[ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management


[ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management
Category:
Date:
07/27/23 at 3:30am GMT+1
Submitter:
Seeders:
3
Leechers:
1
File size:
586 MB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
c81c902983e84cf7092623445b99b2242dbdc5f2


File list

  • [ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management
  • icon ~Get Your Files Here !/01 - Introduction/01 - Vulnerability management.mp4 4.4 MB
    icon ~Get Your Files Here !/01 - Introduction/01 - Vulnerability management.srt 1.6 KB
    icon ~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4 1.1 MB
    icon ~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt 1.3 KB
    icon ~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4 3.7 MB
    icon ~Get Your Files Here !/01 - Introduction/03 - Study resources.srt 2.8 KB
    icon ~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/01 - What is vulnerability management.mp4 8.2 MB
    icon ~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/01 - What is vulnerability management.srt 9.2 KB
    icon ~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/02 - Identify scan targets.mp4 9.7 MB
    icon ~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/02 - Identify scan targets.srt 11 KB
    icon ~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/03 - Scan frequency.mp4 10 MB
    icon ~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/03 - Scan frequency.srt 8 KB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/01 - Network scanning.mp4 4.1 MB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/01 - Network scanning.srt 3.1 KB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/02 - Install Nmap on Windows.mp4 10.5 MB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/02 - Install Nmap on Windows.srt 10.1 KB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/03 - Install Nmap on macOS.mp4 4.6 MB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/03 - Install Nmap on macOS.srt 4.4 KB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/04 - Run and interpret a simple Nmap scan.mp4 6.7 MB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/04 - Run and interpret a simple Nmap scan.srt 6.6 KB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/05 - Host discovery with Nmap.mp4 7.1 MB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/05 - Host discovery with Nmap.srt 7.8 KB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/06 - Operate system fingerprinting.mp4 6.4 MB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/06 - Operate system fingerprinting.srt 7.2 KB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/07 - Service version detection.mp4 2.9 MB
    icon ~Get Your Files Here !/03 - 2. Network Mapping/07 - Service version detection.srt 3.2 KB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/01 - Security baseline scanning.mp4 1.9 MB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/01 - Security baseline scanning.srt 1.6 KB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/02 - Scan configuration.mp4 10.9 MB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/02 - Scan configuration.srt 11.8 KB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/03 - Scan perspective.mp4 8.8 MB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/03 - Scan perspective.srt 9.2 KB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/04 - Scanner maintenance.mp4 5.3 MB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/04 - Scanner maintenance.srt 6.4 KB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/05 - Vulnerability scanning tools.mp4 3.4 MB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/05 - Vulnerability scanning tools.srt 2.2 KB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/06 - Passive vulnerability scanning.mp4 3 MB
    icon ~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/06 - Passive vulnerability scanning.srt 3.4 KB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/01 - SCAP.mp4 4 MB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/01 - SCAP.srt 4.2 KB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/02 - CVSS.mp4 5.5 MB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/02 - CVSS.srt 6.1 KB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/03 - Interpret CVSS scores.mp4 6.9 MB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/03 - Interpret CVSS scores.srt 5.3 KB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/04 - Analyze scan reports.mp4 7.8 MB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/04 - Analyze scan reports.srt 7.3 KB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/05 - Correlate scan results.mp4 4.6 MB
    icon ~Get Your Files Here !/05 - 4. Analyzing Scan Results/05 - Correlate scan results.srt 4.4 KB
    icon ~Get Your Files Here !/06 - 5. Common Vulnerabilities/01 - Server vulnerabilities.mp4 12.4 MB
    icon ~Get Your Files Here !/06 - 5. Common Vulnerabilities/01 - Server vulnerabilities.srt 10.4 KB
    icon ~Get Your Files Here !/06 - 5. Common Vulnerabilities/02 - Endpoint vulnerabilities.mp4 5.8 MB
    icon ~Get Your Files Here !/06 - 5. Common Vulnerabilities/02 - Endpoint vulnerabilities.srt 3.2 KB
    icon ~Get Your Files Here !/06 - 5. Common Vulnerabilities/03 - Network vulnerabilities.mp4 7.7 MB
    icon ~Get Your Files Here !/06 - 5. Common Vulnerabilities/03 - Network vulnerabilities.srt 8.6 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/01 - OWASP Top 10.mp4 10.4 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/01 - OWASP Top 10.srt 10 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/02 - Prevent SQL injection.mp4 8 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/02 - Prevent SQL injection.srt 9.5 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/03 - Understand cross-site scripting.mp4 8.5 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/03 - Understand cross-site scripting.srt 9.1 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/04 - Request forgery.mp4 9 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/04 - Request forgery.srt 7.8 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/05 - Privilege escalation.mp4 3 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/05 - Privilege escalation.srt 3.6 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/06 - Directory traversal.mp4 7.1 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/06 - Directory traversal.srt 5.5 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/07 - File inclusion.mp4 3.1 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/07 - File inclusion.srt 3.4 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/08 - Overflow attacks.mp4 9.5 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/08 - Overflow attacks.srt 6 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/09 - Cookies and attachments.mp4 8 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/09 - Cookies and attachments.srt 7.9 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/10 - Session hijacking.mp4 9.2 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/10 - Session hijacking.srt 6.9 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/11 - Race conditions.mp4 4.7 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/11 - Race conditions.srt 4.1 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/12 - Memory vulnerabilities.mp4 6.4 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/12 - Memory vulnerabilities.srt 6.6 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/13 - Code execution attacks.mp4 5 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/13 - Code execution attacks.srt 5 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/14 - Data poisoning.mp4 1.8 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/14 - Data poisoning.srt 2 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/15 - Third-party code.mp4 8.6 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/15 - Third-party code.srt 6.6 KB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/16 - Interception proxies.mp4 13.1 MB
    icon ~Get Your Files Here !/07 - 6. Software Security Issues/16 - Interception proxies.srt 9 KB
    icon ~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/01 - Industrial control systems.mp4 10.9 MB
    icon ~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/01 - Industrial control systems.srt 10 KB
    icon ~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/02 - Internet of Things.mp4 7.3 MB
    icon ~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/02 - Internet of Things.srt 5.6 KB
    icon ~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/03 - Embedded systems.mp4 10.1 MB
    icon ~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/03 - Embedded systems.srt 8.2 KB
    icon ~Get Your Files Here !/09 - 8. More Cybersecurity Tools/01 - Exploitation frameworks.mp4 11.8 MB
    icon ~Get Your Files Here !/09 - 8. More Cybersecurity Tools/01 - Exploitation frameworks.srt 11.3 KB
    icon ~Get Your Files Here !/09 - 8. More Cybersecurity Tools/02 - Cloud auditing tools.mp4 12.4 MB
    icon ~Get Your Files Here !/09 - 8. More Cybersecurity Tools/02 - Cloud auditing tools.srt 7.8 KB
    icon ~Get Your Files Here !/09 - 8. More Cybersecurity Tools/03 - Debuggers.mp4 1.1 MB
    icon ~Get Your Files Here !/09 - 8. More Cybersecurity Tools/03 - Debuggers.srt 1.5 KB

Similar Torrents

Category
Name
Size
Date
 [ CourseWikia.com ] Udemy - ChatGPT Masterclass - A Complete ChatGPT Guide for Beginners! 2.6 GB01/18/23607
 [ CourseWikia com ] Curry Cookbook - 60 Authentic Recipes To Prepare At Home Traditiona ...39 MB04/22/24371
 [ CourseWikia com ] Easy Greek Cookbook - From Moussaka To Souvlaki The 25 Essential Gr ... 27 MB04/22/24271
 [ CourseWikia.com ] Professional Diploma in Cyber Security 3.1 GB04/25/24254
 [ CourseWikia.com ] Learn DaVinci Resolve - The Complete Video Editing Bootcamp 2.1 GB04/25/24244
 [ CourseWikia com ] WIRING FOR BEGINNERS - A Comprehensive, Step-by-step Guide to Maste ... 7 MB03/18/24220
 [ CourseWikia com ] ChatGPT Plugins Handbook - Understand the features and usage of eac ... 1 MB04/22/24220
 [ CourseWikia com ] HECK! Recipes You Can Swear By - 75 Recipes for Sausages, Burgers a ... 39 MB04/22/24222
 [ CourseWikia com ] Lebanese And Italian Culinary Traditions - 2 Books In 1 - Explore T ... 110 MB04/22/24211
 [ CourseWikia com ] Homestyle Kitchen - Fresh & Timeless Comfort Food for Sharing (Home ... 47 MB04/22/24210
 [ CourseWikia.com ] Udemy - Hydroponic Farming 621 MB11/13/23200
 [ CourseWikia.com ] Udemy - The Ultimate ChatGPT for SEO Course 2024 - Rank #1 with AI! 1.2 GB04/08/24204
 [ CourseWikia.com ] Guitar Chord Visualization - Chord Method For Instand Chords 3.8 GB04/25/24206
 [ CourseWikia com ] Pickling and Fermenting Cookbook for Preppers - 1000 Days of Recipe ... 2 MB08/29/23190
 [ CourseWikia.com ] Udemy - How To Create Videos Contents Using Ai Free Ai Tools 1016 MB03/21/24192