YourBittorrent
Categories
Movies
Music
Television
Games
Software
Anime
XXX
eBooks
Photos
Other
Upload
More
News
Legal
Advertising
Privacy
Bittorrent Clients
Contact
All torrents
Verified only
All categories
Movies
TV
Music
Games
Software
Anime
eBooks
XXX
Search
All torrents
Verified only
All categories
Movies
TV
Music
Games
Software
Anime
eBooks
XXX
Guest
Login
Sign up
Udemy - CompTIA CySA + (CS0-002) By Integrity Training
Category:
Other
Date:
05/10/22 at 12:01am GMT+1
Submitter:
Unknown
Seeders:
2
Leechers:
4
File size:
2.8 GB in 98 files
Torrent Status:
This torrent has been
verified
.
Infohash:
e37a20f262b271af6a56090ce2f1c0f295c69e8e
File list
Udemy - CompTIA CySA + (CS0-002) By Integrity Training
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/001 Instructor Introduction.mp4
21 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/001 Instructor Introduction_en.vtt
3.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/002 Course Introduction.mp4
21.7 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/002 Course Introduction_en.vtt
4.7 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/003 Managing Threats and Vulnerabilities.mp4
4.8 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/003 Managing Threats and Vulnerabilities_en.vtt
1.9 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/004 Topic A Threat Data and Intelligence.mp4
970.5 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/004 Topic A Threat Data and Intelligence_en.vtt
626 B
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/005 Importance of Threat Data.mp4
12.7 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/005 Importance of Threat Data_en.vtt
2.6 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/006 Open-Source Intelligence.mp4
32.9 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/006 Open-Source Intelligence_en.vtt
11.7 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/007 Proprietary Closed Source Intelligence.mp4
10.4 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/007 Proprietary Closed Source Intelligence_en.vtt
3 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/008 Intelligence Characteristics.mp4
13.5 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/008 Intelligence Characteristics_en.vtt
3.9 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/009 Demo - Threat Data.mp4
39 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/009 Demo - Threat Data_en.vtt
5.5 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/010 Indicator Management.mp4
5.3 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/010 Indicator Management_en.vtt
1.5 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/011 STIX Domain Objects.mp4
29.3 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/011 STIX Domain Objects_en.vtt
9.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/012 Trusted Automated Exchange of Indicator Information (TAXII).mp4
11.4 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/012 Trusted Automated Exchange of Indicator Information (TAXII)_en.vtt
3 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/013 OpenIoC.mp4
4.5 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/013 OpenIoC_en.vtt
1.8 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/014 Threat Classification.mp4
15.2 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/014 Threat Classification_en.vtt
6.2 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/015 Threat Classification.mp4
20.8 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/015 Threat Classification_en.vtt
7.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/016 Intelligence Cycle.mp4
9.2 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/016 Intelligence Cycle_en.vtt
5.3 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/017 Information Sharing.mp4
4.5 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/017 Information Sharing_en.vtt
1.7 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/018 Topic B Utilizing Threat Intelligence.mp4
842.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/018 Topic B Utilizing Threat Intelligence_en.vtt
600 B
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/019 Threat Intelligence and Operational Security.mp4
10.7 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/019 Threat Intelligence and Operational Security_en.vtt
2.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/020 Attack Frameworks.mp4
3.1 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/020 Attack Frameworks_en.vtt
1009 B
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/021 MITRE ATT&CK.mp4
5.3 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/021 MITRE ATT&CK_en.vtt
1.7 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/022 MITRE ATT&CK (cont.).mp4
9.9 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/022 MITRE ATT&CK (cont.)_en.vtt
3.2 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/023 The Diamond Model of Intrusion Analysis.mp4
6.5 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/023 The Diamond Model of Intrusion Analysis_en.vtt
1.9 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/024 Kill Chain.mp4
25.8 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/024 Kill Chain_en.vtt
6.6 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/025 Threat Research.mp4
16.1 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/025 Threat Research_en.vtt
4.8 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/026 Threat Modeling.mp4
21.5 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/026 Threat Modeling_en.vtt
