资源详情

返回首页 | 相关搜索
CompTIA Security+ SY0-701
大小 6.17 GB
文件数 364
Info Hash: B729BF7730447021ECF6971196EA41A51C8DFBCC
收录时间 2026-01-20 08:58:24
更新时间 2026-01-20 08:58:24
文件列表 (364)
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/002. 12.1 Data Types.mp4
85.82 MB
Introduction/001. CompTIA Security+ SY0-701 Introduction.mp4
51.16 MB
Module 1 General Security Concepts/001. Module introduction en.srt
2.01 KB
Module 1 General Security Concepts/001. Module introduction.mp4
8.5 MB
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/001. Learning objectives en.srt
718 B
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/001. Learning objectives.mp4
2.88 MB
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/002. 1.1 Control Objectives en.srt
32.13 KB
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/002. 1.1 Control Objectives.mp4
71.05 MB
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/003. 1.2 Control Categories and Classifications en.srt
19.66 KB
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/003. 1.2 Control Categories and Classifications.mp4
44.48 MB
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/004. 1.3 Deep Dive Quiz en.srt
13.6 KB
Module 1 General Security Concepts/Lesson 1 Compare and Contrast Various Types of Security Controls/004. 1.3 Deep Dive Quiz.mp4
29.93 MB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/001. Learning objectives en.srt
754 B
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/001. Learning objectives.mp4
3.23 MB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/002. 2.1 Security and Privacy Principles en.srt
18.28 KB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/002. 2.1 Security and Privacy Principles.mp4
42.88 MB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/003. 2.2 Zero Trust en.srt
22.63 KB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/003. 2.2 Zero Trust.mp4
51.37 MB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/004. 2.3 Physical Security en.srt
28.06 KB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/004. 2.3 Physical Security.mp4
64.42 MB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/005. 2.4 Environmental Impact en.srt
21.48 KB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/005. 2.4 Environmental Impact.mp4
48.09 MB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/006. 2.5 Deception and Disruption en.srt
14.67 KB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/006. 2.5 Deception and Disruption.mp4
36.34 MB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/007. 2.6 Deep Dive Quiz en.srt
27.65 KB
Module 1 General Security Concepts/Lesson 2 Summarize Fundamental Security Concepts/007. 2.6 Deep Dive Quiz.mp4
58.05 MB
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/001. Learning objectives en.srt
667 B
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/001. Learning objectives.mp4
2.73 MB
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/002. 3.1 Configuration Management en.srt
19.83 KB
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/002. 3.1 Configuration Management.mp4
46.3 MB
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/003. 3.2 Change Management en.srt
20.44 KB
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/003. 3.2 Change Management.mp4
49.84 MB
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/004. 3.3 Deep Dive Quiz en.srt
15.31 KB
Module 1 General Security Concepts/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/004. 3.3 Deep Dive Quiz.mp4
31.49 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/001. Learning objectives en.srt
1.28 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/001. Learning objectives.mp4
5.53 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/002. 4.1 Cryptography Primer en.srt
24.9 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/002. 4.1 Cryptography Primer.mp4
60.87 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/003. 4.2 Encryption en.srt
33.05 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/003. 4.2 Encryption.mp4
80.54 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/004. 4.3 Hashing and Digital Signatures en.srt
25.38 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/004. 4.3 Hashing and Digital Signatures.mp4
57.92 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/005. 4.4 Digital Certificates en.srt
19.48 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/005. 4.4 Digital Certificates.mp4
44.47 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/006. 4.5 Emerging Cryptography en.srt
12.27 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/006. 4.5 Emerging Cryptography.mp4
30.86 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/007. 4.6 Steganography en.srt
10.28 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/007. 4.6 Steganography.mp4
25.59 MB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/008. 4.7 Deep Dive Quiz en.srt
23.93 KB
Module 1 General Security Concepts/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/008. 4.7 Deep Dive Quiz.mp4
48.73 MB
Module 1 General Security Concepts/Module 1 Closer Look Labs/001. Honeypots en.srt
5.61 KB
Module 1 General Security Concepts/Module 1 Closer Look Labs/001. Honeypots.mp4
17.24 MB
Module 1 General Security Concepts/Module 1 Closer Look Labs/002. Hashing and HMACS en.srt
