Pluralsight-CompTIA-Secu-1a0pa
- 01. Types of lware\\/01_01-Course Overview and Adware.mp410.20MB
- 01. Types of lware\\/01_02-Virus.mp48.20MB
- 01. Types of lware\\/01_03-Spyware.mp42.01MB
- 01. Types of lware\\/01_04-Trojans and Remote Access Tools RAT.mp49.80MB
- 01. Types of lware\\/01_05-Rootkits.mp42.11MB
- 01. Types of lware\\/01_06-Backdoors.mp41.69MB
- 01. Types of lware\\/01_07-Logic Bombs.mp42.61MB
- 01. Types of lware\\/01_08-Botnets and Ransomware.mp49.85MB
- 01. Types of lware\\/01_09-Polymorphic Malware and Armored Virus.mp42.79MB
- 02. Types of Attacks\\/02_01-Overview.mp43.67MB
- 02. Types of Attacks\\/02_02-nintheMiddle.mp45.92MB
- 02. Types of Attacks\\/02_03-DDoS.mp412.63MB
- 02. Types of Attacks\\/02_04-Spoofing.mp41.62MB
- 02. Types of Attacks\\/02_05-Spam.mp42.67MB
- 02. Types of Attacks\\/02_06-Phishing.mp43.38MB
- 02. Types of Attacks\\/02_07-Spim.mp41.28MB
- 02. Types of Attacks\\/02_08-Vishing.mp42.87MB
- 02. Types of Attacks\\/02_09-Spear Phishing.mp41.77MB
- 02. Types of Attacks\\/02_10-Xs Attack.mp47.90MB
- 02. Types of Attacks\\/02_11-Pharming.mp45.69MB
- 02. Types of Attacks\\/02_12-Privilege Escalation.mp43.89MB
- 02. Types of Attacks\\/02_13-licious Insider Threat.mp41.74MB
- 02. Types of Attacks\\/02_14-Transitive Access.mp42.32MB
- 02. Types of Attacks\\/02_15-ClientSide Attacks.mp43.70MB
- 02. Types of Attacks\\/02_16-Password Attacks.mp413.97MB
- 02. Types of Attacks\\/02_17-Typo SquattingURL Hijacking.mp42.01MB
- 02. Types of Attacks\\/02_18-Watering Hole Attack.mp45.11MB
- 02. Types of Attacks\\/02_19-Module Review.mp41.07MB
- 03. Effectiveness of Social Engineering Attacks\\/03_01-Module Overview.mp42.70MB
- 03. Effectiveness of Social Engineering Attacks\\/03_02-What Is Social Engineering.mp42.22MB
- 03. Effectiveness of Social Engineering Attacks\\/03_03-Shoulder Surfing.mp45.29MB
- 03. Effectiveness of Social Engineering Attacks\\/03_04-Dumpster Diving.mp44.62MB
- 03. Effectiveness of Social Engineering Attacks\\/03_05-Tailgating.mp46.01MB
- 03. Effectiveness of Social Engineering Attacks\\/03_06-Impersonation.mp43.33MB
- 03. Effectiveness of Social Engineering Attacks\\/03_07-Hoaxes.mp46.05MB
- 03. Effectiveness of Social Engineering Attacks\\/03_08-Whaling.mp42.03MB
- 03. Effectiveness of Social Engineering Attacks\\/03_09-Vishing.mp41.85MB
- 03. Effectiveness of Social Engineering Attacks\\/03_10-Principles Reasons for EffectivenessAuthority.mp42.74MB
- 03. Effectiveness of Social Engineering Attacks\\/03_11-Intimidation.mp41.31MB
- 03. Effectiveness of Social Engineering Attacks\\/03_12-ConsensusSocial Proof.mp41.74MB
- 03. Effectiveness of Social Engineering Attacks\\/03_13-FamiliarityLiking.mp41.76MB
- 03. Effectiveness of Social Engineering Attacks\\/03_14-Trust.mp41.56MB
- 03. Effectiveness of Social Engineering Attacks\\/03_15-ScarcityUrgency.mp41.75MB
- 03. Effectiveness of Social Engineering Attacks\\/03_16-Module Review.mp4899.75KB
- 04. Wireless Attacks\\/04_01-Rogue Access Points and Captive Portals.mp49.09MB
- 04. Wireless Attacks\\/04_02-War Driving and War Chalking.mp42.72MB
- 04. Wireless Attacks\\/04_03-Bluejacking and Bluesnarfing.mp47.54MB
- 04. Wireless Attacks\\/04_04-IV Attacks.mp45.19MB
- 04. Wireless Attacks\\/04_05-Packet Sniffing.mp46.53MB
- 04. Wireless Attacks\\/04_06-Near Field Communication.mp42.45MB
- 04. Wireless Attacks\\/04_07-Replay Attacks.mp43.34MB
- 04. Wireless Attacks\\/04_08-WPS Attacks.mp46.56MB
- 04. Wireless Attacks\\/04_09-WEP and WPA Attacks.mp43.18MB
- 05. Application Attacks\\/05_01-Module Overview.mp42.92MB
- 05. Application Attacks\\/05_02-CrossSite sc<x>ripting.mp45.21MB
- 05. Application Attacks\\/05_03-CrossSite Request Forgery.mp44.75MB
- 05. Application Attacks\\/05_04-SQL and xm<x>l injection Attacks.mp411.95MB
- 05. Application Attacks\\/05_05-Directory TrersalComnd Injection.mp42.95MB
- 05. Application Attacks\\/05_06-Buffer Overflow Attacks.mp43.40MB
- 05. Application Attacks\\/05_07-Integer Overflow Attacks.mp43.00MB
- 05. Application Attacks\\/05_08-ZeroDay Attacks.mp43.10MB
- 05. Application Attacks\\/05_09-Cookies and Attachments.mp44.59MB
- 05. Application Attacks\\/05_10-Locally Shared ob<x>jects LSO.mp43.21MB
- 05. Application Attacks\\/05_11-Flash Cookies.mp42.07MB
- 05. Application Attacks\\/05_12-licious Addons.mp42.26MB
- 05. Application Attacks\\/05_13-Session Hijacking.mp43.70MB
- 05. Application Attacks\\/05_14-Header nipulation.mp41.10MB
- 05. Application Attacks\\/05_15-ArbitraryRemote Code Execution.mp42.95MB
- 06. Mitigation and Deterrent Techniques\\/06_01-Module Overview.mp43.75MB
- 06. Mitigation and Deterrent Techniques\\/06_02-Monitoring System Logs.mp45.92MB
- 06. Mitigation and Deterrent Techniques\\/06_03-Hardening Systems and Applications.mp48.76MB
- 06. Mitigation and Deterrent Techniques\\/06_04-Network Security.mp46.15MB
- 06. Mitigation and Deterrent Techniques\\/06_05-Disabling Unused Interfaces and Services.mp41.45MB
- 06. Mitigation and Deterrent Techniques\\/06_06-Rogue chine Detection.mp42.54MB
- 06. Mitigation and Deterrent Techniques\\/06_07-Security Posture.mp48.92MB
- 06. Mitigation and Deterrent Techniques\\/06_08-Reporting.mp42.56MB
- 06. Mitigation and Deterrent Techniques\\/06_09-Detection vs. Prevention Controls.mp410.39MB
- 06. Mitigation and Deterrent Techniques\\/06_10-Module Review.mp41.53MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_01-Module Overview and Interpreting Assesent Tools Results.mp47.49MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_02-Protocol Analyzers and Vulnerability Scanners.mp46.37MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_03-Honeypots and Honeynets.mp43.67MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_04-Port Scanners.mp45.02MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_05-Banner Grabbing.mp42.04MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_06-Passive vs. Active Tools.mp42.50MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_07-Risk Calculations.mp46.02MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_08-Assesent Types.mp41.47MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_09-Assesent Techniques and ba<x>seline Reporting.mp42.01MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_10-Code Review.mp42.69MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_11-Determine Attack Surface.mp43.20MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_12-Review Architecture.mp42.24MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_13-Review Designs.mp42.31MB
- 07. Discovering Security Threats and Vulnerabilities\\/07_14-Module Review.mp4860.95KB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_01-Module Overview.mp42.54MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_02-Verifying Threats and Bypassing Security Controls.mp45.52MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_03-Actively Testing Security Controls.mp42.90MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_04-Exploiting Vulnerabilities.mp42.00MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_05-Vulnerability Scanning.mp41.37MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_06-Testing Security Controls and Identifying Vulnerabilities.mp44.30MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_07-Identify Common Misconfigurations.mp43.28MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_08-Intrusive vs. Nonintrusive and Credentialed vs. Noncredentialed.mp44.96MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_09-False Positive.mp42.03MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_10-Black White and Gray Box Testing.mp42.53MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_11-Things to Remember.mp44.13MB
- 08. Penetration Testing vs. Vulnerability Scanning\\/08_12-Module Review.mp41.31MB
- Exercise files\\/comptiasecurityplussy0401threatsvulnerabilities.zip16.06MB
- CreateTime2021-07-14
- UpdateTime2021-07-19
- FileTotalCount105
- TotalSize869.65MBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.LADS-032 2.TYWD-009 3.MRFA-01 4.PSSD-259 5.NFDM-286 6.VEC-026 7.HF-096 8.TSP-04 9.ID-20020 10.DDT-303 11.SGSD-006 12.AIED-020 13.UPSM-131 14.MXGS-176 15.HPF-006 16.DSMG-18 17.OOMN-054 18.HNDB-005 19.GON-414 20.ADZ-281 21.ATFB-096 22.SPRD-474 23.RKI-276 24.BNDV-00661 25.RKI-257 26.MIDD-815 27.AW-114 28.TYWD-030 29.SDS-016 30.YSH-009 31.NOV-1337 32.DVH-303 33.XKK-072 34.BIJ-016 35.MBYD-133 36.BNDV-00778 37.BDSR-057 38.DVH-548 39.NFDM-098 40.MIBD-423 41.TDMJ-110 42.SMPD-32 43.BNDV-00823 44.OBST-009 45.EMBQ-001 46.ADZ-280 47.SVDVD-353 48.SILK-032 49.MEEL-21 50.TKCND-015 51.AWD-72 52.CLB-011 53.SDMT-405 54.UGEX-001 55.NATR-206 56.CADV-363 57.KT-280 58.SRXV-582 59.SAKD-222 60.CLR-002 61.HS-165D 62.RMD-271 63.TTTB-107 64.SGSR-085 65.SWF-146 66.CSZ-003 67.YPD-005 68.SIMG-016 69.ERED-006 70.GLT-018 71.004 72.258 73.204 74.001 75.05 76.004 77.002 78.03 79.126 80.004 81.077 82.179 83.01 84.11027 85.129 86.23 87.158 88.527 89.043 90.415 91.011 92.453 93.087 94.16002 95.082 96.141 97.161 98.005 99.034 100.323 101.20 102.657 103.005 104.005 105.192 106.165 107.0223 108.580 109.46 110.468 111.420 112.260 113.118 114.11 115.477 116.282 117.111 118.714 119.249 120.251 121.08 122.375 123.445 124.007 125.399 126.435 127.006 128.469 129.054 130.178D 131.181 132.018 133.003 134.353 135.016 136.570 137.089 138.036 139.028 140.001