589689.xyz

Pluralsight - Security for CompTIA A Plus (220-902)

  • 收录时间:2018-03-06 12:10:11
  • 文件大小:627MB
  • 下载次数:157
  • 最近下载:2021-01-12 05:31:11
  • 磁力链接:

文件列表

  1. 04. Securing Workstations/04_09-Demo 1 Implementing Account and Password Policies.mp4 20MB
  2. 03. Windows OS Security Settings/03_09-Demo 5 Using NTFS and Shared Folder Permissions.mp4 19MB
  3. 07. Securing SOHO Wireless and Wired Networks/07_13-Demo SOHO Router Basic Configuration.mp4 19MB
  4. 02. Common Prevention Methods/02_09-Demo 1 Applying Authentication and Authorization.mp4 17MB
  5. 01. Common Security Threats and Vulnerabilities/01_17-Demo Cleaning Malware in Windows 8.1.mp4 15MB
  6. 03. Windows OS Security Settings/03_03-Demo 1 Managing Users and Groups.mp4 14MB
  7. 05. Securing Mobile Devices/05_10-Demo 1 Introducing the Cisco Meraki MDM Solution.mp4 14MB
  8. 05. Securing Mobile Devices/05_04-BYODMDM Security Concerns.mp4 14MB
  9. 02. Common Prevention Methods/02_10-Demo 2 Applying Accounting.mp4 14MB
  10. 03. Windows OS Security Settings/03_05-File System Security Concepts.mp4 13MB
  11. 06. Data Destruction and Disposal Methods/06_09-Demo 1 Data Deletion and Recovery.mp4 13MB
  12. 04. Securing Workstations/04_04-Password Principles.mp4 11MB
  13. 01. Common Security Threats and Vulnerabilities/01_11-Phishing and Spear Phishing.mp4 11MB
  14. 07. Securing SOHO Wireless and Wired Networks/07_06-Common WLAN Protection Mechanisms.mp4 11MB
  15. 01. Common Security Threats and Vulnerabilities/01_09-Trojans and Rootkits.mp4 11MB
  16. 04. Securing Workstations/04_06-The Password Security Balancing Act.mp4 11MB
  17. 06. Data Destruction and Disposal Methods/06_10-Demo 2 Performing Secure Data Erasure.mp4 11MB
  18. 02. Common Prevention Methods/02_07-Digital Loss Prevention DLP.mp4 10MB
  19. Exercise files/securitycomptiaaplus220902.zip 10MB
  20. 01. Common Security Threats and Vulnerabilities/01_05-Spyware.mp4 10MB
  21. 04. Securing Workstations/04_07-User Account Management.mp4 10MB
  22. 01. Common Security Threats and Vulnerabilities/01_01-Overview.mp4 10MB
  23. 06. Data Destruction and Disposal Methods/06_04-Physical Data Destruction Methods.mp4 9MB
  24. 02. Common Prevention Methods/02_05-Elements of a Secure Office.mp4 9MB
  25. 05. Securing Mobile Devices/05_05-Policies and Procedures.mp4 8MB
  26. 01. Common Security Threats and Vulnerabilities/01_08-Viruses.mp4 8MB
  27. 02. Common Prevention Methods/02_03-Secure Doors.mp4 8MB
  28. 04. Securing Workstations/04_05-Elements of a Strong Password.mp4 8MB
  29. 01. Common Security Threats and Vulnerabilities/01_04-Malware Trends.mp4 8MB
  30. 07. Securing SOHO Wireless and Wired Networks/07_05-The Myth of Perfect Security.mp4 8MB
  31. 01. Common Security Threats and Vulnerabilities/01_15-Social Engineering, Tailgating, and Shoulder Surfing.mp4 8MB
  32. 03. Windows OS Security Settings/03_07-Demo 3 Using BitLocker.mp4 7MB
  33. 05. Securing Mobile Devices/05_07-Screen Locks.mp4 7MB
  34. 03. Windows OS Security Settings/03_06-BitLocker vs. EFS.mp4 7MB
  35. 06. Data Destruction and Disposal Methods/06_05-Certificate of Destruction.mp4 7MB
  36. 03. Windows OS Security Settings/03_08-Demo 4 Using Encrypting File System.mp4 7MB
  37. 04. Securing Workstations/04_10-Demo 2 Security Policies and the User Experience.mp4 7MB
  38. 07. Securing SOHO Wireless and Wired Networks/07_07-WiFi Security Protocols.mp4 7MB
  39. 05. Securing Mobile Devices/05_11-Demo 2 Introducing Microsoft Intune.mp4 7MB
  40. 03. Windows OS Security Settings/03_04-Demo 2 Managing Users and Groups, Continued.mp4 7MB
  41. 05. Securing Mobile Devices/05_06-Popular MDM Solutions.mp4 6MB
  42. 01. Common Security Threats and Vulnerabilities/01_03-Preliminary Definitions.mp4 6MB
  43. 04. Securing Workstations/04_08-System Security Principles.mp4 6MB
  44. 05. Securing Mobile Devices/05_08-MDM Common Features.mp4 6MB
  45. 02. Common Prevention Methods/02_04-Access Controls.mp4 6MB
  46. 06. Data Destruction and Disposal Methods/06_07-Hard Drive Formatting Methods.mp4 6MB
  47. 03. Windows OS Security Settings/03_01-Overview.mp4 6MB
  48. 02. Common Prevention Methods/02_08-User Education.mp4 5MB
  49. 06. Data Destruction and Disposal Methods/06_06-Ewaste.mp4 5MB
  50. 01. Common Security Threats and Vulnerabilities/01_06-Ransomware.mp4 5MB
  51. 06. Data Destruction and Disposal Methods/06_01-Overview.mp4 5MB
  52. 05. Securing Mobile Devices/05_01-Overview.mp4 5MB
  53. 04. Securing Workstations/04_01-Overview.mp4 5MB
  54. 06. Data Destruction and Disposal Methods/06_08-Securely Deleting Hard Drive Data.mp4 5MB
  55. 07. Securing SOHO Wireless and Wired Networks/07_03-Understanding the SOHO Environment.mp4 5MB
  56. 02. Common Prevention Methods/02_06-AAA.mp4 5MB
  57. 06. Data Destruction and Disposal Methods/06_03-Use Cases for Data Destruction.mp4 5MB
  58. 07. Securing SOHO Wireless and Wired Networks/07_11-Firewalls.mp4 4MB
  59. 02. Common Prevention Methods/02_11-Back to the Real World.mp4 4MB
  60. 07. Securing SOHO Wireless and Wired Networks/07_01-Overview.mp4 4MB
  61. 07. Securing SOHO Wireless and Wired Networks/07_09-Switch Port Security.mp4 4MB
  62. 01. Common Security Threats and Vulnerabilities/01_13-Botnets.mp4 4MB
  63. 01. Common Security Threats and Vulnerabilities/01_14-Password Attacks.mp4 4MB
  64. 02. Common Prevention Methods/02_01-Overview.mp4 4MB
  65. 07. Securing SOHO Wireless and Wired Networks/07_04-SOHO Networking Challenges.mp4 4MB
  66. 05. Securing Mobile Devices/05_03-Defining BYOD and MDM.mp4 3MB
  67. 01. Common Security Threats and Vulnerabilities/01_12-Man in the Middle Attacks.mp4 3MB
  68. 07. Securing SOHO Wireless and Wired Networks/07_10-Web Content Filtering.mp4 3MB
  69. 07. Securing SOHO Wireless and Wired Networks/07_08-Radio and Antenna.mp4 3MB
  70. 07. Securing SOHO Wireless and Wired Networks/07_12-Converged SOHO Network Appliances.mp4 3MB
  71. 07. Securing SOHO Wireless and Wired Networks/07_17-Summary.mp4 3MB
  72. 04. Securing Workstations/04_11-Back to the Real World.mp4 3MB
  73. 07. Securing SOHO Wireless and Wired Networks/07_14-Back to the Real World.mp4 2MB
  74. 05. Securing Mobile Devices/05_15-Summary.mp4 2MB
  75. 05. Securing Mobile Devices/05_02-Meanwhile, in the Real World.mp4 2MB
  76. 03. Windows OS Security Settings/03_13-Summary.mp4 2MB
  77. 01. Common Security Threats and Vulnerabilities/01_07-Worms.mp4 2MB
  78. 05. Securing Mobile Devices/05_14-For Further Learning.mp4 2MB
  79. 01. Common Security Threats and Vulnerabilities/01_20-For Further Learning.mp4 2MB
  80. 03. Windows OS Security Settings/03_12-For Further Learning.mp4 2MB
  81. 01. Common Security Threats and Vulnerabilities/01_10-Zeroday Exploits.mp4 2MB
  82. 06. Data Destruction and Disposal Methods/06_12-Homework.mp4 2MB
  83. 03. Windows OS Security Settings/03_11-Homework.mp4 2MB
  84. 04. Securing Workstations/04_14-Summary.mp4 2MB
  85. 01. Common Security Threats and Vulnerabilities/01_16-Security Best Practices.mp4 2MB
  86. 02. Common Prevention Methods/02_13-For Further Learning.mp4 2MB
  87. 05. Securing Mobile Devices/05_09-Authenticator Apps.mp4 2MB
  88. 04. Securing Workstations/04_13-For Further Learning.mp4 2MB
  89. 01. Common Security Threats and Vulnerabilities/01_21-Summary.mp4 2MB
  90. 04. Securing Workstations/04_03-Defining Best Practice.mp4 2MB
  91. 06. Data Destruction and Disposal Methods/06_14-Summary.mp4 2MB
  92. 02. Common Prevention Methods/02_14-Summary.mp4 2MB
  93. 07. Securing SOHO Wireless and Wired Networks/07_16-For Further Learning.mp4 2MB
  94. 02. Common Prevention Methods/02_12-Homework.mp4 2MB
  95. 06. Data Destruction and Disposal Methods/06_11-Back to the Real World.mp4 1MB
  96. 02. Common Prevention Methods/02_02-Meanwhile, in the Real World.mp4 1MB
  97. 04. Securing Workstations/04_12-Homework.mp4 1MB
  98. 01. Common Security Threats and Vulnerabilities/01_02-Meanwhile, in the Real World.mp4 1MB
  99. 04. Securing Workstations/04_02-Meanwhile, in the Real World.mp4 1MB
  100. 06. Data Destruction and Disposal Methods/06_13-For Further Learning.mp4 1MB
  101. 06. Data Destruction and Disposal Methods/06_02-Meanwhile, in the Real World.mp4 1021KB
  102. 05. Securing Mobile Devices/05_13-Homework.mp4 1017KB
  103. 07. Securing SOHO Wireless and Wired Networks/07_02-Meanwhile, in the Real World.mp4 994KB
  104. 03. Windows OS Security Settings/03_10-Back to the Real World.mp4 993KB
  105. 07. Securing SOHO Wireless and Wired Networks/07_15-Homework.mp4 858KB
  106. 05. Securing Mobile Devices/05_12-Back to the Real World.mp4 787KB
  107. 03. Windows OS Security Settings/03_02-Meanwhile, in the Real World.mp4 723KB
  108. 01. Common Security Threats and Vulnerabilities/01_19-Homework.mp4 466KB
  109. 01. Common Security Threats and Vulnerabilities/01_18-Back to the Real World.mp4 451KB