Don't throw away old warez disks! Save the gems!
  • Anonymous
  • 2020-05-24 11:45:59
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 REBAR File size CRC
Download
18,546
Stored files
208 3BB828B0
2,190 07359B3B
RAR-files
rebar-implementing.and.performing.vulnerability.management.rar 15,000,000 F49F257A
rebar-implementing.and.performing.vulnerability.management.r00 15,000,000 C511A87C
rebar-implementing.and.performing.vulnerability.management.r01 15,000,000 00001264
rebar-implementing.and.performing.vulnerability.management.r02 15,000,000 1FF2ED06
rebar-implementing.and.performing.vulnerability.management.r03 15,000,000 1CD5F04B
rebar-implementing.and.performing.vulnerability.management.r04 15,000,000 9C7959F0
rebar-implementing.and.performing.vulnerability.management.r05 15,000,000 839225D0
rebar-implementing.and.performing.vulnerability.management.r06 15,000,000 B84F48E5
rebar-implementing.and.performing.vulnerability.management.r07 15,000,000 BC7C88EF
rebar-implementing.and.performing.vulnerability.management.r08 15,000,000 B2829D87
rebar-implementing.and.performing.vulnerability.management.r09 15,000,000 C6CF983F
rebar-implementing.and.performing.vulnerability.management.r10 15,000,000 746DBDAF
rebar-implementing.and.performing.vulnerability.management.r11 15,000,000 5E0E5D12
rebar-implementing.and.performing.vulnerability.management.r12 15,000,000 8AA4977A
rebar-implementing.and.performing.vulnerability.management.r13 15,000,000 9785EDB4
rebar-implementing.and.performing.vulnerability.management.r14 15,000,000 2A2B5815
rebar-implementing.and.performing.vulnerability.management.r15 15,000,000 F6C93D44
rebar-implementing.and.performing.vulnerability.management.r16 15,000,000 994BC96F
rebar-implementing.and.performing.vulnerability.management.r17 15,000,000 20A3FB38
rebar-implementing.and.performing.vulnerability.management.r18 15,000,000 7CCC284F
rebar-implementing.and.performing.vulnerability.management.r19 15,000,000 1D111D51
rebar-implementing.and.performing.vulnerability.management.r20 15,000,000 644B8436
rebar-implementing.and.performing.vulnerability.management.r21 15,000,000 68B14818
rebar-implementing.and.performing.vulnerability.management.r22 15,000,000 0B054E1B
rebar-implementing.and.performing.vulnerability.management.r23 15,000,000 24B1311A
rebar-implementing.and.performing.vulnerability.management.r24 15,000,000 65288B0C
rebar-implementing.and.performing.vulnerability.management.r25 15,000,000 10521A60
rebar-implementing.and.performing.vulnerability.management.r26 15,000,000 AC3CB1C7
rebar-implementing.and.performing.vulnerability.management.r27 15,000,000 91C1D3F0
rebar-implementing.and.performing.vulnerability.management.r28 10,714,697 C625044B

Total size: 445,714,697
Archived files
01 - Course Overview\01 - Course Overview.mp4 [22f32378730a5823] 6,346,672 8D183777
02 - What Do You Need to Start-\02 - Introduction.mp4 [67039c041e60432d] 11,402,167 0F40C7B4
02 - What Do You Need to Start-\03 - Benefits of a Vulnerability Management Program.mp4 [e50887de3338d275] 10,155,630 0C47A33A
02 - What Do You Need to Start-\04 - Regulatory Environments.mp4 [abc20b55203add87] 5,903,364 82D8B19B
02 - What Do You Need to Start-\05 - Corporate Policies.mp4 [25f8bd481e7ece92] 3,331,565 A506BF72
02 - What Do You Need to Start-\06 - Dale's Top 10 Prechecks.mp4 [56dfc64188d3d08] 8,886,506 D7D82254
02 - What Do You Need to Start-\07 - Demo- Adding OpenVAS Virtual Appliance.mp4 [55d78f6e17f868d3] 52,010,462 59D21F8E
02 - What Do You Need to Start-\08 - Demo- Adding OpenVAS to Kali Linux.mp4 [2ed922712a4cc85] 42,100,891 263EE7BA
02 - What Do You Need to Start-\09 - Summary.mp4 [11df564851c1bf5b] 1,147,932 E486981C
03 - Shaping and Implementing Your Vulnerability Scans\10 - What Get's Covered.mp4 [223efe9d1fe1bf8f] 2,502,068 F55AF85D
03 - Shaping and Implementing Your Vulnerability Scans\11 - ID Targets for Your Scan.mp4 [2177a312545d488] 1,625,708 631FED02
03 - Shaping and Implementing Your Vulnerability Scans\12 - Demo- Scanning a Target.mp4 [6f444fcb14909de7] 16,723,225 8A8C0BC1
03 - Shaping and Implementing Your Vulnerability Scans\13 - Define Scan Frequency.mp4 [a70262f1e424eb33] 4,705,495 99DA63F2
03 - Shaping and Implementing Your Vulnerability Scans\14 - The Scopes.mp4 [202f025d5675f01f] 1,710,109 0980A517
03 - Shaping and Implementing Your Vulnerability Scans\15 - Configurations.mp4 [8963efd6f55006e0] 4,208,669 57C4CF33
03 - Shaping and Implementing Your Vulnerability Scans\16 - Scanner Maintenance.mp4 [204a4ccb0ebd8763] 3,835,133 411C4E2A
03 - Shaping and Implementing Your Vulnerability Scans\17 - Classifying Data.mp4 [d23e94da525df339] 4,304,186 97109086
03 - Shaping and Implementing Your Vulnerability Scans\18 - Ongoing Scanning and Continuous Monitoring.mp4 [55db5a0cc30a2b9c] 1,934,862 4BB3EFAC
03 - Shaping and Implementing Your Vulnerability Scans\19 - Summary.mp4 [ba6a3fe13c49ab28] 2,092,306 35548195
04 - The Scanners\20 - What Gets Covered.mp4 [2d07f851374b0567] 1,463,203 1227A91C
04 - The Scanners\21 - Understanding Which Scanner to Use.mp4 [6988e33cc9c9fea0] 3,978,268 D4EFD0FF
04 - The Scanners\22 - Open-source vs. Commercial.mp4 [9dc88d4bff9bf3ec] 1,503,875 4700D142
04 - The Scanners\23 - Demo- Nessus.mp4 [102ebad9ab7b133] 70,981,859 00E93F9B
04 - The Scanners\24 - On-premises vs. Cloud.mp4 [aff9f634f76a1660] 10,404,416 3C002A92
04 - The Scanners\25 - A Quick Understanding of Nexpose.mp4 [6ed448572616586e] 8,030,864 F11296E8
04 - The Scanners\26 - The Microsoft World.mp4 [8ef95e8b8ab16931] 12,642,544 BB2E9D16
04 - The Scanners\27 - SCAP.mp4 [4a073fa30bdfa8a2] 5,716,585 FA02FAB0
04 - The Scanners\28 - Exploit Scanners.mp4 [818a451ca5b16d6b] 11,293,809 4E690043
04 - The Scanners\29 - Summary.mp4 [18cb3900d5628d7a] 1,472,668 1A7FA77B
05 - Analyzing Vulnerability Scans\30 - What Get's Covered.mp4 [75dcb855acc31f1] 1,242,820 881A1CB2
05 - Analyzing Vulnerability Scans\31 - The Tricks to Interpreting Reports.mp4 [bd2125ac873d3fd1] 3,608,761 5F185DCE
05 - Analyzing Vulnerability Scans\32 - CVSS- The Standard.mp4 [5775e4586859322b] 10,917,830 9588DB9A
05 - Analyzing Vulnerability Scans\33 - False Positives and Exceptions.mp4 [668168eade73fbb8] 2,774,941 DD2143D7
05 - Analyzing Vulnerability Scans\34 - Trends.mp4 [daff284f4822a591] 25,603,744 B9EDC2D7
05 - Analyzing Vulnerability Scans\35 - Summary.mp4 [7793384d780cdda3] 1,118,965 8BEF0133
06 - Remediation and Change Control\36 - What Get's Covered.mp4 [266e8b7bc4143f1] 1,279,860 D7C8C018
06 - Remediation and Change Control\37 - The Remediation Workflow.mp4 [3f15b4428d918e6e] 3,694,984 7DB108AA
06 - Remediation and Change Control\38 - Communication and Change Control.mp4 [a481d728b579b173] 6,061,094 537AF976
06 - Remediation and Change Control\39 - Inhibitors to Remediation.mp4 [81748e576b77ef4d] 5,239,671 3DEB6312
06 - Remediation and Change Control\40 - Summary.mp4 [db2b8731dd2cb9f7] 849,047 4D8D4635
07 - Remediating Host Vulnerabilities\41 - What Get's Covered.mp4 [152de8491c8592bf] 796,089 5BFBA3CC
07 - Remediating Host Vulnerabilities\42 - Servers.mp4 [cffb59b9b018e3cc] 3,772,212 BE332EC4
07 - Remediating Host Vulnerabilities\43 - Endpoints.mp4 [1dfcd2e2e47cdfb5] 1,986,815 0949D166
07 - Remediating Host Vulnerabilities\44 - ICS and SCADA.mp4 [100a4ee834a6b341] 7,695,516 C038CA4E
07 - Remediating Host Vulnerabilities\45 - Summary.mp4 [2ec3fc9c08ccc3a3] 1,509,381 28690A87
08 - Remediating Network Vulnerabilities\46 - What Get's Covered.mp4 [a75a89f98604a01] 1,632,020 357B5AB6
08 - Remediating Network Vulnerabilities\47 - Updates.mp4 [a45b5bf62c5cfdd2] 3,905,552 90B0C2E3
08 - Remediating Network Vulnerabilities\48 - SSL and TLS.mp4 [897b01a3bd36ac33] 8,632,245 E6D2ED20
08 - Remediating Network Vulnerabilities\49 - DNS.mp4 [7439deca3ed2aa93] 2,159,850 2EF78DBA
08 - Remediating Network Vulnerabilities\50 - Internal IP Exposure.mp4 [3f365fbd05ad8a55] 1,712,615 B46F7C93
08 - Remediating Network Vulnerabilities\51 - VPN.mp4 [d87a0ddae06de2de] 2,040,351 FCD7BAE4
08 - Remediating Network Vulnerabilities\52 - Summary.mp4 [f34372c82f12f752] 1,212,295 8D2BC669
09 - Remediating Virtual Environments Vulnerabilities\53 - What Get's Covered.mp4 [b8d784fdc05ac270] 1,979,326 F1F93C83
09 - Remediating Virtual Environments Vulnerabilities\54 - Just a Quick Review of Virtualization.mp4 [b2e2bf22433f9205] 1,968,250 5DB7CA77
09 - Remediating Virtual Environments Vulnerabilities\55 - Administration Interface Access.mp4 [2f2719cd8df04979] 4,645,808 07BD66BB
09 - Remediating Virtual Environments Vulnerabilities\56 - Virtual Host Patching.mp4 [edfed39e83e77b9c] 3,681,498 99A85C38
09 - Remediating Virtual Environments Vulnerabilities\57 - Virtual Guest Concerns.mp4 [60197c4b4b4f433d] 5,919,237 8191AEA4
09 - Remediating Virtual Environments Vulnerabilities\58 - Virtual Network Concerns.mp4 [25d7bccb3d807cc3] 2,896,624 89E29B29
09 - Remediating Virtual Environments Vulnerabilities\59 - VM Escape.mp4 [e5f9d532d4805104] 2,167,553 2239FDFA
09 - Remediating Virtual Environments Vulnerabilities\60 - Summary and Course Wrap Up.mp4 [4248f62de348755a] 2,575,966 29E4D8C9
vulnerability-management-implementing-performing.zip 8,008,063 156C9ECB
01 - Course Overview 0 00000000
02 - What Do You Need to Start- 0 00000000
03 - Shaping and Implementing Your Vulnerability Scans 0 00000000
04 - The Scanners 0 00000000
05 - Analyzing Vulnerability Scans 0 00000000
06 - Remediation and Change Control 0 00000000
07 - Remediating Host Vulnerabilities 0 00000000
08 - Remediating Network Vulnerabilities 0 00000000
09 - Remediating Virtual Environments Vulnerabilities 0 00000000

Total size: 445,704,024
RAR Recovery
Not Present
Labels UNKNOWN