589689.xyz

Udemy - TOTAL CompTIA Security+ Certification (SY0-501)

  • 收录时间:2022-04-15 02:26:09
  • 文件大小:21GB
  • 下载次数:1
  • 最近下载:2022-04-15 02:26:09
  • 磁力链接:

文件列表

  1. 2. Cryptography/13. Cryptographic Attacks.mp4 417MB
  2. 5. Securing Individual Systems/3. Man-in-the-Middle.mp4 410MB
  3. 5. Securing Individual Systems/9. Host Hardening.mp4 335MB
  4. 2. Cryptography/12. Public Key Infrastructure.mp4 320MB
  5. 5. Securing Individual Systems/16. Analyzing Output.mp4 298MB
  6. 2. Cryptography/11. Certificates and Trust.mp4 279MB
  7. 7. Beyond the Basic LAN/8. Wireless Access Points.mp4 277MB
  8. 7. Beyond the Basic LAN/7. Wireless Hardening.srt 273MB
  9. 7. Beyond the Basic LAN/7. Wireless Hardening.mp4 273MB
  10. 5. Securing Individual Systems/6. NAS and SAN.mp4 266MB
  11. 7. Beyond the Basic LAN/19. Mobile Enforcement.mp4 266MB
  12. 3. Identity and Access Management/1. Identification.mp4 261MB
  13. 2. Cryptography/1. Cryptography Basics.mp4 260MB
  14. 7. Beyond the Basic LAN/17. Mobile Connectivity.mp4 256MB
  15. 1. Risk Management/5. Managing Risk.mp4 256MB
  16. 7. Beyond the Basic LAN/10. Virtual Security.mp4 255MB
  17. 4. Tools of the Trade/1. OS Utilities, Part 1.mp4 248MB
  18. 5. Securing Individual Systems/14. Securing Peripherals.mp4 242MB
  19. 9. Testing Your Infrastructure/8. Vulnerability Impact.mp4 237MB
  20. 8. Secure Protocols/9. Secure Deployment Concepts.mp4 223MB
  21. 3. Identity and Access Management/6. Windows File Permissions.mp4 221MB
  22. 1. Risk Management/14. Business Impact Analysis.mp4 220MB
  23. 1. Risk Management/15. Organizing Data.mp4 218MB
  24. 7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.mp4 217MB
  25. 5. Securing Individual Systems/15. Malware.mp4 215MB
  26. 1. Risk Management/3. What is Risk.mp4 214MB
  27. 6. The Basic LAN/6. Proxy Servers.mp4 212MB
  28. 4. Tools of the Trade/2. OS Utilities, Part 2.mp4 211MB
  29. 6. The Basic LAN/9. IPSec.mp4 210MB
  30. 3. Identity and Access Management/9. Authentication Methods.srt 206MB
  31. 3. Identity and Access Management/9. Authentication Methods.mp4 206MB
  32. 4. Tools of the Trade/5. SNMP.mp4 204MB
  33. 7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.mp4 196MB
  34. 8. Secure Protocols/5. Transport Layer Security (TLS).srt 196MB
  35. 8. Secure Protocols/5. Transport Layer Security (TLS).mp4 196MB
  36. 2. Cryptography/5. RSA Cryptosystems.mp4 194MB
  37. 2. Cryptography/3. Symmetric Cryptosystems.srt 193MB
  38. 2. Cryptography/3. Symmetric Cryptosystems.mp4 193MB
  39. 8. Secure Protocols/1. Secure Applications and Protocols.srt 192MB
  40. 8. Secure Protocols/1. Secure Applications and Protocols.mp4 192MB
  41. 5. Securing Individual Systems/4. System Resiliency.mp4 191MB
  42. 6. The Basic LAN/5. The Network Firewall.mp4 191MB
  43. 3. Identity and Access Management/5. Linux File Permissions.mp4 191MB
  44. 5. Securing Individual Systems/12. HardwareFirmware Security.mp4 190MB
  45. 2. Cryptography/7. PGPGPG.mp4 188MB
  46. 5. Securing Individual Systems/2. Host Threats.mp4 187MB
  47. 7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.mp4 186MB
  48. 4. Tools of the Trade/4. Protocol Analyzers.mp4 185MB
  49. 8. Secure Protocols/8. Secure Code Development.mp4 182MB
  50. 9. Testing Your Infrastructure/6. Attacking Applications.mp4 182MB
  51. 6. The Basic LAN/8. Virtual Private Networks.mp4 179MB
  52. 7. Beyond the Basic LAN/11. Containers.mp4 177MB
  53. 7. Beyond the Basic LAN/21. Physical Controls.mp4 176MB
  54. 7. Beyond the Basic LAN/2. Living in Open Networks.mp4 175MB
  55. 1. Risk Management/11. Security Policies.mp4 174MB
  56. 7. Beyond the Basic LAN/1. Wireless Review.mp4 173MB
  57. 3. Identity and Access Management/10. Single Sign-On.mp4 172MB
  58. 1. Risk Management/12. Frameworks.mp4 171MB
  59. 3. Identity and Access Management/8. AAA.mp4 171MB
  60. 9. Testing Your Infrastructure/7. Exploiting a Target.mp4 168MB
  61. 10. Dealing with Incidents/2. Digital Forensics.mp4 168MB
  62. 5. Securing Individual Systems/13. Secure OS Types.mp4 167MB
  63. 10. Dealing with Incidents/3. Contingency Planning.mp4 165MB
  64. 4. Tools of the Trade/3. Network Scanners.mp4 165MB
  65. 2. Cryptography/2. Cryptographic Methods.mp4 161MB
  66. 3. Identity and Access Management/4. Password Security.mp4 160MB
  67. 9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.mp4 160MB
  68. 6. The Basic LAN/4. Network Access Controls.mp4 159MB
  69. 5. Securing Individual Systems/5. RAID.srt 155MB
  70. 5. Securing Individual Systems/5. RAID.mp4 155MB
  71. 7. Beyond the Basic LAN/12. IaaS.mp4 149MB
  72. 8. Secure Protocols/2. Network Models.mp4 148MB
  73. 3. Identity and Access Management/7. User Account Management.mp4 143MB
  74. 1. Risk Management/4. Threat Actors.mp4 142MB
  75. 7. Beyond the Basic LAN/16. Static Hosts.srt 142MB
  76. 7. Beyond the Basic LAN/16. Static Hosts.mp4 142MB
  77. 7. Beyond the Basic LAN/15. Deployment Models.mp4 141MB
  78. 6. The Basic LAN/11. SIEM.mp4 139MB
  79. 1. Risk Management/10. IT Security Governance.mp4 139MB
  80. 7. Beyond the Basic LAN/9. Virtualization Basics.mp4 139MB
  81. 5. Securing Individual Systems/7. Physical Hardening.mp4 138MB
  82. 7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.mp4 136MB
  83. 7. Beyond the Basic LAN/22. HVAC.mp4 135MB
  84. 7. Beyond the Basic LAN/13. PaaS.mp4 133MB
  85. 5. Securing Individual Systems/11. Disk Encryption.mp4 133MB
  86. 7. Beyond the Basic LAN/13. PaaS.srt 132MB
  87. 8. Secure Protocols/3. Know Your Protocols - TCPIP.mp4 132MB
  88. 9. Testing Your Infrastructure/4. Social Engineering Attacks.mp4 132MB
  89. 4. Tools of the Trade/6. Logs.mp4 126MB
  90. 7. Beyond the Basic LAN/20. Mobile Device Management.mp4 125MB
  91. 6. The Basic LAN/3. Network Zone Review.srt 125MB
  92. 6. The Basic LAN/3. Network Zone Review.mp4 125MB
  93. 6. The Basic LAN/1. LAN Review.mp4 120MB
  94. 3. Identity and Access Management/2. Authorization Concepts.mp4 116MB
  95. 1. Risk Management/16. Security Training.mp4 116MB
  96. 5. Securing Individual Systems/1. Denial of Service.mp4 116MB
  97. 6. The Basic LAN/10. NIDSNIPS.mp4 115MB
  98. 1. Risk Management/6. Using Guides for Risk Assessment.mp4 115MB
  99. 2. Cryptography/4. Symmetric Block Modes.mp4 114MB
  100. 2. Cryptography/8. Hashing.mp4 106MB
  101. 5. Securing Individual Systems/18. Automation Strategies.mp4 104MB
  102. 5. Securing Individual Systems/19. Data Destruction.mp4 104MB
  103. 1. Risk Management/17. Third Party Agreements.mp4 104MB
  104. 8. Secure Protocols/10. Code Quality and Testing.mp4 103MB
  105. 9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.mp4 101MB
  106. 1. Risk Management/9. Defense in Depth.mp4 98MB
  107. 2. Cryptography/6. Diffie-Hellman.mp4 97MB
  108. 1. Risk Management/7. Security Controls.mp4 97MB
  109. 1. Risk Management/13. Quantitative Risk Calculations.mp4 95MB
  110. 5. Securing Individual Systems/17. IDS and IPS.mp4 95MB
  111. 9. Testing Your Infrastructure/5. Attacking Web Sites.mp4 91MB
  112. 10. Dealing with Incidents/4. Backups.mp4 91MB
  113. 8. Secure Protocols/7. Protecting Your Servers.mp4 87MB
  114. 6. The Basic LAN/7. Honeypots.mp4 81MB
  115. 8. Secure Protocols/6. Internet Service Hardening.mp4 79MB
  116. 7. Beyond the Basic LAN/18. Deploying Mobile Devices.mp4 79MB
  117. 2. Cryptography/10. Steganography.mp4 79MB
  118. 5. Securing Individual Systems/10. Data and System Security.srt 77MB
  119. 5. Securing Individual Systems/10. Data and System Security.mp4 77MB
  120. 1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.mp4 75MB
  121. 7. Beyond the Basic LAN/23. Fire Suppression.mp4 73MB
  122. 3. Identity and Access Management/3. Access Control List.mp4 68MB
  123. 2. Cryptography/9. HMAC.mp4 66MB
  124. 6. The Basic LAN/2. Network Topologies Review.mp4 62MB
  125. 7. Beyond the Basic LAN/14. SaaS.mp4 54MB
  126. 8. Secure Protocols/4. Know Your Protocols - Applications.mp4 49MB
  127. 10. Dealing with Incidents/1. Incident Response.mp4 48MB
  128. 1. Risk Management/2. The CIA of Security.mp4 44MB
  129. 9. Testing Your Infrastructure/3. Social Engineering Principles.mp4 40MB
  130. 5. Securing Individual Systems/8. RFI, EMI and ESD.mp4 33MB
  131. 1. Risk Management/8. Interesting Security Controls.mp4 31MB
  132. 7. Beyond the Basic LAN/15. Deployment Models.srt 20MB
  133. 1. Risk Management/1.1 CompTIA Security (SY0-501).pdf.pdf 541KB
  134. 2. Cryptography/13. Cryptographic Attacks.srt 36KB
  135. 2. Cryptography/12. Public Key Infrastructure.srt 33KB
  136. 5. Securing Individual Systems/3. Man-in-the-Middle.srt 33KB
  137. 5. Securing Individual Systems/9. Host Hardening.srt 25KB
  138. 2. Cryptography/1. Cryptography Basics.srt 24KB
  139. 5. Securing Individual Systems/16. Analyzing Output.srt 23KB
  140. 7. Beyond the Basic LAN/10. Virtual Security.srt 23KB
  141. 5. Securing Individual Systems/6. NAS and SAN.srt 22KB
  142. 4. Tools of the Trade/5. SNMP.srt 22KB
  143. 3. Identity and Access Management/5. Linux File Permissions.srt 22KB
  144. 4. Tools of the Trade/1. OS Utilities, Part 1.srt 21KB
  145. 2. Cryptography/11. Certificates and Trust.srt 21KB
  146. 4. Tools of the Trade/2. OS Utilities, Part 2.srt 20KB
  147. 3. Identity and Access Management/6. Windows File Permissions.srt 20KB
  148. 3. Identity and Access Management/1. Identification.srt 20KB
  149. 6. The Basic LAN/8. Virtual Private Networks.srt 20KB
  150. 6. The Basic LAN/5. The Network Firewall.srt 19KB
  151. 7. Beyond the Basic LAN/8. Wireless Access Points.srt 19KB
  152. 7. Beyond the Basic LAN/19. Mobile Enforcement.srt 18KB
  153. 1. Risk Management/5. Managing Risk.srt 18KB
  154. 6. The Basic LAN/6. Proxy Servers.srt 18KB
  155. 1. Risk Management/14. Business Impact Analysis.srt 17KB
  156. 7. Beyond the Basic LAN/11. Containers.srt 17KB
  157. 8. Secure Protocols/9. Secure Deployment Concepts.srt 17KB
  158. 5. Securing Individual Systems/4. System Resiliency.srt 17KB
  159. 10. Dealing with Incidents/2. Digital Forensics.srt 17KB
  160. 5. Securing Individual Systems/14. Securing Peripherals.srt 17KB
  161. 4. Tools of the Trade/6. Logs.srt 16KB
  162. 6. The Basic LAN/9. IPSec.srt 16KB
  163. 7. Beyond the Basic LAN/17. Mobile Connectivity.srt 16KB
  164. 4. Tools of the Trade/3. Network Scanners.srt 16KB
  165. 10. Dealing with Incidents/3. Contingency Planning.srt 16KB
  166. 9. Testing Your Infrastructure/8. Vulnerability Impact.srt 16KB
  167. 4. Tools of the Trade/4. Protocol Analyzers.srt 15KB
  168. 9. Testing Your Infrastructure/7. Exploiting a Target.srt 15KB
  169. 3. Identity and Access Management/10. Single Sign-On.srt 15KB
  170. 8. Secure Protocols/8. Secure Code Development.srt 15KB
  171. 9. Testing Your Infrastructure/6. Attacking Applications.srt 15KB
  172. 7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.srt 15KB
  173. 1. Risk Management/3. What is Risk.srt 15KB
  174. 7. Beyond the Basic LAN/20. Mobile Device Management.srt 15KB
  175. 6. The Basic LAN/4. Network Access Controls.srt 15KB
  176. 2. Cryptography/5. RSA Cryptosystems.srt 14KB
  177. 5. Securing Individual Systems/15. Malware.srt 14KB
  178. 1. Risk Management/16. Security Training.srt 14KB
  179. 1. Risk Management/15. Organizing Data.srt 14KB
  180. 7. Beyond the Basic LAN/2. Living in Open Networks.srt 14KB
  181. 3. Identity and Access Management/4. Password Security.srt 14KB
  182. 7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.srt 14KB
  183. 7. Beyond the Basic LAN/12. IaaS.srt 14KB
  184. 5. Securing Individual Systems/12. HardwareFirmware Security.srt 14KB
  185. 2. Cryptography/7. PGPGPG.srt 14KB
  186. 9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.srt 14KB
  187. 1. Risk Management/12. Frameworks.srt 13KB
  188. 5. Securing Individual Systems/1. Denial of Service.srt 13KB
  189. 5. Securing Individual Systems/2. Host Threats.srt 13KB
  190. 7. Beyond the Basic LAN/1. Wireless Review.srt 13KB
  191. 7. Beyond the Basic LAN/21. Physical Controls.srt 12KB
  192. 1. Risk Management/11. Security Policies.srt 12KB
  193. 1. Risk Management/10. IT Security Governance.srt 12KB
  194. 3. Identity and Access Management/8. AAA.srt 12KB
  195. 9. Testing Your Infrastructure/5. Attacking Web Sites.srt 12KB
  196. 1. Risk Management/13. Quantitative Risk Calculations.srt 12KB
  197. 1. Risk Management/17. Third Party Agreements.srt 11KB
  198. 10. Dealing with Incidents/4. Backups.srt 11KB
  199. 6. The Basic LAN/1. LAN Review.srt 11KB
  200. 7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.srt 11KB
  201. 9. Testing Your Infrastructure/4. Social Engineering Attacks.srt 11KB
  202. 2. Cryptography/4. Symmetric Block Modes.srt 11KB
  203. 5. Securing Individual Systems/13. Secure OS Types.srt 11KB
  204. 6. The Basic LAN/11. SIEM.srt 11KB
  205. 7. Beyond the Basic LAN/9. Virtualization Basics.srt 11KB
  206. 1. Risk Management/7. Security Controls.srt 11KB
  207. 8. Secure Protocols/2. Network Models.srt 11KB
  208. 5. Securing Individual Systems/7. Physical Hardening.srt 11KB
  209. 7. Beyond the Basic LAN/22. HVAC.srt 10KB
  210. 7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.srt 10KB
  211. 2. Cryptography/2. Cryptographic Methods.srt 10KB
  212. 1. Risk Management/4. Threat Actors.srt 10KB
  213. 2. Cryptography/8. Hashing.srt 10KB
  214. 3. Identity and Access Management/7. User Account Management.srt 10KB
  215. 1. Risk Management/6. Using Guides for Risk Assessment.srt 9KB
  216. 5. Securing Individual Systems/11. Disk Encryption.srt 9KB
  217. 8. Secure Protocols/6. Internet Service Hardening.srt 9KB
  218. 3. Identity and Access Management/3. Access Control List.srt 9KB
  219. 10. Dealing with Incidents/1. Incident Response.srt 9KB
  220. 2. Cryptography/6. Diffie-Hellman.srt 9KB
  221. 8. Secure Protocols/7. Protecting Your Servers.srt 9KB
  222. 3. Identity and Access Management/2. Authorization Concepts.srt 8KB
  223. 8. Secure Protocols/3. Know Your Protocols - TCPIP.srt 8KB
  224. 2. Cryptography/10. Steganography.srt 8KB
  225. 6. The Basic LAN/10. NIDSNIPS.srt 8KB
  226. 8. Secure Protocols/4. Know Your Protocols - Applications.srt 7KB
  227. 7. Beyond the Basic LAN/18. Deploying Mobile Devices.srt 7KB
  228. 8. Secure Protocols/10. Code Quality and Testing.srt 7KB
  229. 1. Risk Management/9. Defense in Depth.srt 7KB
  230. 5. Securing Individual Systems/18. Automation Strategies.srt 7KB
  231. 9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.srt 7KB
  232. 6. The Basic LAN/2. Network Topologies Review.srt 7KB
  233. 5. Securing Individual Systems/19. Data Destruction.srt 7KB
  234. 6. The Basic LAN/7. Honeypots.srt 6KB
  235. 5. Securing Individual Systems/17. IDS and IPS.srt 6KB
  236. 7. Beyond the Basic LAN/23. Fire Suppression.srt 6KB
  237. 1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.srt 5KB
  238. 1. Risk Management/2. The CIA of Security.srt 5KB
  239. 2. Cryptography/9. HMAC.srt 5KB
  240. 1. Risk Management/8. Interesting Security Controls.srt 5KB
  241. 5. Securing Individual Systems/8. RFI, EMI and ESD.srt 4KB
  242. 7. Beyond the Basic LAN/14. SaaS.srt 4KB
  243. 9. Testing Your Infrastructure/3. Social Engineering Principles.srt 3KB
  244. 1. Risk Management/18. Risk Management Quiz.html 166B
  245. 2. Cryptography/14. Cryptography Quiz.html 166B
  246. 3. Identity and Access Management/11. Identity and Access Management Quiz.html 166B
  247. 4. Tools of the Trade/7. Tools of the Trade Quiz.html 166B
  248. 5. Securing Individual Systems/20. Securing Individual Systems Quiz.html 166B
  249. 6. The Basic LAN/12. The Basic LAN Quiz.html 166B
  250. 7. Beyond the Basic LAN/24. Beyond the Basic LAN Quiz.html 166B
  251. 8. Secure Protocols/11. Secure Protocols Quiz.html 166B
  252. 9. Testing Your Infrastructure/9. Testing Your Infrastructure Quiz.html 166B
  253. 10. Dealing with Incidents/5. Dealing with Incidents Quiz.html 166B
  254. 2. Cryptography/3. You Can Boost Brain Power.html 114B
  255. 3. Identity and Access Management/5. Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html 84B
  256. 6. The Basic LAN/Seagate Portable.html 84B
  257. 9. Testing Your Infrastructure/Alfa AWUS036NHA 150Mbps Wireless USB Adaptor.html 84B
  258. 9. Testing Your Infrastructure/Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter.html 84B
  259. 9. Testing Your Infrastructure/Panda Wireless PAU06 300Mbps N USB Adapter.html 84B
  260. 10. Dealing with Incidents/Defense against the Black Arts.html 84B
  261. 10. Dealing with Incidents/hackers bags.html 84B