MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[Udemy] CompTIA Security+ (SY0-501 & SY0-601) Complete Course

磁力链接/BT种子名称

[Udemy] CompTIA Security+ (SY0-501 & SY0-601) Complete Course

磁力链接/BT种子简介

种子哈希:0befa4bd9edc2eb399bc092f958e1b2f72e6a228
文件大小: 20.23G
已经下载:7814次
下载速度:极快
收录时间:2021-04-01
最近下载:2025-08-31

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:0BEFA4BD9EDC2EB399BC092F958E1B2F72E6A228
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 她趣 TikTok成人版 PornHub 听泉鉴鲍 草榴社区 哆哔涩漫 呦乐园 萝莉岛

最近搜索

程儿 歐美剧情片 the plot retribution 2160p 美女撅着大屁屁被大洋吊后入无套猛怼+高潮抽搐+尿尿狂喷 nana nsps-982 南条いちか 方正铁线黑 广东佛山顺德锐府地产女销冠 紫薇姐姐 无码 辛尤里 百度云泄密 mrthiccbbc 上海夜会 連發中出大合集之+集体淫乱篇 壹屌南航空姐 club-347 反差中文 三姐妹 超短裤街拍 顶b裸舞 长沙万达全集 midv-241 smbd-69 蓝色制服 天堂日落 愛的奴隸 悠悠_穿着纯欲毛衣+吊带灰丝被各种姿势猛操的淫叫连连

文件列表

  • 15 Network Attacks/003 Memorization of Ports (OBJ 3.1).mp4 250.0 MB
  • 30 Policies and Procedures/007 Security Policies (OBJ 5.3 & 5.5).mp4 236.3 MB
  • 32 Conclusion/001 Conclusion.mp4 222.4 MB
  • 20 Access Control/004 Users and Groups (OBJ 3.7 & 3.8).mp4 211.2 MB
  • 16 Securing Networks/003 Securing Network Media (OBJ 2.7).mp4 199.2 MB
  • 10 Secure Software Development/001 Software Development (OBJ 2.1 & 2.3).mp4 197.9 MB
  • 21 Risk Assessments/001 Risk Assessments (OBJ 5.4).mp4 197.8 MB
  • 20 Access Control/002 Access Control Models (OBJ 3.8).mp4 184.7 MB
  • 12 Perimeter Security/002 Firewalls (OBJ 3.3 & 4.4).mp4 183.8 MB
  • 22 Vulnerability Management/001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4 180.0 MB
  • 15 Network Attacks/005 Denial of Service (OBJ 1.3 & 1.4).mp4 178.5 MB
  • 30 Policies and Procedures/009 Vendor Relationships (OBJ 5.3).mp4 175.3 MB
  • 25 Hashing/001 Hashing (OBJ 1.2, 2.8 & 3.2).mp4 174.2 MB
  • 29 Social Engineering/005 __ Motivation Factors (OBJ 1.1).mp4 166.8 MB
  • 13 Cloud Security/003 As a Service (OBJ 2.2).mp4 161.9 MB
  • 10 Secure Software Development/003 Testing Methods (OBJ 2.3 & 3.2).mp4 158.4 MB
  • 21 Risk Assessments/005 Security Controls (OBJ 5.1).mp4 156.3 MB
  • 16 Securing Networks/002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4 153.9 MB
  • 30 Policies and Procedures/002 Data Classifications (OBJ 5.3 & 5.5).mp4 152.4 MB
  • 09 Application Security/002 Web Browser Security (OBJ 3.2 & 3.3).mp4 152.2 MB
  • 26 Public Key Infrastructure/002 Digital Certificates (OBJ 3.9).mp4 151.5 MB
  • 10 Secure Software Development/008 SQL Injection (OBJ 1.3).mp4 148.3 MB
  • 27 Security Protocols/005 VPN Protocols (OBJ 3.1 & 3..3).mp4 148.2 MB
  • 22 Vulnerability Management/005 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4 146.3 MB
  • 05 Mobile Device Security/003 Mobile Malware (OBJ 1.1 & 3.5).mp4 146.3 MB
  • 18 Facilities Security/002 Fire Suppression (OBJ 2.7).mp4 145.4 MB
  • 31 Incident Response and Forensics/007 __ Security Tools (OBJ 4.1).mp4 143.9 MB
  • 10 Secure Software Development/002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4 143.6 MB
  • 16 Securing Networks/006 Wireless Access Points (OBJ 1.4 & 3.4).mp4 143.3 MB
  • 29 Social Engineering/004 Phishing (OBJ 1.1 & 5.3).mp4 142.4 MB
  • 10 Secure Software Development/005 Buffer Overflows (OBJ 1.3).mp4 142.2 MB
  • 02 Malware/002 Viruses (OBJ 1.2).mp4 141.2 MB
  • 30 Policies and Procedures/004 PII and PHI (OBJ 5.2 & 5.5).mp4 140.5 MB
  • 24 Cryptography/002 Symmetric vs Asymmetric (OBJ 2.8).mp4 140.5 MB
  • 16 Securing Networks/010 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4 138.6 MB
  • 11 Network Design/011 Telephony (OBJ 3.1).mp4 137.0 MB
  • 19 Authentication/001 Authentication (OBJ 2.4, 3.5, & 3.8).mp4 136.0 MB
  • 03 Malware Infections/010 Preventing Malware (OBJ 1.6 & 3.2).mp4 135.1 MB
  • 11 Network Design/002 The OSI Model (OBJ 3.3 & 3.6).mp4 134.8 MB
  • 22 Vulnerability Management/008 Password Analysis (OBJ 1.2).mp4 133.6 MB
  • 30 Policies and Procedures/001 Policies and Procedures (OBJ 5.2 & 5.3).mp4 132.8 MB
  • 20 Access Control/003 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4 132.3 MB
  • 28 Planning for the Worst/011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4 129.2 MB
  • 27 Security Protocols/003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4 127.6 MB
  • 16 Securing Networks/005 Wireless Encryption (OBJ 1.6 & 3.4).mp4 126.1 MB
  • 21 Risk Assessments/003 Quantitative Risk (OBJ 5.4).mp4 125.8 MB
  • 28 Planning for the Worst/012 __ Business Impact Analysis (OBJ 5.4).mp4 124.1 MB
  • 23 Monitoring and Auditing/009 Log Files (OBJ 4.3).mp4 120.4 MB
  • 31 Incident Response and Forensics/002 __ Incident Response Planning (OBJ 4.2).mp4 118.8 MB
  • 19 Authentication/002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4 118.2 MB
  • 30 Policies and Procedures/010 Disposal Policies (OBJ 2.7 & 4.1).mp4 115.4 MB
  • 05 Mobile Device Security/007 Security of Apps (OBJ 3.1 & 3.5).mp4 114.7 MB
  • 03 Malware Infections/009 Removing Malware (OBJ 4.2).mp4 113.6 MB
  • 24 Cryptography/001 Cryptography (OBJ 2.1 & 2.8).mp4 113.2 MB
  • 05 Mobile Device Security/008 BYOD (OBJ 3.5).mp4 112.9 MB
  • 04 Security Applications and Devices/009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4 111.9 MB
  • 04 Security Applications and Devices/004 IDS (OBJ 3.2 & 3.3).mp4 110.9 MB
  • 29 Social Engineering/009 User Education (OBJ 5.3).mp4 110.4 MB
  • 01 Overview of Security/008 Hackers (OBJ 1.5).mp4 110.0 MB
