[FreeCourseSite.com] Udemy - CompTIA Security+ Certification (SY0-501) The Total Course
大小
19.13 GB
文件数
256
Info Hash:
1A07238775D3968B14B793068DF7E0BBB92D4CA7
收录时间
2026-01-15 02:23:56
更新时间
2026-01-15 02:23:56
文件列表 (256)
1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.mp4
75.28 MB
1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.vtt
4.49 KB
1. Risk Management/1.1 CompTIA Security (SY0-501).pdf.pdf
540.61 KB
1. Risk Management/10. IT Security Governance.mp4
139.4 MB
1. Risk Management/10. IT Security Governance.vtt
10.33 KB
1. Risk Management/11. Security Policies.mp4
174.01 MB
1. Risk Management/11. Security Policies.vtt
10.46 KB
1. Risk Management/12. Frameworks.mp4
170.88 MB
1. Risk Management/12. Frameworks.vtt
10.9 KB
1. Risk Management/13. Quantitative Risk Calculations.mp4
94.82 MB
1. Risk Management/13. Quantitative Risk Calculations.vtt
9.77 KB
1. Risk Management/14. Business Impact Analysis.mp4
220.29 MB
1. Risk Management/14. Business Impact Analysis.vtt
14.71 KB
1. Risk Management/15. Organizing Data.mp4
217.68 MB
1. Risk Management/15. Organizing Data.vtt
12.07 KB
1. Risk Management/16. Security Training.mp4
122.68 MB
1. Risk Management/16. Security Training.vtt
11.81 KB
1. Risk Management/17. Third Party Agreements.mp4
103.64 MB
1. Risk Management/17. Third Party Agreements.vtt
9.77 KB
1. Risk Management/18. Risk Management Quiz.html
162 B
1. Risk Management/2. The CIA of Security.mp4
44.71 MB
1. Risk Management/2. The CIA of Security.vtt
4.17 KB
1. Risk Management/3. Threat Actors.mp4
142.12 MB
1. Risk Management/3. Threat Actors.vtt
8.52 KB
1. Risk Management/4. What is Risk.mp4
213.86 MB
1. Risk Management/4. What is Risk.vtt
12.66 KB
1. Risk Management/5. Managing Risk.mp4
255.51 MB
1. Risk Management/5. Managing Risk.vtt
15.2 KB
1. Risk Management/6. Using Guides for Risk Assessment.mp4
114.52 MB
1. Risk Management/6. Using Guides for Risk Assessment.vtt
8.1 KB
1. Risk Management/7. Security Controls.mp4
96.83 MB
1. Risk Management/7. Security Controls.vtt
9.19 KB
1. Risk Management/8. Interesting Security Controls.mp4
30.97 MB
1. Risk Management/8. Interesting Security Controls.vtt
3.98 KB
1. Risk Management/9. Defense in Depth.mp4
97.94 MB
1. Risk Management/9. Defense in Depth.vtt
6.19 KB
10. Dealing with Incidents/1. Incident Response.mp4
48.33 MB
10. Dealing with Incidents/1. Incident Response.vtt
7.56 KB
10. Dealing with Incidents/2. Digital Forensics.mp4
167.92 MB
10. Dealing with Incidents/2. Digital Forensics.vtt
13.98 KB
10. Dealing with Incidents/3. Contingency Planning.mp4
165.1 MB
10. Dealing with Incidents/3. Contingency Planning.vtt
13.32 KB
10. Dealing with Incidents/4. Backups.mp4
91.13 MB
10. Dealing with Incidents/4. Backups.vtt
9.65 KB
10. Dealing with Incidents/5. Dealing with Incidents Quiz.html
162 B
2. Cryptography/1. Cryptography Basics.mp4
260.18 MB
2. Cryptography/1. Cryptography Basics.vtt
20.89 KB
2. Cryptography/10. Steganography.mp4
78.6 MB
2. Cryptography/10. Steganography.vtt
6.94 KB
2. Cryptography/11. Certificates and Trust.mp4
278.64 MB
2. Cryptography/11. Certificates and Trust.vtt
17.67 KB
2. Cryptography/12. Public Key Infrastructure.mp4
320.2 MB
2. Cryptography/12. Public Key Infrastructure.vtt
27.37 KB
2. Cryptography/13. Cryptographic Attacks.mp4
416.57 MB
2. Cryptography/13. Cryptographic Attacks.vtt
30.1 KB
2. Cryptography/14. Cryptography Quiz.html
162 B
2. Cryptography/2. Cryptographic Methods.mp4
160.57 MB
2. Cryptography/2. Cryptographic Methods.vtt
8.46 KB
2. Cryptography/3. Symmetric Cryptosystems.mp4
193.39 MB
2. Cryptography/3. Symmetric Cryptosystems.vtt
14.28 KB
2. Cryptography/4. Symmetric Block Modes.mp4
114.29 MB
2. Cryptography/4. Symmetric Block Modes.vtt
9.36 KB
2. Cryptography/5. RSA Cryptosystems.mp4
193.89 MB
2. Cryptography/5. RSA Cryptosystems.vtt
12.27 KB
2. Cryptography/6. Diffie-Hellman.mp4
97.3 MB
2. Cryptography/6. Diffie-Hellman.vtt
7.59 KB
2. Cryptography/7. PGPGPG.mp4
188.43 MB
2. Cryptography/7. PGPGPG.vtt
11.44 KB
2. Cryptography/8. Hashing.mp4
106.5 MB
2. Cryptography/8. Hashing.vtt
8.54 KB
2. Cryptography/9. HMAC.mp4
65.56 MB
2. Cryptography/9. HMAC.vtt
4.25 KB
3. Identity and Access Management/1. Identification.mp4
260.88 MB
3. Identity and Access Management/1. Identification.vtt
16.44 KB
3. Identity and Access Management/10. Single Sign-On.mp4
172.05 MB
3. Identity and Access Management/10. Single Sign-On.vtt
12.96 KB
3. Identity and Access Management/11. Identity and Access Management Quiz.html
162 B
3. Identity and Access Management/2. Authorization Concepts.mp4
116.48 MB
3. Identity and Access Management/2. Authorization Concepts.vtt
7.18 KB
3. Identity and Access Management/3. Access Control List.mp4
67.61 MB
3. Identity and Access Management/3. Access Control List.vtt
7.7 KB
3. Identity and Access Management/4. Password Security.mp4
160.4 MB
3. Identity and Access Management/4. Password Security.vtt
11.77 KB
3. Identity and Access Management/5. Linux File Permissions.mp4
190.84 MB
3. Identity and Access Management/5. Linux File Permissions.vtt
18.08 KB
3. Identity and Access Management/6. Windows File Permissions.mp4
220.83 MB
3. Identity and Access Management/6. Windows File Permissions.vtt
16.83 KB
3. Identity and Access Management/7. User Account Management.mp4
143.25 MB
3. Identity and Access Management/7. User Account Management.vtt
8.3 KB
3. Identity and Access Management/8. AAA.mp4
170.76 MB
3. Identity and Access Management/8. AAA.vtt
10.24 KB
3. Identity and Access Management/9. Authentication Methods.mp4
206.27 MB
3. Identity and Access Management/9. Authentication Methods.vtt
12.32 KB
4. Tools of the Trade/1. OS Utilities, Part 1.mp4
247.71 MB
4. Tools of the Trade/1. OS Utilities, Part 1.vtt
17.95 KB
4. Tools of the Trade/2. OS Utilities, Part 2.mp4
210.61 MB
4. Tools of the Trade/2. OS Utilities, Part 2.vtt
17.1 KB
4. Tools of the Trade/3. Network Scanners.mp4
164.81 MB
4. Tools of the Trade/3. Network Scanners.vtt
13.64 KB
4. Tools of the Trade/4. Protocol Analyzers.mp4
185.27 MB
4. Tools of the Trade/4. Protocol Analyzers.vtt
12.96 KB
4. Tools of the Trade/5. SNMP.mp4
203.52 MB
4. Tools of the Trade/5. SNMP.vtt
18.68 KB
4. Tools of the Trade/6. Logs.mp4
125.73 MB
4. Tools of the Trade/6. Logs.vtt
13.83 KB
4. Tools of the Trade/7. Tools of the Trade Quiz.html
162 B
5. Securing Individual Systems/1. Denial of Service.mp4
116.12 MB
5. Securing Individual Systems/1. Denial of Service.vtt
10.8 KB
5. Securing Individual Systems/10. Data and System Security.mp4
76.6 MB
5. Securing Individual Systems/10. Data and System Security.vtt
5.24 KB
5. Securing Individual Systems/11. Disk Encryption.mp4
133.08 MB
5. Securing Individual Systems/11. Disk Encryption.vtt
7.83 KB
5. Securing Individual Systems/12. HardwareFirmware Security.mp4
189.84 MB
5. Securing Individual Systems/12. HardwareFirmware Security.vtt
11.37 KB
5. Securing Individual Systems/13. Secure OS Types.mp4
167.51 MB
5. Securing Individual Systems/13. Secure OS Types.vtt
9.3 KB
5. Securing Individual Systems/14. Securing Peripherals.mp4
241.79 MB
5. Securing Individual Systems/14. Securing Peripherals.vtt
13.96 KB
5. Securing Individual Systems/15. Malware.mp4
214.65 MB
5. Securing Individual Systems/15. Malware.vtt
12.16 KB
5. Securing Individual Systems/16. Analyzing Output.mp4
297.74 MB
5. Securing Individual Systems/16. Analyzing Output.vtt
19.05 KB
5. Securing Individual Systems/17. IDS and IPS.mp4
94.65 MB
5. Securing Individual Systems/17. IDS and IPS.vtt
5.11 KB
5. Securing Individual Systems/18. Automation Strategies.mp4
104.43 MB
5. Securing Individual Systems/18. Automation Strategies.vtt
6.04 KB
5. Securing Individual Systems/19. Data Destruction.mp4
103.84 MB
5. Securing Individual Systems/19. Data Destruction.vtt
5.6 KB
5. Securing Individual Systems/2. Host Threats.mp4
186.71 MB
5. Securing Individual Systems/2. Host Threats.vtt
10.51 KB
5. Securing Individual Systems/20. Securing Individual Systems Quiz.html
162 B
5. Securing Individual Systems/3. Man-in-the-Middle.mp4
410.13 MB
5. Securing Individual Systems/3. Man-in-the-Middle.vtt
27.21 KB
5. Securing Individual Systems/4. System Resiliency.mp4
191.02 MB
5. Securing Individual Systems/4. System Resiliency.vtt
13.98 KB
5. Securing Individual Systems/5. RAID.mp4
154.53 MB
5. Securing Individual Systems/5. RAID.vtt
14.06 KB
5. Securing Individual Systems/6. NAS and SAN.mp4
265.97 MB
5. Securing Individual Systems/6. NAS and SAN.vtt
18.44 KB
5. Securing Individual Systems/7. Physical Hardening.mp4
138.46 MB
5. Securing Individual Systems/7. Physical Hardening.vtt
8.96 KB
5. Securing Individual Systems/8. RFI, EMI and ESD.mp4
32.96 MB
5. Securing Individual Systems/8. RFI, EMI and ESD.vtt
3.53 KB
5. Securing Individual Systems/9. Host Hardening.mp4
334.6 MB
5. Securing Individual Systems/9. Host Hardening.vtt
20.83 KB
6. The Basic LAN/1. LAN Review.mp4
120.24 MB
6. The Basic LAN/1. LAN Review.vtt
9.68 KB
6. The Basic LAN/10. NIDSNIPS.mp4
115.04 MB
6. The Basic LAN/10. NIDSNIPS.vtt
6.96 KB
6. The Basic LAN/11. SIEM.mp4
139.42 MB
6. The Basic LAN/11. SIEM.vtt
9.17 KB
6. The Basic LAN/12. The Basic LAN Quiz.html
162 B
6. The Basic LAN/2. Network Topologies Review.mp4
62.19 MB
6. The Basic LAN/2. Network Topologies Review.vtt
5.76 KB
6. The Basic LAN/3. Network Zone Review.mp4
124.64 MB
6. The Basic LAN/3. Network Zone Review.vtt
12.42 KB
6. The Basic LAN/4. Network Access Controls.mp4
159.44 MB
6. The Basic LAN/4. Network Access Controls.vtt
12.48 KB
6. The Basic LAN/5. The Network Firewall.mp4
190.87 MB
6. The Basic LAN/5. The Network Firewall.vtt
15.83 KB
6. The Basic LAN/6. Proxy Servers.mp4
211.78 MB
6. The Basic LAN/6. Proxy Servers.vtt
14.97 KB
6. The Basic LAN/7. Honeypots.mp4
81.32 MB
6. The Basic LAN/7. Honeypots.vtt
5.23 KB
6. The Basic LAN/8. Virtual Private Networks.mp4
179.47 MB
6. The Basic LAN/8. Virtual Private Networks.vtt
16.63 KB
6. The Basic LAN/9. IPSec.mp4
210.05 MB
6. The Basic LAN/9. IPSec.vtt
13.9 KB
7. Beyond the Basic LAN/1. Wireless Review.mp4
172.7 MB
7. Beyond the Basic LAN/1. Wireless Review.vtt
10.81 KB
7. Beyond the Basic LAN/10. Virtual Security.mp4
254.76 MB
7. Beyond the Basic LAN/10. Virtual Security.vtt
18.95 KB
7. Beyond the Basic LAN/11. Containers.mp4
176.51 MB
7. Beyond the Basic LAN/11. Containers.vtt
14.03 KB
7. Beyond the Basic LAN/12. IaaS.mp4
149.17 MB
7. Beyond the Basic LAN/12. IaaS.vtt
11.55 KB
7. Beyond the Basic LAN/13. PaaS.mp4
133.49 MB
7. Beyond the Basic LAN/13. PaaS.vtt
10.19 KB
7. Beyond the Basic LAN/14. SaaS.mp4
54.06 MB
7. Beyond the Basic LAN/14. SaaS.vtt
3.05 KB
7. Beyond the Basic LAN/15. Deployment Models.mp4
141.38 MB
7. Beyond the Basic LAN/15. Deployment Models.vtt
10.55 KB
7. Beyond the Basic LAN/16. Static Hosts.mp4
141.81 MB
7. Beyond the Basic LAN/16. Static Hosts.vtt
9.62 KB
7. Beyond the Basic LAN/17. Mobile Connectivity.mp4
256.07 MB
7. Beyond the Basic LAN/17. Mobile Connectivity.vtt
13.89 KB
7. Beyond the Basic LAN/18. Deploying Mobile Devices.mp4
78.92 MB
7. Beyond the Basic LAN/18. Deploying Mobile Devices.vtt
6.3 KB
7. Beyond the Basic LAN/19. Mobile Enforcement.mp4
265.51 MB
7. Beyond the Basic LAN/19. Mobile Enforcement.vtt
15.5 KB
7. Beyond the Basic LAN/2. Living in Open Networks.mp4
175.38 MB
7. Beyond the Basic LAN/2. Living in Open Networks.vtt
11.82 KB
7. Beyond the Basic LAN/20. Mobile Device Management.mp4
125.04 MB
7. Beyond the Basic LAN/20. Mobile Device Management.vtt
12.49 KB
7. Beyond the Basic LAN/21. Physical Controls.mp4
176.1 MB
7. Beyond the Basic LAN/21. Physical Controls.vtt
10.49 KB
7. Beyond the Basic LAN/22. HVAC.mp4
135.35 MB
7. Beyond the Basic LAN/22. HVAC.vtt
8.79 KB
7. Beyond the Basic LAN/23. Fire Suppression.mp4
72.58 MB
7. Beyond the Basic LAN/23. Fire Suppression.vtt
4.86 KB
7. Beyond the Basic LAN/24. Beyond the Basic LAN Quiz.html
162 B
7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.mp4
135.76 MB
7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.vtt
8.55 KB
7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.mp4
217.01 MB
7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.vtt
12.56 KB
7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.mp4
185.74 MB
7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.vtt
9.44 KB
7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.mp4
196.32 MB
7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.vtt
11.71 KB
7. Beyond the Basic LAN/7. Wireless Hardening.mp4
272.51 MB
7. Beyond the Basic LAN/7. Wireless Hardening.vtt
17.18 KB
7. Beyond the Basic LAN/8. Wireless Access Points.mp4
277.12 MB
7. Beyond the Basic LAN/8. Wireless Access Points.vtt
15.71 KB
7. Beyond the Basic LAN/9. Virtualization Basics.mp4
139.29 MB
7. Beyond the Basic LAN/9. Virtualization Basics.vtt
9.22 KB
8. Secure Protocols/1. Secure Applications and Protocols.mp4
191.53 MB
8. Secure Protocols/1. Secure Applications and Protocols.vtt
13.19 KB
8. Secure Protocols/10. Code Quality and Testing.mp4
102.99 MB
8. Secure Protocols/10. Code Quality and Testing.vtt
6.23 KB
8. Secure Protocols/11. Secure Protocols Quiz.html
162 B
8. Secure Protocols/2. Network Models.mp4
147.98 MB
8. Secure Protocols/2. Network Models.vtt
8.98 KB
8. Secure Protocols/3. Know Your Protocols - TCPIP.mp4
131.84 MB
8. Secure Protocols/3. Know Your Protocols - TCPIP.vtt
7.08 KB
8. Secure Protocols/4. Know Your Protocols - Applications.mp4
48.84 MB
8. Secure Protocols/4. Know Your Protocols - Applications.vtt
6.3 KB
8. Secure Protocols/5. Transport Layer Security (TLS).mp4
195.77 MB
8. Secure Protocols/5. Transport Layer Security (TLS).vtt
15.7 KB
8. Secure Protocols/6. Internet Service Hardening.mp4
79.03 MB
8. Secure Protocols/6. Internet Service Hardening.vtt
7.65 KB
8. Secure Protocols/7. Protecting Your Servers.mp4
86.62 MB
8. Secure Protocols/7. Protecting Your Servers.vtt
7.38 KB
8. Secure Protocols/8. Secure Code Development.mp4
182.38 MB
8. Secure Protocols/8. Secure Code Development.vtt
12.93 KB
8. Secure Protocols/9. Secure Deployment Concepts.mp4
223.46 MB
8. Secure Protocols/9. Secure Deployment Concepts.vtt
14.29 KB
9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.mp4
159.58 MB
9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.vtt
11.54 KB
9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.mp4
100.52 MB
9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.vtt
5.78 KB
9. Testing Your Infrastructure/3. Social Engineering Principles.mp4
39.69 MB
9. Testing Your Infrastructure/3. Social Engineering Principles.vtt
2.36 KB
9. Testing Your Infrastructure/4. Social Engineering Attacks.mp4
131.62 MB
9. Testing Your Infrastructure/4. Social Engineering Attacks.vtt
9.28 KB
9. Testing Your Infrastructure/5. Attacking Web Sites.mp4
91.14 MB
9. Testing Your Infrastructure/5. Attacking Web Sites.vtt
9.78 KB
9. Testing Your Infrastructure/6. Attacking Applications.mp4
181.96 MB
9. Testing Your Infrastructure/6. Attacking Applications.vtt
12.9 KB
9. Testing Your Infrastructure/7. Exploiting a Target.mp4
168.36 MB
9. Testing Your Infrastructure/7. Exploiting a Target.vtt
13.08 KB
9. Testing Your Infrastructure/8. Vulnerability Impact.mp4
237.33 MB
9. Testing Your Infrastructure/8. Vulnerability Impact.vtt
13.25 KB
9. Testing Your Infrastructure/9. Testing Your Infrastructure Quiz.html
162 B
[CourseClub.NET].url
123 B
[FreeCourseSite.com].url
127 B