7.29 KB
Module 1 General Security Concepts/Module 1 Closer Look Labs/002. Hashing and HMACS.mp4
10.12 MB
Module 1 General Security Concepts/Module 1 Closer Look Labs/003. Digital Certificates en.srt
9.1 KB
Module 1 General Security Concepts/Module 1 Closer Look Labs/003. Digital Certificates.mp4
23.91 MB
Module 2 Threats, Vulnerabilities and Mitigations/001. Module introduction en.srt
2.35 KB
Module 2 Threats, Vulnerabilities and Mitigations/001. Module introduction.mp4
9.37 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/001. Learning objectives en.srt
671 B
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/001. Learning objectives.mp4
2.89 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/002. 5.1 Threat Actors and Attributes en.srt
25.5 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/002. 5.1 Threat Actors and Attributes.mp4
56.54 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/003. 5.2 Threat Modeling and Intelligence en.srt
15.9 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/003. 5.2 Threat Modeling and Intelligence.mp4
37.95 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/004. 5.3 Deep Dive Quiz en.srt
10.84 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/004. 5.3 Deep Dive Quiz.mp4
21.85 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/001. Learning objectives en.srt
722 B
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/001. Learning objectives.mp4
3.17 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/002. 6.1 Operational Threat Vectors en.srt
23.3 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/002. 6.1 Operational Threat Vectors.mp4
51.1 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/003. 6.2 Third-Party and Supply Chain Threat Vectors en.srt
24.56 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/003. 6.2 Third-Party and Supply Chain Threat Vectors.mp4
56.31 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/004. 6.3 Social Engineering en.srt
35.38 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/004. 6.3 Social Engineering.mp4
81.46 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/005. 6.4 Deep Dive Quiz en.srt
14.65 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/005. 6.4 Deep Dive Quiz.mp4
27.98 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/001. Learning objectives en.srt
644 B
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/001. Learning objectives.mp4
2.81 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/002. 7.1 Vulnerability Primer en.srt
16.27 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/002. 7.1 Vulnerability Primer.mp4
35.03 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/003. 7.2 Network, OS, and Cloud Vulnerabilities en.srt
16.56 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/003. 7.2 Network, OS, and Cloud Vulnerabilities.mp4
36.73 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/004. 7.3 Deep Dive Quiz en.srt
15.06 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 7 Explain Various Types of Vulnerabilities/004. 7.3 Deep Dive Quiz.mp4
31.01 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/001. Learning objectives en.srt
802 B
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/001. Learning objectives.mp4
3.62 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/002. 8.1 Indicators of Malicious Activity en.srt
13.32 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/002. 8.1 Indicators of Malicious Activity.mp4
29.34 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/003. 8.2 Malware Attacks en.srt
21.66 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/003. 8.2 Malware Attacks.mp4
47.29 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/004. 8.3 Brute Force Attacks en.srt
16.35 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/004. 8.3 Brute Force Attacks.mp4
35.17 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/005. 8.4 Digital Infrastructure Attacks en.srt
19.31 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/005. 8.4 Digital Infrastructure Attacks.mp4
46.08 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/006. 8.5 Application Attacks en.srt
20.19 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/006. 8.5 Application Attacks.mp4
43.51 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/007. 8.6 Wireless Attacks en.srt
16.69 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/007. 8.6 Wireless Attacks.mp4
37.79 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/008. 8.7 Cryptographic Attacks en.srt
24.1 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/008. 8.7 Cryptographic Attacks.mp4
56.11 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/009. 8.8 Deep Dive Quiz en.srt
22.84 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/009. 8.8 Deep Dive Quiz.mp4
48.09 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/001. Learning objectives en.srt
1.26 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/001. Learning objectives.mp4
4.99 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/002. 9.1 Secure Design Principles en.srt
19.98 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/002. 9.1 Secure Design Principles.mp4
50.06 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/003. 9.2 Segmentation en.srt
