CompTIA Cybersecurity Analyst CySA+ (CS0 - 003) - Erik Choron (Dec 2024)

0dayddl

U P L O A D E R
541636287_oip.jpg

13.97 GB | 00:13:07 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
1 Welcome to CySA+ (80.02 MB)
2 Getting our tools ready (145.22 MB)
3 Putting an OS inside of VirtualBox (185.65 MB)
4 Installing the Kali operating system in VirtualBox (234.14 MB)
5 Booting into our Virtual Operating System (Kali) (226.17 MB)
6 Metasploit (105.58 MB)
7 Wrapping up with a Practical Challenge (120.01 MB)
8 Wrapping up with a Practical Challenge Part 2 (12.6 MB)
1 Getting to know our guidelines (120.82 MB)
2 The Standards (117.36 MB)
3 Installing Nessus (104.26 MB)
4 Initializing Nessus (67.46 MB)
5 Nessus for the first time (163.18 MB)
6 Setting up our first scan (71.16 MB)
7 Challenge (14.04 MB)
8 Solution (40.75 MB)
9 Addendum! (35.65 MB)
1 Understanding our Assessment Results (101.64 MB)
2 Can we duplicate it (214.21 MB)
3 Let's scan with OpenVAS (154.81 MB)
4 Discrepancies (36.74 MB)
5 Discrepancies Part 2 (42.15 MB)
6 Challenge (36.66 MB)
7 Challenge Part 2 (92.49 MB)
1 Knowing the Priority (137.36 MB)
2 What's the Risk (24.63 MB)
3 Looking at the CVSS 3 0 Vector (57.04 MB)
4 Sometimes a suggestion (Context Awareness) (93.71 MB)
5 Common Vulnerabilities (129.92 MB)
6 Challenge (27.6 MB)
7 Challenge Part 2 (139.82 MB)
1 Controlling the Vulnerabilities (61.62 MB)
10 Challenge (30.7 MB)
11 Challenge Part 2 (49.82 MB)
2 Easy path first (93.12 MB)
3 Easy path first Part 2 (66.97 MB)
4 Network Segmentation and ACLs (46.6 MB)
5 Network Segmentation and ACLs Part 2 (125.26 MB)
6 Adding Multiple Layers of Security (40.3 MB)
7 Is it the User's Fault (34.6 MB)
8 Audit and Logging (43.62 MB)
9 Incident Response (21.29 MB)
1 Understanding Incident Handling and Response (80.26 MB)
2 Preparation (78.7 MB)
3 Preparation Part 2 (81.99 MB)
4 Detection and Analysis (78.68 MB)
5 Containment, Eradication, and Recovery (114.35 MB)
6 Post-Incident Activity (49.27 MB)
7 Challenge (31.58 MB)
8 Challenge Part 2 (101.9 MB)
9 Addendum (16.42 MB)
1 Understanding the Attack (54.36 MB)
2 MITRE ATT&CK Framework (201.44 MB)
3 MITRE ATT&CK Framework Part 2 (18.18 MB)
4 The Diamond Model (68.25 MB)
5 The Cyber Kill Chain (205.01 MB)
6 Challenge (95.35 MB)
7 Challenge Part 2 (122.24 MB)
1 What Triggers Incident Response (85.8 MB)
2 Indicators of a Compromise (54.32 MB)
3 Indicators of a Compromise Part 2 (100.45 MB)
4 Compromise Investigation (115.38 MB)
5 Preserving Evidence (112.74 MB)
6 Challenge (105.53 MB)
7 Challenge Part 2 (99.41 MB)
1 What is Digital Forensics (50.57 MB)
2 What our Toolkit Consists of (52.35 MB)
3 FTK (74.04 MB)
4 FTK Part 2 (168.49 MB)
5 Imaging Devices (61.23 MB)
6 Network Forensics (144.26 MB)
7 Challenge (8.08 MB)
8 Challenge Part 2 (95.32 MB)
1 Vulnerability Management Reporting (95.5 MB)
10 Ultimate Challenge (16.42 MB)
2 Mitigation (53.49 MB)
3 Zero-Day vs Critical (50.14 MB)
4 Action Planning (127.14 MB)
5 Stakeholders (103.81 MB)
6 Reporting (124.22 MB)
7 Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), and Mean Time to Remediate (MTTRem) (72.98 MB)
8 Challenge (234.02 MB)
9 Challenge Part 2 (90.97 MB)
1 Security within the Architecture (39.11 MB)
2 Identity and Access Management (172.59 MB)
3 Identity and Access Management Part 2 (168.53 MB)
4 Encryption and Sensitive Data Protection (315.71 MB)
5 Data at Rest or Data in Motion (3.43 MB)
6 Data Loss Prevention (DLP) (205.8 MB)
7 Challenge (137.73 MB)
8 Challenge Part 2 (113.28 MB)
1 Indicators of Potentially Malicious Activity (31.34 MB)
2 Where do we get our alerts from (126.52 MB)
3 Looking more at active and passive (43.78 MB)
4 Looking more at active and passive Part 2 (21.84 MB)
5 Understanding Event Capturing and Forwarding (96.5 MB)
6 Verifying our Network (33.57 MB)
7 Focusing on the weird things (117.06 MB)
8 Security Information and Event Management (SIEM) (43.55 MB)
9 The human aspect (38.09 MB)
1 Diving deeper into the traffic (231.67 MB)
2 Looking at some tools (320.84 MB)
3 Knowing where to monitor (249.07 MB)
4 Wireshark (252.88 MB)
5 Challenge (56.44 MB)
6 Challenge Part 2 (240.03 MB)
1 Introduction to Packet Capturing (303.23 MB)
2 Wireshark (79.49 MB)
3 Wireshark Part 2 (9.88 MB)
4 Detecting Network Sweeps and other stuff (148.81 MB)
5 Detecting Network Sweeps and other stuff Part 2 (33.22 MB)
6 Checking the network against the system (63.14 MB)
7 Challenge time (54.24 MB)
8 Challenge time Part 2 (64.26 MB)
1 We can't forget the actual systems on the network (60.96 MB)
2 System inventories (73.27 MB)
3 System inventories Part 2 (38.6 MB)
4 Making sense of the events (162.67 MB)
5 Making sense of the events Part 2 (60.26 MB)
6 Looking a bit closer at system services (70.24 MB)
7 Challenge (98.9 MB)
8 Challenge Part 2 (72.27 MB)
1 Different Types of Security Systems (79.44 MB)
2 Different Types of Security Systems Part 2 (46.64 MB)
3 Breakdown of the Different Types (142.55 MB)
4 Where have we seen these before (27.17 MB)
5 Tying everything to Threat Intelligence (85.76 MB)
6 Tying everything to Threat Intelligence Part 2 (178.7 MB)
7 Challenge (77.56 MB)
8 Challenge Part 2 (44.75 MB)
9 Threat Hunting Close Out (11.33 MB)
1 Threat Introduction (26.87 MB)
2 Threat Actors (102.39 MB)
3 Threat Actors Part 2 (200.47 MB)
4 The Nation-State Example (122.03 MB)
5 Being Proactive (403.57 MB)
6 Challenge (10.4 MB)
7 Challenge Part 2 (99.11 MB)
1 Steps to Improvement (125.79 MB)
10 Challenge Part 2 (36.45 MB)
2 Evaluating Security Risks (165.45 MB)
3 Building a Secure Network (81.57 MB)
4 Secure Endpoint Management (176.67 MB)
5 Pen Testing (54.36 MB)
6 Pen Testing Part 2 (18.33 MB)
7 Pen Testing Part 3 (12.47 MB)
8 Reverse Engineering (36.92 MB)
9 Challenge (43.82 MB)
]
Screenshot
ZIyKGGfo_o.jpg



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

539499712_359020115_tuto.jpg

4.12 GB | 16min 7s | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
FileName :001 Promo.mp4 | Size: (7.14 MB)
FileName :002 Introduction to the CompTIA CySA+ (CS0-003) Exam Course.mp4 | Size: (38.39 MB)
FileName :003 How to Take Your CompTIA CySA+ Exam.mp4 | Size: (119.27 MB)
FileName :004 Kali Linux Install.mp4 | Size: (27 MB)
FileName :001 Logging.mp4 | Size: (99.27 MB)
FileName :002 Operating System Concepts.mp4 | Size: (103.28 MB)
FileName :003 Infrastructure Concepts.mp4 | Size: (37.19 MB)
FileName :004 Network Architecture, Part 1.mp4 | Size: (40.77 MB)
FileName :005 Network Architecture, Part 2.mp4 | Size: (42.74 MB)
FileName :006 Identity and Access Management (IAM).mp4 | Size: (51.83 MB)
FileName :007 Encryption.mp4 | Size: (34.39 MB)
FileName :008 Sensitive Information Protection.mp4 | Size: (59.81 MB)
FileName :001 Standardized Processes.mp4 | Size: (66.88 MB)
FileName :002 Streamlined Operations.mp4 | Size: (48.64 MB)
FileName :003 Technology and Tool Integration.mp4 | Size: (50.16 MB)
FileName :001 Attack Frameworks.mp4 | Size: (33.39 MB)
FileName :001 Network Symptoms.mp4 | Size: (63.65 MB)
FileName :002 Host Symptoms.mp4 | Size: (56.43 MB)
FileName :003 Application Symptoms.mp4 | Size: (72.31 MB)
FileName :004 Social Engineering.mp4 | Size: (56.06 MB)
FileName :005 Pattern Recognition.mp4 | Size: (36.25 MB)
FileName :001 Network Analysis Tools.mp4 | Size: (35.29 MB)
FileName :002 Log Analysis (SIEM and SOAR).mp4 | Size: (89.65 MB)
FileName :003 A Day in the Life of a Cybersecurity Analyst.mp4 | Size: (150.32 MB)
FileName :004 Enterprise SOC Tools.mp4 | Size: (44.99 MB)
FileName :005 File Analysis.mp4 | Size: (81.63 MB)
FileName :006 Email Analysis.mp4 | Size: (59.41 MB)
FileName :007 Sandboxing.mp4 | Size: (39.12 MB)
FileName :008 User Behavior Analysis.mp4 | Size: (44.86 MB)
FileName :009 Programming Languages.mp4 | Size: (26.57 MB)
FileName :001 Wireshark Demo.mp4 | Size: (59.82 MB)
FileName :002 WHOIS and AbuseIPDB Demo.mp4 | Size: (19.61 MB)
FileName :003 Strings Demo.mp4 | Size: (19.59 MB)
FileName :004 Hashing Demo.mp4 | Size: (29.95 MB)
FileName :005 Joe Sandbox Demo.mp4 | Size: (14.82 MB)
FileName :001 Threat Actors.mp4 | Size: (48.67 MB)
FileName :002 Supply, TTP, and Intelligence.mp4 | Size: (64.97 MB)
FileName :003 Collection Methods.mp4 | Size: (58.74 MB)
FileName :001 Fundamentals of Threat Intelligence.mp4 | Size: (50.09 MB)
FileName :002 Threat Modeling.mp4 | Size: (92.81 MB)
FileName :003 Risk and Vulnerability Management.mp4 | Size: (56.15 MB)
FileName :004 Threat Hunting.mp4 | Size: (61.16 MB)
FileName :005 Integrating Vulnerability Management with Threat Hunting.mp4 | Size: (64.91 MB)
FileName :001 Asset Discovery.mp4 | Size: (127.71 MB)
FileName :002 Industry Frameworks.mp4 | Size: (142.67 MB)
FileName :003 Critical Infrastructure.mp4 | Size: (60.25 MB)
FileName :004 Vulnerability Identification and Scanning.mp4 | Size: (65.25 MB)
FileName :005 Special Considerations.mp4 | Size: (46.59 MB)
FileName :006 Software Vulnerability Assessment.mp4 | Size: (52.1 MB)
FileName :001 Scanning Tools.mp4 | Size: (17.61 MB)
FileName :002 Angry IP Demo.mp4 | Size: (36.14 MB)
FileName :003 Maltego Demo.mp4 | Size: (50.56 MB)
FileName :004 Web Scanning Tools.mp4 | Size: (17.23 MB)
FileName :005 Nikto Demo.mp4 | Size: (26.03 MB)
FileName :006 OWASP ZAP Demo.mp4 | Size: (31.47 MB)
FileName :007 Arachni Demo.mp4 | Size: (33.2 MB)
FileName :008 Burp Suite Demo.mp4 | Size: (18.81 MB)
FileName :009 Vulnerability Scanning Tools.mp4 | Size: (12.45 MB)
FileName :010 Nessus Demo.mp4 | Size: (47.41 MB)
FileName :011 OpenVAS Demo.mp4 | Size: (54.89 MB)
FileName :012 Debugger Tools.mp4 | Size: (21.07 MB)
FileName :013 Multipurpose Tools.mp4 | Size: (20.01 MB)
FileName :014 Cloud Tools.mp4 | Size: (13.28 MB)
FileName :001 Validation.mp4 | Size: (15 MB)
FileName :002 Prioritization.mp4 | Size: (21.73 MB)
FileName :003 Context Awareness.mp4 | Size: (18.76 MB)
FileName :001 Injection Attacks.mp4 | Size: (33.45 MB)
FileName :002 Overflow Attacks.mp4 | Size: (27.16 MB)
FileName :003 Attack Mitigation, Part 1.mp4 | Size: (58.45 MB)
FileName :004 Attack Mitigation, Part 2.mp4 | Size: (56.13 MB)
FileName :001 Controls.mp4 | Size: (24.41 MB)
FileName :002 Control Functions.mp4 | Size: (22.29 MB)
FileName :003 Patch Management.mp4 | Size: (30.31 MB)
FileName :004 Risk Management.mp4 | Size: (24.32 MB)
FileName :005 Policies and Prioritization.mp4 | Size: (53.6 MB)
FileName :006 Attack Surface Management.mp4 | Size: (45.95 MB)
FileName :007 Secure Coding.mp4 | Size: (33.07 MB)
FileName :008 Secure Software Development.mp4 | Size: (26.42 MB)
FileName :009 Vulnerability Management.mp4 | Size: (65.53 MB)
FileName :010 Compliance Reporting.mp4 | Size: (20.37 MB)
FileName :011 Action Plans.mp4 | Size: (57.03 MB)
FileName :012 Inhibitors to Remediation.mp4 | Size: (64.71 MB)
FileName :013 Key Performance Indicators.mp4 | Size: (55.75 MB)
FileName :001 Preparation.mp4 | Size: (52.66 MB)
FileName :002 Containment, Eradication, and Recovery.mp4 | Size: (28.62 MB)
FileName :001 Post Incident.mp4 | Size: (31.74 MB)
FileName :002 Reporting and Communication.mp4 | Size: (66.42 MB)
FileName :001 Detection and Analysis.mp4 | Size: (31.18 MB)
]
Screenshot
PaYIoCxt_o.jpg


RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
NitroFlare
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
UsersDrive
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.in | Data-Load.ing

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist diese Webseite illegal?

Nein, data-load selbst ist nicht illegal. Die Plattform speichert keinerlei Dateien auf eigenen Servern. Stattdessen veröffentlichen externe Nutzer in Eigenregie Download-Links, die auf sogenannte „Hoster" – also externe Filehoster-Dienste – verweisen. Diese Webseite stellt lediglich eine Übersicht dieser von Nutzern eingereichten Links bereit.
Oben Unten