-->
  Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
CompTIA Security Plus SY0-701
#1
[Image: 537661809_oip.jpg]
8.06 GB | 00:04:54 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English

Files Included :
001 Course Overview.mp4 (21.52 MB)
001 Introduction.mp4 (12.48 MB)
002 Types of Actors.mp4 (54.3 MB)
003 Threat Actor Attributes.mp4 (5.85 MB)
004 Attack Vectors.mp4 (29.81 MB)
001 Mobile Traffic Current State and Interesting Stats.mp4 (35.94 MB)
002 Message Based Threat Vectors.mp4 (22.33 MB)
003 Image Based and File Based Threat Vectors.mp4 (46.52 MB)
004 Voice Based Threat Vectors.mp4 (22.09 MB)
005 Additional Threat Vectors.mp4 (7.42 MB)
006 Vulnerable Software and Misconfigurations.mp4 (11.98 MB)
007 Shared Accounts and Improperly Configured Accounts.mp4 (17.87 MB)
008 Open Service Ports and Port Scanning Demo.mp4 (37.06 MB)
009 Supply Chain Attacks.mp4 (21 MB)
010 Social Engineering Phishing and Vishing.mp4 (25.55 MB)
011 Watering Hole Attack.mp4 (9.14 MB)
012 Type SquattingURL Hijacking.mp4 (8.33 MB)
001 Module Intro and MemoryDLL Injection.mp4 (63.98 MB)
002 Buffer Overflow.mp4 (7.57 MB)
003 Race Conditions.mp4 (23.21 MB)
004 Malicious Update and OS-based Update Vulnerabilities.mp4 (11.84 MB)
005 Cross Site Scripting (XSS).mp4 (11.87 MB)
006 SQL Injection.mp4 (12.42 MB)
007 SQL Injection Demo.mp4 (106.01 MB)
008 Hardware Vulnerabilities (Firmware EOL and Legacy Equipment).mp4 (11.37 MB)
009 VM Escape and VM Sprawl Avoidance.mp4 (24.18 MB)
010 Cloud Vulnerabilities.mp4 (26.72 MB)
011 Mobile Device Vulnerabilities.mp4 (16.18 MB)
012 New Threats Zero Day Vulnerabilities.mp4 (12.19 MB)
001 Indicators of Compromise and Crypto-malware.mp4 (33.03 MB)
002 Trojans and RATs.mp4 (12.51 MB)
003 Worms.mp4 (2.9 MB)
004 Spyware.mp4 (44.61 MB)
005 Bloatware.mp4 (11.89 MB)
006 Viruses.mp4 (12.83 MB)
007 Botnets.mp4 (12.79 MB)
008 Keyloggers.mp4 (4.64 MB)
009 Logic Bomb.mp4 (3.39 MB)
010 Rootkits.mp4 (51.73 MB)
011 Brute Force Attacks.mp4 (16.56 MB)
012 RFID.mp4 (14.66 MB)
013 DDoS Attacks.mp4 (5.97 MB)
014 Amplification Attacks and DNS Poisoning.mp4 (28.27 MB)
015 Rogue Access Points Evil Twins and Dissociation.mp4 (10.36 MB)
016 On-path Attack.mp4 (19.36 MB)
017 Malicious Code Execution.mp4 (9.34 MB)
018 Replay Attacks.mp4 (9.05 MB)
019 Privilege Escalation.mp4 (4.65 MB)
020 Cross-Site Request Forgery (XSRF).mp4 (17.48 MB)
021 Directory TraversalCommand Injection.mp4 (11.33 MB)
022 Downgrade Attack.mp4 (8.38 MB)
023 Collision Attack and Birthday Attack.mp4 (15.64 MB)
024 Password Spraying and IOC Considerations.mp4 (35.08 MB)
001 Segmentation Physical and Logical.mp4 (132.38 MB)
002 Virtualization.mp4 (7.21 MB)
003 Air Gaps.mp4 (5.32 MB)
004 Access Control Lists (ACLs) and Least Privilege.mp4 (34.02 MB)
005 Patch Management.mp4 (12.5 MB)
006 Encryption.mp4 (8.72 MB)
007 Configuration Enforcement.mp4 (14.96 MB)
008 SOAR.mp4 (25.49 MB)
009 Endpoint Detection and Response (EDR).mp4 (5.12 MB)
010 Host-based Firewall.mp4 (4.64 MB)
