filePluralsight-CompTIA-Secu-1a0pa

Pluralsight CompTIA Security SY0 Threa and Vulnerabilities
  • MP401. Types of lware\\/01_01-Course Overview and Adware.mp410.20MB
  • MP401. Types of lware\\/01_02-Virus.mp48.20MB
  • MP401. Types of lware\\/01_03-Spyware.mp42.01MB
  • MP401. Types of lware\\/01_04-Trojans and Remote Access Tools RAT.mp49.80MB
  • MP401. Types of lware\\/01_05-Rootkits.mp42.11MB
  • MP401. Types of lware\\/01_06-Backdoors.mp41.69MB
  • MP401. Types of lware\\/01_07-Logic Bombs.mp42.61MB
  • MP401. Types of lware\\/01_08-Botnets and Ransomware.mp49.85MB
  • MP401. Types of lware\\/01_09-Polymorphic Malware and Armored Virus.mp42.79MB
  • MP402. Types of Attacks\\/02_01-Overview.mp43.67MB
  • MP402. Types of Attacks\\/02_02-nintheMiddle.mp45.92MB
  • MP402. Types of Attacks\\/02_03-DDoS.mp412.63MB
  • MP402. Types of Attacks\\/02_04-Spoofing.mp41.62MB
  • MP402. Types of Attacks\\/02_05-Spam.mp42.67MB
  • MP402. Types of Attacks\\/02_06-Phishing.mp43.38MB
  • MP402. Types of Attacks\\/02_07-Spim.mp41.28MB
  • MP402. Types of Attacks\\/02_08-Vishing.mp42.87MB
  • MP402. Types of Attacks\\/02_09-Spear Phishing.mp41.77MB
  • MP402. Types of Attacks\\/02_10-Xs Attack.mp47.90MB
  • MP402. Types of Attacks\\/02_11-Pharming.mp45.69MB
  • MP402. Types of Attacks\\/02_12-Privilege Escalation.mp43.89MB
  • MP402. Types of Attacks\\/02_13-licious Insider Threat.mp41.74MB
  • MP402. Types of Attacks\\/02_14-Transitive Access.mp42.32MB
  • MP402. Types of Attacks\\/02_15-ClientSide Attacks.mp43.70MB
  • MP402. Types of Attacks\\/02_16-Password Attacks.mp413.97MB
  • MP402. Types of Attacks\\/02_17-Typo SquattingURL Hijacking.mp42.01MB
  • MP402. Types of Attacks\\/02_18-Watering Hole Attack.mp45.11MB
  • MP402. Types of Attacks\\/02_19-Module Review.mp41.07MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_01-Module Overview.mp42.70MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_02-What Is Social Engineering.mp42.22MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_03-Shoulder Surfing.mp45.29MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_04-Dumpster Diving.mp44.62MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_05-Tailgating.mp46.01MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_06-Impersonation.mp43.33MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_07-Hoaxes.mp46.05MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_08-Whaling.mp42.03MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_09-Vishing.mp41.85MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_10-Principles Reasons for EffectivenessAuthority.mp42.74MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_11-Intimidation.mp41.31MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_12-ConsensusSocial Proof.mp41.74MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_13-FamiliarityLiking.mp41.76MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_14-Trust.mp41.56MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_15-ScarcityUrgency.mp41.75MB
  • MP403. Effectiveness of Social Engineering Attacks\\/03_16-Module Review.mp4899.75KB
  • MP404. Wireless Attacks\\/04_01-Rogue Access Points and Captive Portals.mp49.09MB
  • MP404. Wireless Attacks\\/04_02-War Driving and War Chalking.mp42.72MB
  • MP404. Wireless Attacks\\/04_03-Bluejacking and Bluesnarfing.mp47.54MB
  • MP404. Wireless Attacks\\/04_04-IV Attacks.mp45.19MB
  • MP404. Wireless Attacks\\/04_05-Packet Sniffing.mp46.53MB
  • MP404. Wireless Attacks\\/04_06-Near Field Communication.mp42.45MB
  • MP404. Wireless Attacks\\/04_07-Replay Attacks.mp43.34MB
  • MP404. Wireless Attacks\\/04_08-WPS Attacks.mp46.56MB
  • MP404. Wireless Attacks\\/04_09-WEP and WPA Attacks.mp43.18MB
  • MP405. Application Attacks\\/05_01-Module Overview.mp42.92MB
  • MP405. Application Attacks\\/05_02-CrossSite sc<x>ripting.mp45.21MB
  • MP405. Application Attacks\\/05_03-CrossSite Request Forgery.mp44.75MB
  • MP405. Application Attacks\\/05_04-SQL and xm<x>l injection Attacks.mp411.95MB
  • MP405. Application Attacks\\/05_05-Directory TrersalComnd Injection.mp42.95MB
  • MP405. Application Attacks\\/05_06-Buffer Overflow Attacks.mp43.40MB
  • MP405. Application Attacks\\/05_07-Integer Overflow Attacks.mp43.00MB
  • MP405. Application Attacks\\/05_08-ZeroDay Attacks.mp43.10MB
  • MP405. Application Attacks\\/05_09-Cookies and Attachments.mp44.59MB
  • MP405. Application Attacks\\/05_10-Locally Shared ob<x>jects LSO.mp43.21MB
  • MP405. Application Attacks\\/05_11-Flash Cookies.mp42.07MB
  • MP405. Application Attacks\\/05_12-licious Addons.mp42.26MB
  • MP405. Application Attacks\\/05_13-Session Hijacking.mp43.70MB
  • MP405. Application Attacks\\/05_14-Header nipulation.mp41.10MB
  • MP405. Application Attacks\\/05_15-ArbitraryRemote Code Execution.mp42.95MB
  • MP406. Mitigation and Deterrent Techniques\\/06_01-Module Overview.mp43.75MB
