~Get Your Files Here !/3. Security Operations and Monitoring/2. Given a scenario, analyze data as part of security monitoring activities Part-2.mp4 438.1 MB
~Get Your Files Here !/3. Security Operations and Monitoring/1. Given a scenario, analyze data as part of security monitoring activities Part-1.mp4 417.6 MB
~Get Your Files Here !/3. Security Operations and Monitoring/6. Compare and contrast automation concepts and technologies Part-1.mp4 352.1 MB
~Get Your Files Here !/3. Security Operations and Monitoring/4. Implement configuration changes to existing controls to improve security..mp4 333.5 MB
~Get Your Files Here !/1. Company Introduction/1. Introduction to Certcop.mp4 330.6 MB
~Get Your Files Here !/3. Security Operations and Monitoring/3. Given a scenario, analyze data as part of security monitoring activities Part-3.mp4 279.3 MB
~Get Your Files Here !/3. Security Operations and Monitoring/5. Explain the importance of proactive threat hunting..mp4 270.5 MB
~Get Your Files Here !/3. Security Operations and Monitoring/7. Compare and contrast automation concepts and technologies Part-2.mp4 203.6 MB
~Get Your Files Here !/2. Introduction to Cybersecurity/1. CompTIA CYSA+.mp4 173.7 MB
~Get Your Files Here !/4. Practice Exam Prep video and CYSA+ Complete Flash Cards/1. CertTips & Flash Cards.mp4 54.4 MB
~Get Your Files Here !/3. Security Operations and Monitoring/4. Implement configuration changes to existing controls to improve security..srt 35.9 kB
~Get Your Files Here !/3. Security Operations and Monitoring/1. Given a scenario, analyze data as part of security monitoring activities Part-1.srt 33.7 kB
~Get Your Files Here !/3. Security Operations and Monitoring/5. Explain the importance of proactive threat hunting..srt 33.6 kB
~Get Your Files Here !/1. Company Introduction/1. Introduction to Certcop.srt 32.7 kB
~Get Your Files Here !/3. Security Operations and Monitoring/2. Given a scenario, analyze data as part of security monitoring activities Part-2.srt 32.4 kB
~Get Your Files Here !/3. Security Operations and Monitoring/6. Compare and contrast automation concepts and technologies Part-1.srt 32.3 kB
~Get Your Files Here !/3. Security Operations and Monitoring/3. Given a scenario, analyze data as part of security monitoring activities Part-3.srt 26.8 kB
~Get Your Files Here !/2. Introduction to Cybersecurity/1. CompTIA CYSA+.srt 24.1 kB
~Get Your Files Here !/3. Security Operations and Monitoring/7. Compare and contrast automation concepts and technologies Part-2.srt 19.8 kB
~Get Your Files Here !/4. Practice Exam Prep video and CYSA+ Complete Flash Cards/1. CertTips & Flash Cards.srt 16.0 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
~Get Your Files Here !/5. Practice Exam/1. CompTIA CYSA+.html 204 Bytes