elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
068 - 7.9 Credential Stuffing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 8.1M
230 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 9.7M
226 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M
208 - 22.8 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M
114 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 10M
256 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
124 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
238 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
039 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
200 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 11M
069 - 7.10 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
032 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
214 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
221 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
249 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 12M
053 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
023 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
059 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
235 - 27.2 Other Sandbox Systems - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
251 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
129 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
136 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 13M
157 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
155 - 16.6 Integrated Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
183 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
072 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 14M
149 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M
095 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M
245 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 15M
154 - 16.5 Attack Vectors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
083 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
188 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
170 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
241 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
003 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
199 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 16M
109 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
123 - 12.9 Immediate vs. Total - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
193 - 21.5 Detection and Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
177 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
071 - 7.12 Session Hijacking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 17M
171 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 18M
233 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M
036 - 4.4 Software Assessment Tools and Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M
152 - 16.3 Reducing the Attack Surface Area - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 19M
017 - Learning objectives - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M
060 - 7.1 Attack Types and XML Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M
134 - 14.5 Impersonation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 20M
002 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M
206 - 22.6 Technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M
213 - 22.13 Access Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 21M
195 - 21.7 Downtime - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M
196 - 21.8 Recovery Time - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 22M
122 - 12.8 Organizations Impact vs. Localized Impact - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M
215 - 23.1 Business Impact and Risk Calculation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M
210 - 22.10 Tokenization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 24M
161 - 17.4 Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 25M
111 - 11.2 Trusted Platform Module (TPM) and Hardware Security Module (HSM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M
082 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M
197 - 21.9 Reverse Engineering - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 27M
112 - 11.3 Unified Extensible Firmware Interface (UEFI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M
061 - 7.2 SQL Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 28M
169 - 17.12 Continuous Deployment and Delivery - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
253 - 32.2 Type of Test Questions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
070 - 7.11 On-path and Man-in-the-Middle - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
113 - Module introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
147 - 15.11 Sandboxing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
163 - 17.6 Automated Malware Signature Creation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 29M
038 - 4.6 Cloud Infrastructure Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M
205 - 22.5 Data Minimization, Purpose Limitation, and NDA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M
046 - 5.7 Physical Access Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 31M
034 - 4.2 Web Application Scanners - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M
115 - 12.1 Event Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 32M
062 - 7.3 Overflow Attacks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 33M
101 - 10.6 Code Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M
254 - 32.3 Increasing Your Chances for Passing the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 34M
186 - 20.3 Sensitive Personal Information (SPI) and High Value Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M
182 - 19.5 Regulatory Bodies - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 36M
258 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Summary - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M
094 - 9.11 Encryption and Certificate Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 37M
078 - 8.6 Sensitive Data Exposure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
079 - 8.7 Insecure Components - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
153 - 16.4 Bundling Critical Assets - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
165 - 17.8 Threat Feed Combination - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 38M
138 - 15.2 Allow List - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M
065 - 7.6 Directory Traversal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 41M
090 - 9.7 Containerization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
167 - 17.10 Security Content Automation Protocol (SCAP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
103 - 10.8 Input Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
067 - 7.8 Password Spraying - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 43M
064 - 7.5 Remote Code Execution - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 44M
184 - 20.1 Personal Identifiable Information (PII) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 45M
080 - 8.8 Insufficient Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 46M
222 - 24.1 Frameworks - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 47M
194 - 21.6 Severity Level Classification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 48M
181 - 19.4 Senior Leadership - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M
192 - 21.4 Document Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M
190 - 21.2 Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 49M
074 - 8.2 Dereferencing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M
180 - 19.3 Public Relations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 50M
075 - 8.3 Insecure Object Reference - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 51M
144 - 15.8 Network Access Control (NAC) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
159 - 17.2 Security Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
187 - 20.4 Intellectual Property - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
107 - 10.12 Data Protection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
212 - 22.12 Geographic Access Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 52M
185 - 20.2 Personal Health Information (PHI) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 53M
133 - 14.4 Embedded Links - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M
191 - 21.3 Testing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 55M
168 - 17.11 Continuous Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 56M
108 - 10.13 Paramaterized Queries - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M
135 - 14.6 Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M
146 - 15.10 Malware Signature Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 57M
141 - 15.5 Intrusion Prevention System (IPS) Rules - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M
035 - 4.3 Infrastructure Vulnerability Scanner - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 58M
089 - 9.6 Change Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 59M
164 - 17.7 Data Encrichment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M
243 - 29.2 Image Header - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 60M
179 - 19.2 Human Resources - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 61M
211 - 22.11 Digital Rights Management (DRM) and Watermarking - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M
220 - 23.6 Supply Chain Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 62M
073 - 8.1 Vulnerabilities & Improper Error Handling - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M
139 - 15.3 Blocklist - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M
105 - 10.10 Session Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 63M
173 - 18.2 Communication Plan - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 65M
037 - 4.5 Wireless Assessment - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
106 - 10.11 Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
162 - 17.5 Application Programming Interface (API) Integration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
100 - 10.5 Security Regression Training - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
055 - 6.2 IaC, Insecure Applications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 66M
228 - 25.2 Malware Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M
145 - 15.9 Sinkholing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M
242 - 29.1 PE File Format - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 68M
143 - 15.7 Endpoint Detection and Response (EDR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M
104 - 10.9 Output Encoding - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M
156 - 16.7 Improving Detection Capabilities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 69M
209 - 22.9 Data Masking and Deidentification - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M
225 - 24.4 Audits and Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 70M
077 - 8.5 Broker Authentication - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M
217 - 23.3 System Assessments - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 71M
110 - 11.1 Hardware Root of Trust - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 72M
096 - 10.1 SDLC Platforms - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 73M
027 - 3.4 Remediation and Mitigation and Inhibitors - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 74M
128 - 13.4 Known-bad Internet Protocol (IP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M
198 - 21.10 Containment and Isolation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 75M
175 - 18.4 Regulatory and Legislative Requirements - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M
236 - 27.3 Networking and Internet Connections - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 76M
098 - 10.3 Software Assessment Methods - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 79M
148 - 15.12 Port Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M
160 - 17.3 Security Orchestration, Automation, and Response (SOAR) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 81M
087 - 9.4 Segmentation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M
229 - 25.3 Malware Analysis Overview - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 83M
054 - 6.1 Cloud Service, FaaS, and Deployment Models - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 85M
081 - 8.9 Weak or Default Configurations - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 87M
021 - 2.4 Threat Modeling Methodologies and Threat Intelligence Sharing with Support Functions - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 89M
132 - 14.3 Domain-based Message - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 94M
252 - 32.1 Understanding the Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M
142 - 15.6 Data Loss Prevention (DLP) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 95M
001 - CompTIA Cybersecurity Analyst (CySA+) CS0-002 Introduction - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 98M
247 - 30.2 Analyzing for Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M
237 - 27.4 Sandbox and Network - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 99M
127 - 13.3 Rule Writing - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 100M
234 - 27.1 Cuckoo Sandbox - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M
056 - 6.3 Application Programming Interface - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 106M
057 - 6.4 Improper Key Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 108M
040 - 5.1 Mobile - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 109M
020 - 2.3 Threat Research - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 111M
207 - 22.7 Encryption - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 116M
178 - 19.1 Legal - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M
099 - 10.4 User Acceptance Training and Stress Test - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 117M
030 - 3.7 Vulnerability Scanning - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M
202 - 22.2 Non-technical Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 120M
216 - 23.2 Communication Risk Factors and Risk Prioritization - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 122M
240 - 28.2 Column Setup - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 126M
102 - 10.7 Secure Coding Best Practices - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 127M
025 - 3.2 Vulnerability Identification - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 128M
116 - 12.2 Syslogs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 133M
019 - 2.2 Attack Frameworks - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 134M
125 - 13.1 Security Information and Event Management (SIEM) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M
248 - 30.3 Other Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 135M
151 - 16.2 Profiling Threat Actors and Activities - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M
246 - 30.1 Registry Persistence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 136M
086 - 9.3 Asset Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 144M
239 - 28.1 Wireshark - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M
076 - 8.4 Race Condition - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 145M
033 - 4.1 Understanding Results - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 148M
044 - 5.5 Embedded and Real-Time Operating Systems (RTOS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 151M
219 - 23.5 Compensating Controls and Training - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 155M
250 - 31.1 What to Look for - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 156M
201 - 22.1 Privacy vs. Security - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 159M
131 - 14.2 Domain Keys Identified Mail (DKIM) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 160M
041 - 5.2 Internet of Things (IoT) and Embedded Devices - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 165M
118 - 12.4 Web Application Firewall (WAF) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 167M
150 - 16.1 Establishing a Hypothesis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 168M
224 - 24.3 Control Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 171M
158 - 17.1 Workflow Orchestration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M
176 - 18.5 Preventing Inadvertent Release of Information - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 172M
255 - 32.4 Certification Review - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M
022 - 2.5 Wireless Analysis Techniques - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 177M
223 - 24.2 AUP, Password Policies, Data Ownership, and Other Procedures - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 180M
137 - 15.1 Change Control - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M
006 - 1.3 Threat Sources - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 185M
045 - 5.6 SOC and FPGA - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 187M
084 - 9.1 Cloud vs. On-premises - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 188M
047 - 5.8 Building Automation Systems, Vehicles, and Drones - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 190M
117 - 12.3 Firewall Logs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 194M
204 - 22.4 Confidentiality, Legal Requirements, and Data Sovereignty - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 200M
120 - 12.6 Intrusion Detection and Prevention (IDS IPS) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 205M
093 - 9.10 Honeypots and Breach Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 210M
058 - 6.5 Logging and Monitoring - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 212M
011 - 1.8 Social Media Graphs - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M
218 - 23.4 Compensating Controls and Training - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 214M
231 - 26.1 Why Set Up a Malware Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 217M
092 - 9.9 Cloud Access Security Broker (CASB) - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M
140 - 15.4 Firewall - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 218M
029 - 3.6 Vulnerability Scanning - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M
013 - 1.10 Log Challenges - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 221M
052 - 5.13 Verifications and Quality Controls - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 222M
130 - 14.1 Malicious Payload - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 223M
063 - 7.4 Cross-Site Scripting - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 224M
097 - 10.2 DevSecOps - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 225M
189 - 21.1 Preparation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 233M
203 - 22.3 Classification, Ownership, Retention, and Data Types - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 234M
066 - 7.7 Privilege Escalation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 245M
043 - 5.4 APTs - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 259M
091 - 9.8 Identity and Access Management - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 272M
126 - 13.2 Security Information and Event Management (SIEM) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 275M
016 - 1.13 Endpoint Detection - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 292M
014 - 1.11 Advanced Threat Hunting - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 312M
119 - 12.5 Proxy - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 313M
018 - 2.1 Attack Frameworks - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 323M
232 - 26.2 How to Correctly Set Up a Lab - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 328M
166 - 17.9 Machine Learning - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 332M
026 - 3.3 Validation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 335M
049 - 5.10 Defending Critical Infrastructure - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 348M
005 - 1.2 Threat Sources - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M
050 - 5.11 Supervisory Control and Data Acquisition (SCADA) - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 373M
012 - 1.9 Log Challenges - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 375M
051 - 5.12 Supervisory Control and Data Acquisition (SCADA) - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 380M
174 - 18.3 Trusted Parties - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 387M
009 - 1.6 Cyber Threat Investigation - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 394M
121 - 12.7 Impact Analysis - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M
257 - 33.1 What I Learned - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 396M
007 - 1.4 Threat Classifications - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 399M
088 - 9.5 Network Architecture - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 411M
028 - 3.5 Scanning Parameters and Criteria - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 415M
010 - 1.7 Social Media Graphs - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 416M
042 - 5.3 Internet of Things (IoT) and Embedded Devices - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 420M
048 - 5.9 Industrial Control Systems (ICS) and Process Automation - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 422M
227 - 25.1 Malware Threat Landscape - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 423M
085 - 9.2 Cloud vs. On-premises - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 426M
008 - 1.5 Cyber Threat Investigation - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 451M
015 - 1.12 Advanced Threat Hunting - Part 2 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 464M
172 - 18.1 What is a Cyber Incident - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 486M
031 - 3.8 Enumeration - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 488M
024 - 3.1 Vulnerability Identification - Part 1 - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 526M
244 - 29.3 Entry Points - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 572M
004 - 1.1 What is Threat Intelligence - CompTIA Cybersecurity Analyst (CySA+) CS0-002.mp4 604M
Recent Courses
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql