Create Tool:
Create Time:1970-01-01 08:00:00
File Size:2.78 GB
File Count:447
File Hash:e37a20f262b271af6a56090ce2f1c0f295c69e8e
Get Bonus Downloads Here.url | 182 B |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/001 Instructor Introduction.mp4 | 20.98 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/001 Instructor Introduction_en.vtt | 3.44 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/002 Course Introduction.mp4 | 21.71 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/002 Course Introduction_en.vtt | 4.69 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/003 Managing Threats and Vulnerabilities.mp4 | 4.78 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/003 Managing Threats and Vulnerabilities_en.vtt | 1.88 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/004 Topic A Threat Data and Intelligence.mp4 | 970.52 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/004 Topic A Threat Data and Intelligence_en.vtt | 626 B |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/005 Importance of Threat Data.mp4 | 12.71 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/005 Importance of Threat Data_en.vtt | 2.61 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/006 Open-Source Intelligence.mp4 | 32.92 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/006 Open-Source Intelligence_en.vtt | 11.73 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/007 Proprietary Closed Source Intelligence.mp4 | 10.45 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/007 Proprietary Closed Source Intelligence_en.vtt | 3.02 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/008 Intelligence Characteristics.mp4 | 13.47 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/008 Intelligence Characteristics_en.vtt | 3.91 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/009 Demo - Threat Data.mp4 | 38.99 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/009 Demo - Threat Data_en.vtt | 5.47 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/010 Indicator Management.mp4 | 5.34 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/010 Indicator Management_en.vtt | 1.52 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/011 STIX Domain Objects.mp4 | 29.35 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/011 STIX Domain Objects_en.vtt | 9.43 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/012 Trusted Automated Exchange of Indicator Information (TAXII).mp4 | 11.38 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/012 Trusted Automated Exchange of Indicator Information (TAXII)_en.vtt | 2.99 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/013 OpenIoC.mp4 | 4.54 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/013 OpenIoC_en.vtt | 1.82 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/014 Threat Classification.mp4 | 15.22 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/014 Threat Classification_en.vtt | 6.16 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/015 Threat Classification.mp4 | 20.83 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/015 Threat Classification_en.vtt | 7.37 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/016 Intelligence Cycle.mp4 | 9.21 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/016 Intelligence Cycle_en.vtt | 5.27 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/017 Information Sharing.mp4 | 4.46 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/017 Information Sharing_en.vtt | 1.71 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/018 Topic B Utilizing Threat Intelligence.mp4 | 842.36 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/018 Topic B Utilizing Threat Intelligence_en.vtt | 600 B |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/019 Threat Intelligence and Operational Security.mp4 | 10.70 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/019 Threat Intelligence and Operational Security_en.vtt | 2.45 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/020 Attack Frameworks.mp4 | 3.09 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/020 Attack Frameworks_en.vtt | 1009 B |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/021 MITRE ATT&CK.mp4 | 5.35 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/021 MITRE ATT&CK_en.vtt | 1.69 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/022 MITRE ATT&CK (cont.).mp4 | 9.86 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/022 MITRE ATT&CK (cont.)_en.vtt | 3.16 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/023 The Diamond Model of Intrusion Analysis.mp4 | 6.55 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/023 The Diamond Model of Intrusion Analysis_en.vtt | 1.93 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/024 Kill Chain.mp4 | 25.78 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/024 Kill Chain_en.vtt | 6.58 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/025 Threat Research.mp4 | 16.13 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/025 Threat Research_en.vtt | 4.83 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/026 Threat Modeling.mp4 | 21.48 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/026 Threat Modeling_en.vtt | 4.97 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/027 Threat Intelligence Sharing with Supported Functions.mp4 | 17.64 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/027 Threat Intelligence Sharing with Supported Functions_en.vtt | 5.22 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/028 Topic C Vulnerability Management.mp4 | 795.81 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/028 Topic C Vulnerability Management_en.vtt | 651 B |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/029 Introduction to Vulnerability Management.mp4 | 3.98 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/029 Introduction to Vulnerability Management_en.vtt | 1.59 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/030 Vulnerability Identification.mp4 | 18.02 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/030 Vulnerability Identification_en.vtt | 4.35 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/031 Validation Options.mp4 | 6.77 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/031 Validation Options_en.vtt | 4.44 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/032 Remediation and Mitigation.mp4 | 12.41 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/032 Remediation and Mitigation_en.vtt | 4.64 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/033 Understanding Scanning.mp4 | 26.83 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/033 Understanding Scanning_en.vtt | 8.58 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/034 Additional Scanning Considerations.mp4 | 9.96 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/034 Additional Scanning Considerations_en.vtt | 3.84 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/035 Inhibitors to Remediation.mp4 | 13.49 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/035 Inhibitors to Remediation_en.vtt | 4.61 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/036 Topic D Using Vulnerability Assessment Tools.mp4 | 1.23 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/036 Topic D Using Vulnerability Assessment Tools_en.vtt | 1009 B |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/037 Web Application Scanners.mp4 | 7.66 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/037 Web Application Scanners_en.vtt | 4.08 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/038 Infrastructure Scanners.mp4 | 4.61 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/038 Infrastructure Scanners_en.vtt | 3.16 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/039 Demo - Infrastructure Scanners.mp4 | 79.81 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/039 Demo - Infrastructure Scanners_en.vtt | 11.58 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/040 Software Assessments.mp4 | 7.02 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/040 Software Assessments_en.vtt | 3.81 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/041 Enumeration.mp4 | 6.59 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/041 Enumeration_en.vtt | 4.28 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/042 Demo - Enumeration.mp4 | 30.26 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/042 Demo - Enumeration_en.vtt | 9.89 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/043 Wireless Assessments.mp4 | 7.45 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/043 Wireless Assessments_en.vtt | 4.81 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/044 Cloud Assessment.mp4 | 3.45 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/044 Cloud Assessment_en.vtt | 2.38 KB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/045 Chapter 1 Review.mp4 | 2.02 MB |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/045 Chapter 1 Review_en.vtt | 989 B |
~Get Your Files Here !/01 - Chapter 1 - Managing Threats and Vulnerabilities/045 CySA-WB01.pdf | 424.18 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/001 Specialized Threats and Vulnerabilities.mp4 | 2.30 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/001 Specialized Threats and Vulnerabilities_en.vtt | 1.07 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/002 Topic A Threats and Vulnerabilities with Specialized Technology.mp4 | 785.95 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/002 Topic A Threats and Vulnerabilities with Specialized Technology_en.vtt | 529 B |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/003 Common Vulnerabilities.mp4 | 24.89 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/003 Common Vulnerabilities_en.vtt | 8.68 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/004 App Vulnerabilities.mp4 | 14.67 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/004 App Vulnerabilities_en.vtt | 4.66 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/005 Internet of Things (IoT).mp4 | 14.86 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/005 Internet of Things (IoT)_en.vtt | 4.01 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/006 Other Specialized Devices.mp4 | 11.82 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/006 Other Specialized Devices_en.vtt | 3.90 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/007 Other Specialized Devices (cont.).mp4 | 39.24 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/007 Other Specialized Devices (cont.)_en.vtt | 8.19 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/008 Topic B Threats and Vulnerabilities for Cloud Environments.mp4 | 2.07 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/008 Topic B Threats and Vulnerabilities for Cloud Environments_en.vtt | 1.52 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/009 Cloud Services Models.mp4 | 10.11 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/009 Cloud Services Models_en.vtt | 3.03 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/010 Software as a Service (SaaS).mp4 | 11.86 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/010 Software as a Service (SaaS)_en.vtt | 3.26 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/011 Platform as a Service (PaaS).mp4 | 7.17 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/011 Platform as a Service (PaaS)_en.vtt | 1.77 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/012 Infrastructure as a Service (IaaS).mp4 | 8.86 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/012 Infrastructure as a Service (IaaS)_en.vtt | 1.73 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/013 Cloud Deployment Models.mp4 | 13.94 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/013 Cloud Deployment Models_en.vtt | 4.25 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/014 Additional Cloud Concepts.mp4 | 14.51 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/014 Additional Cloud Concepts_en.vtt | 4.37 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/015 Insecure Application Programming Interface (API).mp4 | 17.77 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/015 Insecure Application Programming Interface (API)_en.vtt | 4.86 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/016 Additional Cloud Vulnerabilities.mp4 | 5.39 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/016 Additional Cloud Vulnerabilities_en.vtt | 2.98 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/017 Demo - Identifying Azure Security Vulnerabilities.mp4 | 44.38 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/017 Demo - Identifying Azure Security Vulnerabilities_en.vtt | 9.54 KB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/018 Chapter 2 Review.mp4 | 1.51 MB |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/018 Chapter 2 Review_en.vtt | 714 B |
~Get Your Files Here !/02 - Chapter 2 - Specialized Threats and Vulnerabilities/018 CySA-WB02.pdf | 268.01 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/001 Attacks and Software Vulnerability Mitigation.mp4 | 3.28 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/001 Attacks and Software Vulnerability Mitigation_en.vtt | 1.66 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/002 Topic A Understanding Attack Types.mp4 | 853.55 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/002 Topic A Understanding Attack Types_en.vtt | 662 B |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/003 Injection Attacks.mp4 | 14.99 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/003 Injection Attacks_en.vtt | 3.77 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/004 Injection Attacks (cont.).mp4 | 9.20 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/004 Injection Attacks (cont.)_en.vtt | 3.33 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/005 Directory Traversal.mp4 | 3.83 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/005 Directory Traversal_en.vtt | 1.23 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/006 Buffer Overflow Attacks.mp4 | 9.96 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/006 Buffer Overflow Attacks_en.vtt | 2.72 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/007 Privilege Escalation.mp4 | 5.77 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/007 Privilege Escalation_en.vtt | 1.55 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/008 Authentication Attacks.mp4 | 16.41 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/008 Authentication Attacks_en.vtt | 8.03 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/009 Topic B Software Vulnerabilities.mp4 | 1.76 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/009 Topic B Software Vulnerabilities_en.vtt | 1.50 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/010 Improper Error Handling.mp4 | 4.46 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/010 Improper Error Handling_en.vtt | 1.67 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/011 Dereferencing.mp4 | 2.29 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/011 Dereferencing_en.vtt | 939 B |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/012 Insecure Object Reference.mp4 | 3.54 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/012 Insecure Object Reference_en.vtt | 1.10 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/013 Race Conditions.mp4 | 3.78 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/013 Race Conditions_en.vtt | 1.33 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/014 Sensitive Data Exposure.mp4 | 4.53 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/014 Sensitive Data Exposure_en.vtt | 1.21 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/015 Additional Vulnerabilities.mp4 | 8.57 MB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/015 Additional Vulnerabilities_en.vtt | 3.98 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/016 Chapter 3 Review.mp4 | 989.53 KB |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/016 Chapter 3 Review_en.vtt | 530 B |
~Get Your Files Here !/03 - Chapter 3 - Attacks and Software Vulnerability Mitigation/016 CySA-WB03.pdf | 300.62 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/001 Infrastructure Management.mp4 | 2.96 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/001 Infrastructure Management_en.vtt | 1.53 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/002 Topic A Network Security Solutions.mp4 | 883.80 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/002 Topic A Network Security Solutions_en.vtt | 792 B |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/003 Network Architecture.mp4 | 4.87 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/003 Network Architecture_en.vtt | 1.34 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/004 Physical Network.mp4 | 2.16 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/004 Physical Network_en.vtt | 1.21 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/005 Software-Defined Network.mp4 | 4.30 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/005 Software-Defined Network_en.vtt | 816 B |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/006 Virtual Private Cloud Network.mp4 | 4.12 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/006 Virtual Private Cloud Network_en.vtt | 1.20 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/007 Virtual Private Network.mp4 | 10.21 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/007 Virtual Private Network_en.vtt | 2.69 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/008 Virtualization Solutions.mp4 | 12.03 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/008 Virtualization Solutions_en.vtt | 6.22 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/009 Network Segmentation.mp4 | 18.43 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/009 Network Segmentation_en.vtt | 5.20 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/010 Demo - Virtual Network Segmentation.mp4 | 68.40 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/010 Demo - Virtual Network Segmentation_en.vtt | 11.36 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/011 Demo - Data Collector Sets.mp4 | 56.29 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/011 Demo - Data Collector Sets_en.vtt | 12.84 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/012 Topic B Identity and Access Management.mp4 | 1.19 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/012 Topic B Identity and Access Management_en.vtt | 1022 B |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/013 IAM Concepts.mp4 | 5.71 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/013 IAM Concepts_en.vtt | 2.53 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/014 Privilege Management.mp4 | 17.85 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/014 Privilege Management_en.vtt | 5.01 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/015 Multifactor Authentication.mp4 | 8.37 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/015 Multifactor Authentication_en.vtt | 3.18 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/016 Demo - MFA Implementation.mp4 | 74.55 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/016 Demo - MFA Implementation_en.vtt | 14.66 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/017 Identity Federation.mp4 | 19.92 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/017 Identity Federation_en.vtt | 4.54 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/018 Access Control Types.mp4 | 12.05 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/018 Access Control Types_en.vtt | 4.36 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/019 Demo - Access Control.mp4 | 55.11 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/019 Demo - Access Control_en.vtt | 11.46 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/020 Cloud Access Security Broker.mp4 | 7.44 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/020 Cloud Access Security Broker_en.vtt | 2.94 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/021 Topic C Additional Solutions.mp4 | 287.46 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/021 Topic C Additional Solutions_en.vtt | 221 B |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/022 Monitoring and Logging.mp4 | 18.51 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/022 Monitoring and Logging_en.vtt | 4.17 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/023 Cryptography.mp4 | 14.24 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/023 Cryptography_en.vtt | 7.26 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/024 Demo - Encrypting File System and Certification Management.mp4 | 26.99 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/024 Demo - Encrypting File System and Certification Management_en.vtt | 6.23 KB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/025 Chapter 4 Review.mp4 | 1.30 MB |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/025 Chapter 4 Review_en.vtt | 722 B |
~Get Your Files Here !/04 - Chapter 4 - Infrastructure Management/025 CySA-WB04.pdf | 352.43 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/001 Hardware and Software Assurance.mp4 | 2.53 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/001 Hardware and Software Assurance_en.vtt | 1.17 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/002 Topic A Hardware Assurance Best Practices.mp4 | 533.07 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/002 Topic A Hardware Assurance Best Practices_en.vtt | 438 B |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/003 Hardware Root of Trust.mp4 | 15.86 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/003 Hardware Root of Trust_en.vtt | 4.04 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/004 Trusted Platform Module.mp4 | 10.88 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/004 Trusted Platform Module_en.vtt | 2.55 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/005 Demo - BitLocker Drive Encryption.mp4 | 47.04 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/005 Demo - BitLocker Drive Encryption_en.vtt | 10.67 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/006 Hardware Security Module.mp4 | 5.18 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/006 Hardware Security Module_en.vtt | 1.26 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/007 eFuse.mp4 | 4.92 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/007 eFuse_en.vtt | 1.84 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/008 Unified Extensible Firmware Interface (UEFI).mp4 | 20.46 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/008 Unified Extensible Firmware Interface (UEFI)_en.vtt | 5.34 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/009 Measured Boot and Attestation.mp4 | 3.91 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/009 Measured Boot and Attestation_en.vtt | 1.57 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/010 Additional Hardware Options.mp4 | 34.75 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/010 Additional Hardware Options_en.vtt | 10.75 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/011 Topic B Software Assurance Best Practices.mp4 | 1.63 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/011 Topic B Software Assurance Best Practices_en.vtt | 1.21 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/012 Platforms and Software Architecture.mp4 | 18.21 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/012 Platforms and Software Architecture_en.vtt | 9.07 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/013 Service-Oriented Architecture.mp4 | 19.29 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/013 Service-Oriented Architecture_en.vtt | 5.92 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/014 Software Development Lifecycle.mp4 | 14.05 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/014 Software Development Lifecycle_en.vtt | 5.88 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/015 Software Assessment Methods.mp4 | 15.03 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/015 Software Assessment Methods_en.vtt | 6.39 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/016 Secure Coding.mp4 | 13.00 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/016 Secure Coding_en.vtt | 6.68 KB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/017 Chapter 5 Review.mp4 | 1.39 MB |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/017 Chapter 5 Review_en.vtt | 702 B |
~Get Your Files Here !/05 - Chapter 5 - Hardware and Software Assurance/017 CySA-WB05.pdf | 269.22 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/001 Monitoring Security Options.mp4 | 2.60 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/001 Monitoring Security Options_en.vtt | 1.37 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/002 Topic A Security Data Analytics.mp4 | 553.79 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/002 Topic A Security Data Analytics_en.vtt | 347 B |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/003 Monitoring Fundamentals.mp4 | 4.14 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/003 Monitoring Fundamentals_en.vtt | 1.42 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/004 Aggregating Data.mp4 | 11.54 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/004 Aggregating Data_en.vtt | 3.24 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/005 Data Analysis.mp4 | 21.46 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/005 Data Analysis_en.vtt | 7.66 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/006 Topic B Endpoint and Network Analysis.mp4 | 731.74 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/006 Topic B Endpoint and Network Analysis_en.vtt | 569 B |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/007 Endpoint Security.mp4 | 33.84 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/007 Endpoint Security_en.vtt | 8.29 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/008 Network Analysis.mp4 | 19.92 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/008 Network Analysis_en.vtt | 8.08 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/009 Log Review.mp4 | 21.84 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/009 Log Review_en.vtt | 7.90 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/010 Demo - Logging and Monitoring.mp4 | 48.38 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/010 Demo - Logging and Monitoring_en.vtt | 7.76 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/011 Impact Analysis.mp4 | 3.34 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/011 Impact Analysis_en.vtt | 1.36 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/012 Topic C Email Analysis.mp4 | 614.23 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/012 Topic C Email Analysis_en.vtt | 607 B |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/013 Social Engineering.mp4 | 3.71 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/013 Social Engineering_en.vtt | 1.08 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/014 Anti-SPAM.mp4 | 17.72 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/014 Anti-SPAM_en.vtt | 3.79 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/015 Demo - Configuring Anti-Spam Options in Exchange Online.mp4 | 32.22 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/015 Demo - Configuring Anti-Spam Options in Exchange Online_en.vtt | 5.09 KB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/016 Chapter 6 Review.mp4 | 1.70 MB |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/016 Chapter 6 Review_en.vtt | 828 B |
~Get Your Files Here !/06 - Chapter 6 - Monitoring Security Options/016 CySA-WB06.pdf | 280.14 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/001 Implementing Security Changes.mp4 | 3.36 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/001 Implementing Security Changes_en.vtt | 1.56 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/002 Topic A Security Configuration Management.mp4 | 1.74 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/002 Topic A Security Configuration Management_en.vtt | 1.22 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/003 Fundamental Identity Configuration.mp4 | 14.15 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/003 Fundamental Identity Configuration_en.vtt | 8.80 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/004 Software Controls.mp4 | 9.08 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/004 Software Controls_en.vtt | 4.74 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/005 Firewalls.mp4 | 12.64 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/005 Firewalls_en.vtt | 5.41 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/006 Intrusion Detection Systems (IDS).mp4 | 12.94 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/006 Intrusion Detection Systems (IDS)_en.vtt | 3.08 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/007 Data Loss Prevention.mp4 | 12.63 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/007 Data Loss Prevention_en.vtt | 3.07 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/008 Endpoint Detection and Response.mp4 | 5.16 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/008 Endpoint Detection and Response_en.vtt | 2.03 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/009 Network Access Control.mp4 | 18.52 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/009 Network Access Control_en.vtt | 5.97 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/010 Additional Techniques.mp4 | 6.67 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/010 Additional Techniques_en.vtt | 2.57 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/011 Topic B Threat Hunting.mp4 | 1.29 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/011 Topic B Threat Hunting_en.vtt | 1.24 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/012 Understanding Threat Hunting.mp4 | 9.77 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/012 Understanding Threat Hunting_en.vtt | 2.67 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/013 Threat Hunting Process.mp4 | 10.19 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/013 Threat Hunting Process_en.vtt | 4.50 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/014 Establishing Hypothesis.mp4 | 2.87 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/014 Establishing Hypothesis_en.vtt | 1.65 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/015 Profiling Threat Actors.mp4 | 6.52 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/015 Profiling Threat Actors_en.vtt | 2.42 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/016 Threat Hunting Tactics.mp4 | 25.85 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/016 Threat Hunting Tactics_en.vtt | 8.20 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/017 Attack Surface Reduction.mp4 | 3.95 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/017 Attack Surface Reduction_en.vtt | 1.13 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/018 Topic C Automating Security.mp4 | 1.45 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/018 Topic C Automating Security_en.vtt | 1.20 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/019 Security Automation Concepts.mp4 | 4.10 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/019 Security Automation Concepts_en.vtt | 938 B |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/020 Workflow Orchestration.mp4 | 7.60 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/020 Workflow Orchestration_en.vtt | 2.17 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/021 Orchestration Playbooks.mp4 | 7.45 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/021 Orchestration Playbooks_en.vtt | 3.21 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/022 Scripting.mp4 | 4.65 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/022 Scripting_en.vtt | 2.40 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/023 API Integration.mp4 | 4.25 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/023 API Integration_en.vtt | 1.78 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/024 REST Principles.mp4 | 8.96 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/024 REST Principles_en.vtt | 3.72 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/025 Security Content Automation Protocol.mp4 | 6.85 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/025 Security Content Automation Protocol_en.vtt | 1.83 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/026 Software Engineering.mp4 | 3.18 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/026 Software Engineering_en.vtt | 1.99 KB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/027 Chapter 7 Review.mp4 | 1.61 MB |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/027 Chapter 7 Review_en.vtt | 797 B |
~Get Your Files Here !/07 - Chapter 7 - Implementing Security Changes/027 CySA-WB07.pdf | 300.15 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/001 Incident Response.mp4 | 5.06 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/001 Incident Response_en.vtt | 2.10 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/002 Topic A Importance of Incident Response.mp4 | 829.36 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/002 Topic A Importance of Incident Response_en.vtt | 601 B |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/003 Incident Response Process.mp4 | 5.70 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/003 Incident Response Process_en.vtt | 1.30 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/004 Establishing Communications Processes.mp4 | 20.72 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/004 Establishing Communications Processes_en.vtt | 4.69 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/005 Internal Communications.mp4 | 3.87 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/005 Internal Communications_en.vtt | 1.97 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/006 External Communications.mp4 | 10.26 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/006 External Communications_en.vtt | 4.93 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/007 Identifying Critical Data.mp4 | 24.36 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/007 Identifying Critical Data_en.vtt | 7.60 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/008 Topic B Incident Response Procedures.mp4 | 1.36 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/008 Topic B Incident Response Procedures_en.vtt | 1.05 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/009 Incident Response Cycle.mp4 | 3.49 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/009 Incident Response Cycle_en.vtt | 1.46 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/010 Preparation Phase.mp4 | 26.28 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/010 Preparation Phase_en.vtt | 7.86 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/011 Detection and Analysis.mp4 | 31.04 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/011 Detection and Analysis_en.vtt | 10.72 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/012 Containment.mp4 | 6.22 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/012 Containment_en.vtt | 1.99 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/013 Containment Types.mp4 | 10.55 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/013 Containment Types_en.vtt | 6.23 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/014 Eradication and Recovery.mp4 | 22.47 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/014 Eradication and Recovery_en.vtt | 6.80 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/015 Eradication and Recovery (cont.).mp4 | 8.16 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/015 Eradication and Recovery (cont.)_en.vtt | 3.14 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/016 Post-Incident Activities.mp4 | 11.74 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/016 Post-Incident Activities_en.vtt | 4.75 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/017 Topic C Analyzing Indicators of Compromise.mp4 | 1.54 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/017 Topic C Analyzing Indicators of Compromise_en.vtt | 1.21 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/018 Network-related Indicators.mp4 | 40.74 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/018 Network-related Indicators_en.vtt | 13.20 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/019 Host-related Indicators.mp4 | 55.60 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/019 Host-related Indicators_en.vtt | 14.02 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/020 Application-related Indicators.mp4 | 15.96 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/020 Application-related Indicators_en.vtt | 6.61 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/021 Demo - Analyzing IoCs.mp4 | 115.77 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/021 Demo - Analyzing IoCs_en.vtt | 16.98 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/022 Topic D Utilizing Digital Forensics Techniques.mp4 | 740.82 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/022 Topic D Utilizing Digital Forensics Techniques_en.vtt | 548 B |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/023 Digital Forensics.mp4 | 11.98 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/023 Digital Forensics_en.vtt | 3.67 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/024 Using Network Tools.mp4 | 15.33 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/024 Using Network Tools_en.vtt | 3.37 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/025 Demo - Using Wireshark.mp4 | 21.55 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/025 Demo - Using Wireshark_en.vtt | 3.49 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/026 Capturing Endpoint Systems.mp4 | 10.27 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/026 Capturing Endpoint Systems_en.vtt | 4.32 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/027 Additional Forensics Situations.mp4 | 6.30 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/027 Additional Forensics Situations_en.vtt | 3.43 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/028 Building a Forensics Kit.mp4 | 11.50 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/028 Building a Forensics Kit_en.vtt | 4.48 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/029 Chapter 8 Review.mp4 | 2.70 MB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/029 Chapter 8 Review_en.vtt | 1.06 KB |
~Get Your Files Here !/08 - Chapter 8 - Incident Response/029 CySA-WB08.pdf | 340.03 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/001 Compliance and Assessment.mp4 | 2.90 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/001 Compliance and Assessment_en.vtt | 1.54 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/002 Topic A Data Privacy and Protection.mp4 | 163.76 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/002 Topic A Data Privacy and Protection_en.vtt | 107 B |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/003 Security vs. Privacy.mp4 | 5.69 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/003 Security vs. Privacy_en.vtt | 1.86 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/004 Data Types.mp4 | 1.78 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/004 Data Types_en.vtt | 1020 B |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/005 Legal Requirements.mp4 | 12.07 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/005 Legal Requirements_en.vtt | 2.85 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/006 Nontechnical Controls.mp4 | 15.76 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/006 Nontechnical Controls_en.vtt | 5.84 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/007 Data Retention Standards.mp4 | 5.38 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/007 Data Retention Standards_en.vtt | 2.35 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/008 Technical Controls.mp4 | 35.90 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/008 Technical Controls_en.vtt | 8.28 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/009 Data Loss Prevention.mp4 | 13.60 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/009 Data Loss Prevention_en.vtt | 4.68 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/010 Demo - Implementing DLP.mp4 | 50.71 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/010 Demo - Implementing DLP_en.vtt | 11.26 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/011 Topic B Risk Mitigation.mp4 | 1.50 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/011 Topic B Risk Mitigation_en.vtt | 1.45 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/012 Business Impact Analysis.mp4 | 8.79 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/012 Business Impact Analysis_en.vtt | 2.37 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/013 BIA Steps.mp4 | 4.63 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/013 BIA Steps_en.vtt | 1.18 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/014 Risk Assessment.mp4 | 6.16 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/014 Risk Assessment_en.vtt | 1.44 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/015 Risk Identification Process.mp4 | 3.78 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/015 Risk Identification Process_en.vtt | 2.18 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/016 Risk Calculation.mp4 | 7.71 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/016 Risk Calculation_en.vtt | 2.79 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/017 Risk Prioritization.mp4 | 4.56 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/017 Risk Prioritization_en.vtt | 2.97 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/018 Security Controls.mp4 | 8.88 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/018 Security Controls_en.vtt | 3.86 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/019 Training and Exercises.mp4 | 14.07 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/019 Training and Exercises_en.vtt | 5.51 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/020 Topic C Policies and Procedures.mp4 | 849.36 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/020 Topic C Policies and Procedures_en.vtt | 639 B |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/021 Code of Conduct.mp4 | 28.20 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/021 Code of Conduct_en.vtt | 9.21 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/022 Control Types.mp4 | 6.61 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/022 Control Types_en.vtt | 2.93 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/023 Audits and Assessment.mp4 | 11.98 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/023 Audits and Assessment_en.vtt | 4.76 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/024 Chapter 9 Review.mp4 | 2.09 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/024 Chapter 9 Review_en.vtt | 1.04 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/024 CySA-WB09.pdf | 361.93 KB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/025 Course Closure.mp4 | 18.27 MB |
~Get Your Files Here !/09 - Chapter 9 - Compliance and Assessment/025 Course Closure_en.vtt | 3.82 KB |
~Get Your Files Here !/Bonus Resources.txt | 386 B |
No trackers found |
TorrentBank
Copyright © 2024