~Get Your Files Here !/1 - Introduction to company/1 - Certcop Introduction.mp4315.26MB
~Get Your Files Here !/2 - Introduction to CompTIA and Free Flash Cards/2 - CompTIA Security.mp451.85MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/10 - Explain the techniques used in penetration testing.mp4421.6MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/3 - Compare and contrast different types of social engineering techniques.mp461.61MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/4 - Given a scenario analyze potential indicators to determine the type of attack.mp4480.39MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/5 - Analyze potential indicators associated with application attacks.mp4324.14MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/6 - Analyze potential indicators associated with network attacks.mp4374.47MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/7 - Explain different threat actors vectors and intelligence sources.mp4339.19MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/8 - Explain the security concerns associated with various types of vulnerabilities.mp4244.1MB
~Get Your Files Here !/3 - Threats Attacks and Vulnerabilities/9 - Summarize the techniques used in security assessments.mp4222.26MB