MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

CompTIA Security+ (SY0-701) Complete Course & Exam

磁力链接/BT种子名称

CompTIA Security+ (SY0-701) Complete Course & Exam

磁力链接/BT种子简介

种子哈希:423db870f4d28b496375da083413a007de58e1ca
文件大小: 16.64G
已经下载:5次
下载速度:极快
收录时间:2025-11-16
最近下载:2025-11-16

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:423DB870F4D28B496375DA083413A007DE58E1CA
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 海王TV TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

runner fanchajiang simpson ipx878cx arrested development 老男孩2013 技师 射精 corruption red hot jam vol.124 beta dredd 尉氏 +22.06.06 com-339 tortured ftuapps snis-048 office+4-play+intern+edition playboy.plus 火凤燎原 nhdtb-069 奥特曼+生日 第三季+粤 stranger+things 159 lane++ 黑絲魅魔空姐紅底高跟 素人自然便 baiser bondagecafe 2160p

文件列表

  • 28 - Conclusion/001 Conclusion.mp4 294.3 MB
  • 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 269.7 MB
  • 02 - Fundamentals of Security/001 Fundamentals of Security.mp4 204.1 MB
  • 06 - Malware/001 Malware (OBJ 2.4).mp4 195.3 MB
  • 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4 192.3 MB
  • 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4 170.9 MB
  • 01 - Introduction/002 Exam Tips.mp4 165.3 MB
  • 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4 161.5 MB
  • 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4 147.6 MB
  • 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 146.3 MB
  • 04 - Physical Security/007 Door Locks (OBJ 1.2).mp4 141.8 MB
  • 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4 140.6 MB
  • 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 138.7 MB
  • 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4 129.3 MB
  • 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4 126.1 MB
  • 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4 125.6 MB
  • 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4 121.3 MB
  • 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4 116.2 MB
  • 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4 114.2 MB
  • 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4 113.7 MB
  • 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4 111.0 MB
  • 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4 110.8 MB
  • 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4 109.7 MB
  • 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4 108.2 MB
  • 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4 107.3 MB
  • 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4 107.3 MB
  • 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4 106.8 MB
  • 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4 106.4 MB
  • 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4 106.3 MB
  • 09 - Risk Management/001 Risk Management (OBJ 5.2).mp4 105.7 MB
  • 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4 105.5 MB
  • 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4 105.4 MB
  • 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4 105.0 MB
  • 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4 102.7 MB
  • 06 - Malware/006 Ransomware (OBJ 2.4).mp4 101.9 MB
  • 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4 101.8 MB
  • 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4 101.1 MB
  • 20 - Hardening/007 Patch Management (OBJ 2.5).mp4 98.9 MB
  • 24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4 98.0 MB
  • 16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4 95.9 MB
  • 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4 95.1 MB
  • 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4 94.4 MB
  • 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4 93.9 MB
  • 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4 93.3 MB
  • 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4 92.8 MB
  • 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4 91.7 MB
  • 06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4 91.3 MB
  • 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4 91.0 MB
  • 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4 90.9 MB
  • 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4 90.7 MB
  • 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4 90.0 MB
  • 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4 89.6 MB
  • 21 - Security Techniques/004 Application Security (OBJ 4.1).mp4 87.8 MB
  • 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4 87.8 MB
  • 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4 87.7 MB
  • 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4 86.7 MB
  • 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4 86.4 MB
  • 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4 86.0 MB
  • 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4 85.3 MB
  • 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4 84.7 MB
  • 27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4 83.7 MB
  • 27 - Security Awareness/003 Password Management (OBJ 5.6).mp4 83.7 MB
  • 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4 83.4 MB
  • 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4 83.3 MB
  • 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4 83.3 MB
  • 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4 82.8 MB
  • 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4 82.6 MB
  • 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4 82.3 MB
  • 07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4 82.3 MB
  • 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4 82.2 MB
  • 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4 82.0 MB
  • 03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4 80.8 MB
  • 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4 80.4 MB
  • 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4 80.2 MB
  • 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4 79.9 MB
  • 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4 79.7 MB
  • 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4 79.2 MB
  • 16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4 78.8 MB
  • 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4 78.7 MB
  • 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4 77.8 MB
  • 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4 77.5 MB
  • 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4 77.4 MB
  • 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4 76.8 MB
  • 05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4 76.4 MB
  • 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4 76.0 MB
  • 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4 76.0 MB
  • 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4 75.6 MB
  • 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4 74.1 MB
  • 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4 73.9 MB
  • 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4 73.9 MB
  • 12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4 73.9 MB
  • 20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4 73.4 MB
  • 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4 73.3 MB
  • 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4 72.0 MB
  • 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4 70.4 MB
  • 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4 69.9 MB
  • 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4 69.7 MB
  • 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4 69.6 MB
  • 03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4 69.6 MB
  • 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4 69.3 MB
  • 24 - Incident Response/001 Incident Response (OBJ 4.8).mp4 68.8 MB
  • 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4 68.7 MB
  • 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4 68.6 MB
  • 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4 68.4 MB
  • 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4 68.2 MB
  • 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4 68.1 MB
  • 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4 66.9 MB
  • 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4 66.2 MB
  • 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4 66.2 MB
  • 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4 66.1 MB
  • 28 - Conclusion/002 BONUS Where do I go from here.mp4 65.6 MB
  • 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4 65.1 MB
  • 05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4 65.0 MB
  • 09 - Risk Management/004 Risk Register (OBJ 5.2).mp4 64.8 MB
  • 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4 64.5 MB
  • 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4 64.3 MB
  • 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4 64.1 MB
  • 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4 64.0 MB
  • 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4 63.8 MB
  • 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4 63.7 MB
  • 02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4 63.5 MB
  • 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4 63.2 MB
  • 06 - Malware/002 Viruses (OBJ 2.4).mp4 62.8 MB
  • 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4 62.7 MB
  • 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4 62.6 MB
  • 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4 60.8 MB
  • 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4 60.6 MB
  • 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4 60.5 MB
  • 12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4 60.1 MB
  • 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4 60.1 MB
  • 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4 60.0 MB
  • 03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4 59.9 MB
  • 07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4 59.5 MB
  • 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4 59.3 MB
  • 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4 59.3 MB
  • 06 - Malware/010 Keylogger (OBJ 2.4).mp4 59.3 MB
  • 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4 59.0 MB
  • 20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4 58.3 MB
  • 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4 58.3 MB
  • 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4 57.4 MB
  • 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4 57.1 MB
  • 21 - Security Techniques/007 Email Security (OBJ 4.5).mp4 57.0 MB
  • 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4 56.9 MB
  • 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4 56.7 MB
  • 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4 56.6 MB
  • 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4 56.6 MB
  • 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 56.0 MB
  • 06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4 55.8 MB
  • 02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4 55.1 MB
  • 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4 55.1 MB
  • 19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4 55.1 MB
  • 02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4 54.9 MB
  • 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4 54.9 MB
  • 04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4 54.9 MB
  • 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4 54.7 MB
  • 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4 54.5 MB
  • 02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4 54.2 MB
  • 24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4 54.1 MB
  • 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4 53.6 MB
  • 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4 53.6 MB
  • 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4 53.4 MB
  • 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4 53.3 MB
  • 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4 51.4 MB
  • 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4 51.1 MB
  • 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4 50.9 MB
  • 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4 50.9 MB
  • 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4 50.8 MB
  • 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4 50.6 MB
  • 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4 50.0 MB
  • 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4 49.9 MB
  • 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4 49.8 MB
  • 20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4 49.7 MB
  • 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4 49.5 MB
  • 11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4 49.3 MB
  • 06 - Malware/008 Rootkits (OBJ 2.4).mp4 49.2 MB
  • 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4 49.0 MB
  • 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4 48.9 MB
  • 20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4 48.9 MB
  • 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4 48.6 MB
  • 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4 48.5 MB
  • 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4 48.3 MB
  • 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4 48.0 MB
  • 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4 47.7 MB
  • 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4 47.5 MB
  • 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 47.1 MB
  • 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4 46.7 MB
  • 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4 46.6 MB
  • 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4 45.7 MB
  • 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4 45.6 MB
  • 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4 45.5 MB
  • 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4 45.4 MB
  • 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4 45.4 MB
  • 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4 45.2 MB
  • 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4 44.9 MB
  • 09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4 44.8 MB
  • 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4 44.5 MB
  • 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4 44.0 MB
  • 06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4 43.7 MB
  • 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4 43.5 MB
  • 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4 43.2 MB
  • 25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4 42.7 MB
  • 15 - Security Architecture/006 Microservices (OBJ 3.1).mp4 42.3 MB
  • 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4 41.5 MB
  • 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4 41.3 MB
  • 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4 41.3 MB
  • 06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4 41.2 MB
  • 11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4 40.7 MB
  • 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4 40.4 MB
  • 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4 40.4 MB
  • 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4 39.8 MB
  • 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4 39.0 MB
  • 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4 38.9 MB
  • 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4 38.7 MB
  • 15 - Security Architecture/005 Serverless (OBJ 3.1).mp4 38.6 MB
  • 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4 38.4 MB
  • 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4 37.8 MB
  • 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4 37.5 MB
  • 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4 37.2 MB
  • 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4 36.9 MB
  • 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4 36.7 MB
  • 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4 36.6 MB
  • 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4 36.2 MB
  • 25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4 36.0 MB
  • 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4 35.8 MB
  • 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4 35.7 MB
  • 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4 35.6 MB
  • 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4 35.5 MB
  • 11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4 35.4 MB
  • 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4 35.4 MB
  • 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4 35.4 MB
  • 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4 35.1 MB
  • 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4 34.6 MB
  • 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4 34.3 MB
  • 20 - Hardening/010 Data Encryption Levels (2.5).mp4 34.3 MB
  • 07 - Data Protection/004 Data States (OBJ 3.3).mp4 34.1 MB
  • 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4 34.1 MB
  • 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4 34.0 MB
  • 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4 34.0 MB
  • 03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4 33.9 MB
  • 19 - Malicious Activity/008 On-Path Attacks.mp4 33.5 MB
  • 11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4 33.5 MB
  • 11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4 32.2 MB
  • 02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4 32.2 MB
  • 25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4 31.3 MB
  • 06 - Malware/004 Trojans (OBJ 2.4).mp4 31.2 MB
  • 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4 30.2 MB
  • 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4 30.0 MB
  • 02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4 29.9 MB
  • 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4 29.8 MB
  • 25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4 28.9 MB
  • 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4 28.3 MB
  • 06 - Malware/003 Worms (OBJ 2.4).mp4 27.3 MB
  • 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4 27.2 MB
  • 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4 27.0 MB
  • 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4 26.9 MB
  • 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4 24.9 MB
  • 19 - Malicious Activity/009 Injection Attacks.mp4 24.8 MB
  • 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4 24.8 MB
  • 07 - Data Protection/007 Securing Data (OBJ 3.3).mp4 23.4 MB
  • 07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4 23.1 MB
  • 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4 22.3 MB
  • 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4 22.3 MB
  • 01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf 1.5 MB
  • 01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf 191.1 kB
  • 01 - Introduction/001 Security-701-Study-Plan.pdf 135.6 kB
  • 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt 72.8 kB
  • 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt 45.5 kB
  • 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt 38.4 kB
  • 07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt 37.5 kB
  • 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt 36.0 kB
  • 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt 34.4 kB
  • 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt 33.5 kB
  • 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt 32.3 kB
  • 28 - Conclusion/001 Conclusion_en.srt 30.8 kB
  • 04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt 30.7 kB
  • 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt 30.6 kB
  • 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt 30.2 kB
  • 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt 30.0 kB
  • 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt 29.6 kB
  • 16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt 29.4 kB
  • 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt 28.9 kB
  • 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt 28.8 kB
  • 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt 28.5 kB
  • 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt 28.3 kB
  • 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt 28.3 kB
  • 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt 27.8 kB
  • 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt 27.7 kB
  • 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt 27.2 kB
  • 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt 26.8 kB
  • 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt 26.8 kB
  • 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt 26.1 kB
  • 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt 25.7 kB
  • 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt 25.5 kB
  • 21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt 25.5 kB
  • 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt 25.4 kB
  • 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt 25.0 kB
  • 16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt 23.7 kB
  • 24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt 23.6 kB
  • 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt 23.3 kB
  • 27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt 23.0 kB
  • 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt 22.8 kB
  • 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt 22.7 kB
  • 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt 22.6 kB
  • 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt 22.2 kB
  • 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt 21.1 kB
  • 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt 21.1 kB
  • 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt 20.9 kB
  • 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt 20.9 kB
  • 20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt 20.6 kB
  • 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt 20.6 kB
  • 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt 20.4 kB
  • 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt 20.3 kB
  • 02 - Fundamentals of Security/001 Fundamentals of Security_en.srt 20.1 kB
  • 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt 20.0 kB
  • 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt 19.9 kB
  • 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt 19.9 kB
  • 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt 19.9 kB
  • 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt 19.9 kB
  • 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt 19.8 kB
  • 06 - Malware/001 Malware (OBJ 2.4)_en.srt 19.7 kB
  • 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt 19.7 kB
  • 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt 19.6 kB
  • 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt 19.6 kB
  • 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt 19.6 kB
  • 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt 19.5 kB
  • 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt 19.5 kB
  • 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt 19.4 kB
  • 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt 19.0 kB
  • 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt 18.9 kB
  • 06 - Malware/006 Ransomware (OBJ 2.4)_en.srt 18.7 kB
  • 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt 18.3 kB
  • 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt 18.2 kB
  • 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt 18.2 kB
  • 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt 18.2 kB
  • 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt 18.1 kB
  • 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt 18.0 kB
  • 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt 17.9 kB
  • 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt 17.9 kB
  • 06 - Malware/002 Viruses (OBJ 2.4)_en.srt 17.8 kB
  • 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt 17.7 kB
  • 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt 17.6 kB
  • 01 - Introduction/002 Exam Tips_en.srt 17.4 kB
  • 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt 17.3 kB
  • 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt 17.1 kB
  • 20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt 17.1 kB
  • 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt 17.0 kB
  • 06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt 16.9 kB
  • 12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt 16.9 kB
  • 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt 16.8 kB
  • 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt 16.8 kB
  • 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt 16.5 kB
  • 04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt 16.5 kB
  • 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt 16.4 kB
  • 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt 16.4 kB
  • 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt 16.4 kB
  • 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt 16.1 kB
  • 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt 16.1 kB
  • 07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt 16.1 kB
  • 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt 16.0 kB
  • 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 16.0 kB
  • 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt 15.7 kB
  • 24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt 15.7 kB
  • 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt 15.5 kB
  • 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt 15.5 kB
  • 12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt 15.4 kB
  • 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt 15.4 kB
  • 05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt 15.4 kB
  • 02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt 15.4 kB
  • 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt 15.2 kB
  • 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt 15.1 kB
  • 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt 15.1 kB
  • 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt 15.0 kB
  • 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt 15.0 kB
  • 09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt 14.8 kB
  • 19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt 14.8 kB
  • 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt 14.8 kB
  • 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt 14.8 kB
  • 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt 14.7 kB
  • 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt 14.7 kB
  • 21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt 14.7 kB
  • 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt 14.7 kB
  • 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt 14.6 kB
  • 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt 14.6 kB
  • 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt 14.5 kB
  • 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt 14.4 kB
  • 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt 14.3 kB
  • 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt 14.3 kB
  • 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt 14.3 kB
  • 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt 14.2 kB
  • 02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt 14.2 kB
  • 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt 14.1 kB
  • 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt 14.1 kB
  • 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt 13.8 kB
  • 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt 13.8 kB
  • 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt 13.7 kB
  • 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt 13.6 kB
  • 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt 13.5 kB
  • 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt 13.4 kB
  • 02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt 13.3 kB
  • 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt 13.3 kB
  • 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt 13.1 kB
  • 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt 13.1 kB
  • 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt 13.1 kB
  • 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt 13.0 kB
  • 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt 12.9 kB
  • 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt 12.8 kB
  • 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt 12.7 kB
  • 02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt 12.7 kB
  • 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt 12.7 kB
  • 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt 12.6 kB
  • 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt 12.5 kB
  • 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt 12.4 kB
  • 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt 12.4 kB
  • 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt 12.4 kB
  • 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt 12.4 kB
  • 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt 12.4 kB
  • 06 - Malware/008 Rootkits (OBJ 2.4)_en.srt 12.3 kB
  • 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt 12.3 kB
  • 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt 12.3 kB
  • 06 - Malware/010 Keylogger (OBJ 2.4)_en.srt 12.2 kB
  • 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt 12.2 kB
  • 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt 12.1 kB
  • 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt 12.1 kB
  • 03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt 12.1 kB
  • 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt 12.0 kB
  • 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt 11.9 kB
  • 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt 11.8 kB
  • 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 11.8 kB
  • 20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt 11.8 kB
  • 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt 11.7 kB
  • 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt 11.7 kB
  • 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt 11.7 kB
  • 06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt 11.7 kB
  • 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt 11.7 kB
  • 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt 11.6 kB
  • 06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt 11.6 kB
  • 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt 11.5 kB
  • 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt 11.5 kB
  • 06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt 11.5 kB
  • 25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt 11.3 kB
  • 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt 11.2 kB
  • 20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt 11.2 kB
  • 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt 11.2 kB
  • 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt 11.2 kB
  • 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt 11.1 kB
  • 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt 11.1 kB
  • 20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt 11.1 kB
  • 09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt 11.1 kB
  • 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt 11.0 kB
  • 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt 11.0 kB
  • 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt 10.9 kB
  • 20 - Hardening/010 Data Encryption Levels (2.5)_en.srt 10.8 kB
  • 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt 10.7 kB
  • 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt 10.6 kB
  • 25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt 10.6 kB
  • 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt 10.6 kB
  • 05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt 10.5 kB
  • 11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt 10.5 kB
  • 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt 10.4 kB
  • 03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt 10.2 kB
  • 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt 10.0 kB
  • 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt 10.0 kB
  • 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt 10.0 kB
  • 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt 9.9 kB
  • 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt 9.8 kB
  • 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt 9.7 kB
  • 07 - Data Protection/004 Data States (OBJ 3.3)_en.srt 9.7 kB
  • 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt 9.6 kB
  • 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt 9.5 kB
  • 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt 9.5 kB
  • 25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt 9.4 kB
  • 11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt 9.4 kB
  • 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt 9.3 kB
  • 09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt 9.2 kB
  • 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt 9.2 kB
  • 27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt 9.2 kB
  • 11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt 9.2 kB
  • 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt 9.1 kB
  • 02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt 9.1 kB
  • 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt 9.0 kB
  • 11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt 8.9 kB
  • 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt 8.9 kB
  • 19 - Malicious Activity/009 Injection Attacks_en.srt 8.9 kB
  • 06 - Malware/004 Trojans (OBJ 2.4)_en.srt 8.8 kB
  • 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt 8.8 kB
  • 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt 8.8 kB
  • 03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt 8.7 kB
  • 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt 8.7 kB
  • 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt 8.6 kB
  • 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt 8.5 kB
  • 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt 8.5 kB
  • 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt 8.4 kB
  • 25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt 8.2 kB
  • 11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt 8.2 kB
  • 03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt 8.2 kB
  • 02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt 8.1 kB
  • 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt 8.0 kB
  • 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt 8.0 kB
  • 19 - Malicious Activity/008 On-Path Attacks_en.srt 7.9 kB
  • 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt 7.9 kB
  • 28 - Conclusion/002 BONUS Where do I go from here_en.srt 7.9 kB
  • 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt 7.8 kB
  • 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt 7.7 kB
  • 15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt 7.6 kB
  • 06 - Malware/003 Worms (OBJ 2.4)_en.srt 7.6 kB
  • 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt 7.5 kB
  • 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt 7.5 kB
  • 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt 7.4 kB
  • 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt 7.4 kB
  • 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt 7.4 kB
  • 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt 7.3 kB
  • 07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt 7.2 kB
  • 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt 7.1 kB
  • 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt 7.0 kB
  • 15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt 7.0 kB
  • 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt 6.9 kB
  • 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt 6.9 kB
  • 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt 6.8 kB
  • 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt 6.7 kB
  • 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt 6.7 kB
  • 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt 6.7 kB
  • 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt 6.5 kB
  • 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt 6.3 kB
  • 24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt 6.1 kB
  • 07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt 5.7 kB
  • 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt 5.6 kB
  • 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt 5.5 kB
  • 01 - Introduction/001 Download the Study Guide.html 222 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!