elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                                                                               Size  
[Volver] Parent Directory - [VID] 001 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 98M [VID] 002 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M [VID] 003 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 004 - 1.1 What is Threat Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 604M [VID] 005 - 1.2 Threat Sources - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M [VID] 006 - 1.3 Threat Sources - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M [VID] 007 - 1.4 Threat Classifications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 399M [VID] 008 - 1.5 Cyber Threat Investigation - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 451M [VID] 009 - 1.6 Cyber Threat Investigation - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 394M [VID] 010 - 1.7 Social Media Graphs - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 416M [VID] 011 - 1.8 Social Media Graphs - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M [VID] 012 - 1.9 Log Challenges - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 375M [VID] 013 - 1.10 Log Challenges - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M [VID] 014 - 1.11 Advanced Threat Hunting - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 312M [VID] 015 - 1.12 Advanced Threat Hunting - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 464M [VID] 016 - 1.13 Endpoint Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 292M [VID] 017 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M [VID] 018 - 2.1 Attack Frameworks - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 323M [VID] 019 - 2.2 Attack Frameworks - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 134M [VID] 020 - 2.3 Threat Research - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 111M [VID] 021 - 2.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 89M [VID] 022 - 2.5 Wireless Analysis Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M [VID] 023 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 024 - 3.1 Vulnerability Identification - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 526M [VID] 025 - 3.2 Vulnerability Identification - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 128M [VID] 026 - 3.3 Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 335M [VID] 027 - 3.4 Remediation and Mitigation and Inhibitors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 74M [VID] 028 - 3.5 Scanning Parameters and Criteria - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 415M [VID] 029 - 3.6 Vulnerability Scanning - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M [VID] 030 - 3.7 Vulnerability Scanning - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M [VID] 031 - 3.8 Enumeration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 488M [VID] 032 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 033 - 4.1 Understanding Results - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 148M [VID] 034 - 4.2 Web Application Scanners - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M [VID] 035 - 4.3 Infrastructure Vulnerability Scanner - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M [VID] 036 - 4.4 Software Assessment Tools and Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M [VID] 037 - 4.5 Wireless Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 038 - 4.6 Cloud Infrastructure Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M [VID] 039 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 040 - 5.1 Mobile - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 109M [VID] 041 - 5.2 Internet of Things (IoT) and Embedded Devices - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 165M [VID] 042 - 5.3 Internet of Things (IoT) and Embedded Devices - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 420M [VID] 043 - 5.4 APTs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 259M [VID] 044 - 5.5 Embedded and Real-Time Operating Systems (RTOS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 151M [VID] 045 - 5.6 SOC and FPGA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 187M [VID] 046 - 5.7 Physical Access Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M [VID] 047 - 5.8 Building Automation Systems, Vehicles, and Drones - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 190M [VID] 048 - 5.9 Industrial Control Systems (ICS) and Process Automation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 422M [VID] 049 - 5.10 Defending Critical Infrastructure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 348M [VID] 050 - 5.11 Supervisory Control and Data Acquisition (SCADA) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M [VID] 051 - 5.12 Supervisory Control and Data Acquisition (SCADA) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 380M [VID] 052 - 5.13 Verifications and Quality Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 222M [VID] 053 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 054 - 6.1 Cloud Service, FaaS, and Deployment Models - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 85M [VID] 055 - 6.2 IaC, Insecure Applications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 056 - 6.3 Application Programming Interface - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M [VID] 057 - 6.4 Improper Key Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 108M [VID] 058 - 6.5 Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 212M [VID] 059 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 060 - 7.1 Attack Types and XML Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M [VID] 061 - 7.2 SQL Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M [VID] 062 - 7.3 Overflow Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 33M [VID] 063 - 7.4 Cross-Site Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 224M [VID] 064 - 7.5 Remote Code Execution - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 44M [VID] 065 - 7.6 Directory Traversal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M [VID] 066 - 7.7 Privilege Escalation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 245M [VID] 067 - 7.8 Password Spraying - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 068 - 7.9 Credential Stuffing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 8.1M [VID] 069 - 7.10 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 070 - 7.11 On-path and Man-in-the-Middle - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 071 - 7.12 Session Hijacking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 072 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 073 - 8.1 Vulnerabilities & Improper Error Handling - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M [VID] 074 - 8.2 Dereferencing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M [VID] 075 - 8.3 Insecure Object Reference - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 51M [VID] 076 - 8.4 Race Condition - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M [VID] 077 - 8.5 Broker Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M [VID] 078 - 8.6 Sensitive Data Exposure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 079 - 8.7 Insecure Components - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 080 - 8.8 Insufficient Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 46M [VID] 081 - 8.9 Weak or Default Configurations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 87M [VID] 082 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M [VID] 083 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 084 - 9.1 Cloud vs. On-premises - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 188M [VID] 085 - 9.2 Cloud vs. On-premises - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 426M [VID] 086 - 9.3 Asset Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 144M [VID] 087 - 9.4 Segmentation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M [VID] 088 - 9.5 Network Architecture - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 411M [VID] 089 - 9.6 Change Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 59M [VID] 090 - 9.7 Containerization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 091 - 9.8 Identity and Access Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 272M [VID] 092 - 9.9 Cloud Access Security Broker (CASB) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M [VID] 093 - 9.10 Honeypots and Breach Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 210M [VID] 094 - 9.11 Encryption and Certificate Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M [VID] 095 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M [VID] 096 - 10.1 SDLC Platforms - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 73M [VID] 097 - 10.2 DevSecOps - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 225M [VID] 098 - 10.3 Software Assessment Methods - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 79M [VID] 099 - 10.4 User Acceptance Training and Stress Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M [VID] 100 - 10.5 Security Regression Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 101 - 10.6 Code Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M [VID] 102 - 10.7 Secure Coding Best Practices - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 127M [VID] 103 - 10.8 Input Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 104 - 10.9 Output Encoding - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M [VID] 105 - 10.10 Session Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M [VID] 106 - 10.11 Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 107 - 10.12 Data Protection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 108 - 10.13 Paramaterized Queries - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M [VID] 109 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 110 - 11.1 Hardware Root of Trust - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 72M [VID] 111 - 11.2 Trusted Platform Module (TPM) and Hardware Security Module (HSM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M [VID] 112 - 11.3 Unified Extensible Firmware Interface (UEFI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M [VID] 113 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 114 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M [VID] 115 - 12.1 Event Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M [VID] 116 - 12.2 Syslogs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 133M [VID] 117 - 12.3 Firewall Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 194M [VID] 118 - 12.4 Web Application Firewall (WAF) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 167M [VID] 119 - 12.5 Proxy - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 313M [VID] 120 - 12.6 Intrusion Detection and Prevention (IDS IPS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 205M [VID] 121 - 12.7 Impact Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M [VID] 122 - 12.8 Organizations Impact vs. Localized Impact - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M [VID] 123 - 12.9 Immediate vs. Total - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 124 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 125 - 13.1 Security Information and Event Management (SIEM) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M [VID] 126 - 13.2 Security Information and Event Management (SIEM) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 275M [VID] 127 - 13.3 Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 100M [VID] 128 - 13.4 Known-bad Internet Protocol (IP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M [VID] 129 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 130 - 14.1 Malicious Payload - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 223M [VID] 131 - 14.2 Domain Keys Identified Mail (DKIM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 160M [VID] 132 - 14.3 Domain-based Message - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 94M [VID] 133 - 14.4 Embedded Links - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M [VID] 134 - 14.5 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M [VID] 135 - 14.6 Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M [VID] 136 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 137 - 15.1 Change Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M [VID] 138 - 15.2 Allow List - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M [VID] 139 - 15.3 Blocklist - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M [VID] 140 - 15.4 Firewall - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M [VID] 141 - 15.5 Intrusion Prevention System (IPS) Rules - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M [VID] 142 - 15.6 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M [VID] 143 - 15.7 Endpoint Detection and Response (EDR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M [VID] 144 - 15.8 Network Access Control (NAC) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 145 - 15.9 Sinkholing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M [VID] 146 - 15.10 Malware Signature Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M [VID] 147 - 15.11 Sandboxing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 148 - 15.12 Port Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M [VID] 149 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M [VID] 150 - 16.1 Establishing a Hypothesis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 168M [VID] 151 - 16.2 Profiling Threat Actors and Activities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M [VID] 152 - 16.3 Reducing the Attack Surface Area - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M [VID] 153 - 16.4 Bundling Critical Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 154 - 16.5 Attack Vectors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 155 - 16.6 Integrated Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 156 - 16.7 Improving Detection Capabilities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M [VID] 157 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 158 - 17.1 Workflow Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M [VID] 159 - 17.2 Security Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 160 - 17.3 Security Orchestration, Automation, and Response (SOAR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M [VID] 161 - 17.4 Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 25M [VID] 162 - 17.5 Application Programming Interface (API) Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 163 - 17.6 Automated Malware Signature Creation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 164 - 17.7 Data Encrichment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M [VID] 165 - 17.8 Threat Feed Combination - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 166 - 17.9 Machine Learning - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 332M [VID] 167 - 17.10 Security Content Automation Protocol (SCAP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 168 - 17.11 Continuous Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 56M [VID] 169 - 17.12 Continuous Deployment and Delivery - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 170 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 171 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 18M [VID] 172 - 18.1 What is a Cyber Incident - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 486M [VID] 173 - 18.2 Communication Plan - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 65M [VID] 174 - 18.3 Trusted Parties - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 387M [VID] 175 - 18.4 Regulatory and Legislative Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M [VID] 176 - 18.5 Preventing Inadvertent Release of Information - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M [VID] 177 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 178 - 19.1 Legal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M [VID] 179 - 19.2 Human Resources - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 61M [VID] 180 - 19.3 Public Relations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M [VID] 181 - 19.4 Senior Leadership - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M [VID] 182 - 19.5 Regulatory Bodies - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M [VID] 183 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 184 - 20.1 Personal Identifiable Information (PII) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 45M [VID] 185 - 20.2 Personal Health Information (PHI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 53M [VID] 186 - 20.3 Sensitive Personal Information (SPI) and High Value Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M [VID] 187 - 20.4 Intellectual Property - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 188 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 189 - 21.1 Preparation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 233M [VID] 190 - 21.2 Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M [VID] 191 - 21.3 Testing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M [VID] 192 - 21.4 Document Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M [VID] 193 - 21.5 Detection and Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 194 - 21.6 Severity Level Classification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 48M [VID] 195 - 21.7 Downtime - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M [VID] 196 - 21.8 Recovery Time - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M [VID] 197 - 21.9 Reverse Engineering - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M [VID] 198 - 21.10 Containment and Isolation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M [VID] 199 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 200 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 201 - 22.1 Privacy vs. Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 159M [VID] 202 - 22.2 Non-technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M [VID] 203 - 22.3 Classification, Ownership, Retention, and Data Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 234M [VID] 204 - 22.4 Confidentiality, Legal Requirements, and Data Sovereignty - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 200M [VID] 205 - 22.5 Data Minimization, Purpose Limitation, and NDA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M [VID] 206 - 22.6 Technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M [VID] 207 - 22.7 Encryption - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 116M [VID] 208 - 22.8 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M [VID] 209 - 22.9 Data Masking and Deidentification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M [VID] 210 - 22.10 Tokenization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M [VID] 211 - 22.11 Digital Rights Management (DRM) and Watermarking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M [VID] 212 - 22.12 Geographic Access Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 213 - 22.13 Access Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M [VID] 214 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 215 - 23.1 Business Impact and Risk Calculation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M [VID] 216 - 23.2 Communication Risk Factors and Risk Prioritization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 122M [VID] 217 - 23.3 System Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M [VID] 218 - 23.4 Compensating Controls and Training - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M [VID] 219 - 23.5 Compensating Controls and Training - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 155M [VID] 220 - 23.6 Supply Chain Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M [VID] 221 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 222 - 24.1 Frameworks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 47M [VID] 223 - 24.2 AUP, Password Policies, Data Ownership, and Other Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 180M [VID] 224 - 24.3 Control Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 171M [VID] 225 - 24.4 Audits and Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M [VID] 226 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M [VID] 227 - 25.1 Malware Threat Landscape - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 423M [VID] 228 - 25.2 Malware Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M [VID] 229 - 25.3 Malware Analysis Overview - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M [VID] 230 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 9.7M [VID] 231 - 26.1 Why Set Up a Malware Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 217M [VID] 232 - 26.2 How to Correctly Set Up a Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 328M [VID] 233 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M [VID] 234 - 27.1 Cuckoo Sandbox - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M [VID] 235 - 27.2 Other Sandbox Systems - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 236 - 27.3 Networking and Internet Connections - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M [VID] 237 - 27.4 Sandbox and Network - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M [VID] 238 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 239 - 28.1 Wireshark - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M [VID] 240 - 28.2 Column Setup - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 126M [VID] 241 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 242 - 29.1 PE File Format - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M [VID] 243 - 29.2 Image Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M [VID] 244 - 29.3 Entry Points - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 572M [VID] 245 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M [VID] 246 - 30.1 Registry Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M [VID] 247 - 30.2 Analyzing for Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M [VID] 248 - 30.3 Other Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M [VID] 249 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 250 - 31.1 What to Look for - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 156M [VID] 251 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 252 - 32.1 Understanding the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M [VID] 253 - 32.2 Type of Test Questions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 254 - 32.3 Increasing Your Chances for Passing the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M [VID] 255 - 32.4 Certification Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M [VID] 256 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 257 - 33.1 What I Learned - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M [VID] 258 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Summary - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M

Recent Courses

CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql