Общая информация
Название [Tutorialsplanet.NET] Udemy - CompTIA CySA+ (CS0-001) Complete Course and Practice Exam
Тип
Размер 3.60Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[Tutorialsplanet.NET].url 128б
1.1 67 - Domain 3 - Cyber Incident Response.pdf.pdf 1.39Мб
1.1 CompTIA CySA+ (Study Notes).pdf.pdf 7.01Мб
1.1 Domain 1 - Threat Management.pdf.pdf 60.03Мб
1.1 Domain 2 - Vulnerability Management.pdf.pdf 164.64Мб
1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf 85.15Мб
1.2 40 - Domain 2 - Vulnerability Management.pdf.pdf 1.39Мб
1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf 498.48Кб
1.2 Domain 3 - Cyber Incident Response.pdf.pdf 62.00Мб
1. Domain 1 Threat Management.mp4 4.80Мб
1. Domain 1 Threat Management.vtt 2.28Кб
1. Domain 2 Vulnerability Management.mp4 10.17Мб
1. Domain 2 Vulnerability Management.vtt 5.73Кб
1. Domain 3 Cyber Incident Response.mp4 7.61Мб
1. Domain 3 Cyber Incident Response.vtt 3.46Кб
1. Domain 4 Security Architecture and Tool Sets.mp4 2.88Мб
1. Domain 4 Security Architecture and Tool Sets.vtt 1.47Кб
1. How to Schedule Your Exam.mp4 70.46Мб
1. How to Schedule Your Exam.vtt 7.12Кб
1. Simulations and Performance-Based Questions (PBQs).mp4 323.95Мб
1. Simulations and Performance-Based Questions (PBQs).vtt 38.42Кб
1. Welcome to the Course.mp4 15.01Мб
1. Welcome to the Course.vtt 8.40Кб
10.1 100 - Layered Network Design.pdf.pdf 2.23Мб
10.1 13 - Network Perimeter Security.pdf.pdf 3.14Мб
10.1 49 - Maintaining Scanners.pdf.pdf 1.87Мб
10.1 75 - Network Monitoring Tools.pdf.pdf 4.38Мб
10. Layered Network Defense.mp4 21.87Мб
10. Layered Network Defense.vtt 9.80Кб
10. Maintaining Scanners.mp4 9.15Мб
10. Maintaining Scanners.vtt 7.38Кб
10. Network Monitoring Tools.mp4 22.28Мб
10. Network Monitoring Tools.vtt 10.53Кб
10. Network Perimeter Security.mp4 35.87Мб
10. Network Perimeter Security.vtt 14.77Кб
11.1 101 - Layered Host Security.pdf.pdf 1.87Мб
11.1 14 - Network Segmentation.pdf.pdf 1.32Мб
11.1 50 - Standardizing Vulnerabilities.pdf.pdf 3.17Мб
11.1 76 - Detecting Network Events.pdf.pdf 2.04Мб
11. Detecting Network Events.mp4 27.07Мб
11. Detecting Network Events.vtt 12.92Кб
11. Layered Host Security.mp4 14.59Мб
11. Layered Host Security.vtt 6.77Кб
11. Network Segmentation.mp4 11.51Мб
11. Network Segmentation.vtt 5.33Кб
11. Standardizing Vulnerabilities.mp4 9.06Мб
11. Standardizing Vulnerabilities.vtt 6.65Кб
12.1 102 - Data Analytics.pdf.pdf 1.92Мб
12.1 15 - Network Access Control.pdf.pdf 1.77Мб
12.1 51 - Workflow for Remediation.pdf.pdf 1.41Мб
12.1 77 - Network Probes and Attacks.pdf.pdf 2.76Мб
12. Data Analytics.mp4 18.85Мб
12. Data Analytics.vtt 8.97Кб
12. Network Access Control.mp4 26.94Мб
12. Network Access Control.vtt 12.50Кб
