:Search:

CompTIA Security SY0 701 Complete Course Exam

Torrent:
Info Hash: 0A4141016405FE278104046F1D57B798045C299A
Thumbnail:
Similar Posts:
Uploader: tutsnode
Source: T Logo Torrent Galaxy
Downloads: 23550
Language: English
Category: Other
Size: 16.9 GB
Added: March 15, 2024, 10:10 a.m.
Peers: Seeders: 329, Leechers: 22 (Last updated: 11 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 84 5 15678
udp://exodus.desync.com:6969/announce 34 1 186
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 85 6 6114
udp://tracker.torrent.eu.org:451/announce 74 5 1415
udp://explodie.org:6969/announce 38 1 0
udp://tracker.birkenwald.de:6969/announce 1 2 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 13 2 157
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. 001 Conclusion.mp4 280.7 MB
  2. 001 Security-701-Study-Plan.pdf 132.4 KB
  3. 001 comptia-security-sy0-701-exam-objectives-5-0.pdf 186.6 KB
  4. 001 Download the Study Guide.html 222 bytes
  5. 006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt 71.1 KB
  6. 008 Securing Network Communications (OBJ 3.2)_en.srt 44.4 KB
  7. 008 Performing a Basic PenTest (OBJ 5.5)_en.srt 37.5 KB
  8. 009 Configuring a DLP (OBJ 4.5)_en.srt 36.7 KB
  9. 009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt 35.2 KB
  10. 013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt 33.6 KB
  11. 002 Ports and Protocols (OBJ 4.5)_en.srt 32.7 KB
  12. 004 Password Security (OBJ 4.6)_en.srt 31.6 KB
  13. 001 Conclusion_en.srt 30.0 KB
  14. 007 Door Locks (OBJ 1.2)_en.srt 30.0 KB
  15. 003 Multifactor Authentication (OBJ 4.6)_en.srt 29.9 KB
  16. 007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt 29.5 KB
  17. 008 Digital Certificates (OBJ 1.4)_en.srt 29.3 KB
  18. 009 Redundant Site Considerations (OBJ 3.4)_en.srt 28.9 KB
  19. 003 Firewalls (OBJ 3.2)_en.srt 28.7 KB
  20. 003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt 28.2 KB
  21. 004 Configuring Firewalls (OBJ 4.5)_en.srt 28.2 KB
  22. 002 Investigating with Data (OBJ 4.9)_en.srt 27.9 KB
  23. 010 Selecting Secure Protocols (OBJ 4.5)_en.srt 27.7 KB
  24. 007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt 27.6 KB
  25. 003 Wireless Security Settings (OBJ 4.1)_en.srt 27.1 KB
  26. 006 Digital Forensic Procedures (OBJ 4.8)_en.srt 27.0 KB
  27. 008 Integrations and APIs (OBJ 4.7)_en.srt 26.6 KB
  28. 005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt 26.1 KB
  29. 001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt 26.1 KB
  30. 005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt 25.5 KB
  31. 005 Vulnerability Scans (OBJ 4.9)_en.srt 25.1 KB
  32. 010 Infrastructure Considerations (OBJ 3.2)_en.srt 24.9 KB
  33. 004 Application Security (OBJ 4.1)_en.srt 24.9 KB
  34. 007 Data Backups (OBJ 3.4)_en.srt 24.8 KB
  35. 006 Powering Data Centers (OBJ 3.4)_en.srt 24.4 KB
  36. 007 Port Security (OBJ 3.2)_en.srt 23.2 KB
  37. 002 Incident Response Process (OBJ 4.8)_en.srt 23.1 KB
  38. 010 Vulnerability Reporting (OBJ 4.3)_en.srt 22.8 KB
  39. TutsNode.org.txt 59 bytes
  40. 0 2.2 KB
  41. 001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 257.2 MB
  42. 003 Password Management (OBJ 5.6)_en.srt 22.5 KB
  43. 008 Continuity of Operations Plan (OBJ 3.4)_en.srt 22.3 KB
  44. 002 Motivational Triggers (OBJ 5.6)_en.srt 22.2 KB
  45. 006 Network Appliances (OBJ 3.2)_en.srt 22.1 KB
  46. 007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt 21.6 KB
  47. 005 Hashing (OBJ 1.4)_en.srt 20.6 KB
  48. 002 When to Automate and Orchestrate (OBJ 4.7)_en.srt 20.6 KB
  49. 008 Group Policies (OBJ 2.5 & 4.5)_en.srt 20.4 KB
  50. 005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt 20.4 KB
  51. 007 Patch Management (OBJ 2.5)_en.srt 20.1 KB
  52. 002 High Availability (OBJ 3.4)_en.srt 20.1 KB
  53. 005 Password Attacks (OBJ 2.4)_en.srt 19.9 KB
  54. 011 Outsmarting Threat Actors (OBJ 1.2)_en.srt 19.9 KB
  55. 001 Fundamentals of Security_en.srt 19.6 KB
  56. 005 Incident Response Training and Testing (OBJ 4.8)_en.srt 19.5 KB
  57. 012 Obfuscation (OBJ 1.4)_en.srt 19.5 KB
  58. 003 Data Redundancy (OBJ 3.4)_en.srt 19.5 KB
  59. 011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt 19.5 KB
  60. 002 On-premise versus the Cloud (OBJ 3.1)_en.srt 19.4 KB
  61. 004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt 19.4 KB
  62. 001 Malware (OBJ 2.4)_en.srt 19.3 KB
  63. 006 Packet Captures (OBJ 4.9)_en.srt 19.2 KB
  64. 007 Automating Application Development (OBJ 4.7)_en.srt 19.2 KB
  65. 010 Other Social Engineering Attacks (OBJ 2.2)_en.srt 19.1 KB
  66. 008 Access Badge Cloning (OBJ 2.4)_en.srt 19.1 KB
  67. 007 Data Collection Procedures (OBJ 4.8)_en.srt 19.0 KB
  68. 005 Capacity Planning (OBJ 3.4)_en.srt 19.0 KB
  69. 006 Single Sign-On (SSO) (OBJ 4.6)_en.srt 19.0 KB
  70. 004 Avoiding Social Engineering (OBJ 5.6)_en.srt 18.5 KB
  71. 009 Access Control Models (OBJ 4.6)_en.srt 18.4 KB
  72. 006 Ransomware (OBJ 2.4)_en.srt 18.2 KB
  73. 002 Wireless Infrastructure Security (OBJ 4.1)_en.srt 17.9 KB
  74. 010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt 17.8 KB
  75. 002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt 17.8 KB
  76. 006 Access Control Vestibules (OBJ 1.2)_en.srt 17.7 KB
  77. 002 Recognizing Insider Threats (OBJ 5.6)_en.srt 17.6 KB
  78. 006 Increasing Hash Security (OBJ 1.4)_en.srt 17.5 KB
  79. 005 Policy and Handbooks (OBJ 5.6)_en.srt 17.5 KB
  80. 002 Distributed Denial of Service (OBJ 2.4)_en.srt 17.4 KB
  81. 002 Viruses (OBJ 2.4)_en.srt 17.4 KB
  82. 006 Preventing Phishing Attacks (OBJ 5.6)_en.srt 17.3 KB
  83. 008 Disk Imaging and Analysis (OBJ 4.8)_en.srt 17.2 KB
  84. 002 Exam Tips_en.srt 17.0 KB
  85. 003 Threat Intelligence Feeds (OBJ 4.3)_en.srt 16.9 KB
  86. 1 3.3 KB
  87. 001 Fundamentals of Security.mp4 194.6 MB
  88. 006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt 16.7 KB
  89. 003 Restricting Applications (OBJ 2.5)_en.srt 16.7 KB
  90. 013 Zero Trust (OBJ 1.2)_en.srt 16.6 KB
  91. 005 Viruses and Trojans (OBJ 2.4)_en.srt 16.5 KB
  92. 006 Change Management (OBJ 1.3)_en.srt 16.5 KB
  93. 009 SD-WAN and SASE (OBJ 3.2)_en.srt 16.4 KB
  94. 005 Phishing Attacks (OBJ 2.2)_en.srt 16.4 KB
  95. 003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt 16.1 KB
  96. 004 Surveillance Systems (OBJ 1.2)_en.srt 16.1 KB
  97. 004 Root Cause Analysis (OBJ 4.8)_en.srt 16.0 KB
  98. 004 Asymmetric Algorithms (OBJ 1.4)_en.srt 16.0 KB
  99. 002 Threat Actor Motivations (OBJ 2.1)_en.srt 16.0 KB
  100. 010 Resilience and Recovery Testing (OBJ 3.4)_en.srt 15.8 KB
  101. 004 Directory Traversal Attack (OBJ 2.4)_en.srt 15.7 KB
  102. 002 Data Classifications (OBJ 3.3)_en.srt 15.7 KB
  103. 008 NetFlow and Flow Analysis_en.srt 15.6 KB
  104. 003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 15.6 KB
  105. 002 Acquisition and Procurement (OBJ 4.2)_en.srt 15.3 KB
  106. 003 Threat Hunting (OBJ 4.8)_en.srt 15.3 KB
  107. 005 Automating Onboarding (OBJ 4.7)_en.srt 15.1 KB
  108. 004 Automated Reports (OBJ 4.9)_en.srt 15.1 KB
  109. 004 Asset Management (OBJ 4.2)_en.srt 15.1 KB
  110. 002 Internal Audits and Assessments (OBJ 5.5)_en.srt 15.0 KB
  111. 003 Impersonation (OBJ 2.2)_en.srt 15.0 KB
  112. 007 Authentication (OBJ 1.2)_en.srt 15.0 KB
  113. 008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt 14.8 KB
  114. 007 Change Management Processes (OBJ 1.3)_en.srt 14.7 KB
  115. 010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt 14.7 KB
  116. 008 Endpoint Detection and Response (OBJ 4.5)_en.srt 14.7 KB
  117. 002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt 14.6 KB
  118. 004 Risk Register (OBJ 5.2)_en.srt 14.5 KB
  119. 010 Indicators of Compromise (IoC)_en.srt 14.4 KB
  120. 004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt 14.4 KB
  121. 003 Mobile Asset Deployments (OBJ 4.1)_en.srt 14.4 KB
  122. 001 Automation and Orchestration (OBJ 4.7)_en.srt 14.4 KB
  123. 004 Responsible Disclosure Programs (OBJ 4.3)_en.srt 14.4 KB
  124. 007 Email Security (OBJ 4.5)_en.srt 14.4 KB
  125. 001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt 14.3 KB
  126. 002 Fencing and Bollards (OBJ 1.2)_en.srt 14.3 KB
  127. 003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt 14.3 KB
  128. 011 Race Conditions (OBJ 2.3)_en.srt 14.1 KB
  129. 008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt 14.1 KB
  130. 004 External Audits and Assessments (OBJ 5.5)_en.srt 14.0 KB
  131. 005 Execution and Escalation Attack (OBJ 2.4)_en.srt 14.0 KB
  132. 006 Web and DNS Filtering (OBJ 4.5)_en.srt 14.0 KB
  133. 009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt 13.9 KB
  134. 005 Availability (OBJ 1.2)_en.srt 13.8 KB
  135. 004 Automating Support Tickets (OBJ 4.7)_en.srt 13.8 KB
  136. 010 Assigning Permissions (OBJ 4.6)_en.srt 13.8 KB
  137. 009 Attestation of Findings (OBJ 5.5)_en.srt 13.5 KB
  138. 007 Nation-state Actor (OBJ 2.1)_en.srt 13.5 KB
  139. 009 Single Pane of Glass (OBJ 4.4)_en.srt 13.4 KB
  140. 007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt 13.3 KB
  141. 009 SELinux (OBJ 2.5 & 4.5)_en.srt 13.2 KB