011 HIDSHIPS.mp4 (15.02 MB)
001 Domain Summary Key Concepts and Exam Success Essentials.mp4 (61.81 MB)
001 Course Overview.mp4 (39.62 MB)
001 Exam Overview.mp4 (101.28 MB)
001 Exam Tips.mp4 (112.01 MB)
001 Exam Prep Domain Summary.mp4 (41.67 MB)
001 Course Overview.mp4 (22.34 MB)
001 Module Intro and Goals.mp4 (20.5 MB)
002 Threat Types.mp4 (8.56 MB)
003 Types of Access Controls and Examples.mp4 (241.97 MB)
001 Module Overview.mp4 (13.43 MB)
002 Confidentiality Integrity and Availability (CIA).mp4 (27.5 MB)
003 Authentication Authorization and Accounting (AAA).mp4 (7.45 MB)
004 Identification vs Authentication vs Authorization.mp4 (4.1 MB)
005 Multifactor Authentication and Authentication Factors.mp4 (10.34 MB)
006 Gap Analysis.mp4 (23.33 MB)
007 Zero Trust.mp4 (26.74 MB)
008 Infrared Microwave and Ultrasonic Physical Controls.mp4 (6.28 MB)
009 Honeypots Honeyfiles and Honeynets.mp4 (41.05 MB)
001 Module Intro and Business Processes Impacting Security Operations.mp4 (266.87 MB)
002 Approval Process.mp4 (4.32 MB)
003 Additional Change Management Considerations.mp4 (18.14 MB)
004 Standard Operating Procedures.mp4 (20.44 MB)
005 Technical Implications.mp4 (17.94 MB)
006 Documentation and Version Control.mp4 (27.12 MB)
001 Public Key Infrastructure (PKI).mp4 (44.98 MB)
002 Key Escrow.mp4 (9.55 MB)
003 Encryption Levels.mp4 (30.93 MB)
004 Symmetric Encryption.mp4 (17.17 MB)
005 Asymmetric Encryption.mp4 (16.08 MB)
006 Key Exchange.mp4 (3.47 MB)
007 Cipher Suites.mp4 (6.72 MB)
008 Tools (TPM HSM KMS and Secure Enclave).mp4 (11.33 MB)
009 Steganography.mp4 (14.76 MB)
010 Tokenization.mp4 (10.81 MB)
011 Data Masking.mp4 (5.71 MB)
012 Hashing.mp4 (14.31 MB)
013 Salting.mp4 (4.26 MB)
014 Digital Signatures.mp4 (9.21 MB)
015 Key Stretching.mp4 (10.06 MB)
016 Blockchain.mp4 (23.56 MB)
017 Certificate Authority and CSR.mp4 (21.08 MB)
001 Domain Summary.mp4 (33.52 MB)
001 Course Overview.mp4 (23.96 MB)
001 Module Intro.mp4 (11.1 MB)
002 Why Is This Important.mp4 (24.22 MB)
003 Cloud Responsibility Matrix.mp4 (32.41 MB)
004 Types of Clouds.mp4 (5.69 MB)
005 XaaS PaaS IaaS and SaaS.mp4 (53.49 MB)
006 Infrastructure as Code and CICD.mp4 (19.33 MB)
007 Serverless Computing.mp4 (31.17 MB)
008 Microservices.mp4 (31.13 MB)
009 Software Defined Networking (SDN).mp4 (28.27 MB)
010 On-prem vs Off-prem.mp4 (11.97 MB)
011 Virtualization.mp4 (38.44 MB)
012 Internet of Things (IoT).mp4 (22.5 MB)
013 SCADA and ICS systems.mp4 (219.42 MB)
014 Embedded Systems Overview.mp4 (43.33 MB)
015 Embedded System Platforms and RTOS.mp4 (44.17 MB)
001 Device Placement Considerations.mp4 (31.7 MB)
002 Security Zones.mp4 (22.58 MB)
003 VPN Segmentation and Firewalls.mp4 (5.05 MB)
004 Failure Modes.mp4 (17.74 MB)
005 Active vs Passive.mp4 (4.69 MB)
006 In-line vs Taps Monitoring and Port Mirroring.mp4 (29.27 MB)
007 Jump Servers and Proxies.mp4 (14.74 MB)
008 Intrusion Detection Systems (NIDS and NIPS).mp4 (36.98 MB)
009 Load Balancer.mp4 (22.62 MB)
010 Port Security and 802 1x Authentication.mp4 (35.06 MB)
011 Secure CommunicationAccess (VPN TLS and SSL).mp4 (39.24 MB)
012 Secure Access Service Edge.mp4 (32.7 MB)
001 Why Data Protection Strategies Are Important.mp4 (13.87 MB)
002 Data Types.mp4 (11.64 MB)
003 Data Classification.mp4 (25.19 MB)
004 Types of Data to Secure.mp4 (7.28 MB)
005 Data Sovereignty.mp4 (4.86 MB)
006 Geolocation Concerns.mp4 (34.72 MB)
007 Methods to Secure Data.mp4 (20.2 MB)
001 Why This Is Important.mp4 (19.64 MB)
002 High Availability.mp4 (11.99 MB)
003 Multipathing.mp4 (10.02 MB)
004 Recovery Site Options.mp4 (32.24 MB)
005 Vendor Technology Crypto and Controls Diversity.mp4 (29.28 MB)
006 Disaster Recovery Plan.mp4 (8.6 MB)
007 Business Continuity and Business Resumption Plan.mp4 (15.08 MB)
008 Incident Management Plan.mp4 (10.16 MB)
009 Data Retention.mp4 (15.34 MB)
010 Testing Types (Walkthroughs Communication Simulations Partial and Full).mp4 (22.75 MB)
011 Replication.mp4 (5.77 MB)
012 On-prem vs Cloud.mp4 (8.04 MB)
013 Backup Types (Full Differential and Incremental Backups).mp4 (13.18 MB)
014 Online vs Offline Backups.mp4 (6.93 MB)
015 Distance Considerations.mp4 (5.25 MB)
016 Non-persistance Snapshots and Live Boot Media.mp4 (5.16 MB)
017 Power Resiliency (UPS Generators Dual-supply and PDUs).mp4 (9.39 MB)
001 Domain Summary.mp4 (38.21 MB)
001 Course Overview.mp4 (41.1 MB)
001 Secure Baselines.mp4 (55.91 MB)
002 Hardening Targets.mp4 (12.11 MB)
003 Wireless Considerations (Site Surveys Heat Maps and WiFi Analyzers).mp4 (24.96 MB)
004 Wireless Band Selection and Width.mp4 (6.55 MB)
005 Mobile Device Management.mp4 (21.93 MB)
006 BYOD Concerns.mp4 (13.95 MB)
007 Cellular Device Security.mp4 (17.04 MB)
008 WiFi Security.mp4 (10.99 MB)
009 WPA3 vs WPA2.mp4 (12 MB)
010 RADIUS.mp4 (22.68 MB)
011 Static Code Analysis and Sandboxing.mp4 (31.7 MB)
001 Module Intro and Why Is This Important.mp4 (20.23 MB)
002 AcquisitionProcurement Process.mp4 (38.79 MB)
003 Assignment Ownership and Accounting.mp4 (10.42 MB)
004 Data Ownership and the Information Lifecycle.mp4 (17.2 MB)
005 Privacy Impacts and Data Classification.mp4 (34.69 MB)
006 Monitoring and Asset Tracking.mp4 (8.56 MB)
007 Data Disposal and Decommissioning.mp4 (261.91 MB)
008 Data Retention.mp4 (53.49 MB)
001 Module Intro and Important Key Takeaways.mp4 (18.14 MB)
002 Vulnerability Scanning.mp4 (23.44 MB)
003 Demo Vulnerability Scanning.mp4 (35.6 MB)
004 Static and Dynamic Code Analysis.mp4 (15.39 MB)
005 Package Monitoring.mp4 (5.65 MB)
006 Open Source Intelligence (OSINT).mp4 (22.08 MB)
007 Surface Deep and Dark Web and the Onion Routing Network.mp4 (36.78 MB)
008 Penetration Testing.mp4 (10.69 MB)
009 Lateral Movement.mp4 (36.39 MB)
010 Bug Bounty.mp4 (18.45 MB)
011 False Positives and False Negatives.mp4 (50.92 MB)
012 CVE and CVSS.mp4 (135.74 MB)
013 Validation and Reporting Considerations.mp4 (27.09 MB)
001 Module Intro and Important Takeaways.mp4 (21.55 MB)
002 Monitoring Computing Resources.mp4 (6 MB)
003 Gathering and Correlating Information.mp4 (19.52 MB)
004 Archiving Data.mp4 (19.38 MB)
005 Alert Response Remediation and Alert Tuning.mp4 (16.36 MB)
006 SCAP Components.mp4 (71.23 MB)
007 SIEM Event Correlation and Log Management.mp4 (20 MB)
008 Data Loss Prevention.mp4 (9.22 MB)
009 SNMP Traps.mp4 (16.87 MB)
010 NetFlowsFlowIPFIX.mp4 (55.57 MB)
001 Module Intro and Key Takeaways.mp4 (24.53 MB)
002 Firewalls and Security Zones.mp4 (23.17 MB)
003 Demo Securing Outbound Traffic with Azure Firewall.mp4 (65.94 MB)
004 IDSIPS.mp4 (5.52 MB)
005 Web Filters and Centralized Proxies.mp4 (31.78 MB)
006 Operating System Security GPOs and SELinux.mp4 (41.3 MB)
007 Implementation of Secure Protocols.mp4 (30.23 MB)
008 DNS Resolution and DNS Filtering.mp4 (26.07 MB)
009 DMARC SPIF and DKIM.mp4 (18.79 MB)
010 File Integrity Monitoring.mp4 (18.48 MB)
011 Network Access Control (NAC).mp4 (8.91 MB)
012 Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR).mp4 (16.84 MB)
001 Module Intro and Key Takeaways.mp4 (28.39 MB)
002 Provisioning and Deprovisioning Accounts.mp4 (14.03 MB)
003 Identity Proofing.mp4 (8.21 MB)
004 Active Directory.mp4 (8.58 MB)
005 IdP Example.mp4 (8.76 MB)
006 SAML.mp4 (8.86 MB)
007 OAuth and OpenID.mp4 (18.5 MB)
008 Attestation.mp4 (16.09 MB)
009 Access Controls (MAC DAC RBAC and ABAC).mp4 (25.46 MB)
010 Least Privilege.mp4 (10.88 MB)
011 Biometric Factors and Multifactor Authentication.mp4 (30.78 MB)
012 Password Best Practices and Password Managers.mp4 (27.31 MB)
013 Privileged Access Management Tools.mp4 (8.22 MB)
001 Module Intro and User ProvisioningDe-Provisioning.mp4 (23.8 MB)
002 Resource Provisioning Elasticity and Scalability.mp4 (102.74 MB)
003 Guardrails.mp4 (12.97 MB)
004 Security Groups and Automation.mp4 (22.1 MB)
005 Ticket Creation.mp4 (8.01 MB)
006 Continuous Integration and Testing.mp4 (55.46 MB)
007 API Gateway.mp4 (25.87 MB)
008 Benefits of Automation and Orchestration.mp4 (22.46 MB)
009 Other Considerations.mp4 (17.21 MB)
001 Module Intro Key Takeaways and Phases of Incident Response.mp4 (19.66 MB)
002 Preparation Detection Analysis Containment and Eradication.mp4 (49.83 MB)
003 Training and Exercise Types.mp4 (129.09 MB)
004 Root Cause Analysis (RCA).mp4 (17.1 MB)
005 Threat Hunting.mp4 (16.81 MB)
006 Intelligence and Threat Intelligence Lifecycles.mp4 (27.38 MB)
007 Cyber Kill Chain.mp4 (24.3 MB)
008 Digital Forensics Legal Hold Chain of Custody and Image Acquisition.mp4 (87.38 MB)
001 Module Intro and Why the Module Is Important.mp4 (12.86 MB)
002 Logs Data Sources and How They Aid in Investigations.mp4 (50.26 MB)
003 Investigation Scenarios.mp4 (76.22 MB)
001 Domain Summary.mp4 (44.3 MB)
001 Course Overview.mp4 (46.54 MB)
001 Module Intro Key Takeaways and General Guidelines.mp4 (26.36 MB)
002 Policies and Plans (AUP Information Security DRBC and Incident Response Plans).mp4 (55.21 MB)
003 Software Development Lifecycle (SDLC).mp4 (24.43 MB)
004 Standards.mp4 (7.65 MB)
005 Change Management.mp4 (9.58 MB)
006 OnboardingOffboard External Considerations and Use Cases for Monitoring.mp4 (18.86 MB)
007 Types of Governance Structures.mp4 (11.98 MB)
008 Data Owner Controller Processor and StewardCustodian.mp4 (11.07 MB)
001 Module Intro and Key Takeaways.mp4 (27.05 MB)
002 Risk Identification and Risk Assessment.mp4 (23.63 MB)
003 Qualitative and Quantitative Analysis.mp4 (35.41 MB)
004 Risk Calculation and Loss Calculation (ALE SLE and ARO).mp4 (32.49 MB)
005 Risk Register and Heat Maps.mp4 (8.62 MB)
006 Risk Awareness and Risk Management Conpcepts.mp4 (51.83 MB)
007 Risk Appetite (Expansionary Conservative and Neutral).mp4 (12.89 MB)
008 Business Impact Analysis and Key Terminology.mp4 (20.96 MB)
001 Module Intro and Key Takeaways.mp4 (30.84 MB)
002 Vendor Assessment and Selection.mp4 (17.99 MB)
003 Agreement Types (SLA MOU and MSA).mp4 (25.59 MB)
004 Vendor Monitoring.mp4 (6.84 MB)
005 Questionnaires.mp4 (11.63 MB)
006 Rules of Engagement.mp4 (11.25 MB)
001 Module Intro and Key Takeaways.mp4 (15.39 MB)
002 Compliance Reporting and Consequences of Non-compliance.mp4 (17.66 MB)
003 Non-compliance Real World Example.mp4 (19.7 MB)
004 Compliance Monitoring.mp4 (9.12 MB)
005 Privacy Compliance and Privacy Challenges.mp4 (26.29 MB)
006 Data Security and Compliance Challenges.mp4 (8.91 MB)
007 Regulatory Examples and GDPR.mp4 (16.5 MB)
008 GDPR Key Terminology and Data Processing Principles.mp4 (10.32 MB)
009 Grounds for Legal Processing.mp4 (153.11 MB)
010 Right to Be Forgotten.mp4 (14.53 MB)
001 Module Intro and Key Takeaways.mp4 (22.12 MB)
002 Attestation.mp4 (7.01 MB)
003 Internal Audits and Assessments.mp4 (11.09 MB)
004 External Audits and Assessments.mp4 (10.61 MB)
005 Penetration Testing.mp4 (67.67 MB)
001 Module Overview and Key Takeaways.mp4 (18.27 MB)
002 Phishing Campaigns and Recognizing a Phishing Attempt.mp4 (26.77 MB)
003 Responding to Reported Suspicious Emails.mp4 (16.22 MB)
004 Anomalous Behavior Recognition.mp4 (12.68 MB)
005 User Guidance and Training Topics.mp4 (20.86 MB)
006 Creating Culture and Awareness Training.mp4 (15.58 MB)
007 Devising the Plan Skills Training Delivery and Execution.mp4 (34.33 MB)
001 Domain Summary.mp4 (51.97 MB)]
Screenshot
[Image: KRw4D7TN_o.jpg]


Code:
https://turbobit.net/443qsb7vxzll.html
https://turbobit.net/jrq5g8tvpgi8.html
https://turbobit.net/h4cyv8sciint.html
https://turbobit.net/44y3lucj7ojj.html
https://turbobit.net/vsr7bubyejd2.html
https://turbobit.net/9gikxt78dgh7.html
https://turbobit.net/bc5h0fmgbgt3.html
Code:
https://rapidgator.net/file/e8d74d7aa517bd352bd512bc9250522a/
https://rapidgator.net/file/265f8eb9059c16e67cadbcd437bf0fcd/
https://rapidgator.net/file/26b4696b92faa0b2a1448eac3826fe85/
https://rapidgator.net/file/2cea4cbc60cb8a7c60791416b1a515fc/
https://rapidgator.net/file/3355607000573d2dbeb1c5b18d133e73/
https://rapidgator.net/file/4c5e9e7a7e3c9c9c991e6da953449f5c/
https://rapidgator.net/file/2ede1c21f5473a6167203158196b5fd9/
[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now
Download Now   Download Now


Telegram