12. Network Probes and Attacks.mp4 25.43Мб
12. Network Probes and Attacks.vtt 13.75Кб
12. Workflow for Remediation.mp4 11.88Мб
12. Workflow for Remediation.vtt 6.17Кб
13.1 103 - Personnel Security.pdf.pdf 3.73Мб
13.1 16 - Defense Deception Methods.pdf.pdf 1.48Мб
13.1 52 - Vulnerability Reporting.pdf.pdf 2.75Мб
13.1 78 - Server and Host Events.pdf.pdf 2.52Мб
13. Defense Deception Methods.mp4 16.01Мб
13. Defense Deception Methods.vtt 7.60Кб
13. Personnel Security.mp4 27.37Мб
13. Personnel Security.vtt 13.05Кб
13. Server and Host Events.mp4 22.79Мб
13. Server and Host Events.vtt 11.28Кб
13. Vulnerability Reporting.mp4 18.72Мб
13. Vulnerability Reporting.vtt 8.82Кб
14.1 104 - Outsourcing Concerns.pdf.pdf 1.69Мб
14.1 17 - Secure Endpoint Management.pdf.pdf 2.30Мб
14.1 53 - Remediation Reporting.pdf.pdf 2.03Мб
14.1 79 - Service and Application Events.pdf.pdf 2.86Мб
14. Outsourcing Concerns.mp4 13.93Мб
14. Outsourcing Concerns.vtt 7.30Кб
14. Remediation Priority.mp4 18.97Мб
14. Remediation Priority.vtt 8.57Кб
14. Secure Endpoint Management.mp4 32.66Мб
14. Secure Endpoint Management.vtt 15.03Кб
14. Service and Application Events.mp4 23.04Мб
14. Service and Application Events.vtt 11.35Кб
15.1 105 - User Awareness Training.pdf.pdf 1.14Мб
15.1 18 - Penetration Testing.pdf.pdf 2.32Мб
15.1 54 - Implementing and Testing.pdf.pdf 1.69Мб
15. Implementing and Testing.mp4 23.68Мб
15. Implementing and Testing.vtt 12.45Кб
15. Penetration Testing.mp4 34.70Мб
15. Penetration Testing.vtt 16.26Кб
15. Quiz Symptoms of Cyber Attacks.html 121б
15. User Awareness Training.mp4 10.22Мб
15. User Awareness Training.vtt 8.78Кб
16.1 106 - Analyzing Secure Architectures.pdf.pdf 2.73Мб
16.1 19 - Security Exercises and Training.pdf.pdf 1.39Мб
16.1 55 - Nessus-Scan-Report-Example.pdf.pdf 1.12Мб
16.1 80 - Digital Forensics.pdf.pdf 1.42Мб
16. Analyzing Secure Architectures.mp4 43.19Мб
16. Analyzing Secure Architectures.vtt 18.25Кб
16. Digital Forensics.mp4 11.50Мб
16. Digital Forensics.vtt 6.28Кб
16. Nessus Vulnerability Scanner A Walkthrough.mp4 16.74Мб
16. Nessus Vulnerability Scanner A Walkthrough.vtt 18.12Кб
16. Security Exercises and Training.mp4 13.41Мб
16. Security Exercises and Training.vtt 6.55Кб
17.1 20 - Reverse Engineering.pdf.pdf 1.39Мб
17.1 81 - Forensic Toolkit Components.pdf.pdf 6.02Мб
17. Forensic Toolkit Components.mp4 36.22Мб
17. Forensic Toolkit Components.vtt 18.67Кб
17. Quiz Defense in Depth.html 121б
17. Quiz Vulnerability Management Program.html 121б
17. Reverse Engineering.mp4 27.88Мб
17. Reverse Engineering.vtt 13.40Кб
18.1 107 - What is Identity.pdf.pdf 2.60Мб
18.1 56 - Interpreting Scan Results.pdf.pdf 4.43Мб
18.1 82 - Mobile Forensic Toolkits.pdf.pdf 2.18Мб
18. Interpreting Scan Results.mp4 36.35Мб
18. Interpreting Scan Results.vtt 18.12Кб
18. Mobile Forensic Toolkits.mp4 12.25Мб
18. Mobile Forensic Toolkits.vtt 7.17Кб
18. Quiz Defense Against Cyber Threats.html 121б
18. What Is Identity.mp4 22.05Мб
18. What Is Identity.vtt 10.75Кб
19.1 108 - Identity Systems.pdf.pdf 3.89Мб
19.1 21 - Reconnaissance and Intelligence.pdf.pdf 499.20Кб
19.1 57 - Interpeting CVSS.pdf.pdf 3.27Мб
19.1 83 - Forensic Software.pdf.pdf 3.06Мб
19. Forensic Software.mp4 29.66Мб
19. Forensic Software.vtt 14.84Кб
19. Identity Systems.mp4 50.49Мб
19. Identity Systems.vtt 24.85Кб
19. Interpreting CVSS.mp4 27.48Мб
19. Interpreting CVSS.vtt 13.17Кб
19. Reconnaissance and Intelligence.mp4 5.56Мб
19. Reconnaissance and Intelligence.vtt 2.42Кб
2.1 02 - Exam Foundations.pdf.pdf 1.83Мб
2.1 05 - CIA Triad.pdf.pdf 2.80Мб
2.1 41 - Regulatory Requirements.pdf.pdf 2.09Мб
2.1 68 - Security Incidents.pdf.pdf 1.82Мб
2.1 93 - Policy Documents.pdf.pdf 3.27Мб
2.1 CompTIA CySA+ Course (Conclusion).pdf.pdf 2.26Мб
2. CIA Triad.mp4 36.25Мб
2. CIA Triad.vtt 16.72Кб
2. CompTIA CSA+ Practice Certification Exam.html 121б
2. Conclusion.mp4 8.44Мб
2. Conclusion.vtt 4.42Кб
2. Exam Foundations.mp4 18.77Мб
2. Exam Foundations.vtt 7.83Кб
2. Policy Documents.mp4 29.69Мб
2. Policy Documents.vtt 16.58Кб
2. Regulatory Requirements.mp4 19.54Мб
2. Regulatory Requirements.vtt 15.46Кб
2. Security Incidents.mp4 15.93Мб
2. Security Incidents.vtt 9.00Кб
20.1 109 - Threats to Identity Systems.pdf.pdf 1.70Мб
20.1 22 - Footprinting the Network.pdf.pdf 808.03Кб
20.1 58 - Calculating the CVSS Score.pdf.pdf 2.10Мб
20.1 84 - Training and Certification.pdf.pdf 819.90Кб
20. Calculating the CVSS Score.mp4 17.65Мб
20. Calculating the CVSS Score.vtt 7.52Кб
20. Footprinting the Network.mp4 13.42Мб
20. Footprinting the Network.vtt 6.10Кб
20. Threats to Identity Systems.mp4 14.19Мб
20. Threats to Identity Systems.vtt 7.55Кб
20. Training and Certification.mp4 10.25Мб
20. Training and Certification.vtt 5.29Кб
21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf 2.74Мб
21.1 23 - Network Mapping.pdf.pdf 1.14Мб
21.1 59 - CVSS Temporal Score.pdf.pdf 2.59Мб
21.1 85 - Forensic Investigation Process.pdf.pdf 1.33Мб
21. Attacking AAA Protocols and Systems.mp4 40.68Мб
21. Attacking AAA Protocols and Systems.vtt 20.42Кб
21. CVSS Temporal Score.mp4 16.13Мб
21. CVSS Temporal Score.vtt 7.53Кб
21. Forensic Investigation Process.mp4 21.89Мб
21. Forensic Investigation Process.vtt 12.03Кб
21. Network Mapping.mp4 17.52Мб
21. Network Mapping.vtt 7.81Кб
22.1 111 - Targeting Account Lifecycle.pdf.pdf 1.47Мб
22.1 24 - Port Scanning.pdf.pdf 1.78Мб
22.1 60 - Validation of Results.pdf.pdf 2.51Мб
22.1 86 - Disk Imaging.pdf.pdf 2.62Мб
22. Disk Imaging.mp4 21.07Мб
22. Disk Imaging.vtt 11.00Кб
22. Port Scanning.mp4 24.37Мб
22. Port Scanning.vtt 10.80Кб
22. Targeting Account Lifecycle.mp4 14.95Мб
22. Targeting Account Lifecycle.vtt 14.96Мб
22. Validation of Results.mp4 28.81Мб
22. Validation of Results.vtt 14.71Кб
23.1 112 - Identity Exploits.pdf.pdf 1.85Мб
23.1 25 - Other Port Scanners.pdf.pdf 808.19Кб
23.1 61 - Common Vulnerabilities.pdf.pdf 1.16Мб
23. Common Vulnerabilities.mp4 12.30Мб
23. Common Vulnerabilities.vtt 5.53Кб
23. Disk Imaging Using dd.mp4 8.14Мб
23. Disk Imaging Using dd.vtt 5.30Кб
23. Identity Exploits.mp4 13.48Мб
23. Identity Exploits.vtt 6.17Кб
23. Other Port Scanners.mp4 9.40Мб
23. Other Port Scanners.vtt 3.95Кб
24.1 113 - Credential Theft.pdf.pdf 2.31Мб
24.1 62 - Server and Host Vulnerabilities.pdf.pdf 4.11Мб
24. Credential Theft.mp4 15.44Мб
24. Credential Theft.vtt 7.43Кб
24. Disk Imaging Using FTK Imager.mp4 17.80Мб
24. Disk Imaging Using FTK Imager.vtt 11.00Кб
24. NMAP - Demonstration of the world's most popular port scanning tool.mp4 9.93Мб
24. NMAP - Demonstration of the world's most popular port scanning tool.vtt 11.25Кб
24. Server and Host Vulnerabilities.mp4 18.53Мб
24. Server and Host Vulnerabilities.vtt 14.04Кб
25.1 114 - Securing Authentication and Authorization.pdf.pdf 2.13Мб
25.1 27 - Passive Reconnaissance.pdf.pdf 806.22Кб
25.1 63 - Network Vulnerabilities.pdf.pdf 4.40Мб
25. Network Vulnerabilities.mp4 17.23Мб
25. Network Vulnerabilities.vtt 12.07Кб
25. Passive Reconnaissance.mp4 12.27Мб
25. Passive Reconnaissance.vtt 5.77Кб
25. Quiz Digital Forensics.html 121б
25. Securing Authentication and Authorization System.mp4 26.71Мб
25. Securing Authentication and Authorization System.vtt 13.13Кб
26.1 115 - Identity as a Service (IDaaS).pdf.pdf 1.09Мб
26.1 28 - Passive Recon - Network Devices.pdf.pdf 3.31Мб
26.1 64 - Virtualization Vulnerabilities.pdf.pdf 2.36Мб
26.1 89 - Incident Containment.pdf.pdf 2.56Мб
26. Identity as a Service (IDaaS).mp4 9.70Мб
26. Identity as a Service (IDaaS).vtt 4.67Кб
26. Incident Containment.mp4 30.61Мб
26. Incident Containment.vtt 14.92Кб
26. Passive Recon - Network Devices.mp4 38.07Мб
26. Passive Recon - Network Devices.vtt 16.42Кб
26. Virtualization Vulnerabilities.mp4 12.71Мб
26. Virtualization Vulnerabilities.vtt 9.30Кб
27.1 116 - Detecting Identity Attacks.pdf.pdf 807.09Кб
27.1 29 - Passive Recon - Netstat.pdf.pdf 1.99Мб
27.1 65 - Web Application Vulnerabilities.pdf.pdf 2.31Мб
27.1 90 - Eradication and Recovery.pdf.pdf 2.76Мб
27. Detecting Identity Attacks.mp4 7.08Мб
27. Detecting Identity Attacks.vtt 3.37Кб
27. Eradication and Recovery.mp4 28.99Мб
27. Eradication and Recovery.vtt 15.55Кб
27. Passive Recon - Netstat.mp4 22.18Мб
27. Passive Recon - Netstat.vtt 9.38Кб
27. Web Application Vulnerabilities.mp4 25.01Мб
27. Web Application Vulnerabilities.vtt 11.02Кб
28.1 117 - Federated Identity Systems.pdf.pdf 3.59Мб
28.1 30 - DHCP Logs and Configs.pdf.pdf 1.47Мб
28.1 66 - Internet of Things (IoT) Vulnerabilities.pdf.pdf 1.58Мб
28.1 91 - Finishing the Response.pdf.pdf 1.69Мб
28. DHCP Logs and Configs.mp4 14.77Мб
28. DHCP Logs and Configs.vtt 5.85Кб
28. Federated Identity Systems.mp4 46.82Мб
28. Federated Identity Systems.vtt 23.25Кб
28. Finishing the Response.mp4 22.55Мб
28. Finishing the Response.vtt 11.56Кб
28. Internet of Things (IoT) Vulnerabilities.mp4 16.43Мб
28. Internet of Things (IoT) Vulnerabilities.vtt 7.41Кб
29.1 Example Firewall Logs from CISCO.html 147б
29.2 31 - Firewall Logs and Configs.pdf.pdf 1.46Мб
29. Firewall Logs and Configs.mp4 17.63Мб
29. Firewall Logs and Configs.vtt 7.19Кб
29. Quiz Analyzing Vulnerability Reports.html 121б
29. Quiz Identity and Access Management.html 121б
29. Quiz Incident Containment and Eradication.html 121б
3.1 06 - Risk Considerations.pdf.pdf 2.94Мб
3.10 CompTIA Security+ (SY0-501) Complete Course & Practice Exam.html 116б
3.11 ITIL Foundation Complete ITIL Exam Preparation Course.html 119б
3.12 CompTIA Security+ (SY0-501) 5 Practice Exams & Simulations!.html 135б
3.13 PRINCE2 Foundation Practice Certification Exams (6 Exams).html 122б
3.1 42 - Corporate Requirements.pdf.pdf 4.23Мб
3.14 ITIL Foundation Cram to Pass the ITIL Exam in 7 Days!.html 127б
3.15 #UNOFFICIAL# Certified Ethical Hacker (CEH) Practice Exams.html 117б
3.1 69 - Incident Response Teams.pdf.pdf 1.99Мб
3.16 Risk Management for Cybersecurity and IT Managers.html 137б
3.17 PRINCE2 Agile Foundation (Get certified in the next 7 days!).html 128б
3.18 CompTIA Network+ (N10-007) 5 Practice Exams & Simulations.html 121б
3.1 94 - Standard Frameworks.pdf.pdf 3.74Мб
3.19 ITIL Foundation Practice Certification Exams (6 Exams).html 123б
3.1 CompTIA CySA+ (CS0-001) 5 Practice Certification Exams.html 114б
3.20 How to Pass Certification Exams with Strategic Test Taking!.html 118б
3.21 Introduction to Cloud Security with Microsoft Azure.html 117б
3.2 CompTIA Network+ Cert (N10-007) Full Course & Practice Exam.html 115б
3.3 Introduction to Malware Analysis for Incident Responders.html 120б
3.4 CompTIA CySA+ (CS0-001) Complete Course and Practice Exam.html 118б
3.5 PRINCE2 Foundation Cram to Pass the PRINCE2 Exam in 7 Days!.html 116б
3.6 WiFi Hacking Wireless Penetration Testing for Beginners.html 119б
3.7 CompTIA Pentest+ (PT0-001) Complete Course & Practice Exam.html 115б
3.8 Anatomy of a Cyber Attack Beginner Hacking with Metasploit.html 124б
3.9 Udemy Coupon Codes (Graduate).pdf.pdf 2.76Мб
3. A Special Message From Jason Dion.mp4 38.39Мб
3. A Special Message From Jason Dion.vtt 4.07Кб
