:Search:

CompTIA Cybersecurity Analyst CySA CS0 003 2 Vulnerability Management

Torrent:
Info Hash: C81C902983E84CF7092623445B99B2242DBDC5F2
Thumbnail:
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 126
Type: Tutorials
Images:
CompTIA Cybersecurity Analyst CySA CS0 003 2 Vulnerability Management
Language: English
Description:
None
Category: Other
Size: 585.9 MB
Added: July 27, 2023, 8:31 a.m.
Peers: Seeders: 13, Leechers: 4 (Last updated: 10 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 1 0 1
udp://exodus.desync.com:6969/announce 3 0 10
udp://tracker.cyberia.is:6969/announce 1 0 1
udp://tracker.opentrackr.org:1337/announce 4 0 97
udp://tracker.torrent.eu.org:451/announce 1 0 3
udp://explodie.org:6969/announce 1 0 0
udp://tracker.birkenwald.de:6969/announce 0 3 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 2 0 14
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 181 bytes
  2. 01 - Vulnerability management.mp4 4.4 MB
  3. 01 - Vulnerability management.srt 1.6 KB
  4. 02 - What you need to know.mp4 1.1 MB
  5. 02 - What you need to know.srt 1.3 KB
  6. 03 - Study resources.mp4 3.7 MB
  7. 03 - Study resources.srt 2.8 KB
  8. 01 - What is vulnerability management.mp4 8.2 MB
  9. 01 - What is vulnerability management.srt 9.2 KB
  10. 02 - Identify scan targets.mp4 9.7 MB
  11. 02 - Identify scan targets.srt 11.0 KB
  12. 03 - Scan frequency.mp4 10.0 MB
  13. 03 - Scan frequency.srt 8.0 KB
  14. 01 - Network scanning.mp4 4.1 MB
  15. 01 - Network scanning.srt 3.1 KB
  16. 02 - Install Nmap on Windows.mp4 10.5 MB
  17. 02 - Install Nmap on Windows.srt 10.1 KB
  18. 03 - Install Nmap on macOS.mp4 4.6 MB
  19. 03 - Install Nmap on macOS.srt 4.4 KB
  20. 04 - Run and interpret a simple Nmap scan.mp4 6.7 MB
  21. 04 - Run and interpret a simple Nmap scan.srt 6.6 KB
  22. 05 - Host discovery with Nmap.mp4 7.1 MB
  23. 05 - Host discovery with Nmap.srt 7.8 KB
  24. 06 - Operate system fingerprinting.mp4 6.4 MB
  25. 06 - Operate system fingerprinting.srt 7.2 KB
  26. 07 - Service version detection.mp4 2.9 MB
  27. 07 - Service version detection.srt 3.2 KB
  28. 01 - Security baseline scanning.mp4 1.9 MB
  29. 01 - Security baseline scanning.srt 1.6 KB
  30. 02 - Scan configuration.mp4 10.9 MB
  31. 02 - Scan configuration.srt 11.8 KB
  32. 03 - Scan perspective.mp4 8.8 MB
  33. 03 - Scan perspective.srt 9.2 KB
  34. 04 - Scanner maintenance.mp4 5.3 MB
  35. 04 - Scanner maintenance.srt 6.4 KB
  36. 05 - Vulnerability scanning tools.mp4 3.4 MB
  37. 05 - Vulnerability scanning tools.srt 2.2 KB
  38. 06 - Passive vulnerability scanning.mp4 3.0 MB
  39. 06 - Passive vulnerability scanning.srt 3.4 KB
  40. 01 - SCAP.mp4 4.0 MB
  41. 01 - SCAP.srt 4.2 KB
  42. 02 - CVSS.mp4 5.5 MB
  43. 02 - CVSS.srt 6.1 KB
  44. 03 - Interpret CVSS scores.mp4 6.9 MB
  45. 03 - Interpret CVSS scores.srt 5.3 KB
  46. 04 - Analyze scan reports.mp4 7.8 MB
  47. 04 - Analyze scan reports.srt 7.3 KB
  48. 05 - Correlate scan results.mp4 4.6 MB
  49. 05 - Correlate scan results.srt 4.4 KB
  50. 01 - Server vulnerabilities.mp4 12.4 MB
  51. 01 - Server vulnerabilities.srt 10.4 KB
  52. 02 - Endpoint vulnerabilities.mp4 5.8 MB
  53. 02 - Endpoint vulnerabilities.srt 3.2 KB
  54. 03 - Network vulnerabilities.mp4 7.7 MB
  55. 03 - Network vulnerabilities.srt 8.6 KB
  56. 01 - OWASP Top 10.mp4 10.4 MB
  57. 01 - OWASP Top 10.srt 10.0 KB
  58. 02 - Prevent SQL injection.mp4 8.0 MB
  59. 02 - Prevent SQL injection.srt 9.5 KB
  60. 03 - Understand cross-site scripting.mp4 8.5 MB
  61. 03 - Understand cross-site scripting.srt 9.1 KB
  62. 04 - Request forgery.mp4 9.0 MB
  63. 04 - Request forgery.srt 7.8 KB
  64. 05 - Privilege escalation.mp4 3.0 MB
  65. 05 - Privilege escalation.srt 3.6 KB
  66. 06 - Directory traversal.mp4 7.1 MB
  67. 06 - Directory traversal.srt 5.5 KB
  68. 07 - File inclusion.mp4 3.1 MB
  69. 07 - File inclusion.srt 3.4 KB
  70. 08 - Overflow attacks.mp4 9.5 MB
  71. 08 - Overflow attacks.srt 6.0 KB
  72. 09 - Cookies and attachments.mp4 8.0 MB
  73. 09 - Cookies and attachments.srt 7.9 KB
  74. 10 - Session hijacking.mp4 9.2 MB
  75. 10 - Session hijacking.srt 6.9 KB
  76. 11 - Race conditions.mp4 4.7 MB
  77. 11 - Race conditions.srt 4.1 KB
  78. 12 - Memory vulnerabilities.mp4 6.4 MB
  79. 12 - Memory vulnerabilities.srt 6.6 KB
  80. 13 - Code execution attacks.mp4 5.0 MB
  81. 13 - Code execution attacks.srt 5.0 KB
  82. 14 - Data poisoning.mp4 1.8 MB
  83. 14 - Data poisoning.srt 2.0 KB
  84. 15 - Third-party code.mp4 8.6 MB
  85. 15 - Third-party code.srt 6.6 KB
  86. 16 - Interception proxies.mp4 13.1 MB
  87. 16 - Interception proxies.srt 9.0 KB
  88. 01 - Industrial control systems.mp4 10.9 MB
  89. 01 - Industrial control systems.srt 10.0 KB
  90. 02 - Internet of Things.mp4 7.3 MB
  91. 02 - Internet of Things.srt 5.6 KB
  92. 03 - Embedded systems.mp4 10.1 MB
  93. 03 - Embedded systems.srt 8.2 KB
  94. 01 - Exploitation frameworks.mp4 11.8 MB
  95. 01 - Exploitation frameworks.srt 11.3 KB
  96. 02 - Cloud auditing tools.mp4 12.4 MB
  97. 02 - Cloud auditing tools.srt 7.8 KB
  98. 03 - Debuggers.mp4 1.1 MB
  99. 03 - Debuggers.srt 1.5 KB
  100. 04 - Open-source reconnaissance.mp4 2.3 MB
  101. 04 - Open-source reconnaissance.srt 1.7 KB
  102. 05 - Control frameworks.mp4 20.9 MB
  103. 05 - Control frameworks.srt 13.2 KB
  104. 01 - Software platforms.mp4 4.8 MB
  105. 01 - Software platforms.srt 4.1 KB
  106. 02 - Development methodologies.mp4 17.2 MB
  107. 02 - Development methodologies.srt 11.6 KB
  108. 03 - Maturity models.mp4 5.7 MB
  109. 03 - Maturity models.srt 6.4 KB
  110. 04 - Change management.mp4 7.9 MB
