Udemy - Comptia Security + - Attacks, Threats, And Vulnerabilities 2022

Photo unavailable
Category:
Date:
12/26/22 at 9:04pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
2.8 GB in 24 files

Torrent Status:
  This torrent has been verified.

Infohash:
6b023ec0b1ec24a4e40a729128ebaf3037089c25


File list

  • Udemy - Comptia Security + - Attacks, Threats, And Vulnerabilities 2022
  • icon ~Get Your Files Here !/1 - Introduction to company/1 - Certcop Introduction English.vtt 29.9 KB
    icon ~Get Your Files Here !/1 - Introduction to company/1 - Certcop Introduction.mp4 315.3 MB
    icon ~Get Your Files Here !/2 - Introduction to CompTIA and Free Flash Cards/2 - CompTIA Security English.vtt 14.4 KB
    icon ~Get Your Files Here !/2 - Introduction to CompTIA and Free Flash Cards/2 - CompTIA Security.mp4 51.8 MB
    icon ~Get Your Files Here !/2 - Introduction to CompTIA and Free Flash Cards/2 - Security-Flsh-Cards.pdf 4.8 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/10 - Explain the techniques used in penetration testing English.vtt 59.4 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/10 - Explain the techniques used in penetration testing.mp4 421.6 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/3 - Compare and contrast different types of social engineering techniques English.vtt 13.9 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/3 - Compare and contrast different types of social engineering techniques.mp4 61.6 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/4 - Given a scenario analyze potential indicators to determine the type of attack English.vtt 78.1 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/4 - Given a scenario analyze potential indicators to determine the type of attack.mp4 480.4 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/5 - Analyze potential indicators associated with application attacks English.vtt 52.2 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/5 - Analyze potential indicators associated with application attacks.mp4 324.1 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/6 - Analyze potential indicators associated with network attacks English.vtt 57.5 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/6 - Analyze potential indicators associated with network attacks.mp4 374.5 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/7 - Explain different threat actors vectors and intelligence sources English.vtt 45.1 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/7 - Explain different threat actors vectors and intelligence sources.mp4 339.2 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/8 - Explain the security concerns associated with various types of vulnerabilities English.vtt 33.8 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/8 - Explain the security concerns associated with various types of vulnerabilities.mp4 244.1 MB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/9 - Summarize the techniques used in security assessments English.vtt 30 KB
    icon ~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/9 - Summarize the techniques used in security assessments.mp4 222.3 MB
    icon ~Get Your Files Here !/4 - Free Mock Exam and Flash Cards/11 - Free Flashcards.html 57 B
    icon ~Get Your Files Here !/4 - Free Mock Exam and Flash Cards/11 - Security-flash-Cards.pdf 4.8 MB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents