搜索
CompTIA Security+ (SY0-701) Complete Course & Exam
磁力链接/BT种子名称
CompTIA Security+ (SY0-701) Complete Course & Exam
磁力链接/BT种子简介
种子哈希:
423db870f4d28b496375da083413a007de58e1ca
文件大小:
16.64G
已经下载:
5
次
下载速度:
极快
收录时间:
2025-11-16
最近下载:
2025-11-16
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:423DB870F4D28B496375DA083413A007DE58E1CA
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
海王TV
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
runner
fanchajiang
simpson
ipx878cx
arrested development
老男孩2013
技师 射精
corruption
red hot jam vol.124
beta
dredd
尉氏
+22.06.06
com-339
tortured
ftuapps
snis-048
office+4-play+intern+edition
playboy.plus
火凤燎原
nhdtb-069
奥特曼+生日
第三季+粤
stranger+things
159
lane++
黑絲魅魔空姐紅底高跟
素人自然便
baiser
bondagecafe 2160p
文件列表
28 - Conclusion/001 Conclusion.mp4
294.3 MB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4
269.7 MB
02 - Fundamentals of Security/001 Fundamentals of Security.mp4
204.1 MB
06 - Malware/001 Malware (OBJ 2.4).mp4
195.3 MB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4
192.3 MB
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4
170.9 MB
01 - Introduction/002 Exam Tips.mp4
165.3 MB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4
161.5 MB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4
147.6 MB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4
146.3 MB
04 - Physical Security/007 Door Locks (OBJ 1.2).mp4
141.8 MB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4
140.6 MB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4
138.7 MB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4
129.3 MB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4
126.1 MB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4
125.6 MB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4
121.3 MB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4
116.2 MB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4
114.2 MB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4
113.7 MB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4
111.0 MB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4
110.8 MB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4
109.7 MB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4
108.2 MB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4
107.3 MB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4
107.3 MB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4
106.8 MB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4
106.4 MB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4
106.3 MB
09 - Risk Management/001 Risk Management (OBJ 5.2).mp4
105.7 MB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4
105.5 MB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4
105.4 MB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4
105.0 MB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4
102.7 MB
06 - Malware/006 Ransomware (OBJ 2.4).mp4
101.9 MB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4
101.8 MB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4
101.1 MB
20 - Hardening/007 Patch Management (OBJ 2.5).mp4
98.9 MB
24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4
98.0 MB
16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4
95.9 MB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4
95.1 MB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4
94.4 MB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4
93.9 MB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4
93.3 MB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4
92.8 MB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4
91.7 MB
06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4
91.3 MB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4
91.0 MB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4
90.9 MB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4
90.7 MB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4
90.0 MB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4
89.6 MB
21 - Security Techniques/004 Application Security (OBJ 4.1).mp4
87.8 MB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4
87.8 MB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4
87.7 MB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4
86.7 MB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4
86.4 MB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4
86.0 MB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4
85.3 MB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4
84.7 MB
27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4
83.7 MB
27 - Security Awareness/003 Password Management (OBJ 5.6).mp4
83.7 MB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4
83.4 MB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4
83.3 MB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4
83.3 MB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4
82.8 MB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4
82.6 MB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4
82.3 MB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4
82.3 MB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4
82.2 MB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4
82.0 MB
03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4
80.8 MB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4
80.4 MB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4
80.2 MB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4
79.9 MB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4
79.7 MB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4
79.2 MB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4
78.8 MB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4
78.7 MB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4
77.8 MB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4
77.5 MB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4
77.4 MB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4
76.8 MB
05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4
76.4 MB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4
76.0 MB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4
76.0 MB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4
75.6 MB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4
74.1 MB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4
73.9 MB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4
73.9 MB
12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4
73.9 MB
20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4
73.4 MB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4
73.3 MB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4
72.0 MB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4
70.4 MB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4
69.9 MB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4
69.7 MB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4
69.6 MB
03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4
69.6 MB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4
69.3 MB
24 - Incident Response/001 Incident Response (OBJ 4.8).mp4
68.8 MB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4
68.7 MB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4
68.6 MB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4
68.4 MB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4
68.2 MB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4
68.1 MB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4
66.9 MB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4
66.2 MB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4
66.2 MB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4
66.1 MB
28 - Conclusion/002 BONUS Where do I go from here.mp4
65.6 MB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4
65.1 MB
05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4
65.0 MB
09 - Risk Management/004 Risk Register (OBJ 5.2).mp4
64.8 MB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4
64.5 MB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4
64.3 MB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4
64.1 MB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4
64.0 MB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4
63.8 MB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4
63.7 MB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4
63.5 MB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4
63.2 MB
06 - Malware/002 Viruses (OBJ 2.4).mp4
62.8 MB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4
62.7 MB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4
62.6 MB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4
60.8 MB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4
60.6 MB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4
60.5 MB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4
60.1 MB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4
60.1 MB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4
60.0 MB
03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4
59.9 MB
07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4
59.5 MB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4
59.3 MB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4
59.3 MB
06 - Malware/010 Keylogger (OBJ 2.4).mp4
59.3 MB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4
59.0 MB
20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4
58.3 MB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4
58.3 MB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4
57.4 MB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4
57.1 MB
21 - Security Techniques/007 Email Security (OBJ 4.5).mp4
57.0 MB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4
56.9 MB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4
56.7 MB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4
56.6 MB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4
56.6 MB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
56.0 MB
06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4
55.8 MB
02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4
55.1 MB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4
55.1 MB
19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4
55.1 MB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4
54.9 MB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4
54.9 MB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4
54.9 MB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4
54.7 MB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4
54.5 MB
02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4
54.2 MB
24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4
54.1 MB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4
53.6 MB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4
53.6 MB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4
53.4 MB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4
53.3 MB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4
51.4 MB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4
51.1 MB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4
50.9 MB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4
50.9 MB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4
50.8 MB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4
50.6 MB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4
50.0 MB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4
49.9 MB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4
49.8 MB
20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4
49.7 MB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4
49.5 MB
11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4
49.3 MB
06 - Malware/008 Rootkits (OBJ 2.4).mp4
49.2 MB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4
49.0 MB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4
48.9 MB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4
48.9 MB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4
48.6 MB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4
48.5 MB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4
48.3 MB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4
48.0 MB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4
47.7 MB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4
47.5 MB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
47.1 MB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4
46.7 MB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4
46.6 MB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4
45.7 MB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4
45.6 MB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4
45.5 MB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4
45.4 MB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4
45.4 MB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4
45.2 MB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4
44.9 MB
09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4
44.8 MB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4
44.5 MB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4
44.0 MB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4
43.7 MB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4
43.5 MB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4
43.2 MB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4
42.7 MB
15 - Security Architecture/006 Microservices (OBJ 3.1).mp4
42.3 MB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4
41.5 MB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4
41.3 MB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4
41.3 MB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4
41.2 MB
11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4
40.7 MB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4
40.4 MB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4
40.4 MB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4
39.8 MB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4
39.0 MB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4
38.9 MB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4
38.7 MB
15 - Security Architecture/005 Serverless (OBJ 3.1).mp4
38.6 MB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4
38.4 MB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4
37.8 MB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4
37.5 MB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4
37.2 MB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4
36.9 MB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4
36.7 MB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4
36.6 MB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4
36.2 MB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4
36.0 MB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4
35.8 MB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4
35.7 MB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4
35.6 MB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4
35.5 MB
11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4
35.4 MB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4
35.4 MB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4
35.4 MB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4
35.1 MB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4
34.6 MB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4
34.3 MB
20 - Hardening/010 Data Encryption Levels (2.5).mp4
34.3 MB
07 - Data Protection/004 Data States (OBJ 3.3).mp4
34.1 MB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4
34.1 MB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4
34.0 MB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4
34.0 MB
03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4
33.9 MB
19 - Malicious Activity/008 On-Path Attacks.mp4
33.5 MB
11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4
33.5 MB
11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4
32.2 MB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4
32.2 MB
25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4
31.3 MB
06 - Malware/004 Trojans (OBJ 2.4).mp4
31.2 MB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4
30.2 MB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4
30.0 MB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4
29.9 MB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4
29.8 MB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4
28.9 MB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4
28.3 MB
06 - Malware/003 Worms (OBJ 2.4).mp4
27.3 MB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4
27.2 MB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4
27.0 MB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4
26.9 MB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4
24.9 MB
19 - Malicious Activity/009 Injection Attacks.mp4
24.8 MB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4
24.8 MB
07 - Data Protection/007 Securing Data (OBJ 3.3).mp4
23.4 MB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4
23.1 MB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4
22.3 MB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4
22.3 MB
01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf
1.5 MB
01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf
191.1 kB
01 - Introduction/001 Security-701-Study-Plan.pdf
135.6 kB
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt
72.8 kB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt
45.5 kB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt
38.4 kB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt
37.5 kB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt
36.0 kB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt
34.4 kB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt
33.5 kB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt
32.3 kB
28 - Conclusion/001 Conclusion_en.srt
30.8 kB
04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt
30.7 kB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt
30.6 kB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt
30.2 kB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt
30.0 kB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt
29.6 kB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt
29.4 kB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt
28.9 kB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt
28.8 kB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt
28.5 kB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt
28.3 kB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt
28.3 kB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt
27.8 kB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt
27.7 kB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt
27.2 kB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt
26.8 kB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt
26.8 kB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt
26.1 kB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt
25.7 kB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt
25.5 kB
21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt
25.5 kB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt
25.4 kB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt
25.0 kB
16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt
23.7 kB
24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt
23.6 kB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt
23.3 kB
27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt
23.0 kB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt
22.8 kB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt
22.7 kB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt
22.6 kB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt
22.2 kB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt
21.1 kB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt
21.1 kB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt
20.9 kB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt
20.9 kB
20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt
20.6 kB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt
20.6 kB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt
20.4 kB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt
20.3 kB
02 - Fundamentals of Security/001 Fundamentals of Security_en.srt
20.1 kB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt
20.0 kB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt
19.9 kB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt
19.9 kB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt
19.9 kB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt
19.9 kB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt
19.8 kB
06 - Malware/001 Malware (OBJ 2.4)_en.srt
19.7 kB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt
19.7 kB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt
19.6 kB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt
19.6 kB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt
19.6 kB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt
19.5 kB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt
19.5 kB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt
19.4 kB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt
19.0 kB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt
18.9 kB
06 - Malware/006 Ransomware (OBJ 2.4)_en.srt
18.7 kB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt
18.3 kB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt
18.2 kB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt
18.2 kB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt
18.2 kB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt
18.1 kB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt
18.0 kB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt
17.9 kB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt
17.9 kB
06 - Malware/002 Viruses (OBJ 2.4)_en.srt
17.8 kB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt
17.7 kB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt
17.6 kB
01 - Introduction/002 Exam Tips_en.srt
17.4 kB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt
17.3 kB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt
17.1 kB
20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt
17.1 kB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt
17.0 kB
06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt
16.9 kB
12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt
16.9 kB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt
16.8 kB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt
16.8 kB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt
16.5 kB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt
16.5 kB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt
16.4 kB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt
16.4 kB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt
16.4 kB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt
16.1 kB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt
16.1 kB
07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt
16.1 kB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt
16.0 kB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
16.0 kB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt
15.7 kB
24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt
15.7 kB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt
15.5 kB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt
15.5 kB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt
15.4 kB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt
15.4 kB
05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt
15.4 kB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt
15.4 kB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt
15.2 kB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt
15.1 kB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt
15.1 kB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt
15.0 kB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt
15.0 kB
09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt
14.8 kB
19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt
14.8 kB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt
14.8 kB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt
14.8 kB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt
14.7 kB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt
14.7 kB
21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt
14.7 kB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt
14.7 kB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt
14.6 kB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt
14.6 kB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt
14.5 kB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt
14.4 kB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt
14.3 kB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt
14.3 kB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt
14.3 kB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt
14.2 kB
02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt
14.2 kB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt
14.1 kB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt
14.1 kB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt
13.8 kB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt
13.8 kB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt
13.7 kB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt
13.6 kB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt
13.5 kB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt
13.4 kB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt
13.3 kB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt
13.3 kB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt
13.1 kB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt
13.1 kB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt
13.1 kB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt
13.0 kB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt
12.9 kB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt
12.8 kB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt
12.7 kB
02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt
12.7 kB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt
12.7 kB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt
12.6 kB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt
12.5 kB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt
12.4 kB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt
12.4 kB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt
12.4 kB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt
12.4 kB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt
12.4 kB
06 - Malware/008 Rootkits (OBJ 2.4)_en.srt
12.3 kB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt
12.3 kB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt
12.3 kB
06 - Malware/010 Keylogger (OBJ 2.4)_en.srt
12.2 kB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt
12.2 kB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt
12.1 kB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt
12.1 kB
03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt
12.1 kB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt
12.0 kB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt
11.9 kB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt
11.8 kB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
11.8 kB
20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt
11.8 kB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt
11.7 kB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt
11.7 kB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt
11.7 kB
06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt
11.7 kB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt
11.7 kB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt
11.6 kB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt
11.6 kB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt
11.5 kB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt
11.5 kB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt
11.5 kB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt
11.3 kB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt
11.2 kB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt
11.2 kB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt
11.2 kB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt
11.2 kB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt
11.1 kB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt
11.1 kB
20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt
11.1 kB
09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt
11.1 kB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt
11.0 kB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt
11.0 kB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt
10.9 kB
20 - Hardening/010 Data Encryption Levels (2.5)_en.srt
10.8 kB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt
10.7 kB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt
10.6 kB
25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt
10.6 kB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt
10.6 kB
05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt
10.5 kB
11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt
10.5 kB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt
10.4 kB
03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt
10.2 kB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt
10.0 kB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt
10.0 kB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt
10.0 kB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt
9.9 kB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt
9.8 kB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt
9.7 kB
07 - Data Protection/004 Data States (OBJ 3.3)_en.srt
9.7 kB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt
9.6 kB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt
9.5 kB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt
9.5 kB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt
9.4 kB
11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt
9.4 kB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt
9.3 kB
09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt
9.2 kB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt
9.2 kB
27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt
9.2 kB
11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt
9.2 kB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt
9.1 kB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt
9.1 kB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt
9.0 kB
11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt
8.9 kB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt
8.9 kB
19 - Malicious Activity/009 Injection Attacks_en.srt
8.9 kB
06 - Malware/004 Trojans (OBJ 2.4)_en.srt
8.8 kB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt
8.8 kB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt
8.8 kB
03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt
8.7 kB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt
8.7 kB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt
8.6 kB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt
8.5 kB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt
8.5 kB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt
8.4 kB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt
8.2 kB
11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt
8.2 kB
03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt
8.2 kB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt
8.1 kB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt
8.0 kB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt
8.0 kB
19 - Malicious Activity/008 On-Path Attacks_en.srt
7.9 kB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt
7.9 kB
28 - Conclusion/002 BONUS Where do I go from here_en.srt
7.9 kB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt
7.8 kB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt
7.7 kB
15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt
7.6 kB
06 - Malware/003 Worms (OBJ 2.4)_en.srt
7.6 kB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt
7.5 kB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt
7.5 kB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt
7.4 kB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt
7.4 kB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt
7.4 kB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt
7.3 kB
07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt
7.2 kB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt
7.1 kB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt
7.0 kB
15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt
7.0 kB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt
6.9 kB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt
6.9 kB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt
6.8 kB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt
6.7 kB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt
6.7 kB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt
6.7 kB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt
6.5 kB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt
6.3 kB
24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt
6.1 kB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt
5.7 kB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt
5.6 kB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt
5.5 kB
01 - Introduction/001 Download the Study Guide.html
222 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!