| Files: |
-
001 Conclusion.mp4
280.7 MB
-
001 Security-701-Study-Plan.pdf
132.4 KB
-
001 comptia-security-sy0-701-exam-objectives-5-0.pdf
186.6 KB
-
001 Download the Study Guide.html
222 bytes
-
006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt
71.1 KB
-
008 Securing Network Communications (OBJ 3.2)_en.srt
44.4 KB
-
008 Performing a Basic PenTest (OBJ 5.5)_en.srt
37.5 KB
-
009 Configuring a DLP (OBJ 4.5)_en.srt
36.7 KB
-
009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt
35.2 KB
-
013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt
33.6 KB
-
002 Ports and Protocols (OBJ 4.5)_en.srt
32.7 KB
-
004 Password Security (OBJ 4.6)_en.srt
31.6 KB
-
001 Conclusion_en.srt
30.0 KB
-
007 Door Locks (OBJ 1.2)_en.srt
30.0 KB
-
003 Multifactor Authentication (OBJ 4.6)_en.srt
29.9 KB
-
007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt
29.5 KB
-
008 Digital Certificates (OBJ 1.4)_en.srt
29.3 KB
-
009 Redundant Site Considerations (OBJ 3.4)_en.srt
28.9 KB
-
003 Firewalls (OBJ 3.2)_en.srt
28.7 KB
-
003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt
28.2 KB
-
004 Configuring Firewalls (OBJ 4.5)_en.srt
28.2 KB
-
002 Investigating with Data (OBJ 4.9)_en.srt
27.9 KB
-
010 Selecting Secure Protocols (OBJ 4.5)_en.srt
27.7 KB
-
007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt
27.6 KB
-
003 Wireless Security Settings (OBJ 4.1)_en.srt
27.1 KB
-
006 Digital Forensic Procedures (OBJ 4.8)_en.srt
27.0 KB
-
008 Integrations and APIs (OBJ 4.7)_en.srt
26.6 KB
-
005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt
26.1 KB
-
001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt
26.1 KB
-
005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt
25.5 KB
-
005 Vulnerability Scans (OBJ 4.9)_en.srt
25.1 KB
-
010 Infrastructure Considerations (OBJ 3.2)_en.srt
24.9 KB
-
004 Application Security (OBJ 4.1)_en.srt
24.9 KB
-
007 Data Backups (OBJ 3.4)_en.srt
24.8 KB
-
006 Powering Data Centers (OBJ 3.4)_en.srt
24.4 KB
-
007 Port Security (OBJ 3.2)_en.srt
23.2 KB
-
002 Incident Response Process (OBJ 4.8)_en.srt
23.1 KB
-
010 Vulnerability Reporting (OBJ 4.3)_en.srt
22.8 KB
-
TutsNode.org.txt
59 bytes
-
0
2.2 KB
-
001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4
257.2 MB
-
003 Password Management (OBJ 5.6)_en.srt
22.5 KB
-
008 Continuity of Operations Plan (OBJ 3.4)_en.srt
22.3 KB
-
002 Motivational Triggers (OBJ 5.6)_en.srt
22.2 KB
-
006 Network Appliances (OBJ 3.2)_en.srt
22.1 KB
-
007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt
21.6 KB
-
005 Hashing (OBJ 1.4)_en.srt
20.6 KB
-
002 When to Automate and Orchestrate (OBJ 4.7)_en.srt
20.6 KB
-
008 Group Policies (OBJ 2.5 & 4.5)_en.srt
20.4 KB
-
005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt
20.4 KB
-
007 Patch Management (OBJ 2.5)_en.srt
20.1 KB
-
002 High Availability (OBJ 3.4)_en.srt
20.1 KB
-
005 Password Attacks (OBJ 2.4)_en.srt
19.9 KB
-
011 Outsmarting Threat Actors (OBJ 1.2)_en.srt
19.9 KB
-
001 Fundamentals of Security_en.srt
19.6 KB
-
005 Incident Response Training and Testing (OBJ 4.8)_en.srt
19.5 KB
-
012 Obfuscation (OBJ 1.4)_en.srt
19.5 KB
-
003 Data Redundancy (OBJ 3.4)_en.srt
19.5 KB
-
011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt
19.5 KB
-
002 On-premise versus the Cloud (OBJ 3.1)_en.srt
19.4 KB
-
004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt
19.4 KB
-
001 Malware (OBJ 2.4)_en.srt
19.3 KB
-
006 Packet Captures (OBJ 4.9)_en.srt
19.2 KB
-
007 Automating Application Development (OBJ 4.7)_en.srt
19.2 KB
-
010 Other Social Engineering Attacks (OBJ 2.2)_en.srt
19.1 KB
-
008 Access Badge Cloning (OBJ 2.4)_en.srt
19.1 KB
-
007 Data Collection Procedures (OBJ 4.8)_en.srt
19.0 KB
-
005 Capacity Planning (OBJ 3.4)_en.srt
19.0 KB
-
006 Single Sign-On (SSO) (OBJ 4.6)_en.srt
19.0 KB
-
004 Avoiding Social Engineering (OBJ 5.6)_en.srt
18.5 KB
-
009 Access Control Models (OBJ 4.6)_en.srt
18.4 KB
-
006 Ransomware (OBJ 2.4)_en.srt
18.2 KB
-
002 Wireless Infrastructure Security (OBJ 4.1)_en.srt
