Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
CompTIA CASP+ (CAS-004) - Bob Salmans
#1
[Image: 541636287_oip.jpg]
8.09 GB | 00:08:51 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English

Files Included :
1 DoS Protection, Load Balancers and Proxies (107.24 MB)
2 Intrusion PreventionDetection Systems (75.81 MB)
3 Application Security (36.68 MB)
4 NACs and VPNs (57.64 MB)
5 Securing DNS and Email (78.63 MB)
6 Routers and NAT Gateways (52.69 MB)
7 Firewalls, UTMs and NGFWs (81.19 MB)
1 Threat Intelligence (98.34 MB)
2 Threat Intel Collection Methods (47.96 MB)
3 Types of Threat Actors (42.88 MB)
4 Threat Management Frameworks (58.69 MB)
5 Using MITRE ATT&CK (126.23 MB)
6 IOCs and Responses (40.43 MB)
1 Vulnerability Scans (75.3 MB)
2 Security Content Automation Protocol (SCAP) (77.22 MB)
3 Assessments (80.69 MB)
4 Patch Management (44.71 MB)
5 Information Sources (27.5 MB)
1 Vulnerability Assessment vs Pentesting (53.68 MB)
2 Testing Methods (61 MB)
3 Pentesting Post Exploit (51.4 MB)
4 Vulnerability Assessment Tools (49.21 MB)
5 Some Pentesting Tools (66.28 MB)
6 Vulnerability Assessments and Pentesting Requirements (40.86 MB)
1 Common Software Vulnerabilities (77.33 MB)
2 Race Conditions (43.92 MB)
3 Cryptographic Vulnerabilities (32.39 MB)
4 Software Development Vulnerabilities (49.86 MB)
5 Web Application Attacks (39.88 MB)
6 VM and Network-Based Attacks (68.96 MB)
1 Being Proactive (85.17 MB)
2 Using Data Analysis (70.1 MB)
3 Preventative Measures (57.1 MB)
4 Application Control (39.73 MB)
5 Security Automation (25.47 MB)
6 Physical Security (52.78 MB)
1 Intro (16.55 MB)
2 Event Classification (48.29 MB)
3 Event Triage (50.99 MB)
4 Incident Response Process (46.63 MB)
5 Incident Response Playbooks (80.76 MB)
6 Automated Response (32.69 MB)
7 Communications Plans & Stakeholder Management (26.4 MB)
1 Intro (30.99 MB)
2 Forensic Process Identification (60.45 MB)
3 Digital Forensics (33.68 MB)
4 Forensic Process Evidence Collection (68.55 MB)
5 Forensic Process Evidence Preservation (30.51 MB)
6 Forensic Process Analysis (33.79 MB)
7 Forensic Process Verification and Presentation (19.03 MB)
1 Intro (11.47 MB)
2 Enterprise Mobility Management (30.22 MB)
3 Windows Information Protection (86.75 MB)
4 Configuring Endpoint Security Controls (60.2 MB)
5 Hardening Techniques (96.81 MB)
6 Compensation Controls (34.68 MB)
1 Intro (8.64 MB)
2 Cloud Deployment Models (40.88 MB)
3 Impacts of Cloud Technology Adoption (71.82 MB)
4 Securing Specialized Technologies (49.37 MB)
5 Cloud Threats And Vulnerabilities (22.9 MB)
6 Monitoring Logs Using Azure AD Audit (35.24 MB)
7 Emerging Technologies (88.84 MB)
1 Introduction To Public Key Infrastructure (6.91 MB)
2 The Role Of Public Key Infrastructure (51.63 MB)
3 Private And Public Key Encryption (36.49 MB)
4 Certificate Lifecycle (57.52 MB)
5 Certificate Types And Usage (44.74 MB)
6 Understanding Trust Concepts (72.27 MB)
1 Traffic Monitoring (44.58 MB)
2 Security Sensors (106.37 MB)
3 Network Segmentation (105.45 MB)