  • MP406. Mitigation and Deterrent Techniques\\/06_02-Monitoring System Logs.mp45.92MB
  • MP406. Mitigation and Deterrent Techniques\\/06_03-Hardening Systems and Applications.mp48.76MB
  • MP406. Mitigation and Deterrent Techniques\\/06_04-Network Security.mp46.15MB
  • MP406. Mitigation and Deterrent Techniques\\/06_05-Disabling Unused Interfaces and Services.mp41.45MB
  • MP406. Mitigation and Deterrent Techniques\\/06_06-Rogue chine Detection.mp42.54MB
  • MP406. Mitigation and Deterrent Techniques\\/06_07-Security Posture.mp48.92MB
  • MP406. Mitigation and Deterrent Techniques\\/06_08-Reporting.mp42.56MB
  • MP406. Mitigation and Deterrent Techniques\\/06_09-Detection vs. Prevention Controls.mp410.39MB
  • MP406. Mitigation and Deterrent Techniques\\/06_10-Module Review.mp41.53MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_01-Module Overview and Interpreting Assesent Tools Results.mp47.49MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_02-Protocol Analyzers and Vulnerability Scanners.mp46.37MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_03-Honeypots and Honeynets.mp43.67MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_04-Port Scanners.mp45.02MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_05-Banner Grabbing.mp42.04MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_06-Passive vs. Active Tools.mp42.50MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_07-Risk Calculations.mp46.02MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_08-Assesent Types.mp41.47MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_09-Assesent Techniques and ba<x>seline Reporting.mp42.01MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_10-Code Review.mp42.69MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_11-Determine Attack Surface.mp43.20MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_12-Review Architecture.mp42.24MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_13-Review Designs.mp42.31MB
  • MP407. Discovering Security Threats and Vulnerabilities\\/07_14-Module Review.mp4860.95KB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_01-Module Overview.mp42.54MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_02-Verifying Threats and Bypassing Security Controls.mp45.52MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_03-Actively Testing Security Controls.mp42.90MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_04-Exploiting Vulnerabilities.mp42.00MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_05-Vulnerability Scanning.mp41.37MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_06-Testing Security Controls and Identifying Vulnerabilities.mp44.30MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_07-Identify Common Misconfigurations.mp43.28MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_08-Intrusive vs. Nonintrusive and Credentialed vs. Noncredentialed.mp44.96MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_09-False Positive.mp42.03MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_10-Black White and Gray Box Testing.mp42.53MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_11-Things to Remember.mp44.13MB
  • MP408. Penetration Testing vs. Vulnerability Scanning\\/08_12-Module Review.mp41.31MB
  • ZIPExercise files\\/comptiasecurityplussy0401threatsvulnerabilities.zip16.06MB
Latest Search: 1.LADS-032   2.TYWD-009   3.MRFA-01   4.PSSD-259   5.NFDM-286   6.VEC-026   7.HF-096   8.TSP-04   9.ID-20020   10.DDT-303   11.SGSD-006   12.AIED-020   13.UPSM-131   14.MXGS-176   15.HPF-006   16.DSMG-18   17.OOMN-054   18.HNDB-005   19.GON-414   20.ADZ-281   21.ATFB-096   22.SPRD-474   23.RKI-276   24.BNDV-00661   25.RKI-257   26.MIDD-815   27.AW-114   28.TYWD-030   29.SDS-016   30.YSH-009   31.NOV-1337   32.DVH-303   33.XKK-072   34.BIJ-016   35.MBYD-133   36.BNDV-00778   37.BDSR-057   38.DVH-548   39.NFDM-098   40.MIBD-423   41.TDMJ-110   42.SMPD-32   43.BNDV-00823   44.OBST-009   45.EMBQ-001   46.ADZ-280   47.SVDVD-353   48.SILK-032   49.MEEL-21   50.TKCND-015   51.AWD-72   52.CLB-011   53.SDMT-405   54.UGEX-001   55.NATR-206   56.CADV-363   57.KT-280   58.SRXV-582   59.SAKD-222   60.CLR-002   61.HS-165D   62.RMD-271   63.TTTB-107   64.SGSR-085   65.SWF-146   66.CSZ-003   67.YPD-005   68.SIMG-016   69.ERED-006   70.GLT-018   71.004   72.258   73.204   74.001   75.05   76.004   77.002   78.03   79.126   80.004   81.077   82.179   83.01   84.11027   85.129   86.23   87.158   88.527   89.043   90.415   91.011   92.453   93.087   94.16002   95.082   96.141   97.161   98.005   99.034   100.323   101.20   102.657   103.005   104.005   105.192   106.165   107.0223   108.580   109.46   110.468   111.420   112.260   113.118   114.11   115.477   116.282   117.111   118.714   119.249   120.251   121.08   122.375   123.445   124.007   125.399   126.435   127.006   128.469   129.054   130.178D   131.181   132.018   133.003   134.353   135.016   136.570   137.089   138.036   139.028   140.001