CBTNuggets CompTIA Cybersecurity Analyst CySA plus CS0 - 003 Online Training

0dayddl

U P L O A D E R
359020115_tuto.jpg

13.97 GB | 00:13:07 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
1 Welcome to CySA+ (80.02 MB)
2 Getting our tools ready (145.22 MB)
3 Putting an OS inside of VirtualBox (185.65 MB)
4 Installing the Kali operating system in VirtualBox (234.14 MB)
5 Booting into our Virtual Operating System (Kali) (226.17 MB)
6 Metasploit (105.58 MB)
7 Wrapping up with a Practical Challenge (120.01 MB)
8 Wrapping up with a Practical Challenge Part 2 (12.6 MB)
1 Getting to know our guidelines (120.82 MB)
2 The Standards (117.36 MB)
3 Installing Nessus (104.26 MB)
4 Initializing Nessus (67.46 MB)
5 Nessus for the first time (163.18 MB)
6 Setting up our first scan (71.16 MB)
7 Challenge (14.04 MB)
8 Solution (40.75 MB)
9 Addendum! (35.65 MB)
1 Understanding our Assessment Results (101.64 MB)
2 Can we duplicate it (214.21 MB)
3 Let's scan with OpenVAS (154.81 MB)
4 Discrepancies (36.74 MB)
5 Discrepancies Part 2 (42.15 MB)
6 Challenge (36.66 MB)
7 Challenge Part 2 (92.49 MB)
1 Knowing the Priority (137.36 MB)
2 What's the Risk (24.63 MB)
3 Looking at the CVSS 3 0 Vector (57.04 MB)
4 Sometimes a suggestion (Context Awareness) (93.71 MB)
5 Common Vulnerabilities (129.92 MB)
6 Challenge (27.6 MB)
7 Challenge Part 2 (139.82 MB)
1 Controlling the Vulnerabilities (61.62 MB)
10 Challenge (30.7 MB)
11 Challenge Part 2 (49.82 MB)
2 Easy path first (93.12 MB)
3 Easy path first Part 2 (66.97 MB)
4 Network Segmentation and ACLs (46.6 MB)
5 Network Segmentation and ACLs Part 2 (125.26 MB)
6 Adding Multiple Layers of Security (40.3 MB)
7 Is it the User's Fault (34.6 MB)
8 Audit and Logging (43.62 MB)
9 Incident Response (21.29 MB)
1 Understanding Incident Handling and Response (80.26 MB)
2 Preparation (78.7 MB)
3 Preparation Part 2 (81.99 MB)
4 Detection and Analysis (78.68 MB)
5 Containment, Eradication, and Recovery (114.35 MB)
6 Post-Incident Activity (49.27 MB)
7 Challenge (31.58 MB)
8 Challenge Part 2 (101.9 MB)
9 Addendum (16.42 MB)
1 Understanding the Attack (54.36 MB)
2 MITRE ATT&CK Framework (201.44 MB)
3 MITRE ATT&CK Framework Part 2 (18.18 MB)
4 The Diamond Model (68.25 MB)
5 The Cyber Kill Chain (205.01 MB)
6 Challenge (95.35 MB)
7 Challenge Part 2 (122.24 MB)
1 What Triggers Incident Response (85.8 MB)
2 Indicators of a Compromise (54.32 MB)
3 Indicators of a Compromise Part 2 (100.45 MB)
4 Compromise Investigation (115.38 MB)
5 Preserving Evidence (112.74 MB)
6 Challenge (105.53 MB)
7 Challenge Part 2 (99.41 MB)
1 What is Digital Forensics (50.57 MB)
2 What our Toolkit Consists of (52.35 MB)
3 FTK (74.04 MB)
4 FTK Part 2 (168.49 MB)
5 Imaging Devices (61.23 MB)
6 Network Forensics (144.26 MB)
7 Challenge (8.08 MB)
8 Challenge Part 2 (95.32 MB)
1 Vulnerability Management Reporting (95.5 MB)
10 Ultimate Challenge (16.42 MB)
2 Mitigation (53.49 MB)
3 Zero-Day vs Critical (50.14 MB)
4 Action Planning (127.14 MB)
5 Stakeholders (103.81 MB)
6 Reporting (124.22 MB)
7 Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), and Mean Time to Remediate (MTTRem) (72.98 MB)
8 Challenge (234.02 MB)
9 Challenge Part 2 (90.97 MB)
1 Security within the Architecture (39.11 MB)
2 Identity and Access Management (172.59 MB)
3 Identity and Access Management Part 2 (168.53 MB)
4 Encryption and Sensitive Data Protection (315.71 MB)
5 Data at Rest or Data in Motion (3.43 MB)
6 Data Loss Prevention (DLP) (205.8 MB)
7 Challenge (137.73 MB)
8 Challenge Part 2 (113.28 MB)
1 Indicators of Potentially Malicious Activity (31.34 MB)
2 Where do we get our alerts from (126.52 MB)
3 Looking more at active and passive (43.78 MB)
4 Looking more at active and passive Part 2 (21.84 MB)
5 Understanding Event Capturing and Forwarding (96.5 MB)
6 Verifying our Network (33.57 MB)
7 Focusing on the weird things (117.06 MB)
8 Security Information and Event Management (SIEM) (43.55 MB)
9 The human aspect (38.09 MB)
1 Diving deeper into the traffic (231.67 MB)
2 Looking at some tools (320.84 MB)
3 Knowing where to monitor (249.07 MB)
4 Wireshark (252.88 MB)
5 Challenge (56.44 MB)
6 Challenge Part 2 (240.03 MB)
1 Introduction to Packet Capturing (303.23 MB)
2 Wireshark (79.49 MB)
3 Wireshark Part 2 (9.88 MB)
4 Detecting Network Sweeps and other stuff (148.81 MB)
5 Detecting Network Sweeps and other stuff Part 2 (33.22 MB)
6 Checking the network against the system (63.14 MB)
7 Challenge time (54.24 MB)
8 Challenge time Part 2 (64.26 MB)
1 We can't forget the actual systems on the network (60.96 MB)
2 System inventories (73.27 MB)
3 System inventories Part 2 (38.6 MB)
4 Making sense of the events (162.67 MB)
5 Making sense of the events Part 2 (60.26 MB)
6 Looking a bit closer at system services (70.24 MB)
7 Challenge (98.9 MB)
8 Challenge Part 2 (72.27 MB)
1 Different Types of Security Systems (79.44 MB)
2 Different Types of Security Systems Part 2 (46.64 MB)
3 Breakdown of the Different Types (142.55 MB)
4 Where have we seen these before (27.17 MB)
5 Tying everything to Threat Intelligence (85.76 MB)
6 Tying everything to Threat Intelligence Part 2 (178.7 MB)
7 Challenge (77.56 MB)
8 Challenge Part 2 (44.75 MB)
9 Threat Hunting Close Out (11.33 MB)
1 Threat Introduction (26.87 MB)
2 Threat Actors (102.39 MB)
3 Threat Actors Part 2 (200.47 MB)
4 The Nation-State Example (122.03 MB)
5 Being Proactive (403.57 MB)
6 Challenge (10.4 MB)
7 Challenge Part 2 (99.11 MB)
1 Steps to Improvement (125.79 MB)
10 Challenge Part 2 (36.45 MB)
2 Evaluating Security Risks (165.45 MB)
3 Building a Secure Network (81.57 MB)
4 Secure Endpoint Management (176.67 MB)
5 Pen Testing (54.36 MB)
6 Pen Testing Part 2 (18.33 MB)
7 Pen Testing Part 3 (12.47 MB)
8 Reverse Engineering (36.92 MB)
9 Challenge (43.82 MB)

Screenshot
jBCzDPxs_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar
359020115_tuto.jpg

13.97 GB | 00:13:07 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
1 Welcome to CySA+ (80.02 MB)
2 Getting our tools ready (145.22 MB)
3 Putting an OS inside of VirtualBox (185.65 MB)
4 Installing the Kali operating system in VirtualBox (234.14 MB)
5 Booting into our Virtual Operating System (Kali) (226.17 MB)
6 Metasploit (105.58 MB)
7 Wrapping up with a Practical Challenge (120.01 MB)
8 Wrapping up with a Practical Challenge Part 2 (12.6 MB)
1 Getting to know our guidelines (120.82 MB)
2 The Standards (117.36 MB)
3 Installing Nessus (104.26 MB)
4 Initializing Nessus (67.46 MB)
5 Nessus for the first time (163.18 MB)
6 Setting up our first scan (71.16 MB)
7 Challenge (14.04 MB)
8 Solution (40.75 MB)
9 Addendum! (35.65 MB)
1 Understanding our Assessment Results (101.64 MB)
2 Can we duplicate it (214.21 MB)
3 Let's scan with OpenVAS (154.81 MB)
4 Discrepancies (36.74 MB)
5 Discrepancies Part 2 (42.15 MB)
6 Challenge (36.66 MB)
7 Challenge Part 2 (92.49 MB)
1 Knowing the Priority (137.36 MB)
2 What's the Risk (24.63 MB)
3 Looking at the CVSS 3 0 Vector (57.04 MB)
4 Sometimes a suggestion (Context Awareness) (93.71 MB)
5 Common Vulnerabilities (129.92 MB)
6 Challenge (27.6 MB)
7 Challenge Part 2 (139.82 MB)
1 Controlling the Vulnerabilities (61.62 MB)
10 Challenge (30.7 MB)
11 Challenge Part 2 (49.82 MB)
2 Easy path first (93.12 MB)
3 Easy path first Part 2 (66.97 MB)
4 Network Segmentation and ACLs (46.6 MB)
5 Network Segmentation and ACLs Part 2 (125.26 MB)
6 Adding Multiple Layers of Security (40.3 MB)
7 Is it the User's Fault (34.6 MB)
8 Audit and Logging (43.62 MB)
9 Incident Response (21.29 MB)
1 Understanding Incident Handling and Response (80.26 MB)
2 Preparation (78.7 MB)
3 Preparation Part 2 (81.99 MB)
4 Detection and Analysis (78.68 MB)
5 Containment, Eradication, and Recovery (114.35 MB)
6 Post-Incident Activity (49.27 MB)
7 Challenge (31.58 MB)
8 Challenge Part 2 (101.9 MB)
9 Addendum (16.42 MB)
1 Understanding the Attack (54.36 MB)
2 MITRE ATT&CK Framework (201.44 MB)
3 MITRE ATT&CK Framework Part 2 (18.18 MB)
4 The Diamond Model (68.25 MB)
5 The Cyber Kill Chain (205.01 MB)
6 Challenge (95.35 MB)
7 Challenge Part 2 (122.24 MB)
1 What Triggers Incident Response (85.8 MB)
2 Indicators of a Compromise (54.32 MB)
3 Indicators of a Compromise Part 2 (100.45 MB)
4 Compromise Investigation (115.38 MB)
5 Preserving Evidence (112.74 MB)
6 Challenge (105.53 MB)
7 Challenge Part 2 (99.41 MB)
1 What is Digital Forensics (50.57 MB)
2 What our Toolkit Consists of (52.35 MB)
3 FTK (74.04 MB)
4 FTK Part 2 (168.49 MB)
5 Imaging Devices (61.23 MB)
6 Network Forensics (144.26 MB)
7 Challenge (8.08 MB)
8 Challenge Part 2 (95.32 MB)
1 Vulnerability Management Reporting (95.5 MB)
10 Ultimate Challenge (16.42 MB)
2 Mitigation (53.49 MB)
3 Zero-Day vs Critical (50.14 MB)
4 Action Planning (127.14 MB)
5 Stakeholders (103.81 MB)
6 Reporting (124.22 MB)
7 Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), and Mean Time to Remediate (MTTRem) (72.98 MB)
8 Challenge (234.02 MB)
9 Challenge Part 2 (90.97 MB)
1 Security within the Architecture (39.11 MB)
2 Identity and Access Management (172.59 MB)
3 Identity and Access Management Part 2 (168.53 MB)
4 Encryption and Sensitive Data Protection (315.71 MB)
5 Data at Rest or Data in Motion (3.43 MB)
6 Data Loss Prevention (DLP) (205.8 MB)
7 Challenge (137.73 MB)
8 Challenge Part 2 (113.28 MB)
1 Indicators of Potentially Malicious Activity (31.34 MB)
2 Where do we get our alerts from (126.52 MB)
3 Looking more at active and passive (43.78 MB)
4 Looking more at active and passive Part 2 (21.84 MB)
5 Understanding Event Capturing and Forwarding (96.5 MB)
6 Verifying our Network (33.57 MB)
7 Focusing on the weird things (117.06 MB)
8 Security Information and Event Management (SIEM) (43.55 MB)
9 The human aspect (38.09 MB)
1 Diving deeper into the traffic (231.67 MB)
2 Looking at some tools (320.84 MB)
3 Knowing where to monitor (249.07 MB)
4 Wireshark (252.88 MB)
5 Challenge (56.44 MB)
6 Challenge Part 2 (240.03 MB)
1 Introduction to Packet Capturing (303.23 MB)
2 Wireshark (79.49 MB)
3 Wireshark Part 2 (9.88 MB)
4 Detecting Network Sweeps and other stuff (148.81 MB)
5 Detecting Network Sweeps and other stuff Part 2 (33.22 MB)
6 Checking the network against the system (63.14 MB)
7 Challenge time (54.24 MB)
8 Challenge time Part 2 (64.26 MB)
1 We can't forget the actual systems on the network (60.96 MB)
2 System inventories (73.27 MB)
3 System inventories Part 2 (38.6 MB)
4 Making sense of the events (162.67 MB)
5 Making sense of the events Part 2 (60.26 MB)
6 Looking a bit closer at system services (70.24 MB)
7 Challenge (98.9 MB)
8 Challenge Part 2 (72.27 MB)
1 Different Types of Security Systems (79.44 MB)
2 Different Types of Security Systems Part 2 (46.64 MB)
3 Breakdown of the Different Types (142.55 MB)
4 Where have we seen these before (27.17 MB)
5 Tying everything to Threat Intelligence (85.76 MB)
6 Tying everything to Threat Intelligence Part 2 (178.7 MB)
7 Challenge (77.56 MB)
8 Challenge Part 2 (44.75 MB)
9 Threat Hunting Close Out (11.33 MB)
1 Threat Introduction (26.87 MB)
2 Threat Actors (102.39 MB)
3 Threat Actors Part 2 (200.47 MB)
4 The Nation-State Example (122.03 MB)
5 Being Proactive (403.57 MB)
6 Challenge (10.4 MB)
7 Challenge Part 2 (99.11 MB)
1 Steps to Improvement (125.79 MB)
10 Challenge Part 2 (36.45 MB)
2 Evaluating Security Risks (165.45 MB)
3 Building a Secure Network (81.57 MB)
4 Secure Endpoint Management (176.67 MB)
5 Pen Testing (54.36 MB)
6 Pen Testing Part 2 (18.33 MB)
7 Pen Testing Part 3 (12.47 MB)
8 Reverse Engineering (36.92 MB)
9 Challenge (43.82 MB)

Screenshot
QiIVQx8H_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten