elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
001 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 98M
002 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M
003 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
004 - 1.1 What is Threat Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 604M
005 - 1.2 Threat Sources - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M
006 - 1.3 Threat Sources - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M
007 - 1.4 Threat Classifications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 399M
008 - 1.5 Cyber Threat Investigation - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 451M
009 - 1.6 Cyber Threat Investigation - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 394M
010 - 1.7 Social Media Graphs - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 416M
011 - 1.8 Social Media Graphs - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M
012 - 1.9 Log Challenges - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 375M
013 - 1.10 Log Challenges - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M
014 - 1.11 Advanced Threat Hunting - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 312M
015 - 1.12 Advanced Threat Hunting - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 464M
016 - 1.13 Endpoint Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 292M
017 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M
018 - 2.1 Attack Frameworks - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 323M
019 - 2.2 Attack Frameworks - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 134M
020 - 2.3 Threat Research - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 111M
021 - 2.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 89M
022 - 2.5 Wireless Analysis Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M
023 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
024 - 3.1 Vulnerability Identification - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 526M
025 - 3.2 Vulnerability Identification - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 128M
026 - 3.3 Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 335M
027 - 3.4 Remediation and Mitigation and Inhibitors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 74M
028 - 3.5 Scanning Parameters and Criteria - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 415M
029 - 3.6 Vulnerability Scanning - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M
030 - 3.7 Vulnerability Scanning - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M
031 - 3.8 Enumeration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 488M
032 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
033 - 4.1 Understanding Results - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 148M
034 - 4.2 Web Application Scanners - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M
035 - 4.3 Infrastructure Vulnerability Scanner - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M
036 - 4.4 Software Assessment Tools and Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M
037 - 4.5 Wireless Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
038 - 4.6 Cloud Infrastructure Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M
039 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
040 - 5.1 Mobile - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 109M
041 - 5.2 Internet of Things (IoT) and Embedded Devices - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 165M
042 - 5.3 Internet of Things (IoT) and Embedded Devices - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 420M
043 - 5.4 APTs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 259M
044 - 5.5 Embedded and Real-Time Operating Systems (RTOS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 151M
045 - 5.6 SOC and FPGA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 187M
046 - 5.7 Physical Access Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M
047 - 5.8 Building Automation Systems, Vehicles, and Drones - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 190M
048 - 5.9 Industrial Control Systems (ICS) and Process Automation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 422M
049 - 5.10 Defending Critical Infrastructure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 348M
050 - 5.11 Supervisory Control and Data Acquisition (SCADA) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M
051 - 5.12 Supervisory Control and Data Acquisition (SCADA) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 380M
052 - 5.13 Verifications and Quality Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 222M
053 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
054 - 6.1 Cloud Service, FaaS, and Deployment Models - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 85M
055 - 6.2 IaC, Insecure Applications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
056 - 6.3 Application Programming Interface - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M
057 - 6.4 Improper Key Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 108M
058 - 6.5 Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 212M
059 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
060 - 7.1 Attack Types and XML Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M
061 - 7.2 SQL Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M
062 - 7.3 Overflow Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 33M
063 - 7.4 Cross-Site Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 224M
064 - 7.5 Remote Code Execution - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 44M
065 - 7.6 Directory Traversal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M
066 - 7.7 Privilege Escalation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 245M
067 - 7.8 Password Spraying - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
068 - 7.9 Credential Stuffing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 8.1M
069 - 7.10 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
070 - 7.11 On-path and Man-in-the-Middle - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
071 - 7.12 Session Hijacking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
072 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
073 - 8.1 Vulnerabilities & Improper Error Handling - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M
074 - 8.2 Dereferencing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M
075 - 8.3 Insecure Object Reference - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 51M
076 - 8.4 Race Condition - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M
077 - 8.5 Broker Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M
078 - 8.6 Sensitive Data Exposure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
079 - 8.7 Insecure Components - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
080 - 8.8 Insufficient Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 46M
081 - 8.9 Weak or Default Configurations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 87M
082 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M
083 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
084 - 9.1 Cloud vs. On-premises - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 188M
