资源详情

返回首页 | 相关搜索
[ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management
大小 585.87 MB
文件数 172
Info Hash: C81C902983E84CF7092623445B99B2242DBDC5F2
收录时间 2026-03-02 01:23:50
更新时间 2026-03-02 01:23:50
文件列表 (172)
Get Bonus Downloads Here.url
181 B
~Get Your Files Here !/01 - Introduction/01 - Vulnerability management.mp4
4.38 MB
~Get Your Files Here !/01 - Introduction/01 - Vulnerability management.srt
1.56 KB
~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4
1.14 MB
~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt
1.31 KB
~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4
3.72 MB
~Get Your Files Here !/01 - Introduction/03 - Study resources.srt
2.77 KB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/01 - What is vulnerability management.mp4
8.22 MB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/01 - What is vulnerability management.srt
9.2 KB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/02 - Identify scan targets.mp4
9.73 MB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/02 - Identify scan targets.srt
11.03 KB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/03 - Scan frequency.mp4
10.04 MB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/03 - Scan frequency.srt
8.05 KB
~Get Your Files Here !/03 - 2. Network Mapping/01 - Network scanning.mp4
4.11 MB
~Get Your Files Here !/03 - 2. Network Mapping/01 - Network scanning.srt
3.05 KB
~Get Your Files Here !/03 - 2. Network Mapping/02 - Install Nmap on Windows.mp4
10.5 MB
~Get Your Files Here !/03 - 2. Network Mapping/02 - Install Nmap on Windows.srt
10.13 KB
~Get Your Files Here !/03 - 2. Network Mapping/03 - Install Nmap on macOS.mp4
4.59 MB
~Get Your Files Here !/03 - 2. Network Mapping/03 - Install Nmap on macOS.srt
4.44 KB
~Get Your Files Here !/03 - 2. Network Mapping/04 - Run and interpret a simple Nmap scan.mp4
6.69 MB
~Get Your Files Here !/03 - 2. Network Mapping/04 - Run and interpret a simple Nmap scan.srt
6.57 KB
~Get Your Files Here !/03 - 2. Network Mapping/05 - Host discovery with Nmap.mp4
7.11 MB
~Get Your Files Here !/03 - 2. Network Mapping/05 - Host discovery with Nmap.srt
7.8 KB
~Get Your Files Here !/03 - 2. Network Mapping/06 - Operate system fingerprinting.mp4
6.44 MB
~Get Your Files Here !/03 - 2. Network Mapping/06 - Operate system fingerprinting.srt
7.17 KB
~Get Your Files Here !/03 - 2. Network Mapping/07 - Service version detection.mp4
2.88 MB
~Get Your Files Here !/03 - 2. Network Mapping/07 - Service version detection.srt
3.19 KB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/01 - Security baseline scanning.mp4
1.9 MB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/01 - Security baseline scanning.srt
1.62 KB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/02 - Scan configuration.mp4
10.91 MB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/02 - Scan configuration.srt
11.84 KB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/03 - Scan perspective.mp4
8.8 MB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/03 - Scan perspective.srt
9.23 KB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/04 - Scanner maintenance.mp4
5.33 MB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/04 - Scanner maintenance.srt
6.36 KB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/05 - Vulnerability scanning tools.mp4
3.4 MB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/05 - Vulnerability scanning tools.srt
2.18 KB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/06 - Passive vulnerability scanning.mp4
2.99 MB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/06 - Passive vulnerability scanning.srt
3.43 KB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/01 - SCAP.mp4
4.03 MB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/01 - SCAP.srt
4.22 KB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/02 - CVSS.mp4
5.46 MB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/02 - CVSS.srt