17.9 KB
-
010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt
17.8 KB
-
002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt
17.8 KB
-
006 Access Control Vestibules (OBJ 1.2)_en.srt
17.7 KB
-
002 Recognizing Insider Threats (OBJ 5.6)_en.srt
17.6 KB
-
006 Increasing Hash Security (OBJ 1.4)_en.srt
17.5 KB
-
005 Policy and Handbooks (OBJ 5.6)_en.srt
17.5 KB
-
002 Distributed Denial of Service (OBJ 2.4)_en.srt
17.4 KB
-
002 Viruses (OBJ 2.4)_en.srt
17.4 KB
-
006 Preventing Phishing Attacks (OBJ 5.6)_en.srt
17.3 KB
-
008 Disk Imaging and Analysis (OBJ 4.8)_en.srt
17.2 KB
-
002 Exam Tips_en.srt
17.0 KB
-
003 Threat Intelligence Feeds (OBJ 4.3)_en.srt
16.9 KB
-
1
3.3 KB
-
001 Fundamentals of Security.mp4
194.6 MB
-
006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt
16.7 KB
-
003 Restricting Applications (OBJ 2.5)_en.srt
16.7 KB
-
013 Zero Trust (OBJ 1.2)_en.srt
16.6 KB
-
005 Viruses and Trojans (OBJ 2.4)_en.srt
16.5 KB
-
006 Change Management (OBJ 1.3)_en.srt
16.5 KB
-
009 SD-WAN and SASE (OBJ 3.2)_en.srt
16.4 KB
-
005 Phishing Attacks (OBJ 2.2)_en.srt
16.4 KB
-
003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt
16.1 KB
-
004 Surveillance Systems (OBJ 1.2)_en.srt
16.1 KB
-
004 Root Cause Analysis (OBJ 4.8)_en.srt
16.0 KB
-
004 Asymmetric Algorithms (OBJ 1.4)_en.srt
16.0 KB
-
002 Threat Actor Motivations (OBJ 2.1)_en.srt
16.0 KB
-
010 Resilience and Recovery Testing (OBJ 3.4)_en.srt
15.8 KB
-
004 Directory Traversal Attack (OBJ 2.4)_en.srt
15.7 KB
-
002 Data Classifications (OBJ 3.3)_en.srt
15.7 KB
-
008 NetFlow and Flow Analysis_en.srt
15.6 KB
-
003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
15.6 KB
-
002 Acquisition and Procurement (OBJ 4.2)_en.srt
15.3 KB
-
003 Threat Hunting (OBJ 4.8)_en.srt
15.3 KB
-
005 Automating Onboarding (OBJ 4.7)_en.srt
15.1 KB
-
004 Automated Reports (OBJ 4.9)_en.srt
15.1 KB
-
004 Asset Management (OBJ 4.2)_en.srt
15.1 KB
-
002 Internal Audits and Assessments (OBJ 5.5)_en.srt
15.0 KB
-
003 Impersonation (OBJ 2.2)_en.srt
15.0 KB
-
007 Authentication (OBJ 1.2)_en.srt
15.0 KB
-
008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt
14.8 KB
-
007 Change Management Processes (OBJ 1.3)_en.srt
14.7 KB
-
010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt
14.7 KB
-
008 Endpoint Detection and Response (OBJ 4.5)_en.srt
14.7 KB
-
002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt
14.6 KB
-
004 Risk Register (OBJ 5.2)_en.srt
14.5 KB
-
010 Indicators of Compromise (IoC)_en.srt
14.4 KB
-
004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt
14.4 KB
-
003 Mobile Asset Deployments (OBJ 4.1)_en.srt
14.4 KB
-
001 Automation and Orchestration (OBJ 4.7)_en.srt
14.4 KB
-
004 Responsible Disclosure Programs (OBJ 4.3)_en.srt
14.4 KB
-
007 Email Security (OBJ 4.5)_en.srt
14.4 KB
-
001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt
14.3 KB
-
002 Fencing and Bollards (OBJ 1.2)_en.srt
14.3 KB
-
003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt
14.3 KB
-
011 Race Conditions (OBJ 2.3)_en.srt
14.1 KB
-
008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt
14.1 KB
-
004 External Audits and Assessments (OBJ 5.5)_en.srt
14.0 KB
-
005 Execution and Escalation Attack (OBJ 2.4)_en.srt
14.0 KB
-
006 Web and DNS Filtering (OBJ 4.5)_en.srt
14.0 KB
-
009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt
13.9 KB
-
005 Availability (OBJ 1.2)_en.srt
13.8 KB
-
004 Automating Support Tickets (OBJ 4.7)_en.srt
13.8 KB
-
010 Assigning Permissions (OBJ 4.6)_en.srt
13.8 KB
-
009 Attestation of Findings (OBJ 5.5)_en.srt
13.5 KB
-
007 Nation-state Actor (OBJ 2.1)_en.srt
13.5 KB
-
009 Single Pane of Glass (OBJ 4.4)_en.srt
13.4 KB
-
007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt
13.3 KB
-
009 SELinux (OBJ 2.5 & 4.5)_en.srt
13.2 KB
-
009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt
13.1 KB
-
004 Integrity (OBJ 1.2)_en.srt
13.0 KB
-
005 IDS and IPS (OBJ 3.2)_en.srt
13.0 KB
-
002 Identifying Vulnerabilities (OBJ 4.3)_en.srt
