Companies Home Search Profile

Become a SOC Analyst - Level 1

Focused View

29:55:51

71 View
  • 1.1 Welcome to the SOC Analyst Level 1 Career Path.mp4
    02:10
    • Module 1 - Introduction
    • 1.1 Intro-Instructor Welcome and Objectives(KL).mp4
      01:34
    • 1.2 Intro-Disclaimer(KL).mp4
      02:31
      Module 2
    • 2.1 The Beginning (KL).mp4
      08:55
    • 2.2 Getting Kali up and Running (KL).mp4
      07:56
    • 2.3 Moving Around (KL).mp4
      09:51
    • 2.4 Module Summary (KL).mp4
      01:08
      Module 3
    • 3.1 The Terminal (KL).mp4
      11:05
    • 3.2 File System (KL).mp4
      09:10
    • 3.3 Useful Commands (KL).mp4
      08:02
    • 3.4 Summary (KL).mp4
      01:37
      Module 4
    • 4.1 Basic Network Commands (KL).mp4
      08:38
    • 4.2 Services (KL).mp4
      07:11
    • 4.3 Managing Users (KL).mp4
      04:48
    • 4.4 Summary (KL).mp4
      01:17
      Module 5
    • 5.1 Troubleshooting Basics (KL).mp4
      09:02
    • 5.2 The Tools Chest (KL).mp4
      05:55
    • 5.3 Summary (KL).mp4
      01:00
      Resources
    • Glossary.pdf
    • Module 2 - Quiz.pdf
    • Module 3 - Quiz.pdf
    • Module 4 - Quiz.pdf
    • Study Guide.pdf
    • Syllabus and Outline.pdf
      Module 1 - Introduction to the Command Line
    • 1.1 Introduction and Setup.mp4
      09:23
    • 1.2 Opening the Command Line.mp4
      07:35
    • 1.3 Asking for Help.mp4
      09:42
      Module 2 - Introductory Commands
    • 2.1 Command Line Survival Part 1.mp4
      09:40
    • 2.2 Command Line Survival Part 2.mp4
      07:10
    • 2.3 Changing Directories.mp4
      08:43
    • 2.4 Common Linux Tools.mp4
      10:10
    • 2.5 Windows Common Tools.mp4
      07:36
    • 2.6 Copy and Paste in Windows Command.mp4
      04:10
      Module 3 - Linux Command Line Tools
    • 3.1 Linux Basics Part 1.mp4
      06:22
    • 3.2 Linux Basics Part 2.mp4
      06:51
    • 3.3 Linux Basics Part 3.mp4
      07:59
    • 3.4 Linux Files Part 1.mp4
      06:46
    • 3.5 Linux Files Part 2.mp4
      06:51
    • 3.6 Linux Files Part 3.mp4
      08:02
    • 3.7 Linux Files Part 4.mp4
      07:18
    • 3.8 Linux Files Part 5.mp4
      07:14
    • 3.9 Linux System Part 1.mp4
      06:09
    • 3.10 Linux System Part 2.mp4
      06:18
    • 3.11 Linux Networking Part 1.mp4
      07:19
    • 3.12 Linux Networking Part 2.mp4
      08:14
      Module 4 - Windows Command Line Tools
    • 4.1 Windows Basis.mp4
      07:08
    • 4.2 Windows Files Part 1.mp4
      06:46
    • 4.3 Windows Files Part 2.mp4
      06:42
    • 4.4 Windows System Part 1.mp4
      07:03
    • 4.5 Windows System Part 2.mp4
      07:15
    • 4.6 Windows System Part 3.mp4
      06:09
    • 4.7 Windows Networking Part 1.mp4
      08:01
    • 4.8 Windows Networking Part 2.mp4
      07:46
    • 4.9 Windows Networking Part 3.mp4
      06:25
    • 4.10 Net Command.mp4
      08:12
      Module 5 - Advanced Command Line Techniques
    • 5.1 Windows Advanced Piping and Ampersands.mp4
      08:52
    • 5.2 Windows Command Redirection.mp4
      08:29
    • 5.3 For and While Loops.mp4
      08:27
    • 5.4 Linux Shell Scripting.mp4
      05:40
    • 5.5 Windows Batch Scripting.mp4
      05:32
    • 5.6 Conclusion.mp4
      04:21
      Resources
    • Commandline Basics Glossary.pdf
    • Command Line Basics Command Categories 1 .pdf
    • Command Line Basics Study Guide 1 .pdf
    • Command Line Basics Syllabus and Outline 1 .pdf
      Module 1 - BSWJ - binwalk
    • 1.1 BSWJ - binwalk.mp4
      04:05
      Module 1 - Introduction
    • 1.1 Introduction.mp4
      02:47
    • 1.2 Malware Introduction.mp4
      05:21
      Module 2 - Analyze Malware
    • 2.1 Analyze and Classify Malware Lab Part 1.mp4
      08:50
    • 2.2 Analyze and Classify Malware Lab Part 2.mp4
      03:39
    • 2.3 Rootkit Lab Part 1.mp4
      08:18
    • 2.4 Rootkit Lab Part 2.mp4
      08:29
    • 2.5 Rootkit Lab Part 3.mp4
      07:42
      Module 3 - Conclusion
    • 3.1 Conclusion.mp4
      01:55
      Resources
    • Malware Threats Analyze and Classify Malware Lab 1 1 .pdf
    • Malware Threats Rootkit Lab 1 .pdf
    • Malware Threats Syllabus and Outline 1 .pdf
      Module 1 - Introduction and the Cyber Kill Chain Overview
    • 1.1 Introduction.mp4
      03:53
    • 1.2 The Cyber Kill Chain.mp4
      06:26
      Module 2 - The Cyber Kill Chain
    • 2.1 Reconnaissance 1.mp4
      16:20
    • 2.2 Reconnaissance 2.mp4
      09:31
    • 2.3 Reconnaissance 3.mp4
      09:48
    • 2.4 Weaponization.mp4
      08:06
    • 2.5 Delivery.mp4
      08:34
    • 2.6 Exploitation and Installation.mp4
      08:32
    • 2.7 Command and Control.mp4
      07:51
    • 2.8 Action on Objectives.mp4
      09:17
      Module 3 - Defense in Depth Using the Cyber Kill Chain
    • 3.1 Defense in Depth.mp4
      07:12
      Module 4 - Conclusion
    • 4.1 Conclusion.mp4
      05:59
      Resources
    • Additional Resources.pdf
    • Fingerprinting Using Nmap Step by Step Guide.pdf
    • Footprinting Using Passive Tools - NsLookup Step by Step Guide.pdf
    • Footprinting Using Passive Tools - Websites Step by Step Guide.pdf
    • Footprinting Using Passive Tools - Whois Step by Step Guide.pdf
    • Glossary.pdf
    • Module 2 - Weaponization Lab Using MSFvenom Step by Step Guide.pdf
    • Study Guide.pdf
    • Syllabus and Outline.pdf
      Module 1 - Introduction
    • 1.1 Scanning & Enumeration Introduction.mp4
      07:09
      Module 2 - Check for Live Systems & Ports
    • 2.1 Checking for Live Systems Lab Part 1.mp4
      07:06
    • 2.2 Checking for Live Systems Lab Part 2.mp4
      07:07
    • 2.3 Checking for Open Ports Lab Part 1.mp4
      06:35
    • 2.4 Checking for Open Ports Lab Part 2.mp4
      03:58
      Module 3 - Scanning
    • 3.1 Scanning Introduction.mp4
      04:18
    • 3.2 Scanning with NMAP Half Connect Scan.mp4
      03:59
    • 3.3 Scanning with NMAP Full Connect Scan.mp4
      02:11
    • 3.4 Scanning with XMAS Scan Part 1.mp4
      03:31
    • 3.5 Scanning with XMAS Scan Part 2.mp4
      04:21
    • 3.6 Scanning with NMAP ACK Scan.mp4
      03:06
    • 3.7 Scanning with NMAP ACK Scan and Windows Firewall.mp4
      04:12
    • 3.8 Scanning with hping3 and SYN Scan.mp4
      05:05
    • 3.9 Scanning with hping3 and ACK Scan.mp4
      03:40
    • 3.10 Scanning with hping3 and XMAS Scan.mp4
      05:26
    • 3.11 Scanning with hping3, ACK Scan, and Windows Firewall.mp4
      05:05
      Module 4 - Fingerprinting & Banner Grabbing
    • 4.1 OS Fingerprinting.mp4
      07:56
    • 4.2 Banner Grabbing.mp4
      08:14
      Module 5 - Enumeration Tools
    • 5.1 Zenmap.mp4
      09:21
    • 5.2 Dig and Finger Commands.mp4
      06:42
      Module 6 - Vulnerabilities
