资源详情

返回首页 | 相关搜索
CompTIA Security+ SY0-701 Certification
大小 700.78 MB
文件数 64
Info Hash: 6B635A8A34073779E81CB4DCCF5E47EF29971FCB
收录时间 2026-01-20 08:00:19
更新时间 2026-01-20 08:47:57
文件列表 (64)
Chapter 01 General Security Concepts/004. 1.2 - Summarize fundamental security concepts.mp4
53.81 MB
Chapter 01 General Security Concepts/001. How to Use the Video Course.mp4
2.05 MB
Chapter 01 General Security Concepts/002. Introduction to CompTIA Security Plus+ Certification Exam Objectives EXAM NUMBER SY0-701 video course.en.srt
2.85 KB
Chapter 01 General Security Concepts/002. Introduction to CompTIA Security Plus+ Certification Exam Objectives EXAM NUMBER SY0-701 video course.mp4
5.24 MB
Chapter 01 General Security Concepts/003. 1.1 - Compare and contrast various types of security controls.en.srt
6.03 KB
Chapter 01 General Security Concepts/003. 1.1 - Compare and contrast various types of security controls.mp4
10.32 MB
Chapter 01 General Security Concepts/004. 1.2 - Summarize fundamental security concepts.en.srt
32.3 KB
Chapter 01 General Security Concepts/001. How to Use the Video Course.en.srt
1.06 KB
Chapter 01 General Security Concepts/005. 1.3 - Explain the importance of change management processes and the impact to security.en.srt
13.84 KB
Chapter 01 General Security Concepts/005. 1.3 - Explain the importance of change management processes and the impact to security.mp4
21.43 MB
Chapter 01 General Security Concepts/006. 1.4 - Explain the importance of using appropriate cryptographic solutions.en.srt
33.31 KB
Chapter 01 General Security Concepts/006. 1.4 - Explain the importance of using appropriate cryptographic solutions.mp4
46.31 MB
Chapter 02 Threats, Vulnerabilities, and Mitigations/001. 2.1 - Compare and contrast common threat actors and motivations.en.srt
7.97 KB
Chapter 02 Threats, Vulnerabilities, and Mitigations/001. 2.1 - Compare and contrast common threat actors and motivations.mp4
12.15 MB
Chapter 02 Threats, Vulnerabilities, and Mitigations/002. 2.2- Explain common threat vectors and attack surfaces.en.srt
16.39 KB
Chapter 02 Threats, Vulnerabilities, and Mitigations/002. 2.2- Explain common threat vectors and attack surfaces.mp4
22.14 MB
Chapter 02 Threats, Vulnerabilities, and Mitigations/003. 2.3 - Explain various types of vulnerabilities.en.srt
23.25 KB
Chapter 02 Threats, Vulnerabilities, and Mitigations/003. 2.3 - Explain various types of vulnerabilities.mp4
37.21 MB
Chapter 02 Threats, Vulnerabilities, and Mitigations/004. 2.4 - Given a scenario, analyze indicators of malicious activity Part 1.en.srt
12.19 KB
Chapter 02 Threats, Vulnerabilities, and Mitigations/004. 2.4 - Given a scenario, analyze indicators of malicious activity Part 1.mp4
21.3 MB
Chapter 02 Threats, Vulnerabilities, and Mitigations/005. 2.4 - Given a scenario, analyze indicators of malicious activity. Part 2.en.srt
18.58 KB
Chapter 02 Threats, Vulnerabilities, and Mitigations/005. 2.4 - Given a scenario, analyze indicators of malicious activity. Part 2.mp4
31.86 MB
Chapter 02 Threats, Vulnerabilities, and Mitigations/006. 2.5-Explain the purpose of mitigation techniques used to secure the enterprise.en.srt
12.46 KB
Chapter 02 Threats, Vulnerabilities, and Mitigations/006. 2.5-Explain the purpose of mitigation techniques used to secure the enterprise.mp4
23.93 MB
Chapter 03 Security Architecture/001. 3.1 - Compare and contrast security implications of different architecture models.en.srt
13.69 KB
Chapter 03 Security Architecture/001. 3.1 - Compare and contrast security implications of different architecture models.mp4
29.32 MB
Chapter 03 Security Architecture/002. 3.2 - Given a scenario, apply security principles to secure enterprise infrastructure.en.srt
11.4 KB
Chapter 03 Security Architecture/002. 3.2 - Given a scenario, apply security principles to secure enterprise infrastructure.mp4
23.95 MB
Chapter 03 Security Architecture/003. 3.3 - Compare and contrast concepts and strategies to protect data.en.srt
8.99 KB
Chapter 03 Security Architecture/003. 3.3 - Compare and contrast concepts and strategies to protect data.mp4
17.26 MB
Chapter 03 Security Architecture/004. 3.4 - Explain the importance of resilience and recovery in security architecture.en.srt
10.99 KB
Chapter 03 Security Architecture/004. 3.4 - Explain the importance of resilience and recovery in security architecture.mp4
23.55 MB
Chapter 04 Security Operations/001. 4.1 - Given a scenario, apply common security techniques to computing resources.en.srt
13.57 KB
Chapter 04 Security Operations/001. 4.1 - Given a scenario, apply common security techniques to computing resources.mp4
27.52 MB
Chapter 04 Security Operations/002. 4.2 - Explain the security implications of proper hardware, software, and data asset management.en.srt
8.83 KB
Chapter 04 Security Operations/002. 4.2 - Explain the security implications of proper hardware, software, and data asset management.mp4
16.38 MB
Chapter 04 Security Operations/003. 4.3 - Explain various activities associated with vulnerability management.en.srt
14.86 KB
Chapter 04 Security Operations/003. 4.3 - Explain various activities associated with vulnerability management.mp4
28.75 MB
Chapter 04 Security Operations/004. 4.4 - Explain security alerting and monitoring concepts and tools.en.srt
6.51 KB
Chapter 04 Security Operations/004. 4.4 - Explain security alerting and monitoring concepts and tools.mp4
14.02 MB
Chapter 04 Security Operations/005. 4.5 - Given a scenario, modify enterprise capabilities to enhance security.en.srt
17.25 KB
Chapter 04 Security Operations/005. 4.5 - Given a scenario, modify enterprise capabilities to enhance security.mp4
34.29 MB
Chapter 04 Security Operations/006. 4.6 - Given a scenario, implement and maintain identity and access management - Part 1.en.srt
10.11 KB
Chapter 04 Security Operations/006. 4.6 - Given a scenario, implement and maintain identity and access management - Part 1.mp4
19.97 MB
Chapter 04 Security Operations/007. 4.6 - Given a scenario, implement and maintain identity and access management - Part 2.en.srt
9.82 KB
Chapter 04 Security Operations/007. 4.6 - Given a scenario, implement and maintain identity and access management - Part 2.mp4
19.6 MB
Chapter 04 Security Operations/008. 4.7 - Explain the importance of automation and orchestration related to secure operations.en.srt
5.49 KB
Chapter 04 Security Operations/008. 4.7 - Explain the importance of automation and orchestration related to secure operations.mp4
12.22 MB
Chapter 04 Security Operations/009. 4.8 - Explain appropriate incident response activities.en.srt
11.92 KB
Chapter 04 Security Operations/009. 4.8 - Explain appropriate incident response activities.mp4
22.4 MB
Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.en.srt
8.35 KB
Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.mp4
16.97 MB
Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.en.srt
11.88 KB
Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.mp4
23.44 MB
Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.en.srt
11.53 KB
Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.mp4
24.04 MB
Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.en.srt
6.09 KB
Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.mp4
12.86 MB
Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.en.srt
6.71 KB
Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.mp4
12.91 MB
Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.en.srt
5.57 KB
Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.mp4
11.25 MB
Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.en.srt
11.78 KB
Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.mp4
21.97 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。