17.85 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/003. 9.2 Segmentation.mp4
43.49 MB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/004. 9.3 Deep Dive Quiz en.srt
15.1 KB
Module 2 Threats, Vulnerabilities and Mitigations/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/004. 9.3 Deep Dive Quiz.mp4
29.87 MB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/001. Phone and Text Spoofing en.srt
4.41 KB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/001. Phone and Text Spoofing.mp4
8.15 MB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/002. Malware Analysis en.srt
9.56 KB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/002. Malware Analysis.mp4
17.01 MB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/003. Constructing Error Messages en.srt
8.78 KB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/003. Constructing Error Messages.mp4
13.3 MB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/004. Threat Intelligence Workflow en.srt
4.48 KB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/004. Threat Intelligence Workflow.mp4
9.36 MB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/005. Zero-day Vulnerabilities en.srt
6.54 KB
Module 2 Threats, Vulnerabilities and Mitigations/Module 2 Closer Look Labs/005. Zero-day Vulnerabilities.mp4
10.83 MB
Module 3 Security Architecture/001. Module introduction en.srt
1.64 KB
Module 3 Security Architecture/001. Module introduction.mp4
7.04 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/001. Learning objectives en.srt
843 B
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/001. Learning objectives.mp4
3.7 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/002. 10.1 Computing Architecture Models en.srt
17.92 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/002. 10.1 Computing Architecture Models.mp4
42.24 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/003. 10.2 Cloud Services en.srt
33.82 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/003. 10.2 Cloud Services.mp4
70.43 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/004. 10.3 Cloud Infrastructure en.srt
20.12 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/004. 10.3 Cloud Infrastructure.mp4
49.91 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/005. 10.4 Data Center Solution Elements en.srt
20.3 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/005. 10.4 Data Center Solution Elements.mp4
50.19 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/006. 10.5 Virtualization en.srt
18.07 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/006. 10.5 Virtualization.mp4
43.41 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/007. 10.6 Embedded Systems en.srt
21.13 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/007. 10.6 Embedded Systems.mp4
53.94 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/008. 10.7 Internet of Things (IoT) en.srt
16.47 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/008. 10.7 Internet of Things (IoT).mp4
41.23 MB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/009. 10.8 Deep Dive Quiz en.srt
25.27 KB
Module 3 Security Architecture/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/009. 10.8 Deep Dive Quiz.mp4
54.68 MB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/001. Learning objectives en.srt
776 B
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/001. Learning objectives.mp4
3.7 MB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/002. 11.1 Network Devices en.srt
17.71 KB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/002. 11.1 Network Devices.mp4
39.58 MB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/003. 11.2 Network Access Control en.srt
26.56 KB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/003. 11.2 Network Access Control.mp4
64.93 MB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/004. 11.3 Firewalls en.srt
29.08 KB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/004. 11.3 Firewalls.mp4
68.72 MB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/005. 11.4 Secure Communications en.srt
22.09 KB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/005. 11.4 Secure Communications.mp4
55.67 MB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/006. 11.5 Deep Dive Quiz en.srt
15.09 KB
Module 3 Security Architecture/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/006. 11.5 Deep Dive Quiz.mp4
31.99 MB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/001. Learning objectives en.srt
645 B
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/001. Learning objectives.mp4
2.71 MB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/002. 12.1 Data Types en.srt
33.95 KB
Introduction/001. CompTIA Security+ SY0-701 Introduction en.srt
10.7 KB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/003. 12.2 Data Classification en.srt
20.16 KB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/003. 12.2 Data Classification.mp4
49.47 MB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/004. 12.3 Data Protection en.srt
19.36 KB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/004. 12.3 Data Protection.mp4
46.02 MB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/005. 12.4 Deep Dive Quiz en.srt
12.41 KB
Module 3 Security Architecture/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/005. 12.4 Deep Dive Quiz.mp4
25 MB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/001. Learning objectives en.srt
963 B
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/001. Learning objectives.mp4
4.29 MB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/002. 13.1 Backup and Recovery en.srt
20.75 KB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/002. 13.1 Backup and Recovery.mp4
47.58 MB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/003. 13.2 Resiliency Concepts en.srt
26.72 KB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/003. 13.2 Resiliency Concepts.mp4
63.64 MB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/004. 13.3 Continuity of Operations en.srt
21.9 KB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/004. 13.3 Continuity of Operations.mp4
48.68 MB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/005. 13.4 Deep Dive Quiz en.srt
14.22 KB
Module 3 Security Architecture/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/005. 13.4 Deep Dive Quiz.mp4
28.6 MB
Module 3 Security Architecture/Module 3 Closer Look Labs/001. RAID en.srt
5.58 KB
Module 3 Security Architecture/Module 3 Closer Look Labs/001. RAID.mp4
11.29 MB
Module 3 Security Architecture/Module 3 Closer Look Labs/002. SSL and TLS Packet Capture en.srt
10.39 KB
Module 3 Security Architecture/Module 3 Closer Look Labs/002. SSL and TLS Packet Capture.mp4
33.55 MB
Module 3 Security Architecture/Module 3 Closer Look Labs/003. Cloud Controls en.srt
7.34 KB
Module 3 Security Architecture/Module 3 Closer Look Labs/003. Cloud Controls.mp4
16.7 MB
Module 4 Security Operations/001. Module introduction en.srt
2.38 KB
Module 4 Security Operations/001. Module introduction.mp4
10.27 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/001. Learning objectives en.srt
989 B
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/001. Learning objectives.mp4
4.09 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/002. 14.1 Secure Baselines and Hardening Targets en.srt
20.97 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/002. 14.1 Secure Baselines and Hardening Targets.mp4
45.11 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/003. 14.2 Wireless Configuration en.srt
19.82 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/003. 14.2 Wireless Configuration.mp4
49.48 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/004. 14.3 Wireless Design en.srt
23.25 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/004. 14.3 Wireless Design.mp4
56.13 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/005. 14.4 Mobile Connectivity en.srt
17.21 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/005. 14.4 Mobile Connectivity.mp4
47.61 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/006. 14.5 Mobile Device Management en.srt
19.58 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/006. 14.5 Mobile Device Management.mp4
45.73 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/007. 14.6 Application Security en.srt
22.64 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/007. 14.6 Application Security.mp4
56.74 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/008. 14.7 Secure Coding en.srt
14.01 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/008. 14.7 Secure Coding.mp4
32.03 MB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/009. 14.8 Deep Dive Quiz en.srt
17.85 KB
Module 4 Security Operations/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/009. 14.8 Deep Dive Quiz.mp4
41.27 MB
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/001. Learning objectives en.srt
808 B
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/001. Learning objectives.mp4
3.45 MB
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/002. 15.1 Asset Management en.srt
18.43 KB
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/002. 15.1 Asset Management.mp4
43.31 MB
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/003. 15.2 Deletion, Disposal, and Destruction en.srt
21.72 KB
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/003. 15.2 Deletion, Disposal, and Destruction.mp4
51.54 MB
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/004. 15.3 Deep Dive Quiz en.srt
15.68 KB
Module 4 Security Operations/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/004. 15.3 Deep Dive Quiz.mp4
36.89 MB
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/001. Learning objectives en.srt
652 B
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/001. Learning objectives.mp4
2.97 MB
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/002. 16.1 Vulnerability Identification en.srt
20.94 KB
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/002. 16.1 Vulnerability Identification.mp4
54.17 MB
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/003. 16.2 Vulnerability Response and Remediation en.srt
27.67 KB
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/003. 16.2 Vulnerability Response and Remediation.mp4
70.05 MB
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/004. 16.3 Deep Dive Quiz en.srt
12.75 KB
Module 4 Security Operations/Lesson 16 Explain Various Activities Associated with Vulnerability Management/004. 16.3 Deep Dive Quiz.mp4
27.43 MB
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/001. Learning objectives en.srt
917 B
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/001. Learning objectives.mp4
3.96 MB
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/002. 17.1 Logging and Analysis en.srt
26.92 KB
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/002. 17.1 Logging and Analysis.mp4
64.84 MB
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/003. 17.2 SNMP, NetFlow, and SCAP en.srt
17.71 KB
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/003. 17.2 SNMP, NetFlow, and SCAP.mp4
46 MB
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/004. 17.3 Deep Dive Quiz en.srt
13.04 KB
Module 4 Security Operations/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/004. 17.3 Deep Dive Quiz.mp4
26.04 MB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/001. Learning objectives en.srt
698 B
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/001. Learning objectives.mp4
3.39 MB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/002. 18.1 Enhancing Security with Network Devices en.srt
19.17 KB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/002. 18.1 Enhancing Security with Network Devices.mp4
50.33 MB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/003. 18.2 TCPIP and Secure Protocols en.srt
31.58 KB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/003. 18.2 TCPIP and Secure Protocols.mp4
75.33 MB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/004. 18.3 Email Security en.srt
16.45 KB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/004. 18.3 Email Security.mp4
41.81 MB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/005. 18.4 Group Policy and SELinux en.srt
13.05 KB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/005. 18.4 Group Policy and SELinux.mp4
33.85 MB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/006. 18.5 Deep Dive Quiz en.srt
22.35 KB
Module 4 Security Operations/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/006. 18.5 Deep Dive Quiz.mp4
49.5 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/001. Learning objectives en.srt
820 B
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/001. Learning objectives.mp4
3.63 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/002. 19.1 Identity and Access Management (IAM) en.srt
26.85 KB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/002. 19.1 Identity and Access Management (IAM).mp4
65.8 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/003. 19.2 Federated Identity en.srt
20.56 KB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/003. 19.2 Federated Identity.mp4
47.49 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/004. 19.3 Authentication en.srt
24.33 KB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/004. 19.3 Authentication.mp4
57.31 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/005. 19.4 Biometrics en.srt
16.04 KB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/005. 19.4 Biometrics.mp4
39.52 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/006. 19.5 Access Control and Authorization en.srt
27.55 KB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/006. 19.5 Access Control and Authorization.mp4
68.47 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/007. 19.6 Privileged Access Management en.srt
16.97 KB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/007. 19.6 Privileged Access Management.mp4
42.91 MB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/008. 19.7 Deep Dive Quiz en.srt
26.25 KB
Module 4 Security Operations/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/008. 19.7 Deep Dive Quiz.mp4
51.47 MB
Module 4 Security Operations/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/001. Learning objectives en.srt
739 B
Module 4 Security Operations/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/001. Learning objectives.mp4
2.92 MB
Module 4 Security Operations/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/002. 20.1 Scripting, Automation, and Orchestration en.srt
21.01 KB
Module 4 Security Operations/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/002. 20.1 Scripting, Automation, and Orchestration.mp4
53.33 MB
Module 4 Security Operations/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/003. 20.2 Deep Dive Quiz en.srt
10.45 KB
Module 4 Security Operations/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/003. 20.2 Deep Dive Quiz.mp4
19.96 MB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/001. Learning objectives en.srt
1.06 KB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/001. Learning objectives.mp4
4.36 MB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/002. 21.1 Incident Management en.srt
21.27 KB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/002. 21.1 Incident Management.mp4
50.97 MB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/003. 21.2 Incident Response en.srt
19.59 KB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/003. 21.2 Incident Response.mp4
47.4 MB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/004. 21.3 Evidence Handling en.srt
23.32 KB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/004. 21.3 Evidence Handling.mp4
58.92 MB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/005. 21.4 Forensic Examination en.srt
21.17 KB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/005. 21.4 Forensic Examination.mp4
50.02 MB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/006. 21.5 Disclosure and Notification en.srt
19.14 KB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/006. 21.5 Disclosure and Notification.mp4
50.07 MB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/007. 21.6 Deep Dive Quiz en.srt
23.73 KB
Module 4 Security Operations/Lesson 21 Explain Appropriate Incident Response Activities/007. 21.6 Deep Dive Quiz.mp4
47.21 MB
Module 4 Security Operations/Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/001. Learning objectives en.srt
1.23 KB
Module 4 Security Operations/Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/001. Learning objectives.mp4
5.31 MB
Module 4 Security Operations/Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/002. 22.1 Data Sources en.srt
19.86 KB
Module 4 Security Operations/Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/002. 22.1 Data Sources.mp4
51.64 MB
Module 4 Security Operations/Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/003. 22.2 Deep Dive Quiz en.srt
8.86 KB
Module 4 Security Operations/Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/003. 22.2 Deep Dive Quiz.mp4
18.19 MB
Module 4 Security Operations/Module 4 Closer Look Labs/001. PowerShell en.srt
9.12 KB
Module 4 Security Operations/Module 4 Closer Look Labs/001. PowerShell.mp4
27.89 MB
Module 4 Security Operations/Module 4 Closer Look Labs/002. Pwned Passwords en.srt
8.86 KB
Module 4 Security Operations/Module 4 Closer Look Labs/002. Pwned Passwords.mp4
25.56 MB
Module 4 Security Operations/Module 4 Closer Look Labs/003. IPv6 Addressing en.srt
12.91 KB
Module 4 Security Operations/Module 4 Closer Look Labs/003. IPv6 Addressing.mp4
22.83 MB
Module 4 Security Operations/Module 4 Closer Look Labs/004. Wireless Heat Maps en.srt
7.99 KB
Module 4 Security Operations/Module 4 Closer Look Labs/004. Wireless Heat Maps.mp4
25.36 MB
Module 4 Security Operations/Module 4 Closer Look Labs/005. ZenMap en.srt
8.6 KB
Module 4 Security Operations/Module 4 Closer Look Labs/005. ZenMap.mp4
17.55 MB
Module 4 Security Operations/Module 4 Closer Look Labs/006. Log files en.srt
9.75 KB
Module 4 Security Operations/Module 4 Closer Look Labs/006. Log files.mp4
20.87 MB
Module 4 Security Operations/Module 4 Closer Look Labs/007. Ram Capture en.srt
5.14 KB
Module 4 Security Operations/Module 4 Closer Look Labs/007. Ram Capture.mp4
10.19 MB
Module 5 Security Program Management and Oversight/001. Module introduction en.srt
2.19 KB
Module 5 Security Program Management and Oversight/001. Module introduction.mp4
9.09 MB
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/001. Learning objectives en.srt
748 B
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/001. Learning objectives.mp4
3.09 MB
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/002. 23.1 Governance Structure en.srt
26.4 KB
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/002. 23.1 Governance Structure.mp4
64.59 MB
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/003. 23.2 Governance Documents en.srt
29.12 KB
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/003. 23.2 Governance Documents.mp4
65.93 MB
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/004. 23.3 Deep Dive Quiz en.srt
13.75 KB
Module 5 Security Program Management and Oversight/Lesson 23 Summarize Effective Security Governance/004. 23.3 Deep Dive Quiz.mp4
26.72 MB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/001. Learning objectives en.srt
912 B
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/001. Learning objectives.mp4
3.7 MB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/002. 24.1 Risk Concepts en.srt
15.64 KB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/002. 24.1 Risk Concepts.mp4
36.08 MB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/003. 24.2 Risk Assessment and Analysis en.srt
25.53 KB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/003. 24.2 Risk Assessment and Analysis.mp4
65.91 MB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/004. 24.3 Risk Response and Treatment en.srt
19.19 KB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/004. 24.3 Risk Response and Treatment.mp4
49.54 MB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/005. 24.4 Business Impact Analysis en.srt
24.38 KB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/005. 24.4 Business Impact Analysis.mp4
52.27 MB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/006. 24.5 Deep Dive Quiz en.srt
23.81 KB
Module 5 Security Program Management and Oversight/Lesson 24 Explain Elements of the Risk Management Process/006. 24.5 Deep Dive Quiz.mp4
53.77 MB
Module 5 Security Program Management and Oversight/Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/001. Learning objectives en.srt
755 B
Module 5 Security Program Management and Oversight/Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/001. Learning objectives.mp4
3.14 MB
Module 5 Security Program Management and Oversight/Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/002. 25.1 Third-party Risk Management en.srt
19.53 KB
Module 5 Security Program Management and Oversight/Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/002. 25.1 Third-party Risk Management.mp4
42.46 MB
Module 5 Security Program Management and Oversight/Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/003. 25.2 Deep Dive Quiz en.srt
13.31 KB
Module 5 Security Program Management and Oversight/Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/003. 25.2 Deep Dive Quiz.mp4
27.73 MB
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/001. Learning objectives en.srt
862 B
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/001. Learning objectives.mp4
3.42 MB
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/002. 26.1 Compliance Monitoring en.srt
15.71 KB
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/002. 26.1 Compliance Monitoring.mp4
40.16 MB
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/003. 26.2 Privacy Principles en.srt
27.47 KB
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/003. 26.2 Privacy Principles.mp4
68.26 MB
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/004. 26.3 Deep Dive Quiz en.srt
8.89 KB
Module 5 Security Program Management and Oversight/Lesson 26 Summarize Elements of Effective Security Compliance/004. 26.3 Deep Dive Quiz.mp4
16.97 MB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/001. Learning objectives en.srt
1.04 KB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/001. Learning objectives.mp4
4.35 MB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/002. 27.1 Audit and Assurance en.srt
21.41 KB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/002. 27.1 Audit and Assurance.mp4
50.86 MB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/003. 27.2 Penetration Testing Concepts en.srt
19.01 KB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/003. 27.2 Penetration Testing Concepts.mp4
46.7 MB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/004. 27.3 Penetration Testing Tools and Techiques en.srt
18.49 KB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/004. 27.3 Penetration Testing Tools and Techiques.mp4
45.36 MB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/005. 27.4 Deep Dive Quiz en.srt
15.88 KB
Module 5 Security Program Management and Oversight/Lesson 27 Explain Types and Purposes of Audits and Assessment/005. 27.4 Deep Dive Quiz.mp4
31.79 MB
Module 5 Security Program Management and Oversight/Lesson 28 Given a Scenario, Implement Security Awareness Practices/001. Learning objectives en.srt
1.36 KB
Module 5 Security Program Management and Oversight/Lesson 28 Given a Scenario, Implement Security Awareness Practices/001. Learning objectives.mp4
5.19 MB
Module 5 Security Program Management and Oversight/Lesson 28 Given a Scenario, Implement Security Awareness Practices/002. 28.1 Education, Training, and Awareness en.srt
33.56 KB
Module 5 Security Program Management and Oversight/Lesson 28 Given a Scenario, Implement Security Awareness Practices/002. 28.1 Education, Training, and Awareness.mp4
74.56 MB
Module 5 Security Program Management and Oversight/Lesson 28 Given a Scenario, Implement Security Awareness Practices/003. 28.2 Deep Dive Quiz en.srt
10.76 KB
Module 5 Security Program Management and Oversight/Lesson 28 Given a Scenario, Implement Security Awareness Practices/003. 28.2 Deep Dive Quiz.mp4
21.99 MB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/001. Passive Reconnaissance en.srt
6.71 KB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/001. Passive Reconnaissance.mp4
18.59 MB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/002. Policies and standards en.srt
13.75 KB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/002. Policies and standards.mp4
20.31 MB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/003. Quantitative Risk Analysis en.srt
9.29 KB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/003. Quantitative Risk Analysis.mp4
13.64 MB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/004. Privacy Walkthrough en.srt
7.39 KB
Module 5 Security Program Management and Oversight/Module 5 Closer Look Labs/004. Privacy Walkthrough.mp4
7.57 MB
Module 6 Preparing for the Exam/001. Module introduction en.srt
364 B
Module 6 Preparing for the Exam/001. Module introduction.mp4
1.78 MB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/001. Learning objectives en.srt
595 B
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/001. Learning objectives.mp4
2.73 MB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/002. 29.1 Understanding the SY0-701 Security+ Exam Structure en.srt
6.49 KB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/002. 29.1 Understanding the SY0-701 Security+ Exam Structure.mp4
17.93 MB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/003. 29.2 SY0-701 Exam Testing Options en.srt
8.22 KB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/003. 29.2 SY0-701 Exam Testing Options.mp4
23.49 MB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/004. 29.3 SY0-701 Exam Testing Strategies en.srt
13.23 KB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/004. 29.3 SY0-701 Exam Testing Strategies.mp4
34.53 MB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/005. 29.4 Congratulations! What's Next en.srt
3.43 KB
Module 6 Preparing for the Exam/Lesson 29 Attaining Your SY0-701 Security+ Certification/005. 29.4 Congratulations! What's Next.mp4
9.34 MB
Summary/001. CompTIA Security+ SY0-701 Summary en.srt
1.04 KB
Summary/001. CompTIA Security+ SY0-701 Summary.mp4
5.56 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。