5 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/027 Threat Intelligence Sharing with Supported Functions.mp4
17.6 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/027 Threat Intelligence Sharing with Supported Functions_en.vtt
5.2 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/028 Topic C Vulnerability Management.mp4
795.8 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/028 Topic C Vulnerability Management_en.vtt
651 B
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/029 Introduction to Vulnerability Management.mp4
4 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/029 Introduction to Vulnerability Management_en.vtt
1.6 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/030 Vulnerability Identification.mp4
18 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/030 Vulnerability Identification_en.vtt
4.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/031 Validation Options.mp4
6.8 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/031 Validation Options_en.vtt
4.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/032 Remediation and Mitigation.mp4
12.4 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/032 Remediation and Mitigation_en.vtt
4.6 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/033 Understanding Scanning.mp4
26.8 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/033 Understanding Scanning_en.vtt
8.6 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/034 Additional Scanning Considerations.mp4
10 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/034 Additional Scanning Considerations_en.vtt
3.8 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/035 Inhibitors to Remediation.mp4
13.5 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/035 Inhibitors to Remediation_en.vtt
4.6 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/036 Topic D Using Vulnerability Assessment Tools.mp4
1.2 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/036 Topic D Using Vulnerability Assessment Tools_en.vtt
1009 B
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/037 Web Application Scanners.mp4
7.7 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/037 Web Application Scanners_en.vtt
4.1 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/038 Infrastructure Scanners.mp4
4.6 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/038 Infrastructure Scanners_en.vtt
3.2 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/039 Demo - Infrastructure Scanners.mp4
79.8 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/039 Demo - Infrastructure Scanners_en.vtt
11.6 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/040 Software Assessments.mp4
7 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/040 Software Assessments_en.vtt
3.8 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/041 Enumeration.mp4
6.6 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/041 Enumeration_en.vtt
4.3 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/042 Demo - Enumeration.mp4
30.3 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/042 Demo - Enumeration_en.vtt
9.9 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/043 Wireless Assessments.mp4
7.5 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/043 Wireless Assessments_en.vtt
4.8 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/044 Cloud Assessment.mp4
3.4 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/044 Cloud Assessment_en.vtt
2.4 KB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/045 Chapter 1 Review.mp4
2 MB
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/045 Chapter 1 Review_en.vtt
989 B
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/045 CySA-WB01.pdf
424.2 KB
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/001 Specialized Threats and Vulnerabilities.mp4
2.3 MB
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/001 Specialized Threats and Vulnerabilities_en.vtt
1.1 KB
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/002 Topic A Threats and Vulnerabilities with Specialized Technology.mp4
786 KB
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/002 Topic A Threats and Vulnerabilities with Specialized Technology_en.vtt
529 B
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/003 Common Vulnerabilities.mp4
24.9 MB
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/003 Common Vulnerabilities_en.vtt
8.7 KB
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/004 App Vulnerabilities.mp4
14.7 MB
Similar Torrents
Category
Name
Size
Date
Atomic.Heart.
RePack.by.Chovka
30.1 GB
02/19/23
3733
311
YTD Video Downloader Pro 7.3.0.2 by Sats99
30 MB
05/14/23
3171
2116
GOM Player Plus 2.3.86.5355 by Sats99
34 MB
05/14/23
3056
2026
FastVPN by Namecheap (2023) New 1 year free keygen
22 MB
05/14/23
3040
2022
Free YouTube To MP3 Converter 4.3.92.427 By Sats99
49 MB
05/14/23
2997
1996
4K Video Downloader 4.24.2.5380 by Sats99
52 MB
05/14/23
2923
1936
Zoom Player Max 17.2 Beta 3 By Sats99
34 MB
05/14/23
2922
1943
ChrisPC VideoTube Downloader Pro 14.23.0429 By Sats99
40 MB
05/14/23
2807
1862
Identity Theft Preventer 2.3.9 By Sats99
19 MB
05/14/23
2729
1815
Windows 11 22H2 Build 22621.963 16in1 (Non-TPM) Integral Edition (x64) En-US December 2 ...
121 MB
07/17/23
2313
1540
The Marvel's 2023 WEBRip_от New-Team_by_JNS82
1.5 GB
12/07/23
1372
44
Atlas 2024 WEB-DLRip_от New-Team_by_JNS82
1.5 GB
05/24/24
1094
27
Lethal Company v50
by Pioneer
326 MB
04/29/24
1092
5
The Long Drive v2023.05.02_NonVR_Multi
by Pioneer
319 MB
07/10/23
1022
4
Super Bunny Man v1.0.1
by Pioneer
167 MB
07/10/23
859
10