~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/4 - Given a scenario analyze potential indicators to determine the type of attack.mp4 503.7 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/10 - Explain the techniques used in penetration testing.mp4 442.1 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/6 - Analyze potential indicators associated with network attacks.mp4 392.7 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/7 - Explain different threat actors vectors and intelligence sources.mp4 355.7 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/5 - Analyze potential indicators associated with application attacks.mp4 339.9 MB
~Get Your Files Here !/1 - Introduction to company/1 - Certcop Introduction.mp4 330.6 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/8 - Explain the security concerns associated with various types of vulnerabilities.mp4 256.0 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/9 - Summarize the techniques used in security assessments.mp4 233.1 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/3 - Compare and contrast different types of social engineering techniques.mp4 64.6 MB
~Get Your Files Here !/2 - Introduction to CompTIA and Free Flash Cards/2 - CompTIA Security.mp4 54.4 MB
~Get Your Files Here !/2 - Introduction to CompTIA and Free Flash Cards/2 - Security-Flsh-Cards.pdf 5.0 MB
~Get Your Files Here !/4 - Free Mock Exam and Flash Cards/11 - Security-flash-Cards.pdf 5.0 MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/4 - Given a scenario analyze potential indicators to determine the type of attack English.vtt 79.9 kB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/10 - Explain the techniques used in penetration testing English.vtt 60.8 kB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/6 - Analyze potential indicators associated with network attacks English.vtt 58.8 kB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/5 - Analyze potential indicators associated with application attacks English.vtt 53.4 kB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/7 - Explain different threat actors vectors and intelligence sources English.vtt 46.1 kB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/8 - Explain the security concerns associated with various types of vulnerabilities English.vtt 34.6 kB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/9 - Summarize the techniques used in security assessments English.vtt 30.7 kB
~Get Your Files Here !/1 - Introduction to company/1 - Certcop Introduction English.vtt 30.6 kB
~Get Your Files Here !/2 - Introduction to CompTIA and Free Flash Cards/2 - CompTIA Security English.vtt 14.7 kB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/3 - Compare and contrast different types of social engineering techniques English.vtt 14.2 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/4 - Free Mock Exam and Flash Cards/11 - Free Flashcards.html 57 Bytes