  142. 009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt 13.1 KB
  143. 004 Integrity (OBJ 1.2)_en.srt 13.0 KB
  144. 005 IDS and IPS (OBJ 3.2)_en.srt 13.0 KB
  145. 002 Identifying Vulnerabilities (OBJ 4.3)_en.srt 12.8 KB
  146. 003 Confidentiality (OBJ 1.2)_en.srt 12.8 KB
  147. 001 Alerting and Monitoring (OBJ 4.4)_en.srt 12.8 KB
  148. 003 Attacking with Brute Force (OBJ 2.4)_en.srt 12.7 KB
  149. 011 IPSIDS Logs (OBJ 4.9)_en.srt 12.6 KB
  150. 005 Network Access Control (NAC) (OBJ 4.5)_en.srt 12.5 KB
  151. 007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt 12.4 KB
  152. 002 Threats and Vulnerabilities_en.srt 12.4 KB
  153. 013 Indications of Malware Attacks (OBJ 2.4)_en.srt 12.4 KB
  154. 005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt 12.3 KB
  155. 007 Governance Considerations (OBJ 5.1)_en.srt 12.2 KB
  156. 006 Data from Security Tools (OBJ 4.4)_en.srt 12.2 KB
  157. 010 Blockchain (OBJ 1.4)_en.srt 12.1 KB
  158. 007 Firewall Logs (OBJ 4.9)_en.srt 12.1 KB
  159. 009 User Behavior Analytics (OBJ 4.5)_en.srt 12.1 KB
  160. 011 Encryption Tools (OBJ 1.4)_en.srt 12.1 KB
  161. 008 Rootkits (OBJ 2.4)_en.srt 12.0 KB
  162. 011 Security Control Types (OBJ 1.1)_en.srt 12.0 KB
  163. 003 Symmetric Algorithms (OBJ 1.4)_en.srt 12.0 KB
  164. 010 Keylogger (OBJ 2.4)_en.srt 11.9 KB
  165. 006 Penetration Testing (OBJ 5.5)_en.srt 11.9 KB
  166. 012 Gap Analysis (OBJ 1.1)_en.srt 11.8 KB
  167. 008 Frauds and Scams (OBJ 2.2)_en.srt 11.8 KB
  168. 008 Insider Threats (OBJ 2.1)_en.srt 11.8 KB
  169. 007 Creating a Culture of Security (OBJ 5.6)_en.srt 11.7 KB
  170. 006 Contracts and Agreements (OBJ 5.3)_en.srt 11.6 KB
  171. 005 Trusted Operating Systems (OBJ 2.5)_en.srt 11.6 KB
  172. 004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 11.6 KB
  173. 006 Updates and Patches (OBJ 2.5)_en.srt 11.5 KB
  174. 007 Risk Management Strategies (OBJ 5.2)_en.srt 11.4 KB
  175. 004 Vendor Assessment (OBJ 5.3)_en.srt 11.4 KB
  176. 007 Session Hijacking (OBJ 2.4)_en.srt 11.4 KB
  177. 007 Zombies and Botnets (OBJ 2.4)_en.srt 11.4 KB
  178. 011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt 11.4 KB
  179. 008 Technical Implications of Changes (OBJ 1.3)_en.srt 11.4 KB
  180. 011 Spyware and Bloatware (OBJ 2.4)_en.srt 11.3 KB
  181. 006 Non-repudiation (OBJ 1.2)_en.srt 11.3 KB
  182. 007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt 11.2 KB
  183. 012 Malware Attack Techniques (OBJ 2.4)_en.srt 11.2 KB
  184. 012 Network Logs (OBJ 4.9)_en.srt 11.0 KB
  185. 003 Cloud Security (OBJ 3.1 & 4.1)_en.srt 11.0 KB
  186. 002 Changing Default Configurations (OBJ 2.5)_en.srt 11.0 KB
  187. 002 Monitoring Resources (OBJ 4.4)_en.srt 10.9 KB
  188. 006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt 10.9 KB
  189. 010 Security Control Categories (OBJ 1.1)_en.srt 10.8 KB
  190. 009 Influence Campaigns (OBJ 2.2)_en.srt 10.8 KB
  191. 004 Unnecessary Services (OBJ 2.5)_en.srt 10.8 KB
  192. 006 Organized Crime (OBJ 2.1)_en.srt 8.5 KB
  193. 2 81 bytes
  194. 001 Malware (OBJ 2.4).mp4 186.2 MB
  195. 001 CompTIA-Security-SY0-701-Study-Guide.pdf 1.4 MB
  196. 003 Risk Identification (OBJ 5.2)_en.srt 10.8 KB
  197. 001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt 10.8 KB
  198. 001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt 10.7 KB
  199. 009 Documenting Changes (OBJ 1.3)_en.srt 10.7 KB
  200. 010 Data Encryption Levels (2.5)_en.srt 10.5 KB
  201. 007 Federation (OBJ 4.6)_en.srt 10.5 KB
  202. 005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt 10.4 KB
  203. 013 Metadata (OBJ 4.9)_en.srt 10.4 KB
  204. 005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt 10.4 KB
  205. 004 Pretexting (OBJ 2.2)_en.srt 10.3 KB
  206. 008 Compliance (OBJ 5.4)_en.srt 10.2 KB
  207. 003 Data Ownership (OBJ 4.2 & 5.1)_en.srt 10.1 KB
  208. 009 Shadow IT (OBJ 2.1)_en.srt 10.0 KB
  209. 001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt 9.8 KB
  210. 006 Automating Security (OBJ 4.7)_en.srt 9.8 KB
  211. 002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt 9.7 KB
  212. 002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt 9.7 KB
  213. 003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt 9.6 KB
  214. 013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt 9.5 KB
  215. 004 Data States (OBJ 3.3)_en.srt 9.5 KB
  216. 001 Audits and Assessments (OBJ 5.5)_en.srt 9.4 KB
  217. 011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt 9.2 KB
  218. 005 Performing an External Assessment (OBJ 5.5)_en.srt 9.2 KB
  219. 003 Dashboards (OBJ 4.9)_en.srt 9.2 KB
  220. 004 Policies (OBJ 5.1)_en.srt 9.1 KB
  221. 001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt 9.1 KB
  222. 001 Risk Management (OBJ 5.2)_en.srt 9.0 KB
  223. 003 Threat Actor Attributes (OBJ 2.1)_en.srt 9.0 KB
  224. 001 Security Awareness (OBJ 5.6)_en.srt 9.0 KB
  225. 006 Procedures (OBJ 5.1)_en.srt 9.0 KB
  226. 001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt 8.9 KB
  227. 009 Accounting (OBJ 1.2)_en.srt 8.9 KB
  228. 003 Performing an Internal Assessment (OBJ 5.5)_en.srt 8.8 KB
  229. 002 Governance (OBJ 5.1)_en.srt 8.7 KB
  230. 001 Security Architecture (OBJ 3.1 & 4.1)_en.srt 8.7 KB
  231. 3 1.4 KB
  232. 008 Securing Network Communications (OBJ 3.2).mp4 183.4 MB
  233. 009 Injection Attacks_en.srt 8.7 KB
  234. 004 Trojans (OBJ 2.4)_en.srt 8.6 KB
  235. 001 Social Engineering (OBJ 2.2 & 5.6)_en.srt 8.6 KB
  236. 001 Physical Security (OBJ 1.2 & 2.4)_en.srt 8.6 KB
  237. 001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt 8.5 KB
  238. 006 Quantitative Risk Analysis (OBJ 5.2)_en.srt 8.4 KB
  239. 009 Endpoint Logs (OBJ 4.9)_en.srt 8.3 KB
  240. 010 OS-specific Security Logs (OBJ 4.9)_en.srt 8.3 KB
  241. 005 Data Types (OBJ 3.3 & 1.4)_en.srt 8.2 KB
  242. 008 Application Logs (OBJ 4.9)_en.srt 8.0 KB
  243. 005 Standards (OBJ 5.1)_en.srt 8.0 KB
  244. 005 Hacktivists (OBJ 2.1)_en.srt 8.0 KB
  245. 008 Authorization (OBJ 1.2)_en.srt 7.9 KB
  246. 009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt 7.8 KB
  247. 008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt 7.8 KB
  248. 008 On-Path Attacks_en.srt 7.8 KB
  249. 001 Investigating an Incident (OBJ 4.9)_en.srt 7.7 KB
  250. 002 BONUS Where do I go from here_en.srt 7.7 KB
  251. 010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt 7.6 KB
  252. 012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt 7.5 KB
  253. 006 Microservices (OBJ 3.1)_en.srt 7.5 KB
  254. 003 Worms (OBJ 2.4)_en.srt 7.4 KB
  255. 001 Malicious Activity (OBJ 2.4)_en.srt 7.4 KB
  256. 001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt 7.3 KB
  257. 001 Security Techniques (OBJ 4.1 & 4.5)_en.srt 7.3 KB
  258. 004 Configuring a RAID (OBJ 3.4)_en.srt 7.3 KB
  259. 008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt 7.2 KB
  260. 001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt 7.2 KB
  261. 007 Securing Data (OBJ 3.3)_en.srt 7.1 KB
  262. 009 Non-compliance Consequences (OBJ 5.4)_en.srt 6.9 KB
  263. 001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt 6.9 KB
  264. 005 Serverless (OBJ 3.1)_en.srt 6.8 KB
  265. 009 Exploring Digital Certificates (OBJ 1.4)_en.srt 6.7 KB
  266. 005 Qualitative Risk Analysis (OBJ 5.2)_en.srt 6.7 KB
  267. 001 Vulnerability Management (OBJ 4.3)_en.srt 6.6 KB
  268. 008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt 6.5 KB
  269. 003 Governance Structures (OBJ 5.1)_en.srt 6.5 KB
  270. 002 Risk Assessment Frequency (OBJ 5.2)_en.srt 6.5 KB
  271. 004 Unskilled Attackers (OBJ 2.1)_en.srt 6.3 KB
  272. 007 Network Infrastructure (OBJ 3.1)_en.srt 6.2 KB
  273. 001 Incident Response (OBJ 4.8)_en.srt 6.0 KB
  274. 006 Data Sovereignty (OBJ 3.3)_en.srt 5.5 KB
  275. 006 Replay Attacks (OBJ 2.4)_en.srt 5.5 KB
  276. 008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt 5.4 KB
  277. 4 325.8 KB
  278. 006 Conducting Vulnerability Scans (OBJ 4.3).mp4 163.0 MB
  279. 5 1006.4 KB
  280. 002 Exam Tips.mp4 157.6 MB
  281. 6 372.5 KB
  282. 008 Performing a Basic PenTest (OBJ 5.5).mp4 154.0 MB
  283. 7 2.0 MB
  284. 001 Automation and Orchestration (OBJ 4.7).mp4 140.8 MB
  285. 8 1.2 MB
  286. 001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 139.5 MB
  287. 9 535.5 KB
  288. 007 Door Locks (OBJ 1.2).mp4 135.2 MB
  289. 10 830.4 KB
  290. 006 Digital Forensic Procedures (OBJ 4.8).mp4 134.1 MB
  291. 11 1.9 MB
  292. 009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 132.3 MB
  293. 12 1.7 MB
  294. 004 Password Security (OBJ 4.6).mp4 123.3 MB
  295. 13 721.2 KB
  296. 002 Motivational Triggers (OBJ 5.6).mp4 120.3 MB
  297. 14 1.7 MB
  298. 001 Alerting and Monitoring (OBJ 4.4).mp4 119.8 MB
  299. 15 204.4 KB
  300. 010 Selecting Secure Protocols (OBJ 4.5).mp4 115.7 MB
  301. 16 320.8 KB
  302. 003 Multifactor Authentication (OBJ 4.6).mp4 110.8 MB
  303. 17 1.2 MB
  304. 009 Redundant Site Considerations (OBJ 3.4).mp4 108.9 MB
  305. 18 1.1 MB
  306. 008 Digital Certificates (OBJ 1.4).mp4 108.4 MB
  307. 19 1.6 MB
  308. 003 Alerting and Monitoring Activities (OBJ 4.4).mp4 105.9 MB
  309. 20 145.3 KB
  310. 004 Configuring Firewalls (OBJ 4.5).mp4 105.7 MB
  311. 21 357.1 KB
  312. 001 Governance and Compliance (OBJ 5.1 & 5.4).mp4 104.6 MB
  313. 22 1.4 MB
  314. 001 Audits and Assessments (OBJ 5.5).mp4 103.2 MB
  315. 23 865.7 KB
  316. 002 On-premise versus the Cloud (OBJ 3.1).mp4 102.3 MB
  317. 24 1.7 MB
  318. 008 Integrations and APIs (OBJ 4.7).mp4 102.3 MB
  319. 25 1.7 MB
  320. 008 Disk Imaging and Analysis (OBJ 4.8).mp4 101.8 MB
  321. 26 165.7 KB
  322. 013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4 101.5 MB
  323. 27 494.8 KB
  324. 001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4 101.4 MB
  325. 28 657.4 KB
  326. 001 Risk Management (OBJ 5.2).mp4 100.8 MB
  327. 29 1.2 MB
  328. 007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4 100.6 MB
  329. 30 1.4 MB
  330. 002 Investigating with Data (OBJ 4.9).mp4 100.5 MB
  331. 31 1.5 MB
  332. 010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4 100.1 MB
  333. 32 1.9 MB
  334. 001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4 97.9 MB
  335. 33 59.6 KB
  336. 006 Ransomware (OBJ 2.4).mp4 97.2 MB
  337. 34 831.4 KB
  338. 003 Wireless Security Settings (OBJ 4.1).mp4 97.1 MB
  339. 35 925.8 KB
  340. 010 Infrastructure Considerations (OBJ 3.2).mp4 96.4 MB
  341. 36 1.6 MB
  342. 007 Patch Management (OBJ 2.5).mp4 94.3 MB
  343. 37 1.7 MB
  344. 002 Incident Response Process (OBJ 4.8).mp4 93.5 MB
  345. 38 528.1 KB
  346. 007 Port Security (OBJ 3.2).mp4 91.5 MB
  347. 39 549.8 KB
  348. 001 Security Infrastructure (OBJ 3.2 & 4.5).mp4 90.7 MB
  349. 40 1.3 MB
  350. 001 Social Engineering (OBJ 2.2 & 5.6).mp4 90.0 MB
  351. 41 2.0 MB
  352. 007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4 89.5 MB
  353. 42 462.4 KB
  354. 006 Network Appliances (OBJ 3.2).mp4 88.9 MB
  355. 43 1.1 MB
  356. 005 Hashing (OBJ 1.4).mp4 88.5 MB
  357. 44 1.5 MB
  358. 001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4 87.5 MB
  359. 45 526.1 KB
  360. 005 Viruses and Trojans (OBJ 2.4).mp4 87.0 MB
  361. 46 989.0 KB
  362. 005 Capacity Planning (OBJ 3.4).mp4 86.8 MB
  363. 47 1.2 MB
  364. 001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4 86.6 MB
  365. 48 1.4 MB
  366. 001 Security Architecture (OBJ 3.1 & 4.1).mp4 86.5 MB
  367. 49 1.5 MB
  368. 007 Nation-state Actor (OBJ 2.1).mp4 85.8 MB
  369. 50 205.1 KB
  370. 006 Packet Captures (OBJ 4.9).mp4 85.5 MB
  371. 51 540.2 KB
  372. 004 Application Security (OBJ 4.1).mp4 83.8 MB
  373. 52 236.0 KB
  374. 002 Ports and Protocols (OBJ 4.5).mp4 83.7 MB
  375. 53 280.8 KB
  376. 002 Wireless Infrastructure Security (OBJ 4.1).mp4 83.6 MB
  377. 54 409.8 KB
  378. 005 Analyzing Vulnerabilities (OBJ 4.3).mp4 82.7 MB
  379. 55 1.3 MB
  380. 001 Security Techniques (OBJ 4.1 & 4.5).mp4 82.4 MB
  381. 56 1.6 MB
  382. 004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4 82.0 MB
  383. 57 2.0 MB
  384. 006 Powering Data Centers (OBJ 3.4).mp4 81.3 MB
  385. 58 682.3 KB
  386. 012 Obfuscation (OBJ 1.4).mp4 80.7 MB
  387. 59 1.3 MB
  388. 001 Security Awareness (OBJ 5.6).mp4 79.8 MB
  389. 60 169.2 KB
  390. 003 Password Management (OBJ 5.6).mp4 79.8 MB
  391. 61 197.3 KB
  392. 011 Outsmarting Threat Actors (OBJ 1.2).mp4 79.6 MB
  393. 62 431.8 KB
  394. 002 Recognizing Insider Threats (OBJ 5.6).mp4 79.5 MB
  395. 63 532.0 KB
  396. 002 When to Automate and Orchestrate (OBJ 4.7).mp4 79.5 MB
  397. 64 534.4 KB
  398. 001 Physical Security (OBJ 1.2 & 2.4).mp4 79.0 MB
  399. 65 1.0 MB
  400. 010 Vulnerability Reporting (OBJ 4.3).mp4 78.8 MB
  401. 66 1.2 MB
  402. 005 Vulnerability Scans (OBJ 4.9).mp4 78.5 MB
  403. 67 1.5 MB
  404. 009 Configuring a DLP (OBJ 4.5).mp4 78.5 MB
  405. 68 1.5 MB
  406. 010 Other Social Engineering Attacks (OBJ 2.2).mp4 78.4 MB
  407. 69 1.6 MB
  408. 005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4 78.2 MB
  409. 70 1.8 MB
  410. 008 Insider Threats (OBJ 2.1).mp4 77.0 MB
  411. 71 1008.9 KB
  412. 003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4 76.7 MB
  413. 72 1.3 MB
  414. 008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4 76.5 MB
  415. 73 1.5 MB
  416. 009 Access Control Models (OBJ 4.6).mp4 76.2 MB
  417. 74 1.8 MB
  418. 008 Continuity of Operations Plan (OBJ 3.4).mp4 76.0 MB
  419. 75 2.0 MB
  420. 007 Automating Application Development (OBJ 4.7).mp4 75.5 MB
  421. 76 519.4 KB
  422. 003 Firewalls (OBJ 3.2).mp4 75.1 MB
  423. 77 890.6 KB
  424. 005 Phishing Attacks (OBJ 2.2).mp4 75.1 MB
  425. 78 932.3 KB
  426. 001 Malicious Activity (OBJ 2.4).mp4 74.1 MB
  427. 79 1.9 MB
  428. 002 Symmetric vs Asymmetric (OBJ 1.4).mp4 73.9 MB
  429. 80 132.0 KB
  430. 004 Avoiding Social Engineering (OBJ 5.6).mp4 73.8 MB
  431. 81 163.8 KB
  432. 006 Single Sign-On (SSO) (OBJ 4.6).mp4 73.3 MB
  433. 82 749.7 KB
  434. 004 Pretexting (OBJ 2.2).mp4 72.9 MB
  435. 83 1.1 MB
  436. 008 Access Badge Cloning (OBJ 2.4).mp4 72.5 MB
  437. 84 1.5 MB
  438. 005 Policy and Handbooks (OBJ 5.6).mp4 72.5 MB
  439. 85 1.5 MB
  440. 001 Investigating an Incident (OBJ 4.9).mp4 72.1 MB
  441. 86 1.9 MB
  442. 009 Attestation of Findings (OBJ 5.5).mp4 70.7 MB
  443. 87 1.3 MB
  444. 013 Indications of Malware Attacks (OBJ 2.4).mp4 70.5 MB
  445. 88 1.5 MB
  446. 001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4 70.5 MB
  447. 89 1.5 MB
  448. 006 Change Management (OBJ 1.3).mp4 70.5 MB
  449. 90 1.5 MB
  450. 003 Restricting Applications (OBJ 2.5).mp4 70.0 MB
  451. 91 2.0 MB
  452. 001 Cyber Resilience and Redundancy (OBJ 3.4).mp4 69.9 MB
  453. 92 65.6 KB
  454. 013 Zero Trust (OBJ 1.2).mp4 68.6 MB
  455. 93 1.4 MB
  456. 001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4 67.1 MB
  457. 94 882.1 KB
  458. 006 Preventing Phishing Attacks (OBJ 5.6).mp4 66.7 MB
  459. 95 1.3 MB
  460. 007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4 66.5 MB
  461. 96 1.5 MB
  462. 006 Access Control Vestibules (OBJ 1.2).mp4 66.4 MB
  463. 97 1.6 MB
  464. 009 Shadow IT (OBJ 2.1).mp4 66.4 MB
  465. 98 1.6 MB
  466. 010 Resilience and Recovery Testing (OBJ 3.4).mp4 66.1 MB
  467. 99 1.9 MB
  468. 001 Incident Response (OBJ 4.8).mp4 65.6 MB
  469. 100 379.1 KB
  470. 009 SD-WAN and SASE (OBJ 3.2).mp4 65.5 MB
  471. 101 463.4 KB
  472. 005 Asset Disposal and Decommissioning (OBJ 4.2).mp4 65.4 MB
  473. 102 599.4 KB
  474. 004 Root Cause Analysis (OBJ 4.8).mp4 65.2 MB
  475. 103 801.8 KB
  476. 007 Data Backups (OBJ 3.4).mp4 65.1 MB
  477. 104 956.0 KB
  478. 002 Distributed Denial of Service (OBJ 2.4).mp4 64.9 MB
  479. 105 1.1 MB
  480. 010 Assigning Permissions (OBJ 4.6).mp4 63.8 MB
  481. 106 214.8 KB
  482. 011 Selecting Infrastructure Controls (OBJ 3.2).mp4 63.2 MB
  483. 107 839.7 KB
  484. 002 Fencing and Bollards (OBJ 1.2).mp4 63.1 MB
  485. 108 883.5 KB
  486. 008 Frauds and Scams (OBJ 2.2).mp4 63.1 MB
  487. 109 955.6 KB
  488. 002 BONUS Where do I go from here.mp4 62.6 MB
  489. 110 1.4 MB
  490. 006 Web and DNS Filtering (OBJ 4.5).mp4 62.1 MB
  491. 111 1.9 MB
  492. 003 Impersonation (OBJ 2.2).mp4 62.0 MB
  493. 112 10.7 KB
  494. 004 Risk Register (OBJ 5.2).mp4 61.8 MB
  495. 113 181.4 KB
  496. 008 Endpoint Detection and Response (OBJ 4.5).mp4 61.5 MB
  497. 114 464.7 KB
  498. 001 Vulnerability Management (OBJ 4.3).mp4 61.3 MB
  499. 115 702.1 KB
  500. 005 Automating Onboarding (OBJ 4.7).mp4 61.1 MB
  501. 116 883.6 KB
  502. 006 Remote and Hybrid Work Environments (OBJ 5.6).mp4 61.0 MB
  503. 117 999.9 KB
  504. 003 Attacking with Brute Force (OBJ 2.4).mp4 60.8 MB
  505. 118 1.2 MB
  506. 002 High Availability (OBJ 3.4).mp4 60.8 MB
  507. 119 1.2 MB
  508. 007 Authentication (OBJ 1.2).mp4 60.5 MB
  509. 120 1.5 MB
  510. 009 User Behavior Analytics (OBJ 4.5).mp4 60.3 MB
  511. 121 1.7 MB
  512. 002 Viruses (OBJ 2.4).mp4 59.9 MB
  513. 122 130.6 KB
  514. 009 Backdoors and Logic Bombs (OBJ 2.4).mp4 59.8 MB
  515. 123 237.4 KB
  516. 003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4 59.7 MB
  517. 124 337.9 KB
  518. 002 Internal Audits and Assessments (OBJ 5.5).mp4 58.0 MB
  519. 125 2.0 MB
  520. 008 Vulnerability Response and Remediation (OBJ 4.3).mp4 57.8 MB
  521. 126 176.8 KB
  522. 011 Race Conditions (OBJ 2.3).mp4 57.7 MB
  523. 127 272.4 KB
  524. 004 Asset Management (OBJ 4.2).mp4 57.3 MB
  525. 128 729.3 KB
  526. 011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4 57.3 MB
  527. 129 746.9 KB
  528. 006 Increasing Hash Security (OBJ 1.4).mp4 57.2 MB
  529. 130 774.4 KB
  530. 006 Organized Crime (OBJ 2.1).mp4 57.1 MB
  531. 131 875.6 KB
  532. 002 Data Classifications (OBJ 3.3).mp4 56.7 MB
  533. 132 1.3 MB
  534. 005 Password Attacks (OBJ 2.4).mp4 56.5 MB
  535. 133 1.5 MB
  536. 002 Acquisition and Procurement (OBJ 4.2).mp4 56.5 MB
  537. 134 1.5 MB
  538. 010 Keylogger (OBJ 2.4).mp4 56.5 MB
  539. 135 1.5 MB
  540. 011 Secure Baselines (OBJ 2.5 and 4.1).mp4 56.3 MB
  541. 136 1.7 MB
  542. 004 Unnecessary Services (OBJ 2.5).mp4 55.6 MB
  543. 137 375.8 KB
  544. 003 Threat Intelligence Feeds (OBJ 4.3).mp4 55.6 MB
  545. 138 406.0 KB
  546. 006 Non-repudiation (OBJ 1.2).mp4 54.8 MB
  547. 139 1.2 MB
  548. 006 Contracts and Agreements (OBJ 5.3).mp4 54.4 MB
  549. 140 1.6 MB
  550. 007 Email Security (OBJ 4.5).mp4 54.3 MB
  551. 141 1.7 MB
  552. 007 Data Collection Procedures (OBJ 4.8).mp4 54.2 MB
  553. 142 1.8 MB
  554. 004 Automating Support Tickets (OBJ 4.7).mp4 54.1 MB
  555. 143 1.9 MB
  556. 009 Non-compliance Consequences (OBJ 5.4).mp4 54.0 MB
  557. 144 2.0 MB
  558. 002 Threat Actor Motivations (OBJ 2.1).mp4 54.0 MB
  559. 145 21.9 KB
  560. 003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 53.4 MB
  561. 146 617.9 KB
  562. 007 Zombies and Botnets (OBJ 2.4).mp4 53.2 MB
  563. 147 840.6 KB
  564. 002 Threats and Vulnerabilities.mp4 52.6 MB
  565. 148 1.4 MB
  566. 005 Incident Response Training and Testing (OBJ 4.8).mp4 52.6 MB
  567. 149 1.4 MB
  568. 010 Indicators of Compromise (IoC).mp4 52.5 MB
  569. 150 1.5 MB
  570. 004 Integrity (OBJ 1.2).mp4 52.4 MB
  571. 151 1.6 MB
  572. 004 External Audits and Assessments (OBJ 5.5).mp4 52.3 MB
  573. 152 1.7 MB
  574. 004 Surveillance Systems (OBJ 1.2).mp4 52.3 MB
  575. 153 1.7 MB
  576. 005 Vendor Selection and Monitoring (OBJ 5.3).mp4 52.2 MB
  577. 154 1.8 MB
  578. 011 IPSIDS Logs (OBJ 4.9).mp4 52.0 MB
  579. 155 2.0 MB
  580. 005 Availability (OBJ 1.2).mp4 51.7 MB
  581. 156 286.6 KB
  582. 003 Threat Hunting (OBJ 4.8).mp4 51.6 MB
  583. 157 380.7 KB
  584. 007 Reconnaissance in Pentesting (OBJ 5.5).mp4 51.1 MB
  585. 158 878.6 KB
  586. 002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4 51.1 MB
  587. 159 905.8 KB
  588. 006 Penetration Testing (OBJ 5.5).mp4 50.9 MB
  589. 160 1.1 MB
  590. 004 Vendor Assessment (OBJ 5.3).mp4 50.8 MB
  591. 161 1.2 MB
  592. 008 NetFlow and Flow Analysis.mp4 49.0 MB
  593. 162 1023.3 KB
  594. 012 Gap Analysis (OBJ 1.1).mp4 48.7 MB
  595. 163 1.3 MB
  596. 009 Influence Campaigns (OBJ 2.2).mp4 48.5 MB
  597. 164 1.5 MB
  598. 006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4 48.5 MB
  599. 165 1.5 MB
  600. 004 Automated Reports (OBJ 4.9).mp4 48.5 MB
  601. 166 1.5 MB
  602. 003 Cloud Security (OBJ 3.1 & 4.1).mp4 48.3 MB
  603. 167 1.7 MB
  604. 005 Bypassing Surveillance Systems (OBJ 2.4).mp4 47.7 MB
  605. 168 342.2 KB
  606. 003 Data Ownership (OBJ 4.2 & 5.1).mp4 47.6 MB
  607. 169 440.9 KB
  608. 011 Encryption Tools (OBJ 1.4).mp4 47.5 MB
  609. 170 553.1 KB
  610. 006 Updates and Patches (OBJ 2.5).mp4 47.4 MB
  611. 171 582.4 KB
  612. 008 Data Loss Prevention (DLP) (OBJ 4.4).mp4 47.2 MB
  613. 172 772.1 KB
  614. 008 Compliance (OBJ 5.4).mp4 47.0 MB
  615. 173 986.1 KB
  616. 008 Rootkits (OBJ 2.4).mp4 46.9 MB
  617. 174 1.1 MB
  618. 007 Risk Management Strategies (OBJ 5.2).mp4 46.7 MB
  619. 175 1.3 MB
  620. 010 Security Control Categories (OBJ 1.1).mp4 46.7 MB
  621. 176 1.3 MB
  622. 002 Changing Default Configurations (OBJ 2.5).mp4 46.6 MB
  623. 177 1.4 MB
  624. 004 Responsible Disclosure Programs (OBJ 4.3).mp4 46.4 MB
  625. 178 1.6 MB
  626. 003 Mobile Asset Deployments (OBJ 4.1).mp4 46.3 MB
  627. 179 1.7 MB
  628. 002 Identity and Access Management (IAM) (OBJ 4.6).mp4 46.1 MB
  629. 180 1.9 MB
  630. 004 Directory Traversal Attack (OBJ 2.4).mp4 45.8 MB
  631. 181 237.0 KB
  632. 005 Trusted Operating Systems (OBJ 2.5).mp4 45.5 MB
  633. 182 499.5 KB
  634. 007 Governance Considerations (OBJ 5.1).mp4 45.3 MB
  635. 183 699.4 KB
  636. 004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 44.9 MB
  637. 184 1.1 MB
  638. 007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4 44.5 MB
  639. 185 1.5 MB
  640. 002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4 44.4 MB
  641. 186 1.6 MB
  642. 011 Security Control Types (OBJ 1.1).mp4 43.6 MB
  643. 187 422.3 KB
  644. 010 Buffer Overflow (OBJ 2.3 & 2.4).mp4 43.5 MB
  645. 188 509.9 KB
  646. 005 Network Access Control (NAC) (OBJ 4.5).mp4 43.4 MB
  647. 189 644.2 KB
  648. 002 Monitoring Resources (OBJ 4.4).mp4 43.3 MB
  649. 190 710.6 KB
  650. 003 Symmetric Algorithms (OBJ 1.4).mp4 43.3 MB
  651. 191 761.3 KB
  652. 005 Execution and Escalation Attack (OBJ 2.4).mp4 43.1 MB
  653. 192 907.8 KB
  654. 003 Data Redundancy (OBJ 3.4).mp4 42.9 MB
  655. 193 1.1 MB
  656. 003 Risk Identification (OBJ 5.2).mp4 42.7 MB
  657. 194 1.3 MB
  658. 003 Confidentiality (OBJ 1.2).mp4 42.4 MB
  659. 195 1.6 MB
  660. 013 Embedded Systems (OBJ 3.1 & 4.1).mp4 42.0 MB
  661. 196 9.8 KB
  662. 012 Malware Attack Techniques (OBJ 2.4).mp4 41.7 MB
  663. 197 313.1 KB
  664. 004 Asymmetric Algorithms (OBJ 1.4).mp4 41.5 MB
  665. 198 546.6 KB
  666. 009 Single Pane of Glass (OBJ 4.4).mp4 41.2 MB
  667. 199 841.9 KB
  668. 012 Network Logs (OBJ 4.9).mp4 40.7 MB
  669. 200 1.3 MB
  670. 006 Microservices (OBJ 3.1).mp4 40.3 MB
  671. 201 1.7 MB
  672. 007 Change Management Processes (OBJ 1.3).mp4 39.6 MB
  673. 202 432.1 KB
  674. 010 Blockchain (OBJ 1.4).mp4 39.4 MB
  675. 203 616.9 KB
  676. 007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4 39.4 MB
  677. 204 628.8 KB
  678. 011 Spyware and Bloatware (OBJ 2.4).mp4 39.3 MB
  679. 205 699.0 KB
  680. 002 Governance (OBJ 5.1).mp4 38.8 MB
  681. 206 1.2 MB
  682. 008 Group Policies (OBJ 2.5 & 4.5).mp4 38.6 MB
  683. 207 1.4 MB
  684. 007 Network Infrastructure (OBJ 3.1).mp4 38.5 MB
  685. 208 1.5 MB
  686. 005 Zero-day Vulnerabilities (OBJ 2.3).mp4 37.9 MB
  687. 209 91.9 KB
  688. 005 IDS and IPS (OBJ 3.2).mp4 37.2 MB
  689. 210 802.3 KB
  690. 002 Identifying Vulnerabilities (OBJ 4.3).mp4 37.1 MB
  691. 211 963.8 KB
  692. 005 Qualitative Risk Analysis (OBJ 5.2).mp4 36.9 MB
  693. 212 1.1 MB
  694. 005 Serverless (OBJ 3.1).mp4 36.8 MB
  695. 213 1.2 MB
  696. 003 Performing an Internal Assessment (OBJ 5.5).mp4 36.6 MB
  697. 214 1.4 MB
  698. 005 Data Types (OBJ 3.3 & 1.4).mp4 36.0 MB
  699. 215 2.0 MB
  700. 009 Documenting Changes (OBJ 1.3).mp4 35.8 MB
  701. 216 244.9 KB
  702. 007 Firewall Logs (OBJ 4.9).mp4 35.5 MB
  703. 217 562.9 KB
  704. 007 Federation (OBJ 4.6).mp4 35.2 MB
  705. 218 807.8 KB
  706. 009 SELinux (OBJ 2.5 & 4.5).mp4 35.0 MB
  707. 219 1016.4 KB
  708. 007 Creating a Culture of Security (OBJ 5.6).mp4 34.9 MB
  709. 220 1.1 MB
  710. 004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4 34.5 MB
  711. 221 1.5 MB
  712. 003 Dashboards (OBJ 4.9).mp4 34.4 MB
  713. 222 1.6 MB
  714. 009 Validating Vulnerability Remediation (OBJ 4.3).mp4 34.1 MB
  715. 223 1.9 MB
  716. 005 Performing an External Assessment (OBJ 5.5).mp4 34.1 MB
  717. 224 1.9 MB
  718. 009 Infrastructure as Code (IaC) (OBJ 3.1).mp4 34.0 MB
  719. 225 26.3 KB
  720. 003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4 33.8 MB
  721. 226 158.2 KB
  722. 005 Standards (OBJ 5.1).mp4 33.8 MB
  723. 227 199.7 KB
  724. 007 Session Hijacking (OBJ 2.4).mp4 33.8 MB
  725. 228 217.5 KB
  726. 010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4 33.8 MB
  727. 229 232.9 KB
  728. 006 Data from Security Tools (OBJ 4.4).mp4 33.5 MB
  729. 230 538.2 KB
  730. 003 Threat Actor Attributes (OBJ 2.1).mp4 33.0 MB
  731. 231 1.0 MB
  732. 008 Software-Defined Network (SDN) (OBJ 3.1).mp4 32.8 MB
  733. 232 1.2 MB
  734. 010 Data Encryption Levels (2.5).mp4 32.7 MB
  735. 233 1.3 MB
  736. 004 Data States (OBJ 3.3).mp4 32.6 MB
  737. 234 1.4 MB
  738. 012 ICS and SCADA (OBJ 3.1 & 4.1).mp4 32.5 MB
  739. 235 1.5 MB
  740. 006 Automating Security (OBJ 4.7).mp4 32.4 MB
  741. 236 1.6 MB
  742. 008 Technical Implications of Changes (OBJ 1.3).mp4 32.4 MB
  743. 237 1.6 MB
  744. 005 Hacktivists (OBJ 2.1).mp4 32.3 MB
  745. 238 1.7 MB
  746. 008 On-Path Attacks.mp4 31.9 MB
  747. 239 88.1 KB
  748. 004 Policies (OBJ 5.1).mp4 31.9 MB
  749. 240 101.1 KB
  750. 006 Procedures (OBJ 5.1).mp4 30.7 MB
  751. 241 1.3 MB
  752. 009 Accounting (OBJ 1.2).mp4 30.7 MB
  753. 242 1.3 MB
  754. 013 Metadata (OBJ 4.9).mp4 29.8 MB
  755. 243 174.8 KB
  756. 004 Trojans (OBJ 2.4).mp4 29.8 MB
  757. 244 241.3 KB
  758. 008 Risk Monitoring and Reporting (OBJ 5.2).mp4 28.8 MB
  759. 245 1.2 MB
  760. 009 Endpoint Logs (OBJ 4.9).mp4 28.6 MB
  761. 246 1.4 MB
  762. 008 Authorization (OBJ 1.2).mp4 28.6 MB
  763. 247 1.4 MB
  764. 006 Replay Attacks (OBJ 2.4).mp4 28.5 MB
  765. 248 1.5 MB
  766. 008 Application Logs (OBJ 4.9).mp4 27.5 MB
  767. 249 478.2 KB
  768. 003 Governance Structures (OBJ 5.1).mp4 27.0 MB
  769. 250 1.0 MB
  770. 003 Worms (OBJ 2.4).mp4 26.1 MB
  771. 251 1.9 MB
  772. 004 Unskilled Attackers (OBJ 2.1).mp4 25.9 MB
  773. 252 91.3 KB
  774. 010 OS-specific Security Logs (OBJ 4.9).mp4 25.7 MB
  775. 253 264.4 KB
  776. 004 Configuring a RAID (OBJ 3.4).mp4 25.6 MB
  777. 254 360.9 KB
  778. 009 Exploring Digital Certificates (OBJ 1.4).mp4 23.8 MB
  779. 255 221.1 KB
  780. 009 Injection Attacks.mp4 23.7 MB
  781. 256 325.5 KB
  782. 008 Privileged Access Management (PAM) (OBJ 4.6).mp4 23.7 MB
  783. 257 328.0 KB
  784. 007 Securing Data (OBJ 3.3).mp4 22.3 MB
  785. 258 1.7 MB
  786. 006 Data Sovereignty (OBJ 3.3).mp4 22.1 MB
  787. 259 1.9 MB
  788. 002 Risk Assessment Frequency (OBJ 5.2).mp4 21.3 MB
  789. 260 722.9 KB
  790. 006 Quantitative Risk Analysis (OBJ 5.2).mp4 21.2 MB

Discussion