CompTIA Security+ (SY0-601)
- 收录时间:2023-09-05 08:33:53
- 文件大小:19GB
- 下载次数:1
- 最近下载:2023-09-05 08:33:53
- 磁力链接:
-
文件列表
- 2 - Cryptography/4 - Secure Protocols.mp4 305MB
- 1 - Threats, Attacks, and Vulnerabilities/19 - Threat Actors and Vectors.mp4 293MB
- 2 - Cryptography/8 - Keys.mp4 278MB
- 7 - Operational Security and Incident Response/8 - Investigational Data Sources.mp4 276MB
- 7 - Operational Security and Incident Response/2 - Packet Capture and Replay.mp4 272MB
- 2 - Cryptography/5 - Symmetric vs. Asymmetric Encryption.mp4 272MB
- 8 - Governance, Risk and Compliance/2 - Regulations, Standards and Frameworks.mp4 271MB
- 7 - Operational Security and Incident Response/7 - Digital Forensics Concepts.mp4 266MB
- 6 - Operational Resiliency/1 - Hardware Redundancy.mp4 265MB
- 8 - Governance, Risk and Compliance/11 - Risk Management Concepts Business Impact Analysis.mp4 264MB
- 8 - Governance, Risk and Compliance/3 - Spotlight on General Data Protection Regulation.mp4 260MB
- 4 - Implementing Security/2 - Physical Security.mp4 259MB
- 1 - Threats, Attacks, and Vulnerabilities/14 - Network Attacks - Wireless.mp4 257MB
- 8 - Governance, Risk and Compliance/4 - Organizational Security Policies - Personnel.mp4 254MB
- 8 - Governance, Risk and Compliance/9 - Risk Management Concepts - Vocabulary.mp4 248MB
- 4 - Implementing Security/6 - Host Security - Hardening.mp4 248MB
- 2 - Cryptography/9 - IPSec.mp4 248MB
- 1 - Threats, Attacks, and Vulnerabilities/18 - Threat Intelligence Vulnerability Databases Feed.mp4 247MB
- 3 - Identity and Access Management/1 - Authentication and Authorization.mp4 247MB
- 3 - Identity and Access Management/2 - Authentication Methods.mp4 246MB
- 4 - Implementing Security/8 - Mobile Device Management and Enforcement.mp4 245MB
- 2 - Cryptography/7 - Certificates.mp4 244MB
- 1 - Threats, Attacks, and Vulnerabilities/10 - Network Attacks - DNS Attacks.mp4 243MB
- 1 - Threats, Attacks, and Vulnerabilities/15 - Vulnerabilities.mp4 243MB
- 4 - Implementing Security/5 - Host Security - Endpoint Protection.mp4 242MB
- 8 - Governance, Risk and Compliance/5 - Organizational Security Policies - 3rd Party Risk.mp4 241MB
- 2 - Cryptography/6 - PKI Concepts.mp4 238MB
- 4 - Implementing Security/3 - Wireless Security.mp4 238MB
- 7 - Operational Security and Incident Response/5 - Pentesting Techniques 237MB
- 4 - Implementing Security/11 - Network Security - Segmentation.mp4 235MB
- 1 - Threats, Attacks, and Vulnerabilities/3 - Malware.mp4 234MB
- 3 - Identity and Access Management/9 - Access Control Schemes.mp4 233MB
- 5 - Cloud and Virtualization/2 - Cloud Concepts.mp4 230MB
- 1 - Threats, Attacks, and Vulnerabilities/7 - Application Attacks - System Resources.mp4 228MB
- 4 - Implementing Security/7 - Mobile Device Deployment.mp4 226MB
- 6 - Operational Resiliency/4 - Backup and Recovery.mp4 224MB
- 5 - Cloud and Virtualization/5 - Computing Types.mp4 221MB
- 8 - Governance, Risk and Compliance/1 - Security Controls.mp4 217MB
- 1 - Threats, Attacks, and Vulnerabilities/2 - Social Engineering Techniques.mp4 215MB
- 8 - Governance, Risk and Compliance/13 - Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 214MB
- 8 - Governance, Risk and Compliance/15 - Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 214MB
- 1 - Threats, Attacks, and Vulnerabilities/11 - Network Attacks - Layer 2 Attacks.mp4 214MB
- 2 - Cryptography/9 - IPSec.mp4.crdownload 209MB
- 2 - Cryptography/3 - Hashing.mp4 208MB
- 3 - Identity and Access Management/10 - Account Management - Account Types.mp4 205MB
- 4 - Implementing Security/1 - Application Securitymp4 202MB
- 4 - Implementing Security/12 - Network Security - VPNs.mp4 201MB
- 6 - Operational Resiliency/3 - Non-persistence Concepts.mp4 200MB
- 4 - Implementing Security/10 - Specialized Systems.mp4 200MB
- 7 - Operational Security and Incident Response/6 - Pentesting Exercise Types.mp4 197MB
- 8 - Governance, Risk and Compliance/10 - Risk Management Concepts - Risk Analysis.mp4 197MB
- 4 - Implementing Security/13 - Network Security - Proxies and Load Balancing.mp4 195MB
- 7 - Operational Security and Incident Response/3 - Vulnerability Scans.mp4 194MB
- 4 - Implementing Security/4 - Secure Data Destruction.mp4 194MB
- 4 - Implementing Security/14 - Network Security - Port Security.mp4 192MB
- 7 - Operational Security and Incident Response/1 -Network Reconnaissance and Discovery.mp4 191MB
- 5 - Cloud and Virtualization/1 - Virtualization.mp4 190MB
- 8 - Governance, Risk and Compliance/12 - Privacy and Data Sensitivity - Breaches & Data Types.mp4 190MB
- 5 - Cloud and Virtualization/6 - Cloud Security Controls.mp4 187MB
- 2 - Cryptography/1 - Cryptography Concepts.mp4 184MB
- 8 - Governance, Risk and Compliance/6 - Organizational Security Policies - Data.mp4 183MB
- 3 - Identity and Access Management/4 - Biometrics.mp4 181MB
- 8 - Governance, Risk and Compliance/8 - Risk Management Concepts - Vocabulary.mp4 178MB
- 2 - Cryptography/2 - Encryption and Steganography.mp4 177MB
- 1 - Threats, Attacks, and Vulnerabilities/17 - Threat Intelligence - Threat Maps and Feeds.mp4 175MB
- 3 - Identity and Access Management/6 - Authentication Protocols - EAP and 802.1X.mp4 171MB
- 7 - Operational Security and Incident Response/9 - Incident Response Process.mp4 170MB
- 1 - Threats, Attacks, and Vulnerabilities/6 - Application Attacks - Injections.mp4 169MB
- 5 - Cloud and Virtualization/3 - Cloud Services.mp4 168MB
- 1 - Threats, Attacks, and Vulnerabilities/comptia-secplusy0601.zip 166MB
- 4 - Implementing Security/15 - Network Security - Firewalls.mp4 165MB
- 7 - Operational Security and Incident Response/11 - Attack Frameworks.mp4 164MB
- 4 - Implementing Security/9 - Mobile Device Connections.mp4 163MB
- 8 - Governance, Risk and Compliance/14 - Privacy, Data Sensitivity, Roles, Responsibilities.mp4 162MB
- 6 - Operational Resiliency/2 - Site Redundancy.mp4 162MB
- 7 - Operational Security and Incident Response/10 - Incident Response Plans.mp4 160MB
- 3 - Identity and Access Management/11 - Account Management - Password Policies.mp4 156MB
- 1 - Threats, Attacks, and Vulnerabilities/5 - Password Attacks - Tools.mp4 151MB
- 7 - Operational Security and Incident Response/4 - SIEM and SOAR Systems.mp4 149MB
- 8 - Governance, Risk and Compliance/7 - Organizational Security Policies - Other Areas.mp4 146MB
- 5 - Cloud and Virtualization/4 - Cloud Models.mp4 145MB
- 1 - Threats, Attacks, and Vulnerabilities/12 - Network Attacks - DoS and DDoS.mp4 143MB
- 1 - Threats, Attacks, and Vulnerabilities/4 - Password Attacks - Types.mp4 143MB
- 1 - Threats, Attacks, and Vulnerabilities/9 - Application Attacks - Replay Attacks.mp4 141MB
- 3 - Identity and Access Management/12 - Account Management - Account Policies.mp4 139MB
- 1 - Threats, Attacks, and Vulnerabilities/16 - Threat Intelligence - OSINT.mp4 134MB
- 1 - Threats, Attacks, and Vulnerabilities/13 - Network Attacks - MiTM and MiTB.mp4 132MB
- 3 - Identity and Access Management/8 - Authentication Protocols - Kerberos.mp4 129MB
- 3 - Identity and Access Management/7 - Authentication Protocols - RADIUS and TACACS.mp4 123MB
- 3 - Identity and Access Management/3 - Additional Authentication Methods.mp4 118MB
- 3 - Identity and Access Management/5 - Authentication Protocols - PAP and CHAP.mp4 118MB
- 1 - Threats, Attacks, and Vulnerabilities/8 - Application Attacks - XSS and XSRF.mp4 112MB
- 4 - Implementing Security/16 - Network Security - NIDS and NIPS.mp4 86MB
- 1 - Threats, Attacks, and Vulnerabilities/1 - Overview.mp4 77MB
- 8 - Governance, Risk and Compliance/Regulations Standards and Frameworks - 10-1-2.zip 840KB
- 8 - Governance, Risk and Compliance/Risk Management Concepts - Business Impact Analysis - 10-1-11.zip 713KB
- 8 - Governance, Risk and Compliance/Spotlight on the General Data Protection Regulation (GDPR) - 10-1-3.zip 704KB
- 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Privacy enhancing technologies - 10-1-13.zip 691KB
- 8 - Governance, Risk and Compliance/Risk Management Concepts - Risk Analysis - 10-1-10.zip 689KB
- 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Breaches _ Data Types - 10-1-12.zip 689KB
- 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Roles _ Responsibilities - 10-1-14.zip 688KB
- 8 - Governance, Risk and Compliance/Organizational Security Policies - 3rd Party Risk - 10-1-5.zip 688KB
- 8 - Governance, Risk and Compliance/Organizational Security Policies - Data - 10-1-6.zip 685KB
- 8 - Governance, Risk and Compliance/Security Controls - 10-1-1.zip 684KB
- 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Other Areas - 10-1-15.zip 683KB
- 8 - Governance, Risk and Compliance/Organizational Security Policies - Other Areas - 10-1-7.zip 682KB
- 8 - Governance, Risk and Compliance/Risk Management Concepts - Types _ Strategies - 10-1-9.zip 681KB
- 8 - Governance, Risk and Compliance/Organizational Security Policies - Personnel - 10-1-4.zip 680KB
- 8 - Governance, Risk and Compliance/Risk Management Concepts - Vocabulary - 10-1-8.zip 679KB