UNOFFICIAL# Certified Ethical Hacker (CEH) Practice Exams.html 117B
3.1 69 - Incident Response Teams.pdf.pdf 1.99MB
3.16 Risk Management for Cybersecurity and IT Managers.html 137B
3.17 PRINCE2 Agile Foundation (Get certified in the next 7 days!).html 128B
3.18 CompTIA Network+ (N10-007) 5 Practice Exams & Simulations.html 121B
3.1 94 - Standard Frameworks.pdf.pdf 3.74MB
3.19 ITIL Foundation Practice Certification Exams (6 Exams).html 123B
3.1 CompTIA CySA+ (CS0-001) 5 Practice Certification Exams.html 114B
3.20 How to Pass Certification Exams with Strategic Test Taking!.html 118B
3.21 Introduction to Cloud Security with Microsoft Azure.html 117B
3.2 CompTIA Network+ Cert (N10-007) Full Course & Practice Exam.html 115B
3.3 Introduction to Malware Analysis for Incident Responders.html 120B
3.4 CompTIA CySA+ (CS0-001) Complete Course and Practice Exam.html 118B
3.5 PRINCE2 Foundation Cram to Pass the PRINCE2 Exam in 7 Days!.html 116B
3.6 WiFi Hacking Wireless Penetration Testing for Beginners.html 119B
3.7 CompTIA Pentest+ (PT0-001) Complete Course & Practice Exam.html 115B
3.8 Anatomy of a Cyber Attack Beginner Hacking with Metasploit.html 124B
3.9 Udemy Coupon Codes (Graduate).pdf.pdf 2.76MB
3. A Special Message From Jason Dion.mp4 38.39MB
3. A Special Message From Jason Dion.vtt 4.07KB
3. BONUS A Special Thank You Message From Jason.mp4 11.32MB
3. BONUS A Special Thank You Message From Jason.vtt 1.74KB
3. Corporate Requirements.mp4 20.41MB
3. Corporate Requirements.vtt 15.16KB
3. Incident Response Teams.mp4 36.25MB
3. Incident Response Teams.vtt 19.99KB
3. Risk Consideration.mp4 25.14MB
3. Risk Consideration.vtt 11.70KB
3. Standard Frameworks.mp4 34.46MB
3. Standard Frameworks.vtt 16.96KB
30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf 6.76MB
30.1 32 - System and Host Log Files.pdf.pdf 1.09MB
30. Software Development Life Cycle (SDLC).mp4 36.79MB
30. Software Development Life Cycle (SDLC).vtt 18.96KB
30. System and Host Log Files.mp4 11.78MB
30. System and Host Log Files.vtt 5.16KB
31.1 119 - Software Development Models.pdf.pdf 3.68MB
31.1 33 - DNS Harvesting.pdf.pdf 1.92MB
31. DNS Harvesting.mp4 16.42MB
31. DNS Harvesting.vtt 6.16KB
31. Software Development Models.mp4 48.88MB
31. Software Development Models.vtt 25.64KB
32.1 120 - Coding for Security.pdf.pdf 2.19MB
32.1 34 - Domain Names and IP Ranges.pdf.pdf 807.90KB
32. Coding for Security.mp4 31.96MB
32. Coding for Security.vtt 16.78KB
32. Domain Names and IP Ranges.mp4 12.01MB
32. Domain Names and IP Ranges.vtt 5.22KB
33.1 121 - Testing Application Code.pdf.pdf 3.49MB
33.1 35 - DNS Zone Transfers.pdf.pdf 1.09MB
33. DNS Zone Transfers.mp4 15.88MB
33. DNS Zone Transfers.vtt 6.97KB
33. Testing Application Security.mp4 26.29MB
33. Testing Application Security.vtt 12.58KB
34.1 122 - Finding Security Flaws.pdf.pdf 3.63MB
34.1 36 - Whois and Host Commands.pdf.pdf 1.56MB
34. Finding Security Flaws.mp4 30.25MB
34. Finding Security Flaws.vtt 14.66KB
34. Whois and Host Commands.mp4 14.15MB
34. Whois and Host Commands.vtt 6.31KB
35.1 123 - Web Application Vulnerability Scanning.pdf.pdf 3.10MB
35.1 37 - Information Gathering and Aggregation.pdf.pdf 1.97MB
35. Information Gathering and Aggregation.mp4 19.39MB
35. Information Gathering and Aggregation.vtt 8.70KB
35. Web Application Vulnerability Scanners.mp4 26.29MB
35. Web Application Vulnerability Scanners.vtt 12.66KB
36.1 38 - Organizational Intelligence.pdf.pdf 2.44MB
36. Organizational Intelligence.mp4 34.28MB
36. Organizational Intelligence.vtt 17.00KB
36. Quiz Software Development and SDLC.html 121B
37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf 2.00MB
37. Detecting, Preventing, and Responding to Reconnaissance.mp4 29.64MB
37. Detecting, Preventing, and Responding to Reconnaissance.vtt 15.06KB
38. Quiz Reconnaissance and Intelligence Gathering.html 121B
4.1 07 - Risk Assessment.pdf.pdf 1.44MB
4.1 43 - Scanning Tools.pdf.pdf 4.59MB
4.1 70 - Incident Response Phases.pdf.pdf 5.79MB
4.1 95 - Policy-Based Controls.pdf.pdf 2.56MB
4. Incident Response Phases.mp4 49.88MB
4. Incident Response Phases.vtt 24.08KB
4. Policy-based Controls.mp4 16.09MB
4. Policy-based Controls.vtt 7.52KB
4. Risk Assessment.mp4 15.50MB
4. Risk Assessment.vtt 6.83KB
4. Scanning Tools.mp4 10.40MB
4. Scanning Tools.vtt 7.73KB
5.1 08 - Identify Threats.pdf.pdf 2.83MB
5.1 44 - Scoping Scans.pdf.pdf 1.37MB
5.1 71 - Incident Response Policy & Procedures.pdf.pdf 1.90MB
5.1 96 - Audits and Assessments.pdf.pdf 1.14MB
5. Audits and Assessments.mp4 10.10MB
5. Audits and Assessments.vtt 4.99KB
5. Identify Threats.mp4 29.40MB
5. Identify Threats.vtt 13.64KB
5. Incident Response Policy and Procedures.mp4 20.79MB
5. Incident Response Policy and Procedures.vtt 10.94KB
5. Scoping Scans.mp4 9.97MB
5. Scoping Scans.vtt 7.43KB
6.1 09 - Identify Vulnerabilities.pdf.pdf 1.62MB
6.1 45 - Configuring Scans.pdf.pdf 498.62KB
6.1 72 - Communication and Information Sharing.pdf.pdf 2.48MB
6.1 97 - Laws and Regulations.pdf.pdf 4.82MB
6. Communication and Info Sharing.mp4 18.84MB
6. Communication and Info Sharing.vtt 11.09KB
6. Configuring Scans.mp4 2.78MB
6. Configuring Scans.vtt 1.19KB
6. Identify Vulnerabilities.mp4 10.82MB
6. Identify Vulnerabilities.vtt 4.79KB
6. Laws and Regulations.mp4 24.36MB
6. Laws and Regulations.vtt 11.18KB
7.1 10 - Likelihood, Impact, and Risk.pdf.pdf 1.60MB
7.1 46 - Scanning Sensitivity.pdf.pdf 2.22MB
7.1 73 - Incident Classification.pdf.pdf 3.53MB
7. Incident Classification.mp4 35.20MB
7. Incident Classification.vtt 18.41KB
7. Likelihood, Impact, and Risk.mp4 13.59MB
7. Likelihood, Impact, and Risk.vtt 5.95KB
7. Quiz Policies, Standards, Procedures, and Frameworks.html 121B
7. Scanning Sensitivity.mp4 16.18MB
7. Scanning Sensitivity.vtt 7.16KB
8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf 2.19MB
8.1 47 - Scanning Perspective.pdf.pdf 1.46MB
8.1 98 - Defense in Depth.pdf.pdf 3.47MB
8. Defense in Depth.mp4 25.12MB
8. Defense in Depth.vtt 11.54KB
8. Qualitative and Quantitative Assessments.mp4 18.60MB
8. Qualitative and Quantitative Assessments.vtt 11.03KB
8. Quiz Cyber Incident Response Program.html 121B
8. Scanning Perspective.mp4 4.26MB
8. Scanning Perspective.vtt 2.94KB
9.1 12 - Revieiwing Controls.pdf.pdf 1.99MB
9.1 48 - Authenticated Scanning.pdf.pdf 1.57MB
9.1 74 - Network Event Monitoring.pdf.pdf 4.21MB
9.1 99 - Types of Controls.pdf.pdf 3.48MB
9. Authenticated Scanning.mp4 9.69MB
9. Authenticated Scanning.vtt 8.42KB
9. Network Event Monitoring.mp4 33.23MB
9. Network Event Monitoring.vtt 16.43KB
9. Reviewing Controls.mp4 31.74MB
9. Reviewing Controls.vtt 15.09KB
9. Types of Controls.mp4 21.79MB
9. Types of Controls.vtt 10.38KB
Distribution statistics by country
France (FR) 1
Australia (AU) 1
Republic of Korea (KR) 1
Russia (RU) 1
Total 4
IP List List of IP addresses which were distributed this torrent