6.11 KB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/03 - Interpret CVSS scores.mp4
6.89 MB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/03 - Interpret CVSS scores.srt
5.33 KB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/04 - Analyze scan reports.mp4
7.77 MB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/04 - Analyze scan reports.srt
7.29 KB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/05 - Correlate scan results.mp4
4.6 MB
~Get Your Files Here !/05 - 4. Analyzing Scan Results/05 - Correlate scan results.srt
4.39 KB
~Get Your Files Here !/06 - 5. Common Vulnerabilities/01 - Server vulnerabilities.mp4
12.38 MB
~Get Your Files Here !/06 - 5. Common Vulnerabilities/01 - Server vulnerabilities.srt
10.42 KB
~Get Your Files Here !/06 - 5. Common Vulnerabilities/02 - Endpoint vulnerabilities.mp4
5.81 MB
~Get Your Files Here !/06 - 5. Common Vulnerabilities/02 - Endpoint vulnerabilities.srt
3.15 KB
~Get Your Files Here !/06 - 5. Common Vulnerabilities/03 - Network vulnerabilities.mp4
7.68 MB
~Get Your Files Here !/06 - 5. Common Vulnerabilities/03 - Network vulnerabilities.srt
8.64 KB
~Get Your Files Here !/07 - 6. Software Security Issues/01 - OWASP Top 10.mp4
10.39 MB
~Get Your Files Here !/07 - 6. Software Security Issues/01 - OWASP Top 10.srt
9.99 KB
~Get Your Files Here !/07 - 6. Software Security Issues/02 - Prevent SQL injection.mp4
8.05 MB
~Get Your Files Here !/07 - 6. Software Security Issues/02 - Prevent SQL injection.srt
9.52 KB
~Get Your Files Here !/07 - 6. Software Security Issues/03 - Understand cross-site scripting.mp4
8.46 MB
~Get Your Files Here !/07 - 6. Software Security Issues/03 - Understand cross-site scripting.srt
9.12 KB
~Get Your Files Here !/07 - 6. Software Security Issues/04 - Request forgery.mp4
8.97 MB
~Get Your Files Here !/07 - 6. Software Security Issues/04 - Request forgery.srt
7.77 KB
~Get Your Files Here !/07 - 6. Software Security Issues/05 - Privilege escalation.mp4
3.05 MB
~Get Your Files Here !/07 - 6. Software Security Issues/05 - Privilege escalation.srt
3.63 KB
~Get Your Files Here !/07 - 6. Software Security Issues/06 - Directory traversal.mp4
7.12 MB
~Get Your Files Here !/07 - 6. Software Security Issues/06 - Directory traversal.srt
5.48 KB
~Get Your Files Here !/07 - 6. Software Security Issues/07 - File inclusion.mp4
3.06 MB
~Get Your Files Here !/07 - 6. Software Security Issues/07 - File inclusion.srt
3.39 KB
~Get Your Files Here !/07 - 6. Software Security Issues/08 - Overflow attacks.mp4
9.49 MB
~Get Your Files Here !/07 - 6. Software Security Issues/08 - Overflow attacks.srt
6.02 KB
~Get Your Files Here !/07 - 6. Software Security Issues/09 - Cookies and attachments.mp4
8.01 MB
~Get Your Files Here !/07 - 6. Software Security Issues/09 - Cookies and attachments.srt
7.9 KB
~Get Your Files Here !/07 - 6. Software Security Issues/10 - Session hijacking.mp4
9.19 MB
~Get Your Files Here !/07 - 6. Software Security Issues/10 - Session hijacking.srt
6.87 KB
~Get Your Files Here !/07 - 6. Software Security Issues/11 - Race conditions.mp4
4.72 MB
~Get Your Files Here !/07 - 6. Software Security Issues/11 - Race conditions.srt
4.13 KB
~Get Your Files Here !/07 - 6. Software Security Issues/12 - Memory vulnerabilities.mp4
6.4 MB
~Get Your Files Here !/07 - 6. Software Security Issues/12 - Memory vulnerabilities.srt
6.59 KB
~Get Your Files Here !/07 - 6. Software Security Issues/13 - Code execution attacks.mp4
4.99 MB
~Get Your Files Here !/07 - 6. Software Security Issues/13 - Code execution attacks.srt
4.97 KB
~Get Your Files Here !/07 - 6. Software Security Issues/14 - Data poisoning.mp4
1.8 MB
~Get Your Files Here !/07 - 6. Software Security Issues/14 - Data poisoning.srt
1.99 KB
~Get Your Files Here !/07 - 6. Software Security Issues/15 - Third-party code.mp4
8.63 MB
~Get Your Files Here !/07 - 6. Software Security Issues/15 - Third-party code.srt
6.65 KB
