Torrent details for "CompTIA Cybersecurity Analyst CySA CS0 003 2 Vulnerability Manag…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
585.9 MB
Info Hash:
C81C902983E84CF7092623445B99B2242DBDC5F2
Added By:
Added:
July 27, 2023, 8:31 a.m.
Stats:
|
(Last updated: May 21, 2025, 2:27 p.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 181 bytes |
| 01 - Vulnerability management.mp4 | 4.4 MB |
| 01 - Vulnerability management.srt | 1.6 KB |
| 02 - What you need to know.mp4 | 1.1 MB |
| 02 - What you need to know.srt | 1.3 KB |
| 03 - Study resources.mp4 | 3.7 MB |
| 03 - Study resources.srt | 2.8 KB |
| 01 - What is vulnerability management.mp4 | 8.2 MB |
| 01 - What is vulnerability management.srt | 9.2 KB |
| 02 - Identify scan targets.mp4 | 9.7 MB |
| 02 - Identify scan targets.srt | 11.0 KB |
| 03 - Scan frequency.mp4 | 10.0 MB |
| 03 - Scan frequency.srt | 8.0 KB |
| 01 - Network scanning.mp4 | 4.1 MB |
| 01 - Network scanning.srt | 3.1 KB |
| 02 - Install Nmap on Windows.mp4 | 10.5 MB |
| 02 - Install Nmap on Windows.srt | 10.1 KB |
| 03 - Install Nmap on macOS.mp4 | 4.6 MB |
| 03 - Install Nmap on macOS.srt | 4.4 KB |
| 04 - Run and interpret a simple Nmap scan.mp4 | 6.7 MB |
| 04 - Run and interpret a simple Nmap scan.srt | 6.6 KB |
| 05 - Host discovery with Nmap.mp4 | 7.1 MB |
| 05 - Host discovery with Nmap.srt | 7.8 KB |
| 06 - Operate system fingerprinting.mp4 | 6.4 MB |
| 06 - Operate system fingerprinting.srt | 7.2 KB |
| 07 - Service version detection.mp4 | 2.9 MB |
| 07 - Service version detection.srt | 3.2 KB |
| 01 - Security baseline scanning.mp4 | 1.9 MB |
| 01 - Security baseline scanning.srt | 1.6 KB |
| 02 - Scan configuration.mp4 | 10.9 MB |
| 02 - Scan configuration.srt | 11.8 KB |
| 03 - Scan perspective.mp4 | 8.8 MB |
| 03 - Scan perspective.srt | 9.2 KB |
| 04 - Scanner maintenance.mp4 | 5.3 MB |
| 04 - Scanner maintenance.srt | 6.4 KB |
| 05 - Vulnerability scanning tools.mp4 | 3.4 MB |
| 05 - Vulnerability scanning tools.srt | 2.2 KB |
| 06 - Passive vulnerability scanning.mp4 | 3.0 MB |
| 06 - Passive vulnerability scanning.srt | 3.4 KB |
| 01 - SCAP.mp4 | 4.0 MB |
| 01 - SCAP.srt | 4.2 KB |
| 02 - CVSS.mp4 | 5.5 MB |
| 02 - CVSS.srt | 6.1 KB |
| 03 - Interpret CVSS scores.mp4 | 6.9 MB |
| 03 - Interpret CVSS scores.srt | 5.3 KB |
| 04 - Analyze scan reports.mp4 | 7.8 MB |
| 04 - Analyze scan reports.srt | 7.3 KB |
| 05 - Correlate scan results.mp4 | 4.6 MB |
| 05 - Correlate scan results.srt | 4.4 KB |
| 01 - Server vulnerabilities.mp4 | 12.4 MB |
| 01 - Server vulnerabilities.srt | 10.4 KB |
| 02 - Endpoint vulnerabilities.mp4 | 5.8 MB |
| 02 - Endpoint vulnerabilities.srt | 3.2 KB |
| 03 - Network vulnerabilities.mp4 | 7.7 MB |
| 03 - Network vulnerabilities.srt | 8.6 KB |
| 01 - OWASP Top 10.mp4 | 10.4 MB |
| 01 - OWASP Top 10.srt | 10.0 KB |
| 02 - Prevent SQL injection.mp4 | 8.0 MB |
| 02 - Prevent SQL injection.srt | 9.5 KB |
| 03 - Understand cross-site scripting.mp4 | 8.5 MB |
| 03 - Understand cross-site scripting.srt | 9.1 KB |
| 04 - Request forgery.mp4 | 9.0 MB |
| 04 - Request forgery.srt | 7.8 KB |
| 05 - Privilege escalation.mp4 | 3.0 MB |
| 05 - Privilege escalation.srt | 3.6 KB |
| 06 - Directory traversal.mp4 | 7.1 MB |
| 06 - Directory traversal.srt | 5.5 KB |
| 07 - File inclusion.mp4 | 3.1 MB |
| 07 - File inclusion.srt | 3.4 KB |
| 08 - Overflow attacks.mp4 | 9.5 MB |
| 08 - Overflow attacks.srt | 6.0 KB |
| 09 - Cookies and attachments.mp4 | 8.0 MB |
| 09 - Cookies and attachments.srt | 7.9 KB |
| 10 - Session hijacking.mp4 | 9.2 MB |
| 10 - Session hijacking.srt | 6.9 KB |
| 11 - Race conditions.mp4 | 4.7 MB |
| 11 - Race conditions.srt | 4.1 KB |
| 12 - Memory vulnerabilities.mp4 | 6.4 MB |
| 12 - Memory vulnerabilities.srt | 6.6 KB |
| 13 - Code execution attacks.mp4 | 5.0 MB |
| 13 - Code execution attacks.srt | 5.0 KB |
| 14 - Data poisoning.mp4 | 1.8 MB |
| 14 - Data poisoning.srt | 2.0 KB |
| 15 - Third-party code.mp4 | 8.6 MB |
| 15 - Third-party code.srt | 6.6 KB |
| 16 - Interception proxies.mp4 | 13.1 MB |
| 16 - Interception proxies.srt | 9.0 KB |
| 01 - Industrial control systems.mp4 | 10.9 MB |
| 01 - Industrial control systems.srt | 10.0 KB |
| 02 - Internet of Things.mp4 | 7.3 MB |
| 02 - Internet of Things.srt | 5.6 KB |
| 03 - Embedded systems.mp4 | 10.1 MB |
| 03 - Embedded systems.srt | 8.2 KB |
| 01 - Exploitation frameworks.mp4 | 11.8 MB |
| 01 - Exploitation frameworks.srt | 11.3 KB |
| 02 - Cloud auditing tools.mp4 | 12.4 MB |
| 02 - Cloud auditing tools.srt | 7.8 KB |
| 03 - Debuggers.mp4 | 1.1 MB |
| 03 - Debuggers.srt | 1.5 KB |
| 04 - Open-source reconnaissance.mp4 | 2.3 MB |
| 04 - Open-source reconnaissance.srt | 1.7 KB |
| 05 - Control frameworks.mp4 | 20.9 MB |
| 05 - Control frameworks.srt | 13.2 KB |
| 01 - Software platforms.mp4 | 4.8 MB |
| 01 - Software platforms.srt | 4.1 KB |
| 02 - Development methodologies.mp4 | 17.2 MB |
| 02 - Development methodologies.srt | 11.6 KB |
| 03 - Maturity models.mp4 | 5.7 MB |
| 03 - Maturity models.srt | 6.4 KB |
| 04 - Change management.mp4 | 7.9 MB |
| 04 - Change management.srt | 8.0 KB |
| 01 - Input validation.mp4 | 4.9 MB |
| 01 - Input validation.srt | 5.2 KB |
| 02 - Parameterized queries.mp4 | 7.0 MB |
| 02 - Parameterized queries.srt | 6.0 KB |
| 03 - Authentication and session management issues.mp4 | 3.1 MB |
| 03 - Authentication and session management issues.srt | 3.5 KB |
| 04 - Output encoding.mp4 | 6.6 MB |
| 04 - Output encoding.srt | 5.3 KB |
| 05 - Error and exception handling.mp4 | 4.9 MB |
| 05 - Error and exception handling.srt | 5.8 KB |
| 06 - Code signing.mp4 | 5.0 MB |
| 06 - Code signing.srt | 4.1 KB |
| 07 - Database security.mp4 | 6.5 MB |
| 07 - Database security.srt | 7.3 KB |
| 08 - Data de-identification.mp4 | 5.6 MB |
| 08 - Data de-identification.srt | 5.1 KB |
| 09 - Data obfuscation.mp4 | 3.3 MB |
| 09 - Data obfuscation.srt | 4.1 KB |
| 01 - Software testing.mp4 | 4.7 MB |
| 01 - Software testing.srt | 4.9 KB |
| 02 - Code security tests.mp4 | 3.6 MB |
| 02 - Code security tests.srt | 4.2 KB |
| 03 - Fuzzing.mp4 | 16.1 MB |
| 03 - Fuzzing.srt | 12.9 KB |
| 04 - Reverse engineering software.mp4 | 7.1 MB |
| 04 - Reverse engineering software.srt | 7.2 KB |
| 05 - Reverse engineering hardware.mp4 | 6.4 MB |
| 05 - Reverse engineering hardware.srt | 5.2 KB |
| 01 - Threat research.mp4 | 3.6 MB |
| 01 - Threat research.srt | 2.8 KB |
| 02 - Identify threats.mp4 | 3.9 MB |
| 02 - Identify threats.srt | 4.2 KB |
| 03 - Understand attacks.mp4 | 8.0 MB |
| 03 - Understand attacks.srt | 9.0 KB |
| 04 - Threat modeling.mp4 | 7.1 MB |
| 04 - Threat modeling.srt | 6.0 KB |
| 05 - Attack surface management.mp4 | 2.1 MB |
| 05 - Attack surface management.srt | 2.4 KB |
| 06 - Bug bounty.mp4 | 8.7 MB |
| 06 - Bug bounty.srt | 6.7 KB |
| 01 - Align security with the business.mp4 | 5.9 MB |
| 01 - Align security with the business.srt | 5.5 KB |
| 02 - Organizational processes.mp4 | 5.4 MB |
| 02 - Organizational processes.srt | 5.7 KB |
| 03 - Security roles and responsibilities.mp4 | 4.2 MB |
| 03 - Security roles and responsibilities.srt | 4.3 KB |
| 04 - Security control selection.mp4 | 8.3 MB |
| 04 - Security control selection.srt | 9.0 KB |
| 01 - Risk assessment.mp4 | 7.8 MB |
| 01 - Risk assessment.srt | 8.5 KB |
| 02 - Quantitative risk assessment.mp4 | 10.2 MB |
| 02 - Quantitative risk assessment.srt | 10.7 KB |
| 03 - Risk treatment options.mp4 | 9.1 MB |
| 03 - Risk treatment options.srt | 7.4 KB |
| 04 - Risk management frameworks.mp4 | 6.8 MB |
| 04 - Risk management frameworks.srt | 5.5 KB |
| 05 - Risk visibility and reporting.mp4 | 12.1 MB |
| 05 - Risk visibility and reporting.srt | 8.2 KB |
| 01 - Continue your studies.mp4 | 2.2 MB |
| 01 - Continue your studies.srt | 1.1 KB |
| Bonus Resources.txt | 386 bytes |
Name
DL
Uploader
Size
S/L
Added
-
332.0 MB
[2
/
2]
2023-07-27
| Uploaded by freecoursewb | Size 332.0 MB | Health [ 2 /2 ] | Added 2023-07-27 |
-
585.9 MB
[13
/
4]
2023-07-27
| Uploaded by freecoursewb | Size 585.9 MB | Health [ 13 /4 ] | Added 2023-07-27 |
-
24.6 MB
[14
/
0]
2023-06-02
| Uploaded by freecoursewb | Size 24.6 MB | Health [ 14 /0 ] | Added 2023-06-02 |
-
106.6 MB
[6
/
1]
2023-12-09
| Uploaded by indexFroggy | Size 106.6 MB | Health [ 6 /1 ] | Added 2023-12-09 |
NOTE
SOURCE: CompTIA Cybersecurity Analyst CySA CS0 003 2 Vulnerability Management
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×



