资源详情

返回首页 | 相关搜索
CompTIA Security+ (SY0-701) Complete Course & Exam
大小 7.91 GB
文件数 528
Info Hash: D4C7C2CAE5C70CD8CD24CBB0FBBECF57DCC0AC99
收录时间 2025-12-12 12:33:00
更新时间 2025-12-12 12:33:00
文件列表 (528)
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4
109.72 MB
01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf
1.43 MB
01 - Introduction/001 Download the Study Guide.html
222 B
01 - Introduction/001 Security-701-Study-Plan.pdf
132.41 KB
01 - Introduction/002 Exam Tips.mp4
52.51 MB
01 - Introduction/002 Exam Tips_en.srt
17.04 KB
02 - Fundamentals of Security/001 Fundamentals of Security.mp4
65.43 MB
02 - Fundamentals of Security/001 Fundamentals of Security_en.srt
19.58 KB
02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4
22.78 MB
02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt
12.4 KB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4
20.32 MB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt
12.83 KB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4
23.1 MB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt
13.01 KB
02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4
24.07 MB
02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt
13.84 KB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4
20.11 MB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt
11.25 KB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4
24.69 MB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt
15 KB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4
12.22 MB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt
7.88 KB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4
15.8 MB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt
8.88 KB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4
23.6 MB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt
10.82 KB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4
22.39 MB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt
12.04 KB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4
23.91 MB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt
11.82 KB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4
34.04 MB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt
16.63 KB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4
29.99 MB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt
9.11 KB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4
29.79 MB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt
16.01 KB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4
17.68 MB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt
8.97 KB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4
13.38 MB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt
6.33 KB
03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4
15.81 MB
03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt
8.01 KB
03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4
22.62 MB
03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt
8.5 KB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4
35.07 MB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt
13.5 KB
03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4
32 MB
03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt
11.78 KB
03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4
25.46 MB
03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt
9.98 KB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4
42.87 MB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt
17.76 KB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4
38.92 MB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt
19.86 KB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4
26.4 MB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt
8.6 KB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4
29.27 MB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt
14.29 KB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4
24.38 MB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt
12.67 KB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4
26.71 MB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt
16.07 KB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4
18.25 MB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt
10.36 KB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4
28.13 MB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt
17.73 KB
04 - Physical Security/007 Door Locks (OBJ 1.2).mp4
63.04 MB
04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt
29.99 KB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4
42.84 MB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt
19.11 KB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4
30.14 MB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt
8.62 KB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4
56.27 MB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt
22.18 KB
05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4
34.37 MB
05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt
15.01 KB
05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4
30.79 MB
05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt
10.27 KB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4
33.7 MB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt
16.4 KB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4
32.63 MB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt
17.32 KB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4
23.95 MB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt
11.22 KB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4
26.09 MB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt
11.81 KB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4
21.66 MB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt
10.82 KB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4
37.42 MB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt
19.13 KB
06 - Malware/001 Malware (OBJ 2.4).mp4
62.83 MB
06 - Malware/001 Malware (OBJ 2.4)_en.srt
19.28 KB
06 - Malware/002 Viruses (OBJ 2.4).mp4
31.7 MB
06 - Malware/002 Viruses (OBJ 2.4)_en.srt
17.42 KB
06 - Malware/003 Worms (OBJ 2.4).mp4
16.45 MB
06 - Malware/003 Worms (OBJ 2.4)_en.srt
7.44 KB
06 - Malware/004 Trojans (OBJ 2.4).mp4
18.53 MB
06 - Malware/004 Trojans (OBJ 2.4)_en.srt
8.62 KB
06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4
38.64 MB
06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt
16.52 KB
06 - Malware/006 Ransomware (OBJ 2.4).mp4
39.5 MB
06 - Malware/006 Ransomware (OBJ 2.4)_en.srt
18.23 KB
06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4
25.55 MB
06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt
11.4 KB
06 - Malware/008 Rootkits (OBJ 2.4).mp4
23.71 MB
06 - Malware/008 Rootkits (OBJ 2.4)_en.srt
12.04 KB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4
29.4 MB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt
13.13 KB
06 - Malware/010 Keylogger (OBJ 2.4).mp4
24.53 MB
06 - Malware/010 Keylogger (OBJ 2.4)_en.srt
11.89 KB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4
20.14 MB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt
11.32 KB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4
20.04 MB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt
11.21 KB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4
25.63 MB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt
12.4 KB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4
23.38 MB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt
7.15 KB
07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4
29.86 MB
07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt
15.68 KB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4
20.65 MB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt
10.11 KB
07 - Data Protection/004 Data States (OBJ 3.3).mp4
18.5 MB
07 - Data Protection/004 Data States (OBJ 3.3)_en.srt
9.45 KB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4
17.73 MB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt
8.24 KB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4
12.17 MB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt
5.53 KB
07 - Data Protection/007 Securing Data (OBJ 3.3).mp4
13.81 MB
07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt
7.07 KB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4
20 MB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt
7.81 KB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4
61.49 MB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt
36.66 KB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4
86 MB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt
26.12 KB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4
33.28 MB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt
17.75 KB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4
25.07 MB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt
12.02 KB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4
26.67 MB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt
16.03 KB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4
51.4 MB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt
20.64 KB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4
29.96 MB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt
17.54 KB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4
22.83 MB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt
12.42 KB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4
54.45 MB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt
29.31 KB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4
15.3 MB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt
6.74 KB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4
21.7 MB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt
12.14 KB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4
25.38 MB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt
12.09 KB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4
38.37 MB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt
19.48 KB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4
59.72 MB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt
33.61 KB
09 - Risk Management/001 Risk Management (OBJ 5.2).mp4
33.89 MB
09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt
8.99 KB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4
13.17 MB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt
6.51 KB
09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4
23.42 MB
09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt
10.8 KB
09 - Risk Management/004 Risk Register (OBJ 5.2).mp4
29.59 MB
09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt
14.46 KB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4
16.33 MB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt
6.74 KB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4
16.5 MB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt
8.42 KB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4
20.84 MB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt
11.45 KB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4
13.79 MB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt
7.24 KB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4
21.97 MB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt
6.88 KB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4
19.16 MB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt
9.73 KB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4
33.89 MB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt
14.28 KB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4
24.44 MB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt
11.43 KB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4
21.46 MB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt
12.3 KB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4
24.11 MB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt
11.65 KB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4
34.96 MB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt
10.76 KB
11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4
20.3 MB
11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt
8.73 KB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4
15.81 MB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt
6.51 KB
11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4
19.38 MB
11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt
9.14 KB
11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4
19.89 MB
11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt
8.02 KB
11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4
19.39 MB
11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt
8.96 KB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4
27.83 MB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt
12.17 KB
11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4
23.87 MB
11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt
10.24 KB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4
22.01 MB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt
6.95 KB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4
33.46 MB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt
10.7 KB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4
23.56 MB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt
15.29 KB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4
23.11 MB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt
14.4 KB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4
26.98 MB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt
15.07 KB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4
35.27 MB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt
20.4 KB
12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4
30.2 MB
12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt
16.5 KB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4
22.29 MB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt
14.75 KB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4
19.35 MB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt
11.35 KB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4
17.56 MB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt
10.69 KB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4
34.87 MB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt
9.41 KB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4
29.2 MB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt
15.02 KB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4
20.61 MB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt
8.78 KB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4
26.7 MB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt
14 KB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4
24.07 MB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt
9.23 KB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4
25.03 MB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt
11.87 KB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4
26.85 MB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt
13.27 KB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4
88.43 MB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt
37.52 KB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4
30.01 MB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt
13.51 KB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4
22.92 MB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt
7.32 KB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4
34.03 MB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt
20.1 KB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4
28.14 MB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt
19.48 KB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4
15.96 MB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt
7.26 KB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4
33.26 MB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt
19.03 KB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4
42.44 MB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt
24.37 KB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4
39.47 MB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt
24.83 KB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4
37.38 MB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt
22.28 KB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4
52.84 MB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt
28.88 KB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4
29.98 MB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt
15.76 KB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4
29 MB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt
8.73 KB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4
43.49 MB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt
19.39 KB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4
24.58 MB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt
10.98 KB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4
41.5 MB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt
19.38 KB
15 - Security Architecture/005 Serverless (OBJ 3.1).mp4
15.84 MB
15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt
6.83 KB
15 - Security Architecture/006 Microservices (OBJ 3.1).mp4
19.17 MB
15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt
7.45 KB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4
17.66 MB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt
6.19 KB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4
16.04 MB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt
5.37 KB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4
16.24 MB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt
7.83 KB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4
18.06 MB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt
7.58 KB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4
25.55 MB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt
9.24 KB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4
17.62 MB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt
7.54 KB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4
22.63 MB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt
9.5 KB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4
31.62 MB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt
9.78 KB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4
47.63 MB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt
32.67 KB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4
42.29 MB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt
28.75 KB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4
57.91 MB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt
28.15 KB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4
22.8 MB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt
13.01 KB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4
42.36 MB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt
22.07 KB
16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4
47.16 MB
16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt
23.19 KB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4
83.51 MB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt
44.39 KB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4
30.31 MB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt
16.45 KB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4
47.3 MB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt
24.89 KB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4
34.67 MB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt
19.45 KB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4
32.52 MB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt
8.46 KB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4
21.11 MB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt
9.71 KB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4
55.53 MB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt
29.85 KB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4
59.57 MB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt
31.56 KB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4
34.85 MB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt
19.91 KB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4
40.09 MB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt
18.97 KB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4
21.59 MB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt
10.49 KB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4
13.06 MB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt
6.52 KB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4
34.68 MB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt
18.44 KB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4
28.7 MB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt
13.79 KB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4
47.41 MB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt
14.35 KB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4
27.16 MB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt
14.62 KB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
27.43 MB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
15.62 KB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
20.65 MB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
11.55 KB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4
19.27 MB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt
10.37 KB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4
22.25 MB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt
10.92 KB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4
53.66 MB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt
29.51 KB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4
46.22 MB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt
14.83 KB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4
63.16 MB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt
35.2 KB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4
23.71 MB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt
14.71 KB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4
30.3 MB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt
14.12 KB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4
24.44 MB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt
7.35 KB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4
31.56 MB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt
17.45 KB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4
19.3 MB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt
9.62 KB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4
25.88 MB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt
15.73 KB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4
26.04 MB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt
14 KB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4
11.18 MB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt
5.48 KB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4
18.55 MB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt
11.42 KB
19 - Malicious Activity/008 On-Path Attacks.mp4
16.78 MB
19 - Malicious Activity/008 On-Path Attacks_en.srt
7.75 KB
19 - Malicious Activity/009 Injection Attacks.mp4
15.03 MB
19 - Malicious Activity/009 Injection Attacks_en.srt
8.68 KB
19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4
24.85 MB
19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt
14.45 KB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4
27.59 MB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt
8.93 KB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4
22.27 MB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt
10.97 KB
20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4
30.69 MB
20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt
16.68 KB
20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4
30.49 MB
20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt
10.81 KB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4
21.74 MB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt
11.56 KB
20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4
19.95 MB
20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt
11.54 KB
20 - Hardening/007 Patch Management (OBJ 2.5).mp4
38.05 MB
20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt
20.11 KB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4
27.55 MB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt
20.42 KB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4
22.07 MB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt
13.18 KB
20 - Hardening/010 Data Encryption Levels (2.5).mp4
18.02 MB
20 - Hardening/010 Data Encryption Levels (2.5)_en.srt
10.53 KB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4
24.19 MB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt
11.39 KB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4
26.88 MB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt
7.27 KB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4
37.7 MB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt
17.85 KB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4
57.18 MB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt
27.11 KB
21 - Security Techniques/004 Application Security (OBJ 4.1).mp4
48.78 MB
21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt
24.88 KB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4
25.39 MB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt
12.46 KB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4
29.44 MB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt
13.97 KB
21 - Security Techniques/007 Email Security (OBJ 4.5).mp4
29.61 MB
21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt
14.37 KB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4
30.76 MB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt
14.65 KB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4
26 MB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt
12.1 KB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4
57.51 MB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt
27.67 KB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4
20.47 MB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt
6.64 KB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4
21.66 MB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt
12.83 KB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4
28.66 MB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt
16.9 KB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4
23.56 MB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt
14.38 KB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4
43.23 MB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt
25.49 KB
01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf
186.6 KB
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt
71.07 KB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4
58.09 MB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt
27.65 KB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4
26.41 MB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt
14.09 KB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4
20.24 MB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt
13.86 KB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4
36.19 MB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt
22.77 KB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4
40.5 MB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt
12.82 KB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4
19.42 MB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt
10.93 KB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4
48.34 MB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt
28.19 KB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4
23.41 MB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt
14.44 KB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4
41.27 MB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt
26.13 KB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4
19.58 MB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt
12.15 KB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4
41.96 MB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt
21.64 KB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4
30.75 MB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt
15.65 KB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4
22.12 MB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt
13.42 KB
24 - Incident Response/001 Incident Response (OBJ 4.8).mp4
22.44 MB
24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt
5.97 KB
24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4
40.49 MB
24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt
23.08 KB
24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4
25.42 MB
24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt
15.28 KB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4
29.31 MB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt
16.03 KB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4
28.05 MB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt
19.51 KB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4
61.04 MB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt
27.02 KB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4
30.08 MB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt
19.04 KB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4
43.67 MB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt
17.23 KB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4
23.6 MB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt
7.72 KB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4
51.77 MB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt
27.87 KB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4
19.69 MB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt
9.21 KB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4
31.3 MB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt
15.1 KB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4
53.82 MB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt
25.09 KB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4
53 MB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt
19.24 KB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4
27.04 MB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt
12.14 KB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4
20.76 MB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt
8.04 KB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4
22.15 MB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt
8.27 KB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4
15.39 MB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt
8.26 KB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4
31.46 MB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt
12.65 KB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4
30.96 MB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt
11.04 KB
25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4
19.8 MB
25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt
10.37 KB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4
47.46 MB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt
14.38 KB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4
36.41 MB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt
20.59 KB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4
27.65 MB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt
16.14 KB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4
26.2 MB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt
13.8 KB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4
28.37 MB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt
15.14 KB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4
19.76 MB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt
9.76 KB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4
35.28 MB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt
19.19 KB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4
48.56 MB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt
26.6 KB
27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4
27.31 MB
27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt
8.97 KB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4
32.2 MB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt
17.65 KB
27 - Security Awareness/003 Password Management (OBJ 5.6).mp4
41.62 MB
27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt
22.47 KB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4
35.93 MB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt
18.54 KB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4
32.36 MB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt
17.52 KB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4
27.98 MB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt
16.75 KB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4
19.42 MB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt
11.75 KB
28 - Conclusion/001 Conclusion.mp4
89.25 MB
28 - Conclusion/001 Conclusion_en.srt
30.04 KB
28 - Conclusion/002 BONUS Where do I go from here.mp4
26.69 MB
28 - Conclusion/002 BONUS Where do I go from here_en.srt
7.69 KB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。