:Search:

Security Comptia Security Plus Sy0 701 Certification Prep DevCourseWeb

Torrent:
Info Hash: 9908439A4F45C2393E1C2BCDF1E1875CD7E70A78
Similar Posts:
Uploader: FreeCourseWeb
Source: T Logo Torrent Galaxy
Downloads: 1855
Language: English
Category: Other
Size: 4.0 GB
Added: Dec. 14, 2023, 5:23 p.m.
Peers: Seeders: 13, Leechers: 16 (Last updated: 11 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 1 4 1073
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 3 3 294
udp://tracker.torrent.eu.org:451/announce 4 3 472
udp://explodie.org:6969/announce 4 2 0
udp://tracker.birkenwald.de:6969/announce 0 2 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 1 0 16
udp://tracker.therarbg.to:6969/announce 0 2 0
Files:
  1. Get Bonus Downloads Here.url 182 bytes
  2. 1 - Introduction to security.mp4 27.9 MB
  3. 53 - Understanding IDSs and IPSs.mp4 36.2 MB
  4. 54 - Detection Methods.mp4 17.2 MB
  5. 55 - Honeypots.mp4 19.1 MB
  6. 56 - Using VPNs for Remote Access.mp4 46.2 MB
  7. 57 - VPN Tunnel Protocols.mp4 20.6 MB
  8. 58 - SitetoSite VPNs.mp4 13.6 MB
  9. 59 - Understanding Threat Actors.mp4 56.2 MB
  10. 60 - Viruses.mp4 9.0 MB
  11. 61 - Logic Bombs.mp4 9.5 MB
  12. 62 - Trojans.mp4 16.0 MB
  13. 63 - Ransomware.mp4 13.6 MB
  14. 64 - Spyware.mp4 8.8 MB
  15. 65 - Bots and Botnets.mp4 13.1 MB
  16. 66 - Unified Threat ManagementUTM.mp4 23.7 MB
  17. 67 - Disable SSID Broadcasting or Not.mp4 4.2 MB
  18. 68 - Enable MAC Filtering.mp4 9.1 MB
  19. 69 - Disassociation Attacks.mp4 8.5 MB
  20. 70 - WPS and WPS Attacks.mp4 7.5 MB
  21. 71 - Rogue AP.mp4 8.5 MB
  22. 72 - Evil Twin.mp4 8.0 MB
  23. 73 - Jamming Attacks.mp4 16.9 MB
  24. 74 - Bluetooth Attacks.mp4 9.8 MB
  25. 75 - RFID Attacks.mp4 8.7 MB
  26. 76 - Wireless Replay Attacks.mp4 5.7 MB
  27. 77 - Network Attacks.mp4 15.6 MB
  28. 78 - SYN Flood Attack.mp4 12.2 MB
  29. 79 - MAC Flood Attacks.mp4 11.7 MB
  30. 80 - ManintheMiddle Attacks.mp4 6.7 MB
  31. 81 - ARP Poisoning Attacks.mp4 19.3 MB
  32. 82 - DNS Attacks.mp4 32.8 MB
  33. 83 - Brute Force Attacks.mp4 18.8 MB
  34. 84 - Password Hashes.mp4 22.7 MB
  35. 85 - Birthday Attacks.mp4 27.0 MB
  36. 86 - Replay Attacks.mp4 13.3 MB
  37. 87 - Hijacking and Related Attacks.mp4 21.7 MB
  38. 88 - Driver Manipulation.mp4 11.2 MB
  39. 89 - ZeroDay Attacks.mp4 15.3 MB
  40. 90 - Code Reuse and SDKs.mp4 16.8 MB
  41. 91 - Code Quality and Testing.mp4 11.3 MB
  42. 92 - Development LifeCycle Models.mp4 14.4 MB
  43. 93 - Secure DevOps.mp4 12.5 MB
  44. 94 - Version Control and Change Management.mp4 10.0 MB
  45. 95 - Provisioning and Deprovisioning.mp4 7.3 MB
  46. 100 - CrossSite Scripting.mp4 25.1 MB
  47. 96 - Web Servers.mp4 5.4 MB
  48. 97 - SQL Injection Attacks.mp4 19.6 MB
  49. 98 - Protecting Against SQL Injection Attacks.mp4 11.1 MB
  50. 99 - DLL Injection.mp4 11.8 MB
  51. 10 - Introducing Basic Risk Concepts.mp4 11.1 MB
  52. 2 - What is Security.mp4 8.5 MB
  53. 3 - PrivacyIntegrityAvailability.mp4 15.1 MB
  54. 4 - Encryption and Access Control.mp4 11.8 MB
  55. 5 - 3 A Rule Authentication Authorization and Accounting.mp4 12.1 MB
  56. 6 - Threat.mp4 12.6 MB
  57. 7 - What is a Hacker.mp4 17.7 MB
  58. 8 - What is Attack What are the Stages.mp4 12.0 MB
  59. 9 - Single Point Of Failure SPOF.mp4 10.4 MB
  60. 101 - Social Engineering.mp4 20.5 MB
  61. 102 - Shoulder Surfing.mp4 4.4 MB
  62. 103 - Tricking Users with Hoaxes.mp4 5.0 MB
  63. 104 - Tailgating and Mantraps.mp4 5.7 MB
  64. 105 - Dumpster Diving.mp4 7.6 MB
  65. 106 - Watering Hole Attacks.mp4 5.6 MB
  66. 107 - Spam.mp4 9.5 MB
  67. 108 - Phishing.mp4 59.8 MB
  68. 109 - Whaling.mp4 13.1 MB
  69. 110 - Vishing.mp4 14.8 MB
  70. 111 - Buffer Overflow Attacks.mp4 17.2 MB
  71. 112 - Pointer Dereference.mp4 8.5 MB
  72. 113 - Compiled Versus Runtime Code.mp4 5.4 MB
  73. 114 - Proper Input Validation.mp4 16.6 MB
  74. 115 - Side Input Validation.mp4 13.3 MB
  75. 116 - Avoiding Race Conditions.mp4 9.8 MB
  76. 117 - Proper Error Handling.mp4 9.1 MB
  77. 118 - Cryptographic Techniques.mp4 7.0 MB
  78. 119 - Protecting Systems from Malware.mp4 8.3 MB
  79. 120 - Antivirus and AntiMalware Software.mp4 44.3 MB
  80. 121 - Advanced Malware Tools.mp4 13.3 MB
  81. 122 - Educating Users.mp4 7.5 MB
  82. 123 - Implementing Secure Systems.mp4 17.9 MB
  83. 124 - Operating systems.mp4 12.7 MB
  84. 125 - Secure Operating System Configurations.mp4 36.4 MB
  85. 126 - Resiliency and Automation Strategies.mp4 26.5 MB
  86. 127 - Change Management Policy.mp4 64.8 MB
  87. 128 - Secure Staging and Deployment.mp4 22.8 MB
  88. 129 - Peripherals.mp4 20.7 MB
  89. 130 - EMI and EMP.mp4 34.5 MB
  90. 131 - Hardware Security Module.mp4 8.3 MB
  91. 132 - Cloud Deployment Models.mp4 19.5 MB
  92. 133 - Cloud Services.mp4 67.3 MB
  93. 134 - Security Responsibilities with Cloud Models.mp4 11.6 MB
  94. 135 - Advanced Cloud Services.mp4 16.6 MB
  95. 136 - Deploying Mobile Devices Securely.mp4 7.1 MB
  96. 137 - Deployment Models.mp4 44.3 MB
  97. 138 - Mobile Device Management.mp4 39.2 MB
  98. 139 - Unauthorized Connections.mp4 15.3 MB
  99. 140 - Hardware Control.mp4 7.8 MB
  100. 141 - Protecting Data.mp4 44.6 MB
  101. 142 - Data Loss Prevention.mp4 17.1 MB
  102. 143 - Database Concepts.mp4 9.0 MB
  103. 144 - Normalization.mp4 13.7 MB
  104. 145 - SQL Queries.mp4 7.8 MB
  105. 146 - Database Security.mp4 3.0 MB
  106. 147 - Understanding Risk Management.mp4 8.9 MB
  107. 148 - Risk Management.mp4 8.1 MB
  108. 149 - Threats and Threat Assessments.mp4 13.7 MB
  109. 150 - Vulnerabilities.mp4 5.8 MB
  110. 151 - Risk Assessment.mp4 40.1 MB
  111. 152 - Risk Registers.mp4 19.0 MB
  112. 153 - Finding and Evaluating Cloud Vendors.mp4 39.2 MB
  113. 154 - Job Notification.mp4 10.8 MB
  114. 155 - Conducting Evaluations.mp4 13.1 MB
  115. 156 - Negotiating Contracts and Billing.mp4 31.6 MB
  116. 157 - Professional Services.mp4 14.5 MB
  117. 158 - Chargebacks.mp4 42.3 MB
  118. 159 - Laws Regulations And Safety Standards.mp4 11.4 MB
  119. 160 - Key Stakeholders.mp4 13.8 MB
  120. 161 - Using Baselines.mp4 9.8 MB
  121. 162 - Conducting Feasibility Study.mp4 9.3 MB
  122. 163 - Making GAP Analysis.mp4 9.7 MB
  123. 164 - Using Reporting.mp4 5.0 MB
  124. 165 - Understanding Benchmarks.mp4 11.6 MB
  125. 11 - What is Identity Management.mp4 8.4 MB
  126. 12 - KERBEROS NTLMLDAP.mp4 21.2 MB
  127. 13 - Single SignOn SSO.mp4 27.6 MB
  128. 14 - Smart Cards.mp4 8.5 MB
  129. 15 - Tokens or Key Fobs.mp4 14.5 MB
  130. 16 - Biometric Methods.mp4 69.4 MB
  131. 17 - DualFactor and Multifactor Authentication.mp4 4.0 MB
  132. 18 - PAP CHAP MSCHAP.mp4 8.3 MB
  133. 19 - RADIUS.mp4 14.8 MB
  134. 166 - Checking for Vulnerabilities.mp4 6.3 MB
  135. 167 - Password Crackers.mp4 6.4 MB
  136. 168 - Network Scanners.mp4 21.0 MB
  137. 169 - Wireless Scanners Cracker.mp4 32.0 MB
  138. 170 - Banner Grabbing.mp4 4.3 MB
  139. 171 - Vulnerability Scanning.mp4 68.5 MB
  140. 172 - Penetration Tests.mp4 8.9 MB
  141. 173 - Passive Active Reconnaissance.mp4 6.0 MB
  142. 174 - Initial Exploitation.mp4 11.6 MB
  143. 175 - White Gray and Black Box Testing.mp4 9.0 MB
  144. 176 - Intrusive and NonIntrusive Testing.mp4 3.9 MB
  145. 177 - Passive Versus Active Tools.mp4 70.0 MB
  146. 178 - Comparing Physical Security Controls.mp4 10.3 MB
  147. 179 - Comparing Door Lock Types.mp4 16.9 MB
  148. 180 - Preventing Tailgating with Mantraps.mp4 6.3 MB
  149. 181 - Increasing Physical Security with Guards.mp4 27.0 MB
  150. 182 - Using Hardware Locks.mp4 9.4 MB
  151. 183 - Asset Management.mp4 7.6 MB
  152. 184 - Implementing Environmental Controls.mp4 57.2 MB
  153. 185 - Single Point of Failure.mp4 5.4 MB
  154. 186 - Disk Redundancies.mp4 15.8 MB
  155. 187 - Server Redundancy and High Availability.mp4 50.2 MB
  156. 188 - Backup.mp4 60.6 MB
  157. 189 - Comparing Business Continuity Elements.mp4 26.2 MB
  158. 190 - Impact.mp4 10.5 MB
  159. 191 - Recovery Time Objective.mp4 15.1 MB
  160. 192 - Recovery Sites.mp4 17.1 MB
  161. 193 - Disaster Recovery.mp4 29.3 MB
  162. 194 - Monitoring Logs for Event Anomalies.mp4 52.5 MB
  163. 195 - OtherLogsSIEM.mp4 21.2 MB
  164. 196 - Continuous Monitoring.mp4 16.3 MB
  165. 197 - Understanding Control Types.mp4 29.8 MB
  166. 198 - Control Goals.mp4 42.5 MB
  167. 199 - Introducing Cryptography Concepts.mp4 10.3 MB
  168. 200 - Hashing.mp4 13.0 MB
  169. 201 - MD5.mp4 2.6 MB
  170. 202 - SHA.mp4 8.0 MB
  171. 203 - HMAC.mp4 7.4 MB
  172. 204 - Hashing Files.mp4 8.8 MB
  173. 205 - Digital Signatures Certificates and Nonrepudiation.mp4 9.8 MB
  174. 206 - Providing Confidentiality with Encryption.mp4 33.1 MB
  175. 207 - Block Versus Stream Ciphers.mp4 14.8 MB
  176. 208 - Symmetric Encryption.mp4 6.1 MB
  177. 209 - Symmetric Encryption Methods.mp4 18.3 MB
  178. 210 - Asymmetric Encryption.mp4 7.0 MB
  179. 211 - Certificates.mp4 11.4 MB
  180. 212 - Steganography And Obfuscation.mp4 10.1 MB
  181. 213 - Using Cryptographic Protocols.mp4 5.6 MB
  182. 214 - Cipher Suites.mp4 8.7 MB
  183. 215 - Exploring PKI Components.mp4 53.9 MB
  184. 216 - Comparing Certificate Types.mp4 14.5 MB
  185. 217 - HTTPS Transport Encryption.mp4 14.7 MB
  186. 218 - Exploring Security Policies.mp4 4.3 MB
  187. 219 - Personnel Management Policies.mp4 35.7 MB
  188. 220 - Background Check.mp4 14.9 MB
  189. 221 - NDA.mp4 16.9 MB
  190. 222 - Policy Violations and Adverse Actions.mp4 5.9 MB
  191. 223 - Agreement Types.mp4 11.1 MB
  192. 224 - PII and PHI.mp4 14.7 MB
  193. 225 - Responding to Incidents.mp4 7.7 MB
  194. 226 - Providing Training.mp4 18.3 MB
  195. 227 - Troubleshooting Personnel Issues.mp4 7.6 MB
  196. 228 - Incident ResponseEducation.mp4 17.5 MB
  197. 20 - Create a User in comptia.mp4 6.1 MB
  198. 21 - Managing Accounts 1.mp4 45.0 MB
  199. 22 - Managing Accounts 2.mp4 41.6 MB
  200. 23 - Passwords.mp4 22.8 MB
  201. 24 - Password Policy.mp4 27.2 MB
  202. 229 - Security CompTIA Security Plus SY0701 Certification Prep.html 266 bytes
  203. 25 - Comparing Access Control Models.mp4 7.9 MB
  204. 26 - RoleBased Access Control.mp4 10.8 MB
  205. 27 - Establishing Access with GroupBased Privileges.mp4 14.5 MB
  206. 28 - Rule Based and Discretionary Access Control.mp4 17.5 MB
  207. 29 - Mandatory Access Control.mp4 8.5 MB
  208. 30 - What is Virtualization.mp4 15.6 MB
  209. 31 - Virtualization Technologies.mp4 28.1 MB
  210. 32 - Benefits of Virtualization.mp4 9.1 MB
  211. 33 - Security Issues of Virtualization.mp4 17.8 MB
  212. 34 - Basic Network Concepts.mp4 11.1 MB
  213. 35 - Domain Name ServicesDNS.mp4 40.7 MB
  214. 36 - What is the port How does it work.mp4 25.8 MB
  215. 37 - What is the Network Address.mp4 12.7 MB
  216. 38 - Combining the IP Address and the Port.mp4 16.7 MB
  217. 39 - Switches.mp4 13.3 MB
  218. 40 - Bridge.mp4 15.3 MB
  219. 41 - Understanding NAT and PAT.mp4 11.3 MB
  220. 42 - Network Separation.mp4 24.4 MB
  221. 43 - Proxy Servers.mp4 7.3 MB
  222. 44 - Types of Using Network Technologies 1.mp4 11.0 MB
  223. 45 - Routers.mp4 20.0 MB
  224. 46 - Types of Using Network Technologies 2.mp4 25.5 MB
  225. 47 - Reviewing Basic Wireless Network Information.mp4 22.6 MB
  226. 48 - Wireless Cryptographic Protocols.mp4 17.1 MB
  227. 49 - Authentication Protocols for Wireless Networks.mp4 20.8 MB
  228. 50 - Firewalls.mp4 18.3 MB
  229. 51 - Network Access Control.mp4 8.2 MB
  230. 52 - Implementing a Secure Network.mp4 35.6 MB
  231. Bonus Resources.txt 386 bytes

Discussion