    • 6.1 Vulnerability Scanner Setup and Configuration of Core Impact Part 1.mp4
      07:02
    • 6.2 Vulnerability Scanner Setup and Configuration of Core Impact Part 2.mp4
      06:32
    • 6.3 Vulnerability Scanner Setup and Configuration of OpenVAS Part 1.mp4
      06:54
    • 6.4 Vulnerability Scanner Setup and Configuration of OpenVAS Part 2.mp4
      09:57
      Module 7 - Conclusion
    • 7.1 Vulnerability Scan Assessment Overview.mp4
      02:08
    • 7.2 Scanning, Enumerations, & Vulnerabilities Conclusion.mp4
      02:35
      Resources
    • Scanning & Enumeration Glossary.pdf
    • Scanning & Enumeration Scanning Assessment.pdf
    • Scanning & Enumeration Study Guide.pdf
      Module 1 - Introduction
    • 1.2 Introduction.mp4
      07:33
    • 1.3 An Introduction to OWASP.mp4
      07:10
    • 1.4 The OWASP Top 10.mp4
      11:17
    • 1.5 OWASP Web Security Testing Guide (WSTG).mp4
      07:09
    • 1.6 Using Intercepting Proxies in Web Application Security Testing.mp4
      11:19
    • 1.7 Video Demonstration of Using Intercepting Proxies.mp4
      11:54
    • 1.8 Video Demonstration of Using OWASP Mutillidae.mp4
      02:40
      Resources
    • OWASP Top 10 2021 Complete Syllabus.pdf
      Module 1 - Introduction
    • 1.1 Introduction.mp4
      05:54
      Module 2 - Wireshark and TCPDUMP
    • 2.1 Wireshark Lab Part 1.mp4
      07:44
    • 2.2 Wireshark Lab Part 2.mp4
      07:10
    • 2.3 Wireshark Lab Part 3.mp4
      04:59
    • 2.4 Packet Sniffing Lab Part 1.mp4
      09:04
    • 2.5 Packet Sniffing Lab Part 2.mp4
      04:25
    • 2.6 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4
      10:03
    • 2.7 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4
      09:32
    • 2.8 TCPDUMP Lab.mp4
      08:56
      Module 3 - Conclusion
    • 3.1 Capstone Lab Navigation.mp4
      01:56
    • 3.2 Conclusion.mp4
      02:48
      Resources
    • Glossary.pdf
    • Lab 1 Wireshark - Step by Step Guide.pdf
    • Lab 2 Packet Sniffing - Step by Step Guide.pdf
    • Lab 3 Applying Filters to TCPDump and Wireshark - Step by Step Guide.pdf
    • Lab 4 TCPDump - Step by Step Guide.pdf
    • Study Guide.pdf
    • Syllabus and Outline.pdf
    • TCPDump Cheat Sheet.pdf
    • Wireshark Cheat Sheet.pdf
    • Wireshark Filters.pdf
    • Wireshark & TCPDump Sources.pdf
    • Wireshark & TCPDump - Instructor Notes.pdf
      Module 1 - Introduction
    • 1.1 Welcome.mp4
      05:15
    • 1.2 What is Splunk.mp4
      03:42
    • 1.3 Splunk and Your Career.mp4
      08:24
      Module 2 - Splunk Products, Resources, and Certifications
    • 2.1 Splunk Products, Resources, and Certifications.mp4
      01:24
    • 2.2 Splunk Website.mp4
      04:36
    • 2.3 Splunk Products.mp4
      04:47
      Module 3 - Setting Up Splunk
    • 3.1 Setting Up Splunk.mp4
      02:50
    • 3.2 Parts of Splunk.mp4
      07:10
    • 3.3 Installing Splunk on Linux.mp4
      05:22
    • 3.4 Installing Splunk on Windows.mp4
      04:18
    • 3.5 Installing a Universal Forwarder.mp4
      04:36
      Module 4 - Data
    • 4.1 Data.mp4
      00:29
    • 4.2 Web Interface Tour.mp4
      07:07
    • 4.3 Ways to Get Data.mp4
      11:23
    • 4.4 Inputs Monitoring.mp4
      07:59
      Module 5 - Using Data
    • 5.1 Using Data.mp4
      00:53
    • 5.2 Searches.mp4
      07:02
    • 5.3 Alerts.mp4
      11:00
    • 5.4 Reports and Dashboards.mp4
      07:14
    • 5.5 App Basics.mp4
      05:52
      Module 6 - Conclusion
    • 6.1 More to Learn.mp4
      03:33
    • 6.2 Final Review.mp4
      04:12
      Resources
    • 1.2 Slide Handout.pdf
    • 1.3 Slide Handout.pdf
    • 2.3 Slide Handout.pdf
    • 3.2 Slide Handout.pdf
    • 3.3 Slide Handout.pdf
    • 3.4 Slide Handout.pdf
    • 4.3 Slide Handout.pdf
    • 4.4 Slide Handout.pdf
    • 5.2 Slide Handout.pdf
    • 5.3 Slide Handout.pdf
    • 5.4 Slide Handout.pdf
    • 5.5 Slide Handout.pdf
    • 6.1 Slide Handout.pdf
    • 6.2 Slide Handout.pdf
    • Additional Readings.pdf
    • Cheat Sheet.pdf
    • Glossary.pdf
    • Lab Info.pdf
    • Quiz Questions.pdf
    • Study Guide.pdf
    • Syllabus and Outline.pdf
      Module 1 - Introduction and Review
    • 1.1 Course Introduction.mp4
      03:40
    • 1.2 Web Applications Architecture Review Part 1.mp4
      09:08
    • 1.3 Web Applications Architecture Review Part 2.mp4
      08:36
    • 1.4 Web Server Logs Review Part 1.mp4
      06:26
    • 1.5 Web Server Logs Review Part 2.mp4
      07:20
    • 1.6 Tips and Common Issues Part 1.mp4
      07:53
    • 1.7 Tips and Common Issues Part 2.mp4
      09:00
      Module 2 - Identifying Web Attacks Through Logs
    • 2.1 Web Application Attacks Review.mp4
      09:53
    • 2.2 Vulnerability Scans.mp4
      09:05
    • 2.3 Brute Force Attacks.mp4
      06:47
    • 2.4 SQL Injection.mp4
      08:50
    • 2.5 File Inclusion.mp4
      07:08
    • 2.6 XSS - Cross-Site Scripting.mp4
      08:48
    • 2.7 CSRF - Cross Site Request Forgery.mp4
      03:57
    • 2.8 Other Log Sources Part 1.mp4
      08:46
    • 2.9 Other Log Sources Part 2.mp4
      06:55
    • 2.10 Course Summary.mp4
      03:35
      Resources
    • Glossary.pdf
    • Internet Logs.zip
    • Lab logs.zip
    • Quiz.pdf
    • Study Guide.pdf
    • Syllabus and Outline.pdf
      Module 1 - Just the Basics
    • 1.1 1.0.1 Course Introduction - IP.mp4
      06:23
    • 1.2 1.0.2 Background Information - IP.mp4
      08:28
    • 1.3 Logic Part 1 - IP.mp4
      09:45
    • 1.4 Logic Part 2 - IP.mp4
      08:11
    • 1.5 Variables - IP.mp4
      06:38
    • 1.6 If Statements - IP.mp4
      07:30
    • 1.7 For Loops - IP.mp4
      08:23
    • 1.8 While Loops - IP.mp4
      06:04
    • 1.9 Turning Logic into Pseudocode Part 1 - IP.mp4
      07:37
    • 1.10 Turning Logic into Pseudocode Part 2 - IP.mp4
      06:15
    • 1.11 Turning Logic into Pseudocode Part 3 - IP.mp4
      06:35
    • 1.12 Python Basics Part 1 - IP.mp4
      04:41
    • 1.13 Python Basics Part 2 - IP.mp4
      07:24
    • 1.14 Summary and Review - IP.mp4
      01:43
      Module 2 - Data Types and Logic
    • 2.1 Data Types and Logic Introduction - IP.mp4
      02:29
    • 2.2 If Elif Else - IP.mp4
      08:36
    • 2.3 For Else - IP.mp4
      08:41
    • 2.4 While in Python - IP.mp4
      05:54
    • 2.5 Python Logical Escapes - IP.mp4
      06:34
    • 2.6 Python Functions - IP.mp4
      09:54
    • 2.7 Strings (Deep-Dive) Part 1 - IP.mp4
      09:23
    • 2.8 Strings (Deep-Dive) Part 2 - IP.mp4
      07:26
    • 2.9 Numbers (Deep-Dive) - IP.mp4
      05:16
    • 2.10 Lists (Deep-Dive) - IP.mp4
      07:42
    • 2.11 Dictionaries (Deep-Dive) - IP.mp4
      05:49
    • 2.12 Summary and Review - IP.mp4
      03:32
      Resources
    • Challenges.pdf
    • Intro to Python Glossary 1 .pdf