  111. 04 - Change management.srt 8.0 KB
  112. 01 - Input validation.mp4 4.9 MB
  113. 01 - Input validation.srt 5.2 KB
  114. 02 - Parameterized queries.mp4 7.0 MB
  115. 02 - Parameterized queries.srt 6.0 KB
  116. 03 - Authentication and session management issues.mp4 3.1 MB
  117. 03 - Authentication and session management issues.srt 3.5 KB
  118. 04 - Output encoding.mp4 6.6 MB
  119. 04 - Output encoding.srt 5.3 KB
  120. 05 - Error and exception handling.mp4 4.9 MB
  121. 05 - Error and exception handling.srt 5.8 KB
  122. 06 - Code signing.mp4 5.0 MB
  123. 06 - Code signing.srt 4.1 KB
  124. 07 - Database security.mp4 6.5 MB
  125. 07 - Database security.srt 7.3 KB
  126. 08 - Data de-identification.mp4 5.6 MB
  127. 08 - Data de-identification.srt 5.1 KB
  128. 09 - Data obfuscation.mp4 3.3 MB
  129. 09 - Data obfuscation.srt 4.1 KB
  130. 01 - Software testing.mp4 4.7 MB
  131. 01 - Software testing.srt 4.9 KB
  132. 02 - Code security tests.mp4 3.6 MB
  133. 02 - Code security tests.srt 4.2 KB
  134. 03 - Fuzzing.mp4 16.1 MB
  135. 03 - Fuzzing.srt 12.9 KB
  136. 04 - Reverse engineering software.mp4 7.1 MB
  137. 04 - Reverse engineering software.srt 7.2 KB
  138. 05 - Reverse engineering hardware.mp4 6.4 MB
  139. 05 - Reverse engineering hardware.srt 5.2 KB
  140. 01 - Threat research.mp4 3.6 MB
  141. 01 - Threat research.srt 2.8 KB
  142. 02 - Identify threats.mp4 3.9 MB
  143. 02 - Identify threats.srt 4.2 KB
  144. 03 - Understand attacks.mp4 8.0 MB
  145. 03 - Understand attacks.srt 9.0 KB
  146. 04 - Threat modeling.mp4 7.1 MB
  147. 04 - Threat modeling.srt 6.0 KB
  148. 05 - Attack surface management.mp4 2.1 MB
  149. 05 - Attack surface management.srt 2.4 KB
  150. 06 - Bug bounty.mp4 8.7 MB
  151. 06 - Bug bounty.srt 6.7 KB
  152. 01 - Align security with the business.mp4 5.9 MB
  153. 01 - Align security with the business.srt 5.5 KB
  154. 02 - Organizational processes.mp4 5.4 MB
  155. 02 - Organizational processes.srt 5.7 KB
  156. 03 - Security roles and responsibilities.mp4 4.2 MB
  157. 03 - Security roles and responsibilities.srt 4.3 KB
  158. 04 - Security control selection.mp4 8.3 MB
  159. 04 - Security control selection.srt 9.0 KB
  160. 01 - Risk assessment.mp4 7.8 MB
  161. 01 - Risk assessment.srt 8.5 KB
  162. 02 - Quantitative risk assessment.mp4 10.2 MB
  163. 02 - Quantitative risk assessment.srt 10.7 KB
  164. 03 - Risk treatment options.mp4 9.1 MB
  165. 03 - Risk treatment options.srt 7.4 KB
  166. 04 - Risk management frameworks.mp4 6.8 MB
  167. 04 - Risk management frameworks.srt 5.5 KB
  168. 05 - Risk visibility and reporting.mp4 12.1 MB
  169. 05 - Risk visibility and reporting.srt 8.2 KB
  170. 01 - Continue your studies.mp4 2.2 MB
  171. 01 - Continue your studies.srt 1.1 KB
  172. Bonus Resources.txt 386 bytes

Discussion