CompTIA Security (SY0-501) Cert Prep_ 1 Threats Attacks and Vulnerabilities

Photo unavailable
Category:
Date:
09/24/18 at 9:19am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
463 MB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
2f44775aa893246594bab5758a2418d92099ffd8


File list

  • CompTIA Security (SY0-501) Cert Prep_ 1 Threats Attacks and Vulnerabilities
  • icon 01 Introduction/001 Welcome-en.srt 3.1 KB
    icon 01 Introduction/001 Welcome.mp4 4.6 MB
    icon 01 Introduction/002 What you need to know-en.srt 1.1 KB
    icon 01 Introduction/002 What you need to know.mp4 787.7 KB
    icon 02 Malware/001 Comparing viruses worms and Trojans-en.srt 10 KB
    icon 02 Malware/001 Comparing viruses worms and Trojans.mp4 23.7 MB
    icon 02 Malware/002 Comparing adware spyware and ransomware-en.srt 8.7 KB
    icon 02 Malware/002 Comparing adware spyware and ransomware.mp4 9.6 MB
    icon 02 Malware/003 Understanding backdoors and logic bombs-en.srt 7.3 KB
    icon 02 Malware/003 Understanding backdoors and logic bombs.mp4 9.8 MB
    icon 02 Malware/004 Looking at advanced malware-en.srt 7.9 KB
    icon 02 Malware/004 Looking at advanced malware.mp4 8.1 MB
    icon 02 Malware/005 Understanding botnets-en.srt 5.4 KB
    icon 02 Malware/005 Understanding botnets.mp4 6.1 MB
    icon 02 Malware/006 Advanced persistent threats-en.srt 6.1 KB
    icon 02 Malware/006 Advanced persistent threats.mp4 7.9 MB
    icon 03 Understanding Attackers/001 Cybersecurity adversaries-en.srt 6.9 KB
    icon 03 Understanding Attackers/001 Cybersecurity adversaries.mp4 14.7 MB
    icon 03 Understanding Attackers/002 Preventing insider threats-en.srt 7.6 KB
    icon 03 Understanding Attackers/002 Preventing insider threats.mp4 8.6 MB
    icon 03 Understanding Attackers/003 Threat intelligence-en.srt 4.4 KB
    icon 03 Understanding Attackers/003 Threat intelligence.mp4 3.7 MB
    icon 04 Understanding Attack Types/001 Denial of service attacks-en.srt 7.6 KB
    icon 04 Understanding Attack Types/001 Denial of service attacks.mp4 8.3 MB
    icon 04 Understanding Attack Types/002 Eavesdropping attacks-en.srt 7.6 KB
    icon 04 Understanding Attack Types/002 Eavesdropping attacks.mp4 8.1 MB
    icon 04 Understanding Attack Types/003 Network attacks-en.srt 11.5 KB
    icon 04 Understanding Attack Types/003 Network attacks.mp4 12 MB
    icon 04 Understanding Attack Types/004 Network address spoofing-en.srt 6.2 KB
    icon 04 Understanding Attack Types/004 Network address spoofing.mp4 4.6 MB
    icon 04 Understanding Attack Types/005 Password attacks-en.srt 15 KB
    icon 04 Understanding Attack Types/005 Password attacks.mp4 21.3 MB
    icon 04 Understanding Attack Types/006 Brute force cryptographic attacks-en.srt 5.5 KB
    icon 04 Understanding Attack Types/006 Brute force cryptographic attacks.mp4 4.8 MB
    icon 04 Understanding Attack Types/007 Knowledge-based crytpographic attacks-en.srt 5.3 KB
    icon 04 Understanding Attack Types/007 Knowledge-based crytpographic attacks.mp4 8.2 MB
    icon 04 Understanding Attack Types/008 Watering hole attacks-en.srt 5.7 KB
    icon 04 Understanding Attack Types/008 Watering hole attacks.mp4 7.4 MB
    icon 05 Wireless Attacks/001 Wireless eavesdropping-en.srt 8.2 KB
    icon 05 Wireless Attacks/001 Wireless eavesdropping.mp4 9.6 MB
    icon 05 Wireless Attacks/002 WPA and WPS attacks-en.srt 6.4 KB
    icon 05 Wireless Attacks/002 WPA and WPS attacks.mp4 7.1 MB
    icon 05 Wireless Attacks/003 Propagation attacks-en.srt 7.1 KB
    icon 05 Wireless Attacks/003 Propagation attacks.mp4 9.7 MB
    icon 05 Wireless Attacks/004 Preventing rogues and evil twins-en.srt 6.1 KB
    icon 05 Wireless Attacks/004 Preventing rogues and evil twins.mp4 6.2 MB
    icon 05 Wireless Attacks/005 Disassociation attacks-en.srt 4.6 KB
    icon 05 Wireless Attacks/005 Disassociation attacks.mp4 4 MB
    icon 05 Wireless Attacks/006 Understanding Bluetooth and NFC attacks-en.srt 4.6 KB
    icon 05 Wireless Attacks/006 Understanding Bluetooth and NFC attacks.mp4 5 MB
    icon 05 Wireless Attacks/007 RFID security-en.srt 4.9 KB
    icon 05 Wireless Attacks/007 RFID security.mp4 7.4 MB
    icon 06 Application Attacks/001 Application security-en.srt 7.5 KB
    icon 06 Application Attacks/001 Application security.mp4 9.8 MB
    icon 06 Application Attacks/002 Preventing SQL injection-en.srt 10.1 KB
    icon 06 Application Attacks/002 Preventing SQL injection.mp4 11.5 MB
    icon 06 Application Attacks/003 Understanding cross-site scripting-en.srt 12 KB
    icon 06 Application Attacks/003 Understanding cross-site scripting.mp4 17.2 MB
    icon 06 Application Attacks/004 Understanding cross-site request forgery-en.srt 7.4 KB
    icon 06 Application Attacks/004 Understanding cross-site request forgery.mp4 11.4 MB
    icon 06 Application Attacks/005 Clickjacking-en.srt 3.3 KB
    icon 06 Application Attacks/005 Clickjacking.mp4 3.1 MB
    icon 06 Application Attacks/006 Defending against directory traversal-en.srt 5.9 KB
    icon 06 Application Attacks/006 Defending against directory traversal.mp4 7.6 MB
    icon 06 Application Attacks/007 Overflow attacks-en.srt 6.2 KB
    icon 06 Application Attacks/007 Overflow attacks.mp4 10 MB
    icon 06 Application Attacks/008 Explaining cookies and attachments-en.srt 6.4 KB
    icon 06 Application Attacks/008 Explaining cookies and attachments.mp4 6.8 MB
    icon 06 Application Attacks/009 Session hijacking-en.srt 6.9 KB
    icon 06 Application Attacks/009 Session hijacking.mp4 8.8 MB
    icon 06 Application Attacks/010 Malicious add-ons-en.srt 4.7 KB
    icon 06 Application Attacks/010 Malicious add-ons.mp4 6.3 MB
    icon 06 Application Attacks/011 Code execution attacks-en.srt 5 KB
    icon 06 Application Attacks/011 Code execution attacks.mp4 7 MB
    icon 06 Application Attacks/012 Driver manipulation-en.srt 4.8 KB
    icon 06 Application Attacks/012 Driver manipulation.mp4 3.7 MB
    icon 06 Application Attacks/013 Error and exception handling-en.srt 6.6 KB
    icon 06 Application Attacks/013 Error and exception handling.mp4 6.9 MB
    icon 07 Social Engineering Attacks/001 Social engineering-en.srt 10.4 KB
    icon 07 Social Engineering Attacks/001 Social engineering.mp4 9.1 MB
    icon 07 Social Engineering Attacks/002 Impersonation attacks-en.srt 9 KB
    icon 07 Social Engineering Attacks/002 Impersonation attacks.mp4 7.7 MB
    icon 07 Social Engineering Attacks/003 Physical social engineering-en.srt 4.5 KB
    icon 07 Social Engineering Attacks/003 Physical social engineering.mp4 9.3 MB
    icon 08 Vulnerability Scanning and Penetration Testing/001 Security assessment tools-en.srt 11.1 KB
    icon 08 Vulnerability Scanning and Penetration Testing/001 Security assessment tools.mp4 21.3 MB
    icon 08 Vulnerability Scanning and Penetration Testing/002 Scanning for vulnerabilities-en.srt 10.8 KB
    icon 08 Vulnerability Scanning and Penetration Testing/002 Scanning for vulnerabilities.mp4 12.5 MB
    icon 08 Vulnerability Scanning and Penetration Testing/003 Assessing threats-en.srt 6.2 KB
    icon 08 Vulnerability Scanning and Penetration Testing/003 Assessing threats.mp4 20.9 MB
    icon 08 Vulnerability Scanning and Penetration Testing/004 Threat assessment techniques-en.srt 5.1 KB
    icon 08 Vulnerability Scanning and Penetration Testing/004 Threat assessment techniques.mp4 5.8 MB
    icon 08 Vulnerability Scanning and Penetration Testing/005 Penetration testing-en.srt 7.2 KB
    icon 08 Vulnerability Scanning and Penetration Testing/005 Penetration testing.mp4 7.7 MB
    icon 08 Vulnerability Scanning and Penetration Testing/006 Advanced vulnerability scanning-en.srt 5.7 KB
    icon 08 Vulnerability Scanning and Penetration Testing/006 Advanced vulnerability scanning.mp4 6.2 MB
    icon 09 Impact of Vulnerabilities/001 Vendor vulnerabilities-en.srt 7.8 KB
    icon 09 Impact of Vulnerabilities/001 Vendor vulnerabilities.mp4 7.6 MB
    icon 09 Impact of Vulnerabilities/002 Memory vulnerabilities-en.srt 6.8 KB

Similar Torrents