zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[FreeCourseLab.com] Udemy - CompTIA CySA+ (CS0-001) Complete Course and Practice Exam
magnet:?xt=urn:btih:be59a9dda63c4d04c3d528a9f41457960044df26&dn=[FreeCourseLab.com] Udemy - CompTIA CySA+ (CS0-001) Complete Course and Practice Exam
磁力链接详情
文件列表详情
be59a9dda63c4d04c3d528a9f41457960044df26
infohash:
127
文件数量
2.95 GB
文件大小
2022-9-17 00:42
创建日期
2025-1-20 18:53
最后访问
相关分词
FreeCourseLab
com
Udemy
-
CompTIA
CySA
CS0-001
Complete
Course
and
Practice
Exam
1. Welcome and Introduction/1. Welcome to the Course.mp4 15.01 MB
1. Welcome and Introduction/2. Exam Foundations.mp4 18.77 MB
1. Welcome and Introduction/3. A Special Message From Jason Dion.mp4 38.39 MB
2. Domain 1 Threat Management (27%)/1. Domain 1 Threat Management.mp4 4.8 MB
2. Domain 1 Threat Management (27%)/10. Network Perimeter Security.mp4 35.87 MB
2. Domain 1 Threat Management (27%)/11. Network Segmentation.mp4 11.51 MB
2. Domain 1 Threat Management (27%)/12. Network Access Control.mp4 26.94 MB
2. Domain 1 Threat Management (27%)/13. Defense Deception Methods.mp4 16.01 MB
2. Domain 1 Threat Management (27%)/14. Secure Endpoint Management.mp4 32.66 MB
2. Domain 1 Threat Management (27%)/15. Penetration Testing.mp4 34.7 MB
2. Domain 1 Threat Management (27%)/16. Security Exercises and Training.mp4 13.41 MB
2. Domain 1 Threat Management (27%)/17. Reverse Engineering.mp4 27.88 MB
2. Domain 1 Threat Management (27%)/19. Reconnaissance and Intelligence.mp4 5.56 MB
2. Domain 1 Threat Management (27%)/2. CIA Triad.mp4 36.25 MB
2. Domain 1 Threat Management (27%)/20. Footprinting the Network.mp4 13.42 MB
2. Domain 1 Threat Management (27%)/21. Network Mapping.mp4 17.52 MB
2. Domain 1 Threat Management (27%)/22. Port Scanning.mp4 24.37 MB
2. Domain 1 Threat Management (27%)/23. Other Port Scanners.mp4 9.4 MB
2. Domain 1 Threat Management (27%)/24. NMAP - Demonstration of the world's most popular port scanning tool.mp4 9.93 MB
2. Domain 1 Threat Management (27%)/25. Passive Reconnaissance.mp4 12.27 MB
2. Domain 1 Threat Management (27%)/26. Passive Recon - Network Devices.mp4 38.07 MB
2. Domain 1 Threat Management (27%)/27. Passive Recon - Netstat.mp4 22.18 MB
2. Domain 1 Threat Management (27%)/28. DHCP Logs and Configs.mp4 14.77 MB
2. Domain 1 Threat Management (27%)/29. Firewall Logs and Configs.mp4 17.63 MB
2. Domain 1 Threat Management (27%)/3. Risk Consideration.mp4 25.14 MB
2. Domain 1 Threat Management (27%)/30. System and Host Log Files.mp4 11.78 MB
2. Domain 1 Threat Management (27%)/31. DNS Harvesting.mp4 16.42 MB
2. Domain 1 Threat Management (27%)/32. Domain Names and IP Ranges.mp4 12.01 MB
2. Domain 1 Threat Management (27%)/33. DNS Zone Transfers.mp4 15.88 MB
2. Domain 1 Threat Management (27%)/34. Whois and Host Commands.mp4 14.15 MB
2. Domain 1 Threat Management (27%)/35. Information Gathering and Aggregation.mp4 19.39 MB
2. Domain 1 Threat Management (27%)/36. Organizational Intelligence.mp4 34.28 MB
2. Domain 1 Threat Management (27%)/37. Detecting, Preventing, and Responding to Reconnaissance.mp4 29.64 MB
2. Domain 1 Threat Management (27%)/4. Risk Assessment.mp4 15.5 MB
2. Domain 1 Threat Management (27%)/5. Identify Threats.mp4 29.4 MB
2. Domain 1 Threat Management (27%)/6. Identify Vulnerabilities.mp4 10.82 MB
2. Domain 1 Threat Management (27%)/7. Likelihood, Impact, and Risk.mp4 13.59 MB
2. Domain 1 Threat Management (27%)/8. Qualitative and Quantitative Assessments.mp4 18.6 MB
2. Domain 1 Threat Management (27%)/9. Reviewing Controls.mp4 31.74 MB
3. Domain 2 Vulnerability Management (26%)/1. Domain 2 Vulnerability Management.mp4 10.17 MB
3. Domain 2 Vulnerability Management (26%)/10. Maintaining Scanners.mp4 9.15 MB
3. Domain 2 Vulnerability Management (26%)/11. Standardizing Vulnerabilities.mp4 9.06 MB
3. Domain 2 Vulnerability Management (26%)/12. Workflow for Remediation.mp4 11.88 MB
3. Domain 2 Vulnerability Management (26%)/13. Vulnerability Reporting.mp4 18.72 MB
3. Domain 2 Vulnerability Management (26%)/14. Remediation Priority.mp4 18.97 MB
3. Domain 2 Vulnerability Management (26%)/15. Implementing and Testing.mp4 23.68 MB
3. Domain 2 Vulnerability Management (26%)/16. Nessus Vulnerability Scanner A Walkthrough.mp4 16.74 MB
3. Domain 2 Vulnerability Management (26%)/18. Interpreting Scan Results.mp4 36.35 MB
3. Domain 2 Vulnerability Management (26%)/19. Interpreting CVSS.mp4 27.48 MB
3. Domain 2 Vulnerability Management (26%)/2. Regulatory Requirements.mp4 19.54 MB
3. Domain 2 Vulnerability Management (26%)/20. Calculating the CVSS Score.mp4 17.65 MB
3. Domain 2 Vulnerability Management (26%)/21. CVSS Temporal Score.mp4 16.13 MB
3. Domain 2 Vulnerability Management (26%)/22. Validation of Results.mp4 28.81 MB
3. Domain 2 Vulnerability Management (26%)/23. Common Vulnerabilities.mp4 12.3 MB
3. Domain 2 Vulnerability Management (26%)/24. Server and Host Vulnerabilities.mp4 18.53 MB
3. Domain 2 Vulnerability Management (26%)/25. Network Vulnerabilities.mp4 17.23 MB
3. Domain 2 Vulnerability Management (26%)/26. Virtualization Vulnerabilities.mp4 12.71 MB
3. Domain 2 Vulnerability Management (26%)/27. Web Application Vulnerabilities.mp4 25.01 MB
3. Domain 2 Vulnerability Management (26%)/28. Internet of Things (IoT) Vulnerabilities.mp4 16.43 MB
3. Domain 2 Vulnerability Management (26%)/3. Corporate Requirements.mp4 20.41 MB
3. Domain 2 Vulnerability Management (26%)/4. Scanning Tools.mp4 10.4 MB
3. Domain 2 Vulnerability Management (26%)/5. Scoping Scans.mp4 9.97 MB
3. Domain 2 Vulnerability Management (26%)/6. Configuring Scans.mp4 2.78 MB
3. Domain 2 Vulnerability Management (26%)/7. Scanning Sensitivity.mp4 16.18 MB
3. Domain 2 Vulnerability Management (26%)/8. Scanning Perspective.mp4 4.26 MB
3. Domain 2 Vulnerability Management (26%)/9. Authenticated Scanning.mp4 9.69 MB
4. Domain 3 Cyber Incident Response (23%)/1. Domain 3 Cyber Incident Response.mp4 7.61 MB
4. Domain 3 Cyber Incident Response (23%)/10. Network Monitoring Tools.mp4 22.28 MB
4. Domain 3 Cyber Incident Response (23%)/11. Detecting Network Events.mp4 27.07 MB
4. Domain 3 Cyber Incident Response (23%)/12. Network Probes and Attacks.mp4 25.43 MB
4. Domain 3 Cyber Incident Response (23%)/13. Server and Host Events.mp4 22.79 MB
4. Domain 3 Cyber Incident Response (23%)/14. Service and Application Events.mp4 23.04 MB
4. Domain 3 Cyber Incident Response (23%)/16. Digital Forensics.mp4 11.5 MB
4. Domain 3 Cyber Incident Response (23%)/17. Forensic Toolkit Components.mp4 36.22 MB
4. Domain 3 Cyber Incident Response (23%)/18. Mobile Forensic Toolkits.mp4 12.25 MB
4. Domain 3 Cyber Incident Response (23%)/19. Forensic Software.mp4 29.66 MB
4. Domain 3 Cyber Incident Response (23%)/2. Security Incidents.mp4 15.93 MB
4. Domain 3 Cyber Incident Response (23%)/20. Training and Certification.mp4 10.25 MB
4. Domain 3 Cyber Incident Response (23%)/21. Forensic Investigation Process.mp4 21.89 MB
4. Domain 3 Cyber Incident Response (23%)/22. Disk Imaging.mp4 21.07 MB
4. Domain 3 Cyber Incident Response (23%)/23. Disk Imaging Using dd.mp4 8.14 MB
4. Domain 3 Cyber Incident Response (23%)/24. Disk Imaging Using FTK Imager.mp4 17.8 MB
4. Domain 3 Cyber Incident Response (23%)/26. Incident Containment.mp4 30.61 MB
4. Domain 3 Cyber Incident Response (23%)/27. Eradication and Recovery.mp4 28.99 MB
4. Domain 3 Cyber Incident Response (23%)/28. Finishing the Response.mp4 22.55 MB
4. Domain 3 Cyber Incident Response (23%)/3. Incident Response Teams.mp4 36.25 MB
4. Domain 3 Cyber Incident Response (23%)/4. Incident Response Phases.mp4 49.88 MB
4. Domain 3 Cyber Incident Response (23%)/5. Incident Response Policy and Procedures.mp4 20.79 MB
4. Domain 3 Cyber Incident Response (23%)/6. Communication and Info Sharing.mp4 18.84 MB
4. Domain 3 Cyber Incident Response (23%)/7. Incident Classification.mp4 35.2 MB
4. Domain 3 Cyber Incident Response (23%)/9. Network Event Monitoring.mp4 33.23 MB
5. Domain 4 Security Architecture and Toolsets (24%)/1. Domain 4 Security Architecture and Tool Sets.mp4 2.88 MB
5. Domain 4 Security Architecture and Toolsets (24%)/10. Layered Network Defense.mp4 21.87 MB
5. Domain 4 Security Architecture and Toolsets (24%)/11. Layered Host Security.mp4 14.59 MB
5. Domain 4 Security Architecture and Toolsets (24%)/12. Data Analytics.mp4 18.85 MB
5. Domain 4 Security Architecture and Toolsets (24%)/13. Personnel Security.mp4 27.37 MB
5. Domain 4 Security Architecture and Toolsets (24%)/14. Outsourcing Concerns.mp4 13.93 MB
5. Domain 4 Security Architecture and Toolsets (24%)/15. User Awareness Training.mp4 10.22 MB
5. Domain 4 Security Architecture and Toolsets (24%)/16. Analyzing Secure Architectures.mp4 43.19 MB
5. Domain 4 Security Architecture and Toolsets (24%)/18. What Is Identity.mp4 22.05 MB
5. Domain 4 Security Architecture and Toolsets (24%)/19. Identity Systems.mp4 50.49 MB
5. Domain 4 Security Architecture and Toolsets (24%)/2. Policy Documents.mp4 29.69 MB
5. Domain 4 Security Architecture and Toolsets (24%)/20. Threats to Identity Systems.mp4 14.19 MB
5. Domain 4 Security Architecture and Toolsets (24%)/21. Attacking AAA Protocols and Systems.mp4 40.68 MB
5. Domain 4 Security Architecture and Toolsets (24%)/22. Targeting Account Lifecycle.mp4 14.95 MB
5. Domain 4 Security Architecture and Toolsets (24%)/23. Identity Exploits.mp4 13.48 MB
5. Domain 4 Security Architecture and Toolsets (24%)/24. Credential Theft.mp4 15.44 MB
5. Domain 4 Security Architecture and Toolsets (24%)/25. Securing Authentication and Authorization System.mp4 26.71 MB
5. Domain 4 Security Architecture and Toolsets (24%)/26. Identity as a Service (IDaaS).mp4 9.7 MB
5. Domain 4 Security Architecture and Toolsets (24%)/27. Detecting Identity Attacks.mp4 7.08 MB
5. Domain 4 Security Architecture and Toolsets (24%)/28. Federated Identity Systems.mp4 46.82 MB
5. Domain 4 Security Architecture and Toolsets (24%)/3. Standard Frameworks.mp4 34.46 MB
5. Domain 4 Security Architecture and Toolsets (24%)/30. Software Development Life Cycle (SDLC).mp4 36.79 MB
5. Domain 4 Security Architecture and Toolsets (24%)/31. Software Development Models.mp4 48.88 MB
5. Domain 4 Security Architecture and Toolsets (24%)/32. Coding for Security.mp4 31.96 MB
5. Domain 4 Security Architecture and Toolsets (24%)/33. Testing Application Security.mp4 26.29 MB
5. Domain 4 Security Architecture and Toolsets (24%)/34. Finding Security Flaws.mp4 30.25 MB
5. Domain 4 Security Architecture and Toolsets (24%)/35. Web Application Vulnerability Scanners.mp4 26.29 MB
5. Domain 4 Security Architecture and Toolsets (24%)/4. Policy-based Controls.mp4 16.09 MB
5. Domain 4 Security Architecture and Toolsets (24%)/5. Audits and Assessments.mp4 10.1 MB
5. Domain 4 Security Architecture and Toolsets (24%)/6. Laws and Regulations.mp4 24.36 MB
5. Domain 4 Security Architecture and Toolsets (24%)/8. Defense in Depth.mp4 25.12 MB
5. Domain 4 Security Architecture and Toolsets (24%)/9. Types of Controls.mp4 21.79 MB
6. Conclusion/1. How to Schedule Your Exam.mp4 70.46 MB
6. Conclusion/2. Conclusion.mp4 8.44 MB
6. Conclusion/3. BONUS A Special Thank You Message From Jason.mp4 11.32 MB
7. Practice Exam/1. Simulations and Performance-Based Questions (PBQs).mp4 323.95 MB
其他位置