3. BONUS A Special Thank You Message From Jason.mp4 11.32Мб
3. BONUS A Special Thank You Message From Jason.vtt 1.74Кб
3. Corporate Requirements.mp4 20.41Мб
3. Corporate Requirements.vtt 15.16Кб
3. Incident Response Teams.mp4 36.25Мб
3. Incident Response Teams.vtt 19.99Кб
3. Risk Consideration.mp4 25.14Мб
3. Risk Consideration.vtt 11.70Кб
3. Standard Frameworks.mp4 34.46Мб
3. Standard Frameworks.vtt 16.96Кб
30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf 6.76Мб
30.1 32 - System and Host Log Files.pdf.pdf 1.09Мб
30. Software Development Life Cycle (SDLC).mp4 36.79Мб
30. Software Development Life Cycle (SDLC).vtt 18.96Кб
30. System and Host Log Files.mp4 11.78Мб
30. System and Host Log Files.vtt 5.16Кб
31.1 119 - Software Development Models.pdf.pdf 3.68Мб
31.1 33 - DNS Harvesting.pdf.pdf 1.92Мб
31. DNS Harvesting.mp4 16.42Мб
31. DNS Harvesting.vtt 6.16Кб
31. Software Development Models.mp4 48.88Мб
31. Software Development Models.vtt 25.64Кб
32.1 120 - Coding for Security.pdf.pdf 2.19Мб
32.1 34 - Domain Names and IP Ranges.pdf.pdf 807.90Кб
32. Coding for Security.mp4 31.96Мб
32. Coding for Security.vtt 16.78Кб
32. Domain Names and IP Ranges.mp4 12.01Мб
32. Domain Names and IP Ranges.vtt 5.22Кб
33.1 121 - Testing Application Code.pdf.pdf 3.49Мб
33.1 35 - DNS Zone Transfers.pdf.pdf 1.09Мб
33. DNS Zone Transfers.mp4 15.88Мб
33. DNS Zone Transfers.vtt 6.97Кб
33. Testing Application Security.mp4 26.29Мб
33. Testing Application Security.vtt 12.58Кб
34.1 122 - Finding Security Flaws.pdf.pdf 3.63Мб
34.1 36 - Whois and Host Commands.pdf.pdf 1.56Мб
34. Finding Security Flaws.mp4 30.25Мб
34. Finding Security Flaws.vtt 14.66Кб
34. Whois and Host Commands.mp4 14.15Мб
34. Whois and Host Commands.vtt 6.31Кб
35.1 123 - Web Application Vulnerability Scanning.pdf.pdf 3.10Мб
35.1 37 - Information Gathering and Aggregation.pdf.pdf 1.97Мб
35. Information Gathering and Aggregation.mp4 19.39Мб
35. Information Gathering and Aggregation.vtt 8.70Кб
35. Web Application Vulnerability Scanners.mp4 26.29Мб
35. Web Application Vulnerability Scanners.vtt 12.66Кб
36.1 38 - Organizational Intelligence.pdf.pdf 2.44Мб
36. Organizational Intelligence.mp4 34.28Мб
36. Organizational Intelligence.vtt 17.00Кб
36. Quiz Software Development and SDLC.html 121б
37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf 2.00Мб
37. Detecting, Preventing, and Responding to Reconnaissance.mp4 29.64Мб
37. Detecting, Preventing, and Responding to Reconnaissance.vtt 15.06Кб
38. Quiz Reconnaissance and Intelligence Gathering.html 121б
4.1 07 - Risk Assessment.pdf.pdf 1.44Мб
4.1 43 - Scanning Tools.pdf.pdf 4.59Мб
4.1 70 - Incident Response Phases.pdf.pdf 5.79Мб
4.1 95 - Policy-Based Controls.pdf.pdf 2.56Мб
4. Incident Response Phases.mp4 49.88Мб
