Общая информация
Название CBT Nuggets - CompTIA CySA+ (CS0-001) [AhLaN]
Тип
Размер 1.59Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
01 - 1.0 Threat Management_ Vocabulary Related to Threats and Attacks.mp4 22.46Мб
02 - 1.0 Threat Management_ Attack Categories, Types, and Vectors.mp4 17.16Мб
03 - 1.0 Threat Management_ Reconnaissance and Footprinting Overview.mp4 27.52Мб
04 - 1.0 Threat Management_ Using DNS for Reconnaissance.mp4 25.60Мб
05 - 1.0 Threat Management_ Direct Network Scanning Overview.mp4 15.30Мб
06 - 1.0 Threat Management_ Direct Network Scanning Methodology .mp4 26.29Мб
07 - 1.0 Threat Management_ Port Discovery Overview.mp4 25.34Мб
08 - 1.0 Threat Management_ OS and App Fingerprinting.mp4 24.24Мб
09 - 1.0 Threat Management_ Using NMAP for Host, Port, and OS Discovery_ VLab.mp4 77.10Мб
10 - 1.0 Threat Management_ Vulnerability Scanning Tools.mp4 20.82Мб
11 - 1. Threat Management_ Vulnerability Scan Scenario.mp4 13.79Мб
12 - 1. Threat Management_ Network Mapping.mp4 11.89Мб
13 - 1. Threat Management_ Understanding System Hacking.mp4 26.49Мб
14 - 1. Threat Management_ Honeypot Overview.mp4 23.89Мб
15 - 1. Threat Management_ Using a Network Scanner To See a Honeypot.mp4 30.75Мб
16 - 1. Threat Management_ Social Engineering Overview.mp4 15.65Мб
17 - 1. Threat Management_ Phases and Methods of Social Engineering.mp4 15.81Мб
18 - 1. Threat Management_ Phishing Overview.mp4 24.10Мб
19 - 1. Threat Management_ Defending Against Phishing.mp4 24.43Мб
20 - 1. Threat Management_ Packet Capture and Analysis Overview.mp4 19.21Мб
21 - 1. Threat Management_ Practicing Packet Capture and Protocol Analysis_ VLab.mp4 43.07Мб
22 - 1. Threat Management_ Logging Overview.mp4 27.75Мб
23 - 1. Threat Management_ Firewall_Router ACL Review.mp4 25.40Мб
24 - 1. Threat Management_ Trend Awareness.mp4 28.32Мб
25 - 1. Threat Management_ Hardening and Other Best Practices.mp4 21.93Мб
26 - 1. Threat Management_ Whitelisting and Access Control.mp4 16.39Мб
27 - 1. Threat Management_ Evaluating Risk.mp4 19.09Мб
28 - 1. Threat Management_ Network Access Control (NAC).mp4 25.17Мб
29 - 1. Threat Management_ Uncovering Vulnerabilities.mp4 24.75Мб
30 - 2. Vulnerability Management_ Motivators for Vulnerability Management.mp4 18.64Мб
31 - 2. Vulnerability Management_ SCAP Overview.mp4 16.99Мб
32 - 2. Vulnerability Management_ What to Ask When Doing Focused Vulnerability Scanning.mp4 26.22Мб
33 - 2. Vulnerability Management_ Remediation Considerations.mp4 24.08Мб
34 - 2. Vulnerability Management_ Review and Interpret Output_ Web Server Version.mp4 22.00Мб
35 - 2. Vulnerability Management_ Analyzing Vulnerability Scan Output_ Enumeration of Shares.mp4 20.52Мб
36 - 2. Vulnerability Management_ Vulnerabilities in Servers.mp4 32.12Мб
37 - 2. Vulnerability Management_ Vulnerabilities in Endpoints.mp4 23.65Мб
38 - 2. Vulnerability Management_ Vulnerabilities in Infrastructure Devices.mp4 22.97Мб
39 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Weak Policy.mp4 23.70Мб
40 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Traveling.mp4 22.75Мб
41 - 2. Vulnerability Management_ Vulnerabilities in Mobile Devices_ Remote Wipe.mp4 19.22Мб
42 - 2. Vulnerability Management_ Vulnerabilities Regarding Interconnected Networks.mp4 18.95Мб
43 - 2. Vulnerability Management_ Physical and Virtual Device Vulnerabilities.mp4 25.10Мб
44 - 2. Vulnerability Management_ Using ACLs and VPNs to Reduce Vulnerabilities.mp4 18.27Мб
45 - 3. Cyber Incident Response_ Threat Classification.mp4 22.50Мб
46 - 3. Cyber Incident Response_ Factors Contributing to Incident Severity and Prioritization.mp4 21.66Мб
47 - 3. Cyber Incident Response_ Building a Forensic Tool Kit.mp4 24.91Мб
48 - 3. Cyber Incident Response_ Tool Categories in a Forensic Investigation Suite.mp4 19.87Мб
49 - 3. Cyber Incident Response_ Communication During an Incident Response.mp4 32.77Мб
50 - 3. Cyber Incident Response_ Abnormal Traffic Patterns that May Indicate a Cyber Incident.mp4 22.50Мб
51 - 3. Cyber Incident Response_ Network Scans as a Symptom of a Cyber Incident.mp4 15.39Мб
52 - 3. Cyber Incident Response_ Host-Related Cybersecurity Symptoms.mp4 25.97Мб
53 - 3. Cyber Incident Response_ Application-Related Cyber Incident Symptoms.mp4 12.57Мб
54 - 3. Cyber Incident Response_ Containment and Eradication Techniques.mp4 28.94Мб
55 - 3. Cyber Incident Response_ Validation of Post-Incident Remediation .mp4 19.86Мб
56 - 3. Cyber Incident Response_ Corrective Actions, Updates, and Reports.mp4 11.88Мб
57 - 4.0 Security Architecture_ Security Frameworks for IT.mp4 17.33Мб
58 - 4.0 Security Architecture_ Regulatory Compliance and Control Types.mp4 23.12Мб
59 - 4.0 Security Architecture_ Verification and Validation of Controls.mp4 14.44Мб
60 - 4.0 Security Architecture_ Having Policies to Improve Security.mp4 15.13Мб
61 - 4.0 Security Architecture_ Having Procedures to Improve Security.mp4 15.13Мб
62 - 4.0 Security Architecture_ Identity Context and Repositories .mp4 25.17Мб
63 - 4.0 Security Architecture_ SSO and Federations.mp4 20.92Мб
64 - 4.0 Security Architecture_ Exploits Related to Identity and Access.mp4 23.26Мб
65 - 4.0 Security Architecture_ Recommending Compensating Controls.mp4 24.91Мб
66 - 4.0 Security Architecture_ Best Practices During Software Development.mp4 23.63Мб
67 - 4.0 Security Architecture_ Secure Coding Best Practices.mp4 23.40Мб
68 - 4.0 Security Architecture_ Identifying Preventive Tools and Technologies.mp4 24.26Мб
69 - 4.0 Security Architecture_ Selecting and Applying Appropriate Preventive Tools.mp4 23.37Мб
70 - 4.0 Security Architecture_ Tools and Technologies for Information Collection.mp4 17.85Мб
71 - 4.0 Security Architecture_ Tools and Tech for Analysis, Exploits, and Forensics.mp4 19.32Мб
AhLaN.txt 961б
Seed Me!!.png 42.05Кб
Статистика распространения по странам
Ямайка (JM) 2
США (US) 2
Южная Корея (KR) 1
Гайана (GY) 1
Польша (PL) 1
Филиппины (PH) 1
Франция (FR) 1
Всего 9
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент