Cybrary - Become a SOC Analyst - Level 1 - TorrentBank

File Name:Cybrary - Become a SOC Analyst - Level 1

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:9.41 GB

File Count:413

File Hash:53e7ef410d9692d73cd4cf9d164dc1859a17db2d

Magnet Link:

Magnet Link:

Torrent File:

01. Welcome to the SOC Analyst Level 1 Career Path/Module 1_ Welcome to the SOC Analyst Level 1 Career Path/1.1 Welcome to the SOC Analyst Level 1 Career Path.mp4 42.03 MB
01. Welcome to the SOC Analyst Level 1 Career Path/Module 1_ Welcome to the SOC Analyst Level 1 Career Path/1.1 Welcome to the SOC Analyst Level 1 Career Path.vtt 4.31 KB
02. Kali Linux Fundamentals/Module 1 - Introduction/1.1 Intro-Instructor Welcome and Objectives(KL).mp4 3.99 MB
02. Kali Linux Fundamentals/Module 1 - Introduction/1.2 Intro-Disclaimer(KL).mp4 6.01 MB
02. Kali Linux Fundamentals/Module 2/2.1 The Beginning (KL).mp4 22.67 MB
02. Kali Linux Fundamentals/Module 2/2.2 Getting Kali up and Running (KL).mp4 22.34 MB
02. Kali Linux Fundamentals/Module 2/2.3 Moving Around (KL).mp4 43.78 MB
02. Kali Linux Fundamentals/Module 2/2.4 Module Summary (KL).mp4 2.84 MB
02. Kali Linux Fundamentals/Module 3/3.1 The Terminal (KL).mp4 37.09 MB
02. Kali Linux Fundamentals/Module 3/3.2 File System (KL).mp4 26.96 MB
02. Kali Linux Fundamentals/Module 3/3.3 Useful Commands (KL).mp4 42.24 MB
02. Kali Linux Fundamentals/Module 3/3.4 Summary (KL).mp4 3.95 MB
02. Kali Linux Fundamentals/Module 4/4.1 Basic Network Commands (KL).mp4 30.58 MB
02. Kali Linux Fundamentals/Module 4/4.2 Services (KL).mp4 26.24 MB
02. Kali Linux Fundamentals/Module 4/4.3 Managing Users (KL).mp4 12.77 MB
02. Kali Linux Fundamentals/Module 4/4.4 Summary (KL).mp4 2.96 MB
02. Kali Linux Fundamentals/Module 5/5.1 Troubleshooting Basics (KL).mp4 29.74 MB
02. Kali Linux Fundamentals/Module 5/5.2 The Tools Chest (KL).mp4 27.44 MB
02. Kali Linux Fundamentals/Module 5/5.3 Summary (KL).mp4 1.76 MB
02. Kali Linux Fundamentals/Resources/1. Syllabus and Outline.pdf 224.64 KB
02. Kali Linux Fundamentals/Resources/2. Module 1 Quiz.pdf 26.34 KB
02. Kali Linux Fundamentals/Resources/3. Module 2 Quiz.pdf 22.43 KB
02. Kali Linux Fundamentals/Resources/4. Module 3 Quiz.pdf 20.82 KB
02. Kali Linux Fundamentals/Resources/5. Study Guide.pdf 170.76 KB
02. Kali Linux Fundamentals/Resources/6. Glossary.pdf 176.25 KB
03. Command Line Basics/Module 1 - Introduction to the Command Line/1.1 Introduction and Setup.mp4 44.51 MB
03. Command Line Basics/Module 1 - Introduction to the Command Line/1.2 Opening the Command Line.mp4 33.32 MB
03. Command Line Basics/Module 1 - Introduction to the Command Line/1.3 Asking for Help.mp4 71.72 MB
03. Command Line Basics/Module 2 - Introductory Commands/2.1 Command Line Survival Part 1.mp4 55.64 MB
03. Command Line Basics/Module 2 - Introductory Commands/2.2 Command Line Survival Part 2.mp4 41.41 MB
03. Command Line Basics/Module 2 - Introductory Commands/2.3 Changing Directories.mp4 46.54 MB
03. Command Line Basics/Module 2 - Introductory Commands/2.4 Common Linux Tools.mp4 89.73 MB
03. Command Line Basics/Module 2 - Introductory Commands/2.5 Windows Common Tools.mp4 46.49 MB
03. Command Line Basics/Module 2 - Introductory Commands/2.6 Copy and Paste in Windows Command.mp4 19.44 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.01 Linux Basics Part 1.mp4 34.20 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.02 Linux Basics Part 2.mp4 37.77 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.03 Linux Basics Part 3.mp4 43.80 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.04 Linux Files Part 1.mp4 31.93 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.05 Linux Files Part 2.mp4 36.56 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.06 Linux Files Part 3.mp4 42.95 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.07 Linux Files Part 4.mp4 31.41 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.08 Linux Files Part 5.mp4 35.70 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.09 Linux System Part 1.mp4 33.61 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.10 Linux System Part 2.mp4 38.55 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.11 Linux Networking Part 1.mp4 53.20 MB
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.12 Linux Networking Part 2.mp4 70.14 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.01 Windows Basis.mp4 37.00 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.02 Windows Files Part 1.mp4 30.48 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.03 Windows Files Part 2.mp4 37.95 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.04 Windows System Part 1.mp4 28.03 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.05 Windows System Part 2.mp4 38.52 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.06 Windows System Part 3.mp4 24.21 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.07 Windows Networking Part 1.mp4 41.67 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.08 Windows Networking Part 2.mp4 31.68 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.09 Windows Networking Part 3.mp4 29.06 MB
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.10 Net Command.mp4 40.96 MB
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.1 Windows Advanced Piping and Ampersands.mp4 35.73 MB
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.2 Windows Command Redirection.mp4 44.25 MB
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.3 For and While Loops.mp4 32.58 MB
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.4 Linux Shell Scripting.mp4 21.83 MB
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.5 Windows Batch Scripting.mp4 20.80 MB
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.6 Conclusion.mp4 14.17 MB
03. Command Line Basics/Resources/1. Syllabus and Outline.mp4 203.98 KB
03. Command Line Basics/Resources/2. Study Guide.pdf 388.28 KB
03. Command Line Basics/Resources/3. Glossary.pdf 154.55 KB
03. Command Line Basics/Resources/4. Command Categories.pdf 96.00 KB
05. Malware Threats/Module 1 - Introduction/1.1 Introduction.mp4 11.56 MB
05. Malware Threats/Module 1 - Introduction/1.2 Malware Introduction.mp4 24.56 MB
05. Malware Threats/Module 2 - Analyze Malware/2.1 Analyze and Classify Malware Lab Part 1.mp4 40.68 MB
05. Malware Threats/Module 2 - Analyze Malware/2.2 Analyze and Classify Malware Lab Part 2.mp4 18.26 MB
05. Malware Threats/Module 2 - Analyze Malware/2.3 Rootkit Lab Part 1.mp4 56.52 MB
05. Malware Threats/Module 2 - Analyze Malware/2.4 Rootkit Lab Part 2.mp4 59.24 MB
05. Malware Threats/Module 2 - Analyze Malware/2.5 Rootkit Lab Part 3.mp4 51.41 MB
05. Malware Threats/Module 3 - Conclusion/3.1 Conclusion.mp4 7.47 MB
05. Malware Threats/Resources/1. Syllabus and Outline.pdf 100.54 KB
05. Malware Threats/Resources/2. Module 2 - Analyze and Classify Malware Lab.pdf 101.30 KB
05. Malware Threats/Resources/3. Module 2 - Rootkit Lab.pdf 116.46 KB
07. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.1 Introduction.mp4 8.25 MB
07. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.2 The Cyber Kill Chain.mp4 22.19 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.1 Reconnaissance 1.mp4 58.89 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.2 Reconnaissance 2.mp4 32.35 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.3 Reconnaissance 3.mp4 27.88 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.4 Weaponization.mp4 29.22 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.5 Delivery.mp4 31.18 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.6 Exploitation and Installation.mp4 26.01 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.7 Command and Control.mp4 28.00 MB
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.8 Action on Objectives.mp4 35.61 MB
07. Cybersecurity Kill Chain™/Module 3 - Defense in Depth Using the Cyber Kill Chain/3.1 Defense in Depth.mp4 17.12 MB
07. Cybersecurity Kill Chain™/Module 4 - Conclusion/4.1 Conclusion.mp4 17.39 MB
07. Cybersecurity Kill Chain™/Resources/1. Syllabus and Outline.pdf 240.61 KB
07. Cybersecurity Kill Chain™/Resources/2. Study Guide.pdf 377.93 KB
07. Cybersecurity Kill Chain™/Resources/3. Glossary.pdf 201.84 KB
07. Cybersecurity Kill Chain™/Resources/4. Module 2 - Weaponization Lab Using MSFvenom Step by Step Guide.pdf 208.68 KB
07. Cybersecurity Kill Chain™/Resources/5. Fingerprinting Using Nmap Step by Step Guide.pdf 207.19 KB
07. Cybersecurity Kill Chain™/Resources/6. Footprinting Using Passive Tools - NsLookup Step by Step Guide.pdf 211.59 KB
07. Cybersecurity Kill Chain™/Resources/7. Footprinting Using Passive Tools - Websites Step by Step Guide.pdf 251.82 KB
07. Cybersecurity Kill Chain™/Resources/8. Footprinting Using Passive Tools - Whois Step by Step Guide.pdf 224.06 KB
07. Cybersecurity Kill Chain™/Resources/9. Additional Resources.pdf 147.13 KB
08. Post Exploitation Hacking/Section 1/1.1 Post Exploitation Hacking Introduction.mp4 36.94 MB
08. Post Exploitation Hacking/Section 1/1.2 Basics of Networking Mac & IP Addressing.mp4 27.81 MB
08. Post Exploitation Hacking/Section 1/1.3 Basics of Networking - Tcp; Udp; Icmp.mp4 16.38 MB
08. Post Exploitation Hacking/Section 1/1.4 Basics of Networking - Headers.mp4 35.51 MB
08. Post Exploitation Hacking/Section 1/1.5 Introduction Information Gathering.mp4 15.11 MB
08. Post Exploitation Hacking/Section 2/2.01 Linux Host Information Gathering (part 1) Ifconfig.mp4 33.99 MB
08. Post Exploitation Hacking/Section 2/2.02 Linux Host Information Gathering (part 2) netstat.mp4 68.86 MB
08. Post Exploitation Hacking/Section 2/2.03 Linux Host Information Gathering (part 3) Nsswitch.conf.info.mp4 27.36 MB
08. Post Exploitation Hacking/Section 2/2.04 Linux Tools Lab (part 1) Ifconfig, Arp, Netstat.mp4 36.96 MB
08. Post Exploitation Hacking/Section 2/2.05 Linux Tools Lab (part 2) Resolv.conf, Nmap, Nsswitch.mp4 30.53 MB
08. Post Exploitation Hacking/Section 2/2.06 Linux Scanning Lab.mp4 67.87 MB
08. Post Exploitation Hacking/Section 2/2.07 Linux Network Information Gathering Lecture (part 1).mp4 53.24 MB
08. Post Exploitation Hacking/Section 2/2.08 Linux Network Information Gathering Lecture (part 2).mp4 54.81 MB
08. Post Exploitation Hacking/Section 2/2.09 Linux Sniffing.mp4 78.73 MB
08. Post Exploitation Hacking/Section 2/2.10 Windows Host Tools (part 1).mp4 39.89 MB
08. Post Exploitation Hacking/Section 2/2.11 Windows Host Information Gathering Lecture.mp4 68.65 MB
08. Post Exploitation Hacking/Section 2/2.12 Windows Host Tools (part 2).mp4 37.89 MB
08. Post Exploitation Hacking/Section 2/2.13 Windows Network Tools Lab.mp4 46.80 MB
08. Post Exploitation Hacking/Section 2/2.14 Windows Network Information Gathering Lecture (part 1).mp4 46.21 MB
08. Post Exploitation Hacking/Section 2/2.15 Windows Network Information Gathering Lecture (part 2).mp4 48.98 MB
08. Post Exploitation Hacking/Section 2/2.16 Windows Network Information Gathering Lecture (part 3).mp4 26.94 MB
08. Post Exploitation Hacking/Section 3/3.01 Introduction Part 3 Persistence & Backdooring.mp4 11.91 MB
08. Post Exploitation Hacking/Section 3/3.02 Tftp Use Lab.mp4 40.54 MB
08. Post Exploitation Hacking/Section 3/3.03 Enabling Rdp Windows Lab.mp4 26.41 MB
08. Post Exploitation Hacking/Section 3/3.04 Rdp Lecture.mp4 56.85 MB
08. Post Exploitation Hacking/Section 3/3.05 Ncat Backdoor Lecture.mp4 34.35 MB
08. Post Exploitation Hacking/Section 3/3.06 Windows Ncat Backdoor Lab.mp4 57.76 MB
08. Post Exploitation Hacking/Section 3/3.07 New User Backdoor Lecture.mp4 26.17 MB
08. Post Exploitation Hacking/Section 3/3.08 Windows New User Backdoor Lab.mp4 40.73 MB
08. Post Exploitation Hacking/Section 3/3.09 Batch Schtasks At (part 1).mp4 33.39 MB
08. Post Exploitation Hacking/Section 3/3.10 Batch Schtasks At (part 2) Windows Scheduling.mp4 53.25 MB
08. Post Exploitation Hacking/Section 3/3.11 Linux Bash History - Touch - Lab.mp4 43.50 MB
08. Post Exploitation Hacking/Section 4/4.1 Linux Bash History - Covering Tracks.mp4 40.79 MB
08. Post Exploitation Hacking/Section 4/4.2 Password Cracking Concepts.mp4 61.04 MB
08. Post Exploitation Hacking/Section 4/4.3 Windows Logs, Timestamps, & Passwords Lecture.mp4 72.16 MB
08. Post Exploitation Hacking/Section 4/4.4 Windows Clearing Event Logs.mp4 37.67 MB
08. Post Exploitation Hacking/Section 4/4.5 Windows Passwords.mp4 33.10 MB
08. Post Exploitation Hacking/Section 4/4.6 Conclusion.mp4 46.72 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 1 - Introduction/1.1 Scanning & Enumeration Introduction.mp4 12.27 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.1 Checking for Live Systems Lab Part 1.mp4 38.24 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.2 Checking for Live Systems Lab Part 2.mp4 41.61 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.3 Checking for Open Ports Lab Part 1.mp4 34.85 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.4 Checking for Open Ports Lab Part 2.mp4 26.09 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.01 Scanning Introduction.mp4 21.91 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.02 Scanning with with NMAP Half Connect Scan.mp4 20.60 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.03 Scanning with NMAP Full Connect Scan.mp4 11.72 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.04 Scanning with XMAS Scan Part 1.mp4 16.58 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.05 Scanning with XMAS Scan Part 2.mp4 20.01 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.06 Scanning with NMAP ACK Scan.mp4 17.63 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.07 Scanning with NMAP ACK Scan and Windows Firewall.mp4 25.36 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.08 Scanning with hping3 and SYN Scan.mp4 32.87 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.09 Scanning with hping3 and ACK Scan.mp4 19.70 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.10 Scanning with hping3 and XMAS Scan.mp4 30.77 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.11 Scanning with hping3, ACK Scan, and Windows Firewall.mp4 27.46 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.1 OS Fingerprinting.mp4 41.31 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.2 Banner Grabbing.mp4 44.80 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.1 Zenmap.mp4 44.91 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.2 Dig and Finger Commands.mp4 35.78 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.1 Vulnerability Scanner Setup and Configuration of Core Impact Part 1.mp4 35.32 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.2 Vulnerability Scanner Setup and Configuration of Core Impact Part 2.mp4 34.25 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.3 Vulnerability Scanner Setup and Configuration of OpenVAS Part 1.mp4 35.85 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.4 Vulnerability Scanner Setup and Configuration of OpenVAS Part 2.mp4 55.89 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.1 Vulnerability Scan Assessment Overview.mp4 6.56 MB
09. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.2 Scanning, Enumerations, & Vulnerabilities Conclusion.mp4 17.35 MB
09. Scanning, Enumeration, and Vulnerabilities/Resources/01. Scanning & Enumeration Glossary.pdf 229.97 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/02. Scanning & Enumeration Study Guide.pdf 197.21 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/03. Scanning & Enumeration Step by Step Guide - Module 2 Lab 1.pdf 172.75 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/04. Scanning & Enumeration Step by Step Guide - Module 2 Lab 2.pdf 143.53 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/05. Scanning & Enumeration Step by Step Guide - Module 3 Lab.pdf 171.91 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/06. Scanning & Enumeration Step by Step Guide - Module 4 Lab 1.pdf 106.58 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/07. Scanning & Enumeration Step by Step Guide - Module 4 Lab 2.pdf 106.69 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/08. Scanning & Enumeration Step by Step Guide - Module 5 Lab.pdf 87.72 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/09. Scanning & Enumeration Step by Step Guide - Module 6 Lab 1.pdf 116.84 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/10. Scanning & Enumeration Step by Step Guide - Module 6 Lab 2.pdf 118.77 KB
09. Scanning, Enumeration, and Vulnerabilities/Resources/11. Scanning & Enumeration Scanning Assessment.pdf 112.63 KB
10. OWASP Top 10/Module 01 - Introduction/1.1 OWASP Introduction.mp4 12.75 MB
10. OWASP Top 10/Module 01 - Introduction/1.2 Differences Between 2013 and 2017.mp4 15.01 MB
10. OWASP Top 10/Module 02 - Injection/2.1 Vulnerabilities and Attacks.mp4 19.91 MB
10. OWASP Top 10/Module 02 - Injection/2.2 SQL Injection Lab Instructions Part 1.mp4 44.50 MB
10. OWASP Top 10/Module 02 - Injection/2.3 SQL Injection Lab Instructions Part 2.mp4 36.58 MB
10. OWASP Top 10/Module 02 - Injection/2.4 Command Injection Lab Instructions.mp4 41.77 MB
10. OWASP Top 10/Module 02 - Injection/2.5 HTML Injection Lab Instructions.mp4 38.20 MB
10. OWASP Top 10/Module 03 - Broken Authentication/3.1 Broken Authentication.mp4 23.01 MB
10. OWASP Top 10/Module 03 - Broken Authentication/3.2 Broken Authentication Lab Instructions Part 1.mp4 36.28 MB
10. OWASP Top 10/Module 03 - Broken Authentication/3.3 Broken Authentication Lab Instructions Part 2.mp4 24.54 MB
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.1 Sensitive Data Exposure.mp4 17.95 MB
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.2 Sensitive Data Exposure NIKTO Lab Instructions Part 1.mp4 50.01 MB
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.3 Sensitive Data Exposure NIKTO Lab Instructions Part 2.mp4 68.45 MB
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.4 Sensitive Data Exposure DIRBUSTER Lab Instructions.mp4 39.69 MB
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.5 Sensitive Data Exposure ERROR MESSAGES Lab Instructions.mp4 21.20 MB
10. OWASP Top 10/Module 05 - XML External Entities/5.1 XML External Entities.mp4 13.02 MB
10. OWASP Top 10/Module 05 - XML External Entities/5.2 XML External Entities Lab Instruction Part 1.mp4 43.76 MB
10. OWASP Top 10/Module 05 - XML External Entities/5.3 XML External Entities Lab Instruction Part 2.mp4 27.26 MB
10. OWASP Top 10/Module 06 - Broken Access Control/6.1 Broken Access Control.mp4 15.82 MB
10. OWASP Top 10/Module 06 - Broken Access Control/6.2 Broken Access Control Lab Instructions Part 1.mp4 52.11 MB
10. OWASP Top 10/Module 06 - Broken Access Control/6.3 Broken Access Control Lab Instructions Part 2.mp4 32.23 MB
10. OWASP Top 10/Module 07 - Security Misconfiguration/7.1 Security Misconfigurations.mp4 12.54 MB
10. OWASP Top 10/Module 07 - Security Misconfiguration/7.2 Security Misconfiguration Lab Instructions Part 1.mp4 47.57 MB
10. OWASP Top 10/Module 07 - Security Misconfiguration/7.3 Security Misconfiguration Lab Instructions Part 2.mp4 55.26 MB
10. OWASP Top 10/Module 08 - Cross-Site Scripting (XSS)/8.1 XSS.mp4 14.35 MB
10. OWASP Top 10/Module 08 - Cross-Site Scripting (XSS)/8.2 Reflected XSS Attack Lab Instructions.mp4 61.18 MB
10. OWASP Top 10/Module 09 - Insecure Deserialization/9.1 Insecure Deserialization.mp4 14.38 MB
10. OWASP Top 10/Module 09 - Insecure Deserialization/9.2 Insecure Deserialization Lab Instructions.mp4 43.33 MB
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.1 Using Components with Known Vulnerabilities.mp4 16.99 MB
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.2 Using Components with Known Vulnerabilities Lab Instructions Part 1.mp4 56.13 MB
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.3 Using Components with Known Vulnerabilities Lab Instructions Part 2.mp4 63.91 MB
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.4 Using Components with Known Vulnerabilities Lab Instructions Part 3.mp4 41.60 MB
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.1 Insufficient Monitoring & Logging Overview.mp4 18.05 MB
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.2 Insufficient Logging & Monitoring Lab Instructions Part 1.mp4 58.97 MB
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.3 Insufficient Logging & Monitoring Lab Instructions Part 2.mp4 28.36 MB
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.4 OWASP Capstone Lab Instructions.mp4 11.91 MB
10. OWASP Top 10/Module 12 - Course Summary/12.1 OWASP Course Summary.mp4 30.64 MB
10. OWASP Top 10/Resources/01. Syllabus and Outline.pdf 172.54 KB
10. OWASP Top 10/Resources/02. Study Guide OWASP.pdf 313.74 KB
10. OWASP Top 10/Resources/03. Glossary OWASP.pdf 214.84 KB
10. OWASP Top 10/Resources/04. Module 2 - Step by Step Guide - Injection Lab.pdf 203.37 KB
10. OWASP Top 10/Resources/05. Module 3 - Step by Step Guide - Broken Authentication Lab.pdf 154.91 KB
10. OWASP Top 10/Resources/06. Module 4 - Step by Step Guide - Sensitive Data Exposure Lab.pdf 201.40 KB
10. OWASP Top 10/Resources/07. Module 5 - Step by Step Guide - XML External Entities Lab.pdf 184.83 KB
10. OWASP Top 10/Resources/08. Module 6 - Step by Step Guide - Broken Access Control Lab.pdf 188.64 KB
10. OWASP Top 10/Resources/09. Module 7 - Step by Step Guide - Security Misconfiguration Lab.pdf 202.11 KB
10. OWASP Top 10/Resources/10. Module 8 - Step by Step Guide - Cross Site Scripting XSS Lab.pdf 186.37 KB
10. OWASP Top 10/Resources/11. Module 9 - Step by Step Guide - Insecure Deserialization Lab.pdf 184.17 KB
10. OWASP Top 10/Resources/12. Module 10 - Step by Step Guide - Using Components with Known Vulnerabilities Lab.pdf 192.58 KB
10. OWASP Top 10/Resources/13. Module 11 - Step by Step Guide - Insufficient Logging and Monitoring Lab.pdf 184.54 KB
11. Sniffing/Module 1 - Introduction/1.1 Introduction.mp4 8.85 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.01 Wireshark Lab Part 1.mp4 40.15 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.02 Wireshark Lab Part 2.mp4 46.76 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.03 Wireshark Lab Part 3.mp4 36.90 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.04 Packet Sniffing Lab Part 1.mp4 44.34 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.05 Packet Sniffing Lab Part 2.mp4 22.58 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.06 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4 52.87 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.07 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 76.09 MB
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.08 TCPDUMP Lab.mp4 50.16 MB
11. Sniffing/Module 3 - Conclusion/3.1 Capstone Lab Navigation.mp4 7.56 MB
11. Sniffing/Module 3 - Conclusion/3.2 Conclusion.mp4 6.70 MB
11. Sniffing/Resources/01. Syllabus and Outline.pdf 243.52 KB
11. Sniffing/Resources/02. Glossary.pdf 365.65 KB
11. Sniffing/Resources/03. Study Guide.pdf 324.64 KB
11. Sniffing/Resources/04. Lab 1 Wireshark - Step by Step Guide.pdf 141.86 KB
11. Sniffing/Resources/05. Lab 2 Packet Sniffing - Step by Step Guide.pdf 136.38 KB
11. Sniffing/Resources/06. Lab 3 Applying Filters to TCPDump and Wireshark - Step by Step Guide.pdf 142.14 KB
11. Sniffing/Resources/07. Lab 4 TCPDump - Step by Step Guide.pdf 129.77 KB
11. Sniffing/Resources/08. TCPDump Cheat Sheet.pdf 161.28 KB
11. Sniffing/Resources/09. Wireshark Cheat Sheet.pdf 272.37 KB
11. Sniffing/Resources/10. Wireshark & TCPDump - Instructor Notes.pdf 531.80 KB
11. Sniffing/Resources/11. Wireshark Filters.pdf 189.41 KB
11. Sniffing/Resources/12. Wireshark & TCPDump Sources.pdf 111.41 KB
12. Introduction to Splunk/Module 1 - Introduction/1.1 Welcome.mp4 16.11 MB
12. Introduction to Splunk/Module 1 - Introduction/1.2 What is Splunk.mp4 16.90 MB
12. Introduction to Splunk/Module 1 - Introduction/1.3 Splunk and Your Career.mp4 28.95 MB
12. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.1 Splunk Products, Resources, and Certifications.mp4 2.99 MB
12. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.2 Splunk Website.mp4 25.80 MB
12. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.3 Splunk Products.mp4 19.22 MB
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.1 Setting Up Splunk.mp4 9.88 MB
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.2 Parts of Splunk.mp4 17.22 MB
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.3 Installing Splunk on Linux.mp4 40.55 MB
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.4 Installing Splunk on Windows.mp4 22.40 MB
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.5 Installing a Universal Forwarder.mp4 19.03 MB
12. Introduction to Splunk/Module 4 - Data/4.1 Data.mp4 1.56 MB
12. Introduction to Splunk/Module 4 - Data/4.2 Web Interface Tour.mp4 33.11 MB
12. Introduction to Splunk/Module 4 - Data/4.3 Ways to Get Data.mp4 47.88 MB
12. Introduction to Splunk/Module 4 - Data/4.4 Inputs Monitoring.mp4 28.31 MB
12. Introduction to Splunk/Module 5 - Using Data/5.1 Using Data.mp4 2.13 MB
12. Introduction to Splunk/Module 5 - Using Data/5.2 Searches.mp4 21.53 MB
12. Introduction to Splunk/Module 5 - Using Data/5.3 Alerts.mp4 36.26 MB
12. Introduction to Splunk/Module 5 - Using Data/5.4 Reports and Dashboards.mp4 23.07 MB
12. Introduction to Splunk/Module 5 - Using Data/5.5 App Basics.mp4 19.93 MB
12. Introduction to Splunk/Module 6 - Conclusion/6.1 More to Learn.mp4 9.63 MB
12. Introduction to Splunk/Module 6 - Conclusion/6.2 Final Review.mp4 9.28 MB
12. Introduction to Splunk/Resources/1. Syllabus and Outline.pdf 235.49 KB
12. Introduction to Splunk/Resources/2. Study Guide.pdf 672.37 KB
12. Introduction to Splunk/Resources/3. Glossary.pdf 138.48 KB
12. Introduction to Splunk/Resources/4. Cheet Sheet.pdf 107.72 KB
12. Introduction to Splunk/Resources/5. Lab Info.pdf 416.35 KB
12. Introduction to Splunk/Resources/6. Additional Readings.pdf 230.45 KB
12. Introduction to Splunk/Resources/7. Quiz Questions.pdf 158.70 KB
12. Introduction to Splunk/Resources/8. Slides/1.2 Slide Handout.pdf 4.92 MB
12. Introduction to Splunk/Resources/8. Slides/1.3 Slide Handout.pdf 3.88 MB
12. Introduction to Splunk/Resources/8. Slides/2.3 Slide Handout.pdf 3.98 MB
12. Introduction to Splunk/Resources/8. Slides/3.2 Slide Handout.pdf 3.07 MB
12. Introduction to Splunk/Resources/8. Slides/3.3 Slide Handout.pdf 2.05 MB
12. Introduction to Splunk/Resources/8. Slides/3.4 Slide Handout.pdf 1.52 MB
12. Introduction to Splunk/Resources/8. Slides/4.3 Slide Handout.pdf 1.71 MB
12. Introduction to Splunk/Resources/8. Slides/4.4 Slide Handout.pdf 2.87 MB
12. Introduction to Splunk/Resources/8. Slides/5.2 Slide Handout.pdf 1.80 MB
12. Introduction to Splunk/Resources/8. Slides/5.3 Slide Handout.pdf 2.95 MB
12. Introduction to Splunk/Resources/8. Slides/5.4 Slide Handout.pdf 2.95 MB
12. Introduction to Splunk/Resources/8. Slides/5.5 Slide Handout.pdf 2.69 MB
12. Introduction to Splunk/Resources/8. Slides/6.1 Slide Handout.pdf 2.69 MB
12. Introduction to Splunk/Resources/8. Slides/6.2 Slide Handout.pdf 1.55 MB
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.1 Course Introduction.mp4 14.78 MB
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.2 Web Applications Architecture Review Part 1.mp4 34.57 MB
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.3 Web Applications Architecture Review Part 2.mp4 32.96 MB
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.4 Web Server Logs Review Part 1.mp4 26.16 MB
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.5 Web Server Logs Review Part 2.mp4 29.27 MB
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.6 Tips and Common Issues Part 1.mp4 29.88 MB
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.7 Tips and Common Issues Part 2.mp4 32.91 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.1 Web Application Attacks Review.mp4 38.25 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.10 Course Summary.mp4 14.52 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.2 Vulnerability Scans.mp4 38.67 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.3 Brute Force Attacks.mp4 32.63 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.4 SQL Injection.mp4 43.20 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.5 File Inclusion.mp4 29.28 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.6 XSS_ Cross-Site Scripting.mp4 34.34 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.7 CSRF_ Cross Site Request Forgery.mp4 17.46 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.8 Other Log Sources Part 1.mp4 42.54 MB
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.9 Other Log Sources Part 2.mp4 31.91 MB
13. Identifying Web Attacks Through Logs/Resources/1. Syllabus and Outline.pdf 107.97 KB
13. Identifying Web Attacks Through Logs/Resources/2. Glossary.pdf 185.90 KB
13. Identifying Web Attacks Through Logs/Resources/3. Study Guide.pdf 4.59 MB
13. Identifying Web Attacks Through Logs/Resources/4. Quiz.pdf 919.67 KB
13. Identifying Web Attacks Through Logs/Resources/5. Internet Logs.zip 453.93 KB
13. Identifying Web Attacks Through Logs/Resources/6. Lab logs.zip 1.48 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.01 What is PowerShell.mp4 30.73 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.02 Working with P2.mp4 29.53 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.03 Command Line.mp4 24.01 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.04 Getting Help.mp4 42.23 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.05 Additional Piping.mp4 25.08 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.06 Additional Help.mp4 22.80 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.07 Scripting Basics.mp4 43.37 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.08 Common Commands Part 1.mp4 40.60 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.09 Common Commands Part 2.mp4 69.70 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.10 Common Commands Part 3.mp4 20.82 MB
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.11 Common Commands Part 4.mp4 33.82 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.01 Why Security+.mp4 32.33 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.02 Risk Management and Security Basics.mp4 13.88 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.03 Risk Management Overview.mp4 15.10 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.04 Use and Misuse Cases.mp4 11.64 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.05 Risk Assessment.mp4 24.39 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.06 Risk Mitigation.mp4 19.00 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.07 Risk Monitoring.mp4 6.71 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.08 Security Principles - Confidentiality.mp4 18.94 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.09 Integrity and Availability Threats and Mitigation.mp4 9.46 MB
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.10 Security Principles Wrap-Up.mp4 5.66 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.01 Understanding Attacks.mp4 13.23 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.02 Social Engineering.mp4 13.08 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.03 Malware.mp4 8.71 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.04 Network-Based Attacks.mp4 26.90 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.05 Spoofing and Redirection.mp4 10.60 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.06 DNS Service.mp4 25.00 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.07 Passwords.mp4 15.23 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.08 Wireless Security Part 1.mp4 27.26 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.09 Wireless Security Part 2.mp4 19.03 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.10 Application Attacks.mp4 9.61 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.11 Code Injection and Cross Site Scripting.mp4 27.00 MB
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.12 XSRF Race Conditions and Memory Issues.mp4 17.24 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.01 Cryptography Introduction and Services.mp4 12.88 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.02 Cryptography Definitions - Initialization Vectors.mp4 26.30 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.03 Algorithms and Keys.mp4 8.69 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.04 Desirable Qualities of Algorithms and Keys.mp4 15.20 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.05 Symmetric Cryptography.mp4 16.93 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.06 Symmetric Ciphers Stream and Block.mp4 17.72 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.07 Asymmetric Cryptography.mp4 13.03 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.08 Hashing for Integrity.mp4 20.82 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.09 MAC Message Authentication Code.mp4 9.56 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.10 Hybrid Cryptography SSL and TLS.mp4 13.31 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.11 SSL, TLS and PKI Introduction.mp4 10.51 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.12 PKI Continued.mp4 23.11 MB
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.13 PGP and SMIME.mp4 13.38 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.01 Networking Concepts.mp4 23.61 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.02 Network Connectivity.mp4 17.78 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.03 Network Services Continued - DHCP and IPAM.mp4 24.85 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.04 OSI Model Introduction and Encapsulation.mp4 31.85 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.05 OSI Layers 1 and 2.mp4 47.33 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.06 OSI Layers 3 and 4.mp4 26.85 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.07 OSI Layers 5, 6, 7 and Summary.mp4 25.42 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.08 Ports and Protocols Introduction.mp4 13.09 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.09 Protocols of the TCPIP Suite Part 1.mp4 36.09 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.10 Protocols of the TCPIP Suite Part 2.mp4 21.49 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.11 Network Services DNS.mp4 26.83 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.12 Network Storage.mp4 18.48 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.13 Remote Access.mp4 15.54 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.14 Tunneling and IPSec Part 1.mp4 24.06 MB
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.15 Tunneling and IPSec Part 2.mp4 23.09 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.01 Network Connectivity Devices Part 1.mp4 31.38 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.02 Network Connectivity Devices Part 2.mp4 13.03 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.03 Switch and VLAN Configuration Part 1.mp4 18.82 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.04 Switch and VLAN Configuration Part 2.mp4 13.58 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.05 Routing.mp4 34.89 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.06 Network Address Translation.mp4 14.54 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.07 Firewalls.mp4 35.75 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.08 Firewall Best Practices.mp4 17.93 MB
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.09 Intrusion Detection and Prevention.mp4 33.92 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.01 Introduction and Policy.mp4 11.50 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.02 Policies and Best Practices Part 1.mp4 27.32 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.03 Policies and Best Practices Part 2.mp4 23.46 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.04 Scanning, Monitoring and Patching.mp4 27.52 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.05 Patch Lifecycle Baselines and Traffic Analysis.mp4 25.20 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.06 Fault Management.mp4 17.67 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.07 RAID and Data Backups.mp4 25.68 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.08 Business Continuity and Disaster Recovery Part 1.mp4 32.05 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.09 Business Continuity and Disaster Recovery Part 2.mp4 14.63 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.10 Virtualization Part 1.mp4 25.65 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.11 Virtualization Part 2.mp4 24.49 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.12 Cloud Computing.mp4 15.45 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.13 Cloud Services.mp4 39.54 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.14 Cloud Deployment Models and Cloud Wrap-Up.mp4 14.99 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.15 IoT Introduction.mp4 13.42 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.16 OWASP IoT and Wrap-Up.mp4 20.82 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.17 Hardening the System Part 1.mp4 9.22 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.18 Hardening the System Part 2.mp4 12.82 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.19 Vulnerability Assessments and Penetration Tests.mp4 16.99 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.20 Incident Response.mp4 11.49 MB
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.21 Forensic Investigations.mp4 18.34 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.01 Identity and Access Management Introduction.mp4 12.98 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.02 Authentication.mp4 38.50 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.03 Single Sign-On Kerberos Part 1.mp4 21.42 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.04 Single Sign-On Kerberos Part 2.mp4 13.69 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.05 Single Sign-On with Federated Services Part 1.mp4 22.17 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.06 Single Sign-On with Federated Services Part 2.mp4 17.85 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.07 Network Access Control and Authentication Wrap-Up.mp4 20.61 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.08 Authorization.mp4 27.19 MB
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.09 Auditing and Wrap-Up.mp4 6.36 MB
16. CompTIA Security+ (SY0-601)/Resources/1. CompTIA Security Plus Syllabus and Outline.pdf 205.21 KB
https://opentracker.i2p.rocks:443/announce
https://tracker.bt4g.com:443/announce
udp://bt.ktrackers.com:6666/announce
udp://bt1.archive.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://movies.zsw.ca:6969/announce
udp://open.demonii.com:1337/announce
udp://open.stealth.si:80/announce
udp://open.tracker.cl:1337/announce
udp://open.tracker.ink:6969/announce
udp://opentracker.i2p.rocks:6969/announce
udp://opentracker.io:6969/announce
udp://tracker-udp.gbitt.info:80/announce
udp://tracker.auctor.tv:6969/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.skyts.net:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker1.bt.moack.co.kr:80/announce

TorrentBank
Copyright © 2024