589689.xyz

CompTIA Security+ (SY0-601)

  • 收录时间:2023-09-05 08:33:53
  • 文件大小:19GB
  • 下载次数:1
  • 最近下载:2023-09-05 08:33:53
  • 磁力链接:

文件列表

  1. 2 - Cryptography/4 - Secure Protocols.mp4 305MB
  2. 1 - Threats, Attacks, and Vulnerabilities/19 - Threat Actors and Vectors.mp4 293MB
  3. 2 - Cryptography/8 - Keys.mp4 278MB
  4. 7 - Operational Security and Incident Response/8 - Investigational Data Sources.mp4 276MB
  5. 7 - Operational Security and Incident Response/2 - Packet Capture and Replay.mp4 272MB
  6. 2 - Cryptography/5 - Symmetric vs. Asymmetric Encryption.mp4 272MB
  7. 8 - Governance, Risk and Compliance/2 - Regulations, Standards and Frameworks.mp4 271MB
  8. 7 - Operational Security and Incident Response/7 - Digital Forensics Concepts.mp4 266MB
  9. 6 - Operational Resiliency/1 - Hardware Redundancy.mp4 265MB
  10. 8 - Governance, Risk and Compliance/11 - Risk Management Concepts Business Impact Analysis.mp4 264MB
  11. 8 - Governance, Risk and Compliance/3 - Spotlight on General Data Protection Regulation.mp4 260MB
  12. 4 - Implementing Security/2 - Physical Security.mp4 259MB
  13. 1 - Threats, Attacks, and Vulnerabilities/14 - Network Attacks - Wireless.mp4 257MB
  14. 8 - Governance, Risk and Compliance/4 - Organizational Security Policies - Personnel.mp4 254MB
  15. 8 - Governance, Risk and Compliance/9 - Risk Management Concepts - Vocabulary.mp4 248MB
  16. 4 - Implementing Security/6 - Host Security - Hardening.mp4 248MB
  17. 2 - Cryptography/9 - IPSec.mp4 248MB
  18. 1 - Threats, Attacks, and Vulnerabilities/18 - Threat Intelligence Vulnerability Databases Feed.mp4 247MB
  19. 3 - Identity and Access Management/1 - Authentication and Authorization.mp4 247MB
  20. 3 - Identity and Access Management/2 - Authentication Methods.mp4 246MB
  21. 4 - Implementing Security/8 - Mobile Device Management and Enforcement.mp4 245MB
  22. 2 - Cryptography/7 - Certificates.mp4 244MB
  23. 1 - Threats, Attacks, and Vulnerabilities/10 - Network Attacks - DNS Attacks.mp4 243MB
  24. 1 - Threats, Attacks, and Vulnerabilities/15 - Vulnerabilities.mp4 243MB
  25. 4 - Implementing Security/5 - Host Security - Endpoint Protection.mp4 242MB
  26. 8 - Governance, Risk and Compliance/5 - Organizational Security Policies - 3rd Party Risk.mp4 241MB
  27. 2 - Cryptography/6 - PKI Concepts.mp4 238MB
  28. 4 - Implementing Security/3 - Wireless Security.mp4 238MB
  29. 7 - Operational Security and Incident Response/5 - Pentesting Techniques 237MB
  30. 4 - Implementing Security/11 - Network Security - Segmentation.mp4 235MB
  31. 1 - Threats, Attacks, and Vulnerabilities/3 - Malware.mp4 234MB
  32. 3 - Identity and Access Management/9 - Access Control Schemes.mp4 233MB
  33. 5 - Cloud and Virtualization/2 - Cloud Concepts.mp4 230MB
  34. 1 - Threats, Attacks, and Vulnerabilities/7 - Application Attacks - System Resources.mp4 228MB
  35. 4 - Implementing Security/7 - Mobile Device Deployment.mp4 226MB
  36. 6 - Operational Resiliency/4 - Backup and Recovery.mp4 224MB
  37. 5 - Cloud and Virtualization/5 - Computing Types.mp4 221MB
  38. 8 - Governance, Risk and Compliance/1 - Security Controls.mp4 217MB
  39. 1 - Threats, Attacks, and Vulnerabilities/2 - Social Engineering Techniques.mp4 215MB
  40. 8 - Governance, Risk and Compliance/13 - Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 214MB
  41. 8 - Governance, Risk and Compliance/15 - Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 214MB
  42. 1 - Threats, Attacks, and Vulnerabilities/11 - Network Attacks - Layer 2 Attacks.mp4 214MB
  43. 2 - Cryptography/9 - IPSec.mp4.crdownload 209MB
  44. 2 - Cryptography/3 - Hashing.mp4 208MB
  45. 3 - Identity and Access Management/10 - Account Management - Account Types.mp4 205MB
  46. 4 - Implementing Security/1 - Application Securitymp4 202MB
  47. 4 - Implementing Security/12 - Network Security - VPNs.mp4 201MB
  48. 6 - Operational Resiliency/3 - Non-persistence Concepts.mp4 200MB
  49. 4 - Implementing Security/10 - Specialized Systems.mp4 200MB
  50. 7 - Operational Security and Incident Response/6 - Pentesting Exercise Types.mp4 197MB
  51. 8 - Governance, Risk and Compliance/10 - Risk Management Concepts - Risk Analysis.mp4 197MB
  52. 4 - Implementing Security/13 - Network Security - Proxies and Load Balancing.mp4 195MB
  53. 7 - Operational Security and Incident Response/3 - Vulnerability Scans.mp4 194MB
  54. 4 - Implementing Security/4 - Secure Data Destruction.mp4 194MB
  55. 4 - Implementing Security/14 - Network Security - Port Security.mp4 192MB
  56. 7 - Operational Security and Incident Response/1 -Network Reconnaissance and Discovery.mp4 191MB
  57. 5 - Cloud and Virtualization/1 - Virtualization.mp4 190MB
  58. 8 - Governance, Risk and Compliance/12 - Privacy and Data Sensitivity - Breaches & Data Types.mp4 190MB
  59. 5 - Cloud and Virtualization/6 - Cloud Security Controls.mp4 187MB
  60. 2 - Cryptography/1 - Cryptography Concepts.mp4 184MB
  61. 8 - Governance, Risk and Compliance/6 - Organizational Security Policies - Data.mp4 183MB
  62. 3 - Identity and Access Management/4 - Biometrics.mp4 181MB
  63. 8 - Governance, Risk and Compliance/8 - Risk Management Concepts - Vocabulary.mp4 178MB
  64. 2 - Cryptography/2 - Encryption and Steganography.mp4 177MB
  65. 1 - Threats, Attacks, and Vulnerabilities/17 - Threat Intelligence - Threat Maps and Feeds.mp4 175MB
  66. 3 - Identity and Access Management/6 - Authentication Protocols - EAP and 802.1X.mp4 171MB
  67. 7 - Operational Security and Incident Response/9 - Incident Response Process.mp4 170MB
  68. 1 - Threats, Attacks, and Vulnerabilities/6 - Application Attacks - Injections.mp4 169MB
  69. 5 - Cloud and Virtualization/3 - Cloud Services.mp4 168MB
  70. 1 - Threats, Attacks, and Vulnerabilities/comptia-secplusy0601.zip 166MB
  71. 4 - Implementing Security/15 - Network Security - Firewalls.mp4 165MB
  72. 7 - Operational Security and Incident Response/11 - Attack Frameworks.mp4 164MB
  73. 4 - Implementing Security/9 - Mobile Device Connections.mp4 163MB
  74. 8 - Governance, Risk and Compliance/14 - Privacy, Data Sensitivity, Roles, Responsibilities.mp4 162MB
  75. 6 - Operational Resiliency/2 - Site Redundancy.mp4 162MB
  76. 7 - Operational Security and Incident Response/10 - Incident Response Plans.mp4 160MB
  77. 3 - Identity and Access Management/11 - Account Management - Password Policies.mp4 156MB
  78. 1 - Threats, Attacks, and Vulnerabilities/5 - Password Attacks - Tools.mp4 151MB
  79. 7 - Operational Security and Incident Response/4 - SIEM and SOAR Systems.mp4 149MB
  80. 8 - Governance, Risk and Compliance/7 - Organizational Security Policies - Other Areas.mp4 146MB
  81. 5 - Cloud and Virtualization/4 - Cloud Models.mp4 145MB
  82. 1 - Threats, Attacks, and Vulnerabilities/12 - Network Attacks - DoS and DDoS.mp4 143MB
  83. 1 - Threats, Attacks, and Vulnerabilities/4 - Password Attacks - Types.mp4 143MB
  84. 1 - Threats, Attacks, and Vulnerabilities/9 - Application Attacks - Replay Attacks.mp4 141MB
  85. 3 - Identity and Access Management/12 - Account Management - Account Policies.mp4 139MB
  86. 1 - Threats, Attacks, and Vulnerabilities/16 - Threat Intelligence - OSINT.mp4 134MB
  87. 1 - Threats, Attacks, and Vulnerabilities/13 - Network Attacks - MiTM and MiTB.mp4 132MB
  88. 3 - Identity and Access Management/8 - Authentication Protocols - Kerberos.mp4 129MB
  89. 3 - Identity and Access Management/7 - Authentication Protocols - RADIUS and TACACS.mp4 123MB
  90. 3 - Identity and Access Management/3 - Additional Authentication Methods.mp4 118MB
  91. 3 - Identity and Access Management/5 - Authentication Protocols - PAP and CHAP.mp4 118MB
  92. 1 - Threats, Attacks, and Vulnerabilities/8 - Application Attacks - XSS and XSRF.mp4 112MB
  93. 4 - Implementing Security/16 - Network Security - NIDS and NIPS.mp4 86MB
  94. 1 - Threats, Attacks, and Vulnerabilities/1 - Overview.mp4 77MB
  95. 8 - Governance, Risk and Compliance/Regulations Standards and Frameworks - 10-1-2.zip 840KB
  96. 8 - Governance, Risk and Compliance/Risk Management Concepts - Business Impact Analysis - 10-1-11.zip 713KB
  97. 8 - Governance, Risk and Compliance/Spotlight on the General Data Protection Regulation (GDPR) - 10-1-3.zip 704KB
  98. 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Privacy enhancing technologies - 10-1-13.zip 691KB
  99. 8 - Governance, Risk and Compliance/Risk Management Concepts - Risk Analysis - 10-1-10.zip 689KB
  100. 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Breaches _ Data Types - 10-1-12.zip 689KB
  101. 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Roles _ Responsibilities - 10-1-14.zip 688KB
  102. 8 - Governance, Risk and Compliance/Organizational Security Policies - 3rd Party Risk - 10-1-5.zip 688KB
  103. 8 - Governance, Risk and Compliance/Organizational Security Policies - Data - 10-1-6.zip 685KB
  104. 8 - Governance, Risk and Compliance/Security Controls - 10-1-1.zip 684KB
  105. 8 - Governance, Risk and Compliance/Privacy and Data Sensitivity - Other Areas - 10-1-15.zip 683KB
  106. 8 - Governance, Risk and Compliance/Organizational Security Policies - Other Areas - 10-1-7.zip 682KB
  107. 8 - Governance, Risk and Compliance/Risk Management Concepts - Types _ Strategies - 10-1-9.zip 681KB
  108. 8 - Governance, Risk and Compliance/Organizational Security Policies - Personnel - 10-1-4.zip 680KB
  109. 8 - Governance, Risk and Compliance/Risk Management Concepts - Vocabulary - 10-1-8.zip 679KB