01 Introduction/001 CSA-Objectives-E7.pdf 119.57 KB
01 Introduction/001 Introduction.mp4 40.83 MB
02 Conducting Reconnaissance/002 CSA-Notes-Chapter-01.pdf 384.76 KB
02 Conducting Reconnaissance/002 Thinking Like the Enemy.mp4 201.26 MB
02 Conducting Reconnaissance/003 Tools of the Trade.mp4 109.83 MB
03 Analyzing Reconnaissance Results/004 CSA-Notes-Chapter-02.pdf 186.31 KB
03 Analyzing Reconnaissance Results/004 Recon Results Part 1.mp4 178.87 MB
03 Analyzing Reconnaissance Results/005 Recon Results Part 2.mp4 70.86 MB
03 Analyzing Reconnaissance Results/006 Data Output.mp4 42.73 MB
04 Responding to Network-Based Threats/007 CSA-Notes-Chapter-03.pdf 191.99 KB
04 Responding to Network-Based Threats/007 Protecting Your Territory.mp4 75.84 MB
04 Responding to Network-Based Threats/008 Hardening Strategies.mp4 155.51 MB
05 Securing a Corporate Environment/009 CSA-Notes-Chapter-04.pdf 196.38 KB
05 Securing a Corporate Environment/009 Pen Testing.mp4 73.48 MB
05 Securing a Corporate Environment/010 Training.mp4 39.52 MB
05 Securing a Corporate Environment/011 Reverse Engineering.mp4 90.82 MB
05 Securing a Corporate Environment/012 Risk Evaluation.mp4 41.58 MB
06 Vulnerability Management/013 CSA-Notes-Chapter-05.pdf 407.72 KB
06 Vulnerability Management/013 Requirements Identification.mp4 56.08 MB
06 Vulnerability Management/014 Scanning.mp4 59.33 MB
06 Vulnerability Management/015 Configuring and Executing Scans.mp4 61.07 MB
06 Vulnerability Management/016 Reporting and Remediating.mp4 102.36 MB
07 Analyzing Vulnerabilities Scan Results/017 Common Vulnerabilities Part 1.mp4 116.83 MB
07 Analyzing Vulnerabilities Scan Results/017 CSA-Notes-Chapter-06.pdf 1.01 MB
07 Analyzing Vulnerabilities Scan Results/018 Common Vulnerabilities Part 2.mp4 96.08 MB
08 Incident Response/019 CSA-Notes-Chapter-07.pdf 119.98 KB
08 Incident Response/019 Incident Response Process.mp4 87.92 MB
08 Incident Response/020 IR Roles and Responsibilities.mp4 56.81 MB
09 Preparation Phase/021 CSA-Notes-Chapter-08.pdf 1.18 MB
09 Preparation Phase/021 IR Active Preparation.mp4 109.52 MB
09 Preparation Phase/022 Threat Trends.mp4 83.92 MB
10 Forensic Tools/023 CSA-Notes-Chapter-09.pdf 581.19 KB
10 Forensic Tools/023 Digital Forensics.mp4 134.47 MB
10 Forensic Tools/024 Seizure and Acquisitions.mp4 65.15 MB
10 Forensic Tools/025 Forensics Acquisition Tools.mp4 80.45 MB
10 Forensic Tools/026 Forensics Analysis Part 1.mp4 33.57 MB
10 Forensic Tools/027 Forensics Analysis Part 2.mp4 84.75 MB
11 Common Symptoms of Compromise/028 CSA-Notes-Chapter-10.pdf 492.22 KB
11 Common Symptoms of Compromise/028 Network Symptoms.mp4 47.52 MB
11 Common Symptoms of Compromise/029 Host Symptoms.mp4 88.71 MB
11 Common Symptoms of Compromise/030 Application Symptoms.mp4 68.97 MB
12 Incident Recovery and Post-Incident Response Process/031 CSA-Notes-Chapter-11.pdf 284.27 KB
12 Incident Recovery and Post-Incident Response Process/031 Moving Forward Part 1.mp4 133.81 MB
12 Incident Recovery and Post-Incident Response Process/032 Moving Forward Part 2.mp4 83.07 MB
13 Frameworks Common Policies Controls and Procedures/033 CSA-Notes-Chapter-12.pdf 2.58 MB
13 Frameworks Common Policies Controls and Procedures/033 Frameworks.mp4 124.97 MB
13 Frameworks Common Policies Controls and Procedures/034 Policies.mp4 108.92 MB
13 Frameworks Common Policies Controls and Procedures/035 Controls Procedures.mp4 94.34 MB
13 Frameworks Common Policies Controls and Procedures/036 Verifications.mp4 63.64 MB
14 Identity and Access Management/037 Context-Based Authentication.mp4 83.77 MB
14 Identity and Access Management/037 CSA-Notes-Chapter-13.pdf 970.99 KB
14 Identity and Access Management/038 Identities.mp4 184.17 MB
14 Identity and Access Management/039 Managing Identities.mp4 164.63 MB
14 Identity and Access Management/040 Exploits.mp4 97.63 MB
15 Defense Strategies/041 CSA-Notes-Chapter-14.pdf 381.86 KB
15 Defense Strategies/041 Data Analytics.mp4 117.08 MB
15 Defense Strategies/042 Defense in Depth.mp4 180.49 MB
16 Software Development Life Cycle (SDLC)/043 CSA-Notes-Chapter-15.pdf 109.61 KB
16 Software Development Life Cycle (SDLC)/043 Secure Software Development.mp4 127.87 MB
16 Software Development Life Cycle (SDLC)/044 Best Coding Practices.mp4 67.28 MB
17 Tools and Technologies/045 CSA-Notes-Chapter-16.pdf 196.23 KB
17 Tools and Technologies/045 Preventative Tools Part 1.mp4 250.95 MB
17 Tools and Technologies/046 Preventative Tools Part 2.mp4 90.44 MB
17 Tools and Technologies/047 Collective Tools.mp4 128.88 MB
17 Tools and Technologies/048 Vulnerability Scanning.mp4 158.8 MB
17 Tools and Technologies/049 Packet Capture.mp4 146.7 MB
17 Tools and Technologies/050 Connectivity Tools.mp4 110.48 MB
17 Tools and Technologies/051 Pen Testing Tools.mp4 170.44 MB
Download Info
Tips
“UD66” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.