搜索
[Udemy] CompTIA Security+ (SY0-501 & SY0-601) Complete Course
磁力链接/BT种子名称
[Udemy] CompTIA Security+ (SY0-501 & SY0-601) Complete Course
磁力链接/BT种子简介
种子哈希:
0befa4bd9edc2eb399bc092f958e1b2f72e6a228
文件大小:
20.23G
已经下载:
4973
次
下载速度:
极快
收录时间:
2021-04-01
最近下载:
2024-11-06
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:0BEFA4BD9EDC2EB399BC092F958E1B2F72E6A228
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
鬼灭之刃柱
内射白富美
hakata
捉奸
pathaam valavu
推油阴部
重开
激情社区
快剪辑
被俘的巫女姐妹花+为什么催眠我+妈妈的噩梦
李宗瑞+贝贝
网红+乳头
e奶
enterprise
母子中字
一路顺疯
骚飘飘专业搞鸡合集
男捆绑
明星流出事件
学母
thai ladyboy girl
6.avi
舞蹈 定制
玩物上志
电话
绅士精选+洛丽塔+汉服+旗袍
小妹纹身
韩国情侣
舞蹈
copycat
文件列表
15 Network Attacks/003 Memorization of Ports (OBJ 3.1).mp4
250.0 MB
30 Policies and Procedures/007 Security Policies (OBJ 5.3 & 5.5).mp4
236.3 MB
32 Conclusion/001 Conclusion.mp4
222.4 MB
20 Access Control/004 Users and Groups (OBJ 3.7 & 3.8).mp4
211.2 MB
16 Securing Networks/003 Securing Network Media (OBJ 2.7).mp4
199.2 MB
10 Secure Software Development/001 Software Development (OBJ 2.1 & 2.3).mp4
197.9 MB
21 Risk Assessments/001 Risk Assessments (OBJ 5.4).mp4
197.8 MB
20 Access Control/002 Access Control Models (OBJ 3.8).mp4
184.7 MB
12 Perimeter Security/002 Firewalls (OBJ 3.3 & 4.4).mp4
183.8 MB
22 Vulnerability Management/001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4
180.0 MB
15 Network Attacks/005 Denial of Service (OBJ 1.3 & 1.4).mp4
178.5 MB
30 Policies and Procedures/009 Vendor Relationships (OBJ 5.3).mp4
175.3 MB
25 Hashing/001 Hashing (OBJ 1.2, 2.8 & 3.2).mp4
174.2 MB
29 Social Engineering/005 __ Motivation Factors (OBJ 1.1).mp4
166.8 MB
13 Cloud Security/003 As a Service (OBJ 2.2).mp4
161.9 MB
10 Secure Software Development/003 Testing Methods (OBJ 2.3 & 3.2).mp4
158.4 MB
21 Risk Assessments/005 Security Controls (OBJ 5.1).mp4
156.3 MB
16 Securing Networks/002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4
153.9 MB
30 Policies and Procedures/002 Data Classifications (OBJ 5.3 & 5.5).mp4
152.4 MB
09 Application Security/002 Web Browser Security (OBJ 3.2 & 3.3).mp4
152.2 MB
26 Public Key Infrastructure/002 Digital Certificates (OBJ 3.9).mp4
151.5 MB
10 Secure Software Development/008 SQL Injection (OBJ 1.3).mp4
148.3 MB
27 Security Protocols/005 VPN Protocols (OBJ 3.1 & 3..3).mp4
148.2 MB
22 Vulnerability Management/005 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4
146.3 MB
05 Mobile Device Security/003 Mobile Malware (OBJ 1.1 & 3.5).mp4
146.3 MB
18 Facilities Security/002 Fire Suppression (OBJ 2.7).mp4
145.4 MB
31 Incident Response and Forensics/007 __ Security Tools (OBJ 4.1).mp4
143.9 MB
10 Secure Software Development/002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4
143.6 MB
16 Securing Networks/006 Wireless Access Points (OBJ 1.4 & 3.4).mp4
143.3 MB
29 Social Engineering/004 Phishing (OBJ 1.1 & 5.3).mp4
142.4 MB
10 Secure Software Development/005 Buffer Overflows (OBJ 1.3).mp4
142.2 MB
02 Malware/002 Viruses (OBJ 1.2).mp4
141.2 MB
30 Policies and Procedures/004 PII and PHI (OBJ 5.2 & 5.5).mp4
140.5 MB
24 Cryptography/002 Symmetric vs Asymmetric (OBJ 2.8).mp4
140.5 MB
16 Securing Networks/010 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4
138.6 MB
11 Network Design/011 Telephony (OBJ 3.1).mp4
137.0 MB
19 Authentication/001 Authentication (OBJ 2.4, 3.5, & 3.8).mp4
136.0 MB
03 Malware Infections/010 Preventing Malware (OBJ 1.6 & 3.2).mp4
135.1 MB
11 Network Design/002 The OSI Model (OBJ 3.3 & 3.6).mp4
134.8 MB
22 Vulnerability Management/008 Password Analysis (OBJ 1.2).mp4
133.6 MB
30 Policies and Procedures/001 Policies and Procedures (OBJ 5.2 & 5.3).mp4
132.8 MB
20 Access Control/003 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4
132.3 MB
28 Planning for the Worst/011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4
129.2 MB
27 Security Protocols/003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4
127.6 MB
16 Securing Networks/005 Wireless Encryption (OBJ 1.6 & 3.4).mp4
126.1 MB
21 Risk Assessments/003 Quantitative Risk (OBJ 5.4).mp4
125.8 MB
28 Planning for the Worst/012 __ Business Impact Analysis (OBJ 5.4).mp4
124.1 MB
23 Monitoring and Auditing/009 Log Files (OBJ 4.3).mp4
120.4 MB
31 Incident Response and Forensics/002 __ Incident Response Planning (OBJ 4.2).mp4
118.8 MB
19 Authentication/002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4
118.2 MB
30 Policies and Procedures/010 Disposal Policies (OBJ 2.7 & 4.1).mp4
115.4 MB
05 Mobile Device Security/007 Security of Apps (OBJ 3.1 & 3.5).mp4
114.7 MB
03 Malware Infections/009 Removing Malware (OBJ 4.2).mp4
113.6 MB
24 Cryptography/001 Cryptography (OBJ 2.1 & 2.8).mp4
113.2 MB
05 Mobile Device Security/008 BYOD (OBJ 3.5).mp4
112.9 MB
04 Security Applications and Devices/009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4
111.9 MB
04 Security Applications and Devices/004 IDS (OBJ 3.2 & 3.3).mp4
110.9 MB
29 Social Engineering/009 User Education (OBJ 5.3).mp4
110.4 MB
01 Overview of Security/008 Hackers (OBJ 1.5).mp4
110.0 MB
24 Cryptography/003 Symmetric Algorithms (OBJ 2.8).mp4
108.4 MB
16 Securing Networks/008 Demo_ Wireless Attack (OBJ 1.4).mp4
108.3 MB
23 Monitoring and Auditing/002 Performance Baselining (OBJ 2.1).mp4
107.4 MB
10 Secure Software Development/006 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4
106.7 MB
09 Application Security/005 Securing Applications (OBJ 1.4 & 3.2).mp4
106.4 MB
31 Incident Response and Forensics/005 Data Collection Procedures (OBJ 4.1 & 4.5).mp4
106.1 MB
28 Planning for the Worst/004 Data Redundancy (OBJ 2.5).mp4
105.2 MB
13 Cloud Security/005 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4
104.4 MB
31 Incident Response and Forensics/001 Incident Response Procedures (OBJ 4.2).mp4
103.9 MB
22 Vulnerability Management/002 Penetration Testing (OBJ 1.8).mp4
103.2 MB
22 Vulnerability Management/006 Demo_ Nmap Scanning (OBJ 4.1).mp4
102.0 MB
16 Securing Networks/004 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4
101.7 MB
03 Malware Infections/002 Common Delivery Methods (OBJ 1.1 & 1.5).mp4
101.6 MB
22 Vulnerability Management/007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4
101.3 MB
15 Network Attacks/013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4
100.9 MB
15 Network Attacks/002 Ports and Protocols (OBJ 3.1).mp4
100.4 MB
24 Cryptography/008 One-Time Pad (OBJ 2.8).mp4
99.1 MB
29 Social Engineering/002 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4
98.6 MB
03 Malware Infections/001 Malware Infections.mp4
97.7 MB
12 Perimeter Security/007 NIDS and NIPS (OBJ 3.3).mp4
96.9 MB
17 Physical Security/005 Biometric Readers (OBJ 2.4).mp4
96.6 MB
12 Perimeter Security/004 Proxy Servers (OBJ 3.3 & 4.4).mp4
96.1 MB
02 Malware/005 Demo_ Viruses and Trojans (OBJ 1.2).mp4
96.0 MB
21 Risk Assessments/002 Qualitative Risk (OBJ 5.4).mp4
95.9 MB
16 Securing Networks/007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4
95.9 MB
04 Security Applications and Devices/002 Software Firewalls (OBJ 3.2).mp4
95.9 MB
01 Overview of Security/001 Welcome.mp4
95.8 MB
03 Malware Infections/008 Symptoms of Infection (OBJ 1.2).mp4
95.8 MB
26 Public Key Infrastructure/004 Certificate Authorities (OBJ 3.2 & 3.9).mp4
94.2 MB
30 Policies and Procedures/008 User Education (OBJ 5.3).mp4
93.2 MB
29 Social Engineering/006 More Social Engineering (OBJ 1.1 & 1.2).mp4
92.4 MB
01 Overview of Security/012 __ Attack Frameworks (OBJ 4.2).mp4
91.9 MB
05 Mobile Device Security/004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4
90.9 MB
04 Security Applications and Devices/007 Securing the BIOS (OBJ 3.2).mp4
90.4 MB
28 Planning for the Worst/010 Tape Rotation (OBJ 2.5).mp4
89.3 MB
17 Physical Security/003 Door Locks (OBJ 2.7).mp4
89.1 MB
03 Malware Infections/007 Backdoors and Logic Bombs (OBJ 1.2).mp4
88.2 MB
06 Hardening/007 Patch Management (OBJ 1.6 & 3.2).mp4
87.5 MB
31 Incident Response and Forensics/004 __ Forensic Procedures (OBJ 4.5).mp4
87.0 MB
08 Virtualization/005 Securing VMs (OBJ 2.2).mp4
86.4 MB
05 Mobile Device Security/009 Hardening Mobile Devices (OBJ 3.5).mp4
85.8 MB
04 Security Applications and Devices/006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4
85.6 MB
24 Cryptography/005 Asymmetric Algorithms (OBJ 2.8).mp4
85.3 MB
20 Access Control/005 Permissions (OBJ 3.8).mp4
85.0 MB
08 Virtualization/004 Threats to VMs (OBJ 2.2).mp4
84.9 MB
10 Secure Software Development/004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4
84.7 MB
19 Authentication/003 802.1x (OBJ 3.4 & 3.8).mp4
83.7 MB
23 Monitoring and Auditing/008 Logging (OBJ 1.7, 4.3, & 4.5).mp4
83.4 MB
23 Monitoring and Auditing/004 SNMP (OBJ 3.1).mp4
83.2 MB
11 Network Design/003 Switches (OBJ 1.4 & 2.7).mp4
81.0 MB
30 Policies and Procedures/012 __ Key Frameworks (OBJ 5.2).mp4
81.0 MB
32 Conclusion/002 BONUS_ What's Next_.mp4
80.6 MB
24 Cryptography/010 __ Cryptography Considerations (OBJ 2.8).mp4
80.3 MB
13 Cloud Security/001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4
80.1 MB
02 Malware/008 Rootkits (OBJ 1.2 & 1.3).mp4
79.3 MB
03 Malware Infections/006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4
79.2 MB
15 Network Attacks/004 Unnecessary Ports (OBJ 1.6 & 3.2).mp4
78.9 MB
10 Secure Software Development/009 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4
78.5 MB
31 Incident Response and Forensics/003 __ Investigative Data (OBJ 4.3).mp4
78.4 MB
15 Network Attacks/009 Hijacking (OBJ 1.3 & 1.4).mp4
78.3 MB
01 Overview of Security/004 CIA Triad.mp4
78.1 MB
06 Hardening/006 Updates and Patches (OBJ 1.6 & 3.2).mp4
77.8 MB
04 Security Applications and Devices/008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4
76.6 MB
30 Policies and Procedures/011 IT Security Frameworks (OBJ 5.2).mp4
74.6 MB
09 Application Security/003 Web Browser Concerns (OBJ 3.2 & 3.3).mp4
74.5 MB
25 Hashing/003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4
74.1 MB
05 Mobile Device Security/006 Mobile Device Theft (OBJ 3.5).mp4
73.2 MB
11 Network Design/005 Network Zones (OBJ 3.3).mp4
72.8 MB
06 Hardening/002 Unnecessary Applications (OBJ 1.6).mp4
72.5 MB
06 Hardening/010 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4
72.4 MB
28 Planning for the Worst/003 Backup Power (OBJ 2.5).mp4
72.3 MB
10 Secure Software Development/007 XSS and XSRF (OBJ 1.3).mp4
72.1 MB
28 Planning for the Worst/002 Redundant Power (OBJ 2.5).mp4
72.0 MB
01 Overview of Security/009 Threat Actors (1.5).mp4
71.6 MB
14 Automation/005 __ Machine Learning (OBJ 1.2).mp4
71.3 MB
04 Security Applications and Devices/005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4
69.9 MB
23 Monitoring and Auditing/010 SIEM (OBJ 1.7 & 4.3).mp4
69.1 MB
02 Malware/009 Spam (OBJ 1.1).mp4
68.3 MB
23 Monitoring and Auditing/003 Protocol Analyzers (OBJ 3.3 & 4.1).mp4
68.1 MB
01 Overview of Security/003 Overview of Security.mp4
67.6 MB
01 Overview of Security/006 Security Threats (OBJ 1.1 & 1.2).mp4
67.3 MB
19 Authentication/007 VPN (OBJ 3.3).mp4
66.6 MB
13 Cloud Security/002 Cloud Types (OBJ 2.2 & 3.6).mp4
66.3 MB
31 Incident Response and Forensics/006 Demo_ Disk Imaging (OBJ 4.1).mp4
66.1 MB
28 Planning for the Worst/009 Data Backup (OBJ 2.5).mp4
65.8 MB
02 Malware/004 Trojans (OBJ 1.2).mp4
65.5 MB
03 Malware Infections/004 Botnets and Zombies (OBJ 1.2 & 1.4).mp4
65.5 MB
23 Monitoring and Auditing/001 Monitoring Types (OBJ 3.3).mp4
65.5 MB
06 Hardening/004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4
65.4 MB
06 Hardening/003 Restricting Applications (OBJ 3.2 & 4.4).mp4
64.9 MB
04 Security Applications and Devices/003 Demo_ Software Firewalls (OBJ 3.2).mp4
64.5 MB
17 Physical Security/002 Surveillance (OBJ 2.7).mp4
63.7 MB
01 Overview of Security/005 AAA of Security (OBJ 2.4).mp4
62.8 MB
21 Risk Assessments/004 Methodologies (OBJ 1.7 & 5.4).mp4
62.3 MB
02 Malware/007 Spyware (OBJ 1.2).mp4
61.0 MB
01 Overview of Security/010 __ Threat Intelligence and Sources (OBJ 1.5).mp4
60.8 MB
08 Virtualization/002 Hypervisors (OBJ 2.2).mp4
60.2 MB
26 Public Key Infrastructure/005 Web of Trust (OBJ 3.9).mp4
60.1 MB
11 Network Design/007 Network Access Control (OBJ 3.3 & 4.4).mp4
59.4 MB
06 Hardening/008 Group Policies (OBJ 2.1).mp4
59.2 MB
01 Overview of Security/007 Mitigating Threats (OBJ 5.1).mp4
59.1 MB
20 Access Control/006 Usernames and Passwords (OBJ 1.6 & 3.7).mp4
58.3 MB
18 Facilities Security/004 Shielding (OBJ 2.7).mp4
57.9 MB
21 Risk Assessments/006 __ Types of Risk (OBJ 1.6 & 5.4).mp4
57.4 MB
27 Security Protocols/004 SSH (OBJ 3.1 & 4.1).mp4
57.0 MB
11 Network Design/004 Routers (OBJ 3.3).mp4
57.0 MB
19 Authentication/004 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4
56.3 MB
13 Cloud Security/004 Cloud Security (OBJ 2.5 & 3.6).mp4
56.0 MB
02 Malware/006 Ransomware (OBJ 1.2).mp4
56.0 MB
18 Facilities Security/003 HVAC (OBJ 2.5, 2.6, & 2.7).mp4
55.8 MB
23 Monitoring and Auditing/007 Demo_ Auditing Files (OBJ 1.7).mp4
55.4 MB
11 Network Design/010 Network Address Translation (OBJ 3.3).mp4
55.2 MB
15 Network Attacks/007 Stopping a DDoS (OBJ 2.1 & 2.3).mp4
55.0 MB
04 Security Applications and Devices/010 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4
54.9 MB
24 Cryptography/004 Public Key Cryptography (OBJ 2.8).mp4
54.9 MB
13 Cloud Security/009 __ FAAS and Serverless (OBJ 2.2).mp4
53.8 MB
26 Public Key Infrastructure/001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4
53.6 MB
13 Cloud Security/006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4
53.4 MB
28 Planning for the Worst/008 Redundant Sites (OBJ 2.1).mp4
53.2 MB
03 Malware Infections/003 Demo_ Phishing (OBJ 1.1 & 5.3).mp4
52.3 MB
19 Authentication/008 RADIUS vs TACACS+ (OBJ 3.8).mp4
52.3 MB
18 Facilities Security/008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4
52.0 MB
10 Secure Software Development/010 __ XML Vulnerabilities (OBJ 1.3).mp4
51.7 MB
23 Monitoring and Auditing/005 Demo_ Analytical Tools (OBJ 4.1).mp4
50.9 MB
29 Social Engineering/003 Insider Threat (OBJ 1.5).mp4
50.7 MB
14 Automation/002 __ CI_CD (OBJ 2.3).mp4
50.7 MB
24 Cryptography/007 Key Management (OBJ 2.8).mp4
50.3 MB
18 Facilities Security/007 __ Embedded System Vulnerabilities (OBJ 2.6).mp4
50.3 MB
02 Malware/003 Worms (OBJ 1.2).mp4
50.2 MB
18 Facilities Security/010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4
50.1 MB
05 Mobile Device Security/005 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4
50.1 MB
28 Planning for the Worst/001 Planning for the Worst (OBJ 2.5 & 5.4).mp4
50.1 MB
28 Planning for the Worst/006 Network Redundancy (OBJ 2.5).mp4
48.9 MB
08 Virtualization/001 Virtualization (OBJ 2.2).mp4
48.9 MB
09 Application Security/004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4
48.3 MB
02 Malware/010 Summary of Malware.mp4
46.8 MB
19 Authentication/006 Remote Access Service (OBJ 3.1 & 3.8).mp4
46.6 MB
18 Facilities Security/005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4
46.0 MB
19 Authentication/009 Authentication Summary (OBJ 3.8).mp4
45.8 MB
08 Virtualization/006 Demo_ Securing VMs.mp4
45.2 MB
01 Overview of Security/011 __ Threat Hunting (OBJ 1.7).mp4
45.1 MB
23 Monitoring and Auditing/006 Auditing (OBJ 1.7).mp4
44.8 MB
06 Hardening/005 Trusted Operating System (OBJ 3.2).mp4
44.7 MB
29 Social Engineering/007 __ Fraud and Scams (OBJ 1.1).mp4
44.7 MB
07 Suppy Chain Management/001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4
44.7 MB
23 Monitoring and Auditing/011 __ Syslog (OBJ 1.7 & 4.3).mp4
44.6 MB
19 Authentication/010 __ Authentication Attacks (OBJ 1.2).mp4
44.5 MB
24 Cryptography/009 Demo_ Steganography (OBJ 2.8).mp4
44.2 MB
12 Perimeter Security/008 Unified Threat Management (OBJ 3.2 & 3.3).mp4
43.6 MB
11 Network Design/009 Subnetting (OBJ 3.6).mp4
43.4 MB
30 Policies and Procedures/005 __ Legal Requirements (OBJ 5.2 & 5.5).mp4
43.3 MB
13 Cloud Security/010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4
43.0 MB
20 Access Control/008 User Account Control (OBJ 3.7 & 3.8).mp4
42.8 MB
13 Cloud Security/008 __ API (OBJ 2.1).mp4
42.6 MB
03 Malware Infections/005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4
42.6 MB
19 Authentication/005 Remote Desktop Services (OBJ 3.1).mp4
42.3 MB
29 Social Engineering/008 __ Influence Campaigns (OBJ 1.1).mp4
42.1 MB
06 Hardening/001 Hardening (OBJ 3.2).mp4
41.6 MB
03 Malware Infections/011 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4
41.5 MB
28 Planning for the Worst/005 Demo_ RAIDs (OBJ 2.5).mp4
41.2 MB
16 Securing Networks/009 __ WPA3 (OBJ 3.4).mp4
41.0 MB
22 Vulnerability Management/009 Demo_ Password Cracking (OBJ 4.1).mp4
40.9 MB
08 Virtualization/003 Demo_ How to create a VM (OBJ 2.2).mp4
40.6 MB
24 Cryptography/006 Pretty Good Privacy (OBJ 2.8).mp4
40.5 MB
09 Application Security/001 Application Security.mp4
40.5 MB
15 Network Attacks/011 Demo_ Null Sessions (OBJ 1.6).mp4
40.5 MB
25 Hashing/002 Demo_ Hashing (OBJ 2.8).mp4
40.4 MB
28 Planning for the Worst/007 Server Redundancy (OBJ 2.5 &3.3).mp4
40.2 MB
30 Policies and Procedures/006 __ Privacy Technologies (OBJ 5.5).mp4
40.0 MB
17 Physical Security/004 Demo_ Lock Picking (OBJ 2.7).mp4
38.5 MB
12 Perimeter Security/006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4
37.1 MB
11 Network Design/006 __ Jumpbox (OBJ 3.5).mp4
36.7 MB
10 Secure Software Development/011 __ Race Conditions (OBJ 1.3).mp4
36.3 MB
17 Physical Security/001 Physical Security (OBJ 2.7).mp4
35.6 MB
15 Network Attacks/006 DDoS (OBJ 1.2, 1.3, & 1.4).mp4
35.4 MB
05 Mobile Device Security/002 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4
35.2 MB
11 Network Design/008 VLANs (OBJ 3.3).mp4
34.7 MB
07 Suppy Chain Management/003 __ Trusted Firmware (OBJ 3.2).mp4
34.6 MB
27 Security Protocols/002 S_MIME (OBJ 3.1).mp4
34.6 MB
20 Access Control/007 Demo_ Policies (OBJ 3.7).mp4
34.6 MB
22 Vulnerability Management/004 OVAL (OBJ 1.7).mp4
34.2 MB
15 Network Attacks/014 ARP Poisoning (OBJ 1.4).mp4
34.1 MB
22 Vulnerability Management/003 __ Training and Exercises (OBJ 1.8 & 4.2).mp4
34.1 MB
15 Network Attacks/010 Replay Attack (OBJ 1.3).mp4
33.6 MB
25 Hashing/004 Increasing Hash Security (OBJ 2.8 & 3.7).mp4
33.5 MB
15 Network Attacks/012 Transitive Attacks (OBJ 2.4).mp4
33.2 MB
14 Automation/003 __ DevSecOps (OBJ 2.3).mp4
32.9 MB
07 Suppy Chain Management/002 __ Root of Trust (OBJ 3.2).mp4
32.6 MB
06 Hardening/009 Demo_ Group Policies (OBJ 3.2).mp4
32.4 MB
12 Perimeter Security/005 Honeypots and Honeynets (OBJ 2.1).mp4
32.2 MB
13 Cloud Security/007 __ CASB (OBJ 2.1).mp4
31.3 MB
18 Facilities Security/006 __ IoT Vulnerabilities (OBJ 2.6).mp4
31.1 MB
14 Automation/004 __ IAC (OBJ 2.2).mp4
31.0 MB
12 Perimeter Security/003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4
30.3 MB
15 Network Attacks/008 Spoofing (OBJ 1.4 & 3.3).mp4
29.9 MB
05 Mobile Device Security/001 Mobile Device Security (OBJ 1.5).mp4
29.8 MB
26 Public Key Infrastructure/003 Demo_ Certificates (OBJ 2.8 & 3.9).mp4
29.3 MB
10 Secure Software Development/012 __ Design Vulnerabilities (OBJ 1.3).mp4
28.2 MB
27 Security Protocols/006 Demo_ Setting up a VPN (OBJ 3.3).mp4
26.0 MB
30 Policies and Procedures/003 __ Data Ownership.mp4
25.8 MB
07 Suppy Chain Management/004 __ Secure Processing (OBJ 3.2).mp4
25.7 MB
14 Automation/001 __ Workflow Orchestration (OBJ 2.3).mp4
25.3 MB
01 Overview of Security/002 CompTIA Security+ 601 Study Guide.pdf
24.0 MB
18 Facilities Security/009 __ Mitigating Vulnerabilities (OBJ 2.6).mp4
23.3 MB
23 Monitoring and Auditing/012 __ SOAR (OBJ 1.7 & 4.4).mp4
22.3 MB
29 Social Engineering/001 Social Engineering (OBJ 1.1).mp4
20.7 MB
01 Overview of Security/002 CompTIA-Security-Study-Notes 501.pdf
20.2 MB
20 Access Control/001 Access Control (OBJ 3.8).mp4
19.5 MB
16 Securing Networks/001 Securing Networks (OBJ 3.3).mp4
19.5 MB
12 Perimeter Security/001 Perimeter Security.mp4
18.7 MB
11 Network Design/001 Network Security.mp4
17.4 MB
02 Malware/001 Malware (OBJ 1.2).mp4
15.7 MB
15 Network Attacks/001 Network Attacks (OBJ 1.4).mp4
15.2 MB
18 Facilities Security/001 Facilities Security (OBJ 2.7).mp4
14.6 MB
04 Security Applications and Devices/001 Security Applications and Devices.mp4
13.4 MB
27 Security Protocols/001 Security Protocols (OBJ 3.1).mp4
9.1 MB
31 Incident Response and Forensics/002 __ Incident Response Planning (OBJ 4.2).en.srt
42.7 kB
31 Incident Response and Forensics/007 __ Security Tools (OBJ 4.1).en.srt
37.9 kB
28 Planning for the Worst/012 __ Business Impact Analysis (OBJ 5.4).en.srt
36.0 kB
31 Incident Response and Forensics/004 __ Forensic Procedures (OBJ 4.5).en.srt
33.2 kB
31 Incident Response and Forensics/003 __ Investigative Data (OBJ 4.3).en.srt
28.9 kB
24 Cryptography/010 __ Cryptography Considerations (OBJ 2.8).en.srt
28.1 kB
01 Overview of Security/012 __ Attack Frameworks (OBJ 4.2).en.srt
25.3 kB
30 Policies and Procedures/007 Security Policies (OBJ 5.3 & 5.5).en.srt
24.8 kB
15 Network Attacks/003 Memorization of Ports (OBJ 3.1).en.srt
22.9 kB
32 Conclusion/001 Conclusion.en.srt
22.5 kB
20 Access Control/004 Users and Groups (OBJ 3.7 & 3.8).en.srt
21.5 kB
20 Access Control/002 Access Control Models (OBJ 3.8).en.srt
20.2 kB
01 Overview of Security/010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt
20.1 kB
22 Vulnerability Management/007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt
19.9 kB
14 Automation/005 __ Machine Learning (OBJ 1.2).en.srt
19.8 kB
21 Risk Assessments/001 Risk Assessments (OBJ 5.4).en.srt
19.7 kB
23 Monitoring and Auditing/010 SIEM (OBJ 1.7 & 4.3).en.srt
19.5 kB
16 Securing Networks/003 Securing Network Media (OBJ 2.7).en.srt
19.4 kB
31 Incident Response and Forensics/005 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt
19.2 kB
10 Secure Software Development/001 Software Development (OBJ 2.1 & 2.3).en.srt
18.9 kB
13 Cloud Security/010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt
18.7 kB
13 Cloud Security/009 __ FAAS and Serverless (OBJ 2.2).en.srt
18.6 kB
30 Policies and Procedures/012 __ Key Frameworks (OBJ 5.2).en.srt
18.4 kB
18 Facilities Security/008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt
18.4 kB
30 Policies and Procedures/009 Vendor Relationships (OBJ 5.3).en.srt
18.1 kB
22 Vulnerability Management/001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt
18.1 kB
15 Network Attacks/005 Denial of Service (OBJ 1.3 & 1.4).en.srt
18.0 kB
03 Malware Infections/011 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt
17.8 kB
12 Perimeter Security/002 Firewalls (OBJ 3.3 & 4.4).en.srt
17.4 kB
29 Social Engineering/005 __ Motivation Factors (OBJ 1.1).en.srt
17.0 kB
19 Authentication/010 __ Authentication Attacks (OBJ 1.2).en.srt
16.9 kB
13 Cloud Security/006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt
16.6 kB
25 Hashing/001 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt
16.6 kB
14 Automation/002 __ CI_CD (OBJ 2.3).en.srt
16.6 kB
16 Securing Networks/006 Wireless Access Points (OBJ 1.4 & 3.4).en.srt
16.4 kB
21 Risk Assessments/006 __ Types of Risk (OBJ 1.6 & 5.4).en.srt
16.4 kB
18 Facilities Security/007 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt
16.0 kB
30 Policies and Procedures/002 Data Classifications (OBJ 5.3 & 5.5).en.srt
15.9 kB
13 Cloud Security/003 As a Service (OBJ 2.2).en.srt
15.8 kB
22 Vulnerability Management/006 Demo_ Nmap Scanning (OBJ 4.1).en.srt
15.7 kB
01 Overview of Security/011 __ Threat Hunting (OBJ 1.7).en.srt
15.6 kB
22 Vulnerability Management/005 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt
15.6 kB
16 Securing Networks/002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt
15.6 kB
26 Public Key Infrastructure/002 Digital Certificates (OBJ 3.9).en.srt
15.4 kB
21 Risk Assessments/005 Security Controls (OBJ 5.1).en.srt
15.3 kB
09 Application Security/002 Web Browser Security (OBJ 3.2 & 3.3).en.srt
15.1 kB
30 Policies and Procedures/006 __ Privacy Technologies (OBJ 5.5).en.srt
15.1 kB
10 Secure Software Development/003 Testing Methods (OBJ 2.3 & 3.2).en.srt
14.6 kB
18 Facilities Security/010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt
14.6 kB
29 Social Engineering/004 Phishing (OBJ 1.1 & 5.3).en.srt
14.5 kB
19 Authentication/001 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt
14.4 kB
16 Securing Networks/010 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt
14.1 kB
27 Security Protocols/005 VPN Protocols (OBJ 3.1 & 3..3).en.srt
14.1 kB
31 Incident Response and Forensics/006 Demo_ Disk Imaging (OBJ 4.1).en.srt
13.9 kB
20 Access Control/003 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt
13.9 kB
04 Security Applications and Devices/003 Demo_ Software Firewalls (OBJ 3.2).en.srt
13.8 kB
28 Planning for the Worst/011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt
13.8 kB
10 Secure Software Development/009 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt
13.8 kB
13 Cloud Security/008 __ API (OBJ 2.1).en.srt
13.7 kB
16 Securing Networks/008 Demo_ Wireless Attack (OBJ 1.4).en.srt
13.7 kB
05 Mobile Device Security/003 Mobile Malware (OBJ 1.1 & 3.5).en.srt
13.7 kB
18 Facilities Security/002 Fire Suppression (OBJ 2.7).en.srt
13.6 kB
30 Policies and Procedures/004 PII and PHI (OBJ 5.2 & 5.5).en.srt
13.5 kB
10 Secure Software Development/002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt
13.4 kB
11 Network Design/011 Telephony (OBJ 3.1).en.srt
13.4 kB
22 Vulnerability Management/008 Password Analysis (OBJ 1.2).en.srt
13.4 kB
10 Secure Software Development/005 Buffer Overflows (OBJ 1.3).en.srt
13.2 kB
10 Secure Software Development/011 __ Race Conditions (OBJ 1.3).en.srt
13.2 kB
30 Policies and Procedures/005 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt
13.2 kB
11 Network Design/006 __ Jumpbox (OBJ 3.5).en.srt
13.2 kB
30 Policies and Procedures/001 Policies and Procedures (OBJ 5.2 & 5.3).en.srt
13.1 kB
02 Malware/005 Demo_ Viruses and Trojans (OBJ 1.2).en.srt
13.0 kB
02 Malware/002 Viruses (OBJ 1.2).en.srt
13.0 kB
24 Cryptography/002 Symmetric vs Asymmetric (OBJ 2.8).en.srt
13.0 kB
10 Secure Software Development/008 SQL Injection (OBJ 1.3).en.srt
12.9 kB
07 Suppy Chain Management/001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt
12.9 kB
11 Network Design/002 The OSI Model (OBJ 3.3 & 3.6).en.srt
12.7 kB
23 Monitoring and Auditing/011 __ Syslog (OBJ 1.7 & 4.3).en.srt
12.6 kB
30 Policies and Procedures/010 Disposal Policies (OBJ 2.7 & 4.1).en.srt
12.6 kB
03 Malware Infections/010 Preventing Malware (OBJ 1.6 & 3.2).en.srt
12.5 kB
16 Securing Networks/009 __ WPA3 (OBJ 3.4).en.srt
12.4 kB
04 Security Applications and Devices/010 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt
12.3 kB
10 Secure Software Development/006 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt
12.3 kB
29 Social Engineering/007 __ Fraud and Scams (OBJ 1.1).en.srt
12.2 kB
27 Security Protocols/003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt
12.1 kB
16 Securing Networks/005 Wireless Encryption (OBJ 1.6 & 3.4).en.srt
11.9 kB
01 Overview of Security/001 Welcome.en.srt
11.8 kB
24 Cryptography/001 Cryptography (OBJ 2.1 & 2.8).en.srt
11.8 kB
14 Automation/003 __ DevSecOps (OBJ 2.3).en.srt
11.6 kB
03 Malware Infections/006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt
11.6 kB
29 Social Engineering/002 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt
11.5 kB
23 Monitoring and Auditing/009 Log Files (OBJ 4.3).en.srt
11.5 kB
22 Vulnerability Management/003 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt
11.5 kB
21 Risk Assessments/003 Quantitative Risk (OBJ 5.4).en.srt
11.4 kB
03 Malware Infections/003 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt
11.4 kB
29 Social Engineering/009 User Education (OBJ 5.3).en.srt
11.3 kB
07 Suppy Chain Management/003 __ Trusted Firmware (OBJ 3.2).en.srt
11.3 kB
10 Secure Software Development/010 __ XML Vulnerabilities (OBJ 1.3).en.srt
11.2 kB
09 Application Security/004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt
11.2 kB
19 Authentication/002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt
11.2 kB
03 Malware Infections/009 Removing Malware (OBJ 4.2).en.srt
11.0 kB
06 Hardening/004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt
11.0 kB
31 Incident Response and Forensics/001 Incident Response Procedures (OBJ 4.2).en.srt
10.9 kB
05 Mobile Device Security/007 Security of Apps (OBJ 3.1 & 3.5).en.srt
10.7 kB
23 Monitoring and Auditing/002 Performance Baselining (OBJ 2.1).en.srt
10.7 kB
04 Security Applications and Devices/004 IDS (OBJ 3.2 & 3.3).en.srt
10.5 kB
05 Mobile Device Security/008 BYOD (OBJ 3.5).en.srt
10.4 kB
22 Vulnerability Management/002 Penetration Testing (OBJ 1.8).en.srt
10.4 kB
07 Suppy Chain Management/002 __ Root of Trust (OBJ 3.2).en.srt
10.3 kB
16 Securing Networks/004 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt
10.2 kB
01 Overview of Security/008 Hackers (OBJ 1.5).en.srt
10.2 kB
20 Access Control/007 Demo_ Policies (OBJ 3.7).en.srt
10.2 kB
13 Cloud Security/005 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt
10.1 kB
13 Cloud Security/007 __ CASB (OBJ 2.1).en.srt
10.1 kB
15 Network Attacks/013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt
10.1 kB
16 Securing Networks/007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt
10.0 kB
14 Automation/004 __ IAC (OBJ 2.2).en.srt
10.0 kB
09 Application Security/005 Securing Applications (OBJ 1.4 & 3.2).en.srt
9.8 kB
28 Planning for the Worst/004 Data Redundancy (OBJ 2.5).en.srt
9.8 kB
24 Cryptography/003 Symmetric Algorithms (OBJ 2.8).en.srt
9.8 kB
21 Risk Assessments/002 Qualitative Risk (OBJ 5.4).en.srt
9.8 kB
10 Secure Software Development/012 __ Design Vulnerabilities (OBJ 1.3).en.srt
9.7 kB
23 Monitoring and Auditing/005 Demo_ Analytical Tools (OBJ 4.1).en.srt
9.5 kB
30 Policies and Procedures/008 User Education (OBJ 5.3).en.srt
9.5 kB
24 Cryptography/008 One-Time Pad (OBJ 2.8).en.srt
9.5 kB
03 Malware Infections/002 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt
9.5 kB
12 Perimeter Security/007 NIDS and NIPS (OBJ 3.3).en.srt
9.4 kB
14 Automation/001 __ Workflow Orchestration (OBJ 2.3).en.srt
9.4 kB
04 Security Applications and Devices/009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt
9.3 kB
17 Physical Security/005 Biometric Readers (OBJ 2.4).en.srt
9.3 kB
29 Social Engineering/008 __ Influence Campaigns (OBJ 1.1).en.srt
9.3 kB
12 Perimeter Security/004 Proxy Servers (OBJ 3.3 & 4.4).en.srt
9.3 kB
17 Physical Security/003 Door Locks (OBJ 2.7).en.srt
9.3 kB
29 Social Engineering/006 More Social Engineering (OBJ 1.1 & 1.2).en.srt
9.2 kB
26 Public Key Infrastructure/004 Certificate Authorities (OBJ 3.2 & 3.9).en.srt
9.1 kB
15 Network Attacks/002 Ports and Protocols (OBJ 3.1).en.srt
9.1 kB
08 Virtualization/006 Demo_ Securing VMs.en.srt
9.0 kB
30 Policies and Procedures/003 __ Data Ownership.en.srt
9.0 kB
03 Malware Infections/008 Symptoms of Infection (OBJ 1.2).en.srt
8.9 kB
32 Conclusion/002 BONUS_ What's Next_.en.srt
8.8 kB
07 Suppy Chain Management/004 __ Secure Processing (OBJ 3.2).en.srt
8.7 kB
20 Access Control/005 Permissions (OBJ 3.8).en.srt
8.7 kB
03 Malware Infections/001 Malware Infections.en.srt
8.7 kB
15 Network Attacks/009 Hijacking (OBJ 1.3 & 1.4).en.srt
8.7 kB
28 Planning for the Worst/010 Tape Rotation (OBJ 2.5).en.srt
8.7 kB
05 Mobile Device Security/004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt
8.5 kB
18 Facilities Security/006 __ IoT Vulnerabilities (OBJ 2.6).en.srt
8.4 kB
01 Overview of Security/004 CIA Triad.en.srt
8.4 kB
12 Perimeter Security/003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt
8.4 kB
04 Security Applications and Devices/002 Software Firewalls (OBJ 3.2).en.srt
8.4 kB
04 Security Applications and Devices/007 Securing the BIOS (OBJ 3.2).en.srt
8.3 kB
24 Cryptography/009 Demo_ Steganography (OBJ 2.8).en.srt
8.2 kB
18 Facilities Security/009 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt
8.2 kB
08 Virtualization/003 Demo_ How to create a VM (OBJ 2.2).en.srt
8.2 kB
03 Malware Infections/007 Backdoors and Logic Bombs (OBJ 1.2).en.srt
8.1 kB
23 Monitoring and Auditing/008 Logging (OBJ 1.7, 4.3, & 4.5).en.srt
8.1 kB
06 Hardening/009 Demo_ Group Policies (OBJ 3.2).en.srt
8.1 kB
13 Cloud Security/001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt
8.0 kB
08 Virtualization/005 Securing VMs (OBJ 2.2).en.srt
8.0 kB
04 Security Applications and Devices/006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt
7.9 kB
23 Monitoring and Auditing/004 SNMP (OBJ 3.1).en.srt
7.9 kB
10 Secure Software Development/004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt
7.9 kB
23 Monitoring and Auditing/007 Demo_ Auditing Files (OBJ 1.7).en.srt
7.8 kB
26 Public Key Infrastructure/001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt
7.8 kB
06 Hardening/007 Patch Management (OBJ 1.6 & 3.2).en.srt
7.8 kB
28 Planning for the Worst/005 Demo_ RAIDs (OBJ 2.5).en.srt
7.8 kB
23 Monitoring and Auditing/012 __ SOAR (OBJ 1.7 & 4.4).en.srt
7.7 kB
08 Virtualization/004 Threats to VMs (OBJ 2.2).en.srt
7.6 kB
24 Cryptography/005 Asymmetric Algorithms (OBJ 2.8).en.srt
7.6 kB
19 Authentication/003 802.1x (OBJ 3.4 & 3.8).en.srt
7.6 kB
11 Network Design/003 Switches (OBJ 1.4 & 2.7).en.srt
7.6 kB
15 Network Attacks/004 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt
7.5 kB
28 Planning for the Worst/003 Backup Power (OBJ 2.5).en.srt
7.5 kB
05 Mobile Device Security/009 Hardening Mobile Devices (OBJ 3.5).en.srt
7.4 kB
03 Malware Infections/004 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt
7.3 kB
30 Policies and Procedures/011 IT Security Frameworks (OBJ 5.2).en.srt
7.3 kB
11 Network Design/005 Network Zones (OBJ 3.3).en.srt
7.2 kB
09 Application Security/003 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt
7.2 kB
28 Planning for the Worst/002 Redundant Power (OBJ 2.5).en.srt
7.2 kB
25 Hashing/003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt
7.1 kB
02 Malware/008 Rootkits (OBJ 1.2 & 1.3).en.srt
7.0 kB
04 Security Applications and Devices/008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt
6.9 kB
24 Cryptography/004 Public Key Cryptography (OBJ 2.8).en.srt
6.9 kB
01 Overview of Security/005 AAA of Security (OBJ 2.4).en.srt
6.9 kB
26 Public Key Infrastructure/003 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt
6.9 kB
04 Security Applications and Devices/005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt
6.8 kB
06 Hardening/006 Updates and Patches (OBJ 1.6 & 3.2).en.srt
6.8 kB
05 Mobile Device Security/006 Mobile Device Theft (OBJ 3.5).en.srt
6.7 kB
01 Overview of Security/009 Threat Actors (1.5).en.srt
6.6 kB
19 Authentication/007 VPN (OBJ 3.3).en.srt
6.6 kB
01 Overview of Security/003 Overview of Security.en.srt
6.6 kB
10 Secure Software Development/007 XSS and XSRF (OBJ 1.3).en.srt
6.6 kB
23 Monitoring and Auditing/003 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt
6.6 kB
17 Physical Security/002 Surveillance (OBJ 2.7).en.srt
6.5 kB
06 Hardening/010 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt
6.4 kB
28 Planning for the Worst/009 Data Backup (OBJ 2.5).en.srt
6.4 kB
21 Risk Assessments/004 Methodologies (OBJ 1.7 & 5.4).en.srt
6.4 kB
06 Hardening/002 Unnecessary Applications (OBJ 1.6).en.srt
6.4 kB
23 Monitoring and Auditing/001 Monitoring Types (OBJ 3.3).en.srt
6.3 kB
06 Hardening/003 Restricting Applications (OBJ 3.2 & 4.4).en.srt
6.1 kB
26 Public Key Infrastructure/005 Web of Trust (OBJ 3.9).en.srt
6.1 kB
01 Overview of Security/006 Security Threats (OBJ 1.1 & 1.2).en.srt
6.1 kB
02 Malware/009 Spam (OBJ 1.1).en.srt
6.0 kB
11 Network Design/007 Network Access Control (OBJ 3.3 & 4.4).en.srt
5.9 kB
20 Access Control/006 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt
5.9 kB
13 Cloud Security/002 Cloud Types (OBJ 2.2 & 3.6).en.srt
5.8 kB
01 Overview of Security/007 Mitigating Threats (OBJ 5.1).en.srt
5.8 kB
25 Hashing/002 Demo_ Hashing (OBJ 2.8).en.srt
5.7 kB
02 Malware/007 Spyware (OBJ 1.2).en.srt
5.6 kB
28 Planning for the Worst/008 Redundant Sites (OBJ 2.1).en.srt
5.6 kB
18 Facilities Security/004 Shielding (OBJ 2.7).en.srt
5.5 kB
27 Security Protocols/004 SSH (OBJ 3.1 & 4.1).en.srt
5.5 kB
02 Malware/004 Trojans (OBJ 1.2).en.srt
5.5 kB
15 Network Attacks/007 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt
5.4 kB
03 Malware Infections/005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt
5.4 kB
13 Cloud Security/004 Cloud Security (OBJ 2.5 & 3.6).en.srt
5.3 kB
11 Network Design/004 Routers (OBJ 3.3).en.srt
5.2 kB
24 Cryptography/007 Key Management (OBJ 2.8).en.srt
5.2 kB
18 Facilities Security/003 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt
5.2 kB
08 Virtualization/002 Hypervisors (OBJ 2.2).en.srt
5.1 kB
29 Social Engineering/003 Insider Threat (OBJ 1.5).en.srt
5.1 kB
02 Malware/006 Ransomware (OBJ 1.2).en.srt
5.1 kB
19 Authentication/004 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt
5.0 kB
06 Hardening/008 Group Policies (OBJ 2.1).en.srt
5.0 kB
28 Planning for the Worst/001 Planning for the Worst (OBJ 2.5 & 5.4).en.srt
5.0 kB
15 Network Attacks/011 Demo_ Null Sessions (OBJ 1.6).en.srt
5.0 kB
11 Network Design/010 Network Address Translation (OBJ 3.3).en.srt
5.0 kB
22 Vulnerability Management/009 Demo_ Password Cracking (OBJ 4.1).en.srt
4.9 kB
28 Planning for the Worst/006 Network Redundancy (OBJ 2.5).en.srt
4.9 kB
18 Facilities Security/005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt
4.7 kB
19 Authentication/008 RADIUS vs TACACS+ (OBJ 3.8).en.srt
4.6 kB
08 Virtualization/001 Virtualization (OBJ 2.2).en.srt
4.4 kB
20 Access Control/008 User Account Control (OBJ 3.7 & 3.8).en.srt
4.4 kB
19 Authentication/006 Remote Access Service (OBJ 3.1 & 3.8).en.srt
4.4 kB
23 Monitoring and Auditing/006 Auditing (OBJ 1.7).en.srt
4.3 kB
02 Malware/003 Worms (OBJ 1.2).en.srt
4.3 kB
02 Malware/010 Summary of Malware.en.srt
4.3 kB
11 Network Design/009 Subnetting (OBJ 3.6).en.srt
4.3 kB
05 Mobile Device Security/005 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt
4.2 kB
06 Hardening/005 Trusted Operating System (OBJ 3.2).en.srt
3.8 kB
12 Perimeter Security/008 Unified Threat Management (OBJ 3.2 & 3.3).en.srt
3.8 kB
28 Planning for the Worst/007 Server Redundancy (OBJ 2.5 &3.3).en.srt
3.8 kB
19 Authentication/005 Remote Desktop Services (OBJ 3.1).en.srt
3.8 kB
19 Authentication/009 Authentication Summary (OBJ 3.8).en.srt
3.7 kB
17 Physical Security/001 Physical Security (OBJ 2.7).en.srt
3.7 kB
09 Application Security/001 Application Security.en.srt
3.6 kB
06 Hardening/001 Hardening (OBJ 3.2).en.srt
3.6 kB
22 Vulnerability Management/004 OVAL (OBJ 1.7).en.srt
3.5 kB
17 Physical Security/004 Demo_ Lock Picking (OBJ 2.7).en.srt
3.5 kB
15 Network Attacks/006 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt
3.4 kB
15 Network Attacks/014 ARP Poisoning (OBJ 1.4).en.srt
3.3 kB
24 Cryptography/006 Pretty Good Privacy (OBJ 2.8).en.srt
3.3 kB
15 Network Attacks/010 Replay Attack (OBJ 1.3).en.srt
3.3 kB
12 Perimeter Security/006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt
3.3 kB
27 Security Protocols/006 Demo_ Setting up a VPN (OBJ 3.3).en.srt
3.3 kB
15 Network Attacks/012 Transitive Attacks (OBJ 2.4).en.srt
3.3 kB
25 Hashing/004 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt
3.3 kB
27 Security Protocols/002 S_MIME (OBJ 3.1).en.srt
3.2 kB
11 Network Design/008 VLANs (OBJ 3.3).en.srt
3.1 kB
12 Perimeter Security/005 Honeypots and Honeynets (OBJ 2.1).en.srt
3.0 kB
15 Network Attacks/008 Spoofing (OBJ 1.4 & 3.3).en.srt
2.9 kB
05 Mobile Device Security/002 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt
2.8 kB
05 Mobile Device Security/001 Mobile Device Security (OBJ 1.5).en.srt
2.7 kB
20 Access Control/001 Access Control (OBJ 3.8).en.srt
2.2 kB
16 Securing Networks/001 Securing Networks (OBJ 3.3).en.srt
2.0 kB
29 Social Engineering/001 Social Engineering (OBJ 1.1).en.srt
2.0 kB
12 Perimeter Security/001 Perimeter Security.en.srt
1.8 kB
11 Network Design/001 Network Security.en.srt
1.7 kB
18 Facilities Security/001 Facilities Security (OBJ 2.7).en.srt
1.4 kB
15 Network Attacks/001 Network Attacks (OBJ 1.4).en.srt
1.4 kB
02 Malware/001 Malware (OBJ 1.2).en.srt
1.2 kB
04 Security Applications and Devices/001 Security Applications and Devices.en.srt
1.2 kB
01 Overview of Security/002 Download the Study Guide.html
1.1 kB
27 Security Protocols/001 Security Protocols (OBJ 3.1).en.srt
779 Bytes
32 Conclusion/external-assets-links.txt
151 Bytes
udemy-dl.log
0 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>