资源详情

返回首页 | 相关搜索
Pluralsight - CompTIA Security Plus SY0-401 Compliance And Operational Security
大小 786.22 MB
文件数 121
Info Hash: 3A94E7B7ACCE269FBB9D04D40A84AC0F6A74BE62
收录时间 2026-01-26 21:12:28
更新时间 2026-01-26 21:53:35
文件列表 (121)
01. Risk and Related Concepts/01_01-Module Overview.mp4
8.5 MB
01. Risk and Related Concepts/01_02-The Security Cycle.mp4
5.9 MB
01. Risk and Related Concepts/01_03-Control Types.mp4
19.83 MB
01. Risk and Related Concepts/01_04-Incident Response.mp4
11.78 MB
01. Risk and Related Concepts/01_05-False Positives, False Negatives, and Security Policies.mp4
21.53 MB
01. Risk and Related Concepts/01_06-Risk Calculation.mp4
19.56 MB
01. Risk and Related Concepts/01_07-MTTF, MTTR, and MTBF.mp4
7.27 MB
01. Risk and Related Concepts/01_08-Threat Vectors, Vulnerabilities, and Managing Risk.mp4
11.8 MB
01. Risk and Related Concepts/01_09-Risk Avoidance and Risks Associated With Cloud Computing.mp4
9.47 MB
01. Risk and Related Concepts/01_10-RPO and RTO.mp4
11.65 MB
02. Risks Associated With 3rd Party Integration/02_01-Course Overview and Onboarding Process.mp4
6.74 MB
02. Risks Associated With 3rd Party Integration/02_02-3rd Party Integration.mp4
4.26 MB
02. Risks Associated With 3rd Party Integration/02_03-OffBoarding Process.mp4
2.31 MB
02. Risks Associated With 3rd Party Integration/02_04-Social Media Networks and Applications.mp4
4.04 MB
02. Risks Associated With 3rd Party Integration/02_05-SLA.mp4
3.92 MB
02. Risks Associated With 3rd Party Integration/02_06-BPA.mp4
1.09 MB
02. Risks Associated With 3rd Party Integration/02_07-MOU and ISA.mp4
6.39 MB
02. Risks Associated With 3rd Party Integration/02_08-Privacy Considerations and Data Ownership.mp4
7.24 MB
02. Risks Associated With 3rd Party Integration/02_09-Data Backups.mp4
2.27 MB
02. Risks Associated With 3rd Party Integration/02_10-Security Policies and Procedures.mp4
3.4 MB
02. Risks Associated With 3rd Party Integration/02_11-Review Agreements and Verify Compliance.mp4
4.42 MB
03. Risk Mitigation Strategies/03_01-Module Overview.mp4
1.92 MB
03. Risk Mitigation Strategies/03_02-Change Management.mp4
18.4 MB
03. Risk Mitigation Strategies/03_03-Incident Management.mp4
4.87 MB
03. Risk Mitigation Strategies/03_04-User Rights and Permissions Review.mp4
6.72 MB
03. Risk Mitigation Strategies/03_05-Perform Routine Audits.mp4
2.14 MB
03. Risk Mitigation Strategies/03_06-Preventing Data Loss or Theft.mp4
3.43 MB
03. Risk Mitigation Strategies/03_07-Attack Vectors.mp4
2.77 MB
03. Risk Mitigation Strategies/03_08-Enforce Technology Controls.mp4
6.07 MB
03. Risk Mitigation Strategies/03_09-Module Review.mp4
1.42 MB
04. Implementing Basic Forensic Procedures/04_01-Module Overview.mp4
2.67 MB
04. Implementing Basic Forensic Procedures/04_02-What Is Computer Forensics.mp4
5.45 MB
04. Implementing Basic Forensic Procedures/04_03-Order of Volatility.mp4
11.85 MB
04. Implementing Basic Forensic Procedures/04_04-First Responder Best Practices.mp4
10.93 MB
04. Implementing Basic Forensic Procedures/04_05-Capture a System Image.mp4
9.13 MB
04. Implementing Basic Forensic Procedures/04_06-Network Traffic and Logs.mp4
9.62 MB
04. Implementing Basic Forensic Procedures/04_07-Capture Video.mp4
1.99 MB
04. Implementing Basic Forensic Procedures/04_08-Record Time Offset.mp4
6.01 MB
04. Implementing Basic Forensic Procedures/04_09-Take Hashes.mp4
12.97 MB
04. Implementing Basic Forensic Procedures/04_10-Screenshots.mp4
2.84 MB
04. Implementing Basic Forensic Procedures/04_11-Witnesses.mp4
4.5 MB
04. Implementing Basic Forensic Procedures/04_12-Track Man Hours and Expense.mp4
6.58 MB
04. Implementing Basic Forensic Procedures/04_13-Chain of Custody.mp4
7.47 MB
04. Implementing Basic Forensic Procedures/04_14-Big Data Analysis.mp4
8.25 MB
04. Implementing Basic Forensic Procedures/04_15-Module Review.mp4
2.57 MB
05. Incident Response Concepts/05_01-Module Overview.mp4
3.56 MB
05. Incident Response Concepts/05_02-Incident Preparation.mp4
17.36 MB
05. Incident Response Concepts/05_03-Incident Identification.mp4
4.26 MB
05. Incident Response Concepts/05_05-Incident Notification and Escalation.mp4
9.43 MB
05. Incident Response Concepts/05_06-Incident Mitigation and Isolation.mp4
7.67 MB
05. Incident Response Concepts/05_07-Lessons Learned.mp4
3.37 MB
05. Incident Response Concepts/05_08-Incident Reporting.mp4
7.41 MB
05. Incident Response Concepts/05_09-Recovery and Reconstitution Procedures.mp4
2.51 MB
05. Incident Response Concepts/05_10-First Responder.mp4
3.21 MB
05. Incident Response Concepts/05_11-Incident Isolation.mp4
7.34 MB
05. Incident Response Concepts/05_12-Data Breach.mp4
9.01 MB
05. Incident Response Concepts/05_13-Damage and Loss Control.mp4
5.02 MB
05. Incident Response Concepts/05_14-Module Review.mp4
1.76 MB
06. Security Related Awareness and Training/06_01-Module Overview.mp4
2.33 MB
06. Security Related Awareness and Training/06_02-Security Policy Training and Procedures.mp4
6.22 MB
06. Security Related Awareness and Training/06_03-Validate Compliance and Security Posture.mp4
2.08 MB
06. Security Related Awareness and Training/06_04-Role Based Training.mp4
2.54 MB
06. Security Related Awareness and Training/06_05-Personally Identifiable Information.mp4
3.16 MB
06. Security Related Awareness and Training/06_06-Information Classification.mp4
4.05 MB
06. Security Related Awareness and Training/06_07-Data Labeling, Handling, and Disposal.mp4
7.78 MB
06. Security Related Awareness and Training/06_08-Compliance.mp4
8.46 MB
06. Security Related Awareness and Training/06_09-User Habits.mp4
17.18 MB
06. Security Related Awareness and Training/06_10-New Threats, Security Trends, and Alerts.mp4
6.22 MB
06. Security Related Awareness and Training/06_11-Use of Social Networking and P2P.mp4
6.12 MB
06. Security Related Awareness and Training/06_12-Module Review.mp4
3.04 MB
07. Physical and Environmental Controls/07_01-Module Overview.mp4
2.62 MB
07. Physical and Environmental Controls/07_02-Environmental Factors.mp4
3.12 MB
07. Physical and Environmental Controls/07_03-HVAC.mp4
5.45 MB
07. Physical and Environmental Controls/07_04-Fire Suppression.mp4
8.37 MB
07. Physical and Environmental Controls/07_05-EMI Shielding.mp4
5.83 MB
07. Physical and Environmental Controls/07_06-Hot and Cold Aisles.mp4
6.74 MB
07. Physical and Environmental Controls/07_07-Environmental Monitoring.mp4
3.97 MB
07. Physical and Environmental Controls/07_08-Temperature and Humidity Controls.mp4
3.87 MB
07. Physical and Environmental Controls/07_09-Physical Security, Locks, Mantraps, and Video Surveillance.mp4
8.55 MB
07. Physical and Environmental Controls/07_10-Fencing.mp4
5.45 MB
07. Physical and Environmental Controls/07_11-Proximity Readers and Access Lists.mp4
5.97 MB
07. Physical and Environmental Controls/07_12-Proper Lighting and Signs.mp4
5.63 MB
07. Physical and Environmental Controls/07_13-Barricades.mp4
2.18 MB
07. Physical and Environmental Controls/07_14-Biometrics.mp4
1.98 MB
07. Physical and Environmental Controls/07_15-Protected Distribution Systems.mp4
10.88 MB
07. Physical and Environmental Controls/07_16-Alarms and Motion Detection.mp4
4.6 MB
07. Physical and Environmental Controls/07_17-Control Types.mp4
9.46 MB
08. Risk Management Best Practices/08_01-Module Overview.mp4
2.87 MB
08. Risk Management Best Practices/08_02-Business Continuity Concepts.mp4
5.27 MB
08. Risk Management Best Practices/08_03-Business Impact Analysis.mp4
7.31 MB
08. Risk Management Best Practices/08_04-Identification of Critical Systems and Components.mp4
3.17 MB
08. Risk Management Best Practices/08_05-Removing Single Points of Failure.mp4
3.59 MB
08. Risk Management Best Practices/08_06-Business Continuity Planning and Testing.mp4
6.79 MB
08. Risk Management Best Practices/08_07-Risk Assessment and Continuity of Operations.mp4
6.03 MB
08. Risk Management Best Practices/08_08-Disaster Recovery Planning.mp4
8.49 MB
08. Risk Management Best Practices/08_09-IT Contingency Planning.mp4
5.48 MB
08. Risk Management Best Practices/08_10-Succession Planning.mp4
2.92 MB
08. Risk Management Best Practices/08_11-High Availability.mp4
7.8 MB
08. Risk Management Best Practices/08_12-Redundancy.mp4
8.42 MB
08. Risk Management Best Practices/08_13-Tabletop Exercises.mp4
6.81 MB
08. Risk Management Best Practices/08_14-Fault Tolerance.mp4
4.18 MB
08. Risk Management Best Practices/08_15-RAID.mp4
11.29 MB
08. Risk Management Best Practices/08_16-Clustering.mp4
3.82 MB
08. Risk Management Best Practices/08_17-Load Balancing.mp4
3.61 MB
08. Risk Management Best Practices/08_18-Servers.mp4
1.66 MB
08. Risk Management Best Practices/08_19-Backup Plans, Execution, and Frequency.mp4
7.79 MB
08. Risk Management Best Practices/08_20-Hot, Warm, and Cold Sites.mp4
11.94 MB
09. Appropriate Controls to Meet Security Goals/09_01-Module Overview.mp4
4.31 MB
09. Appropriate Controls to Meet Security Goals/09_02-Encryption.mp4
6.74 MB
09. Appropriate Controls to Meet Security Goals/09_03-Access Controls.mp4
1.72 MB
09. Appropriate Controls to Meet Security Goals/09_04-Steganography.mp4
18.24 MB
09. Appropriate Controls to Meet Security Goals/09_05-Digital Signatures.mp4
5.51 MB
09. Appropriate Controls to Meet Security Goals/09_06-Certificates.mp4
7.35 MB
09. Appropriate Controls to Meet Security Goals/09_07-Availability, Redundancy, Fault Tolerance, and Patching.mp4
7.36 MB
09. Appropriate Controls to Meet Security Goals/09_08-Safety.mp4
3.9 MB
09. Appropriate Controls to Meet Security Goals/09_09-Lighting.mp4
2.33 MB
09. Appropriate Controls to Meet Security Goals/09_10-Locks.mp4
1.3 MB
09. Appropriate Controls to Meet Security Goals/09_11-CCTV.mp4
1.87 MB
09. Appropriate Controls to Meet Security Goals/09_12-Escape Plans, Escape Routes, and Drills.mp4
4.41 MB
09. Appropriate Controls to Meet Security Goals/09_13-Testing Controls.mp4
3.12 MB
Exercise Files/comptiasecurityplussy0401complianceoperationalsecurity.zip
29.13 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。