  • 24 Cryptography/003 Symmetric Algorithms (OBJ 2.8).mp4 108.4 MB
  • 16 Securing Networks/008 Demo_ Wireless Attack (OBJ 1.4).mp4 108.3 MB
  • 23 Monitoring and Auditing/002 Performance Baselining (OBJ 2.1).mp4 107.4 MB
  • 10 Secure Software Development/006 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4 106.7 MB
  • 09 Application Security/005 Securing Applications (OBJ 1.4 & 3.2).mp4 106.4 MB
  • 31 Incident Response and Forensics/005 Data Collection Procedures (OBJ 4.1 & 4.5).mp4 106.1 MB
  • 28 Planning for the Worst/004 Data Redundancy (OBJ 2.5).mp4 105.2 MB
  • 13 Cloud Security/005 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4 104.4 MB
  • 31 Incident Response and Forensics/001 Incident Response Procedures (OBJ 4.2).mp4 103.9 MB
  • 22 Vulnerability Management/002 Penetration Testing (OBJ 1.8).mp4 103.2 MB
  • 22 Vulnerability Management/006 Demo_ Nmap Scanning (OBJ 4.1).mp4 102.0 MB
  • 16 Securing Networks/004 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4 101.7 MB
  • 03 Malware Infections/002 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 101.6 MB
  • 22 Vulnerability Management/007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4 101.3 MB
  • 15 Network Attacks/013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4 100.9 MB
  • 15 Network Attacks/002 Ports and Protocols (OBJ 3.1).mp4 100.4 MB
  • 24 Cryptography/008 One-Time Pad (OBJ 2.8).mp4 99.1 MB
  • 29 Social Engineering/002 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4 98.6 MB
  • 03 Malware Infections/001 Malware Infections.mp4 97.7 MB
  • 12 Perimeter Security/007 NIDS and NIPS (OBJ 3.3).mp4 96.9 MB
  • 17 Physical Security/005 Biometric Readers (OBJ 2.4).mp4 96.6 MB
  • 12 Perimeter Security/004 Proxy Servers (OBJ 3.3 & 4.4).mp4 96.1 MB
  • 02 Malware/005 Demo_ Viruses and Trojans (OBJ 1.2).mp4 96.0 MB
  • 21 Risk Assessments/002 Qualitative Risk (OBJ 5.4).mp4 95.9 MB
  • 16 Securing Networks/007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4 95.9 MB
  • 04 Security Applications and Devices/002 Software Firewalls (OBJ 3.2).mp4 95.9 MB
  • 01 Overview of Security/001 Welcome.mp4 95.8 MB
  • 03 Malware Infections/008 Symptoms of Infection (OBJ 1.2).mp4 95.8 MB
  • 26 Public Key Infrastructure/004 Certificate Authorities (OBJ 3.2 & 3.9).mp4 94.2 MB
  • 30 Policies and Procedures/008 User Education (OBJ 5.3).mp4 93.2 MB
  • 29 Social Engineering/006 More Social Engineering (OBJ 1.1 & 1.2).mp4 92.4 MB
  • 01 Overview of Security/012 __ Attack Frameworks (OBJ 4.2).mp4 91.9 MB
  • 05 Mobile Device Security/004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4 90.9 MB
  • 04 Security Applications and Devices/007 Securing the BIOS (OBJ 3.2).mp4 90.4 MB
  • 28 Planning for the Worst/010 Tape Rotation (OBJ 2.5).mp4 89.3 MB
  • 17 Physical Security/003 Door Locks (OBJ 2.7).mp4 89.1 MB
  • 03 Malware Infections/007 Backdoors and Logic Bombs (OBJ 1.2).mp4 88.2 MB
  • 06 Hardening/007 Patch Management (OBJ 1.6 & 3.2).mp4 87.5 MB
  • 31 Incident Response and Forensics/004 __ Forensic Procedures (OBJ 4.5).mp4 87.0 MB
  • 08 Virtualization/005 Securing VMs (OBJ 2.2).mp4 86.4 MB
  • 05 Mobile Device Security/009 Hardening Mobile Devices (OBJ 3.5).mp4 85.8 MB
  • 04 Security Applications and Devices/006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4 85.6 MB
  • 24 Cryptography/005 Asymmetric Algorithms (OBJ 2.8).mp4 85.3 MB
  • 20 Access Control/005 Permissions (OBJ 3.8).mp4 85.0 MB
  • 08 Virtualization/004 Threats to VMs (OBJ 2.2).mp4 84.9 MB
  • 10 Secure Software Development/004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4 84.7 MB
  • 19 Authentication/003 802.1x (OBJ 3.4 & 3.8).mp4 83.7 MB
  • 23 Monitoring and Auditing/008 Logging (OBJ 1.7, 4.3, & 4.5).mp4 83.4 MB
  • 23 Monitoring and Auditing/004 SNMP (OBJ 3.1).mp4 83.2 MB
  • 11 Network Design/003 Switches (OBJ 1.4 & 2.7).mp4 81.0 MB
  • 30 Policies and Procedures/012 __ Key Frameworks (OBJ 5.2).mp4 81.0 MB
  • 32 Conclusion/002 BONUS_ What's Next_.mp4 80.6 MB
  • 24 Cryptography/010 __ Cryptography Considerations (OBJ 2.8).mp4 80.3 MB
  • 13 Cloud Security/001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4 80.1 MB
  • 02 Malware/008 Rootkits (OBJ 1.2 & 1.3).mp4 79.3 MB
  • 03 Malware Infections/006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 79.2 MB
  • 15 Network Attacks/004 Unnecessary Ports (OBJ 1.6 & 3.2).mp4 78.9 MB
  • 10 Secure Software Development/009 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4 78.5 MB
  • 31 Incident Response and Forensics/003 __ Investigative Data (OBJ 4.3).mp4 78.4 MB
  • 15 Network Attacks/009 Hijacking (OBJ 1.3 & 1.4).mp4 78.3 MB
  • 01 Overview of Security/004 CIA Triad.mp4 78.1 MB
  • 06 Hardening/006 Updates and Patches (OBJ 1.6 & 3.2).mp4 77.8 MB
  • 04 Security Applications and Devices/008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4 76.6 MB
  • 30 Policies and Procedures/011 IT Security Frameworks (OBJ 5.2).mp4 74.6 MB
  • 09 Application Security/003 Web Browser Concerns (OBJ 3.2 & 3.3).mp4 74.5 MB
  • 25 Hashing/003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4 74.1 MB
  • 05 Mobile Device Security/006 Mobile Device Theft (OBJ 3.5).mp4 73.2 MB
  • 11 Network Design/005 Network Zones (OBJ 3.3).mp4 72.8 MB
  • 06 Hardening/002 Unnecessary Applications (OBJ 1.6).mp4 72.5 MB
  • 06 Hardening/010 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4 72.4 MB
  • 28 Planning for the Worst/003 Backup Power (OBJ 2.5).mp4 72.3 MB
  • 10 Secure Software Development/007 XSS and XSRF (OBJ 1.3).mp4 72.1 MB
  • 28 Planning for the Worst/002 Redundant Power (OBJ 2.5).mp4 72.0 MB
  • 01 Overview of Security/009 Threat Actors (1.5).mp4 71.6 MB
  • 14 Automation/005 __ Machine Learning (OBJ 1.2).mp4 71.3 MB
  • 04 Security Applications and Devices/005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4 69.9 MB
  • 23 Monitoring and Auditing/010 SIEM (OBJ 1.7 & 4.3).mp4 69.1 MB
  • 02 Malware/009 Spam (OBJ 1.1).mp4 68.3 MB
  • 23 Monitoring and Auditing/003 Protocol Analyzers (OBJ 3.3 & 4.1).mp4 68.1 MB
  • 01 Overview of Security/003 Overview of Security.mp4 67.6 MB
  • 01 Overview of Security/006 Security Threats (OBJ 1.1 & 1.2).mp4 67.3 MB
  • 19 Authentication/007 VPN (OBJ 3.3).mp4 66.6 MB
  • 13 Cloud Security/002 Cloud Types (OBJ 2.2 & 3.6).mp4 66.3 MB
  • 31 Incident Response and Forensics/006 Demo_ Disk Imaging (OBJ 4.1).mp4 66.1 MB
  • 28 Planning for the Worst/009 Data Backup (OBJ 2.5).mp4 65.8 MB
  • 02 Malware/004 Trojans (OBJ 1.2).mp4 65.5 MB
  • 03 Malware Infections/004 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 65.5 MB
  • 23 Monitoring and Auditing/001 Monitoring Types (OBJ 3.3).mp4 65.5 MB
  • 06 Hardening/004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4 65.4 MB
  • 06 Hardening/003 Restricting Applications (OBJ 3.2 & 4.4).mp4 64.9 MB
  • 04 Security Applications and Devices/003 Demo_ Software Firewalls (OBJ 3.2).mp4 64.5 MB
  • 17 Physical Security/002 Surveillance (OBJ 2.7).mp4 63.7 MB
  • 01 Overview of Security/005 AAA of Security (OBJ 2.4).mp4 62.8 MB
  • 21 Risk Assessments/004 Methodologies (OBJ 1.7 & 5.4).mp4 62.3 MB
  • 02 Malware/007 Spyware (OBJ 1.2).mp4 61.0 MB
  • 01 Overview of Security/010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 60.8 MB
  • 08 Virtualization/002 Hypervisors (OBJ 2.2).mp4 60.2 MB
  • 26 Public Key Infrastructure/005 Web of Trust (OBJ 3.9).mp4 60.1 MB
  • 11 Network Design/007 Network Access Control (OBJ 3.3 & 4.4).mp4 59.4 MB
  • 06 Hardening/008 Group Policies (OBJ 2.1).mp4 59.2 MB
  • 01 Overview of Security/007 Mitigating Threats (OBJ 5.1).mp4 59.1 MB
  • 20 Access Control/006 Usernames and Passwords (OBJ 1.6 & 3.7).mp4 58.3 MB
  • 18 Facilities Security/004 Shielding (OBJ 2.7).mp4 57.9 MB
  • 21 Risk Assessments/006 __ Types of Risk (OBJ 1.6 & 5.4).mp4 57.4 MB
  • 27 Security Protocols/004 SSH (OBJ 3.1 & 4.1).mp4 57.0 MB
  • 11 Network Design/004 Routers (OBJ 3.3).mp4 57.0 MB
  • 19 Authentication/004 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4 56.3 MB
  • 13 Cloud Security/004 Cloud Security (OBJ 2.5 & 3.6).mp4 56.0 MB
  • 02 Malware/006 Ransomware (OBJ 1.2).mp4 56.0 MB
  • 18 Facilities Security/003 HVAC (OBJ 2.5, 2.6, & 2.7).mp4 55.8 MB
  • 23 Monitoring and Auditing/007 Demo_ Auditing Files (OBJ 1.7).mp4 55.4 MB
  • 11 Network Design/010 Network Address Translation (OBJ 3.3).mp4 55.2 MB
  • 15 Network Attacks/007 Stopping a DDoS (OBJ 2.1 & 2.3).mp4 55.0 MB
  • 04 Security Applications and Devices/010 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4 54.9 MB
  • 24 Cryptography/004 Public Key Cryptography (OBJ 2.8).mp4 54.9 MB
  • 13 Cloud Security/009 __ FAAS and Serverless (OBJ 2.2).mp4 53.8 MB
  • 26 Public Key Infrastructure/001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4 53.6 MB
  • 13 Cloud Security/006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4 53.4 MB
  • 28 Planning for the Worst/008 Redundant Sites (OBJ 2.1).mp4 53.2 MB
  • 03 Malware Infections/003 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 52.3 MB
  • 19 Authentication/008 RADIUS vs TACACS+ (OBJ 3.8).mp4 52.3 MB
  • 18 Facilities Security/008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4 52.0 MB
  • 10 Secure Software Development/010 __ XML Vulnerabilities (OBJ 1.3).mp4 51.7 MB
  • 23 Monitoring and Auditing/005 Demo_ Analytical Tools (OBJ 4.1).mp4 50.9 MB
  • 29 Social Engineering/003 Insider Threat (OBJ 1.5).mp4 50.7 MB
  • 14 Automation/002 __ CI_CD (OBJ 2.3).mp4 50.7 MB
  • 24 Cryptography/007 Key Management (OBJ 2.8).mp4 50.3 MB
  • 18 Facilities Security/007 __ Embedded System Vulnerabilities (OBJ 2.6).mp4 50.3 MB
  • 02 Malware/003 Worms (OBJ 1.2).mp4 50.2 MB
  • 18 Facilities Security/010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4 50.1 MB
  • 05 Mobile Device Security/005 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4 50.1 MB
  • 28 Planning for the Worst/001 Planning for the Worst (OBJ 2.5 & 5.4).mp4 50.1 MB
  • 28 Planning for the Worst/006 Network Redundancy (OBJ 2.5).mp4 48.9 MB
  • 08 Virtualization/001 Virtualization (OBJ 2.2).mp4 48.9 MB
  • 09 Application Security/004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4 48.3 MB
  • 02 Malware/010 Summary of Malware.mp4 46.8 MB
  • 19 Authentication/006 Remote Access Service (OBJ 3.1 & 3.8).mp4 46.6 MB
  • 18 Facilities Security/005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4 46.0 MB
  • 19 Authentication/009 Authentication Summary (OBJ 3.8).mp4 45.8 MB
  • 08 Virtualization/006 Demo_ Securing VMs.mp4 45.2 MB
  • 01 Overview of Security/011 __ Threat Hunting (OBJ 1.7).mp4 45.1 MB
  • 23 Monitoring and Auditing/006 Auditing (OBJ 1.7).mp4 44.8 MB
  • 06 Hardening/005 Trusted Operating System (OBJ 3.2).mp4 44.7 MB
  • 29 Social Engineering/007 __ Fraud and Scams (OBJ 1.1).mp4 44.7 MB
  • 07 Suppy Chain Management/001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4 44.7 MB
  • 23 Monitoring and Auditing/011 __ Syslog (OBJ 1.7 & 4.3).mp4 44.6 MB
  • 19 Authentication/010 __ Authentication Attacks (OBJ 1.2).mp4 44.5 MB
  • 24 Cryptography/009 Demo_ Steganography (OBJ 2.8).mp4 44.2 MB
  • 12 Perimeter Security/008 Unified Threat Management (OBJ 3.2 & 3.3).mp4 43.6 MB
  • 11 Network Design/009 Subnetting (OBJ 3.6).mp4 43.4 MB
  • 30 Policies and Procedures/005 __ Legal Requirements (OBJ 5.2 & 5.5).mp4 43.3 MB
  • 13 Cloud Security/010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4 43.0 MB
  • 20 Access Control/008 User Account Control (OBJ 3.7 & 3.8).mp4 42.8 MB
  • 13 Cloud Security/008 __ API (OBJ 2.1).mp4 42.6 MB
  • 03 Malware Infections/005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 42.6 MB
  • 19 Authentication/005 Remote Desktop Services (OBJ 3.1).mp4 42.3 MB
  • 29 Social Engineering/008 __ Influence Campaigns (OBJ 1.1).mp4 42.1 MB
  • 06 Hardening/001 Hardening (OBJ 3.2).mp4 41.6 MB
  • 03 Malware Infections/011 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 41.5 MB
  • 28 Planning for the Worst/005 Demo_ RAIDs (OBJ 2.5).mp4 41.2 MB
  • 16 Securing Networks/009 __ WPA3 (OBJ 3.4).mp4 41.0 MB
  • 22 Vulnerability Management/009 Demo_ Password Cracking (OBJ 4.1).mp4 40.9 MB
  • 08 Virtualization/003 Demo_ How to create a VM (OBJ 2.2).mp4 40.6 MB
  • 24 Cryptography/006 Pretty Good Privacy (OBJ 2.8).mp4 40.5 MB
  • 09 Application Security/001 Application Security.mp4 40.5 MB
  • 15 Network Attacks/011 Demo_ Null Sessions (OBJ 1.6).mp4 40.5 MB
  • 25 Hashing/002 Demo_ Hashing (OBJ 2.8).mp4 40.4 MB
  • 28 Planning for the Worst/007 Server Redundancy (OBJ 2.5 &3.3).mp4 40.2 MB
  • 30 Policies and Procedures/006 __ Privacy Technologies (OBJ 5.5).mp4 40.0 MB
  • 17 Physical Security/004 Demo_ Lock Picking (OBJ 2.7).mp4 38.5 MB
  • 12 Perimeter Security/006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4 37.1 MB
  • 11 Network Design/006 __ Jumpbox (OBJ 3.5).mp4 36.7 MB
  • 10 Secure Software Development/011 __ Race Conditions (OBJ 1.3).mp4 36.3 MB
  • 17 Physical Security/001 Physical Security (OBJ 2.7).mp4 35.6 MB
  • 15 Network Attacks/006 DDoS (OBJ 1.2, 1.3, & 1.4).mp4 35.4 MB
  • 05 Mobile Device Security/002 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4 35.2 MB
  • 11 Network Design/008 VLANs (OBJ 3.3).mp4 34.7 MB
  • 07 Suppy Chain Management/003 __ Trusted Firmware (OBJ 3.2).mp4 34.6 MB
  • 27 Security Protocols/002 S_MIME (OBJ 3.1).mp4 34.6 MB
  • 20 Access Control/007 Demo_ Policies (OBJ 3.7).mp4 34.6 MB
  • 22 Vulnerability Management/004 OVAL (OBJ 1.7).mp4 34.2 MB
  • 15 Network Attacks/014 ARP Poisoning (OBJ 1.4).mp4 34.1 MB
  • 22 Vulnerability Management/003 __ Training and Exercises (OBJ 1.8 & 4.2).mp4 34.1 MB
  • 15 Network Attacks/010 Replay Attack (OBJ 1.3).mp4 33.6 MB
  • 25 Hashing/004 Increasing Hash Security (OBJ 2.8 & 3.7).mp4 33.5 MB
  • 15 Network Attacks/012 Transitive Attacks (OBJ 2.4).mp4 33.2 MB
  • 14 Automation/003 __ DevSecOps (OBJ 2.3).mp4 32.9 MB
  • 07 Suppy Chain Management/002 __ Root of Trust (OBJ 3.2).mp4 32.6 MB
  • 06 Hardening/009 Demo_ Group Policies (OBJ 3.2).mp4 32.4 MB
  • 12 Perimeter Security/005 Honeypots and Honeynets (OBJ 2.1).mp4 32.2 MB
  • 13 Cloud Security/007 __ CASB (OBJ 2.1).mp4 31.3 MB
  • 18 Facilities Security/006 __ IoT Vulnerabilities (OBJ 2.6).mp4 31.1 MB
  • 14 Automation/004 __ IAC (OBJ 2.2).mp4 31.0 MB
  • 12 Perimeter Security/003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4 30.3 MB
  • 15 Network Attacks/008 Spoofing (OBJ 1.4 & 3.3).mp4 29.9 MB
  • 05 Mobile Device Security/001 Mobile Device Security (OBJ 1.5).mp4 29.8 MB
  • 26 Public Key Infrastructure/003 Demo_ Certificates (OBJ 2.8 & 3.9).mp4 29.3 MB
  • 10 Secure Software Development/012 __ Design Vulnerabilities (OBJ 1.3).mp4 28.2 MB
  • 27 Security Protocols/006 Demo_ Setting up a VPN (OBJ 3.3).mp4 26.0 MB
  • 30 Policies and Procedures/003 __ Data Ownership.mp4 25.8 MB
  • 07 Suppy Chain Management/004 __ Secure Processing (OBJ 3.2).mp4 25.7 MB
  • 14 Automation/001 __ Workflow Orchestration (OBJ 2.3).mp4 25.3 MB
  • 01 Overview of Security/002 CompTIA Security+ 601 Study Guide.pdf 24.0 MB
  • 18 Facilities Security/009 __ Mitigating Vulnerabilities (OBJ 2.6).mp4 23.3 MB
  • 23 Monitoring and Auditing/012 __ SOAR (OBJ 1.7 & 4.4).mp4 22.3 MB
  • 29 Social Engineering/001 Social Engineering (OBJ 1.1).mp4 20.7 MB
  • 01 Overview of Security/002 CompTIA-Security-Study-Notes 501.pdf 20.2 MB
  • 20 Access Control/001 Access Control (OBJ 3.8).mp4 19.5 MB
  • 16 Securing Networks/001 Securing Networks (OBJ 3.3).mp4 19.5 MB
  • 12 Perimeter Security/001 Perimeter Security.mp4 18.7 MB
  • 11 Network Design/001 Network Security.mp4 17.4 MB
  • 02 Malware/001 Malware (OBJ 1.2).mp4 15.7 MB
  • 15 Network Attacks/001 Network Attacks (OBJ 1.4).mp4 15.2 MB
  • 18 Facilities Security/001 Facilities Security (OBJ 2.7).mp4 14.6 MB
  • 04 Security Applications and Devices/001 Security Applications and Devices.mp4 13.4 MB
  • 27 Security Protocols/001 Security Protocols (OBJ 3.1).mp4 9.1 MB
  • 31 Incident Response and Forensics/002 __ Incident Response Planning (OBJ 4.2).en.srt 42.7 kB
  • 31 Incident Response and Forensics/007 __ Security Tools (OBJ 4.1).en.srt 37.9 kB
  • 28 Planning for the Worst/012 __ Business Impact Analysis (OBJ 5.4).en.srt 36.0 kB
  • 31 Incident Response and Forensics/004 __ Forensic Procedures (OBJ 4.5).en.srt 33.2 kB
  • 31 Incident Response and Forensics/003 __ Investigative Data (OBJ 4.3).en.srt 28.9 kB
  • 24 Cryptography/010 __ Cryptography Considerations (OBJ 2.8).en.srt 28.1 kB
  • 01 Overview of Security/012 __ Attack Frameworks (OBJ 4.2).en.srt 25.3 kB
  • 30 Policies and Procedures/007 Security Policies (OBJ 5.3 & 5.5).en.srt 24.8 kB
  • 15 Network Attacks/003 Memorization of Ports (OBJ 3.1).en.srt 22.9 kB
  • 32 Conclusion/001 Conclusion.en.srt 22.5 kB
  • 20 Access Control/004 Users and Groups (OBJ 3.7 & 3.8).en.srt 21.5 kB
  • 20 Access Control/002 Access Control Models (OBJ 3.8).en.srt 20.2 kB
  • 01 Overview of Security/010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt 20.1 kB
  • 22 Vulnerability Management/007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt 19.9 kB
  • 14 Automation/005 __ Machine Learning (OBJ 1.2).en.srt 19.8 kB
  • 21 Risk Assessments/001 Risk Assessments (OBJ 5.4).en.srt 19.7 kB
  • 23 Monitoring and Auditing/010 SIEM (OBJ 1.7 & 4.3).en.srt 19.5 kB
  • 16 Securing Networks/003 Securing Network Media (OBJ 2.7).en.srt 19.4 kB
  • 31 Incident Response and Forensics/005 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt 19.2 kB
  • 10 Secure Software Development/001 Software Development (OBJ 2.1 & 2.3).en.srt 18.9 kB
  • 13 Cloud Security/010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt 18.7 kB
  • 13 Cloud Security/009 __ FAAS and Serverless (OBJ 2.2).en.srt 18.6 kB
  • 30 Policies and Procedures/012 __ Key Frameworks (OBJ 5.2).en.srt 18.4 kB
  • 18 Facilities Security/008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt 18.4 kB
  • 30 Policies and Procedures/009 Vendor Relationships (OBJ 5.3).en.srt 18.1 kB
  • 22 Vulnerability Management/001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt 18.1 kB
  • 15 Network Attacks/005 Denial of Service (OBJ 1.3 & 1.4).en.srt 18.0 kB
  • 03 Malware Infections/011 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt 17.8 kB
  • 12 Perimeter Security/002 Firewalls (OBJ 3.3 & 4.4).en.srt 17.4 kB
  • 29 Social Engineering/005 __ Motivation Factors (OBJ 1.1).en.srt 17.0 kB
  • 19 Authentication/010 __ Authentication Attacks (OBJ 1.2).en.srt 16.9 kB
  • 13 Cloud Security/006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt 16.6 kB
  • 25 Hashing/001 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt 16.6 kB
  • 14 Automation/002 __ CI_CD (OBJ 2.3).en.srt 16.6 kB
  • 16 Securing Networks/006 Wireless Access Points (OBJ 1.4 & 3.4).en.srt 16.4 kB
  • 21 Risk Assessments/006 __ Types of Risk (OBJ 1.6 & 5.4).en.srt 16.4 kB
  • 18 Facilities Security/007 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt 16.0 kB
  • 30 Policies and Procedures/002 Data Classifications (OBJ 5.3 & 5.5).en.srt 15.9 kB
  • 13 Cloud Security/003 As a Service (OBJ 2.2).en.srt 15.8 kB
  • 22 Vulnerability Management/006 Demo_ Nmap Scanning (OBJ 4.1).en.srt 15.7 kB
  • 01 Overview of Security/011 __ Threat Hunting (OBJ 1.7).en.srt 15.6 kB
  • 22 Vulnerability Management/005 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt 15.6 kB
  • 16 Securing Networks/002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt 15.6 kB
  • 26 Public Key Infrastructure/002 Digital Certificates (OBJ 3.9).en.srt 15.4 kB
  • 21 Risk Assessments/005 Security Controls (OBJ 5.1).en.srt 15.3 kB
  • 09 Application Security/002 Web Browser Security (OBJ 3.2 & 3.3).en.srt 15.1 kB
  • 30 Policies and Procedures/006 __ Privacy Technologies (OBJ 5.5).en.srt 15.1 kB
  • 10 Secure Software Development/003 Testing Methods (OBJ 2.3 & 3.2).en.srt 14.6 kB
  • 18 Facilities Security/010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt 14.6 kB
  • 29 Social Engineering/004 Phishing (OBJ 1.1 & 5.3).en.srt 14.5 kB
  • 19 Authentication/001 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt 14.4 kB
  • 16 Securing Networks/010 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt 14.1 kB
  • 27 Security Protocols/005 VPN Protocols (OBJ 3.1 & 3..3).en.srt 14.1 kB
  • 31 Incident Response and Forensics/006 Demo_ Disk Imaging (OBJ 4.1).en.srt 13.9 kB
  • 20 Access Control/003 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt 13.9 kB
  • 04 Security Applications and Devices/003 Demo_ Software Firewalls (OBJ 3.2).en.srt 13.8 kB
  • 28 Planning for the Worst/011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt 13.8 kB
  • 10 Secure Software Development/009 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt 13.8 kB
  • 13 Cloud Security/008 __ API (OBJ 2.1).en.srt 13.7 kB
  • 16 Securing Networks/008 Demo_ Wireless Attack (OBJ 1.4).en.srt 13.7 kB
  • 05 Mobile Device Security/003 Mobile Malware (OBJ 1.1 & 3.5).en.srt 13.7 kB
  • 18 Facilities Security/002 Fire Suppression (OBJ 2.7).en.srt 13.6 kB
  • 30 Policies and Procedures/004 PII and PHI (OBJ 5.2 & 5.5).en.srt 13.5 kB
  • 10 Secure Software Development/002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt 13.4 kB
  • 11 Network Design/011 Telephony (OBJ 3.1).en.srt 13.4 kB
  • 22 Vulnerability Management/008 Password Analysis (OBJ 1.2).en.srt 13.4 kB
  • 10 Secure Software Development/005 Buffer Overflows (OBJ 1.3).en.srt 13.2 kB
  • 10 Secure Software Development/011 __ Race Conditions (OBJ 1.3).en.srt 13.2 kB
  • 30 Policies and Procedures/005 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt 13.2 kB
  • 11 Network Design/006 __ Jumpbox (OBJ 3.5).en.srt 13.2 kB
  • 30 Policies and Procedures/001 Policies and Procedures (OBJ 5.2 & 5.3).en.srt 13.1 kB
  • 02 Malware/005 Demo_ Viruses and Trojans (OBJ 1.2).en.srt 13.0 kB
  • 02 Malware/002 Viruses (OBJ 1.2).en.srt 13.0 kB
  • 24 Cryptography/002 Symmetric vs Asymmetric (OBJ 2.8).en.srt 13.0 kB
  • 10 Secure Software Development/008 SQL Injection (OBJ 1.3).en.srt 12.9 kB
  • 07 Suppy Chain Management/001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt 12.9 kB
  • 11 Network Design/002 The OSI Model (OBJ 3.3 & 3.6).en.srt 12.7 kB
  • 23 Monitoring and Auditing/011 __ Syslog (OBJ 1.7 & 4.3).en.srt 12.6 kB
  • 30 Policies and Procedures/010 Disposal Policies (OBJ 2.7 & 4.1).en.srt 12.6 kB
  • 03 Malware Infections/010 Preventing Malware (OBJ 1.6 & 3.2).en.srt 12.5 kB
  • 16 Securing Networks/009 __ WPA3 (OBJ 3.4).en.srt 12.4 kB
  • 04 Security Applications and Devices/010 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt 12.3 kB
  • 10 Secure Software Development/006 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt 12.3 kB
  • 29 Social Engineering/007 __ Fraud and Scams (OBJ 1.1).en.srt 12.2 kB
  • 27 Security Protocols/003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt 12.1 kB
  • 16 Securing Networks/005 Wireless Encryption (OBJ 1.6 & 3.4).en.srt 11.9 kB
  • 01 Overview of Security/001 Welcome.en.srt 11.8 kB
  • 24 Cryptography/001 Cryptography (OBJ 2.1 & 2.8).en.srt 11.8 kB
  • 14 Automation/003 __ DevSecOps (OBJ 2.3).en.srt 11.6 kB
  • 03 Malware Infections/006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt 11.6 kB
  • 29 Social Engineering/002 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt 11.5 kB
  • 23 Monitoring and Auditing/009 Log Files (OBJ 4.3).en.srt 11.5 kB
  • 22 Vulnerability Management/003 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt 11.5 kB
  • 21 Risk Assessments/003 Quantitative Risk (OBJ 5.4).en.srt 11.4 kB
  • 03 Malware Infections/003 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt 11.4 kB
  • 29 Social Engineering/009 User Education (OBJ 5.3).en.srt 11.3 kB
  • 07 Suppy Chain Management/003 __ Trusted Firmware (OBJ 3.2).en.srt 11.3 kB
  • 10 Secure Software Development/010 __ XML Vulnerabilities (OBJ 1.3).en.srt 11.2 kB
  • 09 Application Security/004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt 11.2 kB
  • 19 Authentication/002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt 11.2 kB
  • 03 Malware Infections/009 Removing Malware (OBJ 4.2).en.srt 11.0 kB
  • 06 Hardening/004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt 11.0 kB
  • 31 Incident Response and Forensics/001 Incident Response Procedures (OBJ 4.2).en.srt 10.9 kB
  • 05 Mobile Device Security/007 Security of Apps (OBJ 3.1 & 3.5).en.srt 10.7 kB
  • 23 Monitoring and Auditing/002 Performance Baselining (OBJ 2.1).en.srt 10.7 kB
  • 04 Security Applications and Devices/004 IDS (OBJ 3.2 & 3.3).en.srt 10.5 kB
  • 05 Mobile Device Security/008 BYOD (OBJ 3.5).en.srt 10.4 kB
  • 22 Vulnerability Management/002 Penetration Testing (OBJ 1.8).en.srt 10.4 kB
  • 07 Suppy Chain Management/002 __ Root of Trust (OBJ 3.2).en.srt 10.3 kB
  • 16 Securing Networks/004 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt 10.2 kB
  • 01 Overview of Security/008 Hackers (OBJ 1.5).en.srt 10.2 kB
  • 20 Access Control/007 Demo_ Policies (OBJ 3.7).en.srt 10.2 kB
  • 13 Cloud Security/005 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt 10.1 kB
  • 13 Cloud Security/007 __ CASB (OBJ 2.1).en.srt 10.1 kB
  • 15 Network Attacks/013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt 10.1 kB
  • 16 Securing Networks/007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt 10.0 kB
  • 14 Automation/004 __ IAC (OBJ 2.2).en.srt 10.0 kB
  • 09 Application Security/005 Securing Applications (OBJ 1.4 & 3.2).en.srt 9.8 kB
  • 28 Planning for the Worst/004 Data Redundancy (OBJ 2.5).en.srt 9.8 kB
  • 24 Cryptography/003 Symmetric Algorithms (OBJ 2.8).en.srt 9.8 kB
  • 21 Risk Assessments/002 Qualitative Risk (OBJ 5.4).en.srt 9.8 kB
  • 10 Secure Software Development/012 __ Design Vulnerabilities (OBJ 1.3).en.srt 9.7 kB
  • 23 Monitoring and Auditing/005 Demo_ Analytical Tools (OBJ 4.1).en.srt 9.5 kB
  • 30 Policies and Procedures/008 User Education (OBJ 5.3).en.srt 9.5 kB
  • 24 Cryptography/008 One-Time Pad (OBJ 2.8).en.srt 9.5 kB
  • 03 Malware Infections/002 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt 9.5 kB
  • 12 Perimeter Security/007 NIDS and NIPS (OBJ 3.3).en.srt 9.4 kB
  • 14 Automation/001 __ Workflow Orchestration (OBJ 2.3).en.srt 9.4 kB
  • 04 Security Applications and Devices/009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt 9.3 kB
  • 17 Physical Security/005 Biometric Readers (OBJ 2.4).en.srt 9.3 kB
  • 29 Social Engineering/008 __ Influence Campaigns (OBJ 1.1).en.srt 9.3 kB
  • 12 Perimeter Security/004 Proxy Servers (OBJ 3.3 & 4.4).en.srt 9.3 kB
  • 17 Physical Security/003 Door Locks (OBJ 2.7).en.srt 9.3 kB
  • 29 Social Engineering/006 More Social Engineering (OBJ 1.1 & 1.2).en.srt 9.2 kB
  • 26 Public Key Infrastructure/004 Certificate Authorities (OBJ 3.2 & 3.9).en.srt 9.1 kB
  • 15 Network Attacks/002 Ports and Protocols (OBJ 3.1).en.srt 9.1 kB
  • 08 Virtualization/006 Demo_ Securing VMs.en.srt 9.0 kB
  • 30 Policies and Procedures/003 __ Data Ownership.en.srt 9.0 kB
  • 03 Malware Infections/008 Symptoms of Infection (OBJ 1.2).en.srt 8.9 kB
  • 32 Conclusion/002 BONUS_ What's Next_.en.srt 8.8 kB
  • 07 Suppy Chain Management/004 __ Secure Processing (OBJ 3.2).en.srt 8.7 kB
  • 20 Access Control/005 Permissions (OBJ 3.8).en.srt 8.7 kB
  • 03 Malware Infections/001 Malware Infections.en.srt 8.7 kB
  • 15 Network Attacks/009 Hijacking (OBJ 1.3 & 1.4).en.srt 8.7 kB
  • 28 Planning for the Worst/010 Tape Rotation (OBJ 2.5).en.srt 8.7 kB
  • 05 Mobile Device Security/004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt 8.5 kB
  • 18 Facilities Security/006 __ IoT Vulnerabilities (OBJ 2.6).en.srt 8.4 kB
  • 01 Overview of Security/004 CIA Triad.en.srt 8.4 kB
  • 12 Perimeter Security/003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt 8.4 kB
  • 04 Security Applications and Devices/002 Software Firewalls (OBJ 3.2).en.srt 8.4 kB
  • 04 Security Applications and Devices/007 Securing the BIOS (OBJ 3.2).en.srt 8.3 kB
  • 24 Cryptography/009 Demo_ Steganography (OBJ 2.8).en.srt 8.2 kB
  • 18 Facilities Security/009 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt 8.2 kB
  • 08 Virtualization/003 Demo_ How to create a VM (OBJ 2.2).en.srt 8.2 kB
  • 03 Malware Infections/007 Backdoors and Logic Bombs (OBJ 1.2).en.srt 8.1 kB
  • 23 Monitoring and Auditing/008 Logging (OBJ 1.7, 4.3, & 4.5).en.srt 8.1 kB
  • 06 Hardening/009 Demo_ Group Policies (OBJ 3.2).en.srt 8.1 kB
  • 13 Cloud Security/001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt 8.0 kB
  • 08 Virtualization/005 Securing VMs (OBJ 2.2).en.srt 8.0 kB
  • 04 Security Applications and Devices/006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt 7.9 kB
  • 23 Monitoring and Auditing/004 SNMP (OBJ 3.1).en.srt 7.9 kB
  • 10 Secure Software Development/004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt 7.9 kB
  • 23 Monitoring and Auditing/007 Demo_ Auditing Files (OBJ 1.7).en.srt 7.8 kB
  • 26 Public Key Infrastructure/001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt 7.8 kB
  • 06 Hardening/007 Patch Management (OBJ 1.6 & 3.2).en.srt 7.8 kB
  • 28 Planning for the Worst/005 Demo_ RAIDs (OBJ 2.5).en.srt 7.8 kB
  • 23 Monitoring and Auditing/012 __ SOAR (OBJ 1.7 & 4.4).en.srt 7.7 kB
  • 08 Virtualization/004 Threats to VMs (OBJ 2.2).en.srt 7.6 kB
  • 24 Cryptography/005 Asymmetric Algorithms (OBJ 2.8).en.srt 7.6 kB
  • 19 Authentication/003 802.1x (OBJ 3.4 & 3.8).en.srt 7.6 kB
  • 11 Network Design/003 Switches (OBJ 1.4 & 2.7).en.srt 7.6 kB
  • 15 Network Attacks/004 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt 7.5 kB
  • 28 Planning for the Worst/003 Backup Power (OBJ 2.5).en.srt 7.5 kB
  • 05 Mobile Device Security/009 Hardening Mobile Devices (OBJ 3.5).en.srt 7.4 kB
  • 03 Malware Infections/004 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt 7.3 kB
  • 30 Policies and Procedures/011 IT Security Frameworks (OBJ 5.2).en.srt 7.3 kB
  • 11 Network Design/005 Network Zones (OBJ 3.3).en.srt 7.2 kB
  • 09 Application Security/003 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt 7.2 kB
  • 28 Planning for the Worst/002 Redundant Power (OBJ 2.5).en.srt 7.2 kB
  • 25 Hashing/003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt 7.1 kB
  • 02 Malware/008 Rootkits (OBJ 1.2 & 1.3).en.srt 7.0 kB
  • 04 Security Applications and Devices/008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt 6.9 kB
  • 24 Cryptography/004 Public Key Cryptography (OBJ 2.8).en.srt 6.9 kB
  • 01 Overview of Security/005 AAA of Security (OBJ 2.4).en.srt 6.9 kB
  • 26 Public Key Infrastructure/003 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt 6.9 kB
  • 04 Security Applications and Devices/005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt 6.8 kB
  • 06 Hardening/006 Updates and Patches (OBJ 1.6 & 3.2).en.srt 6.8 kB
  • 05 Mobile Device Security/006 Mobile Device Theft (OBJ 3.5).en.srt 6.7 kB
  • 01 Overview of Security/009 Threat Actors (1.5).en.srt 6.6 kB
  • 19 Authentication/007 VPN (OBJ 3.3).en.srt 6.6 kB
  • 01 Overview of Security/003 Overview of Security.en.srt 6.6 kB
  • 10 Secure Software Development/007 XSS and XSRF (OBJ 1.3).en.srt 6.6 kB
  • 23 Monitoring and Auditing/003 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt 6.6 kB
  • 17 Physical Security/002 Surveillance (OBJ 2.7).en.srt 6.5 kB
  • 06 Hardening/010 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt 6.4 kB
  • 28 Planning for the Worst/009 Data Backup (OBJ 2.5).en.srt 6.4 kB
  • 21 Risk Assessments/004 Methodologies (OBJ 1.7 & 5.4).en.srt 6.4 kB
  • 06 Hardening/002 Unnecessary Applications (OBJ 1.6).en.srt 6.4 kB
  • 23 Monitoring and Auditing/001 Monitoring Types (OBJ 3.3).en.srt 6.3 kB
  • 06 Hardening/003 Restricting Applications (OBJ 3.2 & 4.4).en.srt 6.1 kB
  • 26 Public Key Infrastructure/005 Web of Trust (OBJ 3.9).en.srt 6.1 kB
  • 01 Overview of Security/006 Security Threats (OBJ 1.1 & 1.2).en.srt 6.1 kB
  • 02 Malware/009 Spam (OBJ 1.1).en.srt 6.0 kB
  • 11 Network Design/007 Network Access Control (OBJ 3.3 & 4.4).en.srt 5.9 kB
  • 20 Access Control/006 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt 5.9 kB
  • 13 Cloud Security/002 Cloud Types (OBJ 2.2 & 3.6).en.srt 5.8 kB
  • 01 Overview of Security/007 Mitigating Threats (OBJ 5.1).en.srt 5.8 kB
  • 25 Hashing/002 Demo_ Hashing (OBJ 2.8).en.srt 5.7 kB
  • 02 Malware/007 Spyware (OBJ 1.2).en.srt 5.6 kB
  • 28 Planning for the Worst/008 Redundant Sites (OBJ 2.1).en.srt 5.6 kB
  • 18 Facilities Security/004 Shielding (OBJ 2.7).en.srt 5.5 kB
  • 27 Security Protocols/004 SSH (OBJ 3.1 & 4.1).en.srt 5.5 kB
  • 02 Malware/004 Trojans (OBJ 1.2).en.srt 5.5 kB
  • 15 Network Attacks/007 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt 5.4 kB
  • 03 Malware Infections/005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt 5.4 kB
  • 13 Cloud Security/004 Cloud Security (OBJ 2.5 & 3.6).en.srt 5.3 kB
  • 11 Network Design/004 Routers (OBJ 3.3).en.srt 5.2 kB
  • 24 Cryptography/007 Key Management (OBJ 2.8).en.srt 5.2 kB
  • 18 Facilities Security/003 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt 5.2 kB
  • 08 Virtualization/002 Hypervisors (OBJ 2.2).en.srt 5.1 kB
  • 29 Social Engineering/003 Insider Threat (OBJ 1.5).en.srt 5.1 kB
  • 02 Malware/006 Ransomware (OBJ 1.2).en.srt 5.1 kB
  • 19 Authentication/004 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt 5.0 kB
  • 06 Hardening/008 Group Policies (OBJ 2.1).en.srt 5.0 kB
  • 28 Planning for the Worst/001 Planning for the Worst (OBJ 2.5 & 5.4).en.srt 5.0 kB
  • 15 Network Attacks/011 Demo_ Null Sessions (OBJ 1.6).en.srt 5.0 kB
  • 11 Network Design/010 Network Address Translation (OBJ 3.3).en.srt 5.0 kB
  • 22 Vulnerability Management/009 Demo_ Password Cracking (OBJ 4.1).en.srt 4.9 kB
  • 28 Planning for the Worst/006 Network Redundancy (OBJ 2.5).en.srt 4.9 kB
  • 18 Facilities Security/005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt 4.7 kB
  • 19 Authentication/008 RADIUS vs TACACS+ (OBJ 3.8).en.srt 4.6 kB
  • 08 Virtualization/001 Virtualization (OBJ 2.2).en.srt 4.4 kB
  • 20 Access Control/008 User Account Control (OBJ 3.7 & 3.8).en.srt 4.4 kB
  • 19 Authentication/006 Remote Access Service (OBJ 3.1 & 3.8).en.srt 4.4 kB
  • 23 Monitoring and Auditing/006 Auditing (OBJ 1.7).en.srt 4.3 kB
  • 02 Malware/003 Worms (OBJ 1.2).en.srt 4.3 kB
  • 02 Malware/010 Summary of Malware.en.srt 4.3 kB
  • 11 Network Design/009 Subnetting (OBJ 3.6).en.srt 4.3 kB
  • 05 Mobile Device Security/005 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt 4.2 kB
  • 06 Hardening/005 Trusted Operating System (OBJ 3.2).en.srt 3.8 kB
  • 12 Perimeter Security/008 Unified Threat Management (OBJ 3.2 & 3.3).en.srt 3.8 kB
  • 28 Planning for the Worst/007 Server Redundancy (OBJ 2.5 &3.3).en.srt 3.8 kB
  • 19 Authentication/005 Remote Desktop Services (OBJ 3.1).en.srt 3.8 kB
  • 19 Authentication/009 Authentication Summary (OBJ 3.8).en.srt 3.7 kB
  • 17 Physical Security/001 Physical Security (OBJ 2.7).en.srt 3.7 kB
  • 09 Application Security/001 Application Security.en.srt 3.6 kB
  • 06 Hardening/001 Hardening (OBJ 3.2).en.srt 3.6 kB
  • 22 Vulnerability Management/004 OVAL (OBJ 1.7).en.srt 3.5 kB
  • 17 Physical Security/004 Demo_ Lock Picking (OBJ 2.7).en.srt 3.5 kB
  • 15 Network Attacks/006 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt 3.4 kB
  • 15 Network Attacks/014 ARP Poisoning (OBJ 1.4).en.srt 3.3 kB
  • 24 Cryptography/006 Pretty Good Privacy (OBJ 2.8).en.srt 3.3 kB
  • 15 Network Attacks/010 Replay Attack (OBJ 1.3).en.srt 3.3 kB
  • 12 Perimeter Security/006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt 3.3 kB
  • 27 Security Protocols/006 Demo_ Setting up a VPN (OBJ 3.3).en.srt 3.3 kB
  • 15 Network Attacks/012 Transitive Attacks (OBJ 2.4).en.srt 3.3 kB
  • 25 Hashing/004 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt 3.3 kB
  • 27 Security Protocols/002 S_MIME (OBJ 3.1).en.srt 3.2 kB
  • 11 Network Design/008 VLANs (OBJ 3.3).en.srt 3.1 kB
  • 12 Perimeter Security/005 Honeypots and Honeynets (OBJ 2.1).en.srt 3.0 kB
  • 15 Network Attacks/008 Spoofing (OBJ 1.4 & 3.3).en.srt 2.9 kB
  • 05 Mobile Device Security/002 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt 2.8 kB
  • 05 Mobile Device Security/001 Mobile Device Security (OBJ 1.5).en.srt 2.7 kB
  • 20 Access Control/001 Access Control (OBJ 3.8).en.srt 2.2 kB
  • 16 Securing Networks/001 Securing Networks (OBJ 3.3).en.srt 2.0 kB
  • 29 Social Engineering/001 Social Engineering (OBJ 1.1).en.srt 2.0 kB
  • 12 Perimeter Security/001 Perimeter Security.en.srt 1.8 kB
  • 11 Network Design/001 Network Security.en.srt 1.7 kB
  • 18 Facilities Security/001 Facilities Security (OBJ 2.7).en.srt 1.4 kB
  • 15 Network Attacks/001 Network Attacks (OBJ 1.4).en.srt 1.4 kB
  • 02 Malware/001 Malware (OBJ 1.2).en.srt 1.2 kB
  • 04 Security Applications and Devices/001 Security Applications and Devices.en.srt 1.2 kB
  • 01 Overview of Security/002 Download the Study Guide.html 1.1 kB
  • 27 Security Protocols/001 Security Protocols (OBJ 3.1).en.srt 779 Bytes
  • 32 Conclusion/external-assets-links.txt 151 Bytes
  • udemy-dl.log 0 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!