:Search:

Vulnerability Management

Torrent:
Info Hash: 4BAE499581D8144E6DC7DABAB0B7111B96E54B5A
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Language: English
Category: Other
Size: 1.7 GB
Added: Sept. 26, 2025, 5:50 a.m.
Peers: Seeders: 0, Leechers: 7 (Last updated: 6 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce 0 3 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 0 3 0
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 - Introduction.mp4 30.7 MB
  3. 2 - What is Vulnerability Management.mp4 33.8 MB
  4. 3 - Vulnerability Management Lifecycle.mp4 7.3 MB
  5. 4 - Importance of Vulnerability Management.mp4 15.4 MB
  6. 41 - Establishing Vulnerability Management Program.mp4 26.7 MB
  7. 42 - Vulnerability Management Alignment with Business.mp4 40.8 MB
  8. 43 - Regulations Standards.mp4 31.2 MB
  9. 44 - Conclusion.mp4 6.2 MB
  10. 5 - Types of Vulnerabilities.mp4 62.3 MB
  11. 6 - CVSS Introduction.mp4 17.4 MB
  12. 7 - CVSS Calculation.mp4 92.0 MB
  13. 8 - Vulnerability Databases.mp4 18.1 MB
  14. 10 - Vulnerability Scanner Types Working.mp4 50.0 MB
  15. 11 - Performing Vulnerability Scans.mp4 14.6 MB
  16. 12 - Vulnerability Scanning Architecture.mp4 28.2 MB
  17. 9 - Vulnerability Scanner Overview.mp4 32.6 MB
  18. 13 - Nessus Overview.mp4 59.6 MB
  19. 14 - Nessus Setup.mp4 44.0 MB
  20. 15 - Running First Vulnerability Scan.mp4 65.8 MB
  21. 16 - Vulnerability Results Review.mp4 173.5 MB
  22. 17 - Vulnerability Prioritization.mp4 26.8 MB
  23. 18 - False Positives False Negatives in Vulnerabilities.mp4 30.3 MB
  24. 19 - Interpret Scan Results Reports.mp4 50.9 MB
  25. 20 - Vulnerability Reporting Considerations.mp4 41.0 MB
  26. 21 - Active Directory Scanning.mp4 8.6 MB
  27. 22 - Linux Compliance Scanning.mp4 28.2 MB
  28. 23 - Windows Compliance Scanning.mp4 9.9 MB
  29. 24 - Active Directory Weak Password Assessment.mp4 48.8 MB
  30. 25 - Fortigate Compliance Scanning.mp4 31.4 MB
  31. 26 - Manual Scanning Overview.mp4 45.2 MB
  32. 27 - Scanning with Nikto.mp4 95.4 MB
  33. 28 - Scanning with ZAP.mp4 84.9 MB
  34. 29 - Vulnerability Remediation Overview.mp4 25.8 MB
  35. 30 - Vulnerability Remediation Techniques.mp4 29.4 MB
  36. 31 - Vulnerability Remediation vs Mitigation.mp4 35.7 MB
  37. 32 - Vulnerability Patching Demo.mp4 17.3 MB
  38. 33 - Vulnerability Remediation Verification.mp4 14.7 MB
  39. 34 - Auto Remediation.mp4 28.7 MB
  40. 35 - Cloud Vulnerability Management.mp4 48.2 MB
  41. 36 - Cloud Vulnerability Management Best Practices.mp4 20.1 MB
  42. 37 - AI in Vulnerability Management.mp4 10.9 MB
  43. 38 - Demo Qualys Setup.mp4 103.0 MB
  44. 39 - Demo Qualys Scanning.mp4 25.9 MB
  45. 40 - Demo Qualys Option Profiles.mp4 25.8 MB
  46. Bonus Resources.txt 70 bytes

Discussion