085 - 9.2 Cloud vs. On-premises - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 426M
086 - 9.3 Asset Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 144M
087 - 9.4 Segmentation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M
088 - 9.5 Network Architecture - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 411M
089 - 9.6 Change Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 59M
090 - 9.7 Containerization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
091 - 9.8 Identity and Access Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 272M
092 - 9.9 Cloud Access Security Broker (CASB) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M
093 - 9.10 Honeypots and Breach Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 210M
094 - 9.11 Encryption and Certificate Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M
095 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M
096 - 10.1 SDLC Platforms - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 73M
097 - 10.2 DevSecOps - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 225M
098 - 10.3 Software Assessment Methods - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 79M
099 - 10.4 User Acceptance Training and Stress Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M
100 - 10.5 Security Regression Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
101 - 10.6 Code Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M
102 - 10.7 Secure Coding Best Practices - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 127M
103 - 10.8 Input Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
104 - 10.9 Output Encoding - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M
105 - 10.10 Session Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M
106 - 10.11 Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
107 - 10.12 Data Protection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
108 - 10.13 Paramaterized Queries - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M
109 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
110 - 11.1 Hardware Root of Trust - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 72M
111 - 11.2 Trusted Platform Module (TPM) and Hardware Security Module (HSM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M
112 - 11.3 Unified Extensible Firmware Interface (UEFI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M
113 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
114 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M
115 - 12.1 Event Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M
116 - 12.2 Syslogs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 133M
117 - 12.3 Firewall Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 194M
118 - 12.4 Web Application Firewall (WAF) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 167M
119 - 12.5 Proxy - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 313M
120 - 12.6 Intrusion Detection and Prevention (IDS IPS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 205M
121 - 12.7 Impact Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M
122 - 12.8 Organizations Impact vs. Localized Impact - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M
123 - 12.9 Immediate vs. Total - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
124 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
125 - 13.1 Security Information and Event Management (SIEM) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M
126 - 13.2 Security Information and Event Management (SIEM) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 275M
127 - 13.3 Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 100M
128 - 13.4 Known-bad Internet Protocol (IP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M
129 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
130 - 14.1 Malicious Payload - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 223M
131 - 14.2 Domain Keys Identified Mail (DKIM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 160M
132 - 14.3 Domain-based Message - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 94M
133 - 14.4 Embedded Links - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M
134 - 14.5 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M
135 - 14.6 Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M
136 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
137 - 15.1 Change Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M
138 - 15.2 Allow List - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M
139 - 15.3 Blocklist - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M
140 - 15.4 Firewall - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M
141 - 15.5 Intrusion Prevention System (IPS) Rules - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M
142 - 15.6 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M
143 - 15.7 Endpoint Detection and Response (EDR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M
144 - 15.8 Network Access Control (NAC) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
145 - 15.9 Sinkholing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M
146 - 15.10 Malware Signature Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M
147 - 15.11 Sandboxing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
148 - 15.12 Port Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M
149 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M
150 - 16.1 Establishing a Hypothesis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 168M
151 - 16.2 Profiling Threat Actors and Activities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M
152 - 16.3 Reducing the Attack Surface Area - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M
153 - 16.4 Bundling Critical Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
154 - 16.5 Attack Vectors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
155 - 16.6 Integrated Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
156 - 16.7 Improving Detection Capabilities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M
157 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
158 - 17.1 Workflow Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M
159 - 17.2 Security Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
160 - 17.3 Security Orchestration, Automation, and Response (SOAR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M
161 - 17.4 Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 25M
162 - 17.5 Application Programming Interface (API) Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
163 - 17.6 Automated Malware Signature Creation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
164 - 17.7 Data Encrichment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M
165 - 17.8 Threat Feed Combination - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
166 - 17.9 Machine Learning - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 332M
167 - 17.10 Security Content Automation Protocol (SCAP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
168 - 17.11 Continuous Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 56M
169 - 17.12 Continuous Deployment and Delivery - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
170 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
171 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 18M
172 - 18.1 What is a Cyber Incident - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 486M
173 - 18.2 Communication Plan - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 65M
174 - 18.3 Trusted Parties - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 387M
175 - 18.4 Regulatory and Legislative Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M
176 - 18.5 Preventing Inadvertent Release of Information - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M
177 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
178 - 19.1 Legal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M
179 - 19.2 Human Resources - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 61M
180 - 19.3 Public Relations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M
181 - 19.4 Senior Leadership - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M
182 - 19.5 Regulatory Bodies - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M
183 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
184 - 20.1 Personal Identifiable Information (PII) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 45M
185 - 20.2 Personal Health Information (PHI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 53M
186 - 20.3 Sensitive Personal Information (SPI) and High Value Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M
187 - 20.4 Intellectual Property - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
188 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
189 - 21.1 Preparation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 233M
190 - 21.2 Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M
191 - 21.3 Testing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M
192 - 21.4 Document Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M
193 - 21.5 Detection and Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
194 - 21.6 Severity Level Classification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 48M
195 - 21.7 Downtime - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M
196 - 21.8 Recovery Time - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M
197 - 21.9 Reverse Engineering - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M
198 - 21.10 Containment and Isolation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M
199 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
200 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
201 - 22.1 Privacy vs. Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 159M
202 - 22.2 Non-technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M
203 - 22.3 Classification, Ownership, Retention, and Data Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 234M
204 - 22.4 Confidentiality, Legal Requirements, and Data Sovereignty - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 200M
205 - 22.5 Data Minimization, Purpose Limitation, and NDA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M
206 - 22.6 Technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M
207 - 22.7 Encryption - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 116M
208 - 22.8 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M
209 - 22.9 Data Masking and Deidentification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M
210 - 22.10 Tokenization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M
211 - 22.11 Digital Rights Management (DRM) and Watermarking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M
212 - 22.12 Geographic Access Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
213 - 22.13 Access Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M
214 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
215 - 23.1 Business Impact and Risk Calculation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M
216 - 23.2 Communication Risk Factors and Risk Prioritization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 122M
217 - 23.3 System Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M
218 - 23.4 Compensating Controls and Training - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M
219 - 23.5 Compensating Controls and Training - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 155M
220 - 23.6 Supply Chain Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M
221 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
222 - 24.1 Frameworks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 47M
223 - 24.2 AUP, Password Policies, Data Ownership, and Other Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 180M
224 - 24.3 Control Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 171M
225 - 24.4 Audits and Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M
226 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M
227 - 25.1 Malware Threat Landscape - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 423M
228 - 25.2 Malware Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M
229 - 25.3 Malware Analysis Overview - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M
230 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 9.7M
231 - 26.1 Why Set Up a Malware Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 217M
232 - 26.2 How to Correctly Set Up a Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 328M
233 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M
234 - 27.1 Cuckoo Sandbox - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M
235 - 27.2 Other Sandbox Systems - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
236 - 27.3 Networking and Internet Connections - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M
237 - 27.4 Sandbox and Network - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M
238 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
239 - 28.1 Wireshark - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M
240 - 28.2 Column Setup - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 126M
241 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
242 - 29.1 PE File Format - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M
243 - 29.2 Image Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M
244 - 29.3 Entry Points - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 572M
245 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M
246 - 30.1 Registry Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M
247 - 30.2 Analyzing for Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M
248 - 30.3 Other Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M
249 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
250 - 31.1 What to Look for - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 156M
251 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
252 - 32.1 Understanding the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M
253 - 32.2 Type of Test Questions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
254 - 32.3 Increasing Your Chances for Passing the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M
255 - 32.4 Certification Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M
256 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
257 - 33.1 What I Learned - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M
258 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Summary - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M
Recent Courses
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql