Torrent Info
Title CBT Nuggets - CompTIA CySA+ (CS0-001) [AhLaN]
Category
Size 1.59GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01 - 1.0 Threat Management_ Vocabulary Related to Threats and Attacks.mp4 22.46MB
02 - 1.0 Threat Management_ Attack Categories, Types, and Vectors.mp4 17.16MB
03 - 1.0 Threat Management_ Reconnaissance and Footprinting Overview.mp4 27.52MB
04 - 1.0 Threat Management_ Using DNS for Reconnaissance.mp4 25.60MB
05 - 1.0 Threat Management_ Direct Network Scanning Overview.mp4 15.30MB
06 - 1.0 Threat Management_ Direct Network Scanning Methodology .mp4 26.29MB
07 - 1.0 Threat Management_ Port Discovery Overview.mp4 25.34MB
08 - 1.0 Threat Management_ OS and App Fingerprinting.mp4 24.24MB
09 - 1.0 Threat Management_ Using NMAP for Host, Port, and OS Discovery_ VLab.mp4 77.10MB
10 - 1.0 Threat Management_ Vulnerability Scanning Tools.mp4 20.82MB
11 - 1. Threat Management_ Vulnerability Scan Scenario.mp4 13.79MB
12 - 1. Threat Management_ Network Mapping.mp4 11.89MB
13 - 1. Threat Management_ Understanding System Hacking.mp4 26.49MB
14 - 1. Threat Management_ Honeypot Overview.mp4 23.89MB
15 - 1. Threat Management_ Using a Network Scanner To See a Honeypot.mp4 30.75MB
16 - 1. Threat Management_ Social Engineering Overview.mp4 15.65MB
17 - 1. Threat Management_ Phases and Methods of Social Engineering.mp4 15.81MB
18 - 1. Threat Management_ Phishing Overview.mp4 24.10MB
19 - 1. Threat Management_ Defending Against Phishing.mp4 24.43MB
20 - 1. Threat Management_ Packet Capture and Analysis Overview.mp4 19.21MB
21 - 1. Threat Management_ Practicing Packet Capture and Protocol Analysis_ VLab.mp4 43.07MB
22 - 1. Threat Management_ Logging Overview.mp4 27.75MB
23 - 1. Threat Management_ Firewall_Router ACL Review.mp4 25.40MB
24 - 1. Threat Management_ Trend Awareness.mp4 28.32MB
25 - 1. Threat Management_ Hardening and Other Best Practices.mp4 21.93MB
26 - 1. Threat Management_ Whitelisting and Access Control.mp4 16.39MB
27 - 1. Threat Management_ Evaluating Risk.mp4 19.09MB
28 - 1. Threat Management_ Network Access Control (NAC).mp4 25.17MB
29 - 1. Threat Management_ Uncovering Vulnerabilities.mp4 24.75MB
30 - 2. Vulnerability Management_ Motivators for Vulnerability Management.mp4 18.64MB
31 - 2. Vulnerability Management_ SCAP Overview.mp4 16.99MB
32 - 2. Vulnerability Management_ What to Ask When Doing Focused Vulnerability Scanning.mp4 26.22MB
33 - 2. Vulnerability Management_ Remediation Considerations.mp4 24.08MB
34 - 2. Vulnerability Management_ Review and Interpret Output_ Web Server Version.mp4 22.00MB
35 - 2. Vulnerability Management_ Analyzing Vulnerability Scan Output_ Enumeration of Shares.mp4 20.52MB
36 - 2. Vulnerability Management_ Vulnerabilities in Servers.mp4 32.12MB
37 - 2. Vulnerability Management_ Vulnerabilities in Endpoints.mp4 23.65MB
38 - 2. Vulnerability Management_ Vulnerabilities in Infrastructure Devices.mp4 22.97MB
39 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Weak Policy.mp4 23.70MB
40 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Traveling.mp4 22.75MB
41 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Remote Wipe.mp4 19.22MB
42 - 2. Vulnerability Management_ Vulnerabilities Regarding Interconnected Networks.mp4 18.95MB
43 - 2. Vulnerability Management_ Physical and Virtual Device Vulnerabilities.mp4 25.10MB
44 - 2. Vulnerability Management_ Using ACLs and VPNs to Reduce Vulnerabilities.mp4 18.27MB
45 - 3. Cyber Incident Response_ Threat Classification.mp4 22.50MB
46 - 3. Cyber Incident Response_ Factors Contributing to Incident Severity and Prioritization.mp4 21.66MB
47 - 3. Cyber Incident Response_ Building a Forensic Tool Kit.mp4 24.91MB
48 - 3. Cyber Incident Response_ Tool Categories in a Forensic Investigation Suite.mp4 19.87MB
49 - 3. Cyber Incident Response_ Communication During an Incident Response.mp4 32.77MB
50 - 3. Cyber Incident Response_ Abnormal Traffic Patterns that May Indicate a Cyber Incident.mp4 22.50MB
51 - 3. Cyber Incident Response_ Network Scans as a Symptom of a Cyber Incident.mp4 15.39MB
52 - 3. Cyber Incident Response_ Host-Related Cybersecurity Symptoms.mp4 25.97MB
53 - 3. Cyber Incident Response_ Application-Related Cyber Incident Symptoms.mp4 12.57MB
54 - 3. Cyber Incident Response_ Containment and Eradication Techniques.mp4 28.94MB
55 - 3. Cyber Incident Response_ Validation of Post-Incident Remediation .mp4 19.86MB
56 - 3. Cyber Incident Response_ Corrective Actions, Updates, and Reports.mp4 11.88MB
57 - 4.0 Security Architecture_ Security Frameworks for IT.mp4 17.33MB
58 - 4.0 Security Architecture_ Regulatory Compliance and Control Types.mp4 23.12MB
59 - 4.0 Security Architecture_ Verification and Validation of Controls.mp4 14.44MB
60 - 4.0 Security Architecture_ Having Policies to Improve Security.mp4 15.13MB
61 - 4.0 Security Architecture_ Having Procedures to Improve Security.mp4 15.13MB
62 - 4.0 Security Architecture_ Identity Context and Repositories .mp4 25.17MB
63 - 4.0 Security Architecture_ SSO and Federations.mp4 20.92MB
64 - 4.0 Security Architecture_ Exploits Related to Identity and Access.mp4 23.26MB
65 - 4.0 Security Architecture_ Recommending Compensating Controls.mp4 24.91MB
66 - 4.0 Security Architecture_ Best Practices During Software Development.mp4 23.63MB
67 - 4.0 Security Architecture_ Secure Coding Best Practices.mp4 23.40MB
68 - 4.0 Security Architecture_ Identifying Preventive Tools and Technologies.mp4 24.26MB
69 - 4.0 Security Architecture_ Selecting and Applying Appropriate Preventive Tools.mp4 23.37MB
70 - 4.0 Security Architecture_ Tools and Technologies for Information Collection.mp4 17.85MB
71 - 4.0 Security Architecture_ Tools and Tech for Analysis, Exploits, and Forensics.mp4 19.32MB
AhLaN.txt 961B
Seed Me!!.png 42.05KB
Distribution statistics by country
United States (US) 2
France (FR) 1
Uganda (UG) 1
Russia (RU) 1
Netherlands (NL) 1
Total 6
IP List List of IP addresses which were distributed this torrent