CySA+ (CompTIA Cybersecurity Analyst) CS0-001
Focused View
28:13:25
79 View
01-01 - Course Overview -- Course Overview.mp4
02:16
02-01 - Security Data Analytics Whats Going On -- Series Introductionoverview.mp4
06:13
02-02 - Security Data Analytics Whats Going On -- Module Overview.mp4
01:05
02-03 - Security Data Analytics Whats Going On -- Teaching an Old Dog New Tricks.mp4
10:17
02-04 - Security Data Analytics Whats Going On -- Trend Analysis.mp4
07:48
02-05 - Security Data Analytics Whats Going On -- Data Aggregation and Correlation.mp4
03:17
02-06 - Security Data Analytics Whats Going On -- Historical Analysis.mp4
05:15
02-07 - Security Data Analytics Whats Going On -- Summary.mp4
01:29
03-01 - Defense in Depth This Is Where It Begins -- Introduction and Overview.mp4
01:00
03-02 - Defense in Depth This Is Where It Begins -- What Is Defense in Depth.mp4
06:31
03-03 - Defense in Depth This Is Where It Begins -- Level 1 Personnel.mp4
04:48
03-04 - Defense in Depth This Is Where It Begins -- Level 2 Processes.mp4
02:25
03-05 - Defense in Depth This Is Where It Begins -- Level 3 Technologies.mp4
02:26
03-06 - Defense in Depth This Is Where It Begins -- Level 4 The Network.mp4
01:30
03-07 - Defense in Depth This Is Where It Begins -- Summary.mp4
02:03
04-01 - Defense in Depth What Tools Can You Use -- Introduction and Overview.mp4
01:28
04-02 - Defense in Depth What Tools Can You Use -- Lets Break It Down!.mp4
05:20
04-03 - Defense in Depth What Tools Can You Use -- IPSHIPS.mp4
07:24
04-04 - Defense in Depth What Tools Can You Use -- Firewalls Softwarehardware.mp4
03:03
04-05 - Defense in Depth What Tools Can You Use -- Anti-virusanti-malware.mp4
01:32
04-06 - Defense in Depth What Tools Can You Use -- EMET.mp4
03:52
04-07 - Defense in Depth What Tools Can You Use -- Web Proxies & WAFs.mp4
05:00
04-08 - Defense in Depth What Tools Can You Use -- A New Hope.mp4
04:11
04-09 - Defense in Depth What Tools Can You Use -- Summary.mp4
01:56
05-01 - Defense in Depth Drill, Test, Rinse, Repeat -- Introduction and Overview.mp4
00:51
05-02 - Defense in Depth Drill, Test, Rinse, Repeat -- Why Penetration Tests.mp4
05:07
05-03 - Defense in Depth Drill, Test, Rinse, Repeat -- Rules Are Rules.mp4
07:57
05-04 - Defense in Depth Drill, Test, Rinse, Repeat -- Reverse Engineering.mp4
03:31
05-05 - Defense in Depth Drill, Test, Rinse, Repeat -- Teams Involved.mp4
03:24
05-06 - Defense in Depth Drill, Test, Rinse, Repeat -- Risk Evaluation.mp4
06:10
05-07 - Defense in Depth Drill, Test, Rinse, Repeat -- Summary.mp4
01:40
06-01 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Introduction and Overview.mp4
00:51
06-02 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Frameworks.mp4
06:52
06-03 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Policies.mp4
10:57
06-04 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Controls.mp4
05:03
06-05 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Procedures.mp4
05:38
06-06 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Quality Controls & Verification.mp4
06:17
06-07 - The Fundamentals of Frameworks, Policies, Controls, & Procedures -- Module & Course Summary.mp4
01:19
01-01 - Course Overview -- Course Overview.mp4
02:38
02-01 - What Do You Need to Start -- Introduction.mp4
06:25
02-02 - What Do You Need to Start -- Benefits of a Vulnerability Management Program.mp4
07:03
02-03 - What Do You Need to Start -- Regulatory Environments.mp4
05:11
02-04 - What Do You Need to Start -- Corporate Policies.mp4
01:54
02-05 - What Do You Need to Start -- Dales Top 10 Prechecks.mp4
08:22
02-06 - What Do You Need to Start -- Demo Adding OpenVAS Virtual Appliance.mp4
17:44
02-07 - What Do You Need to Start -- Demo Adding OpenVAS to Kali Linux.mp4
08:33
02-08 - What Do You Need to Start -- Summary.mp4
00:53
03-01 - Shaping and Implementing Your Vulnerability Scans -- What Gets Covered.mp4
01:53
03-02 - Shaping and Implementing Your Vulnerability Scans -- ID Targets for Your Scan.mp4
01:14
03-03 - Shaping and Implementing Your Vulnerability Scans -- Demo Scanning a Target.mp4
04:48
03-04 - Shaping and Implementing Your Vulnerability Scans -- Define Scan Frequency.mp4
03:55
03-05 - Shaping and Implementing Your Vulnerability Scans -- The Scopes.mp4
01:27
03-06 - Shaping and Implementing Your Vulnerability Scans -- Configurations.mp4
04:14
03-07 - Shaping and Implementing Your Vulnerability Scans -- Scanner Maintenance.mp4
01:27
03-08 - Shaping and Implementing Your Vulnerability Scans -- Classifying Data.mp4
03:50
03-09 - Shaping and Implementing Your Vulnerability Scans -- Ongoing Scanning and Continuous Monitoring.mp4
01:26
03-10 - Shaping and Implementing Your Vulnerability Scans -- Summary.mp4
01:31
04-01 - The Scanners -- What Gets Covered.mp4
01:02
04-02 - The Scanners -- Understanding Which Scanner to Use.mp4
03:11
04-03 - The Scanners -- Open-source vs. Commercial.mp4
01:11
04-04 - The Scanners -- Demo Nessus.mp4
18:26
04-05 - The Scanners -- On-premises vs. Cloud.mp4
03:01
04-06 - The Scanners -- A Quick Understanding of Nexpose.mp4
02:11
04-07 - The Scanners -- The Microsoft World.mp4
04:50
04-08 - The Scanners -- SCAP.mp4
03:42
04-09 - The Scanners -- Exploit Scanners.mp4
02:46
04-10 - The Scanners -- Summary.mp4
00:51
05-01 - Analyzing Vulnerability Scans -- What Gets Covered.mp4
00:57
05-02 - Analyzing Vulnerability Scans -- The Tricks to Interpreting Reports.mp4
03:12
05-03 - Analyzing Vulnerability Scans -- CVSS The Standard.mp4
07:54
05-04 - Analyzing Vulnerability Scans -- False Positives and Exceptions.mp4
02:07
05-05 - Analyzing Vulnerability Scans -- Trends.mp4
06:39
05-06 - Analyzing Vulnerability Scans -- Summary.mp4
00:57
06-01 - Remediation and Change Control -- What Gets Covered.mp4
00:56
06-02 - Remediation and Change Control -- The Remediation Workflow.mp4
03:16
06-03 - Remediation and Change Control -- Communication and Change Control.mp4
04:40
06-04 - Remediation and Change Control -- Inhibitors to Remediation.mp4
04:10
06-05 - Remediation and Change Control -- Summary.mp4
00:43
07-01 - Remediating Host Vulnerabilities -- What Gets Covered.mp4
00:39
07-02 - Remediating Host Vulnerabilities -- Servers.mp4
02:00
07-03 - Remediating Host Vulnerabilities -- Endpoints.mp4
01:20
07-04 - Remediating Host Vulnerabilities -- ICS and SCADA.mp4
04:22
07-05 - Remediating Host Vulnerabilities -- Summary.mp4
01:34
08-01 - Remediating Network Vulnerabilities -- What Gets Covered.mp4
01:16
08-02 - Remediating Network Vulnerabilities -- Updates.mp4
02:00
08-03 - Remediating Network Vulnerabilities -- SSL and TLS.mp4
05:04
08-04 - Remediating Network Vulnerabilities -- DNS.mp4
01:41
08-05 - Remediating Network Vulnerabilities -- Internal IP Exposure.mp4
01:35
08-06 - Remediating Network Vulnerabilities -- VPN.mp4
02:00
08-07 - Remediating Network Vulnerabilities -- Summary.mp4
01:13
09-01 - Remediating Virtual Environments Vulnerabilities -- What Gets Covered.mp4
01:19
09-02 - Remediating Virtual Environments Vulnerabilities -- Just a Quick Review of Virtualization.mp4
02:03
09-03 - Remediating Virtual Environments Vulnerabilities -- Administration Interface Access.mp4
01:36
09-04 - Remediating Virtual Environments Vulnerabilities -- Virtual Host Patching.mp4
01:47
09-05 - Remediating Virtual Environments Vulnerabilities -- Virtual Guest Concerns.mp4
01:24
09-06 - Remediating Virtual Environments Vulnerabilities -- Virtual Network Concerns.mp4
01:43
09-07 - Remediating Virtual Environments Vulnerabilities -- VM Escape.mp4
01:38
09-08 - Remediating Virtual Environments Vulnerabilities -- Summary and Course Wrap Up.mp4
02:01
01-01 - Course Overview -- Course Overview.mp4
03:30
02-01 - Preparing for Incident Response and Handling -- Course Introduction.mp4
06:42
02-02 - Preparing for Incident Response and Handling -- Security Policies and Their Goals.mp4
07:12
02-03 - Preparing for Incident Response and Handling -- Characteristics and Implementation.mp4
04:13
02-04 - Preparing for Incident Response and Handling -- Access Control Policy.mp4
01:56
02-05 - Preparing for Incident Response and Handling -- Acceptable Use Policy.mp4
01:40
02-06 - Preparing for Incident Response and Handling -- Administrative Security Policy.mp4
02:29
02-07 - Preparing for Incident Response and Handling -- Asset Control Policy.mp4
02:03
02-08 - Preparing for Incident Response and Handling -- Audit Trail Policy.mp4
02:08
02-09 - Preparing for Incident Response and Handling -- Logging Policy.mp4
01:56
02-10 - Preparing for Incident Response and Handling -- Documentation Policy.mp4
02:36
02-11 - Preparing for Incident Response and Handling -- Evidence Collection Policy.mp4
02:01
02-12 - Preparing for Incident Response and Handling -- Evidence Preservation Policy.mp4
02:13
02-13 - Preparing for Incident Response and Handling -- Information Security Policy.mp4
01:34
02-14 - Preparing for Incident Response and Handling -- NIACAP, IA, and CA Policy.mp4
01:14
02-15 - Preparing for Incident Response and Handling -- Physical Security Policy.mp4
02:00
02-16 - Preparing for Incident Response and Handling -- Physical Security Guidelines.mp4
01:22
02-17 - Preparing for Incident Response and Handling -- The Law in a Digital World.mp4
04:07
02-18 - Preparing for Incident Response and Handling -- Summary.mp4
01:32
03-01 - Incident Response Processes -- What Were Going to Learn.mp4
00:58
03-02 - Incident Response Processes -- What Is a Computer Security Incident.mp4
03:23
03-03 - Incident Response Processes -- How Do We Identify an Incident.mp4
03:44
03-04 - Incident Response Processes -- How Do We Handle an Incident.mp4
01:29
03-05 - Incident Response Processes -- So Whats the Goal.mp4
02:12
03-06 - Incident Response Processes -- Whats the Plan.mp4
02:56
03-07 - Incident Response Processes -- Information Warefare.mp4
03:59
03-08 - Incident Response Processes -- Vulnerability, Attacks, and Threats.mp4
05:54
03-09 - Incident Response Processes -- Signs of an Incident.mp4
09:47
03-10 - Incident Response Processes -- How Do We Respond.mp4
04:05
03-11 - Incident Response Processes -- The Team.mp4
03:31
03-12 - Incident Response Processes -- What Did We Learn.mp4
01:16
04-01 - The Workflow of Incident Response -- Understanding the Workflow.mp4
03:08
04-02 - The Workflow of Incident Response -- Identification.mp4
04:46
04-03 - The Workflow of Incident Response -- Incident Recording.mp4
01:04
04-04 - The Workflow of Incident Response -- Initial Response.mp4
01:59
04-05 - The Workflow of Incident Response -- Communicating the Incident.mp4
01:09
04-06 - The Workflow of Incident Response -- Containment.mp4
02:56
04-07 - The Workflow of Incident Response -- Formulating a Response Strategy.mp4
02:49
04-08 - The Workflow of Incident Response -- Incident Classification.mp4
01:46
04-09 - The Workflow of Incident Response -- Incident Investigation.mp4
01:18
04-10 - The Workflow of Incident Response -- Data Collection.mp4
01:40
04-11 - The Workflow of Incident Response -- Forensic Analysis.mp4
02:07
04-12 - The Workflow of Incident Response -- Evidence Protection.mp4
02:22
04-13 - The Workflow of Incident Response -- Notifying External Agencies.mp4
00:53
04-14 - The Workflow of Incident Response -- Eradication.mp4
05:42
04-15 - The Workflow of Incident Response -- System Recovery.mp4
01:43
04-16 - The Workflow of Incident Response -- Incident Documentation.mp4
01:42
04-17 - The Workflow of Incident Response -- Incident Damage and Cost Assessment.mp4
01:48
04-18 - The Workflow of Incident Response -- Review and Update the Response Policies.mp4
01:17
04-19 - The Workflow of Incident Response -- What Did We Learn.mp4
00:35
05-01 - Networks and Host Attacks -- What Were Going to Learn.mp4
00:38
05-02 - Networks and Host Attacks -- Denial of Service Handling.mp4
04:31
05-03 - Networks and Host Attacks -- Denial of Service Detection.mp4
05:21
05-04 - Networks and Host Attacks -- Denial of Service Handling.mp4
02:40
05-05 - Networks and Host Attacks -- Denial of Service Responding.mp4
02:20
05-06 - Networks and Host Attacks -- Denial of Service Prevention.mp4
02:21
05-07 - Networks and Host Attacks -- Denial of Service Containment.mp4
02:41
05-08 - Networks and Host Attacks -- Denial of Service Best Practices.mp4
01:24
05-09 - Networks and Host Attacks -- Unauthorized Access Handling.mp4
06:45
05-10 - Networks and Host Attacks -- Unauthorized Access Signs of a Root Compromise.mp4
04:17
05-11 - Networks and Host Attacks -- Unauthorized Access Hardware.mp4
02:21
05-12 - Networks and Host Attacks -- Unauthorized Access Responding.mp4
01:31
05-13 - Networks and Host Attacks -- Unauthorized Access Prevention.mp4
04:25
05-14 - Networks and Host Attacks -- Unauthorized Access Responding.mp4
01:44
05-15 - Networks and Host Attacks -- Unauthorized Access Eradicate and Recovery.mp4
01:20
05-16 - Networks and Host Attacks -- Unauthorized Access Best Practices.mp4
02:32
05-17 - Networks and Host Attacks -- Inappropriate Usage Detecting.mp4
03:42
05-18 - Networks and Host Attacks -- Inappropriate Usage Prevention.mp4
02:45
05-19 - Networks and Host Attacks -- Inappropriate Usage Containment.mp4
01:19
05-20 - Networks and Host Attacks -- Multiple Components Issues Handling.mp4
01:51
05-21 - Networks and Host Attacks -- Multiple Components Issues Responding.mp4
01:04
05-22 - Networks and Host Attacks -- What Did We Learn.mp4
01:29
06-01 - Service and Application Attacks -- What Were Going to Learn.mp4
00:58
06-02 - Service and Application Attacks -- Service and Application Monitoring.mp4
01:52
06-03 - Service and Application Attacks -- Some Symptoms Services.mp4
02:09
06-04 - Service and Application Attacks -- Demo Checking Services.mp4
08:20
06-05 - Service and Application Attacks -- Demo Application Error Monitoring.mp4
04:17
06-06 - Service and Application Attacks -- Analysis Applications.mp4
01:20
06-07 - Service and Application Attacks -- Service and Application Response and Restore.mp4
01:47
06-08 - Service and Application Attacks -- Detecting the Attacks Applications.mp4
04:06
06-09 - Service and Application Attacks -- Types of Attacks Session Hijacking.mp4
01:31
06-10 - Service and Application Attacks -- Demo Session Hijack.mp4
03:30
06-11 - Service and Application Attacks -- Symptoms Session Hijacking.mp4
04:23
06-12 - Service and Application Attacks -- Defense Session Hijacking.mp4
02:32
06-13 - Service and Application Attacks -- When It Happens Session Hijacking.mp4
01:10
06-14 - Service and Application Attacks -- Types of Attacks Command Injection.mp4
05:34
06-15 - Service and Application Attacks -- Defense SQL Injections.mp4
02:51
06-16 - Service and Application Attacks -- When It Happens SQL Injection.mp4
02:23
06-17 - Service and Application Attacks -- Types of Attacks XSS Attacks.mp4
01:08
06-18 - Service and Application Attacks -- What Attackers Are Looking For XSS Attacks.mp4
02:49
06-19 - Service and Application Attacks -- Types of XSS Attacks.mp4
01:46
06-20 - Service and Application Attacks -- Tools XSS Attacks.mp4
01:09
06-21 - Service and Application Attacks -- Defense XSS Attacks.mp4
02:43
06-22 - Service and Application Attacks -- When It Happens XSS Attacks.mp4
01:03
06-23 - Service and Application Attacks -- Types of Attacks Buffer Overflow.mp4
02:29
06-24 - Service and Application Attacks -- Types of Buffer Overflows.mp4
01:10
06-25 - Service and Application Attacks -- Tools Buffer Overflows.mp4
01:59
06-26 - Service and Application Attacks -- Defense Buffer Overflows.mp4
02:42
06-27 - Service and Application Attacks -- When It Happens Buffer Overflows.mp4
01:07
06-28 - Service and Application Attacks -- What Did We Learn.mp4
01:19
07-01 - Malicious Code and Insider Threats -- What Were Going to Learn.mp4
01:13
07-02 - Malicious Code and Insider Threats -- Malicious Code Virus and Worms.mp4
02:19
07-03 - Malicious Code and Insider Threats -- Malicious Code Trojans and Spyware.mp4
02:35
07-04 - Malicious Code and Insider Threats -- Malicious Code What to Do.mp4
04:00
07-05 - Malicious Code and Insider Threats -- Malicious Code What Are the Signs.mp4
02:02
07-06 - Malicious Code and Insider Threats -- Malicious Code Containment.mp4
03:10
07-07 - Malicious Code and Insider Threats -- Malicious Code Gather Evidence.mp4
01:48
07-08 - Malicious Code and Insider Threats -- Malicious Code Bots and Botnets.mp4
02:37
07-09 - Malicious Code and Insider Threats -- Malicious Code How Bots and Botnets Work.mp4
05:11
07-10 - Malicious Code and Insider Threats -- Incident Response Handling Performing.mp4
02:18
07-11 - Malicious Code and Insider Threats -- Malicious Code Rootkits in Windows.mp4
02:54
07-12 - Malicious Code and Insider Threats -- Malicious Code Rootkits - Kernel Mode.mp4
01:06
07-13 - Malicious Code and Insider Threats -- When It Happens Rootkits.mp4
01:59
07-14 - Malicious Code and Insider Threats -- Prevention Rootkits.mp4
03:22
07-15 - Malicious Code and Insider Threats -- Insider Threats The Landscape.mp4
01:42
07-16 - Malicious Code and Insider Threats -- Insider Threats The Workflow.mp4
01:12
07-17 - Malicious Code and Insider Threats -- Insider Threats Detection and Response.mp4
02:55
07-18 - Malicious Code and Insider Threats -- Insider Threats Prevention - Network Level.mp4
01:30
07-19 - Malicious Code and Insider Threats -- Insider Threats Prevention - Access Control.mp4
01:31
07-20 - Malicious Code and Insider Threats -- Insider Threats Prevention - Awareness Program.mp4
01:42
07-21 - Malicious Code and Insider Threats -- Insider Threats Prevention - Admins and Privileged Users.mp4
02:47
07-22 - Malicious Code and Insider Threats -- Insider Threats Prevention - Backups.mp4
01:33
07-23 - Malicious Code and Insider Threats -- What Did We Learn.mp4
01:22
01-01 - Course Overview -- Course Overview.mp4
02:15
02-01 - The Two Steps -- Introduction.mp4
07:15
02-02 - The Two Steps -- Lets Talk About Reconnaissance.mp4
05:20
02-03 - The Two Steps -- Whats Your Goal Here.mp4
02:39
02-04 - The Two Steps -- What Youll Learn and Why.mp4
04:05
02-05 - The Two Steps -- Lets Talk About Some Stipulations.mp4
04:35
02-06 - The Two Steps -- The Trends Today.mp4
08:51
02-07 - The Two Steps -- Summary.mp4
02:37
03-01 - Initially What Do You Look For -- Initially What Do You Look For.mp4
01:56
03-02 - Initially What Do You Look For -- Using Search Engines.mp4
04:31
03-03 - Initially What Do You Look For -- Using Websites.mp4
11:07
03-04 - Initially What Do You Look For -- Using Whois.mp4
08:31
03-05 - Initially What Do You Look For -- Using PING & DNS.mp4
04:59
03-06 - Initially What Do You Look For -- Continuing to Use DNS.mp4
06:23
03-07 - Initially What Do You Look For -- Some Advanced DNS Tricks.mp4
05:55
03-08 - Initially What Do You Look For -- Summary.mp4
01:19
04-01 - The More You Look, the More You Find -- Introduction and Overview.mp4
03:04
04-02 - The More You Look, the More You Find -- Job Sites.mp4
05:43
04-03 - The More You Look, the More You Find -- Using Resume Sites.mp4
04:18
04-04 - The More You Look, the More You Find -- More Job Sites.mp4
02:10
04-05 - The More You Look, the More You Find -- Using Netcraft.mp4
05:06
04-06 - The More You Look, the More You Find -- The Sweet of Suite Maltego.mp4
03:02
04-07 - The More You Look, the More You Find -- Demo Maltego.mp4
07:19
04-08 - The More You Look, the More You Find -- Maltego Were Does It All Come From.mp4
02:13
04-09 - The More You Look, the More You Find -- The Wayback Machine.mp4
05:40
04-10 - The More You Look, the More You Find -- Summary.mp4
02:13
05-01 - Other Reconnaissance Techniques -- Other Reconnaissance Techniques.mp4
02:14
05-02 - Other Reconnaissance Techniques -- Social Sources.mp4
03:33
05-03 - Other Reconnaissance Techniques -- Company What Can Be Learned.mp4
04:56
05-04 - Other Reconnaissance Techniques -- Facebook.mp4
07:20
05-05 - Other Reconnaissance Techniques -- LinkedIn.mp4
03:51
05-06 - Other Reconnaissance Techniques -- Financial & Competitive Analysis Data.mp4
03:32
05-07 - Other Reconnaissance Techniques -- Using Communications to Recon.mp4
05:01
05-08 - Other Reconnaissance Techniques -- Youve Got Mail Equals Ive Got You!.mp4
05:08
05-09 - Other Reconnaissance Techniques -- Summary.mp4
02:51
06-01 - Reconnaissance via Google Hacking -- Reconnaissance via Google Hacking.mp4
01:52
06-02 - Reconnaissance via Google Hacking -- Understanding Google.mp4
02:51
06-03 - Reconnaissance via Google Hacking -- The Google Operators.mp4
04:35
06-04 - Reconnaissance via Google Hacking -- Advanced Google Operators.mp4
05:27
06-05 - Reconnaissance via Google Hacking -- Using the Operators.mp4
05:19
06-06 - Reconnaissance via Google Hacking -- Using More Advanced Operators.mp4
06:03
06-07 - Reconnaissance via Google Hacking -- Applying What You Now Know.mp4
04:55
06-08 - Reconnaissance via Google Hacking -- The Google Hacking Database.mp4
05:13
06-09 - Reconnaissance via Google Hacking -- Other Google Hacking Tools.mp4
02:41
06-10 - Reconnaissance via Google Hacking -- Summary.mp4
01:34
07-01 - Lets Not Forget PowerShell -- Introduction.mp4
01:02
07-02 - Lets Not Forget PowerShell -- Quick Overview of PowerShell.mp4
06:15
07-03 - Lets Not Forget PowerShell -- Why PowerShell.mp4
02:43
07-04 - Lets Not Forget PowerShell -- Some Basics.mp4
05:40
07-05 - Lets Not Forget PowerShell -- Demo Scanning.mp4
15:17
07-06 - Lets Not Forget PowerShell -- Demo Remoting.mp4
08:23
07-07 - Lets Not Forget PowerShell -- Demo Registry.mp4
05:51
07-08 - Lets Not Forget PowerShell -- Demo Oh, Theres More!.mp4
08:39
07-09 - Lets Not Forget PowerShell -- Summary.mp4
01:22
08-01 - Overview of Scanning -- Overview of Scanning.mp4
03:36
08-02 - Overview of Scanning -- What Is Scanning.mp4
02:18
08-03 - Overview of Scanning -- Types of Scanning.mp4
05:16
08-04 - Overview of Scanning -- Whats the Goal.mp4
04:14
08-05 - Overview of Scanning -- What Techniques Are Used.mp4
02:45
08-06 - Overview of Scanning -- What Tools Are Used.mp4
02:35
08-07 - Overview of Scanning -- Summary.mp4
02:02
09-01 - Understanding the 3-way Handshake -- Introduction.mp4
02:00
09-02 - Understanding the 3-way Handshake -- TCP Communications.mp4
04:06
09-03 - Understanding the 3-way Handshake -- UDP Communications.mp4
03:42
09-04 - Understanding the 3-way Handshake -- TCP Header Flags.mp4
03:44
09-05 - Understanding the 3-way Handshake -- Demo Watch The 3-way Handshake.mp4
04:41
09-06 - Understanding the 3-way Handshake -- What If....mp4
01:22
09-07 - Understanding the 3-way Handshake -- Summary.mp4
01:31
10-01 - Checking for Live Systems and Their Open Ports -- Checking for Live Systems and Their Ports.mp4
02:39
10-02 - Checking for Live Systems and Their Open Ports -- DEMO ICMP Sweeps with Angry IP and Nmap.mp4
09:32
10-03 - Checking for Live Systems and Their Open Ports -- DEMO Sweeping Without ICMP Using hping3.mp4
06:02
10-04 - Checking for Live Systems and Their Open Ports -- DEMO More hping3 Sweeps.mp4
03:34
10-05 - Checking for Live Systems and Their Open Ports -- Whats Firewalking.mp4
03:28
10-06 - Checking for Live Systems and Their Open Ports -- Looking at Firewalking Results.mp4
05:45
10-07 - Checking for Live Systems and Their Open Ports -- Summary.mp4
01:02
11-01 - Types of Scanning -- Types of Scanning.mp4
01:55
11-02 - Types of Scanning -- Full Scans.mp4
05:27
11-03 - Types of Scanning -- Half-open Scans.mp4
03:52
11-04 - Types of Scanning -- Xmas Scans.mp4
04:37
11-05 - Types of Scanning -- FIN Scans.mp4
03:05
11-06 - Types of Scanning -- NULL Scans.mp4
03:50
11-07 - Types of Scanning -- UDP Scans.mp4
02:53
11-08 - Types of Scanning -- Evading IDS Systems with Idle Scans.mp4
04:36
11-09 - Types of Scanning -- More IDS Evasion Methods.mp4
08:01
11-10 - Types of Scanning -- Countermeasures.mp4
03:45
11-11 - Types of Scanning -- Summary.mp4
02:15
12-01 - Banner Grabbing and OS Fingerprinting -- Banner Grabbing & OS Fingerprinting.mp4
01:33
12-02 - Banner Grabbing and OS Fingerprinting -- OS Fingerprinting.mp4
02:33
12-03 - Banner Grabbing and OS Fingerprinting -- DEMO Using Nmap to OS Fingerprint.mp4
14:17
12-04 - Banner Grabbing and OS Fingerprinting -- DEMO Banner Grabbing with TelNet & NetCat.mp4
08:04
12-05 - Banner Grabbing and OS Fingerprinting -- Countermeasures.mp4
02:26
12-06 - Banner Grabbing and OS Fingerprinting -- Summary.mp4
01:10
13-01 - More Tools for the Utility-belt -- Introduction.mp4
00:50
13-02 - More Tools for the Utility-belt -- War Dialing & Wireless Tools.mp4
05:08
13-03 - More Tools for the Utility-belt -- Frag-out!.mp4
02:17
13-04 - More Tools for the Utility-belt -- Web Scanners.mp4
06:18
13-05 - More Tools for the Utility-belt -- Security OnionBro.mp4
02:35
13-06 - More Tools for the Utility-belt -- Summary.mp4
00:59
14-01 - Threats from Wireless -- Threats from Wireless.mp4
01:38
14-02 - Threats from Wireless -- Types of Attacks.mp4
07:28
14-03 - Threats from Wireless -- Attack on the AP.mp4
05:29
14-04 - Threats from Wireless -- Attack on the Client.mp4
02:43
14-05 - Threats from Wireless -- Summary.mp4
01:03
01-01 - Course Overview -- Course Overview.mp4
02:43
02-01 - Your Objectives Here -- What Youre Going to Learn.mp4
04:39
02-02 - Your Objectives Here -- Lets Define Computer Forensics.mp4
05:30
02-03 - Your Objectives Here -- The Objectives of Forensic Analysis.mp4
03:06
02-04 - Your Objectives Here -- Forensic Readiness.mp4
02:55
02-05 - Your Objectives Here -- Types of Forensics.mp4
04:07
02-06 - Your Objectives Here -- The Whos-who of Forensics.mp4
04:55
02-07 - Your Objectives Here -- The Forensic Process.mp4
03:52
02-08 - Your Objectives Here -- Where Do You Find Evidence.mp4
03:17
02-09 - Your Objectives Here -- How to Collect Electronic Evidence.mp4
05:03
02-10 - Your Objectives Here -- Even MORE Forensics.mp4
03:13
02-11 - Your Objectives Here -- What You Learned.mp4
01:29
03-01 - What Should Be in Your Jump-bag -- What Youre Going to Learn.mp4
00:55
03-02 - What Should Be in Your Jump-bag -- The Jump-bag.mp4
02:11
03-03 - What Should Be in Your Jump-bag -- Storage Items.mp4
06:29
03-04 - What Should Be in Your Jump-bag -- Wireless Items.mp4
03:44
03-05 - What Should Be in Your Jump-bag -- Network Items.mp4
03:17
03-06 - What Should Be in Your Jump-bag -- Real Tools.mp4
01:55
03-07 - What Should Be in Your Jump-bag -- Digital Workstation.mp4
01:56
03-08 - What Should Be in Your Jump-bag -- Miscellaneous Tools.mp4
03:18
03-09 - What Should Be in Your Jump-bag -- Other Items.mp4
03:18
03-10 - What Should Be in Your Jump-bag -- What You Learned, Plus Snacks.mp4
01:38
04-01 - What About the Digital Jump-bag -- What About the Digital Jump-bag.mp4
00:56
04-02 - What About the Digital Jump-bag -- Digital or Physical Items.mp4
05:10
04-03 - What About the Digital Jump-bag -- Digital Forensic Crime Scenes.mp4
02:30
04-04 - What About the Digital Jump-bag -- Types of Forensic Software.mp4
03:54
04-05 - What About the Digital Jump-bag -- Suite Tools, Man.mp4
17:02
04-06 - What About the Digital Jump-bag -- Hashing.mp4
03:09
04-07 - What About the Digital Jump-bag -- Password Cracking.mp4
05:01
04-08 - What About the Digital Jump-bag -- Imaging.mp4
06:55
04-09 - What About the Digital Jump-bag -- What Did We Learn.mp4
01:02
05-01 - Understanding the Incident Recovery Process -- What Were Going to Learn.mp4
01:12
05-02 - Understanding the Incident Recovery Process -- What Incident Recovery Means.mp4
01:48
05-03 - Understanding the Incident Recovery Process -- The Principles of IR.mp4
04:39
05-04 - Understanding the Incident Recovery Process -- Steps of IR.mp4
02:27
05-05 - Understanding the Incident Recovery Process -- Whats the Plan.mp4
03:52
05-06 - Understanding the Incident Recovery Process -- Contingency Components.mp4
01:15
05-07 - Understanding the Incident Recovery Process -- Continuity Planning.mp4
06:03
05-08 - Understanding the Incident Recovery Process -- The IR Planning Team.mp4
02:07
05-09 - Understanding the Incident Recovery Process -- Impact Analysis.mp4
01:31
05-10 - Understanding the Incident Recovery Process -- All Things IR.mp4
04:27
05-11 - Understanding the Incident Recovery Process -- Testing Your Plan.mp4
02:17
05-12 - Understanding the Incident Recovery Process -- What Did You Learn.mp4
01:25
06-01 - The Techniques of Recovery Containment -- What Were Going to Learn.mp4
00:37
06-02 - The Techniques of Recovery Containment -- Containing the Damage.mp4
02:33
06-03 - The Techniques of Recovery Containment -- Containing Damage Segmentation.mp4
01:24
06-04 - The Techniques of Recovery Containment -- Containing Damage Isolation.mp4
01:30
06-05 - The Techniques of Recovery Containment -- Containing Damage Removal.mp4
02:10
06-06 - The Techniques of Recovery Containment -- Containing Damage Reverse Engineering.mp4
02:12
06-07 - The Techniques of Recovery Containment -- What Did You Learn.mp4
01:17
07-01 - The Techniques of Recovery Eradication -- What Youre Going to Learn.mp4
00:40
07-02 - The Techniques of Recovery Eradication -- Sanitization.mp4
02:55
07-03 - The Techniques of Recovery Eradication -- ReimagingReconstruction.mp4
06:40
07-04 - The Techniques of Recovery Eradication -- Disposal.mp4
02:42
07-05 - The Techniques of Recovery Eradication -- What Did You Learn.mp4
00:43
08-01 - The Techniques of Recovery Validation and Corrective Actions -- What Youre Going to Learn.mp4
00:39
08-02 - The Techniques of Recovery Validation and Corrective Actions -- Validation Patching.mp4
02:19
08-03 - The Techniques of Recovery Validation and Corrective Actions -- Validation Permissions.mp4
01:10
08-04 - The Techniques of Recovery Validation and Corrective Actions -- Validation Scanning.mp4
00:56
08-05 - The Techniques of Recovery Validation and Corrective Actions -- Validation Logging.mp4
00:56
08-06 - The Techniques of Recovery Validation and Corrective Actions -- Corrective Actions What Did You Learn.mp4
02:31
08-07 - The Techniques of Recovery Validation and Corrective Actions -- Corrective Actions Change Control.mp4
00:58
08-08 - The Techniques of Recovery Validation and Corrective Actions -- Corrective Actions Update the Plan.mp4
00:34
08-09 - The Techniques of Recovery Validation and Corrective Actions -- What Did You Learn.mp4
01:45
09-01 - Thats a Wrap -- What Youre Going to Learn.mp4
00:32
09-02 - Thats a Wrap -- Why Crimes Go Unreported.mp4
03:21
09-03 - Thats a Wrap -- Who Do I Tell.mp4
04:37
09-04 - Thats a Wrap -- The Report.mp4
04:22
09-05 - Thats a Wrap -- What You Learned - Course Summary.mp4
02:04
01-01 - Course Overview -- Course Overview.mp4
02:52
02-01 - Whats the Software Development Life Cycle (SDLC) -- Course Introduction.mp4
06:28
02-02 - Whats the Software Development Life Cycle (SDLC) -- Whats the Problem.mp4
06:03
02-03 - Whats the Software Development Life Cycle (SDLC) -- Do You Really Need a SDLC.mp4
05:20
02-04 - Whats the Software Development Life Cycle (SDLC) -- Summary.mp4
01:09
03-01 - Software Development Phases -- Introduction.mp4
01:30
03-02 - Software Development Phases -- Planning Phase.mp4
01:42
03-03 - Software Development Phases -- Requirement Phase.mp4
02:25
03-04 - Software Development Phases -- Design Phase.mp4
03:23
03-05 - Software Development Phases -- Implementation Phase.mp4
01:25
03-06 - Software Development Phases -- Testing Phase.mp4
01:18
03-07 - Software Development Phases -- Deployment Phase.mp4
02:30
03-08 - Software Development Phases -- Maintenance Phase.mp4
01:03
03-09 - Software Development Phases -- End-of-Life Phase.mp4
01:53
03-10 - Software Development Phases -- Summary.mp4
02:02
04-01 - Software Development Models -- Introduction.mp4
01:26
04-02 - Software Development Models -- Code-and-Fix.mp4
01:55
04-03 - Software Development Models -- Waterfall.mp4
02:30
04-04 - Software Development Models -- Agile.mp4
06:47
04-05 - Software Development Models -- Iterative.mp4
02:57
04-06 - Software Development Models -- Spiral.mp4
02:40
04-07 - Software Development Models -- Summary.mp4
01:09
05-01 - Software Vulnerabilities -- Introduction.mp4
01:23
05-02 - Software Vulnerabilities -- How Does It Happen.mp4
06:02
05-03 - Software Vulnerabilities -- Input Validation.mp4
01:18
05-04 - Software Vulnerabilities -- Buffer Overflow.mp4
02:26
05-05 - Software Vulnerabilities -- Command Injection.mp4
01:39
05-06 - Software Vulnerabilities -- Summary.mp4
01:03
06-01 - Coding Best Practices -- Introduction to Coding Best Practices.mp4
01:43
06-02 - Coding Best Practices -- Whats the Goal Here.mp4
01:50
06-03 - Coding Best Practices -- Input Validation.mp4
02:41
06-04 - Coding Best Practices -- Output Encoding.mp4
01:10
06-05 - Coding Best Practices -- Authentication & Password Management.mp4
09:56
06-06 - Coding Best Practices -- Session Management.mp4
03:42
06-07 - Coding Best Practices -- Access Control.mp4
04:19
06-08 - Coding Best Practices -- Cryptographic Practices.mp4
01:29
06-09 - Coding Best Practices -- Error Handling & Logging.mp4
03:01
06-10 - Coding Best Practices -- Data Protection.mp4
02:37
06-11 - Coding Best Practices -- Communication Security.mp4
01:38
06-12 - Coding Best Practices -- System Configuration.mp4
03:37
06-13 - Coding Best Practices -- Database Security.mp4
03:32
06-14 - Coding Best Practices -- File Management.mp4
02:31
06-15 - Coding Best Practices -- Memory Management.mp4
01:36
06-16 - Coding Best Practices -- General Coding Practices.mp4
02:43
06-17 - Coding Best Practices -- Summary.mp4
01:04
07-01 - Code Reviews -- Introduction to Coding Review.mp4
01:17
07-02 - Code Reviews -- Why a Code Review.mp4
03:30
07-03 - Code Reviews -- Types of Reviews.mp4
07:29
07-04 - Code Reviews -- Incorporate These 3 Outlines.mp4
01:42
07-05 - Code Reviews -- Some Common Sense Tips.mp4
04:21
07-06 - Code Reviews -- Summary.mp4
01:04
08-01 - Security Testing in Action -- Introduction.mp4
03:56
08-02 - Security Testing in Action -- Intercept Proxies.mp4
01:18
08-03 - Security Testing in Action -- DEMO Create a Hackable Web Server.mp4
14:47
08-04 - Security Testing in Action -- DEMO Burp Suite.mp4
08:25
08-05 - Security Testing in Action -- DEMO OWASP ZAP.mp4
06:53
08-06 - Security Testing in Action -- Web Application Firewalls.mp4
01:48
08-07 - Security Testing in Action -- DEMO Nikto.mp4
05:46
08-08 - Security Testing in Action -- Source Authenticity.mp4
03:03
08-09 - Security Testing in Action -- Reverse Engineering.mp4
03:13
08-10 - Security Testing in Action -- ModuleCourse Summary.mp4
02:22
01-01 - Course Overview -- Course Overview.mp4
02:31
02-01 - Its All About Control -- Series Intro-Overview.mp4
05:26
02-02 - Its All About Control -- What Is IAM.mp4
03:15
02-03 - Its All About Control -- Authentication.mp4
01:49
02-04 - Its All About Control -- Two-factor Authentication.mp4
02:57
02-05 - Its All About Control -- Authorization.mp4
01:37
02-06 - Its All About Control -- Role Based IDs.mp4
02:09
02-07 - Its All About Control -- Directories.mp4
01:41
02-08 - Its All About Control -- SSO.mp4
02:03
02-09 - Its All About Control -- IAMs Lifecycle.mp4
01:21
02-10 - Its All About Control -- Summary.mp4
01:35
03-01 - Managing Your Secret Identity -- Overview of Your IDs.mp4
00:36
03-02 - Managing Your Secret Identity -- Digital IDs.mp4
04:39
03-03 - Managing Your Secret Identity -- Endpoints & Servers.mp4
04:18
03-04 - Managing Your Secret Identity -- Services & Applications.mp4
04:48
03-05 - Managing Your Secret Identity -- Summary.mp4
00:56
04-01 - Other Authentication Methods -- Overview of Other Methods.mp4
01:18
04-02 - Other Authentication Methods -- The Two Classes.mp4
02:58
04-03 - Other Authentication Methods -- RADIUS & TRACACS+.mp4
05:51
04-04 - Other Authentication Methods -- Context-based Authentication.mp4
04:53
04-05 - Other Authentication Methods -- SSO & Federations.mp4
06:14
04-06 - Other Authentication Methods -- Self-service Password Reset.mp4
04:28
04-07 - Other Authentication Methods -- Summary.mp4
01:04
05-01 - Identity Repositories -- Module Overview.mp4
00:50
05-02 - Identity Repositories -- The Six Areas.mp4
03:15
05-03 - Identity Repositories -- Going After LDAP.mp4
02:47
05-04 - Identity Repositories -- Going After OauthOpenID.mp4
02:47
05-05 - Identity Repositories -- Going After Kerberos.mp4
01:46
05-06 - Identity Repositories -- Going After RADIUS.mp4
01:44
05-07 - Identity Repositories -- Going After Active Directory.mp4
02:59
05-08 - Identity Repositories -- Stopping Common Exploits.mp4
06:08
05-09 - Identity Repositories -- Summary.mp4
02:22
06-01 - Building the Lab -- Module Overview.mp4
01:33
06-02 - Building the Lab -- Preparing the AutoLab.mp4
05:56
06-03 - Building the Lab -- Installing the AutoLab.mp4
08:56
06-04 - Building the Lab -- Deploying the AutoLab.mp4
03:32
06-05 - Building the Lab -- Lab Structure & New PowerShell Cmdlets.mp4
04:22
06-06 - Building the Lab -- Post Installation Steps.mp4
05:00
06-07 - Building the Lab -- More OSs Kali Linux.mp4
11:47
06-08 - Building the Lab -- Summary.mp4
01:44
07-01 - Lets Look at the Exploits -- Module Overview.mp4
00:50
07-02 - Lets Look at the Exploits -- DNS Spoofing.mp4
02:27
07-03 - Lets Look at the Exploits -- Demo DNS Spoofing.mp4
10:42
07-04 - Lets Look at the Exploits -- Session Hijacking.mp4
00:57
07-05 - Lets Look at the Exploits -- Demo Session Hijacking.mp4
03:35
07-06 - Lets Look at the Exploits -- Man-in-the-middle.mp4
01:19
07-07 - Lets Look at the Exploits -- Demo Man-in-the-middle Attack.mp4
12:38
07-08 - Lets Look at the Exploits -- Privilege Escalation.mp4
01:26
07-09 - Lets Look at the Exploits -- Demo Privilege Escalation.mp4
02:56
07-10 - Lets Look at the Exploits -- Module & Course Summary.mp4
02:32
More details
User Reviews
Rating
average 0
Focused display
Category

Pluralsight
View courses PluralsightPluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
- language english
- Training sessions 504
- duration 28:13:25
- Release Date 2023/04/06