    • Intro to Python Solutions 1 .pdf
    • Intro to Python study guide 1 .pdf
    • Intro to Python-Syllabus update -5 5 2022-.pdf
    • beginners python cheat sheet pcc dictionaries.pdf
    • beginners python cheat sheet pcc files exceptions.pdf
    • beginners python cheat sheet pcc functions.pdf
    • beginners python cheat sheet pcc if while.pdf
    • beginners python cheat sheet pcc lists.pdf
      Module 1 - Intro to PowerShell Scripting
    • 1.1 What is PowerShell.mp4
      08:26
    • 1.2 Working with P2.mp4
      07:44
    • 1.3 Command Line.mp4
      07:04
    • 1.4 Getting Help.mp4
      11:08
    • 1.5 Additional Piping.mp4
      07:10
    • 1.6 Additional Help.mp4
      06:32
    • 1.7 Scripting Basics.mp4
      10:35
    • 1.8 Common Commands Part 1.mp4
      10:45
    • 1.9 Common Commands Part 2.mp4
      16:37
    • 1.10 Common Commands Part 3.mp4
      07:00
    • 1.11 Common Commands Part 4.mp4
      10:05
      Module 1 - Risk Management and Security Basics
    • 1.1 Why Security+.mp4
      07:32
    • 1.2 Risk Management and Security Basics.mp4
      03:41
    • 1.3 Risk Management Overview.mp4
      05:12
    • 1.4 Use and Misuse Cases.mp4
      03:10
    • 1.5 Risk Assessment.mp4
      07:04
    • 1.6 Risk Mitigation.mp4
      05:56
    • 1.7 Risk Monitoring.mp4
      02:37
    • 1.8 Security Principles - Confidentiality.mp4
      05:48
    • 1.9 Integrity and Availability Threats and Mitigation.mp4
      03:45
    • 1.10 Security Principles Wrap-Up.mp4
      02:15
      Module 2 - Threats, Attacks and Vulnerabilities
    • 2.1 Understanding Attacks.mp4
      04:40
    • 2.2 Social Engineering.mp4
      04:04
    • 2.3 Malware.mp4
      03:02
    • 2.4 Network-Based Attacks.mp4
      05:49
    • 2.5 Spoofing and Redirection.mp4
      04:09
    • 2.6 DNS Service.mp4
      06:30
    • 2.7 Passwords.mp4
      03:17
    • 2.8 Wireless Security Part 1.mp4
      06:52
    • 2.9 Wireless Security Part 2.mp4
      04:20
    • 2.10 Application Attacks.mp4
      03:08
    • 2.11 Code Injection and Cross Site Scripting.mp4
      06:50
    • 2.12 XSRF Race Conditions and Memory Issues.mp4
      05:08
      Module 3 - Cryptography
    • 3.1 Cryptography Introduction and Services.mp4
      03:57
    • 3.2 Cryptography Definitions Initialization Vectors.mp4
      05:59
    • 3.3 Algorithms and Keys.mp4
      02:44
    • 3.4 Desirable Qualities of Algorithms and Keys.mp4
      05:22
    • 3.5 Symmetric Cryptography.mp4
      04:15
    • 3.6 Symmetric Ciphers Stream and Block.mp4
      05:59
    • 3.7 Asymmetric Cryptography.mp4
      03:39
    • 3.8 Hashing for Integrity.mp4
      04:27
    • 3.9 MAC Message Authentication Code.mp4
      03:06
    • 3.10 Hybrid Cryptography SSL and TLS.mp4
      03:49
    • 3.11 SSL, TLS and PKI Introduction.mp4
      02:52
    • 3.12 PKI Continued.mp4
      06:32
    • 3.13 PGP and SMIME.mp4
      03:47
      Module 4 - Network Security
    • 4.1 Networking Concepts.mp4
      07:02
    • 4.2 Network Connectivity.mp4
      04:56
    • 4.3 Network Services Continued - DHCP and IPAM.mp4
      06:06
    • 4.4 OSI Model Introduction and Encapsulation.mp4
      08:03
    • 4.5 OSI Layers 1 and 2.mp4
      09:19
    • 4.6 OSI Layers 3 and 4.mp4
      07:46
    • 4.7 OSI Layers 5, 6, 7 and Summary.mp4
      07:04
    • 4.8 Ports and Protocols Introduction.mp4
      03:14
    • 4.9 Protocols of the TCPIP Suite Part 1.mp4
      08:31
    • 4.10 Protocols of the TCPIP Suite Part 2.mp4
      06:05
    • 4.11 Network Services DNS.mp4
      08:07
    • 4.12 Network Storage.mp4
      04:38
    • 4.13 Remote Access.mp4
      04:05
    • 4.14 Tunneling and IPSec Part 1.mp4
      06:54
    • 4.15 Tunneling and IPSec Part 2.mp4
      05:45
      Module 5 - Network Connectivity Devices
    • 5.1 Network Connectivity Devices Part 1.mp4
      07:08
    • 5.2 Network Connectivity Devices Part 2.mp4
      03:30
    • 5.3 Switch and VLAN Configuration Part 1.mp4
      04:57
    • 5.4 Switch and VLAN Configuration Part 2.mp4
      04:28
    • 5.5 Routing.mp4
      07:37
    • 5.6 Network Address Translation.mp4
      03:35
    • 5.7 Firewalls.mp4
      09:05
    • 5.8 Firewall Best Practices.mp4
      03:55
    • 5.9 Intrusion Detection and Prevention.mp4
      07:24
      Module 6 - Operational Security
    • 6.1 Introduction and Policy.mp4
      04:01
    • 6.2 Policies and Best Practices Part 1.mp4
      06:42
    • 6.3 Policies and Best Practices Part 2.mp4
      06:33
    • 6.4 Scanning, Monitoring and Patching.mp4
      05:52
    • 6.5 Patch Lifecycle Baselines and Traffic Analysis.mp4
      05:30
    • 6.6 Fault Management.mp4
      04:21
    • 6.7 RAID and Data Backups.mp4
      05:53
    • 6.8 Business Continuity and Disaster Recovery Part 1.mp4
      07:16
    • 6.9 Business Continuity and Disaster Recovery Part 2.mp4
      04:08
    • 6.10 Virtualization Part 1.mp4
      06:57
    • 6.11 Virtualization Part 2.mp4
      06:25
    • 6.12 Cloud Computing.mp4
      04:07
    • 6.13 Cloud Services.mp4
      09:48
    • 6.14 Cloud Deployment Models and Cloud Wrap-Up.mp4
      03:49
    • 6.15 IoT Introduction.mp4
      02:28
    • 6.16 OWASP IoT and Wrap-Up.mp4
      07:16
    • 6.17 Hardening the System Part 1.mp4
      02:19
    • 6.18 Hardening the System Part 2.mp4
      03:53
    • 6.19 Vulnerability Assessments and Penetration Tests.mp4
      04:21
    • 6.20 Incident Response.mp4
      03:42
    • 6.21 Forensic Investigations.mp4
      05:21
      Module 7 - Identity and Access Management
    • 7.1 Identity and Access Management Introduction.mp4
      03:43
    • 7.2 Authentication.mp4
      09:24
    • 7.3 Single Sign-On Kerberos Part 1.mp4
      05:42
    • 7.4 Single Sign-On Kerberos Part 2.mp4
      03:45
    • 7.5 Single Sign-On with Federated Services Part 1.mp4
      05:23
    • 7.6 Single Sign-On with Federated Services Part 2.mp4
      04:02
    • 7.7 Network Access Control and Authentication Wrap-Up.mp4
      05:36
    • 7.8 Authorization.mp4
      07:50
    • 7.9 Auditing and Wrap-Up.mp4
      01:51
      Resources
    • CompTIA Security Plus Syllabus and Outline.pdf

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cybrary, Inc., is a crowdsourced free online IT and Cyber Security training and career development platform for people around the world. Founded in January 2015, the company has a myriad of courses spanning from beginner to expert level in areas such as IT Fundamentals, Malware Analysis, Python Scripting, Incident Response, and much more. For a full list of courses and other resources, visit the Cybrary Catalog.
    • language english
    • Training sessions 285
    • duration 29:55:51
    • English subtitles has
    • Release Date 2023/12/15