12.8 KB
-
003 Confidentiality (OBJ 1.2)_en.srt
12.8 KB
-
001 Alerting and Monitoring (OBJ 4.4)_en.srt
12.8 KB
-
003 Attacking with Brute Force (OBJ 2.4)_en.srt
12.7 KB
-
011 IPSIDS Logs (OBJ 4.9)_en.srt
12.6 KB
-
005 Network Access Control (NAC) (OBJ 4.5)_en.srt
12.5 KB
-
007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt
12.4 KB
-
002 Threats and Vulnerabilities_en.srt
12.4 KB
-
013 Indications of Malware Attacks (OBJ 2.4)_en.srt
12.4 KB
-
005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt
12.3 KB
-
007 Governance Considerations (OBJ 5.1)_en.srt
12.2 KB
-
006 Data from Security Tools (OBJ 4.4)_en.srt
12.2 KB
-
010 Blockchain (OBJ 1.4)_en.srt
12.1 KB
-
007 Firewall Logs (OBJ 4.9)_en.srt
12.1 KB
-
009 User Behavior Analytics (OBJ 4.5)_en.srt
12.1 KB
-
011 Encryption Tools (OBJ 1.4)_en.srt
12.1 KB
-
008 Rootkits (OBJ 2.4)_en.srt
12.0 KB
-
011 Security Control Types (OBJ 1.1)_en.srt
12.0 KB
-
003 Symmetric Algorithms (OBJ 1.4)_en.srt
12.0 KB
-
010 Keylogger (OBJ 2.4)_en.srt
11.9 KB
-
006 Penetration Testing (OBJ 5.5)_en.srt
11.9 KB
-
012 Gap Analysis (OBJ 1.1)_en.srt
11.8 KB
-
008 Frauds and Scams (OBJ 2.2)_en.srt
11.8 KB
-
008 Insider Threats (OBJ 2.1)_en.srt
11.8 KB
-
007 Creating a Culture of Security (OBJ 5.6)_en.srt
11.7 KB
-
006 Contracts and Agreements (OBJ 5.3)_en.srt
11.6 KB
-
005 Trusted Operating Systems (OBJ 2.5)_en.srt
11.6 KB
-
004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
11.6 KB
-
006 Updates and Patches (OBJ 2.5)_en.srt
11.5 KB
-
007 Risk Management Strategies (OBJ 5.2)_en.srt
11.4 KB
-
004 Vendor Assessment (OBJ 5.3)_en.srt
11.4 KB
-
007 Session Hijacking (OBJ 2.4)_en.srt
11.4 KB
-
007 Zombies and Botnets (OBJ 2.4)_en.srt
11.4 KB
-
011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt
11.4 KB
-
008 Technical Implications of Changes (OBJ 1.3)_en.srt
11.4 KB
-
011 Spyware and Bloatware (OBJ 2.4)_en.srt
11.3 KB
-
006 Non-repudiation (OBJ 1.2)_en.srt
11.3 KB
-
007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt
11.2 KB
-
012 Malware Attack Techniques (OBJ 2.4)_en.srt
11.2 KB
-
012 Network Logs (OBJ 4.9)_en.srt
11.0 KB
-
003 Cloud Security (OBJ 3.1 & 4.1)_en.srt
11.0 KB
-
002 Changing Default Configurations (OBJ 2.5)_en.srt
11.0 KB
-
002 Monitoring Resources (OBJ 4.4)_en.srt
10.9 KB
-
006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt
10.9 KB
-
010 Security Control Categories (OBJ 1.1)_en.srt
10.8 KB
-
009 Influence Campaigns (OBJ 2.2)_en.srt
10.8 KB
-
004 Unnecessary Services (OBJ 2.5)_en.srt
10.8 KB
-
006 Organized Crime (OBJ 2.1)_en.srt
8.5 KB
-
2
81 bytes
-
001 Malware (OBJ 2.4).mp4
186.2 MB
-
001 CompTIA-Security-SY0-701-Study-Guide.pdf
1.4 MB
-
003 Risk Identification (OBJ 5.2)_en.srt
10.8 KB
-
001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt
10.8 KB
-
001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt
10.7 KB
-
009 Documenting Changes (OBJ 1.3)_en.srt
10.7 KB
-
010 Data Encryption Levels (2.5)_en.srt
10.5 KB
-
007 Federation (OBJ 4.6)_en.srt
10.5 KB
-
005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt
10.4 KB
-
013 Metadata (OBJ 4.9)_en.srt
10.4 KB
-
005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt
10.4 KB
-
004 Pretexting (OBJ 2.2)_en.srt
10.3 KB
-
008 Compliance (OBJ 5.4)_en.srt
10.2 KB
-
003 Data Ownership (OBJ 4.2 & 5.1)_en.srt
10.1 KB
-
009 Shadow IT (OBJ 2.1)_en.srt
10.0 KB
-
001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt
9.8 KB
-
006 Automating Security (OBJ 4.7)_en.srt
9.8 KB
-
002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt
9.7 KB
-
002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt
9.7 KB
-
003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt
9.6 KB
-
013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt
9.5 KB
-
004 Data States (OBJ 3.3)_en.srt
9.5 KB
-
001 Audits and Assessments (OBJ 5.5)_en.srt
9.4 KB
-
011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt
9.2 KB
-
005 Performing an External Assessment (OBJ 5.5)_en.srt
9.2 KB
-
003 Dashboards (OBJ 4.9)_en.srt
9.2 KB
-
004 Policies (OBJ 5.1)_en.srt
9.1 KB
-
001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt
9.1 KB
-
001 Risk Management (OBJ 5.2)_en.srt
9.0 KB
-
003 Threat Actor Attributes (OBJ 2.1)_en.srt
9.0 KB
-
001 Security Awareness (OBJ 5.6)_en.srt
9.0 KB
-
006 Procedures (OBJ 5.1)_en.srt
9.0 KB
-
001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt
8.9 KB
-
009 Accounting (OBJ 1.2)_en.srt
8.9 KB
-
003 Performing an Internal Assessment (OBJ 5.5)_en.srt
8.8 KB
-
002 Governance (OBJ 5.1)_en.srt
8.7 KB
-
001 Security Architecture (OBJ 3.1 & 4.1)_en.srt
8.7 KB
-
3
1.4 KB
-
008 Securing Network Communications (OBJ 3.2).mp4
183.4 MB
-
009 Injection Attacks_en.srt
8.7 KB
-
004 Trojans (OBJ 2.4)_en.srt
8.6 KB
-
001 Social Engineering (OBJ 2.2 & 5.6)_en.srt
8.6 KB
-
001 Physical Security (OBJ 1.2 & 2.4)_en.srt
8.6 KB
-
001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt
8.5 KB
-
006 Quantitative Risk Analysis (OBJ 5.2)_en.srt
8.4 KB
-
009 Endpoint Logs (OBJ 4.9)_en.srt
8.3 KB
-
010 OS-specific Security Logs (OBJ 4.9)_en.srt
8.3 KB
-
005 Data Types (OBJ 3.3 & 1.4)_en.srt
8.2 KB
-
008 Application Logs (OBJ 4.9)_en.srt
8.0 KB
-
005 Standards (OBJ 5.1)_en.srt
8.0 KB
-
005 Hacktivists (OBJ 2.1)_en.srt
8.0 KB
-
008 Authorization (OBJ 1.2)_en.srt
7.9 KB
-
009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt
7.8 KB
-
008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt
7.8 KB
-
008 On-Path Attacks_en.srt
7.8 KB
-
001 Investigating an Incident (OBJ 4.9)_en.srt
7.7 KB
-
002 BONUS Where do I go from here_en.srt
7.7 KB
-
010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt
7.6 KB
-
012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt
7.5 KB
-
006 Microservices (OBJ 3.1)_en.srt
7.5 KB
-
003 Worms (OBJ 2.4)_en.srt
7.4 KB
-
001 Malicious Activity (OBJ 2.4)_en.srt
7.4 KB
-
001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt
7.3 KB
-
001 Security Techniques (OBJ 4.1 & 4.5)_en.srt
7.3 KB
-
004 Configuring a RAID (OBJ 3.4)_en.srt
7.3 KB
-
008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt
7.2 KB
-
001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt
7.2 KB
-
007 Securing Data (OBJ 3.3)_en.srt
7.1 KB
-
009 Non-compliance Consequences (OBJ 5.4)_en.srt
6.9 KB
-
001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt
6.9 KB
-
005 Serverless (OBJ 3.1)_en.srt
6.8 KB
-
009 Exploring Digital Certificates (OBJ 1.4)_en.srt
6.7 KB
-
005 Qualitative Risk Analysis (OBJ 5.2)_en.srt
6.7 KB
-
001 Vulnerability Management (OBJ 4.3)_en.srt
6.6 KB
-
008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt
6.5 KB
-
003 Governance Structures (OBJ 5.1)_en.srt
6.5 KB
-
002 Risk Assessment Frequency (OBJ 5.2)_en.srt
6.5 KB
-
004 Unskilled Attackers (OBJ 2.1)_en.srt
6.3 KB
-
007 Network Infrastructure (OBJ 3.1)_en.srt
6.2 KB
-
001 Incident Response (OBJ 4.8)_en.srt
6.0 KB
-
006 Data Sovereignty (OBJ 3.3)_en.srt
5.5 KB
-
006 Replay Attacks (OBJ 2.4)_en.srt
5.5 KB
-
008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt
5.4 KB
-
4
325.8 KB
-
006 Conducting Vulnerability Scans (OBJ 4.3).mp4
163.0 MB
-
5
1006.4 KB
-
002 Exam Tips.mp4
157.6 MB
-
6
372.5 KB
-
008 Performing a Basic PenTest (OBJ 5.5).mp4
154.0 MB
-
7
2.0 MB
-
001 Automation and Orchestration (OBJ 4.7).mp4
140.8 MB
-
8
1.2 MB
-
001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4
139.5 MB
-
9
535.5 KB
-
007 Door Locks (OBJ 1.2).mp4
135.2 MB
-
10
830.4 KB
-
006 Digital Forensic Procedures (OBJ 4.8).mp4
134.1 MB
-
11
1.9 MB
-
009 XSS and XSRF (OBJ 2.3 & 2.4).mp4
132.3 MB
-
12
1.7 MB
-
004 Password Security (OBJ 4.6).mp4
123.3 MB
-
13
721.2 KB
-
002 Motivational Triggers (OBJ 5.6).mp4
120.3 MB
-
14
1.7 MB
-
001 Alerting and Monitoring (OBJ 4.4).mp4
119.8 MB
-
15
204.4 KB
-
010 Selecting Secure Protocols (OBJ 4.5).mp4
115.7 MB
-
16
320.8 KB
-
003 Multifactor Authentication (OBJ 4.6).mp4
110.8 MB
-
17
1.2 MB
-
009 Redundant Site Considerations (OBJ 3.4).mp4
108.9 MB
-
18
1.1 MB
-
008 Digital Certificates (OBJ 1.4).mp4
108.4 MB
-
19
1.6 MB
-
003 Alerting and Monitoring Activities (OBJ 4.4).mp4
105.9 MB
-
20
145.3 KB
-
004 Configuring Firewalls (OBJ 4.5).mp4
105.7 MB
-
21
357.1 KB
-
001 Governance and Compliance (OBJ 5.1 & 5.4).mp4
104.6 MB
-
22
1.4 MB
-
001 Audits and Assessments (OBJ 5.5).mp4
103.2 MB
-
23
865.7 KB
-
002 On-premise versus the Cloud (OBJ 3.1).mp4
102.3 MB
-
24
1.7 MB
-
008 Integrations and APIs (OBJ 4.7).mp4
102.3 MB
-
25
1.7 MB
-
008 Disk Imaging and Analysis (OBJ 4.8).mp4
101.8 MB
-
26
165.7 KB
-
013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4
101.5 MB
-
27
494.8 KB
-
001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4
101.4 MB
-
28
657.4 KB
-
001 Risk Management (OBJ 5.2).mp4
100.8 MB
-
29
1.2 MB
-
007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4
100.6 MB
-
30
1.4 MB
-
002 Investigating with Data (OBJ 4.9).mp4
100.5 MB
-
31
1.5 MB
-
010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4
100.1 MB
-
32
1.9 MB
-
001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4
97.9 MB
-
33
59.6 KB
-
006 Ransomware (OBJ 2.4).mp4
97.2 MB
-
34
831.4 KB
-
003 Wireless Security Settings (OBJ 4.1).mp4
97.1 MB
-
35
925.8 KB
-
010 Infrastructure Considerations (OBJ 3.2).mp4
96.4 MB
-
36
1.6 MB
-
007 Patch Management (OBJ 2.5).mp4
94.3 MB
-
37
1.7 MB
-
002 Incident Response Process (OBJ 4.8).mp4
93.5 MB
-
38
528.1 KB
-
007 Port Security (OBJ 3.2).mp4
91.5 MB
-
39
549.8 KB
-
001 Security Infrastructure (OBJ 3.2 & 4.5).mp4
90.7 MB
-
40
1.3 MB
-
001 Social Engineering (OBJ 2.2 & 5.6).mp4
90.0 MB
-
41
2.0 MB
-
007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4
89.5 MB
-
42
462.4 KB
-
006 Network Appliances (OBJ 3.2).mp4
88.9 MB
-
43
1.1 MB
-
005 Hashing (OBJ 1.4).mp4
88.5 MB
-
44
1.5 MB
-
001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4
87.5 MB
-
45
526.1 KB
-
005 Viruses and Trojans (OBJ 2.4).mp4
87.0 MB
-
46
989.0 KB
-
005 Capacity Planning (OBJ 3.4).mp4
86.8 MB
-
47
1.2 MB
-
001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4
86.6 MB
-
48
1.4 MB
-
001 Security Architecture (OBJ 3.1 & 4.1).mp4
86.5 MB
-
49
1.5 MB
-
007 Nation-state Actor (OBJ 2.1).mp4
85.8 MB
-
50
205.1 KB
-
006 Packet Captures (OBJ 4.9).mp4
85.5 MB
-
51
540.2 KB
-
004 Application Security (OBJ 4.1).mp4
83.8 MB
-
52
236.0 KB
-
002 Ports and Protocols (OBJ 4.5).mp4
83.7 MB
-
53
280.8 KB
-
002 Wireless Infrastructure Security (OBJ 4.1).mp4
83.6 MB
-
54
409.8 KB
-
005 Analyzing Vulnerabilities (OBJ 4.3).mp4
82.7 MB
-
55
1.3 MB
-
001 Security Techniques (OBJ 4.1 & 4.5).mp4
82.4 MB
-
56
1.6 MB
-
004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4
82.0 MB
-
57
2.0 MB
-
006 Powering Data Centers (OBJ 3.4).mp4
81.3 MB
-
58
682.3 KB
-
012 Obfuscation (OBJ 1.4).mp4
80.7 MB
-
59
1.3 MB
-
001 Security Awareness (OBJ 5.6).mp4
79.8 MB
-
60
169.2 KB
-
003 Password Management (OBJ 5.6).mp4
79.8 MB
-
61
197.3 KB
-
011 Outsmarting Threat Actors (OBJ 1.2).mp4
79.6 MB
-
62
431.8 KB
-
002 Recognizing Insider Threats (OBJ 5.6).mp4
79.5 MB
-
63
532.0 KB
-
002 When to Automate and Orchestrate (OBJ 4.7).mp4
79.5 MB
-
64
534.4 KB
-
001 Physical Security (OBJ 1.2 & 2.4).mp4
79.0 MB
-
65
1.0 MB
-
010 Vulnerability Reporting (OBJ 4.3).mp4
78.8 MB
-
66
1.2 MB
-
005 Vulnerability Scans (OBJ 4.9).mp4
78.5 MB
-
67
1.5 MB
-
009 Configuring a DLP (OBJ 4.5).mp4
78.5 MB
-
68
1.5 MB
-
010 Other Social Engineering Attacks (OBJ 2.2).mp4
78.4 MB
-
69
1.6 MB
-
005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4
78.2 MB
-
70
1.8 MB
-
008 Insider Threats (OBJ 2.1).mp4
77.0 MB
-
71
1008.9 KB
-
003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4
76.7 MB
-
72
1.3 MB
-
008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4
76.5 MB
-
73
1.5 MB
-
009 Access Control Models (OBJ 4.6).mp4
76.2 MB
-
74
1.8 MB
-
008 Continuity of Operations Plan (OBJ 3.4).mp4
76.0 MB
-
75
2.0 MB
-
007 Automating Application Development (OBJ 4.7).mp4
75.5 MB
-
76
519.4 KB
-
003 Firewalls (OBJ 3.2).mp4
75.1 MB
-
77
890.6 KB
-
005 Phishing Attacks (OBJ 2.2).mp4
75.1 MB
-
78
932.3 KB
-
001 Malicious Activity (OBJ 2.4).mp4
74.1 MB
-
79
1.9 MB
-
002 Symmetric vs Asymmetric (OBJ 1.4).mp4
73.9 MB
-
80
132.0 KB
-
004 Avoiding Social Engineering (OBJ 5.6).mp4
73.8 MB
-
81
163.8 KB
-
006 Single Sign-On (SSO) (OBJ 4.6).mp4
73.3 MB
-
82
749.7 KB
-
004 Pretexting (OBJ 2.2).mp4
72.9 MB
-
83
1.1 MB
-
008 Access Badge Cloning (OBJ 2.4).mp4
72.5 MB
-
84
1.5 MB
-
005 Policy and Handbooks (OBJ 5.6).mp4
72.5 MB
-
85
1.5 MB
-
001 Investigating an Incident (OBJ 4.9).mp4
72.1 MB
-
86
1.9 MB
-
009 Attestation of Findings (OBJ 5.5).mp4
70.7 MB
-
87
1.3 MB
-
013 Indications of Malware Attacks (OBJ 2.4).mp4
70.5 MB
-
88
1.5 MB
-
001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4
70.5 MB
-
89
1.5 MB
-
006 Change Management (OBJ 1.3).mp4
70.5 MB
-
90
1.5 MB
-
003 Restricting Applications (OBJ 2.5).mp4
70.0 MB
-
91
2.0 MB
-
001 Cyber Resilience and Redundancy (OBJ 3.4).mp4
69.9 MB
-
92
65.6 KB
-
013 Zero Trust (OBJ 1.2).mp4
68.6 MB
-
93
1.4 MB
-
001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4
67.1 MB
-
94
882.1 KB
-
006 Preventing Phishing Attacks (OBJ 5.6).mp4
66.7 MB
-
95
1.3 MB
-
007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4
66.5 MB
-
96
1.5 MB
-
006 Access Control Vestibules (OBJ 1.2).mp4
66.4 MB
-
97
1.6 MB
-
009 Shadow IT (OBJ 2.1).mp4
66.4 MB
-
98
1.6 MB
-
010 Resilience and Recovery Testing (OBJ 3.4).mp4
66.1 MB
-
99
1.9 MB
-
001 Incident Response (OBJ 4.8).mp4
65.6 MB
-
100
379.1 KB
-
009 SD-WAN and SASE (OBJ 3.2).mp4
65.5 MB
-
101
463.4 KB
-
005 Asset Disposal and Decommissioning (OBJ 4.2).mp4
65.4 MB
-
102
599.4 KB
-
004 Root Cause Analysis (OBJ 4.8).mp4
65.2 MB
-
103
801.8 KB
-
007 Data Backups (OBJ 3.4).mp4
65.1 MB
-
104
956.0 KB
-
002 Distributed Denial of Service (OBJ 2.4).mp4
64.9 MB
-
105
1.1 MB
-
010 Assigning Permissions (OBJ 4.6).mp4
63.8 MB
-
106
214.8 KB
-
011 Selecting Infrastructure Controls (OBJ 3.2).mp4
63.2 MB
-
107
839.7 KB
-
002 Fencing and Bollards (OBJ 1.2).mp4
63.1 MB
-
108
883.5 KB
-
008 Frauds and Scams (OBJ 2.2).mp4
63.1 MB
-
109
955.6 KB
-
002 BONUS Where do I go from here.mp4
62.6 MB
-
110
1.4 MB
-
006 Web and DNS Filtering (OBJ 4.5).mp4
62.1 MB
-
111
1.9 MB
-
003 Impersonation (OBJ 2.2).mp4
62.0 MB
-
112
10.7 KB
-
004 Risk Register (OBJ 5.2).mp4
61.8 MB
-
113
181.4 KB
-
008 Endpoint Detection and Response (OBJ 4.5).mp4
61.5 MB
-
114
464.7 KB
-
001 Vulnerability Management (OBJ 4.3).mp4
61.3 MB
-
115
702.1 KB
-
005 Automating Onboarding (OBJ 4.7).mp4
61.1 MB
-
116
883.6 KB
-
006 Remote and Hybrid Work Environments (OBJ 5.6).mp4
61.0 MB
-
117
999.9 KB
-
003 Attacking with Brute Force (OBJ 2.4).mp4
60.8 MB
-
118
1.2 MB
-
002 High Availability (OBJ 3.4).mp4
60.8 MB
-
119
1.2 MB
-
007 Authentication (OBJ 1.2).mp4
60.5 MB
-
120
1.5 MB
-
009 User Behavior Analytics (OBJ 4.5).mp4
60.3 MB
-
121
1.7 MB
-
002 Viruses (OBJ 2.4).mp4
59.9 MB
-
122
130.6 KB
-
009 Backdoors and Logic Bombs (OBJ 2.4).mp4
59.8 MB
-
123
237.4 KB
-
003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4
59.7 MB
-
124
337.9 KB
-
002 Internal Audits and Assessments (OBJ 5.5).mp4
58.0 MB
-
125
2.0 MB
-
008 Vulnerability Response and Remediation (OBJ 4.3).mp4
57.8 MB
-
126
176.8 KB
-
011 Race Conditions (OBJ 2.3).mp4
57.7 MB
-
127
272.4 KB
-
004 Asset Management (OBJ 4.2).mp4
57.3 MB
-
128
729.3 KB
-
011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4
57.3 MB
-
129
746.9 KB
-
006 Increasing Hash Security (OBJ 1.4).mp4
57.2 MB
-
130
774.4 KB
-
006 Organized Crime (OBJ 2.1).mp4
57.1 MB
-
131
875.6 KB
-
002 Data Classifications (OBJ 3.3).mp4
56.7 MB
-
132
1.3 MB
-
005 Password Attacks (OBJ 2.4).mp4
56.5 MB
-
133
1.5 MB
-
002 Acquisition and Procurement (OBJ 4.2).mp4
56.5 MB
-
134
1.5 MB
-
010 Keylogger (OBJ 2.4).mp4
56.5 MB
-
135
1.5 MB
-
011 Secure Baselines (OBJ 2.5 and 4.1).mp4
56.3 MB
-
136
1.7 MB
-
004 Unnecessary Services (OBJ 2.5).mp4
55.6 MB
-
137
375.8 KB
-
003 Threat Intelligence Feeds (OBJ 4.3).mp4
55.6 MB
-
138
406.0 KB
-
006 Non-repudiation (OBJ 1.2).mp4
54.8 MB
-
139
1.2 MB
-
006 Contracts and Agreements (OBJ 5.3).mp4
54.4 MB
-
140
1.6 MB
-
007 Email Security (OBJ 4.5).mp4
54.3 MB
-
141
1.7 MB
-
007 Data Collection Procedures (OBJ 4.8).mp4
54.2 MB
-
142
1.8 MB
-
004 Automating Support Tickets (OBJ 4.7).mp4
54.1 MB
-
143
1.9 MB
-
009 Non-compliance Consequences (OBJ 5.4).mp4
54.0 MB
-
144
2.0 MB
-
002 Threat Actor Motivations (OBJ 2.1).mp4
54.0 MB
-
145
21.9 KB
-
003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
53.4 MB
-
146
617.9 KB
-
007 Zombies and Botnets (OBJ 2.4).mp4
53.2 MB
-
147
840.6 KB
-
002 Threats and Vulnerabilities.mp4
52.6 MB
-
148
1.4 MB
-
005 Incident Response Training and Testing (OBJ 4.8).mp4
52.6 MB
-
149
1.4 MB
-
010 Indicators of Compromise (IoC).mp4
52.5 MB
-
150
1.5 MB
-
004 Integrity (OBJ 1.2).mp4
52.4 MB
-
151
1.6 MB
-
004 External Audits and Assessments (OBJ 5.5).mp4
52.3 MB
-
152
1.7 MB
-
004 Surveillance Systems (OBJ 1.2).mp4
52.3 MB
-
153
1.7 MB
-
005 Vendor Selection and Monitoring (OBJ 5.3).mp4
52.2 MB
-
154
1.8 MB
-
011 IPSIDS Logs (OBJ 4.9).mp4
52.0 MB
-
155
2.0 MB
-
005 Availability (OBJ 1.2).mp4
51.7 MB
-
156
286.6 KB
-
003 Threat Hunting (OBJ 4.8).mp4
51.6 MB
-
157
380.7 KB
-
007 Reconnaissance in Pentesting (OBJ 5.5).mp4
51.1 MB
-
158
878.6 KB
-
002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4
51.1 MB
-
159
905.8 KB
-
006 Penetration Testing (OBJ 5.5).mp4
50.9 MB
-
160
1.1 MB
-
004 Vendor Assessment (OBJ 5.3).mp4
50.8 MB
-
161
1.2 MB
-
008 NetFlow and Flow Analysis.mp4
49.0 MB
-
162
1023.3 KB
-
012 Gap Analysis (OBJ 1.1).mp4
48.7 MB
-
163
1.3 MB
-
009 Influence Campaigns (OBJ 2.2).mp4
48.5 MB
-
164
1.5 MB
-
006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4
48.5 MB
-
165
1.5 MB
-
004 Automated Reports (OBJ 4.9).mp4
48.5 MB
-
166
1.5 MB
-
003 Cloud Security (OBJ 3.1 & 4.1).mp4
48.3 MB
-
167
1.7 MB
-
005 Bypassing Surveillance Systems (OBJ 2.4).mp4
47.7 MB
-
168
342.2 KB
-
003 Data Ownership (OBJ 4.2 & 5.1).mp4
47.6 MB
-
169
440.9 KB
-
011 Encryption Tools (OBJ 1.4).mp4
47.5 MB
-
170
553.1 KB
-
006 Updates and Patches (OBJ 2.5).mp4
47.4 MB
-
171
582.4 KB
-
008 Data Loss Prevention (DLP) (OBJ 4.4).mp4
47.2 MB
-
172
772.1 KB
-
008 Compliance (OBJ 5.4).mp4
47.0 MB
-
173
986.1 KB
-
008 Rootkits (OBJ 2.4).mp4
46.9 MB
-
174
1.1 MB
-
007 Risk Management Strategies (OBJ 5.2).mp4
46.7 MB
-
175
1.3 MB
-
010 Security Control Categories (OBJ 1.1).mp4
46.7 MB
-
176
1.3 MB
-
002 Changing Default Configurations (OBJ 2.5).mp4
46.6 MB
-
177
1.4 MB
-
004 Responsible Disclosure Programs (OBJ 4.3).mp4
46.4 MB
-
178
1.6 MB
-
003 Mobile Asset Deployments (OBJ 4.1).mp4
46.3 MB
-
179
1.7 MB
-
002 Identity and Access Management (IAM) (OBJ 4.6).mp4
46.1 MB
-
180
1.9 MB
-
004 Directory Traversal Attack (OBJ 2.4).mp4
45.8 MB
-
181
237.0 KB
-
005 Trusted Operating Systems (OBJ 2.5).mp4
45.5 MB
-
182
499.5 KB
-
007 Governance Considerations (OBJ 5.1).mp4
45.3 MB
-
183
699.4 KB
-
004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
44.9 MB
-
184
1.1 MB
-
007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4
44.5 MB
-
185
1.5 MB
-
002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4
44.4 MB
-
186
1.6 MB
-
011 Security Control Types (OBJ 1.1).mp4
43.6 MB
-
187
422.3 KB
-
010 Buffer Overflow (OBJ 2.3 & 2.4).mp4
43.5 MB
-
188
509.9 KB
-
005 Network Access Control (NAC) (OBJ 4.5).mp4
43.4 MB
-
189
644.2 KB
-
002 Monitoring Resources (OBJ 4.4).mp4
43.3 MB
-
190
710.6 KB
-
003 Symmetric Algorithms (OBJ 1.4).mp4
43.3 MB
-
191
761.3 KB
-
005 Execution and Escalation Attack (OBJ 2.4).mp4
43.1 MB
-
192
907.8 KB
-
003 Data Redundancy (OBJ 3.4).mp4
42.9 MB
-
193
1.1 MB
-
003 Risk Identification (OBJ 5.2).mp4
42.7 MB
-
194
1.3 MB
-
003 Confidentiality (OBJ 1.2).mp4
42.4 MB
-
195
1.6 MB
-
013 Embedded Systems (OBJ 3.1 & 4.1).mp4
42.0 MB
-
196
9.8 KB
-
012 Malware Attack Techniques (OBJ 2.4).mp4
41.7 MB
-
197
313.1 KB
-
004 Asymmetric Algorithms (OBJ 1.4).mp4
41.5 MB
-
198
546.6 KB
-
009 Single Pane of Glass (OBJ 4.4).mp4
41.2 MB
-
199
841.9 KB
-
012 Network Logs (OBJ 4.9).mp4
40.7 MB
-
200
1.3 MB
-
006 Microservices (OBJ 3.1).mp4
40.3 MB
-
201
1.7 MB
-
007 Change Management Processes (OBJ 1.3).mp4
39.6 MB
-
202
432.1 KB
-
010 Blockchain (OBJ 1.4).mp4
39.4 MB
-
203
616.9 KB
-
007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4
39.4 MB
-
204
628.8 KB
-
011 Spyware and Bloatware (OBJ 2.4).mp4
39.3 MB
-
205
699.0 KB
-
002 Governance (OBJ 5.1).mp4
38.8 MB
-
206
1.2 MB
-
008 Group Policies (OBJ 2.5 & 4.5).mp4
38.6 MB
-
207
1.4 MB
-
007 Network Infrastructure (OBJ 3.1).mp4
38.5 MB
-
208
1.5 MB
-
005 Zero-day Vulnerabilities (OBJ 2.3).mp4
37.9 MB
-
209
91.9 KB
-
005 IDS and IPS (OBJ 3.2).mp4
37.2 MB
-
210
802.3 KB
-
002 Identifying Vulnerabilities (OBJ 4.3).mp4
37.1 MB
-
211
963.8 KB
-
005 Qualitative Risk Analysis (OBJ 5.2).mp4
36.9 MB
-
212
1.1 MB
-
005 Serverless (OBJ 3.1).mp4
36.8 MB
-
213
1.2 MB
-
003 Performing an Internal Assessment (OBJ 5.5).mp4
36.6 MB
-
214
1.4 MB
-
005 Data Types (OBJ 3.3 & 1.4).mp4
36.0 MB
-
215
2.0 MB
-
009 Documenting Changes (OBJ 1.3).mp4
35.8 MB
-
216
244.9 KB
-
007 Firewall Logs (OBJ 4.9).mp4
35.5 MB
-
217
562.9 KB
-
007 Federation (OBJ 4.6).mp4
35.2 MB
-
218
807.8 KB
-
009 SELinux (OBJ 2.5 & 4.5).mp4
35.0 MB
-
219
1016.4 KB
-
007 Creating a Culture of Security (OBJ 5.6).mp4
34.9 MB
-
220
1.1 MB
-
004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4
34.5 MB
-
221
1.5 MB
-
003 Dashboards (OBJ 4.9).mp4
34.4 MB
-
222
1.6 MB
-
009 Validating Vulnerability Remediation (OBJ 4.3).mp4
34.1 MB
-
223
1.9 MB
-
005 Performing an External Assessment (OBJ 5.5).mp4
34.1 MB
-
224
1.9 MB
-
009 Infrastructure as Code (IaC) (OBJ 3.1).mp4
34.0 MB
-
225
26.3 KB
-
003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4
33.8 MB
-
226
158.2 KB
-
005 Standards (OBJ 5.1).mp4
33.8 MB
-
227
199.7 KB
-
007 Session Hijacking (OBJ 2.4).mp4
33.8 MB
-
228
217.5 KB
-
010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4
33.8 MB
-
229
232.9 KB
-
006 Data from Security Tools (OBJ 4.4).mp4
33.5 MB
-
230
538.2 KB
-
003 Threat Actor Attributes (OBJ 2.1).mp4
33.0 MB
-
231
1.0 MB
-
008 Software-Defined Network (SDN) (OBJ 3.1).mp4
32.8 MB
-
232
1.2 MB
-
010 Data Encryption Levels (2.5).mp4
32.7 MB
-
233
1.3 MB
-
004 Data States (OBJ 3.3).mp4
32.6 MB
-
234
1.4 MB
-
012 ICS and SCADA (OBJ 3.1 & 4.1).mp4
32.5 MB
-
235
1.5 MB
-
006 Automating Security (OBJ 4.7).mp4
32.4 MB
-
236
1.6 MB
-
008 Technical Implications of Changes (OBJ 1.3).mp4
32.4 MB
-
237
1.6 MB
-
005 Hacktivists (OBJ 2.1).mp4
32.3 MB
-
238
1.7 MB
-
008 On-Path Attacks.mp4
31.9 MB
-
239
88.1 KB
-
004 Policies (OBJ 5.1).mp4
31.9 MB
-
240
101.1 KB
-
006 Procedures (OBJ 5.1).mp4
30.7 MB
-
241
1.3 MB
-
009 Accounting (OBJ 1.2).mp4
30.7 MB
-
242
1.3 MB
-
013 Metadata (OBJ 4.9).mp4
29.8 MB
-
243
174.8 KB
-
004 Trojans (OBJ 2.4).mp4
29.8 MB
-
244
241.3 KB
-
008 Risk Monitoring and Reporting (OBJ 5.2).mp4
28.8 MB
-
245
1.2 MB
-
009 Endpoint Logs (OBJ 4.9).mp4
28.6 MB
-
246
1.4 MB
-
008 Authorization (OBJ 1.2).mp4
28.6 MB
-
247
1.4 MB
-
006 Replay Attacks (OBJ 2.4).mp4
28.5 MB
-
248
1.5 MB
-
008 Application Logs (OBJ 4.9).mp4
27.5 MB
-
249
478.2 KB
-
003 Governance Structures (OBJ 5.1).mp4
27.0 MB
-
250
1.0 MB
-
003 Worms (OBJ 2.4).mp4
26.1 MB
-
251
1.9 MB
-
004 Unskilled Attackers (OBJ 2.1).mp4
25.9 MB
-
252
91.3 KB
-
010 OS-specific Security Logs (OBJ 4.9).mp4
25.7 MB
-
253
264.4 KB
-
004 Configuring a RAID (OBJ 3.4).mp4
25.6 MB
-
254
360.9 KB
-
009 Exploring Digital Certificates (OBJ 1.4).mp4
23.8 MB
-
255
221.1 KB
-
009 Injection Attacks.mp4
23.7 MB
-
256
325.5 KB
-
008 Privileged Access Management (PAM) (OBJ 4.6).mp4
23.7 MB
-
257
328.0 KB
-
007 Securing Data (OBJ 3.3).mp4
22.3 MB
-
258
1.7 MB
-
006 Data Sovereignty (OBJ 3.3).mp4
22.1 MB
-
259
1.9 MB
-
002 Risk Assessment Frequency (OBJ 5.2).mp4
21.3 MB
-
260
722.9 KB
-
006 Quantitative Risk Analysis (OBJ 5.2).mp4
21.2 MB
|
Discussion