Lynda - CompTIA Security Exam Prep SY0-401 - Threats and Vulnerabilities

File Type Create Time File Size Seeders Leechers Updated
Movie 2015-10-14 453.18MB 0 0 1 year ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
Lynda  CompTIA  Security  Exam  Prep  SY0  401  Threats  and  Vulnerabilities  
Related Torrents
  1. Lynda - CompTIA Security Exam Prep SY0 401 Part 1 Network Security 260.48MB
  2. Lynda - CompTIA Security Exam Prep SY0 401 Part 1 Network Security 260.48MB
  3. Lynda - CompTIA Security Exam Prep SY0 401 Part 1 Network Security 260.48MB
  4. LYNDA_COMPTIA_SECURITYPLUS_EXAM_PREP_SY0_401_NETWORK_SECURITY_TUTORIAL-kEISO 260.60MB
  5. LYNDA_COMPTIA_SECURITYPLUS_EXAM_PREP_SY0_401_NETWORK_SECURITY_TUTORIAL-kEISO 239.55MB
  6. CompTIA Security+ Exam Prep (SY0-401) Application, Data, and Host Security 319.31MB
  7. CompTIA Security+ Exam Prep (SY0-401) Part 1 Network Security 246.12MB
  8. PluralSight Comptia Security + Sy0-401 Threats And Vulnerabilities tutorialkhan.com.iso 435.02MB
  9. Lynda - CompTIA Security Plus Exam Prep SY0-401 Access Control and Identity Management 220.71MB
  10. Lynda - CompTIA Security Plus Exam Prep SY0-401 Access Control and Identity Management 220.71MB
Files
  1. 01. Introduction/01_01-Welcome.mp4 23.31MB
  2. 02. Malware/02_01-Comparing viruses, worms, and Trojans.mp4 23.64MB
  3. 02. Malware/02_02-Comparing adware, spyware, and ransomware.mp4 10.29MB
  4. 02. Malware/02_03-Understanding backdoors and logic bombs.mp4 11.88MB
  5. 02. Malware/02_04-Looking at advanced malware.mp4 10.08MB
  6. 02. Malware/02_05-Understanding botnets.mp4 6.37MB
  7. 03. Understanding Attack Types/03_01-Denial of service attacks.mp4 10.79MB
  8. 03. Understanding Attack Types/03_02-Eavesdropping attacks.mp4 8.71MB
  9. 03. Understanding Attack Types/03_03-Network attacks.mp4 14.06MB
  10. 03. Understanding Attack Types/03_04-Defending against password attacks.mp4 23.94MB
  11. 03. Understanding Attack Types/03_05-Watering hole attacks.mp4 7.76MB
  12. 03. Understanding Attack Types/03_06-Preventing insider threats.mp4 8.95MB
  13. 04. Social Engineering Attacks/04_01-Social engineering.mp4 11.88MB
  14. 04. Social Engineering Attacks/04_02-Impersonation attacks.mp4 10.30MB
  15. 04. Social Engineering Attacks/04_03-Going old school.mp4 8.70MB
  16. 05. Wireless Attacks/05_01-Wireless eavesdropping.mp4 10.43MB
  17. 05. Wireless Attacks/05_02-WPA and WPS attacks.mp4 7.77MB
  18. 05. Wireless Attacks/05_03-Propagation attacks.mp4 11.79MB
  19. 05. Wireless Attacks/05_04-Preventing rogues and evil twins.mp4 6.98MB
  20. 05. Wireless Attacks/05_05-Understanding Bluetooth and NFC attacks.mp4 5.25MB
  21. 06. Application Attacks/06_01-Understanding crosssite scripting.mp4 13.94MB
  22. 06. Application Attacks/06_02-Preventing SQL injection.mp4 12.10MB
  23. 06. Application Attacks/06_03-Defending against directory traversal.mp4 9.44MB
  24. 06. Application Attacks/06_04-Overflow attacks.mp4 10.35MB
  25. 06. Application Attacks/06_05-Explaining cookies and attachments.mp4 7.66MB
  26. 06. Application Attacks/06_06-Session hijacking.mp4 9.90MB
  27. 06. Application Attacks/06_07-Malicious addons.mp4 6.87MB
  28. 07. Mitigation and Deterrence/07_01-Monitoring log files.mp4 16.71MB
  29. 07. Mitigation and Deterrence/07_02-Hardening your systems.mp4 25.68MB
  30. 07. Mitigation and Deterrence/07_03-Securing your network.mp4 9.95MB
  31. 07. Mitigation and Deterrence/07_04-Improving your security posture.mp4 13.95MB
  32. 07. Mitigation and Deterrence/07_05-Control categories.mp4 6.01MB
  33. 08. Discovering Threats and Vulnerabilities/08_01-Security assessment tools.mp4 20.74MB
  34. 08. Discovering Threats and Vulnerabilities/08_02-Scanning for threats and vulnerabilities.mp4 13.82MB
  35. 08. Discovering Threats and Vulnerabilities/08_03-Assessing threats.mp4 21.79MB
  36. 08. Discovering Threats and Vulnerabilities/08_04-Threat assessment techniques.mp4 7.88MB
  37. 08. Discovering Threats and Vulnerabilities/08_05-Penetration testing.mp4 5.95MB
  38. 08. Discovering Threats and Vulnerabilities/08_06-Advanced vulnerability scanning.mp4 6.31MB
  39. 09. Conclusion/09_01-Next steps.mp4 1.24MB