589689.xyz

CompTIA Security+ (SY0-701) Complete Course & Exam

  • 收录时间:2025-04-28 00:07:13
  • 文件大小:8GB
  • 下载次数:1
  • 最近下载:2025-04-28 00:07:13
  • 磁力链接:

文件列表

  1. 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4 110MB
  2. 28 - Conclusion/001 Conclusion.mp4 89MB
  3. 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4 88MB
  4. 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 86MB
  5. 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4 84MB
  6. 02 - Fundamentals of Security/001 Fundamentals of Security.mp4 65MB
  7. 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 63MB
  8. 04 - Physical Security/007 Door Locks (OBJ 1.2).mp4 63MB
  9. 06 - Malware/001 Malware (OBJ 2.4).mp4 63MB
  10. 07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4 61MB
  11. 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4 61MB
  12. 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4 60MB
  13. 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4 60MB
  14. 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4 58MB
  15. 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4 58MB
  16. 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4 58MB
  17. 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4 57MB
  18. 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4 56MB
  19. 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4 56MB
  20. 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4 54MB
  21. 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4 54MB
  22. 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4 54MB
  23. 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4 53MB
  24. 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4 53MB
  25. 01 - Introduction/002 Exam Tips.mp4 53MB
  26. 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4 52MB
  27. 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4 51MB
  28. 21 - Security Techniques/004 Application Security (OBJ 4.1).mp4 49MB
  29. 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4 49MB
  30. 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4 48MB
  31. 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4 48MB
  32. 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4 47MB
  33. 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 47MB
  34. 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4 47MB
  35. 16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4 47MB
  36. 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4 46MB
  37. 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4 44MB
  38. 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4 43MB
  39. 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4 43MB
  40. 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4 43MB
  41. 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4 43MB
  42. 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4 42MB
  43. 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4 42MB
  44. 16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4 42MB
  45. 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4 42MB
  46. 27 - Security Awareness/003 Password Management (OBJ 5.6).mp4 42MB
  47. 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4 42MB
  48. 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4 41MB
  49. 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4 41MB
  50. 24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4 40MB
  51. 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4 40MB
  52. 06 - Malware/006 Ransomware (OBJ 2.4).mp4 39MB
  53. 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4 39MB
  54. 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4 39MB
  55. 06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4 39MB
  56. 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4 38MB
  57. 20 - Hardening/007 Patch Management (OBJ 2.5).mp4 38MB
  58. 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4 38MB
  59. 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4 37MB
  60. 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4 37MB
  61. 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4 36MB
  62. 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4 36MB
  63. 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4 36MB
  64. 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4 35MB
  65. 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4 35MB
  66. 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4 35MB
  67. 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4 35MB
  68. 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4 35MB
  69. 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4 35MB
  70. 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4 35MB
  71. 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4 35MB
  72. 05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4 34MB
  73. 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4 34MB
  74. 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4 34MB
  75. 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4 34MB
  76. 09 - Risk Management/001 Risk Management (OBJ 5.2).mp4 34MB
  77. 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4 34MB
  78. 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4 33MB
  79. 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4 33MB
  80. 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4 33MB
  81. 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4 33MB
  82. 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4 33MB
  83. 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4 32MB
  84. 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4 32MB
  85. 03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4 32MB
  86. 06 - Malware/002 Viruses (OBJ 2.4).mp4 32MB
  87. 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4 32MB
  88. 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4 32MB
  89. 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4 31MB
  90. 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4 31MB
  91. 25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4 31MB
  92. 05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4 31MB
  93. 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4 31MB
  94. 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4 31MB
  95. 20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4 31MB
  96. 20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4 30MB
  97. 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4 30MB
  98. 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4 30MB
  99. 12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4 30MB
  100. 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4 30MB
  101. 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4 30MB
  102. 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4 30MB
  103. 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4 30MB
  104. 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4 30MB
  105. 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4 30MB
  106. 07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4 30MB
  107. 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4 30MB
  108. 21 - Security Techniques/007 Email Security (OBJ 4.5).mp4 30MB
  109. 09 - Risk Management/004 Risk Register (OBJ 5.2).mp4 30MB
  110. 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4 29MB
  111. 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4 29MB
  112. 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4 29MB
  113. 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4 29MB
  114. 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4 29MB
  115. 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4 29MB
  116. 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4 29MB
  117. 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4 29MB
  118. 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4 28MB
  119. 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4 28MB
  120. 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4 28MB
  121. 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4 28MB
  122. 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4 28MB
  123. 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4 28MB
  124. 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4 28MB
  125. 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4 28MB
  126. 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4 28MB
  127. 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 27MB
  128. 27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4 27MB
  129. 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4 27MB
  130. 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4 27MB
  131. 12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4 27MB
  132. 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4 27MB
  133. 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4 27MB
  134. 04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4 27MB
  135. 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4 27MB
  136. 28 - Conclusion/002 BONUS Where do I go from here.mp4 27MB
  137. 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4 27MB
  138. 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4 26MB
  139. 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4 26MB
  140. 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4 26MB
  141. 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4 26MB
  142. 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4 26MB
  143. 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4 26MB
  144. 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4 26MB
  145. 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4 26MB
  146. 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4 26MB
  147. 06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4 26MB
  148. 03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4 25MB
  149. 24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4 25MB
  150. 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4 25MB
  151. 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4 25MB
  152. 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4 25MB
  153. 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4 25MB
  154. 19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4 25MB
  155. 02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4 25MB
  156. 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4 25MB
  157. 06 - Malware/010 Keylogger (OBJ 2.4).mp4 25MB
  158. 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4 24MB
  159. 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4 24MB
  160. 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4 24MB
  161. 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4 24MB
  162. 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4 24MB
  163. 02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4 24MB
  164. 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4 24MB
  165. 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4 24MB
  166. 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4 24MB
  167. 11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4 24MB
  168. 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4 24MB
  169. 06 - Malware/008 Rootkits (OBJ 2.4).mp4 24MB
  170. 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4 24MB
  171. 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4 24MB
  172. 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4 24MB
  173. 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4 24MB
  174. 09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4 23MB
  175. 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4 23MB
  176. 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4 23MB
  177. 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4 23MB
  178. 02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4 23MB
  179. 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4 23MB
  180. 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4 23MB
  181. 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4 23MB
  182. 02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4 23MB
  183. 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4 23MB
  184. 03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4 23MB
  185. 24 - Incident Response/001 Incident Response (OBJ 4.8).mp4 22MB
  186. 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4 22MB
  187. 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4 22MB
  188. 20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4 22MB
  189. 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4 22MB
  190. 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4 22MB
  191. 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4 22MB
  192. 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4 22MB
  193. 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4 22MB
  194. 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4 22MB
  195. 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4 22MB
  196. 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4 22MB
  197. 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4 22MB
  198. 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4 22MB
  199. 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4 22MB
  200. 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4 21MB
  201. 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4 21MB
  202. 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4 21MB
  203. 25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4 21MB
  204. 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4 21MB
  205. 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 21MB
  206. 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4 21MB
  207. 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4 20MB
  208. 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4 20MB
  209. 11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4 20MB
  210. 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4 20MB
  211. 06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4 20MB
  212. 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4 20MB
  213. 06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4 20MB
  214. 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4 20MB
  215. 20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4 20MB
  216. 11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4 20MB
  217. 25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4 20MB
  218. 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4 20MB
  219. 25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4 20MB
  220. 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4 20MB
  221. 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4 19MB
  222. 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4 19MB
  223. 11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4 19MB
  224. 11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4 19MB
  225. 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4 19MB
  226. 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4 19MB
  227. 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4 19MB
  228. 15 - Security Architecture/006 Microservices (OBJ 3.1).mp4 19MB
  229. 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4 19MB
  230. 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4 19MB
  231. 06 - Malware/004 Trojans (OBJ 2.4).mp4 19MB
  232. 07 - Data Protection/004 Data States (OBJ 3.3).mp4 19MB
  233. 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4 18MB
  234. 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4 18MB
  235. 20 - Hardening/010 Data Encryption Levels (2.5).mp4 18MB
  236. 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4 18MB
  237. 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4 18MB
  238. 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4 18MB
  239. 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4 18MB
  240. 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4 18MB
  241. 19 - Malicious Activity/008 On-Path Attacks.mp4 17MB
  242. 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4 16MB
  243. 06 - Malware/003 Worms (OBJ 2.4).mp4 16MB
  244. 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4 16MB
  245. 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4 16MB
  246. 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4 16MB
  247. 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4 16MB
  248. 15 - Security Architecture/005 Serverless (OBJ 3.1).mp4 16MB
  249. 03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4 16MB
  250. 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4 16MB
  251. 02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4 16MB
  252. 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4 15MB
  253. 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4 15MB
  254. 19 - Malicious Activity/009 Injection Attacks.mp4 15MB
  255. 07 - Data Protection/007 Securing Data (OBJ 3.3).mp4 14MB
  256. 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4 14MB
  257. 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4 13MB
  258. 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4 13MB
  259. 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4 13MB
  260. 02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4 12MB
  261. 07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4 12MB
  262. 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4 11MB
  263. 01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf 1MB
  264. 01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf 187KB
  265. 01 - Introduction/001 Security-701-Study-Plan.pdf 132KB
  266. 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt 71KB
  267. 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt 44KB
  268. 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt 38KB
  269. 07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt 37KB
  270. 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt 35KB
  271. 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt 34KB
  272. 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt 33KB
  273. 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt 32KB
  274. 28 - Conclusion/001 Conclusion_en.srt 30KB
  275. 04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt 30KB
  276. 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt 30KB
  277. 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt 30KB
  278. 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt 29KB
  279. 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt 29KB
  280. 16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt 29KB
  281. 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt 28KB
  282. 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt 28KB
  283. 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt 28KB
  284. 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt 28KB
  285. 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt 28KB
  286. 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt 27KB
  287. 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt 27KB
  288. 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt 27KB
  289. 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt 26KB
  290. 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt 26KB
  291. 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt 25KB
  292. 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt 25KB
  293. 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt 25KB
  294. 21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt 25KB
  295. 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt 25KB
  296. 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt 24KB
  297. 16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt 23KB
  298. 24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt 23KB
  299. 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt 23KB
  300. 27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt 22KB
  301. 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt 22KB
  302. 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt 22KB
  303. 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt 22KB
  304. 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt 22KB
  305. 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt 21KB
  306. 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt 21KB
  307. 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt 20KB
  308. 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt 20KB
  309. 20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt 20KB
  310. 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt 20KB
  311. 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt 20KB
  312. 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt 20KB
  313. 02 - Fundamentals of Security/001 Fundamentals of Security_en.srt 20KB
  314. 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt 20KB
  315. 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt 19KB
  316. 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt 19KB
  317. 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt 19KB
  318. 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt 19KB
  319. 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt 19KB
  320. 06 - Malware/001 Malware (OBJ 2.4)_en.srt 19KB
  321. 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt 19KB
  322. 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt 19KB
  323. 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt 19KB
  324. 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt 19KB
  325. 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt 19KB
  326. 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt 19KB
  327. 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt 19KB
  328. 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt 19KB
  329. 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt 18KB
  330. 06 - Malware/006 Ransomware (OBJ 2.4)_en.srt 18KB
  331. 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt 18KB
  332. 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt 18KB
  333. 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt 18KB
  334. 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt 18KB
  335. 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt 18KB
  336. 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt 18KB
  337. 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt 18KB
  338. 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt 17KB
  339. 06 - Malware/002 Viruses (OBJ 2.4)_en.srt 17KB
  340. 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt 17KB
  341. 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt 17KB
  342. 01 - Introduction/002 Exam Tips_en.srt 17KB
  343. 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt 17KB
  344. 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt 17KB
  345. 20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt 17KB
  346. 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt 17KB
  347. 06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt 17KB
  348. 12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt 16KB
  349. 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt 16KB
  350. 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt 16KB
  351. 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt 16KB
  352. 04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt 16KB
  353. 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt 16KB
  354. 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt 16KB
  355. 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt 16KB
  356. 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt 16KB
  357. 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt 16KB
  358. 07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt 16KB
  359. 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt 16KB
  360. 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 16KB
  361. 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt 15KB
  362. 24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt 15KB
  363. 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt 15KB
  364. 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt 15KB
  365. 12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt 15KB
  366. 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt 15KB
  367. 05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt 15KB
  368. 02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt 15KB
  369. 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt 15KB
  370. 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt 15KB
  371. 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt 15KB
  372. 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt 15KB
  373. 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt 15KB
  374. 09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt 14KB
  375. 19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt 14KB
  376. 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt 14KB
  377. 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt 14KB
  378. 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt 14KB
  379. 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt 14KB
  380. 21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt 14KB
  381. 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt 14KB
  382. 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt 14KB
  383. 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt 14KB
  384. 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt 14KB
  385. 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt 14KB
  386. 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt 14KB
  387. 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt 14KB
  388. 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt 14KB
  389. 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt 14KB
  390. 02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt 14KB
  391. 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt 14KB
  392. 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt 14KB
  393. 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt 14KB
  394. 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt 13KB
  395. 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt 13KB
  396. 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt 13KB
  397. 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt 13KB
  398. 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt 13KB
  399. 02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt 13KB
  400. 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt 13KB
  401. 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt 13KB
  402. 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt 13KB
  403. 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt 13KB
  404. 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt 13KB
  405. 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt 13KB
  406. 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt 12KB
  407. 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt 12KB
  408. 02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt 12KB
  409. 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt 12KB
  410. 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt 12KB
  411. 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt 12KB
  412. 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt 12KB
  413. 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt 12KB
  414. 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt 12KB
  415. 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt 12KB
  416. 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt 12KB
  417. 06 - Malware/008 Rootkits (OBJ 2.4)_en.srt 12KB
  418. 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt 12KB
  419. 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt 12KB
  420. 06 - Malware/010 Keylogger (OBJ 2.4)_en.srt 12KB
  421. 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt 12KB
  422. 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt 12KB
  423. 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt 12KB
  424. 03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt 12KB
  425. 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt 12KB
  426. 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt 12KB
  427. 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt 12KB
  428. 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 12KB
  429. 20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt 12KB
  430. 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt 11KB
  431. 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt 11KB
  432. 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt 11KB
  433. 06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt 11KB
  434. 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt 11KB
  435. 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt 11KB
  436. 06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt 11KB
  437. 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt 11KB
  438. 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt 11KB
  439. 06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt 11KB
  440. 25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt 11KB
  441. 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt 11KB
  442. 20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt 11KB
  443. 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt 11KB
  444. 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt 11KB
  445. 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt 11KB
  446. 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt 11KB
  447. 20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt 11KB
  448. 09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt 11KB
  449. 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt 11KB
  450. 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt 11KB
  451. 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt 11KB
  452. 20 - Hardening/010 Data Encryption Levels (2.5)_en.srt 11KB
  453. 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt 10KB
  454. 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt 10KB
  455. 25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt 10KB
  456. 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt 10KB
  457. 05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt 10KB
  458. 11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt 10KB
  459. 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt 10KB
  460. 03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt 10KB
  461. 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt 10KB
  462. 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt 10KB
  463. 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt 10KB
  464. 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt 10KB
  465. 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt 10KB
  466. 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt 9KB
  467. 07 - Data Protection/004 Data States (OBJ 3.3)_en.srt 9KB
  468. 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt 9KB
  469. 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt 9KB
  470. 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt 9KB
  471. 25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt 9KB
  472. 11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt 9KB
  473. 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt 9KB
  474. 09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt 9KB
  475. 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt 9KB
  476. 27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt 9KB
  477. 11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt 9KB
  478. 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt 9KB
  479. 02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt 9KB
  480. 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt 9KB
  481. 11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt 9KB
  482. 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt 9KB
  483. 19 - Malicious Activity/009 Injection Attacks_en.srt 9KB
  484. 06 - Malware/004 Trojans (OBJ 2.4)_en.srt 9KB
  485. 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt 9KB
  486. 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt 9KB
  487. 03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt 9KB
  488. 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt 8KB
  489. 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt 8KB
  490. 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt 8KB
  491. 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt 8KB
  492. 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt 8KB
  493. 25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt 8KB
  494. 11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt 8KB
  495. 03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt 8KB
  496. 02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt 8KB
  497. 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt 8KB
  498. 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt 8KB
  499. 19 - Malicious Activity/008 On-Path Attacks_en.srt 8KB
  500. 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt 8KB
  501. 28 - Conclusion/002 BONUS Where do I go from here_en.srt 8KB
  502. 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt 8KB
  503. 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt 8KB
  504. 15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt 7KB
  505. 06 - Malware/003 Worms (OBJ 2.4)_en.srt 7KB
  506. 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt 7KB
  507. 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt 7KB
  508. 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt 7KB
  509. 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt 7KB
  510. 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt 7KB
  511. 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt 7KB
  512. 07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt 7KB
  513. 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt 7KB
  514. 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt 7KB
  515. 15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt 7KB
  516. 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt 7KB
  517. 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt 7KB
  518. 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt 7KB
  519. 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt 7KB
  520. 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt 7KB
  521. 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt 7KB
  522. 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt 6KB
  523. 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt 6KB
  524. 24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt 6KB
  525. 07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt 6KB
  526. 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt 5KB
  527. 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt 5KB
  528. 01 - Introduction/001 Download the Study Guide.html 222B