04-01-2025, 09:59 PM
![[Image: 541636287_oip.jpg]](https://img100.pixhost.to/images/791/541636287_oip.jpg)
31.67 GB | 00:21:42 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 Introduction (46.35 MB)
2 Vulnerabilities (340.46 MB)
3 Types of Vulnerabilities (366.53 MB)
4 Exploits, Risks, and Threats (318.63 MB)
5 Attack Vectors and Defense-in-Depth (259.27 MB)
6 Types of Attackers and Code of Ethics (241.87 MB)
7 Reasons for Attacks (129.07 MB)
8 Validation (87.41 MB)
1 Introduction (14.57 MB)
2 Access Control List Overview (153.34 MB)
3 ACL Implementations (142.97 MB)
4 ACL Demonstration (286.02 MB)
5 Firewall Essentials (164.33 MB)
6 Other Firewall Types (217.65 MB)
7 Network Access Control (NAC) (471.52 MB)
8 Virtual Private Network (VPN) (194.34 MB)
1 Windows Installed Base and Support (273.58 MB)
2 The Windows User Interface (375.95 MB)
3 The Windows File System (329.97 MB)
4 Implement the Command Line (535.82 MB)
5 Validation (183.75 MB)
1 Microsoft Defender Overview (170.58 MB)
2 Microsoft Defender Demonstration (413.8 MB)
3 Windows Host-Based Firewall (452.59 MB)
4 Validation (193.05 MB)
1 Introduction to PowerShell (445.96 MB)
2 PowerShell Examples (234.47 MB)
3 Introduction to Linux (113.83 MB)
4 Linux Terminal Overview (143.03 MB)
5 Bash File Management Commands (448.77 MB)
6 Network Commands (317.09 MB)
7 Linux Programs from the CLI (152.06 MB)
8 Validation (55.55 MB)
1 Windows File and Directory Permissions (374.67 MB)
2 Linux and macOS File and Directory Permissions (292.65 MB)
3 Configure macOS Firewall (278.28 MB)
4 Configure Linux Firewall (273.21 MB)
5 Validation (83.82 MB)
6 Validation Part 2 (55.98 MB)
1 Hardware Inventory (386.03 MB)
2 Using Intune to Track Assets (113.03 MB)
3 Manage Software (215.29 MB)
4 Manage an Android Device (255.97 MB)
5 Configuration Management (266.7 MB)
6 Configuration Management with Configuration Profile (119.92 MB)
7 Validation (87.06 MB)
1 Introduction (36.03 MB)
2 Regulatory Compliance GDPR (158.94 MB)
3 Regulatory Compliance - PCI DSS (96.3 MB)
4 Regulatory Compliance HIPPA (259.95 MB)
5 Backup Purpose (373.07 MB)
6 Backup Media, Types, and Frequency (303.22 MB)
7 Backup Products (261.35 MB)
8 Validation (182.28 MB)
1 Types of Windows Updates (390.69 MB)
2 Client-Side Windows Update Settings (332.58 MB)
3 Windows Server Update Services (WSUS) (187.82 MB)
4 Updates via Intune (239.52 MB)
5 Software, Driver, and Firmware Updates (308.11 MB)
6 Validation (47.94 MB)
1 Event Viewer Overview (348.38 MB)
2 Manage Event Viewer (333.56 MB)
3 Event Viewer Examples (146.49 MB)
4 Event Viewer Tools (128.45 MB)
5 Syslog (147.17 MB)
6 Validation (38.13 MB)
1 Does Linux Need Antimalware (259.39 MB)
2 Linux Targets (246.4 MB)
3 Linux Attacks Ransomware and Cryptojacking (134.12 MB)
4 Linux Attacks State-Sponsored, File-less, and IoT (218.88 MB)
5 macOS and Security (290.42 MB)
6 XProtect in Action (114.38 MB)
7 Scan Logs and Malware Remediation (264.9 MB)
8 Validation (173.73 MB)
1 Types of Malware (569.74 MB)
2 Symptoms of Malware (320.49 MB)
3 Common Attacks Part 1 (383.75 MB)
4 Common Attacks Part 2 (163.84 MB)
5 Password Attacks (180.39 MB)
6 Social Engineering Attacks (233.26 MB)
7 Validation (92.01 MB)
1 Intro (19.45 MB)
2 OS and Network Vulnerabilities (72.5 MB)
3 Common Vulnerabilities and Exposure (CVEs) (181.41 MB)
4 Scanning Networks Using Nmap and Zenmap (126.78 MB)
5 Managing Ubuntu Firewall Ports (103.24 MB)
6 Configuring SSH (45.22 MB)
7 Skill Validation (50.25 MB)
1 Introducing Compliance Frameworks (15.37 MB)
2 Complying With PCI DSS (58.32 MB)
3 Complying With HIPAA (16.66 MB)
4 Complying With FERPA (27.14 MB)
5 Complying With GDPR (36.06 MB)
6 Working With ISO 27001 and NIST Templates (107.22 MB)
7 Compliance Laws and Standards (3.28 MB)
8 Skill Validation (43.43 MB)
1 Intro (17.47 MB)
2 Vulnerability vs Risk (31.58 MB)
3 Determine Risk Rankings (46.55 MB)
4 Exploring Insider Risks Policies (91.42 MB)
5 Complete Policy Review (22.16 MB)
6 Skill Validation (26.32 MB)
7 Skill Validation Part 2 (88.4 MB)
1 Intro (28.25 MB)
2 SIEM vs SOAR (28.47 MB)
3 NIST SP 800-61 (34.57 MB)
4 Exploring Azure Sentinel (78.9 MB)
5 Tactics and Techniques (75.29 MB)
6 Skill Validation (34.57 MB)
7 Question Review (84.81 MB)
1 Authentication (290.51 MB)
2 Authorization and Accounting (314.6 MB)
3 Password Management (479.67 MB)
4 National Institute of Standards and Technology (NIST) Recommendations (200.85 MB)
5 RADIUS (180.08 MB)
6 Validation (132.77 MB)
1 What is Encryption (243.44 MB)
2 Encryption of Data at Rest (433.92 MB)
3 Encryption of Data in Transit (312.65 MB)
4 Data in Use (278.01 MB)
5 Validation (114.63 MB)
1 Symmetric Encryption (529.07 MB)
2 Asymmetric Encryption (249.39 MB)
3 Summary of Algorithms (281.23 MB)
4 Hashing Data (402.82 MB)
5 Validation (100.64 MB)
1 The TCP Protocol (347.99 MB)
2 The IP Protocol (259.1 MB)
3 Protocol Vulnerabilities (551.61 MB)
4 UDP and Additional Protocols (384.85 MB)
1 Introduction (21.24 MB)
2 Understanding Binary and Decimal Notation (252.64 MB)
3 Calculate a Subnet Mask Result (278.84 MB)
4 Understanding Switch and Router Functions (274.44 MB)
5 Public vs Private Addresses (266.42 MB)
6 Network Address Translation (162.53 MB)
7 IPv6 Addressing (193.18 MB)
8 Validation (98.29 MB)
1 Network Architecture Requirements (18.33 MB)
10 Your Invisible Friend The Cloud (327.97 MB)
11 Validation (84.06 MB)
2 Network Architecture Fault Tolerance (242.21 MB)
3 Network Architecture Scalability (129.01 MB)
4 Network Architecture QoS, Security (359.61 MB)
5 DMZ and Proxy (208.29 MB)
6 Honeypot (89.96 MB)
7 Virtualization Overview (273.8 MB)
8 Virtualization Demo (181.62 MB)
9 Your Invisible Friend The Cloud (193.52 MB)
1 SoHo Introduction (73.06 MB)
2 Device Requirements (237.1 MB)
3 Purpose and Availability Requirements (204.22 MB)
4 Wireless Bands and Channels (379.91 MB)
5 Wireless Protocols (212.58 MB)
6 Elements of a SoHo Network (301.06 MB)
7 Configure a Wireless SoHo Network (639.16 MB)]
Screenshot
![[Image: 80EO0ITO_o.jpg]](https://images2.imgbox.com/46/ee/80EO0ITO_o.jpg)
1 Introduction (46.35 MB)
2 Vulnerabilities (340.46 MB)
3 Types of Vulnerabilities (366.53 MB)
4 Exploits, Risks, and Threats (318.63 MB)
5 Attack Vectors and Defense-in-Depth (259.27 MB)
6 Types of Attackers and Code of Ethics (241.87 MB)
7 Reasons for Attacks (129.07 MB)
8 Validation (87.41 MB)
1 Introduction (14.57 MB)
2 Access Control List Overview (153.34 MB)
3 ACL Implementations (142.97 MB)
4 ACL Demonstration (286.02 MB)
5 Firewall Essentials (164.33 MB)
6 Other Firewall Types (217.65 MB)
7 Network Access Control (NAC) (471.52 MB)
8 Virtual Private Network (VPN) (194.34 MB)
1 Windows Installed Base and Support (273.58 MB)
2 The Windows User Interface (375.95 MB)
3 The Windows File System (329.97 MB)
4 Implement the Command Line (535.82 MB)
5 Validation (183.75 MB)
1 Microsoft Defender Overview (170.58 MB)
2 Microsoft Defender Demonstration (413.8 MB)
3 Windows Host-Based Firewall (452.59 MB)
4 Validation (193.05 MB)
1 Introduction to PowerShell (445.96 MB)
2 PowerShell Examples (234.47 MB)
3 Introduction to Linux (113.83 MB)
4 Linux Terminal Overview (143.03 MB)
5 Bash File Management Commands (448.77 MB)
6 Network Commands (317.09 MB)
7 Linux Programs from the CLI (152.06 MB)
8 Validation (55.55 MB)
1 Windows File and Directory Permissions (374.67 MB)
2 Linux and macOS File and Directory Permissions (292.65 MB)
3 Configure macOS Firewall (278.28 MB)
4 Configure Linux Firewall (273.21 MB)
5 Validation (83.82 MB)
6 Validation Part 2 (55.98 MB)
1 Hardware Inventory (386.03 MB)
2 Using Intune to Track Assets (113.03 MB)
3 Manage Software (215.29 MB)
4 Manage an Android Device (255.97 MB)
5 Configuration Management (266.7 MB)
6 Configuration Management with Configuration Profile (119.92 MB)
7 Validation (87.06 MB)
1 Introduction (36.03 MB)
2 Regulatory Compliance GDPR (158.94 MB)
3 Regulatory Compliance - PCI DSS (96.3 MB)
4 Regulatory Compliance HIPPA (259.95 MB)
5 Backup Purpose (373.07 MB)
6 Backup Media, Types, and Frequency (303.22 MB)
7 Backup Products (261.35 MB)
8 Validation (182.28 MB)
1 Types of Windows Updates (390.69 MB)
2 Client-Side Windows Update Settings (332.58 MB)
3 Windows Server Update Services (WSUS) (187.82 MB)
4 Updates via Intune (239.52 MB)
5 Software, Driver, and Firmware Updates (308.11 MB)
6 Validation (47.94 MB)
1 Event Viewer Overview (348.38 MB)
2 Manage Event Viewer (333.56 MB)
3 Event Viewer Examples (146.49 MB)
4 Event Viewer Tools (128.45 MB)
5 Syslog (147.17 MB)
6 Validation (38.13 MB)
1 Does Linux Need Antimalware (259.39 MB)
2 Linux Targets (246.4 MB)
3 Linux Attacks Ransomware and Cryptojacking (134.12 MB)
4 Linux Attacks State-Sponsored, File-less, and IoT (218.88 MB)
5 macOS and Security (290.42 MB)
6 XProtect in Action (114.38 MB)
7 Scan Logs and Malware Remediation (264.9 MB)
8 Validation (173.73 MB)
1 Types of Malware (569.74 MB)
2 Symptoms of Malware (320.49 MB)
3 Common Attacks Part 1 (383.75 MB)
4 Common Attacks Part 2 (163.84 MB)
5 Password Attacks (180.39 MB)
