elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                                                                               Size  
[Volver] Parent Directory - [VID] 258 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Summary - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M [VID] 257 - 33.1 What I Learned - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M [VID] 256 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 255 - 32.4 Certification Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M [VID] 254 - 32.3 Increasing Your Chances for Passing the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M [VID] 253 - 32.2 Type of Test Questions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 252 - 32.1 Understanding the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M [VID] 251 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 250 - 31.1 What to Look for - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 156M [VID] 249 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 248 - 30.3 Other Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M [VID] 247 - 30.2 Analyzing for Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M [VID] 246 - 30.1 Registry Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M [VID] 245 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M [VID] 244 - 29.3 Entry Points - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 572M [VID] 243 - 29.2 Image Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M [VID] 242 - 29.1 PE File Format - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M [VID] 241 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 240 - 28.2 Column Setup - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 126M [VID] 239 - 28.1 Wireshark - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M [VID] 238 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 237 - 27.4 Sandbox and Network - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M [VID] 236 - 27.3 Networking and Internet Connections - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M [VID] 235 - 27.2 Other Sandbox Systems - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 234 - 27.1 Cuckoo Sandbox - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M [VID] 233 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M [VID] 232 - 26.2 How to Correctly Set Up a Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 328M [VID] 231 - 26.1 Why Set Up a Malware Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 217M [VID] 230 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 9.7M [VID] 229 - 25.3 Malware Analysis Overview - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M [VID] 228 - 25.2 Malware Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M [VID] 227 - 25.1 Malware Threat Landscape - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 423M [VID] 226 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M [VID] 225 - 24.4 Audits and Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M [VID] 224 - 24.3 Control Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 171M [VID] 223 - 24.2 AUP, Password Policies, Data Ownership, and Other Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 180M [VID] 222 - 24.1 Frameworks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 47M [VID] 221 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 220 - 23.6 Supply Chain Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M [VID] 219 - 23.5 Compensating Controls and Training - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 155M [VID] 218 - 23.4 Compensating Controls and Training - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M [VID] 217 - 23.3 System Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M [VID] 216 - 23.2 Communication Risk Factors and Risk Prioritization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 122M [VID] 215 - 23.1 Business Impact and Risk Calculation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M [VID] 214 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 213 - 22.13 Access Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M [VID] 212 - 22.12 Geographic Access Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 211 - 22.11 Digital Rights Management (DRM) and Watermarking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M [VID] 210 - 22.10 Tokenization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M [VID] 209 - 22.9 Data Masking and Deidentification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M [VID] 208 - 22.8 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M [VID] 207 - 22.7 Encryption - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 116M [VID] 206 - 22.6 Technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M [VID] 205 - 22.5 Data Minimization, Purpose Limitation, and NDA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M [VID] 204 - 22.4 Confidentiality, Legal Requirements, and Data Sovereignty - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 200M [VID] 203 - 22.3 Classification, Ownership, Retention, and Data Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 234M [VID] 202 - 22.2 Non-technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M [VID] 201 - 22.1 Privacy vs. Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 159M [VID] 200 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 199 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 198 - 21.10 Containment and Isolation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M [VID] 197 - 21.9 Reverse Engineering - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M [VID] 196 - 21.8 Recovery Time - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M [VID] 195 - 21.7 Downtime - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M [VID] 194 - 21.6 Severity Level Classification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 48M [VID] 193 - 21.5 Detection and Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 192 - 21.4 Document Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M [VID] 191 - 21.3 Testing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M [VID] 190 - 21.2 Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M [VID] 189 - 21.1 Preparation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 233M [VID] 188 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 187 - 20.4 Intellectual Property - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 186 - 20.3 Sensitive Personal Information (SPI) and High Value Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M [VID] 185 - 20.2 Personal Health Information (PHI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 53M [VID] 184 - 20.1 Personal Identifiable Information (PII) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 45M [VID] 183 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 182 - 19.5 Regulatory Bodies - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M [VID] 181 - 19.4 Senior Leadership - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M [VID] 180 - 19.3 Public Relations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M [VID] 179 - 19.2 Human Resources - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 61M [VID] 178 - 19.1 Legal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M [VID] 177 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 176 - 18.5 Preventing Inadvertent Release of Information - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M [VID] 175 - 18.4 Regulatory and Legislative Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M [VID] 174 - 18.3 Trusted Parties - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 387M [VID] 173 - 18.2 Communication Plan - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 65M [VID] 172 - 18.1 What is a