Lynda - CompTIA Security Exam Prep SY0-401 - Threats and Vulnerabilities
File List
- 07. Mitigation and Deterrence/07_02-Hardening your systems.mp4 25.7 MB
- 03. Understanding Attack Types/03_04-Defending against password attacks.mp4 23.9 MB
- 02. Malware/02_01-Comparing viruses, worms, and Trojans.mp4 23.6 MB
- 01. Introduction/01_01-Welcome.mp4 23.3 MB
- 08. Discovering Threats and Vulnerabilities/08_03-Assessing threats.mp4 21.8 MB
- 08. Discovering Threats and Vulnerabilities/08_01-Security assessment tools.mp4 20.7 MB
- 07. Mitigation and Deterrence/07_01-Monitoring log files.mp4 16.7 MB
- 03. Understanding Attack Types/03_03-Network attacks.mp4 14.1 MB
- 07. Mitigation and Deterrence/07_04-Improving your security posture.mp4 14.0 MB
- 06. Application Attacks/06_01-Understanding crosssite scripting.mp4 13.9 MB
- 08. Discovering Threats and Vulnerabilities/08_02-Scanning for threats and vulnerabilities.mp4 13.8 MB
- 06. Application Attacks/06_02-Preventing SQL injection.mp4 12.1 MB
- 02. Malware/02_03-Understanding backdoors and logic bombs.mp4 11.9 MB
- 04. Social Engineering Attacks/04_01-Social engineering.mp4 11.9 MB
- 05. Wireless Attacks/05_03-Propagation attacks.mp4 11.8 MB
- 03. Understanding Attack Types/03_01-Denial of service attacks.mp4 10.8 MB
- 05. Wireless Attacks/05_01-Wireless eavesdropping.mp4 10.4 MB
- 06. Application Attacks/06_04-Overflow attacks.mp4 10.4 MB
- 04. Social Engineering Attacks/04_02-Impersonation attacks.mp4 10.3 MB
- 02. Malware/02_02-Comparing adware, spyware, and ransomware.mp4 10.3 MB
- 02. Malware/02_04-Looking at advanced malware.mp4 10.1 MB
- 07. Mitigation and Deterrence/07_03-Securing your network.mp4 10.0 MB
- 06. Application Attacks/06_06-Session hijacking.mp4 9.9 MB
- 06. Application Attacks/06_03-Defending against directory traversal.mp4 9.4 MB
- 03. Understanding Attack Types/03_06-Preventing insider threats.mp4 8.9 MB
- 03. Understanding Attack Types/03_02-Eavesdropping attacks.mp4 8.7 MB
- 04. Social Engineering Attacks/04_03-Going old school.mp4 8.7 MB
- 08. Discovering Threats and Vulnerabilities/08_04-Threat assessment techniques.mp4 7.9 MB
- 05. Wireless Attacks/05_02-WPA and WPS attacks.mp4 7.8 MB
- 03. Understanding Attack Types/03_05-Watering hole attacks.mp4 7.8 MB
- 06. Application Attacks/06_05-Explaining cookies and attachments.mp4 7.7 MB
- 05. Wireless Attacks/05_04-Preventing rogues and evil twins.mp4 7.0 MB
- 06. Application Attacks/06_07-Malicious addons.mp4 6.9 MB
- 02. Malware/02_05-Understanding botnets.mp4 6.4 MB
- 08. Discovering Threats and Vulnerabilities/08_06-Advanced vulnerability scanning.mp4 6.3 MB
- 07. Mitigation and Deterrence/07_05-Control categories.mp4 6.0 MB
- 08. Discovering Threats and Vulnerabilities/08_05-Penetration testing.mp4 5.9 MB
- 05. Wireless Attacks/05_05-Understanding Bluetooth and NFC attacks.mp4 5.2 MB
- 09. Conclusion/09_01-Next steps.mp4 1.2 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.