CySA+ Cert Prep - 1 Threat Management\1.Introduction\02.What you need to know.en.srt |
1,386 |
F726B741 |
CySA+ Cert Prep - 1 Threat Management\1.Introduction\01.Welcome.en.srt |
2,002 |
4A0932FB |
CySA+ Cert Prep - 1 Threat Management\1.Introduction\01.Welcome.mp4
[26a30cea2c479a4c]
|
7,981,177 |
8CC8A8D6 |
CySA+ Cert Prep - 1 Threat Management\1.Introduction\02.What you need to know.mp4
[1859f266877c8b69]
|
1,333,431 |
14D2A139 |
CySA+ Cert Prep - 1 Threat Management\12.Conclusion\62.What's next.mp4
[7ff369c6367bf85d]
|
1,661,549 |
77C19E6C |
CySA+ Cert Prep - 1 Threat Management\12.Conclusion\62.What's next.en.srt |
1,112 |
CCFE99F1 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\34.System hardening.mp4
[9ec1f29e0436c7f4]
|
20,164,659 |
0D6870C0 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\33.Operating system security.en.srt |
13,763 |
D0E79D20 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\35.Malware prevention.mp4
[19aea1dd3abfe6]
|
16,008,480 |
71E78F46 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\40.Command line network tools.en.srt |
27,322 |
E0FC30A5 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\35.Malware prevention.en.srt |
17,241 |
EBBA55B5 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\40.Command line network tools.mp4
[659d68fc7d088459]
|
29,368,039 |
B692FF70 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\41.Sysinternals.mp4
[91e6c771c552e5b7]
|
12,743,957 |
5CC749D3 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\37.Host-based network security controls.mp4
[3e9b07d7fbbcafef]
|
14,279,303 |
07E1BDB4 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\37.Host-based network security controls.en.srt |
12,967 |
5A0A6F1C |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\41.Sysinternals.en.srt |
9,588 |
45841F4E |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\39.Microsoft Baseline Security Analyzer.mp4
[b4bcc88e38ff694b]
|
7,443,828 |
EC2682FA |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\34.System hardening.en.srt |
14,707 |
96BDDA73 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\33.Operating system security.mp4
[c1fe2f34e145e6e6]
|
14,586,180 |
D3DED234 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\39.Microsoft Baseline Security Analyzer.en.srt |
6,585 |
C665A7FF |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\38.Microsoft EMET.en.srt |
6,450 |
3CC52782 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\38.Microsoft EMET.mp4
[41708186021919b3]
|
6,943,035 |
59412FA1 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\36.Application management.mp4
[f5fdf22139d70be5]
|
10,122,104 |
92BC90AB |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints\36.Application management.en.srt |
11,317 |
9F1DFCCF |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\44.DNS harvesting.mp4
[9d9a9525562e8e4d]
|
16,851,247 |
A7E660EB |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\42.Social engineering.mp4
[539b5dbf993a7443]
|
8,675,190 |
0608000A |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\44.DNS harvesting.en.srt |
9,505 |
78837BA6 |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\46.Protocol analyzers.mp4
[cdefb796c78ebe98]
|
31,271,431 |
656952FA |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\48.The importance of perspective.en.srt |
6,211 |
F286CC4A |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\45.Network scanning.mp4
[fcfb7fd239b6e0a9]
|
16,820,934 |
5A02D392 |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\46.Protocol analyzers.en.srt |
16,819 |
96F7A18C |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\43.Threat intelligence.mp4
[e4d2be160e3d36f9]
|
4,021,113 |
4B87A664 |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\48.The importance of perspective.mp4
[d33b781cdba19de1]
|
5,849,745 |
A56ADD5F |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\47.Wireless reconnaissance.en.srt |
13,425 |
C64D0C6E |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\42.Social engineering.en.srt |
10,947 |
79224ED2 |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\43.Threat intelligence.en.srt |
4,479 |
FB9E90D6 |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\45.Network scanning.en.srt |
12,706 |
709834D7 |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance\47.Wireless reconnaissance.mp4
[52faaab920076501]
|
19,585,952 |
F41A8CE8 |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\51.Continuous security monitoring.en.srt |
8,205 |
6621843E |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\53.Network traffic analysis.en.srt |
6,451 |
B72C6738 |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\51.Continuous security monitoring.mp4
[f6e7da813ce5ac0f]
|
6,988,120 |
2ED6987C |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\53.Network traffic analysis.mp4
[d27434c2e6445fdf]
|
7,305,324 |
211303FF |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\49.Monitor log files.mp4
[feddb9ad093226f2]
|
12,018,773 |
1A7D1423 |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\52.Logging and SIEM technology.en.srt |
5,497 |
4CC5890C |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\49.Monitor log files.en.srt |
9,436 |
