CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management
Language: English | Size:585.35 MB
Genre:eLearning
Files Included :
01 - Vulnerability management.mp4 (4.38 MB)
MP4
02 - What you need to know.mp4 (1.14 MB)
MP4
03 - Study resources.mp4 (3.72 MB)
MP4
01 - What is vulnerability management.mp4 (8.22 MB)
MP4
02 - Identify scan targets.mp4 (9.73 MB)
MP4
03 - Scan frequency.mp4 (10.04 MB)
MP4
01 - Network scanning.mp4 (4.11 MB)
MP4
02 - Install Nmap on Windows.mp4 (10.5 MB)
MP4
03 - Install Nmap on macOS.mp4 (4.59 MB)
MP4
04 - Run and interpret a simple Nmap scan.mp4 (6.69 MB)
MP4
05 - Host discovery with Nmap.mp4 (7.11 MB)
MP4
06 - Operate system fingerprinting.mp4 (6.44 MB)
MP4
07 - Service version detection.mp4 (2.88 MB)
MP4
01 - Security baseline scanning.mp4 (1.9 MB)
MP4
02 - Scan configuration.mp4 (10.91 MB)
MP4
03 - Scan perspective.mp4 (8.8 MB)
MP4
04 - Scanner maintenance.mp4 (5.33 MB)
MP4
05 - Vulnerability scanning tools.mp4 (3.4 MB)
MP4
06 - Passive vulnerability scanning.mp4 (2.99 MB)
MP4
01 - SCAP.mp4 (4.03 MB)
MP4
02 - CVSS.mp4 (5.46 MB)
MP4
03 - Interpret CVSS scores.mp4 (6.89 MB)
MP4
04 - Analyze scan reports.mp4 (7.77 MB)
MP4
05 - Correlate scan results.mp4 (4.6 MB)
MP4
01 - Server vulnerabilities.mp4 (12.38 MB)
MP4
02 - Endpoint vulnerabilities.mp4 (5.81 MB)
MP4
03 - Network vulnerabilities.mp4 (7.68 MB)
MP4
01 - OWASP Top 10.mp4 (10.39 MB)
MP4
02 - Prevent SQL injection.mp4 (8.05 MB)
MP4
03 - Understand cross-site scripting.mp4 (8.46 MB)
MP4
04 - Request forgery.mp4 (8.97 MB)
MP4
05 - Privilege escalation.mp4 (3.05 MB)
MP4
06 - Directory traversal.mp4 (7.12 MB)
MP4
07 - File inclusion.mp4 (3.06 MB)
MP4
08 - Overflow attacks.mp4 (9.49 MB)
MP4
09 - Cookies and attachments.mp4 (8.01 MB)
MP4
10 - Session hijacking.mp4 (9.19 MB)
MP4
11 - Race conditions.mp4 (4.72 MB)
MP4
12 - Memory vulnerabilities.mp4 (6.4 MB)
MP4
13 - Code execution attacks.mp4 (4.99 MB)
MP4
14 - Data poisoning.mp4 (1.8 MB)
MP4
15 - Third-party code.mp4 (8.63 MB)
MP4
16 - Interception proxies.mp4 (13.09 MB)
MP4
01 - Industrial control systems.mp4 (10.94 MB)
MP4
02 - Internet of Things.mp4 (7.35 MB)
MP4
03 - Embedded systems.mp4 (10.1 MB)
MP4
01 - Exploitation frameworks.mp4 (11.76 MB)
MP4
02 - Cloud auditing tools.mp4 (12.35 MB)
MP4
03 - Debuggers.mp4 (1.13 MB)
MP4
04 - Open-source reconnaissance.mp4 (2.25 MB)
MP4
05 - Control frameworks.mp4 (20.85 MB)
MP4
01 - Software platforms.mp4 (4.84 MB)
MP4
02 - Development methodologies.mp4 (17.22 MB)
MP4
03 - Maturity models.mp4 (5.65 MB)
MP4
04 - Change management.mp4 (7.87 MB)
MP4
01 - Input validation.mp4 (4.92 MB)
MP4
02 - Parameterized queries.mp4 (6.97 MB)
MP4
03 - Authentication and session management issues.mp4 (3.05 MB)
MP4
04 - Output encoding.mp4 (6.58 MB)
MP4
05 - Error and exception handling.mp4 (4.85 MB)
MP4
06 - Code signing.mp4 (5 MB)
MP4
07 - Database security.mp4 (6.54 MB)
MP4
08 - Data de-identification.mp4 (5.63 MB)
MP4
09 - Data obfuscation.mp4 (3.32 MB)
MP4
01 - Software testing.mp4 (4.67 MB)
MP4
02 - Code security tests.mp4 (3.56 MB)
MP4
03 - Fuzzing.mp4 (16.11 MB)
MP4
04 - Reverse engineering software.mp4 (7.11 MB)
MP4
05 - Reverse engineering hardware.mp4 (6.42 MB)
MP4
01 - Threat research.mp4 (3.59 MB)
MP4
02 - Identify threats.mp4 (3.94 MB)
MP4
03 - Understand attacks.mp4 (8.05 MB)
MP4
04 - Threat modeling.mp4 (7.08 MB)
MP4
05 - Attack surface management.mp4 (2.14 MB)
MP4
06 - Bug bounty.mp4 (8.68 MB)
MP4
01 - Align security with the business.mp4 (5.89 MB)
MP4
02 - Organizational processes.mp4 (5.37 MB)
MP4
03 - Security roles and responsibilities.mp4 (4.21 MB)
MP4
04 - Security control selection.mp4 (8.26 MB)
MP4
01 - Risk assessment.mp4 (7.81 MB)
MP4
02 - Quantitative risk assessment.mp4 (10.22 MB)
MP4
03 - Risk treatment options.mp4 (9.09 MB)
MP4
04 - Risk management frameworks.mp4 (6.77 MB)
MP4
05 - Risk visibility and reporting.mp4 (12.14 MB)
MP4
01 - Continue your studies.mp4 (2.15 MB)
MP4