Companies Home Search Profile

CySA+ (CompTIA Cybersecurity Analyst) CS0-001

Focused View

28:13:25

79 View
  • 01-01 - Course Overview -- Course Overview.mp4
    02:16
  • 02-01 - Security Data Analytics Whats Going On -- Series Introductionoverview.mp4
    06:13
  • 02-02 - Security Data Analytics Whats Going On -- Module Overview.mp4
    01:05
  • 02-03 - Security Data Analytics Whats Going On -- Teaching an Old Dog New Tricks.mp4
    10:17
  • 02-04 - Security Data Analytics Whats Going On -- Trend Analysis.mp4
    07:48
  • 02-05 - Security Data Analytics Whats Going On -- Data Aggregation and Correlation.mp4
    03:17
  • 02-06 - Security Data Analytics Whats Going On -- Historical Analysis.mp4
    05:15
  • 02-07 - Security Data Analytics Whats Going On -- Summary.mp4
    01:29
  • 03-01 - Defense in Depth This Is Where It Begins -- Introduction and Overview.mp4
    01:00
  • 03-02 - Defense in Depth This Is Where It Begins -- What Is Defense in Depth.mp4
    06:31
  • 03-03 - Defense in Depth This Is Where It Begins -- Level 1 Personnel.mp4
    04:48
  • 03-04 - Defense in Depth This Is Where It Begins -- Level 2 Processes.mp4
    02:25
  • 03-05 - Defense in Depth This Is Where It Begins -- Level 3 Technologies.mp4
    02:26
  • 03-06 - Defense in Depth This Is Where It Begins -- Level 4 The Network.mp4
    01:30
  • 03-07 - Defense in Depth This Is Where It Begins -- Summary.mp4
    02:03
  • 04-01 - Defense in Depth What Tools Can You Use -- Introduction and Overview.mp4
    01:28
  • 04-02 - Defense in Depth What Tools Can You Use -- Lets Break It Down!.mp4
    05:20
  • 04-03 - Defense in Depth What Tools Can You Use -- IPSHIPS.mp4
    07:24
  • 04-04 - Defense in Depth What Tools Can You Use -- Firewalls Softwarehardware.mp4
    03:03
  • 04-05 - Defense in Depth What Tools Can You Use -- Anti-virusanti-malware.mp4
    01:32
  • 04-06 - Defense in Depth What Tools Can You Use -- EMET.mp4
    03:52
  • 04-07 - Defense in Depth What Tools Can You Use -- Web Proxies & WAFs.mp4
    05:00
  • 04-08 - Defense in Depth What Tools Can You Use -- A New Hope.mp4
    04:11
  • 04-09 - Defense in Depth What Tools Can You Use -- Summary.mp4
    01:56
  • 05-01 - Defense in Depth Drill, Test, Rinse, Repeat -- Introduction and Overview.mp4
    00:51
  • 05-02 - Defense in Depth Drill, Test, Rinse, Repeat -- Why Penetration Tests.mp4
    05:07
  • 05-03 - Defense in Depth Drill, Test, Rinse, Repeat -- Rules Are Rules.mp4
    07:57
  • 05-04 - Defense in Depth Drill, Test, Rinse, Repeat -- Reverse Engineering.mp4
    03:31
  • 05-05 - Defense in Depth Drill, Test, Rinse, Repeat -- Teams Involved.mp4
    03:24
  • 05-06 - Defense in Depth Drill, Test, Rinse, Repeat -- Risk Evaluation.mp4
    06:10
  • 05-07 - Defense in Depth Drill, Test, Rinse, Repeat -- Summary.mp4
    01:40
  • 06-01 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Introduction and Overview.mp4
    00:51
  • 06-02 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Frameworks.mp4
    06:52
  • 06-03 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Policies.mp4
    10:57
  • 06-04 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Controls.mp4
    05:03
  • 06-05 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Procedures.mp4
    05:38
  • 06-06 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Quality Controls & Verification.mp4
    06:17
  • 06-07 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Module & Course Summary.mp4
    01:19
  • 01-01 - Course Overview -- Course Overview.mp4
    02:38
  • 02-01 - What Do You Need to Start -- Introduction.mp4
    06:25
  • 02-02 - What Do You Need to Start -- Benefits of a Vulnerability Management Program.mp4
    07:03
  • 02-03 - What Do You Need to Start -- Regulatory Environments.mp4
    05:11
  • 02-04 - What Do You Need to Start -- Corporate Policies.mp4
    01:54
  • 02-05 - What Do You Need to Start -- Dales Top 10 Prechecks.mp4
    08:22
  • 02-06 - What Do You Need to Start -- Demo Adding OpenVAS Virtual Appliance.mp4
    17:44
  • 02-07 - What Do You Need to Start -- Demo Adding OpenVAS to Kali Linux.mp4
    08:33
  • 02-08 - What Do You Need to Start -- Summary.mp4
    00:53
  • 03-01 - Shaping and Implementing Your Vulnerability Scans -- What Gets Covered.mp4
    01:53
  • 03-02 - Shaping and Implementing Your Vulnerability Scans -- ID Targets for Your Scan.mp4
    01:14
  • 03-03 - Shaping and Implementing Your Vulnerability Scans -- Demo Scanning a Target.mp4
    04:48
  • 03-04 - Shaping and Implementing Your Vulnerability Scans -- Define Scan Frequency.mp4
    03:55
  • 03-05 - Shaping and Implementing Your Vulnerability Scans -- The Scopes.mp4
    01:27
  • 03-06 - Shaping and Implementing Your Vulnerability Scans -- Configurations.mp4
    04:14
  • 03-07 - Shaping and Implementing Your Vulnerability Scans -- Scanner Maintenance.mp4
    01:27
  • 03-08 - Shaping and Implementing Your Vulnerability Scans -- Classifying Data.mp4
    03:50
  • 03-09 - Shaping and Implementing Your Vulnerability Scans -- Ongoing Scanning and Continuous Monitoring.mp4
    01:26
  • 03-10 - Shaping and Implementing Your Vulnerability Scans -- Summary.mp4
    01:31
  • 04-01 - The Scanners -- What Gets Covered.mp4
    01:02
  • 04-02 - The Scanners -- Understanding Which Scanner to Use.mp4
    03:11
  • 04-03 - The Scanners -- Open-source vs. Commercial.mp4
    01:11
  • 04-04 - The Scanners -- Demo Nessus.mp4
    18:26
  • 04-05 - The Scanners -- On-premises vs. Cloud.mp4
    03:01
  • 04-06 - The Scanners -- A Quick Understanding of Nexpose.mp4
    02:11
  • 04-07 - The Scanners -- The Microsoft World.mp4
    04:50
  • 04-08 - The Scanners -- SCAP.mp4
    03:42
  • 04-09 - The Scanners -- Exploit Scanners.mp4
    02:46
  • 04-10 - The Scanners -- Summary.mp4
    00:51
  • 05-01 - Analyzing Vulnerability Scans -- What Gets Covered.mp4
    00:57
  • 05-02 - Analyzing Vulnerability Scans -- The Tricks to Interpreting Reports.mp4
    03:12
  • 05-03 - Analyzing Vulnerability Scans -- CVSS The Standard.mp4
    07:54
  • 05-04 - Analyzing Vulnerability Scans -- False Positives and Exceptions.mp4
    02:07
  • 05-05 - Analyzing Vulnerability Scans -- Trends.mp4
    06:39
  • 05-06 - Analyzing Vulnerability Scans -- Summary.mp4
    00:57
  • 06-01 - Remediation and Change Control -- What Gets Covered.mp4
    00:56
  • 06-02 - Remediation and Change Control -- The Remediation Workflow.mp4
    03:16
  • 06-03 - Remediation and Change Control -- Communication and Change Control.mp4
    04:40
  • 06-04 - Remediation and Change Control -- Inhibitors to Remediation.mp4
    04:10
  • 06-05 - Remediation and Change Control -- Summary.mp4
    00:43
  • 07-01 - Remediating Host Vulnerabilities -- What Gets Covered.mp4
    00:39
  • 07-02 - Remediating Host Vulnerabilities -- Servers.mp4
    02:00
  • 07-03 - Remediating Host Vulnerabilities -- Endpoints.mp4
    01:20
  • 07-04 - Remediating Host Vulnerabilities -- ICS and SCADA.mp4
    04:22
  • 07-05 - Remediating Host Vulnerabilities -- Summary.mp4
    01:34
  • 08-01 - Remediating Network Vulnerabilities -- What Gets Covered.mp4
    01:16
  • 08-02 - Remediating Network Vulnerabilities -- Updates.mp4
    02:00
  • 08-03 - Remediating Network Vulnerabilities -- SSL and TLS.mp4
    05:04
  • 08-04 - Remediating Network Vulnerabilities -- DNS.mp4
    01:41
  • 08-05 - Remediating Network Vulnerabilities -- Internal IP Exposure.mp4
    01:35
  • 08-06 - Remediating Network Vulnerabilities -- VPN.mp4
    02:00
  • 08-07 - Remediating Network Vulnerabilities -- Summary.mp4
    01:13
  • 09-01 - Remediating Virtual Environments Vulnerabilities -- What Gets Covered.mp4
    01:19
  • 09-02 - Remediating Virtual Environments Vulnerabilities -- Just a Quick Review of Virtualization.mp4
    02:03
  • 09-03 - Remediating Virtual Environments Vulnerabilities -- Administration Interface Access.mp4
    01:36
  • 09-04 - Remediating Virtual Environments Vulnerabilities -- Virtual Host Patching.mp4
    01:47
  • 09-05 - Remediating Virtual Environments Vulnerabilities -- Virtual Guest Concerns.mp4
    01:24
  • 09-06 - Remediating Virtual Environments Vulnerabilities -- Virtual Network Concerns.mp4
    01:43
  • 09-07 - Remediating Virtual Environments Vulnerabilities -- VM Escape.mp4
    01:38
  • 09-08 - Remediating Virtual Environments Vulnerabilities -- Summary and Course Wrap Up.mp4
    02:01
  • 01-01 - Course Overview -- Course Overview.mp4
    03:30
  • 02-01 - Preparing for Incident Response and Handling -- Course Introduction.mp4
    06:42
  • 02-02 - Preparing for Incident Response and Handling -- Security Policies and Their Goals.mp4
    07:12
  • 02-03 - Preparing for Incident Response and Handling -- Characteristics and Implementation.mp4
    04:13
  • 02-04 - Preparing for Incident Response and Handling -- Access Control Policy.mp4
    01:56
  • 02-05 - Preparing for Incident Response and Handling -- Acceptable Use Policy.mp4
    01:40
  • 02-06 - Preparing for Incident Response and Handling -- Administrative Security Policy.mp4
    02:29
  • 02-07 - Preparing for Incident Response and Handling -- Asset Control Policy.mp4
    02:03
  • 02-08 - Preparing for Incident Response and Handling -- Audit Trail Policy.mp4
    02:08
  • 02-09 - Preparing for Incident Response and Handling -- Logging Policy.mp4
    01:56
  • 02-10 - Preparing for Incident Response and Handling -- Documentation Policy.mp4
    02:36
  • 02-11 - Preparing for Incident Response and Handling -- Evidence Collection Policy.mp4
    02:01
  • 02-12 - Preparing for Incident Response and Handling -- Evidence Preservation Policy.mp4
    02:13
  • 02-13 - Preparing for Incident Response and Handling -- Information Security Policy.mp4
    01:34
  • 02-14 - Preparing for Incident Response and Handling -- NIACAP, IA, and CA Policy.mp4
    01:14
  • 02-15 - Preparing for Incident Response and Handling -- Physical Security Policy.mp4
    02:00
  • 02-16 - Preparing for Incident Response and Handling -- Physical Security Guidelines.mp4
    01:22
  • 02-17 - Preparing for Incident Response and Handling -- The Law in a Digital World.mp4
    04:07
  • 02-18 - Preparing for Incident Response and Handling -- Summary.mp4
    01:32
  • 03-01 - Incident Response Processes -- What Were Going to Learn.mp4
    00:58
  • 03-02 - Incident Response Processes -- What Is a Computer Security Incident.mp4
    03:23
  • 03-03 - Incident Response Processes -- How Do We Identify an Incident.mp4
    03:44
  • 03-04 - Incident Response Processes -- How Do We Handle an Incident.mp4
    01:29
  • 03-05 - Incident Response Processes -- So Whats the Goal.mp4
    02:12
  • 03-06 - Incident Response Processes -- Whats the Plan.mp4
    02:56
  • 03-07 - Incident Response Processes -- Information Warefare.mp4
    03:59
  • 03-08 - Incident Response Processes -- Vulnerability, Attacks, and Threats.mp4
    05:54
  • 03-09 - Incident Response Processes -- Signs of an Incident.mp4
    09:47
  • 03-10 - Incident Response Processes -- How Do We Respond.mp4
    04:05
  • 03-11 - Incident Response Processes -- The Team.mp4
    03:31
  • 03-12 - Incident Response Processes -- What Did We Learn.mp4
    01:16
  • 04-01 - The Workflow of Incident Response -- Understanding the Workflow.mp4
    03:08
  • 04-02 - The Workflow of Incident Response -- Identification.mp4
    04:46
  • 04-03 - The Workflow of Incident Response -- Incident Recording.mp4
    01:04
  • 04-04 - The Workflow of Incident Response -- Initial Response.mp4
    01:59
  • 04-05 - The Workflow of Incident Response -- Communicating the Incident.mp4
    01:09
  • 04-06 - The Workflow of Incident Response -- Containment.mp4
    02:56
  • 04-07 - The Workflow of Incident Response -- Formulating a Response Strategy.mp4
    02:49
  • 04-08 - The Workflow of Incident Response -- Incident Classification.mp4
    01:46
  • 04-09 - The Workflow of Incident Response -- Incident Investigation.mp4
    01:18
  • 04-10 - The Workflow of Incident Response -- Data Collection.mp4
    01:40
  • 04-11 - The Workflow of Incident Response -- Forensic Analysis.mp4
    02:07
  • 04-12 - The Workflow of Incident Response -- Evidence Protection.mp4
    02:22
  • 04-13 - The Workflow of Incident Response -- Notifying External Agencies.mp4
    00:53
  • 04-14 - The Workflow of Incident Response -- Eradication.mp4
    05:42
  • 04-15 - The Workflow of Incident Response -- System Recovery.mp4
    01:43
  • 04-16 - The Workflow of Incident Response -- Incident Documentation.mp4
    01:42
  • 04-17 - The Workflow of Incident Response -- Incident Damage and Cost Assessment.mp4
    01:48
  • 04-18 - The Workflow of Incident Response -- Review and Update the Response Policies.mp4
    01:17
  • 04-19 - The Workflow of Incident Response -- What Did We Learn.mp4
    00:35
  • 05-01 - Networks and Host Attacks -- What Were Going to Learn.mp4
    00:38
  • 05-02 - Networks and Host Attacks -- Denial of Service Handling.mp4
    04:31
  • 05-03 - Networks and Host Attacks -- Denial of Service Detection.mp4
    05:21
  • 05-04 - Networks and Host Attacks -- Denial of Service Handling.mp4
    02:40
  • 05-05 - Networks and Host Attacks -- Denial of Service Responding.mp4
    02:20
  • 05-06 - Networks and Host Attacks -- Denial of Service Prevention.mp4
    02:21
  • 05-07 - Networks and Host Attacks -- Denial of Service Containment.mp4
    02:41
  • 05-08 - Networks and Host Attacks -- Denial of Service Best Practices.mp4
    01:24
  • 05-09 - Networks and Host Attacks -- Unauthorized Access Handling.mp4
    06:45
  • 05-10 - Networks and Host Attacks -- Unauthorized Access Signs of a Root Compromise.mp4
    04:17
  • 05-11 - Networks and Host Attacks -- Unauthorized Access Hardware.mp4
    02:21
  • 05-12 - Networks and Host Attacks -- Unauthorized Access Responding.mp4
    01:31
  • 05-13 - Networks and Host Attacks -- Unauthorized Access Prevention.mp4
    04:25
  • 05-14 - Networks and Host Attacks -- Unauthorized Access Responding.mp4
    01:44
  • 05-15 - Networks and Host Attacks -- Unauthorized Access Eradicate and Recovery.mp4
    01:20
  • 05-16 - Networks and Host Attacks -- Unauthorized Access Best Practices.mp4
    02:32
  • 05-17 - Networks and Host Attacks -- Inappropriate Usage Detecting.mp4
    03:42
  • 05-18 - Networks and Host Attacks -- Inappropriate Usage Prevention.mp4
    02:45
  • 05-19 - Networks and Host Attacks -- Inappropriate Usage Containment.mp4
    01:19
  • 05-20 - Networks and Host Attacks -- Multiple Components Issues Handling.mp4
    01:51
  • 05-21 - Networks and Host Attacks -- Multiple Components Issues Responding.mp4
    01:04
  • 05-22 - Networks and Host Attacks -- What Did We Learn.mp4
    01:29
  • 06-01 - Service and Application Attacks -- What Were Going to Learn.mp4
    00:58
  • 06-02 - Service and Application Attacks -- Service and Application Monitoring.mp4
    01:52
  • 06-03 - Service and Application Attacks -- Some Symptoms Services.mp4
    02:09
  • 06-04 - Service and Application Attacks -- Demo Checking Services.mp4
    08:20
  • 06-05 - Service and Application Attacks -- Demo Application Error Monitoring.mp4
    04:17
  • 06-06 - Service and Application Attacks -- Analysis Applications.mp4
    01:20
  • 06-07 - Service and Application Attacks -- Service and Application Response and Restore.mp4
    01:47
  • 06-08 - Service and Application Attacks -- Detecting the Attacks Applications.mp4
    04:06
  • 06-09 - Service and Application Attacks -- Types of Attacks Session Hijacking.mp4
    01:31
  • 06-10 - Service and Application Attacks -- Demo Session Hijack.mp4
    03:30
  • 06-11 - Service and Application Attacks -- Symptoms Session Hijacking.mp4
    04:23
  • 06-12 - Service and Application Attacks -- Defense Session Hijacking.mp4
    02:32
  • 06-13 - Service and Application Attacks -- When It Happens Session Hijacking.mp4
    01:10
  • 06-14 - Service and Application Attacks -- Types of Attacks Command Injection.mp4
    05:34
  • 06-15 - Service and Application Attacks -- Defense SQL Injections.mp4
    02:51
  • 06-16 - Service and Application Attacks -- When It Happens SQL Injection.mp4
    02:23
  • 06-17 - Service and Application Attacks -- Types of Attacks XSS Attacks.mp4
    01:08
  • 06-18 - Service and Application Attacks -- What Attackers Are Looking For XSS Attacks.mp4
    02:49
  • 06-19 - Service and Application Attacks -- Types of XSS Attacks.mp4
    01:46
  • 06-20 - Service and Application Attacks -- Tools XSS Attacks.mp4
    01:09
  • 06-21 - Service and Application Attacks -- Defense XSS Attacks.mp4
    02:43
  • 06-22 - Service and Application Attacks -- When It Happens XSS Attacks.mp4
    01:03
  • 06-23 - Service and Application Attacks -- Types of Attacks Buffer Overflow.mp4
    02:29
  • 06-24 - Service and Application Attacks -- Types of Buffer Overflows.mp4
    01:10
  • 06-25 - Service and Application Attacks -- Tools Buffer Overflows.mp4
    01:59
  • 06-26 - Service and Application Attacks -- Defense Buffer Overflows.mp4
    02:42
  • 06-27 - Service and Application Attacks -- When It Happens Buffer Overflows.mp4
    01:07
  • 06-28 - Service and Application Attacks -- What Did We Learn.mp4
    01:19
  • 07-01 - Malicious Code and Insider Threats -- What Were Going to Learn.mp4
    01:13
  • 07-02 - Malicious Code and Insider Threats -- Malicious Code Virus and Worms.mp4
    02:19
  • 07-03 - Malicious Code and Insider Threats -- Malicious Code Trojans and Spyware.mp4
    02:35
  • 07-04 - Malicious Code and Insider Threats -- Malicious Code What to Do.mp4
    04:00
  • 07-05 - Malicious Code and Insider Threats -- Malicious Code What Are the Signs.mp4
    02:02
  • 07-06 - Malicious Code and Insider Threats -- Malicious Code Containment.mp4
    03:10
  • 07-07 - Malicious Code and Insider Threats -- Malicious Code Gather Evidence.mp4
    01:48
  • 07-08 - Malicious Code and Insider Threats -- Malicious Code Bots and Botnets.mp4
    02:37
  • 07-09 - Malicious Code and Insider Threats -- Malicious Code How Bots and Botnets Work.mp4
    05:11
  • 07-10 - Malicious Code and Insider Threats -- Incident Response Handling Performing.mp4
    02:18
  • 07-11 - Malicious Code and Insider Threats -- Malicious Code Rootkits in Windows.mp4
    02:54
  • 07-12 - Malicious Code and Insider Threats -- Malicious Code Rootkits - Kernel Mode.mp4
    01:06
  • 07-13 - Malicious Code and Insider Threats -- When It Happens Rootkits.mp4
    01:59
  • 07-14 - Malicious Code and Insider Threats -- Prevention Rootkits.mp4
    03:22
  • 07-15 - Malicious Code and Insider Threats -- Insider Threats The Landscape.mp4
    01:42
  • 07-16 - Malicious Code and Insider Threats -- Insider Threats The Workflow.mp4
    01:12
  • 07-17 - Malicious Code and Insider Threats -- Insider Threats Detection and Response.mp4
    02:55
  • 07-18 - Malicious Code and Insider Threats -- Insider Threats Prevention - Network Level.mp4
    01:30
  • 07-19 - Malicious Code and Insider Threats -- Insider Threats Prevention - Access Control.mp4
    01:31
  • 07-20 - Malicious Code and Insider Threats -- Insider Threats Prevention - Awareness Program.mp4
    01:42
  • 07-21 - Malicious Code and Insider Threats -- Insider Threats Prevention - Admins and Privileged Users.mp4
    02:47
  • 07-22 - Malicious Code and Insider Threats -- Insider Threats Prevention - Backups.mp4
    01:33
  • 07-23 - Malicious Code and Insider Threats -- What Did We Learn.mp4
    01:22
  • 01-01 - Course Overview -- Course Overview.mp4
    02:15
  • 02-01 - The Two Steps -- Introduction.mp4
    07:15
  • 02-02 - The Two Steps -- Lets Talk About Reconnaissance.mp4
    05:20
  • 02-03 - The Two Steps -- Whats Your Goal Here.mp4
    02:39
  • 02-04 - The Two Steps -- What Youll Learn and Why.mp4
    04:05
  • 02-05 - The Two Steps -- Lets Talk About Some Stipulations.mp4
    04:35
  • 02-06 - The Two Steps -- The Trends Today.mp4
    08:51
  • 02-07 - The Two Steps -- Summary.mp4
    02:37
  • 03-01 - Initially What Do You Look For -- Initially What Do You Look For.mp4
    01:56
  • 03-02 - Initially What Do You Look For -- Using Search Engines.mp4
    04:31
  • 03-03 - Initially What Do You Look For -- Using Websites.mp4
    11:07
  • 03-04 - Initially What Do You Look For -- Using Whois.mp4
    08:31
  • 03-05 - Initially What Do You Look For -- Using PING & DNS.mp4
    04:59
  • 03-06 - Initially What Do You Look For -- Continuing to Use DNS.mp4
    06:23
  • 03-07 - Initially What Do You Look For -- Some Advanced DNS Tricks.mp4
    05:55
  • 03-08 - Initially What Do You Look For -- Summary.mp4
    01:19
  • 04-01 - The More You Look, the More You Find -- Introduction and Overview.mp4
    03:04
  • 04-02 - The More You Look, the More You Find -- Job Sites.mp4
    05:43
  • 04-03 - The More You Look, the More You Find -- Using Resume Sites.mp4
    04:18
  • 04-04 - The More You Look, the More You Find -- More Job Sites.mp4
    02:10
  • 04-05 - The More You Look, the More You Find -- Using Netcraft.mp4
    05:06
  • 04-06 - The More You Look, the More You Find -- The Sweet of Suite Maltego.mp4
    03:02
  • 04-07 - The More You Look, the More You Find -- Demo Maltego.mp4
    07:19
  • 04-08 - The More You Look, the More You Find -- Maltego Were Does It All Come From.mp4
    02:13
  • 04-09 - The More You Look, the More You Find -- The Wayback Machine.mp4
    05:40
  • 04-10 - The More You Look, the More You Find -- Summary.mp4
    02:13
  • 05-01 - Other Reconnaissance Techniques -- Other Reconnaissance Techniques.mp4
    02:14
  • 05-02 - Other Reconnaissance Techniques -- Social Sources.mp4
    03:33
  • 05-03 - Other Reconnaissance Techniques -- Company What Can Be Learned.mp4
    04:56
  • 05-04 - Other Reconnaissance Techniques -- Facebook.mp4
    07:20
  • 05-05 - Other Reconnaissance Techniques -- LinkedIn.mp4
    03:51
  • 05-06 - Other Reconnaissance Techniques -- Financial & Competitive Analysis Data.mp4
    03:32
  • 05-07 - Other Reconnaissance Techniques -- Using Communications to Recon.mp4
    05:01
  • 05-08 - Other Reconnaissance Techniques -- Youve Got Mail Equals Ive Got You!.mp4
    05:08
  • 05-09 - Other Reconnaissance Techniques -- Summary.mp4
    02:51
  • 06-01 - Reconnaissance via Google Hacking -- Reconnaissance via Google Hacking.mp4
    01:52
  • 06-02 - Reconnaissance via Google Hacking -- Understanding Google.mp4
    02:51
  • 06-03 - Reconnaissance via Google Hacking -- The Google Operators.mp4
    04:35
  • 06-04 - Reconnaissance via Google Hacking -- Advanced Google Operators.mp4
    05:27
  • 06-05 - Reconnaissance via Google Hacking -- Using the Operators.mp4
    05:19
  • 06-06 - Reconnaissance via Google Hacking -- Using More Advanced Operators.mp4
    06:03
  • 06-07 - Reconnaissance via Google Hacking -- Applying What You Now Know.mp4
    04:55
  • 06-08 - Reconnaissance via Google Hacking -- The Google Hacking Database.mp4
    05:13
  • 06-09 - Reconnaissance via Google Hacking -- Other Google Hacking Tools.mp4
    02:41
  • 06-10 - Reconnaissance via Google Hacking -- Summary.mp4
    01:34
  • 07-01 - Lets Not Forget PowerShell -- Introduction.mp4
    01:02
  • 07-02 - Lets Not Forget PowerShell -- Quick Overview of PowerShell.mp4
    06:15
  • 07-03 - Lets Not Forget PowerShell -- Why PowerShell.mp4
    02:43
  • 07-04 - Lets Not Forget PowerShell -- Some Basics.mp4
    05:40
  • 07-05 - Lets Not Forget PowerShell -- Demo Scanning.mp4
    15:17
  • 07-06 - Lets Not Forget PowerShell -- Demo Remoting.mp4
    08:23
  • 07-07 - Lets Not Forget PowerShell -- Demo Registry.mp4
    05:51
  • 07-08 - Lets Not Forget PowerShell -- Demo Oh, Theres More!.mp4
    08:39
  • 07-09 - Lets Not Forget PowerShell -- Summary.mp4
    01:22
  • 08-01 - Overview of Scanning -- Overview of Scanning.mp4
    03:36
  • 08-02 - Overview of Scanning -- What Is Scanning.mp4
    02:18
  • 08-03 - Overview of Scanning -- Types of Scanning.mp4
    05:16
  • 08-04 - Overview of Scanning -- Whats the Goal.mp4
    04:14
  • 08-05 - Overview of Scanning -- What Techniques Are Used.mp4
    02:45
  • 08-06 - Overview of Scanning -- What Tools Are Used.mp4
    02:35
  • 08-07 - Overview of Scanning -- Summary.mp4
    02:02
  • 09-01 - Understanding the 3-way Handshake -- Introduction.mp4
    02:00
  • 09-02 - Understanding the 3-way Handshake -- TCP Communications.mp4
    04:06
  • 09-03 - Understanding the 3-way Handshake -- UDP Communications.mp4
    03:42
  • 09-04 - Understanding the 3-way Handshake -- TCP Header Flags.mp4
    03:44
  • 09-05 - Understanding the 3-way Handshake -- Demo Watch The 3-way Handshake.mp4
    04:41
  • 09-06 - Understanding the 3-way Handshake -- What If....mp4
    01:22
  • 09-07 - Understanding the 3-way Handshake -- Summary.mp4
    01:31
  • 10-01 - Checking for Live Systems and Their Open Ports -- Checking for Live Systems and Their Ports.mp4
    02:39
  • 10-02 - Checking for Live Systems and Their Open Ports -- DEMO ICMP Sweeps with Angry IP and Nmap.mp4
    09:32
  • 10-03 - Checking for Live Systems and Their Open Ports -- DEMO Sweeping Without ICMP Using hping3.mp4
    06:02
  • 10-04 - Checking for Live Systems and Their Open Ports -- DEMO More hping3 Sweeps.mp4
    03:34
  • 10-05 - Checking for Live Systems and Their Open Ports -- Whats Firewalking.mp4
    03:28
  • 10-06 - Checking for Live Systems and Their Open Ports -- Looking at Firewalking Results.mp4
    05:45
  • 10-07 - Checking for Live Systems and Their Open Ports -- Summary.mp4
    01:02
  • 11-01 - Types of Scanning -- Types of Scanning.mp4
    01:55
  • 11-02 - Types of Scanning -- Full Scans.mp4
    05:27
  • 11-03 - Types of Scanning -- Half-open Scans.mp4
    03:52
  • 11-04 - Types of Scanning -- Xmas Scans.mp4
    04:37
  • 11-05 - Types of Scanning -- FIN Scans.mp4
    03:05
  • 11-06 - Types of Scanning -- NULL Scans.mp4
    03:50
  • 11-07 - Types of Scanning -- UDP Scans.mp4
    02:53
  • 11-08 - Types of Scanning -- Evading IDS Systems with Idle Scans.mp4
    04:36
  • 11-09 - Types of Scanning -- More IDS Evasion Methods.mp4
    08:01
  • 11-10 - Types of Scanning -- Countermeasures.mp4
    03:45
  • 11-11 - Types of Scanning -- Summary.mp4
    02:15
  • 12-01 - Banner Grabbing and OS Fingerprinting -- Banner Grabbing & OS Fingerprinting.mp4
    01:33
  • 12-02 - Banner Grabbing and OS Fingerprinting -- OS Fingerprinting.mp4
    02:33
  • 12-03 - Banner Grabbing and OS Fingerprinting -- DEMO Using Nmap to OS Fingerprint.mp4
    14:17
  • 12-04 - Banner Grabbing and OS Fingerprinting -- DEMO Banner Grabbing with TelNet & NetCat.mp4
    08:04
  • 12-05 - Banner Grabbing and OS Fingerprinting -- Countermeasures.mp4
    02:26
  • 12-06 - Banner Grabbing and OS Fingerprinting -- Summary.mp4
    01:10
  • 13-01 - More Tools for the Utility-belt -- Introduction.mp4
    00:50
  • 13-02 - More Tools for the Utility-belt -- War Dialing & Wireless Tools.mp4
    05:08
  • 13-03 - More Tools for the Utility-belt -- Frag-out!.mp4
    02:17
  • 13-04 - More Tools for the Utility-belt -- Web Scanners.mp4
    06:18
  • 13-05 - More Tools for the Utility-belt -- Security OnionBro.mp4
    02:35
  • 13-06 - More Tools for the Utility-belt -- Summary.mp4
    00:59
  • 14-01 - Threats from Wireless -- Threats from Wireless.mp4
    01:38
  • 14-02 - Threats from Wireless -- Types of Attacks.mp4
    07:28
  • 14-03 - Threats from Wireless -- Attack on the AP.mp4
    05:29
  • 14-04 - Threats from Wireless -- Attack on the Client.mp4
    02:43
  • 14-05 - Threats from Wireless -- Summary.mp4
    01:03
  • 01-01 - Course Overview -- Course Overview.mp4
    02:43
  • 02-01 - Your Objectives Here -- What Youre Going to Learn.mp4
    04:39
  • 02-02 - Your Objectives Here -- Lets Define Computer Forensics.mp4
    05:30
  • 02-03 - Your Objectives Here -- The Objectives of Forensic Analysis.mp4
    03:06
  • 02-04 - Your Objectives Here -- Forensic Readiness.mp4
    02:55
  • 02-05 - Your Objectives Here -- Types of Forensics.mp4
    04:07
  • 02-06 - Your Objectives Here -- The Whos-who of Forensics.mp4
    04:55
  • 02-07 - Your Objectives Here -- The Forensic Process.mp4
    03:52
  • 02-08 - Your Objectives Here -- Where Do You Find Evidence.mp4
    03:17
  • 02-09 - Your Objectives Here -- How to Collect Electronic Evidence.mp4
    05:03
  • 02-10 - Your Objectives Here -- Even MORE Forensics.mp4
    03:13
  • 02-11 - Your Objectives Here -- What You Learned.mp4
    01:29
  • 03-01 - What Should Be in Your Jump-bag -- What Youre Going to Learn.mp4
    00:55
  • 03-02 - What Should Be in Your Jump-bag -- The Jump-bag.mp4
    02:11
  • 03-03 - What Should Be in Your Jump-bag -- Storage Items.mp4
    06:29
  • 03-04 - What Should Be in Your Jump-bag -- Wireless Items.mp4
    03:44
  • 03-05 - What Should Be in Your Jump-bag -- Network Items.mp4
    03:17
  • 03-06 - What Should Be in Your Jump-bag -- Real Tools.mp4
    01:55
  • 03-07 - What Should Be in Your Jump-bag -- Digital Workstation.mp4
    01:56
  • 03-08 - What Should Be in Your Jump-bag -- Miscellaneous Tools.mp4
    03:18
  • 03-09 - What Should Be in Your Jump-bag -- Other Items.mp4
    03:18
  • 03-10 - What Should Be in Your Jump-bag -- What You Learned, Plus Snacks.mp4
    01:38
  • 04-01 - What About the Digital Jump-bag -- What About the Digital Jump-bag.mp4
    00:56
  • 04-02 - What About the Digital Jump-bag -- Digital or Physical Items.mp4
    05:10
  • 04-03 - What About the Digital Jump-bag -- Digital Forensic Crime Scenes.mp4
    02:30
  • 04-04 - What About the Digital Jump-bag -- Types of Forensic Software.mp4
    03:54
  • 04-05 - What About the Digital Jump-bag -- Suite Tools, Man.mp4
    17:02
  • 04-06 - What About the Digital Jump-bag -- Hashing.mp4
    03:09
  • 04-07 - What About the Digital Jump-bag -- Password Cracking.mp4
    05:01
  • 04-08 - What About the Digital Jump-bag -- Imaging.mp4
    06:55
  • 04-09 - What About the Digital Jump-bag -- What Did We Learn.mp4
    01:02
  • 05-01 - Understanding the Incident Recovery Process -- What Were Going to Learn.mp4
    01:12
  • 05-02 - Understanding the Incident Recovery Process -- What Incident Recovery Means.mp4
    01:48
  • 05-03 - Understanding the Incident Recovery Process -- The Principles of IR.mp4
    04:39
  • 05-04 - Understanding the Incident Recovery Process -- Steps of IR.mp4
    02:27
  • 05-05 - Understanding the Incident Recovery Process -- Whats the Plan.mp4
    03:52
  • 05-06 - Understanding the Incident Recovery Process -- Contingency Components.mp4
    01:15
  • 05-07 - Understanding the Incident Recovery Process -- Continuity Planning.mp4
    06:03
  • 05-08 - Understanding the Incident Recovery Process -- The IR Planning Team.mp4
    02:07
  • 05-09 - Understanding the Incident Recovery Process -- Impact Analysis.mp4
    01:31
  • 05-10 - Understanding the Incident Recovery Process -- All Things IR.mp4
    04:27
  • 05-11 - Understanding the Incident Recovery Process -- Testing Your Plan.mp4
    02:17
  • 05-12 - Understanding the Incident Recovery Process -- What Did You Learn.mp4
    01:25
  • 06-01 - The Techniques of Recovery Containment -- What Were Going to Learn.mp4
    00:37
  • 06-02 - The Techniques of Recovery Containment -- Containing the Damage.mp4
    02:33
  • 06-03 - The Techniques of Recovery Containment -- Containing Damage Segmentation.mp4
    01:24
  • 06-04 - The Techniques of Recovery Containment -- Containing Damage Isolation.mp4
    01:30
  • 06-05 - The Techniques of Recovery Containment -- Containing Damage Removal.mp4
    02:10
  • 06-06 - The Techniques of Recovery Containment -- Containing Damage Reverse Engineering.mp4
    02:12
  • 06-07 - The Techniques of Recovery Containment -- What Did You Learn.mp4
    01:17
  • 07-01 - The Techniques of Recovery Eradication -- What Youre Going to Learn.mp4
    00:40
  • 07-02 - The Techniques of Recovery Eradication -- Sanitization.mp4
    02:55
  • 07-03 - The Techniques of Recovery Eradication -- ReimagingReconstruction.mp4
    06:40
  • 07-04 - The Techniques of Recovery Eradication -- Disposal.mp4
    02:42
  • 07-05 - The Techniques of Recovery Eradication -- What Did You Learn.mp4
    00:43
  • 08-01 - The Techniques of Recovery Validation and Corrective Actions -- What Youre Going to Learn.mp4
    00:39
  • 08-02 - The Techniques of Recovery Validation and Corrective Actions -- Validation Patching.mp4
    02:19
  • 08-03 - The Techniques of Recovery Validation and Corrective Actions -- Validation Permissions.mp4
    01:10
  • 08-04 - The Techniques of Recovery Validation and Corrective Actions -- Validation Scanning.mp4
    00:56
  • 08-05 - The Techniques of Recovery Validation and Corrective Actions -- Validation Logging.mp4
    00:56
  • 08-06 - The Techniques of Recovery Validation and Corrective Actions -- Corrective Actions What Did You Learn.mp4
    02:31
  • 08-07 - The Techniques of Recovery Validation and Corrective Actions -- Corrective Actions Change Control.mp4
    00:58
  • 08-08 - The Techniques of Recovery Validation and Corrective Actions -- Corrective Actions Update the Plan.mp4
    00:34
  • 08-09 - The Techniques of Recovery Validation and Corrective Actions -- What Did You Learn.mp4
    01:45
  • 09-01 - Thats a Wrap -- What Youre Going to Learn.mp4
    00:32
  • 09-02 - Thats a Wrap -- Why Crimes Go Unreported.mp4
    03:21
  • 09-03 - Thats a Wrap -- Who Do I Tell.mp4
    04:37
  • 09-04 - Thats a Wrap -- The Report.mp4
    04:22
  • 09-05 - Thats a Wrap -- What You Learned - Course Summary.mp4
    02:04
  • 01-01 - Course Overview -- Course Overview.mp4
    02:52
  • 02-01 - Whats the Software Development Life Cycle (SDLC) -- Course Introduction.mp4
    06:28
  • 02-02 - Whats the Software Development Life Cycle (SDLC) -- Whats the Problem.mp4
    06:03
  • 02-03 - Whats the Software Development Life Cycle (SDLC) -- Do You Really Need a SDLC.mp4
    05:20
  • 02-04 - Whats the Software Development Life Cycle (SDLC) -- Summary.mp4
    01:09
  • 03-01 - Software Development Phases -- Introduction.mp4
    01:30
  • 03-02 - Software Development Phases -- Planning Phase.mp4
    01:42
  • 03-03 - Software Development Phases -- Requirement Phase.mp4
    02:25
  • 03-04 - Software Development Phases -- Design Phase.mp4
    03:23
  • 03-05 - Software Development Phases -- Implementation Phase.mp4
    01:25
  • 03-06 - Software Development Phases -- Testing Phase.mp4
    01:18
  • 03-07 - Software Development Phases -- Deployment Phase.mp4
    02:30
  • 03-08 - Software Development Phases -- Maintenance Phase.mp4
    01:03
  • 03-09 - Software Development Phases -- End-of-Life Phase.mp4
    01:53
  • 03-10 - Software Development Phases -- Summary.mp4
    02:02
  • 04-01 - Software Development Models -- Introduction.mp4
    01:26
  • 04-02 - Software Development Models -- Code-and-Fix.mp4
    01:55
  • 04-03 - Software Development Models -- Waterfall.mp4
    02:30
  • 04-04 - Software Development Models -- Agile.mp4
    06:47
  • 04-05 - Software Development Models -- Iterative.mp4
    02:57
  • 04-06 - Software Development Models -- Spiral.mp4
    02:40
  • 04-07 - Software Development Models -- Summary.mp4
    01:09
  • 05-01 - Software Vulnerabilities -- Introduction.mp4
    01:23
  • 05-02 - Software Vulnerabilities -- How Does It Happen.mp4
    06:02
  • 05-03 - Software Vulnerabilities -- Input Validation.mp4
    01:18
  • 05-04 - Software Vulnerabilities -- Buffer Overflow.mp4
    02:26
  • 05-05 - Software Vulnerabilities -- Command Injection.mp4
    01:39
  • 05-06 - Software Vulnerabilities -- Summary.mp4
    01:03
  • 06-01 - Coding Best Practices -- Introduction to Coding Best Practices.mp4
    01:43
  • 06-02 - Coding Best Practices -- Whats the Goal Here.mp4
    01:50
  • 06-03 - Coding Best Practices -- Input Validation.mp4
    02:41
  • 06-04 - Coding Best Practices -- Output Encoding.mp4
    01:10
  • 06-05 - Coding Best Practices -- Authentication & Password Management.mp4
    09:56
  • 06-06 - Coding Best Practices -- Session Management.mp4
    03:42
  • 06-07 - Coding Best Practices -- Access Control.mp4
    04:19
  • 06-08 - Coding Best Practices -- Cryptographic Practices.mp4
    01:29
  • 06-09 - Coding Best Practices -- Error Handling & Logging.mp4
    03:01
  • 06-10 - Coding Best Practices -- Data Protection.mp4
    02:37
  • 06-11 - Coding Best Practices -- Communication Security.mp4
    01:38
  • 06-12 - Coding Best Practices -- System Configuration.mp4
    03:37
  • 06-13 - Coding Best Practices -- Database Security.mp4
    03:32
  • 06-14 - Coding Best Practices -- File Management.mp4
    02:31
  • 06-15 - Coding Best Practices -- Memory Management.mp4
    01:36
  • 06-16 - Coding Best Practices -- General Coding Practices.mp4
    02:43
  • 06-17 - Coding Best Practices -- Summary.mp4
    01:04
  • 07-01 - Code Reviews -- Introduction to Coding Review.mp4
    01:17
  • 07-02 - Code Reviews -- Why a Code Review.mp4
    03:30
  • 07-03 - Code Reviews -- Types of Reviews.mp4
    07:29
  • 07-04 - Code Reviews -- Incorporate These 3 Outlines.mp4
    01:42
  • 07-05 - Code Reviews -- Some Common Sense Tips.mp4
    04:21
  • 07-06 - Code Reviews -- Summary.mp4
    01:04
  • 08-01 - Security Testing in Action -- Introduction.mp4
    03:56
  • 08-02 - Security Testing in Action -- Intercept Proxies.mp4
    01:18
  • 08-03 - Security Testing in Action -- DEMO Create a Hackable Web Server.mp4
    14:47
  • 08-04 - Security Testing in Action -- DEMO Burp Suite.mp4
    08:25
  • 08-05 - Security Testing in Action -- DEMO OWASP ZAP.mp4
    06:53
  • 08-06 - Security Testing in Action -- Web Application Firewalls.mp4
    01:48
  • 08-07 - Security Testing in Action -- DEMO Nikto.mp4
    05:46
  • 08-08 - Security Testing in Action -- Source Authenticity.mp4
    03:03
  • 08-09 - Security Testing in Action -- Reverse Engineering.mp4
    03:13
  • 08-10 - Security Testing in Action -- ModuleCourse Summary.mp4
    02:22
  • 01-01 - Course Overview -- Course Overview.mp4
    02:31
  • 02-01 - Its All About Control -- Series Intro-Overview.mp4
    05:26
  • 02-02 - Its All About Control -- What Is IAM.mp4
    03:15
  • 02-03 - Its All About Control -- Authentication.mp4
    01:49
  • 02-04 - Its All About Control -- Two-factor Authentication.mp4
    02:57
  • 02-05 - Its All About Control -- Authorization.mp4
    01:37
  • 02-06 - Its All About Control -- Role Based IDs.mp4
    02:09
  • 02-07 - Its All About Control -- Directories.mp4
    01:41
  • 02-08 - Its All About Control -- SSO.mp4
    02:03
  • 02-09 - Its All About Control -- IAMs Lifecycle.mp4
    01:21
  • 02-10 - Its All About Control -- Summary.mp4
    01:35
  • 03-01 - Managing Your Secret Identity -- Overview of Your IDs.mp4
    00:36
  • 03-02 - Managing Your Secret Identity -- Digital IDs.mp4
    04:39
  • 03-03 - Managing Your Secret Identity -- Endpoints & Servers.mp4
    04:18
  • 03-04 - Managing Your Secret Identity -- Services & Applications.mp4
    04:48
  • 03-05 - Managing Your Secret Identity -- Summary.mp4
    00:56
  • 04-01 - Other Authentication Methods -- Overview of Other Methods.mp4
    01:18
  • 04-02 - Other Authentication Methods -- The Two Classes.mp4
    02:58
  • 04-03 - Other Authentication Methods -- RADIUS & TRACACS+.mp4
    05:51
  • 04-04 - Other Authentication Methods -- Context-based Authentication.mp4
    04:53
  • 04-05 - Other Authentication Methods -- SSO & Federations.mp4
    06:14
  • 04-06 - Other Authentication Methods -- Self-service Password Reset.mp4
    04:28
  • 04-07 - Other Authentication Methods -- Summary.mp4
    01:04
  • 05-01 - Identity Repositories -- Module Overview.mp4
    00:50
  • 05-02 - Identity Repositories -- The Six Areas.mp4
    03:15
  • 05-03 - Identity Repositories -- Going After LDAP.mp4
    02:47
  • 05-04 - Identity Repositories -- Going After OauthOpenID.mp4
    02:47
  • 05-05 - Identity Repositories -- Going After Kerberos.mp4
    01:46
  • 05-06 - Identity Repositories -- Going After RADIUS.mp4
    01:44
  • 05-07 - Identity Repositories -- Going After Active Directory.mp4
    02:59
  • 05-08 - Identity Repositories -- Stopping Common Exploits.mp4
    06:08
  • 05-09 - Identity Repositories -- Summary.mp4
    02:22
  • 06-01 - Building the Lab -- Module Overview.mp4
    01:33
  • 06-02 - Building the Lab -- Preparing the AutoLab.mp4
    05:56
  • 06-03 - Building the Lab -- Installing the AutoLab.mp4
    08:56
  • 06-04 - Building the Lab -- Deploying the AutoLab.mp4
    03:32
  • 06-05 - Building the Lab -- Lab Structure & New PowerShell Cmdlets.mp4
    04:22
  • 06-06 - Building the Lab -- Post Installation Steps.mp4
    05:00
  • 06-07 - Building the Lab -- More OSs Kali Linux.mp4
    11:47
  • 06-08 - Building the Lab -- Summary.mp4
    01:44
  • 07-01 - Lets Look at the Exploits -- Module Overview.mp4
    00:50
  • 07-02 - Lets Look at the Exploits -- DNS Spoofing.mp4
    02:27
  • 07-03 - Lets Look at the Exploits -- Demo DNS Spoofing.mp4
    10:42
  • 07-04 - Lets Look at the Exploits -- Session Hijacking.mp4
    00:57
  • 07-05 - Lets Look at the Exploits -- Demo Session Hijacking.mp4
    03:35
  • 07-06 - Lets Look at the Exploits -- Man-in-the-middle.mp4
    01:19
  • 07-07 - Lets Look at the Exploits -- Demo Man-in-the-middle Attack.mp4
    12:38
  • 07-08 - Lets Look at the Exploits -- Privilege Escalation.mp4
    01:26
  • 07-09 - Lets Look at the Exploits -- Demo Privilege Escalation.mp4
    02:56
  • 07-10 - Lets Look at the Exploits -- Module & Course Summary.mp4
    02:32
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 504
    • duration 28:13:25
    • Release Date 2023/04/06