~Get Your Files Here !/07 - 6. Software Security Issues/16 - Interception proxies.mp4
13.09 MB
~Get Your Files Here !/07 - 6. Software Security Issues/16 - Interception proxies.srt
8.96 KB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/01 - Industrial control systems.mp4
10.94 MB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/01 - Industrial control systems.srt
9.99 KB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/02 - Internet of Things.mp4
7.35 MB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/02 - Internet of Things.srt
5.59 KB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/03 - Embedded systems.mp4
10.1 MB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/03 - Embedded systems.srt
8.17 KB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/01 - Exploitation frameworks.mp4
11.76 MB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/01 - Exploitation frameworks.srt
11.32 KB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/02 - Cloud auditing tools.mp4
12.35 MB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/02 - Cloud auditing tools.srt
7.76 KB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/03 - Debuggers.mp4
1.13 MB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/03 - Debuggers.srt
1.49 KB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/04 - Open-source reconnaissance.mp4
2.25 MB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/04 - Open-source reconnaissance.srt
1.73 KB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/05 - Control frameworks.mp4
20.85 MB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/05 - Control frameworks.srt
13.23 KB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/01 - Software platforms.mp4
4.84 MB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/01 - Software platforms.srt
4.08 KB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/02 - Development methodologies.mp4
17.22 MB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/02 - Development methodologies.srt
11.61 KB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/03 - Maturity models.mp4
5.65 MB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/03 - Maturity models.srt
6.42 KB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/04 - Change management.mp4
7.87 MB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/04 - Change management.srt
7.98 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/01 - Input validation.mp4
4.92 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/01 - Input validation.srt
5.24 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/02 - Parameterized queries.mp4
6.97 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/02 - Parameterized queries.srt
5.96 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/03 - Authentication and session management issues.mp4
3.05 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/03 - Authentication and session management issues.srt
3.53 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/04 - Output encoding.mp4
6.58 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/04 - Output encoding.srt
5.31 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/05 - Error and exception handling.mp4
4.85 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/05 - Error and exception handling.srt
5.82 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/06 - Code signing.mp4
5 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/06 - Code signing.srt
4.11 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/07 - Database security.mp4
6.54 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/07 - Database security.srt
7.26 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/08 - Data de-identification.mp4
5.63 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/08 - Data de-identification.srt
5.13 KB
~Get Your Files Here !/11 - 10. Secure Coding Practices/09 - Data obfuscation.mp4
3.32 MB
~Get Your Files Here !/11 - 10. Secure Coding Practices/09 - Data obfuscation.srt
4.15 KB
~Get Your Files Here !/12 - 11. Software Quality Assurance/01 - Software testing.mp4
4.67 MB
~Get Your Files Here !/12 - 11. Software Quality Assurance/01 - Software testing.srt
4.91 KB
~Get Your Files Here !/12 - 11. Software Quality Assurance/02 - Code security tests.mp4
3.56 MB
~Get Your Files Here !/12 - 11. Software Quality Assurance/02 - Code security tests.srt
4.24 KB
~Get Your Files Here !/12 - 11. Software Quality Assurance/03 - Fuzzing.mp4
16.11 MB
~Get Your Files Here !/12 - 11. Software Quality Assurance/03 - Fuzzing.srt
12.89 KB
~Get Your Files Here !/12 - 11. Software Quality Assurance/04 - Reverse engineering software.mp4
7.11 MB
~Get Your Files Here !/12 - 11. Software Quality Assurance/04 - Reverse engineering software.srt
7.25 KB
~Get Your Files Here !/12 - 11. Software Quality Assurance/05 - Reverse engineering hardware.mp4
6.42 MB
~Get Your Files Here !/12 - 11. Software Quality Assurance/05 - Reverse engineering hardware.srt
5.22 KB
~Get Your Files Here !/13 - 12. Threat Modeling/01 - Threat research.mp4
3.59 MB
~Get Your Files Here !/13 - 12. Threat Modeling/01 - Threat research.srt
2.82 KB
~Get Your Files Here !/13 - 12. Threat Modeling/02 - Identify threats.mp4
3.94 MB
~Get Your Files Here !/13 - 12. Threat Modeling/02 - Identify threats.srt
4.16 KB
~Get Your Files Here !/13 - 12. Threat Modeling/03 - Understand attacks.mp4
8.05 MB
~Get Your Files Here !/13 - 12. Threat Modeling/03 - Understand attacks.srt
8.99 KB
~Get Your Files Here !/13 - 12. Threat Modeling/04 - Threat modeling.mp4
7.08 MB
~Get Your Files Here !/13 - 12. Threat Modeling/04 - Threat modeling.srt
6.01 KB
~Get Your Files Here !/13 - 12. Threat Modeling/05 - Attack surface management.mp4
2.14 MB
~Get Your Files Here !/13 - 12. Threat Modeling/05 - Attack surface management.srt
2.36 KB
~Get Your Files Here !/13 - 12. Threat Modeling/06 - Bug bounty.mp4
8.68 MB
~Get Your Files Here !/13 - 12. Threat Modeling/06 - Bug bounty.srt
6.71 KB
~Get Your Files Here !/14 - 13. Security Governance/01 - Align security with the business.mp4
5.89 MB
~Get Your Files Here !/14 - 13. Security Governance/01 - Align security with the business.srt
5.54 KB
~Get Your Files Here !/14 - 13. Security Governance/02 - Organizational processes.mp4
5.37 MB
~Get Your Files Here !/14 - 13. Security Governance/02 - Organizational processes.srt
5.73 KB
~Get Your Files Here !/14 - 13. Security Governance/03 - Security roles and responsibilities.mp4
4.21 MB
~Get Your Files Here !/14 - 13. Security Governance/03 - Security roles and responsibilities.srt
4.33 KB
~Get Your Files Here !/14 - 13. Security Governance/04 - Security control selection.mp4
8.26 MB
~Get Your Files Here !/14 - 13. Security Governance/04 - Security control selection.srt
9.01 KB
~Get Your Files Here !/15 - 14. Risk Management/01 - Risk assessment.mp4
7.81 MB
~Get Your Files Here !/15 - 14. Risk Management/01 - Risk assessment.srt
8.45 KB
~Get Your Files Here !/15 - 14. Risk Management/02 - Quantitative risk assessment.mp4
10.22 MB
~Get Your Files Here !/15 - 14. Risk Management/02 - Quantitative risk assessment.srt
10.67 KB
~Get Your Files Here !/15 - 14. Risk Management/03 - Risk treatment options.mp4
9.09 MB
~Get Your Files Here !/15 - 14. Risk Management/03 - Risk treatment options.srt
7.4 KB
~Get Your Files Here !/15 - 14. Risk Management/04 - Risk management frameworks.mp4
6.77 MB
~Get Your Files Here !/15 - 14. Risk Management/04 - Risk management frameworks.srt
5.5 KB
~Get Your Files Here !/15 - 14. Risk Management/05 - Risk visibility and reporting.mp4
12.14 MB
~Get Your Files Here !/15 - 14. Risk Management/05 - Risk visibility and reporting.srt
8.16 KB
~Get Your Files Here !/16 - Conclusion/01 - Continue your studies.mp4
2.15 MB
~Get Your Files Here !/16 - Conclusion/01 - Continue your studies.srt
1.15 KB
~Get Your Files Here !/Bonus Resources.txt
386 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。