4 Deperimeterization Zero Trust (33.78 MB)
5 Merging Networks (56.36 MB)
6 Defense In Depth (25.92 MB)
1 Hashing (73.1 MB)
2 SSLTLS (51.85 MB)
3 Symmetric And Asymmetric Algorithm (25.49 MB)
4 SMIME and SSH (96.1 MB)
5 Internet Protocol Security (IPSec) (69.95 MB)
1 Risk Analysis Methods (44.7 MB)
2 Responding To Risk (52.18 MB)
3 Types of Risk (37.34 MB)
4 Risk Management Lifecycle and Frameworks (62.06 MB)
5 Tracking Risk (29.02 MB)
6 Risk Appetite, Tolerance, and Capacity (55.65 MB)
7 Policies and Security Practices (51.9 MB)
1 Third Party Risk Management (107.7 MB)
2 Vendor Lock-InOut and Viability (45.88 MB)
3 Meeting Obligations (46.87 MB)
4 Third Party Dependencies (56.74 MB)
5 Technical Considerations (47.35 MB)
6 Additional Vendor Considerations (47.13 MB)
1 Data Considerations (72.05 MB)
2 Location, Location, Location (48.15 MB)
3 Regulations, Accreditations and Standards (72.52 MB)
4 Legal Considerations (51 MB)
5 Contract and Agreement Types (51.07 MB)
1 BC and DR Planning (33.95 MB)
2 BCDR Planning Process (61.67 MB)
3 Creating a BC Plan (37.41 MB)
4 DR Planning (79.02 MB)
5 Resiliency Technologies (59.06 MB)
6 Testing BCDR Plans (35.2 MB)
1 Software Defined Networking (SDN) (70.67 MB)
2 Scalability and Automation (70.24 MB)
3 Resiliency In Infrastructure Design (96.39 MB)
4 Virtuailzation and Containerization (119.76 MB)
5 CDNs and Caching (57.56 MB)
1 Baselines and Templates (59.56 MB)
2 APIs and Middleware (93.62 MB)
3 Software Assurance (76.23 MB)
4 Integrating Enterprise Applications (41.73 MB)
5 Application Development Security (64.75 MB)
6 Web Application Security (87.71 MB)
1 Data Loss Prevention and Detection (50.05 MB)
2 Data Classification, Labeling and Tagging (63.43 MB)
3 Obfuscation and Anonymization of Data (62.85 MB)
4 Data Lifecycle Management (66.94 MB)
5 Data Inventory and Mapping (47.44 MB)
6 Data Integrity Management (93.83 MB)
1 Managing Credentials (81.93 MB)
2 Password Policies (74.03 MB)
3 Access Control (56.66 MB)
4 AAA Protocols (73.89 MB)
5 MFA, OTP and SSO (35.87 MB)
6 Authenticating Hardware and People (36.19 MB)
1 Virtualization Technologies (61.31 MB)
2 Virtualization Strategies (54.64 MB)
3 Cloud Deployment Models (67.61 MB)
4 Cloud Computing Characteristics (62.47 MB)
5 Cloud Provider Limitations (58.29 MB)
6 Extending On-premise Security Controls (69.2 MB)
1 The CIA Triad (41.76 MB)
2 Non-repudiation and Compliance Requirements (59.1 MB)
3 Cryptography and PKI (51.22 MB)
4 Hashes and Digital Signatures (81.86 MB)
5 Cryptography Use Cases (66.14 MB)
1 AI and ML (47.63 MB)
2 Quantum Computing and Nano Technology (49.91 MB)
3 Homomorphic Encryption and SMC (64.93 MB)
4 Blockchain and Distributed Consensus (61.98 MB)
5 Big Data and Passwordless Authentication (65.55 MB)
6 Virtual Reality and 3D Printing (58.09 MB)
7 Deepfakes and Biometric Impersonation (47.28 MB)]
Screenshot
[Image: aM7i90oE_o.jpg]


[To see links please register or login]

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

Download Now   Download Now
Download Now   Download Now


Telegram