75BA17BA |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\50.Correlating security event information.en.srt |
5,485 |
F6C19152 |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\50.Correlating security event information.mp4
[a755f893d32ca834]
|
4,369,423 |
8E5BE8CC |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics\52.Logging and SIEM technology.mp4
[5b4c272d01fb632d]
|
5,401,086 |
467C9526 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\15.Subnetting.mp4
[5d40680abf5f00a9]
|
6,087,567 |
D31C987B |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\18.DNS.mp4
[30bfec48ad4fed71]
|
5,932,038 |
B0BBA180 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\15.Subnetting.en.srt |
5,640 |
6394CE93 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\19.ICMP.mp4
[9b13ff31054c610a]
|
7,000,002 |
A5988CAE |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\20.Security device placement.en.srt |
11,930 |
0907F0E5 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\13.Introducing TCP_IP.mp4
[7a4678e3957de100]
|
7,670,946 |
8050ED3F |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\17.Port isolation.en.srt |
3,095 |
87E814C9 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\18.DNS.en.srt |
6,162 |
4596154A |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\13.Introducing TCP_IP.en.srt |
8,789 |
F1505B46 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\12.Security zones.en.srt |
5,972 |
21FB385E |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\16.VLANs and network segmentation.mp4
[28b54c2a41759eed]
|
3,036,225 |
6D82AB71 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\14.IP addresses.en.srt |
5,674 |
356FA016 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\17.Port isolation.mp4
[36758cdd0aad2a0c]
|
3,936,004 |
BC4B1C18 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\12.Security zones.mp4
[4cd1d6d18d3ff4d0]
|
5,652,533 |
F14F1B00 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\14.IP addresses.mp4
[ae154f1b77b57e5d]
|
5,661,407 |
BBC9A33D |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\20.Security device placement.mp4
[cbba591b2ccfa68f]
|
10,703,752 |
AAD2C8E6 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\16.VLANs and network segmentation.en.srt |
3,532 |
0766C5CB |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies\19.ICMP.en.srt |
5,889 |
A9C0E798 |
CySA+ Cert Prep - 1 Threat Management\11.10. Reverse Engineering\61.Reverse engineering hardware.mp4
[d133951e99e55cb8]
|
6,584,986 |
DDBD7B9B |
CySA+ Cert Prep - 1 Threat Management\11.10. Reverse Engineering\60.Reverse engineering software.en.srt |
7,251 |
9D13050A |
CySA+ Cert Prep - 1 Threat Management\11.10. Reverse Engineering\60.Reverse engineering software.mp4
[66285f9ced78a7b6]
|
6,979,565 |
0B5A6CFE |
CySA+ Cert Prep - 1 Threat Management\11.10. Reverse Engineering\61.Reverse engineering hardware.en.srt |
5,272 |
330DEC83 |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\55.Designing and executing a penetration test.en.srt |
6,585 |
86F8693C |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\54.Planning a penetration test.en.srt |
5,290 |
A4DC7F2A |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\56.Exploitation frameworks.en.srt |
12,837 |
8B6B485F |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\58.Penetration test reporting.mp4
[aef0f182e08c9525]
|
4,418,816 |
54C26A47 |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\57.Interception proxies.en.srt |
9,421 |
6DCD8DAE |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\59.Training and exercises.en.srt |
4,083 |
5FCCEEE2 |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\59.Training and exercises.mp4
[94038204c7956a4f]
|
3,649,350 |
C6D9536B |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\58.Penetration test reporting.en.srt |
5,566 |
1ABFC50C |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\56.Exploitation frameworks.mp4
[5b9daebebaefffa7]
|
18,789,139 |
7628DC66 |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\55.Designing and executing a penetration test.mp4
[be583682d4bafe6e]
|
6,544,686 |
AF96B9CC |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\57.Interception proxies.mp4
[c827fb96f706d93e]
|
13,755,835 |
3D1B285D |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing\54.Planning a penetration test.mp4
[5d0bac1c6fc6f9dd]
|
5,535,404 |
FCE899CE |
CySA+ Cert Prep - 1 Threat Management\6.5. Monitoring\31.SNMP.mp4
[f5c1ea9f65ed464b]
|
5,337,753 |
59E6EDD3 |
CySA+ Cert Prep - 1 Threat Management\6.5. Monitoring\30.Network monitoring.en.srt |
7,842 |
F7804234 |
CySA+ Cert Prep - 1 Threat Management\6.5. Monitoring\30.Network monitoring.mp4
[8f7a2474a609a9c0]
|
6,265,542 |
D08F4D9B |
CySA+ Cert Prep - 1 Threat Management\6.5. Monitoring\31.SNMP.en.srt |
5,535 |
CEADA66B |
CySA+ Cert Prep - 1 Threat Management\6.5. Monitoring\32.Infrastructure monitoring tools.mp4
[8fd906b6ea985d95]
|
10,293,588 |
8E4841E8 |
CySA+ Cert Prep - 1 Threat Management\6.5. Monitoring\32.Infrastructure monitoring tools.en.srt |
7,824 |
2B981852 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\04.Risk assessment.mp4
[156f91d310e3ff18]
|
8,275,901 |
A26300CA |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\05.Quantitative risk assessment.en.srt |
10,764 |
E2A23ACF |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\04.Risk assessment.en.srt |
9,064 |
800821F9 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\08.Audits and assessments.mp4
[9f2e473027637589]
|
13,236,684 |
B50C0655 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\07.Security control selection and implementation.en.srt |
10,225 |
ED9EA203 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\06.Risk management.mp4
[20fc30ff5d4826bb]
|
8,450,453 |
9B6DC4D5 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\09.Control management.mp4
[dfcd1a5a9144e1d4]
|
8,094,493 |
8173B42F |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\11.Risk management frameworks.en.srt |
5,871 |
84B1620E |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\11.Risk management frameworks.mp4
[6b26e6081230e2ca]
|
7,235,375 |
4DFE4A96 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\08.Audits and assessments.en.srt |
10,355 |
A9B3C980 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\09.Control management.en.srt |
6,730 |
725E569D |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\10.Ongoing risk management.mp4
[b8932b5f5febc946]
|
3,944,658 |
F3F9A599 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\10.Ongoing risk management.en.srt |
4,317 |
638B150D |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\05.Quantitative risk assessment.mp4
[cfc57bcfb2f0a9a1]
|
10,142,791 |
0AF4A5B1 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\07.Security control selection and implementation.mp4
[c495bae8882e767e]
|
10,964,151 |
F142AB76 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls\06.Risk management.en.srt |
6,223 |
FBF2FE3C |
CySA+ Cert Prep - 1 Threat Management\2.1. Overview of the Role of a Cybersecurity Analyst\03.The goals of information security.mp4
[718a6b648e9ebd4f]
|
3,311,818 |
96137E41 |
CySA+ Cert Prep - 1 Threat Management\2.1. Overview of the Role of a Cybersecurity Analyst\03.The goals of information security.en.srt |
3,563 |
ED9BBFDC |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\25.Switch configuration security.en.srt |
6,682 |
19DFD1F0 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\29.Web security tools.en.srt |
7,176 |
EEC8BF2A |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\22.Network access control.mp4
[fe679e897312363a]
|
7,337,486 |
4E37CDE1 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\27.Deception technologies.mp4
[c030d61cfd71232d]
|
4,425,258 |
E0F941CB |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\24.Router configuration security.mp4
[74788e2bec2ae33d]
|
6,509,592 |
897B6600 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\21.Restricting network access.mp4
[40dc34b1f170635b]
|
4,218,776 |
7238A6DE |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\22.Network access control.en.srt |
7,199 |
9D1F8466 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\27.Deception technologies.en.srt |
5,106 |
3943FA72 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\23.Firewall rule management.mp4
[8feba26138fe984f]
|
7,526,636 |
C43C6F16 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\28.Intrusion detection and prevention.en.srt |
14,943 |
19726C7D |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\26.Isolating sensitive systems.mp4
[139d47cf12c74af2]
|
4,159,958 |
9376A86F |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\25.Switch configuration security.mp4
[35831d7e9d71f160]
|
5,761,113 |
8BA434E3 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\28.Intrusion detection and prevention.mp4
[b57abb93dd6d3267]
|
16,969,997 |
F545CEC0 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\26.Isolating sensitive systems.en.srt |
3,743 |
394C9EF5 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\29.Web security tools.mp4
[f7f9f2fc49892b89]
|
10,369,491 |
AB84724E |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\24.Router configuration security.en.srt |
7,073 |
53CAD6A5 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\23.Firewall rule management.en.srt |
7,620 |
86F8D12E |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques\21.Restricting network access.en.srt |
4,297 |
B15A9F9B |
CySA+ Cert Prep - 1 Threat Management\1.Introduction |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\12.Conclusion |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\7.6. Securing Endpoints |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\8.7. Environmental Reconnaissance |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\9.8. Security Analytics |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\4.3. Networking Technologies |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\11.10. Reverse Engineering |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\10.9. Penetration Testing |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\6.5. Monitoring |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\3.2. Cybersecurity Threats and Controls |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\2.1. Overview of the Role of a Cybersecurity Analyst |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management\5.4. Network Security Techniques |
0 |
00000000 |
CySA+ Cert Prep - 1 Threat Management |
0 |
00000000 |
|
Total size: |
567,062,595 |
|