MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

CompTIA Security+ (SY0-701) Complete Course & Exam

磁力链接/BT种子名称

CompTIA Security+ (SY0-701) Complete Course & Exam

磁力链接/BT种子简介

种子哈希:d4c7c2cae5c70cd8cd24cbb0fbbecf57dcc0ac99
文件大小: 7.91G
已经下载:5976次
下载速度:极快
收录时间:2024-10-09
最近下载:2026-05-19
DMCA/投诉/Complaint:DMCA/投诉/Complaint

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:D4C7C2CAE5C70CD8CD24CBB0FBBECF57DCC0AC99
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 快手视频 51品茶 萝莉岛APP 51动漫 91短视频 抖音Max 91porn视频 TikTok成人版 PornHub 暗网Xvideo 草榴社区 P站专业版 海角乱伦 萝莉岛 搜同 91妻友

最近搜索

adobe+photoshop+2024+ easeus+data ddff-046+喉 from exfd+188 resident evil 2002 wall-e vol.55+【miiちゃん】駅地下fsモール靴屋店员20歳(4回目) chim linux jack ryan blackmagic ridley.s0 project x 2012 1080p mkv russian family avi akuyaku reijou tensei ojisan m jak 2026 e1936 紫色面具最新补充版 ariesiatv microsoft+office+2013 母子乱伦【儿子用猛男微信勾引反差婊妈妈】全记录+看了她的照片+真是风韵犹存 the empire strikes back uhd 宝可梦超梦的逆袭进化 legalporno+-+crystal+ proteus scitools understand the testaments s01e09 +bombshell 工业机器人+课程++题库 patreon + ai generated

文件列表

  • 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4 115.0 MB
  • 28 - Conclusion/001 Conclusion.mp4 93.6 MB
  • 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4 92.7 MB
  • 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 90.2 MB
  • 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4 87.6 MB
  • 02 - Fundamentals of Security/001 Fundamentals of Security.mp4 68.6 MB
  • 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 66.2 MB
  • 04 - Physical Security/007 Door Locks (OBJ 1.2).mp4 66.1 MB
  • 06 - Malware/001 Malware (OBJ 2.4).mp4 65.9 MB
  • 07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4 64.5 MB
  • 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4 64.0 MB
  • 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4 62.6 MB
  • 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4 62.5 MB
  • 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4 60.9 MB
  • 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4 60.7 MB
  • 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4 60.3 MB
  • 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4 60.0 MB
  • 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4 59.0 MB
  • 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4 58.2 MB
  • 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4 57.1 MB
  • 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4 56.4 MB
  • 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4 56.3 MB
  • 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4 55.6 MB
  • 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4 55.4 MB
  • 01 - Introduction/002 Exam Tips.mp4 55.1 MB
  • 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4 54.3 MB
  • 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4 53.9 MB
  • 21 - Security Techniques/004 Application Security (OBJ 4.1).mp4 51.2 MB
  • 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4 50.9 MB
  • 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4 50.7 MB
  • 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4 49.9 MB
  • 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4 49.8 MB
  • 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 49.7 MB
  • 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4 49.6 MB
  • 16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4 49.4 MB
  • 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4 48.5 MB
  • 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4 45.8 MB
  • 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4 45.6 MB
  • 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4 45.3 MB
  • 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4 45.0 MB
  • 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4 44.9 MB
  • 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4 44.5 MB
  • 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4 44.4 MB
  • 16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4 44.3 MB
  • 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4 44.0 MB
  • 27 - Security Awareness/003 Password Management (OBJ 5.6).mp4 43.6 MB
  • 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4 43.5 MB
  • 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4 43.3 MB
  • 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4 42.5 MB
  • 24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4 42.5 MB
  • 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4 42.0 MB
  • 06 - Malware/006 Ransomware (OBJ 2.4).mp4 41.4 MB
  • 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4 41.4 MB
  • 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4 40.8 MB
  • 06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4 40.5 MB
  • 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4 40.2 MB
  • 20 - Hardening/007 Patch Management (OBJ 2.5).mp4 39.9 MB
  • 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4 39.5 MB
  • 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4 39.2 MB
  • 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4 39.2 MB
  • 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4 38.2 MB
  • 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4 38.0 MB
  • 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4 37.7 MB
  • 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4 37.0 MB
  • 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4 37.0 MB
  • 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4 36.8 MB
  • 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4 36.7 MB
  • 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4 36.6 MB
  • 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4 36.5 MB
  • 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4 36.4 MB
  • 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4 36.4 MB
  • 05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4 36.0 MB
  • 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4 35.7 MB
  • 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4 35.7 MB
  • 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4 35.5 MB
  • 09 - Risk Management/001 Risk Management (OBJ 5.2).mp4 35.5 MB
  • 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4 35.3 MB
  • 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4 35.1 MB
  • 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4 34.9 MB
  • 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4 34.9 MB
  • 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4 34.2 MB
  • 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4 34.1 MB
  • 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4 33.9 MB
  • 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4 33.8 MB
  • 03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4 33.6 MB
  • 06 - Malware/002 Viruses (OBJ 2.4).mp4 33.2 MB
  • 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4 33.2 MB
  • 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4 33.1 MB
  • 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4 33.0 MB
  • 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4 32.8 MB
  • 25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4 32.5 MB
  • 05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4 32.3 MB
  • 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4 32.3 MB
  • 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4 32.2 MB
  • 20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4 32.2 MB
  • 20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4 32.0 MB
  • 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4 31.8 MB
  • 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4 31.8 MB
  • 12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4 31.7 MB
  • 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4 31.6 MB
  • 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4 31.5 MB
  • 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4 31.5 MB
  • 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4 31.4 MB
  • 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4 31.4 MB
  • 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4 31.4 MB
  • 07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4 31.3 MB
  • 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4 31.2 MB
  • 21 - Security Techniques/007 Email Security (OBJ 4.5).mp4 31.0 MB
  • 09 - Risk Management/004 Risk Register (OBJ 5.2).mp4 31.0 MB
  • 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4 30.9 MB
  • 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4 30.8 MB
  • 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4 30.7 MB
  • 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4 30.7 MB
  • 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4 30.6 MB
  • 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4 30.4 MB
  • 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4 30.1 MB
  • 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4 30.1 MB
  • 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4 29.7 MB
  • 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4 29.5 MB
  • 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4 29.5 MB
  • 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4 29.4 MB
  • 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4 29.3 MB
  • 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4 29.2 MB
  • 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4 29.0 MB
  • 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4 28.9 MB
  • 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4 28.9 MB
  • 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 28.8 MB
  • 27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4 28.6 MB
  • 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4 28.5 MB
  • 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4 28.3 MB
  • 12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4 28.3 MB
  • 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4 28.2 MB
  • 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4 28.1 MB
  • 04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4 28.0 MB
  • 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4 28.0 MB
  • 28 - Conclusion/002 BONUS Where do I go from here.mp4 28.0 MB
  • 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4 28.0 MB
  • 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4 27.7 MB
  • 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4 27.7 MB
  • 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4 27.5 MB
  • 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4 27.4 MB
  • 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4 27.3 MB
  • 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4 27.3 MB
  • 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4 27.1 MB
  • 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4 26.9 MB
  • 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4 26.8 MB
  • 06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4 26.8 MB
  • 03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4 26.7 MB
  • 24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4 26.7 MB
  • 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4 26.6 MB
  • 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4 26.6 MB
  • 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4 26.3 MB
  • 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4 26.2 MB
  • 19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4 26.1 MB
  • 02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4 25.9 MB
  • 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4 25.8 MB
  • 06 - Malware/010 Keylogger (OBJ 2.4).mp4 25.7 MB
  • 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4 25.6 MB
  • 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4 25.6 MB
  • 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4 25.6 MB
  • 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4 25.4 MB
  • 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4 25.3 MB
  • 02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4 25.2 MB
  • 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4 25.2 MB
  • 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4 25.1 MB
  • 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4 25.1 MB
  • 11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4 25.0 MB
  • 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4 24.9 MB
  • 06 - Malware/008 Rootkits (OBJ 2.4).mp4 24.9 MB
  • 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4 24.7 MB
  • 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4 24.7 MB
  • 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4 24.7 MB
  • 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4 24.7 MB
  • 09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4 24.6 MB
  • 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4 24.5 MB
  • 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4 24.5 MB
  • 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4 24.2 MB
  • 02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4 24.2 MB
  • 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4 24.0 MB
  • 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4 23.9 MB
  • 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4 23.9 MB
  • 02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4 23.9 MB
  • 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4 23.7 MB
  • 03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4 23.7 MB
  • 24 - Incident Response/001 Incident Response (OBJ 4.8).mp4 23.5 MB
  • 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4 23.5 MB
  • 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4 23.4 MB
  • 20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4 23.4 MB
  • 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4 23.3 MB
  • 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4 23.2 MB
  • 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4 23.2 MB
  • 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4 23.1 MB
  • 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4 23.1 MB
  • 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4 23.0 MB
  • 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4 22.8 MB
  • 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4 22.8 MB
  • 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4 22.7 MB
  • 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4 22.7 MB
  • 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4 22.6 MB
  • 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4 22.5 MB
  • 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4 22.1 MB
  • 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4 21.9 MB
  • 25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4 21.8 MB
  • 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4 21.7 MB
  • 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 21.6 MB
  • 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4 21.6 MB
  • 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4 21.5 MB
  • 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4 21.3 MB
  • 11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4 21.3 MB
  • 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4 21.2 MB
  • 06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4 21.1 MB
  • 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4 21.1 MB
  • 06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4 21.0 MB
  • 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4 21.0 MB
  • 20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4 20.9 MB
  • 11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4 20.9 MB
  • 25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4 20.8 MB
  • 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4 20.7 MB
  • 25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4 20.6 MB
  • 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4 20.5 MB
  • 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4 20.4 MB
  • 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4 20.4 MB
  • 11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4 20.3 MB
  • 11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4 20.3 MB
  • 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4 20.3 MB
  • 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4 20.2 MB
  • 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4 20.2 MB
  • 15 - Security Architecture/006 Microservices (OBJ 3.1).mp4 20.1 MB
  • 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4 20.1 MB
  • 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4 19.5 MB
  • 06 - Malware/004 Trojans (OBJ 2.4).mp4 19.4 MB
  • 07 - Data Protection/004 Data States (OBJ 3.3).mp4 19.4 MB
  • 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4 19.1 MB
  • 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4 18.9 MB
  • 20 - Hardening/010 Data Encryption Levels (2.5).mp4 18.9 MB
  • 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4 18.6 MB
  • 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4 18.5 MB
  • 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4 18.5 MB
  • 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4 18.5 MB
  • 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4 18.4 MB
  • 19 - Malicious Activity/008 On-Path Attacks.mp4 17.6 MB
  • 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4 17.3 MB
  • 06 - Malware/003 Worms (OBJ 2.4).mp4 17.3 MB
  • 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4 17.1 MB
  • 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4 17.0 MB
  • 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4 16.8 MB
  • 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4 16.7 MB
  • 15 - Security Architecture/005 Serverless (OBJ 3.1).mp4 16.6 MB
  • 03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4 16.6 MB
  • 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4 16.6 MB
  • 02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4 16.6 MB
  • 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4 16.1 MB
  • 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4 16.0 MB
  • 19 - Malicious Activity/009 Injection Attacks.mp4 15.8 MB
  • 07 - Data Protection/007 Securing Data (OBJ 3.3).mp4 14.5 MB
  • 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4 14.5 MB
  • 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4 14.0 MB
  • 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4 13.8 MB
  • 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4 13.7 MB
  • 02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4 12.8 MB
  • 07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4 12.8 MB
  • 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4 11.7 MB
  • 01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf 1.5 MB
  • 01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf 191.1 kB
  • 01 - Introduction/001 Security-701-Study-Plan.pdf 135.6 kB
  • 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt 72.8 kB
  • 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt 45.5 kB
  • 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt 38.4 kB
  • 07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt 37.5 kB
  • 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt 36.0 kB
  • 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt 34.4 kB
  • 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt 33.5 kB
  • 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt 32.3 kB
  • 28 - Conclusion/001 Conclusion_en.srt 30.8 kB
  • 04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt 30.7 kB
  • 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt 30.6 kB
  • 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt 30.2 kB
  • 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt 30.0 kB
  • 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt 29.6 kB
  • 16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt 29.4 kB
  • 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt 28.9 kB
  • 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt 28.8 kB
  • 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt 28.5 kB
  • 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt 28.3 kB
  • 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt 28.3 kB
  • 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt 27.8 kB
  • 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt 27.7 kB
  • 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt 27.2 kB
  • 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt 26.8 kB
  • 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt 26.8 kB
  • 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt 26.1 kB
  • 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt 25.7 kB
  • 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt 25.5 kB
  • 21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt 25.5 kB
  • 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt 25.4 kB
  • 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt 25.0 kB
  • 16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt 23.7 kB
  • 24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt 23.6 kB
  • 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt 23.3 kB
  • 27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt 23.0 kB
  • 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt 22.8 kB
  • 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt 22.7 kB
  • 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt 22.6 kB
  • 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt 22.2 kB
  • 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt 21.1 kB
  • 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt 21.1 kB
  • 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt 20.9 kB
  • 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt 20.9 kB
  • 20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt 20.6 kB
  • 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt 20.6 kB
  • 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt 20.4 kB
  • 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt 20.3 kB
  • 02 - Fundamentals of Security/001 Fundamentals of Security_en.srt 20.1 kB
  • 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt 20.0 kB
  • 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt 19.9 kB
  • 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt 19.9 kB
  • 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt 19.9 kB
  • 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt 19.9 kB
  • 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt 19.8 kB
  • 06 - Malware/001 Malware (OBJ 2.4)_en.srt 19.7 kB
  • 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt 19.7 kB
  • 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt 19.6 kB
  • 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt 19.6 kB
  • 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt 19.6 kB
  • 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt 19.5 kB
  • 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt 19.5 kB
  • 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt 19.4 kB
  • 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt 19.0 kB
  • 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt 18.9 kB
  • 06 - Malware/006 Ransomware (OBJ 2.4)_en.srt 18.7 kB
  • 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt 18.3 kB
  • 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt 18.2 kB
  • 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt 18.2 kB
  • 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt 18.2 kB
  • 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt 18.1 kB
  • 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt 18.0 kB
  • 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt 17.9 kB
  • 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt 17.9 kB
  • 06 - Malware/002 Viruses (OBJ 2.4)_en.srt 17.8 kB
  • 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt 17.7 kB
  • 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt 17.6 kB
  • 01 - Introduction/002 Exam Tips_en.srt 17.4 kB
  • 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt 17.3 kB
  • 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt 17.1 kB
  • 20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt 17.1 kB
  • 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt 17.0 kB
  • 06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt 16.9 kB
  • 12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt 16.9 kB
  • 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt 16.8 kB
  • 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt 16.8 kB
  • 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt 16.5 kB
  • 04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt 16.5 kB
  • 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt 16.4 kB
  • 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt 16.4 kB
  • 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt 16.4 kB
  • 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt 16.1 kB
  • 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt 16.1 kB
  • 07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt 16.1 kB
  • 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt 16.0 kB
  • 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 16.0 kB
  • 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt 15.7 kB
  • 24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt 15.7 kB
  • 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt 15.5 kB
  • 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt 15.5 kB
  • 12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt 15.4 kB
  • 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt 15.4 kB
  • 05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt 15.4 kB
  • 02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt 15.4 kB
  • 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt 15.2 kB
  • 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt 15.1 kB
  • 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt 15.1 kB
  • 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt 15.0 kB
  • 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt 15.0 kB
  • 09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt 14.8 kB
  • 19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt 14.8 kB
  • 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt 14.8 kB
  • 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt 14.8 kB
  • 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt 14.7 kB
  • 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt 14.7 kB
  • 21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt 14.7 kB
  • 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt 14.7 kB
  • 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt 14.6 kB
  • 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt 14.6 kB
  • 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt 14.5 kB
  • 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt 14.4 kB
  • 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt 14.3 kB
  • 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt 14.3 kB
  • 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt 14.3 kB
  • 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt 14.2 kB
  • 02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt 14.2 kB
  • 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt 14.1 kB
  • 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt 14.1 kB
  • 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt 13.8 kB
  • 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt 13.8 kB
  • 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt 13.7 kB
  • 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt 13.6 kB
  • 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt 13.5 kB
  • 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt 13.4 kB
  • 02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt 13.3 kB
  • 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt 13.3 kB
  • 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt 13.1 kB
  • 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt 13.1 kB
  • 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt 13.1 kB
  • 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt 13.0 kB
  • 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt 12.9 kB
  • 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt 12.8 kB
  • 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt 12.7 kB
  • 02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt 12.7 kB
  • 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt 12.7 kB
  • 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt 12.6 kB
  • 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt 12.5 kB
  • 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt 12.4 kB
  • 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt 12.4 kB
  • 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt 12.4 kB
  • 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt 12.4 kB
  • 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt 12.4 kB
  • 06 - Malware/008 Rootkits (OBJ 2.4)_en.srt 12.3 kB
  • 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt 12.3 kB
  • 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt 12.3 kB
  • 06 - Malware/010 Keylogger (OBJ 2.4)_en.srt 12.2 kB
  • 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt 12.2 kB
  • 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt 12.1 kB
  • 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt 12.1 kB
  • 03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt 12.1 kB
  • 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt 12.0 kB
  • 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt 11.9 kB
  • 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt 11.8 kB
  • 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 11.8 kB
  • 20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt 11.8 kB
  • 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt 11.7 kB
  • 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt 11.7 kB
  • 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt 11.7 kB
  • 06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt 11.7 kB
  • 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt 11.7 kB
  • 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt 11.6 kB
  • 06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt 11.6 kB
  • 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt 11.5 kB
  • 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt 11.5 kB
  • 06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt 11.5 kB
  • 25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt 11.3 kB
  • 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt 11.2 kB
  • 20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt 11.2 kB
  • 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt 11.2 kB
  • 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt 11.2 kB
  • 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt 11.1 kB
  • 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt 11.1 kB
  • 20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt 11.1 kB
  • 09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt 11.1 kB
  • 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt 11.0 kB
  • 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt 11.0 kB
  • 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt 10.9 kB
  • 20 - Hardening/010 Data Encryption Levels (2.5)_en.srt 10.8 kB
  • 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt 10.7 kB
  • 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt 10.6 kB
  • 25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt 10.6 kB
  • 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt 10.6 kB
  • 05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt 10.5 kB
  • 11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt 10.5 kB
  • 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt 10.4 kB
  • 03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt 10.2 kB
  • 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt 10.0 kB
  • 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt 10.0 kB
  • 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt 10.0 kB
  • 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt 9.9 kB
  • 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt 9.8 kB
  • 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt 9.7 kB
  • 07 - Data Protection/004 Data States (OBJ 3.3)_en.srt 9.7 kB
  • 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt 9.6 kB
  • 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt 9.5 kB
  • 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt 9.5 kB
  • 25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt 9.4 kB
  • 11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt 9.4 kB
  • 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt 9.3 kB
  • 09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt 9.2 kB
  • 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt 9.2 kB
  • 27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt 9.2 kB
  • 11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt 9.2 kB
  • 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt 9.1 kB
  • 02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt 9.1 kB
  • 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt 9.0 kB
  • 11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt 8.9 kB
  • 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt 8.9 kB
  • 19 - Malicious Activity/009 Injection Attacks_en.srt 8.9 kB
  • 06 - Malware/004 Trojans (OBJ 2.4)_en.srt 8.8 kB
  • 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt 8.8 kB
  • 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt 8.8 kB
  • 03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt 8.7 kB
  • 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt 8.7 kB
  • 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt 8.6 kB
  • 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt 8.5 kB
  • 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt 8.5 kB
  • 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt 8.4 kB
  • 25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt 8.2 kB
  • 11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt 8.2 kB
  • 03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt 8.2 kB
  • 02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt 8.1 kB
  • 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt 8.0 kB
  • 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt 8.0 kB
  • 19 - Malicious Activity/008 On-Path Attacks_en.srt 7.9 kB
  • 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt 7.9 kB
  • 28 - Conclusion/002 BONUS Where do I go from here_en.srt 7.9 kB
  • 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt 7.8 kB
  • 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt 7.7 kB
  • 15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt 7.6 kB
  • 06 - Malware/003 Worms (OBJ 2.4)_en.srt 7.6 kB
  • 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt 7.5 kB
  • 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt 7.5 kB
  • 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt 7.4 kB
  • 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt 7.4 kB
  • 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt 7.4 kB
  • 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt 7.3 kB
  • 07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt 7.2 kB
  • 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt 7.1 kB
  • 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt 7.0 kB
  • 15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt 7.0 kB
  • 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt 6.9 kB
  • 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt 6.9 kB
  • 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt 6.8 kB
  • 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt 6.7 kB
  • 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt 6.7 kB
  • 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt 6.7 kB
  • 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt 6.5 kB
  • 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt 6.3 kB
  • 24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt 6.1 kB
  • 07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt 5.7 kB
  • 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt 5.6 kB
  • 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt 5.5 kB
  • 01 - Introduction/001 Download the Study Guide.html 222 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!