6 Social Engineering Attacks (233.26 MB)
7 Validation (92.01 MB)
1 Intro (19.45 MB)
2 OS and Network Vulnerabilities (72.5 MB)
3 Common Vulnerabilities and Exposure (CVEs) (181.41 MB)
4 Scanning Networks Using Nmap and Zenmap (126.78 MB)
5 Managing Ubuntu Firewall Ports (103.24 MB)
6 Configuring SSH (45.22 MB)
7 Skill Validation (50.25 MB)
1 Introducing Compliance Frameworks (15.37 MB)
2 Complying With PCI DSS (58.32 MB)
3 Complying With HIPAA (16.66 MB)
4 Complying With FERPA (27.14 MB)
5 Complying With GDPR (36.06 MB)
6 Working With ISO 27001 and NIST Templates (107.22 MB)
7 Compliance Laws and Standards (3.28 MB)
8 Skill Validation (43.43 MB)
1 Intro (17.47 MB)
2 Vulnerability vs Risk (31.58 MB)
3 Determine Risk Rankings (46.55 MB)
4 Exploring Insider Risks Policies (91.42 MB)
5 Complete Policy Review (22.16 MB)
6 Skill Validation (26.32 MB)
7 Skill Validation Part 2 (88.4 MB)
1 Intro (28.25 MB)
2 SIEM vs SOAR (28.47 MB)
3 NIST SP 800-61 (34.57 MB)
4 Exploring Azure Sentinel (78.9 MB)
5 Tactics and Techniques (75.29 MB)
6 Skill Validation (34.57 MB)
7 Question Review (84.81 MB)
1 Authentication (290.51 MB)
2 Authorization and Accounting (314.6 MB)
3 Password Management (479.67 MB)
4 National Institute of Standards and Technology (NIST) Recommendations (200.85 MB)
5 RADIUS (180.08 MB)
6 Validation (132.77 MB)
1 What is Encryption (243.44 MB)
2 Encryption of Data at Rest (433.92 MB)
3 Encryption of Data in Transit (312.65 MB)
4 Data in Use (278.01 MB)
5 Validation (114.63 MB)
1 Symmetric Encryption (529.07 MB)
2 Asymmetric Encryption (249.39 MB)
3 Summary of Algorithms (281.23 MB)
4 Hashing Data (402.82 MB)
5 Validation (100.64 MB)
1 The TCP Protocol (347.99 MB)
2 The IP Protocol (259.1 MB)
3 Protocol Vulnerabilities (551.61 MB)
4 UDP and Additional Protocols (384.85 MB)
1 Introduction (21.24 MB)
2 Understanding Binary and Decimal Notation (252.64 MB)
3 Calculate a Subnet Mask Result (278.84 MB)
4 Understanding Switch and Router Functions (274.44 MB)
5 Public vs Private Addresses (266.42 MB)
6 Network Address Translation (162.53 MB)
7 IPv6 Addressing (193.18 MB)
8 Validation (98.29 MB)
1 Network Architecture Requirements (18.33 MB)
10 Your Invisible Friend The Cloud (327.97 MB)
11 Validation (84.06 MB)
2 Network Architecture Fault Tolerance (242.21 MB)
3 Network Architecture Scalability (129.01 MB)
4 Network Architecture QoS, Security (359.61 MB)
5 DMZ and Proxy (208.29 MB)
6 Honeypot (89.96 MB)
7 Virtualization Overview (273.8 MB)
8 Virtualization Demo (181.62 MB)
9 Your Invisible Friend The Cloud (193.52 MB)
1 SoHo Introduction (73.06 MB)
2 Device Requirements (237.1 MB)
3 Purpose and Availability Requirements (204.22 MB)
4 Wireless Bands and Channels (379.91 MB)
5 Wireless Protocols (212.58 MB)
6 Elements of a SoHo Network (301.06 MB)
7 Configure a Wireless SoHo Network (639.16 MB)]
Screenshot
![[Image: 80EO0ITO_o.jpg]](https://images2.imgbox.com/46/ee/80EO0ITO_o.jpg)
![[Image: signature.png]](https://softwarez.info/images/avsg/signature.png)