Filename Size 1. Welcome and Introduction/1. Welcome to the Course.mp4 15 MB 1. Welcome and Introduction/1. Welcome to the Course.vtt 8.4 KB 1. Welcome and Introduction/1.1 CompTIA CySA+ (Study Notes).pdf.pdf 7 MB 1. Welcome and Introduction/2. Exam Foundations.mp4 18.8 MB 1. Welcome and Introduction/2. Exam Foundations.vtt 7.8 KB 1. Welcome and Introduction/2.1 02 - Exam Foundations.pdf.pdf 1.8 MB 1. Welcome and Introduction/3. A Special Message From Jason Dion.mp4 38.4 MB 1. Welcome and Introduction/3. A Special Message From Jason Dion.vtt 4.1 KB 2. Domain 1 Threat Management (27%)/1. Domain 1 Threat Management.mp4 4.8 MB 2. Domain 1 Threat Management (27%)/1. Domain 1 Threat Management.vtt 2.3 KB 2. Domain 1 Threat Management (27%)/1.1 Domain 1 - Threat Management.pdf.pdf 60 MB 2. Domain 1 Threat Management (27%)/10. Network Perimeter Security.mp4 35.9 MB 2. Domain 1 Threat Management (27%)/10. Network Perimeter Security.vtt 14.8 KB 2. Domain 1 Threat Management (27%)/10.1 13 - Network Perimeter Security.pdf.pdf 3.1 MB 2. Domain 1 Threat Management (27%)/11. Network Segmentation.mp4 11.5 MB 2. Domain 1 Threat Management (27%)/11. Network Segmentation.vtt 5.3 KB 2. Domain 1 Threat Management (27%)/11.1 14 - Network Segmentation.pdf.pdf 1.3 MB 2. Domain 1 Threat Management (27%)/12. Network Access Control.mp4 26.9 MB 2. Domain 1 Threat Management (27%)/12. Network Access Control.vtt 12.5 KB 2. Domain 1 Threat Management (27%)/12.1 15 - Network Access Control.pdf.pdf 1.8 MB 2. Domain 1 Threat Management (27%)/13. Defense Deception Methods.mp4 16 MB 2. Domain 1 Threat Management (27%)/13. Defense Deception Methods.vtt 7.6 KB 2. Domain 1 Threat Management (27%)/13.1 16 - Defense Deception Methods.pdf.pdf 1.5 MB 2. Domain 1 Threat Management (27%)/14. Secure Endpoint Management.mp4 32.7 MB 2. Domain 1 Threat Management (27%)/14. Secure Endpoint Management.vtt 15 KB 2. Domain 1 Threat Management (27%)/14.1 17 - Secure Endpoint Management.pdf.pdf 2.3 MB 2. Domain 1 Threat Management (27%)/15. Penetration Testing.mp4 34.7 MB 2. Domain 1 Threat Management (27%)/15. Penetration Testing.vtt 16.3 KB 2. Domain 1 Threat Management (27%)/15.1 18 - Penetration Testing.pdf.pdf 2.3 MB 2. Domain 1 Threat Management (27%)/16. Security Exercises and Training.mp4 13.4 MB 2. Domain 1 Threat Management (27%)/16. Security Exercises and Training.vtt 6.6 KB 2. Domain 1 Threat Management (27%)/16.1 19 - Security Exercises and Training.pdf.pdf 1.4 MB 2. Domain 1 Threat Management (27%)/17. Reverse Engineering.mp4 27.9 MB 2. Domain 1 Threat Management (27%)/17. Reverse Engineering.vtt 13.4 KB 2. Domain 1 Threat Management (27%)/17.1 20 - Reverse Engineering.pdf.pdf 1.4 MB 2. Domain 1 Threat Management (27%)/18. Quiz Defense Against Cyber Threats.html 121 B 2. Domain 1 Threat Management (27%)/19. Reconnaissance and Intelligence.mp4 5.6 MB 2. Domain 1 Threat Management (27%)/19. Reconnaissance and Intelligence.vtt 2.4 KB 2. Domain 1 Threat Management (27%)/19.1 21 - Reconnaissance and Intelligence.pdf.pdf 499.2 KB 2. Domain 1 Threat Management (27%)/2. CIA Triad.mp4 36.2 MB 2. Domain 1 Threat Management (27%)/2. CIA Triad.vtt 16.7 KB 2. Domain 1 Threat Management (27%)/2.1 05 - CIA Triad.pdf.pdf 2.8 MB 2. Domain 1 Threat Management (27%)/20. Footprinting the Network.mp4 13.4 MB 2. Domain 1 Threat Management (27%)/20. Footprinting the Network.vtt 6.1 KB 2. Domain 1 Threat Management (27%)/20.1 22 - Footprinting the Network.pdf.pdf 808 KB 2. Domain 1 Threat Management (27%)/21. Network Mapping.mp4 17.5 MB 2. Domain 1 Threat Management (27%)/21. Network Mapping.vtt 7.8 KB 2. Domain 1 Threat Management (27%)/21.1 23 - Network Mapping.pdf.pdf 1.1 MB 2. Domain 1 Threat Management (27%)/22. Port Scanning.mp4 24.4 MB 2. Domain 1 Threat Management (27%)/22. Port Scanning.vtt 10.8 KB 2. Domain 1 Threat Management (27%)/22.1 24 - Port Scanning.pdf.pdf 1.8 MB 2. Domain 1 Threat Management (27%)/23. Other Port Scanners.mp4 9.4 MB 2. Domain 1 Threat Management (27%)/23. Other Port Scanners.vtt 3.9 KB 2. Domain 1 Threat Management (27%)/23.1 25 - Other Port Scanners.pdf.pdf 808.2 KB 2. Domain 1 Threat Management (27%)/24. NMAP - Demonstration of the world's most popular port scanning tool.mp4 9.9 MB 2. Domain 1 Threat Management (27%)/24. NMAP - Demonstration of the world's most popular port scanning tool.vtt 11.2 KB 2. Domain 1 Threat Management (27%)/25. Passive Reconnaissance.mp4 12.3 MB 2. Domain 1 Threat Management (27%)/25. Passive Reconnaissance.vtt 5.8 KB 2. Domain 1 Threat Management (27%)/25.1 27 - Passive Reconnaissance.pdf.pdf 806.2 KB 2. Domain 1 Threat Management (27%)/26. Passive Recon - Network Devices.mp4 38.1 MB 2. Domain 1 Threat Management (27%)/26. Passive Recon - Network Devices.vtt 16.4 KB 2. Domain 1 Threat Management (27%)/26.1 28 - Passive Recon - Network Devices.pdf.pdf 3.3 MB 2. Domain 1 Threat Management (27%)/27. Passive Recon - Netstat.mp4 22.2 MB 2. Domain 1 Threat Management (27%)/27. Passive Recon - Netstat.vtt 9.4 KB 2. Domain 1 Threat Management (27%)/27.1 29 - Passive Recon - Netstat.pdf.pdf 2 MB 2. Domain 1 Threat Management (27%)/28. DHCP Logs and Configs.mp4 14.8 MB 2. Domain 1 Threat Management (27%)/28. DHCP Logs and Configs.vtt 5.8 KB 2. Domain 1 Threat Management (27%)/28.1 30 - DHCP Logs and Configs.pdf.pdf 1.5 MB 2. Domain 1 Threat Management (27%)/29. Firewall Logs and Configs.mp4 17.6 MB 2. Domain 1 Threat Management (27%)/29. Firewall Logs and Configs.vtt 7.2 KB 2. Domain 1 Threat Management (27%)/29.1 Example Firewall Logs from CISCO.html 147 B 2. Domain 1 Threat Management (27%)/29.2 31 - Firewall Logs and Configs.pdf.pdf 1.5 MB 2. Domain 1 Threat Management (27%)/3. Risk Consideration.mp4 25.1 MB 2. Domain 1 Threat Management (27%)/3. Risk Consideration.vtt 11.7 KB 2. Domain 1 Threat Management (27%)/3.1 06 - Risk Considerations.pdf.pdf 2.9 MB 2. Domain 1 Threat Management (27%)/30. System and Host Log Files.mp4 11.8 MB 2. Domain 1 Threat Management (27%)/30. System and Host Log Files.vtt 5.2 KB 2. Domain 1 Threat Management (27%)/30.1 32 - System and Host Log Files.pdf.pdf 1.1 MB 2. Domain 1 Threat Management (27%)/31. DNS Harvesting.mp4 16.4 MB 2. Domain 1 Threat Management (27%)/31. DNS Harvesting.vtt 6.2 KB 2. Domain 1 Threat Management (27%)/31.1 33 - DNS Harvesting.pdf.pdf 1.9 MB 2. Domain 1 Threat Management (27%)/32. Domain Names and IP Ranges.mp4 12 MB 2. Domain 1 Threat Management (27%)/32. Domain Names and IP Ranges.vtt 5.2 KB 2. Domain 1 Threat Management (27%)/32.1 34 - Domain Names and IP Ranges.pdf.pdf 807.9 KB 2. Domain 1 Threat Management (27%)/33. DNS Zone Transfers.mp4 15.9 MB 2. Domain 1 Threat Management (27%)/33. DNS Zone Transfers.vtt 7 KB 2. Domain 1 Threat Management (27%)/33.1 35 - DNS Zone Transfers.pdf.pdf 1.1 MB 2. Domain 1 Threat Management (27%)/34. Whois and Host Commands.mp4 14.2 MB 2. Domain 1 Threat Management (27%)/34. Whois and Host Commands.vtt 6.3 KB 2. Domain 1 Threat Management (27%)/34.1 36 - Whois and Host Commands.pdf.pdf 1.6 MB 2. Domain 1 Threat Management (27%)/35. Information Gathering and Aggregation.mp4 19.4 MB 2. Domain 1 Threat Management (27%)/35. Information Gathering and Aggregation.vtt 8.7 KB 2. Domain 1 Threat Management (27%)/35.1 37 - Information Gathering and Aggregation.pdf.pdf 2 MB 2. Domain 1 Threat Management (27%)/36. Organizational Intelligence.mp4 34.3 MB 2. Domain 1 Threat Management (27%)/36. Organizational Intelligence.vtt 17 KB 2. Domain 1 Threat Management (27%)/36.1 38 - Organizational Intelligence.pdf.pdf 2.4 MB 2. Domain 1 Threat Management (27%)/37. Detecting, Preventing, and Responding to Reconnaissance.mp4 29.6 MB 2. Domain 1 Threat Management (27%)/37. Detecting, Preventing, and Responding to Reconnaissance.vtt 15.1 KB 2. Domain 1 Threat Management (27%)/37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf 2 MB