4. Incident Response Phases.vtt 24.08Кб
4. Policy-based Controls.mp4 16.09Мб
4. Policy-based Controls.vtt 7.52Кб
4. Risk Assessment.mp4 15.50Мб
4. Risk Assessment.vtt 6.83Кб
4. Scanning Tools.mp4 10.40Мб
4. Scanning Tools.vtt 7.73Кб
5.1 08 - Identify Threats.pdf.pdf 2.83Мб
5.1 44 - Scoping Scans.pdf.pdf 1.37Мб
5.1 71 - Incident Response Policy & Procedures.pdf.pdf 1.90Мб
5.1 96 - Audits and Assessments.pdf.pdf 1.14Мб
5. Audits and Assessments.mp4 10.10Мб
5. Audits and Assessments.vtt 4.99Кб
5. Identify Threats.mp4 29.40Мб
5. Identify Threats.vtt 13.64Кб
5. Incident Response Policy and Procedures.mp4 20.79Мб
5. Incident Response Policy and Procedures.vtt 10.94Кб
5. Scoping Scans.mp4 9.97Мб
5. Scoping Scans.vtt 7.43Кб
6.1 09 - Identify Vulnerabilities.pdf.pdf 1.62Мб
6.1 45 - Configuring Scans.pdf.pdf 498.62Кб
6.1 72 - Communication and Information Sharing.pdf.pdf 2.48Мб
6.1 97 - Laws and Regulations.pdf.pdf 4.82Мб
6. Communication and Info Sharing.mp4 18.84Мб
6. Communication and Info Sharing.vtt 11.09Кб
6. Configuring Scans.mp4 2.78Мб
6. Configuring Scans.vtt 1.19Кб
6. Identify Vulnerabilities.mp4 10.82Мб
6. Identify Vulnerabilities.vtt 4.79Кб
6. Laws and Regulations.mp4 24.36Мб
6. Laws and Regulations.vtt 11.18Кб
7.1 10 - Likelihood, Impact, and Risk.pdf.pdf 1.60Мб
7.1 46 - Scanning Sensitivity.pdf.pdf 2.22Мб
7.1 73 - Incident Classification.pdf.pdf 3.53Мб
7. Incident Classification.mp4 35.20Мб
7. Incident Classification.vtt 18.41Кб
7. Likelihood, Impact, and Risk.mp4 13.59Мб
7. Likelihood, Impact, and Risk.vtt 5.95Кб
7. Quiz Policies, Standards, Procedures, and Frameworks.html 121б
7. Scanning Sensitivity.mp4 16.18Мб
7. Scanning Sensitivity.vtt 7.16Кб
8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf 2.19Мб
8.1 47 - Scanning Perspective.pdf.pdf 1.46Мб
8.1 98 - Defense in Depth.pdf.pdf 3.47Мб
8. Defense in Depth.mp4 25.12Мб
8. Defense in Depth.vtt 11.54Кб
8. Qualitative and Quantitative Assessments.mp4 18.60Мб
8. Qualitative and Quantitative Assessments.vtt 11.03Кб
8. Quiz Cyber Incident Response Program.html 121б
8. Scanning Perspective.mp4 4.26Мб
8. Scanning Perspective.vtt 2.94Кб
9.1 12 - Revieiwing Controls.pdf.pdf 1.99Мб
9.1 48 - Authenticated Scanning.pdf.pdf 1.57Мб
9.1 74 - Network Event Monitoring.pdf.pdf 4.21Мб
9.1 99 - Types of Controls.pdf.pdf 3.48Мб
9. Authenticated Scanning.mp4 9.69Мб
9. Authenticated Scanning.vtt 8.42Кб
9. Network Event Monitoring.mp4 33.23Мб
9. Network Event Monitoring.vtt 16.43Кб
9. Reviewing Controls.mp4 31.74Мб
9. Reviewing Controls.vtt 15.09Кб
9. Types of Controls.mp4 21.79Мб
9. Types of Controls.vtt 10.38Кб
Статистика распространения по странам
Россия (RU) 2
Канада (CA) 2
Франция (FR) 2
Всего 6
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент