switch to basic browser
📂
📝
📟

🌲 / CompTIA CySA+ (CS0-001) Complete Course and Practice Exam 2. Domain 1 Threat Management

c File Name Size files T Date
-1. Domain 1 Threat Management.mp45035107mp42025-08-25 05:41:02
-1. Domain 1 Threat Management.vtt2337vtt2025-08-25 05:41:03
-1.1 Domain 1 - Threat Management.pdf.pdf62949974pdf2025-08-25 05:41:06
-10. Network Perimeter Security.mp437612041mp42025-08-25 05:41:08
-10. Network Perimeter Security.vtt15127vtt2025-08-25 05:41:08
-10.1 13 - Network Perimeter Security.pdf.pdf3291359pdf2025-08-25 05:41:09
-11. Network Segmentation.mp412064346mp42025-08-25 05:41:09
-11. Network Segmentation.vtt5455vtt2025-08-25 05:41:09
-11.1 14 - Network Segmentation.pdf.pdf1382503pdf2025-08-25 05:41:09
-12. Network Access Control.mp428245766mp42025-08-25 05:41:11
-12. Network Access Control.vtt12802vtt2025-08-25 05:41:11
-12.1 15 - Network Access Control.pdf.pdf1855238pdf2025-08-25 05:41:11
-13. Defense Deception Methods.mp416787389mp42025-08-25 05:41:12
-13. Defense Deception Methods.vtt7784vtt2025-08-25 05:41:12
-13.1 16 - Defense Deception Methods.pdf.pdf1549446pdf2025-08-25 05:41:12
-14. Secure Endpoint Management.mp434247752mp42025-08-25 05:41:14
-14. Secure Endpoint Management.vtt15393vtt2025-08-25 05:41:14
-14.1 17 - Secure Endpoint Management.pdf.pdf2408339pdf2025-08-25 05:41:14
-15. Penetration Testing.mp436382178mp42025-08-25 05:41:17
-15. Penetration Testing.vtt16649vtt2025-08-25 05:41:17
-15.1 18 - Penetration Testing.pdf.pdf2428303pdf2025-08-25 05:41:17
-16. Security Exercises and Training.mp414064245mp42025-08-25 05:41:18
-16. Security Exercises and Training.vtt6709vtt2025-08-25 05:41:18
-16.1 19 - Security Exercises and Training.pdf.pdf1455001pdf2025-08-25 05:41:18
-17. Reverse Engineering.mp429234669mp42025-08-25 05:41:20
-17. Reverse Engineering.vtt13721vtt2025-08-25 05:41:21
-17.1 20 - Reverse Engineering.pdf.pdf1460761pdf2025-08-25 05:41:21
-18. Quiz Defense Against Cyber Threats.html121html2025-08-25 05:41:21
-19. Reconnaissance and Intelligence.mp45833000mp42025-08-25 05:41:21
-19. Reconnaissance and Intelligence.vtt2477vtt2025-08-25 05:41:21
-19.1 21 - Reconnaissance and Intelligence.pdf.pdf511183pdf2025-08-25 05:41:21
-2. CIA Triad.mp438008956mp42025-08-25 05:41:24
-2. CIA Triad.vtt17118vtt2025-08-25 05:41:24
-2.1 05 - CIA Triad.pdf.pdf2938810pdf2025-08-25 05:41:24
-20. Footprinting the Network.mp414067251mp42025-08-25 05:41:25
-20. Footprinting the Network.vtt6244vtt2025-08-25 05:41:25
-20.1 22 - Footprinting the Network.pdf.pdf827427pdf2025-08-25 05:41:25
-21. Network Mapping.mp418370878mp42025-08-25 05:41:26
-21. Network Mapping.vtt7993vtt2025-08-25 05:41:26
-21.1 23 - Network Mapping.pdf.pdf1190137pdf2025-08-25 05:41:26
-22. Port Scanning.mp425555955mp42025-08-25 05:41:28
-22. Port Scanning.vtt11059vtt2025-08-25 05:41:28
-22.1 24 - Port Scanning.pdf.pdf1871442pdf2025-08-25 05:41:28
-23. Other Port Scanners.mp49855216mp42025-08-25 05:41:29
-23. Other Port Scanners.vtt4044vtt2025-08-25 05:41:29
-23.1 25 - Other Port Scanners.pdf.pdf827587pdf2025-08-25 05:41:29
-24. NMAP - Demonstration of the world's most popular port scanning tool.mp410412228mp42025-08-25 05:41:30
-24. NMAP - Demonstration of the world's most popular port scanning tool.vtt11519vtt2025-08-25 05:41:30
-25. Passive Reconnaissance.mp412863472mp42025-08-25 05:41:30
-25. Passive Reconnaissance.vtt5913vtt2025-08-25 05:41:30
-25.1 27 - Passive Reconnaissance.pdf.pdf825571pdf2025-08-25 05:41:31
-26. Passive Recon - Network Devices.mp439919240mp42025-08-25 05:41:34
-26. Passive Recon - Network Devices.vtt16814vtt2025-08-25 05:41:34
-26.1 28 - Passive Recon - Network Devices.pdf.pdf3469229pdf2025-08-25 05:41:35
-27. Passive Recon - Netstat.mp423262337mp42025-08-25 05:41:46
-27. Passive Recon - Netstat.vtt9605vtt2025-08-25 05:41:46
-27.1 29 - Passive Recon - Netstat.pdf.pdf2090107pdf2025-08-25 05:41:46
-28. DHCP Logs and Configs.mp415489734mp42025-08-25 05:41:46
-28. DHCP Logs and Configs.vtt5990vtt2025-08-25 05:41:46
-28.1 30 - DHCP Logs and Configs.pdf.pdf1539755pdf2025-08-25 05:41:47
-29. Firewall Logs and Configs.mp418482040mp42025-08-25 05:41:48
-29. Firewall Logs and Configs.vtt7358vtt2025-08-25 05:41:48
-29.1 Example Firewall Logs from CISCO.html147html2025-08-25 05:41:48
-29.2 31 - Firewall Logs and Configs.pdf.pdf1533884pdf2025-08-25 05:41:48
-3. Risk Consideration.mp426361457mp42025-08-25 05:41:49
-3. Risk Consideration.vtt11984vtt2025-08-25 05:41:49
-3.1 06 - Risk Considerations.pdf.pdf3081054pdf2025-08-25 05:41:49
-30. System and Host Log Files.mp412352807mp42025-08-25 05:41:50
-30. System and Host Log Files.vtt5288vtt2025-08-25 05:41:50
-30.1 32 - System and Host Log Files.pdf.pdf1141911pdf2025-08-25 05:41:51
-31. DNS Harvesting.mp417212409mp42025-08-25 05:41:52
-31. DNS Harvesting.vtt6310vtt2025-08-25 05:41:52
-31.1 33 - DNS Harvesting.pdf.pdf2013264pdf2025-08-25 05:41:53
-32. Domain Names and IP Ranges.mp412590504mp42025-08-25 05:41:53
-32. Domain Names and IP Ranges.vtt5341vtt2025-08-25 05:41:53
-32.1 34 - Domain Names and IP Ranges.pdf.pdf827294pdf2025-08-25 05:41:53
-33. DNS Zone Transfers.mp416651028mp42025-08-25 05:41:54
-33. DNS Zone Transfers.vtt7139vtt2025-08-25 05:41:54
-33.1 35 - DNS Zone Transfers.pdf.pdf1143628pdf2025-08-25 05:41:54
-34. Whois and Host Commands.mp414840891mp42025-08-25 05:41:55
-34. Whois and Host Commands.vtt6464vtt2025-08-25 05:41:55
-34.1 36 - Whois and Host Commands.pdf.pdf1637352pdf2025-08-25 05:41:55
-35. Information Gathering and Aggregation.mp420333918mp42025-08-25 05:41:56
-35. Information Gathering and Aggregation.vtt8913vtt2025-08-25 05:41:56
-35.1 37 - Information Gathering and Aggregation.pdf.pdf2069094pdf2025-08-25 05:41:56
-36. Organizational Intelligence.mp435947849mp42025-08-25 05:41:58
-36. Organizational Intelligence.vtt17413vtt2025-08-25 05:41:58
-36.1 38 - Organizational Intelligence.pdf.pdf2554818pdf2025-08-25 05:41:58
-37. Detecting, Preventing, and Responding to Reconnaissance.mp431084377mp42025-08-25 05:41:59
-37. Detecting, Preventing, and Responding to Reconnaissance.vtt15421vtt2025-08-25 05:41:59
-37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf2092378pdf2025-08-25 05:41:59
-38. Quiz Reconnaissance and Intelligence Gathering.html121html2025-08-25 05:41:59
-4. Risk Assessment.mp416251526mp42025-08-25 05:42:00
-4. Risk Assessment.vtt6991vtt2025-08-25 05:42:00
-4.1 07 - Risk Assessment.pdf.pdf1509213pdf2025-08-25 05:42:00
-5. Identify Threats.mp430824196mp42025-08-25 05:42:02
-5. Identify Threats.vtt13964vtt2025-08-25 05:42:02
-5.1 08 - Identify Threats.pdf.pdf2963900pdf2025-08-25 05:42:02
-6. Identify Vulnerabilities.mp411345216mp42025-08-25 05:42:03
-6. Identify Vulnerabilities.vtt4900vtt2025-08-25 05:42:03
-6.1 09 - Identify Vulnerabilities.pdf.pdf1701750pdf2025-08-25 05:42:03
-7. Likelihood, Impact, and Risk.mp414250650mp42025-08-25 05:42:04
-7. Likelihood, Impact, and Risk.vtt6092vtt2025-08-25 05:42:04
-7.1 10 - Likelihood, Impact, and Risk.pdf.pdf1675005pdf2025-08-25 05:42:04
-8. Qualitative and Quantitative Assessments.mp419504674mp42025-08-25 05:42:05
-8. Qualitative and Quantitative Assessments.vtt11298vtt2025-08-25 05:42:05
-8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf2301235pdf2025-08-25 05:42:05
-9. Reviewing Controls.mp433284421mp42025-08-25 05:42:08
-9. Reviewing Controls.vtt15453vtt2025-08-25 05:42:08
-9.1 12 - Revieiwing Controls.pdf.pdf2089009pdf2025-08-25 05:42:08

control-panel

π
CSN Education // 1.04 TiB free of 4.54 TiB