RAR-files |
rebar-implementing.and.performing.vulnerability.management.rar |
15,000,000 |
F49F257A |
rebar-implementing.and.performing.vulnerability.management.r00 |
15,000,000 |
C511A87C |
rebar-implementing.and.performing.vulnerability.management.r01 |
15,000,000 |
00001264 |
rebar-implementing.and.performing.vulnerability.management.r02 |
15,000,000 |
1FF2ED06 |
rebar-implementing.and.performing.vulnerability.management.r03 |
15,000,000 |
1CD5F04B |
rebar-implementing.and.performing.vulnerability.management.r04 |
15,000,000 |
9C7959F0 |
rebar-implementing.and.performing.vulnerability.management.r05 |
15,000,000 |
839225D0 |
rebar-implementing.and.performing.vulnerability.management.r06 |
15,000,000 |
B84F48E5 |
rebar-implementing.and.performing.vulnerability.management.r07 |
15,000,000 |
BC7C88EF |
rebar-implementing.and.performing.vulnerability.management.r08 |
15,000,000 |
B2829D87 |
rebar-implementing.and.performing.vulnerability.management.r09 |
15,000,000 |
C6CF983F |
rebar-implementing.and.performing.vulnerability.management.r10 |
15,000,000 |
746DBDAF |
rebar-implementing.and.performing.vulnerability.management.r11 |
15,000,000 |
5E0E5D12 |
rebar-implementing.and.performing.vulnerability.management.r12 |
15,000,000 |
8AA4977A |
rebar-implementing.and.performing.vulnerability.management.r13 |
15,000,000 |
9785EDB4 |
rebar-implementing.and.performing.vulnerability.management.r14 |
15,000,000 |
2A2B5815 |
rebar-implementing.and.performing.vulnerability.management.r15 |
15,000,000 |
F6C93D44 |
rebar-implementing.and.performing.vulnerability.management.r16 |
15,000,000 |
994BC96F |
rebar-implementing.and.performing.vulnerability.management.r17 |
15,000,000 |
20A3FB38 |
rebar-implementing.and.performing.vulnerability.management.r18 |
15,000,000 |
7CCC284F |
rebar-implementing.and.performing.vulnerability.management.r19 |
15,000,000 |
1D111D51 |
rebar-implementing.and.performing.vulnerability.management.r20 |
15,000,000 |
644B8436 |
rebar-implementing.and.performing.vulnerability.management.r21 |
15,000,000 |
68B14818 |
rebar-implementing.and.performing.vulnerability.management.r22 |
15,000,000 |
0B054E1B |
rebar-implementing.and.performing.vulnerability.management.r23 |
15,000,000 |
24B1311A |
rebar-implementing.and.performing.vulnerability.management.r24 |
15,000,000 |
65288B0C |
rebar-implementing.and.performing.vulnerability.management.r25 |
15,000,000 |
10521A60 |
rebar-implementing.and.performing.vulnerability.management.r26 |
15,000,000 |
AC3CB1C7 |
rebar-implementing.and.performing.vulnerability.management.r27 |
15,000,000 |
91C1D3F0 |
rebar-implementing.and.performing.vulnerability.management.r28 |
10,714,697 |
C625044B |
|
Total size: |
445,714,697 |
|
|
Archived
files |
01 - Course Overview\01 - Course Overview.mp4
[22f32378730a5823]
|
6,346,672 |
8D183777 |
02 - What Do You Need to Start-\02 - Introduction.mp4
[67039c041e60432d]
|
11,402,167 |
0F40C7B4 |
02 - What Do You Need to Start-\03 - Benefits of a Vulnerability Management Program.mp4
[e50887de3338d275]
|
10,155,630 |
0C47A33A |
02 - What Do You Need to Start-\04 - Regulatory Environments.mp4
[abc20b55203add87]
|
5,903,364 |
82D8B19B |
02 - What Do You Need to Start-\05 - Corporate Policies.mp4
[25f8bd481e7ece92]
|
3,331,565 |
A506BF72 |
02 - What Do You Need to Start-\06 - Dale's Top 10 Prechecks.mp4
[56dfc64188d3d08]
|
8,886,506 |
D7D82254 |
02 - What Do You Need to Start-\07 - Demo- Adding OpenVAS Virtual Appliance.mp4
[55d78f6e17f868d3]
|
52,010,462 |
59D21F8E |
02 - What Do You Need to Start-\08 - Demo- Adding OpenVAS to Kali Linux.mp4
[2ed922712a4cc85]
|
42,100,891 |
263EE7BA |
02 - What Do You Need to Start-\09 - Summary.mp4
[11df564851c1bf5b]
|
1,147,932 |
E486981C |
03 - Shaping and Implementing Your Vulnerability Scans\10 - What Get's Covered.mp4
[223efe9d1fe1bf8f]
|
2,502,068 |
F55AF85D |
03 - Shaping and Implementing Your Vulnerability Scans\11 - ID Targets for Your Scan.mp4
[2177a312545d488]
|
1,625,708 |
631FED02 |
03 - Shaping and Implementing Your Vulnerability Scans\12 - Demo- Scanning a Target.mp4
[6f444fcb14909de7]
|
16,723,225 |
8A8C0BC1 |
03 - Shaping and Implementing Your Vulnerability Scans\13 - Define Scan Frequency.mp4
[a70262f1e424eb33]
|
4,705,495 |
99DA63F2 |
03 - Shaping and Implementing Your Vulnerability Scans\14 - The Scopes.mp4
[202f025d5675f01f]
|
1,710,109 |
0980A517 |
03 - Shaping and Implementing Your Vulnerability Scans\15 - Configurations.mp4
[8963efd6f55006e0]
|
4,208,669 |
57C4CF33 |
03 - Shaping and Implementing Your Vulnerability Scans\16 - Scanner Maintenance.mp4
[204a4ccb0ebd8763]
|
3,835,133 |
411C4E2A |
03 - Shaping and Implementing Your Vulnerability Scans\17 - Classifying Data.mp4
[d23e94da525df339]
|
4,304,186 |
97109086 |
03 - Shaping and Implementing Your Vulnerability Scans\18 - Ongoing Scanning and Continuous Monitoring.mp4
[55db5a0cc30a2b9c]
|
1,934,862 |
4BB3EFAC |
03 - Shaping and Implementing Your Vulnerability Scans\19 - Summary.mp4
[ba6a3fe13c49ab28]
|
2,092,306 |
35548195 |
04 - The Scanners\20 - What Gets Covered.mp4
[2d07f851374b0567]
|
1,463,203 |
1227A91C |
04 - The Scanners\21 - Understanding Which Scanner to Use.mp4
[6988e33cc9c9fea0]
|
3,978,268 |
D4EFD0FF |
04 - The Scanners\22 - Open-source vs. Commercial.mp4
[9dc88d4bff9bf3ec]
|
1,503,875 |
4700D142 |
04 - The Scanners\23 - Demo- Nessus.mp4
[102ebad9ab7b133]
|
70,981,859 |
00E93F9B |
04 - The Scanners\24 - On-premises vs. Cloud.mp4
[aff9f634f76a1660]
|
10,404,416 |
3C002A92 |
04 - The Scanners\25 - A Quick Understanding of Nexpose.mp4
[6ed448572616586e]
|
8,030,864 |
F11296E8 |
04 - The Scanners\26 - The Microsoft World.mp4
[8ef95e8b8ab16931]
|
12,642,544 |
BB2E9D16 |
04 - The Scanners\27 - SCAP.mp4
[4a073fa30bdfa8a2]
|
5,716,585 |
FA02FAB0 |
04 - The Scanners\28 - Exploit Scanners.mp4
[818a451ca5b16d6b]
|
11,293,809 |
4E690043 |
04 - The Scanners\29 - Summary.mp4
[18cb3900d5628d7a]
|
1,472,668 |
1A7FA77B |
05 - Analyzing Vulnerability Scans\30 - What Get's Covered.mp4
[75dcb855acc31f1]
|
1,242,820 |
881A1CB2 |
05 - Analyzing Vulnerability Scans\31 - The Tricks to Interpreting Reports.mp4
[bd2125ac873d3fd1]
|
3,608,761 |
5F185DCE |
05 - Analyzing Vulnerability Scans\32 - CVSS- The Standard.mp4
[5775e4586859322b]
|
10,917,830 |
9588DB9A |
05 - Analyzing Vulnerability Scans\33 - False Positives and Exceptions.mp4
[668168eade73fbb8]
|
2,774,941 |
DD2143D7 |
05 - Analyzing Vulnerability Scans\34 - Trends.mp4
[daff284f4822a591]
|
25,603,744 |
B9EDC2D7 |
05 - Analyzing Vulnerability Scans\35 - Summary.mp4
[7793384d780cdda3]
|
1,118,965 |
8BEF0133 |
06 - Remediation and Change Control\36 - What Get's Covered.mp4
[266e8b7bc4143f1]
|
1,279,860 |
D7C8C018 |
06 - Remediation and Change Control\37 - The Remediation Workflow.mp4
[3f15b4428d918e6e]
|
3,694,984 |
7DB108AA |
06 - Remediation and Change Control\38 - Communication and Change Control.mp4
[a481d728b579b173]
|
6,061,094 |
537AF976 |
06 - Remediation and Change Control\39 - Inhibitors to Remediation.mp4
[81748e576b77ef4d]
|
5,239,671 |
3DEB6312 |
06 - Remediation and Change Control\40 - Summary.mp4
[db2b8731dd2cb9f7]
|
849,047 |
4D8D4635 |
07 - Remediating Host Vulnerabilities\41 - What Get's Covered.mp4
[152de8491c8592bf]
|
796,089 |
5BFBA3CC |
07 - Remediating Host Vulnerabilities\42 - Servers.mp4
[cffb59b9b018e3cc]
|
3,772,212 |
BE332EC4 |
07 - Remediating Host Vulnerabilities\43 - Endpoints.mp4
[1dfcd2e2e47cdfb5]
|
1,986,815 |
0949D166 |
07 - Remediating Host Vulnerabilities\44 - ICS and SCADA.mp4
[100a4ee834a6b341]
|
7,695,516 |
C038CA4E |
07 - Remediating Host Vulnerabilities\45 - Summary.mp4
[2ec3fc9c08ccc3a3]
|
1,509,381 |
28690A87 |
08 - Remediating Network Vulnerabilities\46 - What Get's Covered.mp4
[a75a89f98604a01]
|
1,632,020 |
357B5AB6 |
08 - Remediating Network Vulnerabilities\47 - Updates.mp4
[a45b5bf62c5cfdd2]
|
3,905,552 |
90B0C2E3 |
08 - Remediating Network Vulnerabilities\48 - SSL and TLS.mp4
[897b01a3bd36ac33]
|
8,632,245 |
E6D2ED20 |
08 - Remediating Network Vulnerabilities\49 - DNS.mp4
[7439deca3ed2aa93]
|
2,159,850 |
2EF78DBA |
08 - Remediating Network Vulnerabilities\50 - Internal IP Exposure.mp4
[3f365fbd05ad8a55]
|
1,712,615 |
B46F7C93 |
08 - Remediating Network Vulnerabilities\51 - VPN.mp4
[d87a0ddae06de2de]
|
2,040,351 |
FCD7BAE4 |
08 - Remediating Network Vulnerabilities\52 - Summary.mp4
[f34372c82f12f752]
|
1,212,295 |
8D2BC669 |
09 - Remediating Virtual Environments Vulnerabilities\53 - What Get's Covered.mp4
[b8d784fdc05ac270]
|
1,979,326 |
F1F93C83 |
09 - Remediating Virtual Environments Vulnerabilities\54 - Just a Quick Review of Virtualization.mp4
[b2e2bf22433f9205]
|
1,968,250 |
5DB7CA77 |
09 - Remediating Virtual Environments Vulnerabilities\55 - Administration Interface Access.mp4
[2f2719cd8df04979]
|
4,645,808 |
07BD66BB |
09 - Remediating Virtual Environments Vulnerabilities\56 - Virtual Host Patching.mp4
[edfed39e83e77b9c]
|
3,681,498 |
99A85C38 |
09 - Remediating Virtual Environments Vulnerabilities\57 - Virtual Guest Concerns.mp4
[60197c4b4b4f433d]
|
5,919,237 |
8191AEA4 |
09 - Remediating Virtual Environments Vulnerabilities\58 - Virtual Network Concerns.mp4
[25d7bccb3d807cc3]
|
2,896,624 |
89E29B29 |
09 - Remediating Virtual Environments Vulnerabilities\59 - VM Escape.mp4
[e5f9d532d4805104]
|
2,167,553 |
2239FDFA |
09 - Remediating Virtual Environments Vulnerabilities\60 - Summary and Course Wrap Up.mp4
[4248f62de348755a]
|
2,575,966 |
29E4D8C9 |
vulnerability-management-implementing-performing.zip |
8,008,063 |
156C9ECB |
01 - Course Overview |
0 |
00000000 |
02 - What Do You Need to Start- |
0 |
00000000 |
03 - Shaping and Implementing Your Vulnerability Scans |
0 |
00000000 |
04 - The Scanners |
0 |
00000000 |
05 - Analyzing Vulnerability Scans |
0 |
00000000 |
06 - Remediation and Change Control |
0 |
00000000 |
07 - Remediating Host Vulnerabilities |
0 |
00000000 |
08 - Remediating Network Vulnerabilities |
0 |
00000000 |
09 - Remediating Virtual Environments Vulnerabilities |
0 |
00000000 |
|
Total size: |
445,704,024 |
|
|