2048BT
导航切换
首页
热门番号
热门女优
今日热门
一周热门
最新更新
搜索磁力
BT种子名称
[Udemy] CompTIA Security+ (SY0-501 & SY0-601) Complete Course
分享给好友
找到本站最新地址的两种方法: 1、记住地址发布页
2048bt.cc
、
2048bt.cyou
、
bt搜索.xyz
、
bt搜索.cc
2、发送“地址”到2048bt@gmail.com
BT种子基本信息
种子哈希:
0befa4bd9edc2eb399bc092f958e1b2f72e6a228
文档大小:
21.7 GB
文档个数:
551
个文档
下载次数:
13299
次
下载速度:
极快
收录时间:
2021-06-12
最近下载:
2024-09-26
DMCA/屏蔽:
DMCA/屏蔽
下载磁力链接
magnet:?xt=urn:btih:0BEFA4BD9EDC2EB399BC092F958E1B2F72E6A228
复制磁力链接到utorrent、Bitcomet、迅雷、115、百度网盘、
PIKPAK
等下载工具进行下载。
下载BT种子
磁力链接
种子下载
迅雷下载
二维码
含羞草
51品茶
91视频
逼哩逼哩
欲漫涩
草榴社区
抖阴破解版
成人快手
暗网禁区
缅北禁地
TikTok成人版
暗网解密
文档列表
15 Network Attacks/003 Memorization of Ports (OBJ 3.1).mp4
250.0 MB
30 Policies and Procedures/007 Security Policies (OBJ 5.3 & 5.5).mp4
236.3 MB
32 Conclusion/001 Conclusion.mp4
222.4 MB
20 Access Control/004 Users and Groups (OBJ 3.7 & 3.8).mp4
211.2 MB
16 Securing Networks/003 Securing Network Media (OBJ 2.7).mp4
199.2 MB
10 Secure Software Development/001 Software Development (OBJ 2.1 & 2.3).mp4
197.9 MB
21 Risk Assessments/001 Risk Assessments (OBJ 5.4).mp4
197.8 MB
20 Access Control/002 Access Control Models (OBJ 3.8).mp4
184.7 MB
12 Perimeter Security/002 Firewalls (OBJ 3.3 & 4.4).mp4
183.8 MB
22 Vulnerability Management/001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4
180.0 MB
15 Network Attacks/005 Denial of Service (OBJ 1.3 & 1.4).mp4
178.5 MB
30 Policies and Procedures/009 Vendor Relationships (OBJ 5.3).mp4
175.3 MB
25 Hashing/001 Hashing (OBJ 1.2, 2.8 & 3.2).mp4
174.2 MB
29 Social Engineering/005 __ Motivation Factors (OBJ 1.1).mp4
166.8 MB
13 Cloud Security/003 As a Service (OBJ 2.2).mp4
161.9 MB
10 Secure Software Development/003 Testing Methods (OBJ 2.3 & 3.2).mp4
158.4 MB
21 Risk Assessments/005 Security Controls (OBJ 5.1).mp4
156.3 MB
16 Securing Networks/002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4
153.9 MB
30 Policies and Procedures/002 Data Classifications (OBJ 5.3 & 5.5).mp4
152.4 MB
09 Application Security/002 Web Browser Security (OBJ 3.2 & 3.3).mp4
152.2 MB
26 Public Key Infrastructure/002 Digital Certificates (OBJ 3.9).mp4
151.5 MB
10 Secure Software Development/008 SQL Injection (OBJ 1.3).mp4
148.3 MB
27 Security Protocols/005 VPN Protocols (OBJ 3.1 & 3..3).mp4
148.2 MB
22 Vulnerability Management/005 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4
146.3 MB
05 Mobile Device Security/003 Mobile Malware (OBJ 1.1 & 3.5).mp4
146.3 MB
18 Facilities Security/002 Fire Suppression (OBJ 2.7).mp4
145.4 MB
31 Incident Response and Forensics/007 __ Security Tools (OBJ 4.1).mp4
143.9 MB
10 Secure Software Development/002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4
143.6 MB
16 Securing Networks/006 Wireless Access Points (OBJ 1.4 & 3.4).mp4
143.3 MB
29 Social Engineering/004 Phishing (OBJ 1.1 & 5.3).mp4
142.4 MB
10 Secure Software Development/005 Buffer Overflows (OBJ 1.3).mp4
142.2 MB
02 Malware/002 Viruses (OBJ 1.2).mp4
141.2 MB
30 Policies and Procedures/004 PII and PHI (OBJ 5.2 & 5.5).mp4
140.5 MB
24 Cryptography/002 Symmetric vs Asymmetric (OBJ 2.8).mp4
140.5 MB
16 Securing Networks/010 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4
138.6 MB
11 Network Design/011 Telephony (OBJ 3.1).mp4
137.0 MB
19 Authentication/001 Authentication (OBJ 2.4, 3.5, & 3.8).mp4
136.0 MB
03 Malware Infections/010 Preventing Malware (OBJ 1.6 & 3.2).mp4
135.1 MB
11 Network Design/002 The OSI Model (OBJ 3.3 & 3.6).mp4
134.8 MB
22 Vulnerability Management/008 Password Analysis (OBJ 1.2).mp4
133.6 MB
30 Policies and Procedures/001 Policies and Procedures (OBJ 5.2 & 5.3).mp4
132.8 MB
20 Access Control/003 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4
132.3 MB
28 Planning for the Worst/011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4
129.2 MB
27 Security Protocols/003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4
127.6 MB
16 Securing Networks/005 Wireless Encryption (OBJ 1.6 & 3.4).mp4
126.1 MB
21 Risk Assessments/003 Quantitative Risk (OBJ 5.4).mp4
125.8 MB
28 Planning for the Worst/012 __ Business Impact Analysis (OBJ 5.4).mp4
124.1 MB
23 Monitoring and Auditing/009 Log Files (OBJ 4.3).mp4
120.4 MB
31 Incident Response and Forensics/002 __ Incident Response Planning (OBJ 4.2).mp4
118.8 MB
19 Authentication/002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4
118.2 MB
30 Policies and Procedures/010 Disposal Policies (OBJ 2.7 & 4.1).mp4
115.4 MB
05 Mobile Device Security/007 Security of Apps (OBJ 3.1 & 3.5).mp4
114.7 MB
03 Malware Infections/009 Removing Malware (OBJ 4.2).mp4
113.6 MB
24 Cryptography/001 Cryptography (OBJ 2.1 & 2.8).mp4
113.2 MB
05 Mobile Device Security/008 BYOD (OBJ 3.5).mp4
112.9 MB
04 Security Applications and Devices/009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4
111.9 MB
04 Security Applications and Devices/004 IDS (OBJ 3.2 & 3.3).mp4
110.9 MB
29 Social Engineering/009 User Education (OBJ 5.3).mp4
110.4 MB
01 Overview of Security/008 Hackers (OBJ 1.5).mp4
110.0 MB
24 Cryptography/003 Symmetric Algorithms (OBJ 2.8).mp4
108.4 MB
16 Securing Networks/008 Demo_ Wireless Attack (OBJ 1.4).mp4
108.3 MB
23 Monitoring and Auditing/002 Performance Baselining (OBJ 2.1).mp4
107.4 MB
10 Secure Software Development/006 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4
106.7 MB
09 Application Security/005 Securing Applications (OBJ 1.4 & 3.2).mp4
106.4 MB
31 Incident Response and Forensics/005 Data Collection Procedures (OBJ 4.1 & 4.5).mp4
106.1 MB
28 Planning for the Worst/004 Data Redundancy (OBJ 2.5).mp4
105.2 MB
13 Cloud Security/005 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4
104.4 MB
31 Incident Response and Forensics/001 Incident Response Procedures (OBJ 4.2).mp4
103.9 MB
22 Vulnerability Management/002 Penetration Testing (OBJ 1.8).mp4
103.2 MB
22 Vulnerability Management/006 Demo_ Nmap Scanning (OBJ 4.1).mp4
102.0 MB
16 Securing Networks/004 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4
101.7 MB
03 Malware Infections/002 Common Delivery Methods (OBJ 1.1 & 1.5).mp4
101.6 MB
22 Vulnerability Management/007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4
101.3 MB
15 Network Attacks/013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4
100.9 MB
15 Network Attacks/002 Ports and Protocols (OBJ 3.1).mp4
100.4 MB
24 Cryptography/008 One-Time Pad (OBJ 2.8).mp4
99.1 MB
29 Social Engineering/002 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4
98.6 MB
03 Malware Infections/001 Malware Infections.mp4
97.7 MB
12 Perimeter Security/007 NIDS and NIPS (OBJ 3.3).mp4
96.9 MB
17 Physical Security/005 Biometric Readers (OBJ 2.4).mp4
96.6 MB
12 Perimeter Security/004 Proxy Servers (OBJ 3.3 & 4.4).mp4
96.1 MB
02 Malware/005 Demo_ Viruses and Trojans (OBJ 1.2).mp4
96.0 MB
21 Risk Assessments/002 Qualitative Risk (OBJ 5.4).mp4
95.9 MB
16 Securing Networks/007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4
95.9 MB
04 Security Applications and Devices/002 Software Firewalls (OBJ 3.2).mp4
95.9 MB
01 Overview of Security/001 Welcome.mp4
95.8 MB
03 Malware Infections/008 Symptoms of Infection (OBJ 1.2).mp4
95.8 MB
26 Public Key Infrastructure/004 Certificate Authorities (OBJ 3.2 & 3.9).mp4
94.2 MB
30 Policies and Procedures/008 User Education (OBJ 5.3).mp4
93.2 MB
29 Social Engineering/006 More Social Engineering (OBJ 1.1 & 1.2).mp4
92.4 MB
01 Overview of Security/012 __ Attack Frameworks (OBJ 4.2).mp4
91.9 MB
05 Mobile Device Security/004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4
90.9 MB
04 Security Applications and Devices/007 Securing the BIOS (OBJ 3.2).mp4
90.4 MB
28 Planning for the Worst/010 Tape Rotation (OBJ 2.5).mp4
89.3 MB
17 Physical Security/003 Door Locks (OBJ 2.7).mp4
89.1 MB
03 Malware Infections/007 Backdoors and Logic Bombs (OBJ 1.2).mp4
88.2 MB
06 Hardening/007 Patch Management (OBJ 1.6 & 3.2).mp4
87.5 MB
31 Incident Response and Forensics/004 __ Forensic Procedures (OBJ 4.5).mp4
87.0 MB
08 Virtualization/005 Securing VMs (OBJ 2.2).mp4
86.4 MB
05 Mobile Device Security/009 Hardening Mobile Devices (OBJ 3.5).mp4
85.8 MB
04 Security Applications and Devices/006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4
85.6 MB
24 Cryptography/005 Asymmetric Algorithms (OBJ 2.8).mp4
85.3 MB
20 Access Control/005 Permissions (OBJ 3.8).mp4
85.0 MB
08 Virtualization/004 Threats to VMs (OBJ 2.2).mp4
84.9 MB
10 Secure Software Development/004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4
84.7 MB
19 Authentication/003 802.1x (OBJ 3.4 & 3.8).mp4
83.7 MB
23 Monitoring and Auditing/008 Logging (OBJ 1.7, 4.3, & 4.5).mp4
83.4 MB
23 Monitoring and Auditing/004 SNMP (OBJ 3.1).mp4
83.2 MB
11 Network Design/003 Switches (OBJ 1.4 & 2.7).mp4
81.0 MB
30 Policies and Procedures/012 __ Key Frameworks (OBJ 5.2).mp4
81.0 MB
32 Conclusion/002 BONUS_ What's Next_.mp4
80.6 MB
24 Cryptography/010 __ Cryptography Considerations (OBJ 2.8).mp4
80.3 MB
13 Cloud Security/001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4
80.1 MB
02 Malware/008 Rootkits (OBJ 1.2 & 1.3).mp4
79.3 MB
03 Malware Infections/006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4
79.2 MB
15 Network Attacks/004 Unnecessary Ports (OBJ 1.6 & 3.2).mp4
78.9 MB
10 Secure Software Development/009 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4
78.5 MB
31 Incident Response and Forensics/003 __ Investigative Data (OBJ 4.3).mp4
78.4 MB
15 Network Attacks/009 Hijacking (OBJ 1.3 & 1.4).mp4
78.3 MB
01 Overview of Security/004 CIA Triad.mp4
78.1 MB
06 Hardening/006 Updates and Patches (OBJ 1.6 & 3.2).mp4
77.8 MB
04 Security Applications and Devices/008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4
76.6 MB
30 Policies and Procedures/011 IT Security Frameworks (OBJ 5.2).mp4
74.6 MB
09 Application Security/003 Web Browser Concerns (OBJ 3.2 & 3.3).mp4
74.5 MB
25 Hashing/003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4
74.1 MB
05 Mobile Device Security/006 Mobile Device Theft (OBJ 3.5).mp4
73.2 MB
11 Network Design/005 Network Zones (OBJ 3.3).mp4
72.8 MB
06 Hardening/002 Unnecessary Applications (OBJ 1.6).mp4
72.5 MB
06 Hardening/010 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4
72.4 MB
28 Planning for the Worst/003 Backup Power (OBJ 2.5).mp4
72.3 MB
10 Secure Software Development/007 XSS and XSRF (OBJ 1.3).mp4
72.1 MB
28 Planning for the Worst/002 Redundant Power (OBJ 2.5).mp4
72.0 MB
01 Overview of Security/009 Threat Actors (1.5).mp4
71.6 MB
14 Automation/005 __ Machine Learning (OBJ 1.2).mp4
71.3 MB
04 Security Applications and Devices/005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4
69.9 MB
23 Monitoring and Auditing/010 SIEM (OBJ 1.7 & 4.3).mp4
69.1 MB
02 Malware/009 Spam (OBJ 1.1).mp4
68.3 MB
23 Monitoring and Auditing/003 Protocol Analyzers (OBJ 3.3 & 4.1).mp4
68.1 MB
01 Overview of Security/003 Overview of Security.mp4
67.6 MB
01 Overview of Security/006 Security Threats (OBJ 1.1 & 1.2).mp4
67.3 MB
19 Authentication/007 VPN (OBJ 3.3).mp4
66.6 MB
13 Cloud Security/002 Cloud Types (OBJ 2.2 & 3.6).mp4
66.3 MB
31 Incident Response and Forensics/006 Demo_ Disk Imaging (OBJ 4.1).mp4
66.1 MB
28 Planning for the Worst/009 Data Backup (OBJ 2.5).mp4
65.8 MB
02 Malware/004 Trojans (OBJ 1.2).mp4
65.5 MB
03 Malware Infections/004 Botnets and Zombies (OBJ 1.2 & 1.4).mp4
65.5 MB
23 Monitoring and Auditing/001 Monitoring Types (OBJ 3.3).mp4
65.5 MB
06 Hardening/004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4
65.4 MB
06 Hardening/003 Restricting Applications (OBJ 3.2 & 4.4).mp4
64.9 MB
04 Security Applications and Devices/003 Demo_ Software Firewalls (OBJ 3.2).mp4
64.5 MB
17 Physical Security/002 Surveillance (OBJ 2.7).mp4
63.7 MB
01 Overview of Security/005 AAA of Security (OBJ 2.4).mp4
62.8 MB
21 Risk Assessments/004 Methodologies (OBJ 1.7 & 5.4).mp4
62.3 MB
02 Malware/007 Spyware (OBJ 1.2).mp4
61.0 MB
01 Overview of Security/010 __ Threat Intelligence and Sources (OBJ 1.5).mp4
60.8 MB
08 Virtualization/002 Hypervisors (OBJ 2.2).mp4
60.2 MB
26 Public Key Infrastructure/005 Web of Trust (OBJ 3.9).mp4
60.1 MB
11 Network Design/007 Network Access Control (OBJ 3.3 & 4.4).mp4
59.4 MB
06 Hardening/008 Group Policies (OBJ 2.1).mp4
59.2 MB
01 Overview of Security/007 Mitigating Threats (OBJ 5.1).mp4
59.1 MB
20 Access Control/006 Usernames and Passwords (OBJ 1.6 & 3.7).mp4
58.3 MB
18 Facilities Security/004 Shielding (OBJ 2.7).mp4
57.9 MB
21 Risk Assessments/006 __ Types of Risk (OBJ 1.6 & 5.4).mp4
57.4 MB
27 Security Protocols/004 SSH (OBJ 3.1 & 4.1).mp4
57.0 MB
11 Network Design/004 Routers (OBJ 3.3).mp4
57.0 MB
19 Authentication/004 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4
56.3 MB
13 Cloud Security/004 Cloud Security (OBJ 2.5 & 3.6).mp4
56.0 MB
02 Malware/006 Ransomware (OBJ 1.2).mp4
56.0 MB
18 Facilities Security/003 HVAC (OBJ 2.5, 2.6, & 2.7).mp4
55.8 MB
23 Monitoring and Auditing/007 Demo_ Auditing Files (OBJ 1.7).mp4
55.4 MB
11 Network Design/010 Network Address Translation (OBJ 3.3).mp4
55.2 MB
15 Network Attacks/007 Stopping a DDoS (OBJ 2.1 & 2.3).mp4
55.0 MB
04 Security Applications and Devices/010 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4
54.9 MB
24 Cryptography/004 Public Key Cryptography (OBJ 2.8).mp4
54.9 MB
13 Cloud Security/009 __ FAAS and Serverless (OBJ 2.2).mp4
53.8 MB
26 Public Key Infrastructure/001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4
53.6 MB
13 Cloud Security/006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4
53.4 MB
28 Planning for the Worst/008 Redundant Sites (OBJ 2.1).mp4
53.2 MB
03 Malware Infections/003 Demo_ Phishing (OBJ 1.1 & 5.3).mp4
52.3 MB
19 Authentication/008 RADIUS vs TACACS+ (OBJ 3.8).mp4
52.3 MB
18 Facilities Security/008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4
52.0 MB
10 Secure Software Development/010 __ XML Vulnerabilities (OBJ 1.3).mp4
51.7 MB
23 Monitoring and Auditing/005 Demo_ Analytical Tools (OBJ 4.1).mp4
50.9 MB
29 Social Engineering/003 Insider Threat (OBJ 1.5).mp4
50.7 MB
14 Automation/002 __ CI_CD (OBJ 2.3).mp4
50.7 MB
24 Cryptography/007 Key Management (OBJ 2.8).mp4
50.3 MB
18 Facilities Security/007 __ Embedded System Vulnerabilities (OBJ 2.6).mp4
50.3 MB
02 Malware/003 Worms (OBJ 1.2).mp4
50.2 MB
18 Facilities Security/010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4
50.1 MB
05 Mobile Device Security/005 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4
50.1 MB
28 Planning for the Worst/001 Planning for the Worst (OBJ 2.5 & 5.4).mp4
50.1 MB
28 Planning for the Worst/006 Network Redundancy (OBJ 2.5).mp4
48.9 MB
08 Virtualization/001 Virtualization (OBJ 2.2).mp4
48.9 MB
09 Application Security/004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4
48.3 MB
02 Malware/010 Summary of Malware.mp4
46.8 MB
19 Authentication/006 Remote Access Service (OBJ 3.1 & 3.8).mp4
46.6 MB
18 Facilities Security/005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4
46.0 MB
19 Authentication/009 Authentication Summary (OBJ 3.8).mp4
45.8 MB
08 Virtualization/006 Demo_ Securing VMs.mp4
45.2 MB
01 Overview of Security/011 __ Threat Hunting (OBJ 1.7).mp4
45.1 MB
23 Monitoring and Auditing/006 Auditing (OBJ 1.7).mp4
44.8 MB
06 Hardening/005 Trusted Operating System (OBJ 3.2).mp4
44.7 MB
29 Social Engineering/007 __ Fraud and Scams (OBJ 1.1).mp4
44.7 MB
07 Suppy Chain Management/001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4
44.7 MB
23 Monitoring and Auditing/011 __ Syslog (OBJ 1.7 & 4.3).mp4
44.6 MB
19 Authentication/010 __ Authentication Attacks (OBJ 1.2).mp4
44.5 MB
24 Cryptography/009 Demo_ Steganography (OBJ 2.8).mp4
44.2 MB
12 Perimeter Security/008 Unified Threat Management (OBJ 3.2 & 3.3).mp4
43.6 MB
11 Network Design/009 Subnetting (OBJ 3.6).mp4
43.4 MB
30 Policies and Procedures/005 __ Legal Requirements (OBJ 5.2 & 5.5).mp4
43.3 MB
13 Cloud Security/010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4
43.0 MB
20 Access Control/008 User Account Control (OBJ 3.7 & 3.8).mp4
42.8 MB
13 Cloud Security/008 __ API (OBJ 2.1).mp4
42.6 MB
03 Malware Infections/005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4
42.6 MB
19 Authentication/005 Remote Desktop Services (OBJ 3.1).mp4
42.3 MB
29 Social Engineering/008 __ Influence Campaigns (OBJ 1.1).mp4
42.1 MB
06 Hardening/001 Hardening (OBJ 3.2).mp4
41.6 MB
03 Malware Infections/011 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4
41.5 MB
28 Planning for the Worst/005 Demo_ RAIDs (OBJ 2.5).mp4
41.2 MB
16 Securing Networks/009 __ WPA3 (OBJ 3.4).mp4
41.0 MB
22 Vulnerability Management/009 Demo_ Password Cracking (OBJ 4.1).mp4
40.9 MB
08 Virtualization/003 Demo_ How to create a VM (OBJ 2.2).mp4
40.6 MB
24 Cryptography/006 Pretty Good Privacy (OBJ 2.8).mp4
40.5 MB
09 Application Security/001 Application Security.mp4
40.5 MB
15 Network Attacks/011 Demo_ Null Sessions (OBJ 1.6).mp4
40.5 MB
25 Hashing/002 Demo_ Hashing (OBJ 2.8).mp4
40.4 MB
28 Planning for the Worst/007 Server Redundancy (OBJ 2.5 &3.3).mp4
40.2 MB
30 Policies and Procedures/006 __ Privacy Technologies (OBJ 5.5).mp4
40.0 MB
17 Physical Security/004 Demo_ Lock Picking (OBJ 2.7).mp4
38.5 MB
12 Perimeter Security/006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4
37.1 MB
11 Network Design/006 __ Jumpbox (OBJ 3.5).mp4
36.7 MB
10 Secure Software Development/011 __ Race Conditions (OBJ 1.3).mp4
36.3 MB
17 Physical Security/001 Physical Security (OBJ 2.7).mp4
35.6 MB
15 Network Attacks/006 DDoS (OBJ 1.2, 1.3, & 1.4).mp4
35.4 MB
05 Mobile Device Security/002 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4
35.2 MB
11 Network Design/008 VLANs (OBJ 3.3).mp4
34.7 MB
07 Suppy Chain Management/003 __ Trusted Firmware (OBJ 3.2).mp4
34.6 MB
27 Security Protocols/002 S_MIME (OBJ 3.1).mp4
34.6 MB
20 Access Control/007 Demo_ Policies (OBJ 3.7).mp4
34.6 MB
22 Vulnerability Management/004 OVAL (OBJ 1.7).mp4
34.2 MB
15 Network Attacks/014 ARP Poisoning (OBJ 1.4).mp4
34.1 MB
22 Vulnerability Management/003 __ Training and Exercises (OBJ 1.8 & 4.2).mp4
34.1 MB
15 Network Attacks/010 Replay Attack (OBJ 1.3).mp4
33.6 MB
25 Hashing/004 Increasing Hash Security (OBJ 2.8 & 3.7).mp4
33.5 MB
15 Network Attacks/012 Transitive Attacks (OBJ 2.4).mp4
33.2 MB
14 Automation/003 __ DevSecOps (OBJ 2.3).mp4
32.9 MB
07 Suppy Chain Management/002 __ Root of Trust (OBJ 3.2).mp4
32.6 MB
06 Hardening/009 Demo_ Group Policies (OBJ 3.2).mp4
32.4 MB
12 Perimeter Security/005 Honeypots and Honeynets (OBJ 2.1).mp4
32.2 MB
13 Cloud Security/007 __ CASB (OBJ 2.1).mp4
31.3 MB
18 Facilities Security/006 __ IoT Vulnerabilities (OBJ 2.6).mp4
31.1 MB
14 Automation/004 __ IAC (OBJ 2.2).mp4
31.0 MB
12 Perimeter Security/003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4
30.3 MB
15 Network Attacks/008 Spoofing (OBJ 1.4 & 3.3).mp4
29.9 MB
05 Mobile Device Security/001 Mobile Device Security (OBJ 1.5).mp4
29.8 MB
26 Public Key Infrastructure/003 Demo_ Certificates (OBJ 2.8 & 3.9).mp4
29.3 MB
10 Secure Software Development/012 __ Design Vulnerabilities (OBJ 1.3).mp4
28.2 MB
27 Security Protocols/006 Demo_ Setting up a VPN (OBJ 3.3).mp4
26.0 MB
30 Policies and Procedures/003 __ Data Ownership.mp4
25.8 MB
07 Suppy Chain Management/004 __ Secure Processing (OBJ 3.2).mp4
25.7 MB
14 Automation/001 __ Workflow Orchestration (OBJ 2.3).mp4
25.3 MB
01 Overview of Security/002 CompTIA Security+ 601 Study Guide.pdf
24.0 MB
18 Facilities Security/009 __ Mitigating Vulnerabilities (OBJ 2.6).mp4
23.3 MB
23 Monitoring and Auditing/012 __ SOAR (OBJ 1.7 & 4.4).mp4
22.3 MB
29 Social Engineering/001 Social Engineering (OBJ 1.1).mp4
20.7 MB
01 Overview of Security/002 CompTIA-Security-Study-Notes 501.pdf
20.2 MB
20 Access Control/001 Access Control (OBJ 3.8).mp4
19.5 MB
16 Securing Networks/001 Securing Networks (OBJ 3.3).mp4
19.5 MB
12 Perimeter Security/001 Perimeter Security.mp4
18.7 MB
11 Network Design/001 Network Security.mp4
17.4 MB
02 Malware/001 Malware (OBJ 1.2).mp4
15.7 MB
15 Network Attacks/001 Network Attacks (OBJ 1.4).mp4
15.2 MB
18 Facilities Security/001 Facilities Security (OBJ 2.7).mp4
14.6 MB
04 Security Applications and Devices/001 Security Applications and Devices.mp4
13.4 MB
27 Security Protocols/001 Security Protocols (OBJ 3.1).mp4
9.1 MB
31 Incident Response and Forensics/002 __ Incident Response Planning (OBJ 4.2).en.srt
42.7 kB
31 Incident Response and Forensics/007 __ Security Tools (OBJ 4.1).en.srt
37.9 kB
28 Planning for the Worst/012 __ Business Impact Analysis (OBJ 5.4).en.srt
36.0 kB
31 Incident Response and Forensics/004 __ Forensic Procedures (OBJ 4.5).en.srt
33.2 kB
31 Incident Response and Forensics/003 __ Investigative Data (OBJ 4.3).en.srt
28.9 kB
24 Cryptography/010 __ Cryptography Considerations (OBJ 2.8).en.srt
28.1 kB
01 Overview of Security/012 __ Attack Frameworks (OBJ 4.2).en.srt
25.3 kB
30 Policies and Procedures/007 Security Policies (OBJ 5.3 & 5.5).en.srt
24.8 kB
15 Network Attacks/003 Memorization of Ports (OBJ 3.1).en.srt
22.9 kB
32 Conclusion/001 Conclusion.en.srt
22.5 kB
20 Access Control/004 Users and Groups (OBJ 3.7 & 3.8).en.srt
21.5 kB
20 Access Control/002 Access Control Models (OBJ 3.8).en.srt
20.2 kB
01 Overview of Security/010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt
20.1 kB
22 Vulnerability Management/007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt
19.9 kB
14 Automation/005 __ Machine Learning (OBJ 1.2).en.srt
19.8 kB
21 Risk Assessments/001 Risk Assessments (OBJ 5.4).en.srt
19.7 kB
23 Monitoring and Auditing/010 SIEM (OBJ 1.7 & 4.3).en.srt
19.5 kB
16 Securing Networks/003 Securing Network Media (OBJ 2.7).en.srt
19.4 kB
31 Incident Response and Forensics/005 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt
19.2 kB
10 Secure Software Development/001 Software Development (OBJ 2.1 & 2.3).en.srt
18.9 kB
13 Cloud Security/010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt
18.7 kB
13 Cloud Security/009 __ FAAS and Serverless (OBJ 2.2).en.srt
18.6 kB
30 Policies and Procedures/012 __ Key Frameworks (OBJ 5.2).en.srt
18.4 kB
18 Facilities Security/008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt
18.4 kB
30 Policies and Procedures/009 Vendor Relationships (OBJ 5.3).en.srt
18.1 kB
22 Vulnerability Management/001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt
18.1 kB
15 Network Attacks/005 Denial of Service (OBJ 1.3 & 1.4).en.srt
18.0 kB
03 Malware Infections/011 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt
17.8 kB
12 Perimeter Security/002 Firewalls (OBJ 3.3 & 4.4).en.srt
17.4 kB
29 Social Engineering/005 __ Motivation Factors (OBJ 1.1).en.srt
17.0 kB
19 Authentication/010 __ Authentication Attacks (OBJ 1.2).en.srt
16.9 kB
13 Cloud Security/006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt
16.6 kB
25 Hashing/001 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt
16.6 kB
14 Automation/002 __ CI_CD (OBJ 2.3).en.srt
16.6 kB
16 Securing Networks/006 Wireless Access Points (OBJ 1.4 & 3.4).en.srt
16.4 kB
21 Risk Assessments/006 __ Types of Risk (OBJ 1.6 & 5.4).en.srt
16.4 kB
18 Facilities Security/007 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt
16.0 kB
30 Policies and Procedures/002 Data Classifications (OBJ 5.3 & 5.5).en.srt
15.9 kB
13 Cloud Security/003 As a Service (OBJ 2.2).en.srt
15.8 kB
22 Vulnerability Management/006 Demo_ Nmap Scanning (OBJ 4.1).en.srt
15.7 kB
01 Overview of Security/011 __ Threat Hunting (OBJ 1.7).en.srt
15.6 kB
22 Vulnerability Management/005 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt
15.6 kB
16 Securing Networks/002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt
15.6 kB
26 Public Key Infrastructure/002 Digital Certificates (OBJ 3.9).en.srt
15.4 kB
21 Risk Assessments/005 Security Controls (OBJ 5.1).en.srt
15.3 kB
09 Application Security/002 Web Browser Security (OBJ 3.2 & 3.3).en.srt
15.1 kB
30 Policies and Procedures/006 __ Privacy Technologies (OBJ 5.5).en.srt
15.1 kB
10 Secure Software Development/003 Testing Methods (OBJ 2.3 & 3.2).en.srt
14.6 kB
18 Facilities Security/010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt
14.6 kB
29 Social Engineering/004 Phishing (OBJ 1.1 & 5.3).en.srt
14.5 kB
19 Authentication/001 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt
14.4 kB
16 Securing Networks/010 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt
14.1 kB
27 Security Protocols/005 VPN Protocols (OBJ 3.1 & 3..3).en.srt
14.1 kB
31 Incident Response and Forensics/006 Demo_ Disk Imaging (OBJ 4.1).en.srt
13.9 kB
20 Access Control/003 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt
13.9 kB
04 Security Applications and Devices/003 Demo_ Software Firewalls (OBJ 3.2).en.srt
13.8 kB
28 Planning for the Worst/011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt
13.8 kB
10 Secure Software Development/009 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt
13.8 kB
13 Cloud Security/008 __ API (OBJ 2.1).en.srt
13.7 kB
16 Securing Networks/008 Demo_ Wireless Attack (OBJ 1.4).en.srt
13.7 kB
05 Mobile Device Security/003 Mobile Malware (OBJ 1.1 & 3.5).en.srt
13.7 kB
18 Facilities Security/002 Fire Suppression (OBJ 2.7).en.srt
13.6 kB
30 Policies and Procedures/004 PII and PHI (OBJ 5.2 & 5.5).en.srt
13.5 kB
10 Secure Software Development/002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt
13.4 kB
11 Network Design/011 Telephony (OBJ 3.1).en.srt
13.4 kB
22 Vulnerability Management/008 Password Analysis (OBJ 1.2).en.srt
13.4 kB
10 Secure Software Development/005 Buffer Overflows (OBJ 1.3).en.srt
13.2 kB
10 Secure Software Development/011 __ Race Conditions (OBJ 1.3).en.srt
13.2 kB
30 Policies and Procedures/005 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt
13.2 kB
11 Network Design/006 __ Jumpbox (OBJ 3.5).en.srt
13.2 kB
30 Policies and Procedures/001 Policies and Procedures (OBJ 5.2 & 5.3).en.srt
13.1 kB
02 Malware/005 Demo_ Viruses and Trojans (OBJ 1.2).en.srt
13.0 kB
02 Malware/002 Viruses (OBJ 1.2).en.srt
13.0 kB
24 Cryptography/002 Symmetric vs Asymmetric (OBJ 2.8).en.srt
13.0 kB
10 Secure Software Development/008 SQL Injection (OBJ 1.3).en.srt
12.9 kB
07 Suppy Chain Management/001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt
12.9 kB
11 Network Design/002 The OSI Model (OBJ 3.3 & 3.6).en.srt
12.7 kB
23 Monitoring and Auditing/011 __ Syslog (OBJ 1.7 & 4.3).en.srt
12.6 kB
30 Policies and Procedures/010 Disposal Policies (OBJ 2.7 & 4.1).en.srt
12.6 kB
03 Malware Infections/010 Preventing Malware (OBJ 1.6 & 3.2).en.srt
12.5 kB
16 Securing Networks/009 __ WPA3 (OBJ 3.4).en.srt
12.4 kB
04 Security Applications and Devices/010 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt
12.3 kB
10 Secure Software Development/006 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt
12.3 kB
29 Social Engineering/007 __ Fraud and Scams (OBJ 1.1).en.srt
12.2 kB
27 Security Protocols/003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt
12.1 kB
16 Securing Networks/005 Wireless Encryption (OBJ 1.6 & 3.4).en.srt
11.9 kB
01 Overview of Security/001 Welcome.en.srt
11.8 kB
24 Cryptography/001 Cryptography (OBJ 2.1 & 2.8).en.srt
11.8 kB
14 Automation/003 __ DevSecOps (OBJ 2.3).en.srt
11.6 kB
03 Malware Infections/006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt
11.6 kB
29 Social Engineering/002 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt
11.5 kB
23 Monitoring and Auditing/009 Log Files (OBJ 4.3).en.srt
11.5 kB
22 Vulnerability Management/003 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt
11.5 kB
21 Risk Assessments/003 Quantitative Risk (OBJ 5.4).en.srt
11.4 kB
03 Malware Infections/003 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt
11.4 kB
29 Social Engineering/009 User Education (OBJ 5.3).en.srt
11.3 kB
07 Suppy Chain Management/003 __ Trusted Firmware (OBJ 3.2).en.srt
11.3 kB
10 Secure Software Development/010 __ XML Vulnerabilities (OBJ 1.3).en.srt
11.2 kB
09 Application Security/004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt
11.2 kB
19 Authentication/002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt
11.2 kB
03 Malware Infections/009 Removing Malware (OBJ 4.2).en.srt
11.0 kB
06 Hardening/004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt
11.0 kB
31 Incident Response and Forensics/001 Incident Response Procedures (OBJ 4.2).en.srt
10.9 kB
05 Mobile Device Security/007 Security of Apps (OBJ 3.1 & 3.5).en.srt
10.7 kB
23 Monitoring and Auditing/002 Performance Baselining (OBJ 2.1).en.srt
10.7 kB
04 Security Applications and Devices/004 IDS (OBJ 3.2 & 3.3).en.srt
10.5 kB
05 Mobile Device Security/008 BYOD (OBJ 3.5).en.srt
10.4 kB
22 Vulnerability Management/002 Penetration Testing (OBJ 1.8).en.srt
10.4 kB
07 Suppy Chain Management/002 __ Root of Trust (OBJ 3.2).en.srt
10.3 kB
16 Securing Networks/004 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt
10.2 kB
01 Overview of Security/008 Hackers (OBJ 1.5).en.srt
10.2 kB
20 Access Control/007 Demo_ Policies (OBJ 3.7).en.srt
10.2 kB
13 Cloud Security/005 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt
10.1 kB
13 Cloud Security/007 __ CASB (OBJ 2.1).en.srt
10.1 kB
15 Network Attacks/013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt
10.1 kB
16 Securing Networks/007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt
10.0 kB
14 Automation/004 __ IAC (OBJ 2.2).en.srt
10.0 kB
09 Application Security/005 Securing Applications (OBJ 1.4 & 3.2).en.srt
9.8 kB
28 Planning for the Worst/004 Data Redundancy (OBJ 2.5).en.srt
9.8 kB
24 Cryptography/003 Symmetric Algorithms (OBJ 2.8).en.srt
9.8 kB
21 Risk Assessments/002 Qualitative Risk (OBJ 5.4).en.srt
9.8 kB
10 Secure Software Development/012 __ Design Vulnerabilities (OBJ 1.3).en.srt
9.7 kB
23 Monitoring and Auditing/005 Demo_ Analytical Tools (OBJ 4.1).en.srt
9.5 kB
30 Policies and Procedures/008 User Education (OBJ 5.3).en.srt
9.5 kB
24 Cryptography/008 One-Time Pad (OBJ 2.8).en.srt
9.5 kB
03 Malware Infections/002 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt
9.5 kB
12 Perimeter Security/007 NIDS and NIPS (OBJ 3.3).en.srt
9.4 kB
14 Automation/001 __ Workflow Orchestration (OBJ 2.3).en.srt
9.4 kB
04 Security Applications and Devices/009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt
9.3 kB
17 Physical Security/005 Biometric Readers (OBJ 2.4).en.srt
9.3 kB
29 Social Engineering/008 __ Influence Campaigns (OBJ 1.1).en.srt
9.3 kB
12 Perimeter Security/004 Proxy Servers (OBJ 3.3 & 4.4).en.srt
9.3 kB
17 Physical Security/003 Door Locks (OBJ 2.7).en.srt
9.3 kB
29 Social Engineering/006 More Social Engineering (OBJ 1.1 & 1.2).en.srt
9.2 kB
26 Public Key Infrastructure/004 Certificate Authorities (OBJ 3.2 & 3.9).en.srt
9.1 kB
15 Network Attacks/002 Ports and Protocols (OBJ 3.1).en.srt
9.1 kB
08 Virtualization/006 Demo_ Securing VMs.en.srt
9.0 kB
30 Policies and Procedures/003 __ Data Ownership.en.srt
9.0 kB
03 Malware Infections/008 Symptoms of Infection (OBJ 1.2).en.srt
8.9 kB
32 Conclusion/002 BONUS_ What's Next_.en.srt
8.8 kB
07 Suppy Chain Management/004 __ Secure Processing (OBJ 3.2).en.srt
8.7 kB
20 Access Control/005 Permissions (OBJ 3.8).en.srt
8.7 kB
03 Malware Infections/001 Malware Infections.en.srt
8.7 kB
15 Network Attacks/009 Hijacking (OBJ 1.3 & 1.4).en.srt
8.7 kB
28 Planning for the Worst/010 Tape Rotation (OBJ 2.5).en.srt
8.7 kB
05 Mobile Device Security/004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt
8.5 kB
18 Facilities Security/006 __ IoT Vulnerabilities (OBJ 2.6).en.srt
8.4 kB
01 Overview of Security/004 CIA Triad.en.srt
8.4 kB
12 Perimeter Security/003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt
8.4 kB
04 Security Applications and Devices/002 Software Firewalls (OBJ 3.2).en.srt
8.4 kB
04 Security Applications and Devices/007 Securing the BIOS (OBJ 3.2).en.srt
8.3 kB
24 Cryptography/009 Demo_ Steganography (OBJ 2.8).en.srt
8.2 kB
18 Facilities Security/009 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt
8.2 kB
08 Virtualization/003 Demo_ How to create a VM (OBJ 2.2).en.srt
8.2 kB
03 Malware Infections/007 Backdoors and Logic Bombs (OBJ 1.2).en.srt
8.1 kB
23 Monitoring and Auditing/008 Logging (OBJ 1.7, 4.3, & 4.5).en.srt
8.1 kB
06 Hardening/009 Demo_ Group Policies (OBJ 3.2).en.srt
8.1 kB
13 Cloud Security/001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt
8.0 kB
08 Virtualization/005 Securing VMs (OBJ 2.2).en.srt
8.0 kB
04 Security Applications and Devices/006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt
7.9 kB
23 Monitoring and Auditing/004 SNMP (OBJ 3.1).en.srt
7.9 kB
10 Secure Software Development/004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt
7.9 kB
23 Monitoring and Auditing/007 Demo_ Auditing Files (OBJ 1.7).en.srt
7.8 kB
26 Public Key Infrastructure/001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt
7.8 kB
06 Hardening/007 Patch Management (OBJ 1.6 & 3.2).en.srt
7.8 kB
28 Planning for the Worst/005 Demo_ RAIDs (OBJ 2.5).en.srt
7.8 kB
23 Monitoring and Auditing/012 __ SOAR (OBJ 1.7 & 4.4).en.srt
7.7 kB
08 Virtualization/004 Threats to VMs (OBJ 2.2).en.srt
7.6 kB
24 Cryptography/005 Asymmetric Algorithms (OBJ 2.8).en.srt
7.6 kB
19 Authentication/003 802.1x (OBJ 3.4 & 3.8).en.srt
7.6 kB
11 Network Design/003 Switches (OBJ 1.4 & 2.7).en.srt
7.6 kB
15 Network Attacks/004 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt
7.5 kB
28 Planning for the Worst/003 Backup Power (OBJ 2.5).en.srt
7.5 kB
05 Mobile Device Security/009 Hardening Mobile Devices (OBJ 3.5).en.srt
7.4 kB
03 Malware Infections/004 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt
7.3 kB
30 Policies and Procedures/011 IT Security Frameworks (OBJ 5.2).en.srt
7.3 kB
11 Network Design/005 Network Zones (OBJ 3.3).en.srt
7.2 kB
09 Application Security/003 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt
7.2 kB
28 Planning for the Worst/002 Redundant Power (OBJ 2.5).en.srt
7.2 kB
25 Hashing/003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt
7.1 kB
02 Malware/008 Rootkits (OBJ 1.2 & 1.3).en.srt
7.0 kB
04 Security Applications and Devices/008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt
6.9 kB
24 Cryptography/004 Public Key Cryptography (OBJ 2.8).en.srt
6.9 kB
01 Overview of Security/005 AAA of Security (OBJ 2.4).en.srt
6.9 kB
26 Public Key Infrastructure/003 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt
6.9 kB
04 Security Applications and Devices/005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt
6.8 kB
06 Hardening/006 Updates and Patches (OBJ 1.6 & 3.2).en.srt
6.8 kB
05 Mobile Device Security/006 Mobile Device Theft (OBJ 3.5).en.srt
6.7 kB
01 Overview of Security/009 Threat Actors (1.5).en.srt
6.6 kB
19 Authentication/007 VPN (OBJ 3.3).en.srt
6.6 kB
01 Overview of Security/003 Overview of Security.en.srt
6.6 kB
10 Secure Software Development/007 XSS and XSRF (OBJ 1.3).en.srt
6.6 kB
23 Monitoring and Auditing/003 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt
6.6 kB
17 Physical Security/002 Surveillance (OBJ 2.7).en.srt
6.5 kB
06 Hardening/010 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt
6.4 kB
28 Planning for the Worst/009 Data Backup (OBJ 2.5).en.srt
6.4 kB
21 Risk Assessments/004 Methodologies (OBJ 1.7 & 5.4).en.srt
6.4 kB
06 Hardening/002 Unnecessary Applications (OBJ 1.6).en.srt
6.4 kB
23 Monitoring and Auditing/001 Monitoring Types (OBJ 3.3).en.srt
6.3 kB
06 Hardening/003 Restricting Applications (OBJ 3.2 & 4.4).en.srt
6.1 kB
26 Public Key Infrastructure/005 Web of Trust (OBJ 3.9).en.srt
6.1 kB
01 Overview of Security/006 Security Threats (OBJ 1.1 & 1.2).en.srt
6.1 kB
02 Malware/009 Spam (OBJ 1.1).en.srt
6.0 kB
11 Network Design/007 Network Access Control (OBJ 3.3 & 4.4).en.srt
5.9 kB
20 Access Control/006 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt
5.9 kB
13 Cloud Security/002 Cloud Types (OBJ 2.2 & 3.6).en.srt
5.8 kB
01 Overview of Security/007 Mitigating Threats (OBJ 5.1).en.srt
5.8 kB
25 Hashing/002 Demo_ Hashing (OBJ 2.8).en.srt
5.7 kB
02 Malware/007 Spyware (OBJ 1.2).en.srt
5.6 kB
28 Planning for the Worst/008 Redundant Sites (OBJ 2.1).en.srt
5.6 kB
18 Facilities Security/004 Shielding (OBJ 2.7).en.srt
5.5 kB
27 Security Protocols/004 SSH (OBJ 3.1 & 4.1).en.srt
5.5 kB
02 Malware/004 Trojans (OBJ 1.2).en.srt
5.5 kB
15 Network Attacks/007 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt
5.4 kB
03 Malware Infections/005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt
5.4 kB
13 Cloud Security/004 Cloud Security (OBJ 2.5 & 3.6).en.srt
5.3 kB
11 Network Design/004 Routers (OBJ 3.3).en.srt
5.2 kB
24 Cryptography/007 Key Management (OBJ 2.8).en.srt
5.2 kB
18 Facilities Security/003 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt
5.2 kB
08 Virtualization/002 Hypervisors (OBJ 2.2).en.srt
5.1 kB
29 Social Engineering/003 Insider Threat (OBJ 1.5).en.srt
5.1 kB
02 Malware/006 Ransomware (OBJ 1.2).en.srt
5.1 kB
19 Authentication/004 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt
5.0 kB
06 Hardening/008 Group Policies (OBJ 2.1).en.srt
5.0 kB
28 Planning for the Worst/001 Planning for the Worst (OBJ 2.5 & 5.4).en.srt
5.0 kB
15 Network Attacks/011 Demo_ Null Sessions (OBJ 1.6).en.srt
5.0 kB
11 Network Design/010 Network Address Translation (OBJ 3.3).en.srt
5.0 kB
22 Vulnerability Management/009 Demo_ Password Cracking (OBJ 4.1).en.srt
4.9 kB
28 Planning for the Worst/006 Network Redundancy (OBJ 2.5).en.srt
4.9 kB
18 Facilities Security/005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt
4.7 kB
19 Authentication/008 RADIUS vs TACACS+ (OBJ 3.8).en.srt
4.6 kB
08 Virtualization/001 Virtualization (OBJ 2.2).en.srt
4.4 kB
20 Access Control/008 User Account Control (OBJ 3.7 & 3.8).en.srt
4.4 kB
19 Authentication/006 Remote Access Service (OBJ 3.1 & 3.8).en.srt
4.4 kB
23 Monitoring and Auditing/006 Auditing (OBJ 1.7).en.srt
4.3 kB
02 Malware/003 Worms (OBJ 1.2).en.srt
4.3 kB
02 Malware/010 Summary of Malware.en.srt
4.3 kB
11 Network Design/009 Subnetting (OBJ 3.6).en.srt
4.3 kB
05 Mobile Device Security/005 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt
4.2 kB
06 Hardening/005 Trusted Operating System (OBJ 3.2).en.srt
3.8 kB
12 Perimeter Security/008 Unified Threat Management (OBJ 3.2 & 3.3).en.srt
3.8 kB
28 Planning for the Worst/007 Server Redundancy (OBJ 2.5 &3.3).en.srt
3.8 kB
19 Authentication/005 Remote Desktop Services (OBJ 3.1).en.srt
3.8 kB
19 Authentication/009 Authentication Summary (OBJ 3.8).en.srt
3.7 kB
17 Physical Security/001 Physical Security (OBJ 2.7).en.srt
3.7 kB
09 Application Security/001 Application Security.en.srt
3.6 kB
06 Hardening/001 Hardening (OBJ 3.2).en.srt
3.6 kB
22 Vulnerability Management/004 OVAL (OBJ 1.7).en.srt
3.5 kB
17 Physical Security/004 Demo_ Lock Picking (OBJ 2.7).en.srt
3.5 kB
15 Network Attacks/006 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt
3.4 kB
15 Network Attacks/014 ARP Poisoning (OBJ 1.4).en.srt
3.3 kB
24 Cryptography/006 Pretty Good Privacy (OBJ 2.8).en.srt
3.3 kB
15 Network Attacks/010 Replay Attack (OBJ 1.3).en.srt
3.3 kB
12 Perimeter Security/006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt
3.3 kB
27 Security Protocols/006 Demo_ Setting up a VPN (OBJ 3.3).en.srt
3.3 kB
15 Network Attacks/012 Transitive Attacks (OBJ 2.4).en.srt
3.3 kB
25 Hashing/004 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt
3.3 kB
27 Security Protocols/002 S_MIME (OBJ 3.1).en.srt
3.2 kB
11 Network Design/008 VLANs (OBJ 3.3).en.srt
3.1 kB
12 Perimeter Security/005 Honeypots and Honeynets (OBJ 2.1).en.srt
3.0 kB
15 Network Attacks/008 Spoofing (OBJ 1.4 & 3.3).en.srt
2.9 kB
05 Mobile Device Security/002 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt
2.8 kB
05 Mobile Device Security/001 Mobile Device Security (OBJ 1.5).en.srt
2.7 kB
20 Access Control/001 Access Control (OBJ 3.8).en.srt
2.2 kB
16 Securing Networks/001 Securing Networks (OBJ 3.3).en.srt
2.0 kB
29 Social Engineering/001 Social Engineering (OBJ 1.1).en.srt
2.0 kB
12 Perimeter Security/001 Perimeter Security.en.srt
1.8 kB
11 Network Design/001 Network Security.en.srt
1.7 kB
18 Facilities Security/001 Facilities Security (OBJ 2.7).en.srt
1.4 kB
15 Network Attacks/001 Network Attacks (OBJ 1.4).en.srt
1.4 kB
02 Malware/001 Malware (OBJ 1.2).en.srt
1.2 kB
04 Security Applications and Devices/001 Security Applications and Devices.en.srt
1.2 kB
01 Overview of Security/002 Download the Study Guide.html
1.1 kB
27 Security Protocols/001 Security Protocols (OBJ 3.1).en.srt
779 Bytes
32 Conclusion/external-assets-links.txt
151 Bytes
udemy-dl.log
0 Bytes
==查看完整文档列表==
下一个:
AWT-074 淫語中出し ソープ59 麻生希.mp4
1.3 GB
猜你喜欢
CBT Nuggets - CompTIA Security (SY0-201 - SY0-301 -...
898.6 MB
CBT Nuggets CompTIA Security+ SY0-201 with SY0-301,...
1.0 GB
[ FreeCourseWeb.com ] CompTIA Security + - SY0-601...
44.1 MB
CompTIA Security+ (SY0-501 & SY0-601) Complete Course & Exam
22.0 GB
CBT Nuggets - CompTIA Security+ (SY0-201 - SY0-301 -...
898.6 MB
CompTIA Security (SY0-501) Cert Prep_ 5 Risk Management
463.4 MB
[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501
4.7 GB
Lynda - CompTIA Security Exam Prep SY0-401 - Threats and...
475.2 MB
CBT Nuggets - CompTIA Security+ SY0-401
4.2 GB
CompTIA Security+ Certification (SY0-501) The Total Course
20.5 GB
种子标签
SY0
601
Complete
Udemy
Course
CompTIA
Security
501
种子评价
优质的种子 (0)
假种子 (0)
有密码 (0)
低质量 (0)
有病毒 (0)
无法下载 (0)
欢迎对种子质量进行评价。
最近搜索
敗北日
一周岁
新丁
hadid
w9
godfazer
nooners
exaile
dorob
karotte
甘海
squandered
a4eee8bf
exposiciones
全書
9599.134230
助挡
谷森夏
fanda
bluray720p
maksime
klezmer
kompani
至口
shygirl
prakticheskoje
33e20332
stp21341
近墨者黑
金比
人气女优
更多 »
北川ゆい
Akira
COCOLO
Saiko
あいだもも
あさのくるみ
あまいれもん
いしかわ愛里
いとうしいな
うさみ恭香
うちだまひろ
かぐやひめ
かとりこのみ
かないかほ
くすのき琴美
クミコグレース
くらもとまい(葉月ありさ)
さとみ
中村あみ
しいな純菜
しのざきさとみ(三沢亜也)
牧本千幸(つかもと友希)
眞木ありさ
デヴィ
テラ パトリック
ドミニカ
ともさかまい
ともさか愛
なごみもえ
ひなこ
最新番号
更多 »
MARCH-200
CETD-097
SEND-160
ISO-655
UGUG-028
DSE-814
SICP-101
YOGU-002
WNID-003
NATR-264
HHK-019
KICJ-830
TMSG-018
DDN-165
DANDY-038
ADZ-126
ZACK-008
ASFB-195
DUAL-201
VEC-022
ATP-250
VSPDS-464
MDLD-121
AOSBD-007
EMU-007
EMU-033
SDMS-187
DBEB-024
SDMS-471
GOTHIC-015
同时按Ctrl+D可快速添加本站到收藏夹!您也可以保存到
桌面快捷方式
。
分享BT种子/磁力链接
亲,你知道吗?下载的人越多速度越快,赶快把本页面分享给好友一起下载吧^_^
友情链接
蓝导航
|
找AV导航
|
花小猪导航
|
小X福利导航
|
不良研究所