[Lynda] - CompTIA Security+ (SY0-501) Cert Prep: 1 Threats, Attacks, and Vulnerabilities [September 2018]

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size462.7 MB
  • Uploaded Byd4me94
  • Downloads118
  • Last checkedSep. 20th '18
  • Date uploadedSep. 19th '18
  • Seeders 12
  • Leechers11

Infohash : 2F44775AA893246594BAB5758A2418D92099FFD8

Lynda - CompTIA Security+ (SY0-501) Cert Prep: 1 Threats, Attacks, and Vulnerabilities

TILL SEPTEMBER 2018



The CompTIA Security+ exam is an excellent entry point for a career in information security. The latest version, SY0-501, expands coverage of cloud security, virtualization, and mobile security. This course prepares exam candidates for the critical Threats, Attacks, and Vulnerabilities domain of the exam. By learning about malware, networking and application security exploitations, and social engineering, you'll be prepared to answer questions from the exam—and strengthen your own organization's systems and defenses. Author Mike Chapple, an IT leader with over 15 years of experience, also covers the processes for discovering and mitigating threats and attacks, and conducting penetration testing and scanning for vulnerabilities. Visit certmike.com to join one of his free study groups. .

Quote:

NO COMPRESSION, NO PASSWORD, DOWNLOAD IN WHICHEVER WAY YOU WANT



More Information

Enjoy!!! And

PLEASE SEED





Files:

CompTIA Security (SY0-501) Cert Prep_ 1 Threats Attacks and Vulnerabilities 02 Malware
  • 001 Comparing viruses worms and Trojans.mp4 (23.7 MB)
  • 001 Comparing viruses worms and Trojans-en.srt (10.0 KB)
  • 002 Comparing adware spyware and ransomware-en.srt (8.7 KB)
  • 002 Comparing adware spyware and ransomware.mp4 (9.6 MB)
  • 003 Understanding backdoors and logic bombs-en.srt (7.3 KB)
  • 003 Understanding backdoors and logic bombs.mp4 (9.8 MB)
  • 004 Looking at advanced malware-en.srt (7.9 KB)
  • 004 Looking at advanced malware.mp4 (8.1 MB)
  • 005 Understanding botnets-en.srt (5.4 KB)
  • 005 Understanding botnets.mp4 (6.1 MB)
  • 006 Advanced persistent threats-en.srt (6.1 KB)
  • 006 Advanced persistent threats.mp4 (7.9 MB)
01 Introduction
  • 001 Welcome.mp4 (4.6 MB)
  • 002 What you need to know-en.srt (1.1 KB)
  • 002 What you need to know.mp4 (787.7 KB)
  • 001 Welcome-en.srt (3.1 KB)
03 Understanding Attackers
  • 001 Cybersecurity adversaries-en.srt (6.9 KB)
  • 001 Cybersecurity adversaries.mp4 (14.7 MB)
  • 002 Preventing insider threats-en.srt (7.6 KB)
  • 002 Preventing insider threats.mp4 (8.6 MB)
  • 003 Threat intelligence-en.srt (4.4 KB)
  • 003 Threat intelligence.mp4 (3.7 MB)
04 Understanding Attack Types
  • 001 Denial of service attacks-en.srt (7.6 KB)
  • 001 Denial of service attacks.mp4 (8.3 MB)
  • 002 Eavesdropping attacks-en.srt (7.6 KB)
  • 002 Eavesdropping attacks.mp4 (8.1 MB)
  • 003 Network attacks-en.srt (11.5 KB)
  • 003 Network attacks.mp4 (12.0 MB)
  • 004 Network address spoofing-en.srt (6.2 KB)
  • 004 Network address spoofing.mp4 (4.6 MB)
  • 005 Password attacks-en.srt (15.0 KB)
  • 005 Password attacks.mp4 (21.3 MB)
  • 006 Brute force cryptographic attacks-en.srt (5.5 KB)
  • 006 Brute force cryptographic attacks.mp4 (4.8 MB)
  • 007 Knowledge-based crytpographic attacks-en.srt (5.3 KB)
  • 007 Knowledge-based crytpographic attacks.mp4 (8.2 MB)
  • 008 Watering hole attacks-en.srt (5.7 KB)
  • 008 Watering hole attacks.mp4 (7.4 MB)
05 Wireless Attacks
  • 001 Wireless eavesdropping-en.srt (8.2 KB)
  • 001 Wireless eavesdropping.mp4 (9.6 MB)
  • 002 WPA and WPS attacks-en.srt (6.4 KB)
  • 002 WPA and WPS attacks.mp4 (7.1 MB)
  • 003 Propagation attacks-en.srt (7.1 KB)
  • 003 Propagation attacks.mp4 (9.7 MB)
  • 004 Preventing rogues and evil twins-en.srt (6.1 KB)
  • 004 Preventing rogues and evil twins.mp4 (6.2 MB)
  • 005 Disassociation attacks-en.srt (4.6 KB)
  • 005 Disassociation attacks.mp4 (4.0 MB)
  • 006 Understanding Bluetooth and NFC attacks-en.srt (4.6 KB)
  • 006 Understanding Bluetooth and NFC attacks.mp4 (5.0 MB)
  • 007 RFID security-en.srt (4.9 KB)
  • 007 RFID security.mp4 (7.4 MB)
06 Application Attacks
  • 001 Application security-en.srt (7.5 KB)
  • 001 Application security.mp4 (9.8 MB)
  • 002 Preventing SQL injection-en.srt (10.1 KB)
  • 002 Preventing SQL injection.mp4 (11.5 MB)
  • 003 Understanding cross-site scripting-en.srt (12.0 KB)
  • 003 Understanding cross-site scripting.mp4 (17.2 MB)
  • 004 Understanding cross-site request forgery-en.srt (7.4 KB)
  • 004 Understanding cross-site request forgery.mp4 (11.4 MB)
  • 005 Clickjacking-en.srt (3.3 KB)
  • 005 Clickjacking.mp4 (3.1 MB)
  • 006 Defending against directory traversal-en.srt (5.9 KB)
  • 006 Defending against directory traversal.mp4 (7.6 MB)
  • 007 Overflow attacks-en.srt (6.2 KB)
  • 007 Overflow attacks.mp4 (10.0 MB)
  • 008 Explaining cookies and attachments-en.srt (6.4 KB)
  • 008 Explaining cookies and attachments.mp4 (6.8 MB)
  • 009 Session hijacking-en.srt (6.9 KB)
  • 009 Session hijacking.mp4 (8.8 MB)
  • 010 Malicious add-ons-en.srt (4.7 KB)
  • 010 Malicious add-ons.mp4 (6.3 MB)
  • 011 Code execution attacks-en.srt (5.0 KB)
  • 011 Code execution attacks.mp4 (7.0 MB)
  • 012 Driver manipulation-en.srt (4.8 KB)
  • 012 Driver manipulation.mp4 (3.7 MB)
  • 013 Error and exception handling-en.srt (6.6 KB)
  • 013 Error and exception handling.mp4 (6.9 MB)
07 Social Engineering Attacks
  • 001 Social engineering-en.srt (10.4 KB)
  • 001 Social engineering.mp4 (9.1 MB)
  • 002 Impersonation attacks-en.srt (9.0 KB)
  • 002 Impersonation attacks.mp4 (7.7 MB)
  • 003 Physical social engineering-en.srt (4.5 KB)
  • 003 Physical social engineering.mp4 (9.3 MB)
08 Vulnerability Scanning and Penetration Testing
  • 001 Security assessment tools-en.srt (11.1 KB)
  • 001 Security assessment tools.mp4 (21.3 MB)
  • 002 Scanning for vulnerabilities-en.srt (10.8 KB)
  • 002 Scanning for vulnerabilities.mp4 (12.5 MB)
  • 003 Assessing threats-en.srt (6.2 KB)
  • 003 Assessing threats.mp4 (20.9 MB)
  • 004 Threat assessment techniques-en.srt (5.1 KB)
  • 004 Threat assessment techniques.mp4 (5.8 MB)
  • 005 Penetration testing-en.srt (7.2 KB)
  • 005 Penetration testing.mp4 (7.7 MB)
  • 006 Advanced vulnerability scanning-en.srt (5.7 KB)
  • 006 Advanced vulnerability scanning.mp4 (6.2 MB)
09 Impact of Vulnerabilities
  • 001 Vendor vulnerabilities-en.srt (7.8 KB)
  • 001 Vendor vulnerabilities.mp4 (7.6 MB)
  • 002 Memory vulnerabilities-en.srt (6.8 KB)
  • 002 Memory vulnerabilities.mp4 (5.3 MB)
  • 003 Race condition vulnerabilities-en.srt (4.6 KB)
  • 003 Race condition vulnerabilities.mp4 (4.3 MB)
  • 004 Configuration vulnerabilities-en.srt (5.9 KB)
  • 004 Configuration vulnerabilities.mp4 (7.2 MB)
  • 005 Architectural vulnerabilities-en.srt (4.2 KB)
  • 005 Architectural vulne

Code:

  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.kicks-ass.net:80/announce
  • http://tracker.kicks-ass.net/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • http://tracker.opentrackr.org:1337/announce
  • udp://zer0day.to:1337/announce
  • udp://zer0day.ch:1337/announce
  • udp://eddie4.nl:6969/announce
  • http://explodie.org:6969/announce
  • udp://public.popcorn-tracker.org:6969/announce
  • udp://9.rarbg.com:2710/announce
  • udp://p4p.arenabg.com:1337/announce
  • http://p4p.arenabg.com:1337/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://open.stealth.si:80/announce
  • udp://tracker.pirateparty.gr:6969/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • udp://bt.firebit.co.uk:6969/announce
  • udp://inferno.demonoid.pw:3397/announce
  • udp://shadowshq.yi.org:6969/announce
  • udp://9.rarbg.to:2780/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.vanitycore.co:6969/announce