Cyber Incident - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 486M [VID] 171 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 18M [VID] 170 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 169 - 17.12 Continuous Deployment and Delivery - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 168 - 17.11 Continuous Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 56M [VID] 167 - 17.10 Security Content Automation Protocol (SCAP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 166 - 17.9 Machine Learning - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 332M [VID] 165 - 17.8 Threat Feed Combination - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 164 - 17.7 Data Encrichment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M [VID] 163 - 17.6 Automated Malware Signature Creation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 162 - 17.5 Application Programming Interface (API) Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 161 - 17.4 Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 25M [VID] 160 - 17.3 Security Orchestration, Automation, and Response (SOAR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M [VID] 159 - 17.2 Security Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 158 - 17.1 Workflow Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M [VID] 157 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 156 - 16.7 Improving Detection Capabilities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M [VID] 155 - 16.6 Integrated Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 154 - 16.5 Attack Vectors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 153 - 16.4 Bundling Critical Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 152 - 16.3 Reducing the Attack Surface Area - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M [VID] 151 - 16.2 Profiling Threat Actors and Activities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M [VID] 150 - 16.1 Establishing a Hypothesis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 168M [VID] 149 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M [VID] 148 - 15.12 Port Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M [VID] 147 - 15.11 Sandboxing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 146 - 15.10 Malware Signature Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M [VID] 145 - 15.9 Sinkholing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M [VID] 144 - 15.8 Network Access Control (NAC) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 143 - 15.7 Endpoint Detection and Response (EDR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M [VID] 142 - 15.6 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M [VID] 141 - 15.5 Intrusion Prevention System (IPS) Rules - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M [VID] 140 - 15.4 Firewall - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M [VID] 139 - 15.3 Blocklist - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M [VID] 138 - 15.2 Allow List - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M [VID] 137 - 15.1 Change Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M [VID] 136 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 135 - 14.6 Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M [VID] 134 - 14.5 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M [VID] 133 - 14.4 Embedded Links - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M [VID] 132 - 14.3 Domain-based Message - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 94M [VID] 131 - 14.2 Domain Keys Identified Mail (DKIM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 160M [VID] 130 - 14.1 Malicious Payload - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 223M [VID] 129 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 128 - 13.4 Known-bad Internet Protocol (IP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M [VID] 127 - 13.3 Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 100M [VID] 126 - 13.2 Security Information and Event Management (SIEM) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 275M [VID] 125 - 13.1 Security Information and Event Management (SIEM) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M [VID] 124 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 123 - 12.9 Immediate vs. Total - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 122 - 12.8 Organizations Impact vs. Localized Impact - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M [VID] 121 - 12.7 Impact Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M [VID] 120 - 12.6 Intrusion Detection and Prevention (IDS IPS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 205M [VID] 119 - 12.5 Proxy - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 313M [VID] 118 - 12.4 Web Application Firewall (WAF) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 167M [VID] 117 - 12.3 Firewall Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 194M [VID] 116 - 12.2 Syslogs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 133M [VID] 115 - 12.1 Event Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M [VID] 114 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M [VID] 113 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 112 - 11.3 Unified Extensible Firmware Interface (UEFI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M [VID] 111 - 11.2 Trusted Platform Module (TPM) and Hardware Security Module (HSM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M [VID] 110 - 11.1 Hardware Root of Trust - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 72M [VID] 109 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 108 - 10.13 Paramaterized Queries - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M [VID] 107 - 10.12 Data Protection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M [VID] 106 - 10.11 Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 105 - 10.10 Session Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M [VID] 104 - 10.9 Output Encoding - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M [VID] 103 - 10.8 Input Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 102 - 10.7 Secure Coding Best Practices - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 127M [VID] 101 - 10.6 Code Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M [VID] 100 - 10.5 Security Regression Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 099 - 10.4 User Acceptance Training and Stress Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M [VID] 098 - 10.3 Software Assessment Methods - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 79M [VID] 097 - 10.2 DevSecOps - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 225M [VID] 096 - 10.1 SDLC Platforms - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 73M [VID] 095 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M [VID] 094 - 9.11 Encryption and Certificate Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M [VID] 093 - 9.10 Honeypots and Breach Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 210M [VID] 092 - 9.9 Cloud Access Security Broker (CASB) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M [VID] 091 - 9.8 Identity and Access Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 272M [VID] 090 - 9.7 Containerization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 089 - 9.6 Change Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 59M [VID] 088 - 9.5 Network Architecture - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 411M [VID] 087 - 9.4 Segmentation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M [VID] 086 - 9.3 Asset Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 144M [VID] 085 - 9.2 Cloud vs. On-premises - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 426M [VID] 084 - 9.1 Cloud vs. On-premises - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 188M [VID] 083 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 082 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M [VID] 081 - 8.9 Weak or Default Configurations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 87M [VID] 080 - 8.8 Insufficient Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 46M [VID] 079 - 8.7 Insecure Components - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 078 - 8.6 Sensitive Data Exposure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M [VID] 077 - 8.5 Broker Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M [VID] 076 - 8.4 Race Condition - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M [VID] 075 - 8.3 Insecure Object Reference - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 51M [VID] 074 - 8.2 Dereferencing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M [VID] 073 - 8.1 Vulnerabilities & Improper Error Handling - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M [VID] 072 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M [VID] 071 - 7.12 Session Hijacking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M [VID] 070 - 7.11 On-path and Man-in-the-Middle - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M [VID] 069 - 7.10 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 068 - 7.9 Credential Stuffing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 8.1M [VID] 067 - 7.8 Password Spraying - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M [VID] 066 - 7.7 Privilege Escalation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 245M [VID] 065 - 7.6 Directory Traversal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M [VID] 064 - 7.5 Remote Code Execution - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 44M [VID] 063 - 7.4 Cross-Site Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 224M [VID] 062 - 7.3 Overflow Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 33M [VID] 061 - 7.2 SQL Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M [VID] 060 - 7.1 Attack Types and XML Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M [VID] 059 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 058 - 6.5 Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 212M [VID] 057 - 6.4 Improper Key Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 108M [VID] 056 - 6.3 Application Programming Interface - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M [VID] 055 - 6.2 IaC, Insecure Applications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 054 - 6.1 Cloud Service, FaaS, and Deployment Models - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 85M [VID] 053 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 052 - 5.13 Verifications and Quality Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 222M [VID] 051 - 5.12 Supervisory Control and Data Acquisition (SCADA) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 380M [VID] 050 - 5.11 Supervisory Control and Data Acquisition (SCADA) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M [VID] 049 - 5.10 Defending Critical Infrastructure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 348M [VID] 048 - 5.9 Industrial Control Systems (ICS) and Process Automation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 422M [VID] 047 - 5.8 Building Automation Systems, Vehicles, and Drones - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 190M [VID] 046 - 5.7 Physical Access Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M [VID] 045 - 5.6 SOC and FPGA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 187M [VID] 044 - 5.5 Embedded and Real-Time Operating Systems (RTOS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 151M [VID] 043 - 5.4 APTs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 259M [VID] 042 - 5.3 Internet of Things (IoT) and Embedded Devices - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 420M [VID] 041 - 5.2 Internet of Things (IoT) and Embedded Devices - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 165M [VID] 040 - 5.1 Mobile - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 109M [VID] 039 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M [VID] 038 - 4.6 Cloud Infrastructure Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M [VID] 037 - 4.5 Wireless Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M [VID] 036 - 4.4 Software Assessment Tools and Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M [VID] 035 - 4.3 Infrastructure Vulnerability Scanner - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M [VID] 034 - 4.2 Web Application Scanners - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M [VID] 033 - 4.1 Understanding Results - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 148M [VID] 032 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M [VID] 031 - 3.8 Enumeration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 488M [VID] 030 - 3.7 Vulnerability Scanning - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M [VID] 029 - 3.6 Vulnerability Scanning - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M [VID] 028 - 3.5 Scanning Parameters and Criteria - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 415M [VID] 027 - 3.4 Remediation and Mitigation and Inhibitors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 74M [VID] 026 - 3.3 Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 335M [VID] 025 - 3.2 Vulnerability Identification - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 128M [VID] 024 - 3.1 Vulnerability Identification - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 526M [VID] 023 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M [VID] 022 - 2.5 Wireless Analysis Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M [VID] 021 - 2.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 89M [VID] 020 - 2.3 Threat Research - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 111M [VID] 019 - 2.2 Attack Frameworks - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 134M [VID] 018 - 2.1 Attack Frameworks - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 323M [VID] 017 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M [VID] 016 - 1.13 Endpoint Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 292M [VID] 015 - 1.12 Advanced Threat Hunting - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 464M [VID] 014 - 1.11 Advanced Threat Hunting - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 312M [VID] 013 - 1.10 Log Challenges - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M [VID] 012 - 1.9 Log Challenges - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 375M [VID] 011 - 1.8 Social Media Graphs - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M [VID] 010 - 1.7 Social Media Graphs - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 416M [VID] 009 - 1.6 Cyber Threat Investigation - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 394M [VID] 008 - 1.5 Cyber Threat Investigation - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 451M [VID] 007 - 1.4 Threat Classifications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 399M [VID] 006 - 1.3 Threat Sources - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M [VID] 005 - 1.2 Threat Sources - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M [VID] 004 - 1.1 What is Threat Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 604M [VID] 003 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M [VID] 002 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M [VID] 001 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 98M

Recent Courses

CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql