CSN Education // 1.04 TiB free of 4.54 TiB

c File Name Size Date
parent folder--
-1. Domain 1 Threat Management.mp450351072025-08-25 05:41:02
-1. Domain 1 Threat Management.vtt23372025-08-25 05:41:03
-1.1 Domain 1 - Threat Management.pdf.pdf629499742025-08-25 05:41:06
-10. Network Perimeter Security.mp4376120412025-08-25 05:41:08
-10. Network Perimeter Security.vtt151272025-08-25 05:41:08
-10.1 13 - Network Perimeter Security.pdf.pdf32913592025-08-25 05:41:09
-11. Network Segmentation.mp4120643462025-08-25 05:41:09
-11. Network Segmentation.vtt54552025-08-25 05:41:09
-11.1 14 - Network Segmentation.pdf.pdf13825032025-08-25 05:41:09
-12. Network Access Control.mp4282457662025-08-25 05:41:11
-12. Network Access Control.vtt128022025-08-25 05:41:11
-12.1 15 - Network Access Control.pdf.pdf18552382025-08-25 05:41:11
-13. Defense Deception Methods.mp4167873892025-08-25 05:41:12
-13. Defense Deception Methods.vtt77842025-08-25 05:41:12
-13.1 16 - Defense Deception Methods.pdf.pdf15494462025-08-25 05:41:12
-14. Secure Endpoint Management.mp4342477522025-08-25 05:41:14
-14. Secure Endpoint Management.vtt153932025-08-25 05:41:14
-14.1 17 - Secure Endpoint Management.pdf.pdf24083392025-08-25 05:41:14
-15. Penetration Testing.mp4363821782025-08-25 05:41:17
-15. Penetration Testing.vtt166492025-08-25 05:41:17
-15.1 18 - Penetration Testing.pdf.pdf24283032025-08-25 05:41:17
-16. Security Exercises and Training.mp4140642452025-08-25 05:41:18
-16. Security Exercises and Training.vtt67092025-08-25 05:41:18
-16.1 19 - Security Exercises and Training.pdf.pdf14550012025-08-25 05:41:18
-17. Reverse Engineering.mp4292346692025-08-25 05:41:20
-17. Reverse Engineering.vtt137212025-08-25 05:41:21
-17.1 20 - Reverse Engineering.pdf.pdf14607612025-08-25 05:41:21
-18. Quiz Defense Against Cyber Threats.html1212025-08-25 05:41:21
-19. Reconnaissance and Intelligence.mp458330002025-08-25 05:41:21
-19. Reconnaissance and Intelligence.vtt24772025-08-25 05:41:21
-19.1 21 - Reconnaissance and Intelligence.pdf.pdf5111832025-08-25 05:41:21
-2. CIA Triad.mp4380089562025-08-25 05:41:24
-2. CIA Triad.vtt171182025-08-25 05:41:24
-2.1 05 - CIA Triad.pdf.pdf29388102025-08-25 05:41:24
-20. Footprinting the Network.mp4140672512025-08-25 05:41:25
-20. Footprinting the Network.vtt62442025-08-25 05:41:25
-20.1 22 - Footprinting the Network.pdf.pdf8274272025-08-25 05:41:25
-21. Network Mapping.mp4183708782025-08-25 05:41:26
-21. Network Mapping.vtt79932025-08-25 05:41:26
-21.1 23 - Network Mapping.pdf.pdf11901372025-08-25 05:41:26
-22. Port Scanning.mp4255559552025-08-25 05:41:28
-22. Port Scanning.vtt110592025-08-25 05:41:28
-22.1 24 - Port Scanning.pdf.pdf18714422025-08-25 05:41:28
-23. Other Port Scanners.mp498552162025-08-25 05:41:29
-23. Other Port Scanners.vtt40442025-08-25 05:41:29
-23.1 25 - Other Port Scanners.pdf.pdf8275872025-08-25 05:41:29
-24. NMAP - Demonstration of the world's most popular port scanning tool.mp4104122282025-08-25 05:41:30
-24. NMAP - Demonstration of the world's most popular port scanning tool.vtt115192025-08-25 05:41:30
-25. Passive Reconnaissance.mp4128634722025-08-25 05:41:30
-25. Passive Reconnaissance.vtt59132025-08-25 05:41:30
-25.1 27 - Passive Reconnaissance.pdf.pdf8255712025-08-25 05:41:31
-26. Passive Recon - Network Devices.mp4399192402025-08-25 05:41:34
-26. Passive Recon - Network Devices.vtt168142025-08-25 05:41:34
-26.1 28 - Passive Recon - Network Devices.pdf.pdf34692292025-08-25 05:41:35
-27. Passive Recon - Netstat.mp4232623372025-08-25 05:41:46
-27. Passive Recon - Netstat.vtt96052025-08-25 05:41:46
-27.1 29 - Passive Recon - Netstat.pdf.pdf20901072025-08-25 05:41:46
-28. DHCP Logs and Configs.mp4154897342025-08-25 05:41:46
-28. DHCP Logs and Configs.vtt59902025-08-25 05:41:46
-28.1 30 - DHCP Logs and Configs.pdf.pdf15397552025-08-25 05:41:47
-29. Firewall Logs and Configs.mp4184820402025-08-25 05:41:48
-29. Firewall Logs and Configs.vtt73582025-08-25 05:41:48
-29.1 Example Firewall Logs from CISCO.html1472025-08-25 05:41:48
-29.2 31 - Firewall Logs and Configs.pdf.pdf15338842025-08-25 05:41:48
-3. Risk Consideration.mp4263614572025-08-25 05:41:49
-3. Risk Consideration.vtt119842025-08-25 05:41:49
-3.1 06 - Risk Considerations.pdf.pdf30810542025-08-25 05:41:49
-30. System and Host Log Files.mp4123528072025-08-25 05:41:50
-30. System and Host Log Files.vtt52882025-08-25 05:41:50
-30.1 32 - System and Host Log Files.pdf.pdf11419112025-08-25 05:41:51
-31. DNS Harvesting.mp4172124092025-08-25 05:41:52
-31. DNS Harvesting.vtt63102025-08-25 05:41:52
-31.1 33 - DNS Harvesting.pdf.pdf20132642025-08-25 05:41:53
-32. Domain Names and IP Ranges.mp4125905042025-08-25 05:41:53
-32. Domain Names and IP Ranges.vtt53412025-08-25 05:41:53
-32.1 34 - Domain Names and IP Ranges.pdf.pdf8272942025-08-25 05:41:53
-33. DNS Zone Transfers.mp4166510282025-08-25 05:41:54
-33. DNS Zone Transfers.vtt71392025-08-25 05:41:54
-33.1 35 - DNS Zone Transfers.pdf.pdf11436282025-08-25 05:41:54
-34. Whois and Host Commands.mp4148408912025-08-25 05:41:55
-34. Whois and Host Commands.vtt64642025-08-25 05:41:55
-34.1 36 - Whois and Host Commands.pdf.pdf16373522025-08-25 05:41:55
-35. Information Gathering and Aggregation.mp4203339182025-08-25 05:41:56
-35. Information Gathering and Aggregation.vtt89132025-08-25 05:41:56
-35.1 37 - Information Gathering and Aggregation.pdf.pdf20690942025-08-25 05:41:56
-36. Organizational Intelligence.mp4359478492025-08-25 05:41:58
-36. Organizational Intelligence.vtt174132025-08-25 05:41:58
-36.1 38 - Organizational Intelligence.pdf.pdf25548182025-08-25 05:41:58
-37. Detecting, Preventing, and Responding to Reconnaissance.mp4310843772025-08-25 05:41:59
-37. Detecting, Preventing, and Responding to Reconnaissance.vtt154212025-08-25 05:41:59
-37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf20923782025-08-25 05:41:59
-38. Quiz Reconnaissance and Intelligence Gathering.html1212025-08-25 05:41:59
-4. Risk Assessment.mp4162515262025-08-25 05:42:00
-4. Risk Assessment.vtt69912025-08-25 05:42:00
-4.1 07 - Risk Assessment.pdf.pdf15092132025-08-25 05:42:00
-5. Identify Threats.mp4308241962025-08-25 05:42:02
-5. Identify Threats.vtt139642025-08-25 05:42:02
-5.1 08 - Identify Threats.pdf.pdf29639002025-08-25 05:42:02
-6. Identify Vulnerabilities.mp4113452162025-08-25 05:42:03
-6. Identify Vulnerabilities.vtt49002025-08-25 05:42:03
-6.1 09 - Identify Vulnerabilities.pdf.pdf17017502025-08-25 05:42:03
-7. Likelihood, Impact, and Risk.mp4142506502025-08-25 05:42:04
-7. Likelihood, Impact, and Risk.vtt60922025-08-25 05:42:04
-7.1 10 - Likelihood, Impact, and Risk.pdf.pdf16750052025-08-25 05:42:04
-8. Qualitative and Quantitative Assessments.mp4195046742025-08-25 05:42:05
-8. Qualitative and Quantitative Assessments.vtt112982025-08-25 05:42:05
-8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf23012352025-08-25 05:42:05
-9. Reviewing Controls.mp4332844212025-08-25 05:42:08
-9. Reviewing Controls.vtt154532025-08-25 05:42:08
-9.1 12 - Revieiwing Controls.pdf.pdf20890092025-08-25 05:42:08

control-panel