CompTIA Security SY0 701 |
||
Name |
DOWNLOAD Copy Link | |
Total Size |
6.7 GB |
|
Total Files |
540 |
|
Last Seen |
2024-12-20 23:31 |
|
Hash |
2E2281B5A17A4640F91E48984A5ED5D9842EB133 |
/.../Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/ |
|
|
90.0 MB |
|
34.8 KB |
|
20.6 KB |
|
19.8 KB |
|
0.6 KB |
|
12.7 KB |
|
51.9 MB |
|
48.3 MB |
|
26.2 MB |
|
2.8 MB |
/ |
|
|
0.1 KB |
|
0.6 KB |
/.../Lesson 6 Explain Common Threat Vectors and Attack Surfaces/ |
|
|
36.2 KB |
|
85.4 MB |
|
25.1 KB |
|
23.9 KB |
|
0.7 KB |
|
15.0 KB |
|
59.0 MB |
|
53.6 MB |
|
29.3 MB |
|
3.3 MB |
/.../Lesson 1 Compare and Contrast Various Types of Security Controls/ |
|
|
0.7 KB |
|
32.9 KB |
|
20.1 KB |
|
13.9 KB |
|
74.5 MB |
|
46.6 MB |
|
31.4 MB |
|
3.0 MB |
/.../Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/ |
|
|
34.6 KB |
|
25.9 KB |
|
21.6 KB |
|
20.8 KB |
|
20.6 KB |
|
18.5 KB |
|
18.4 KB |
|
0.8 KB |
|
16.9 KB |
|
73.8 MB |
|
57.3 MB |
|
56.6 MB |
|
52.6 MB |
|
52.3 MB |
|
45.5 MB |
|
44.3 MB |
|
43.2 MB |
|
3.9 MB |
/.../Lesson 28 Given a Scenario, Implement Security Awareness Practices/ |
|
|
34.4 KB |
|
11.0 KB |
|
1.4 KB |
|
78.2 MB |
|
23.1 MB |
|
5.4 MB |
/.../Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/ |
|
|
33.8 KB |
|
26.0 KB |
|
25.5 KB |
|
1.3 KB |
|
24.5 KB |
|
19.9 KB |
|
84.5 MB |
|
12.6 KB |
|
10.5 KB |
|
63.8 MB |
|
60.7 MB |
|
51.1 MB |
|
46.6 MB |
|
32.4 MB |
|
26.8 MB |
|
5.8 MB |
/.../Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/ |
|
|
10.7 KB |
|
21.5 KB |
|
0.7 KB |
|
55.9 MB |
|
20.9 MB |
|
3.1 MB |
/.pad/ |
|
|
0.0 KB |
|
0.1 KB |
|
0.0 KB |
|
267.1 KB |
|
464.7 KB |
|
1.0 MB |
|
600.2 KB |
|
994.9 KB |
|
295.3 KB |
|
560.6 KB |
|
772.7 KB |
|
71.8 KB |
|
91.8 KB |
|
213.1 KB |
|
72.1 KB |
|
166.2 KB |
|
427.5 KB |
|
610.0 KB |
|
379.8 KB |
|
139.1 KB |
|
87.9 KB |
|
997.9 KB |
|
86.8 KB |
|
721.9 KB |
|
268.5 KB |
|
482.4 KB |
|
728.7 KB |
|
917.0 KB |
|
937.7 KB |
|
342.1 KB |
|
333.5 KB |
|
874.8 KB |
|
62.5 KB |
|
240.7 KB |
|
699.2 KB |
|
767.3 KB |
|
377.3 KB |
|
484.7 KB |
|
558.2 KB |
|
664.0 KB |
|
881.2 KB |
|
942.0 KB |
|
28.3 KB |
|
149.4 KB |
|
701.7 KB |
|
852.9 KB |
|
970.3 KB |
|
990.9 KB |
|
1.0 MB |
|
89.2 KB |
|
167.8 KB |
|
484.2 KB |
|
527.9 KB |
|
543.1 KB |
|
555.1 KB |
|
280.7 KB |
|
332.2 KB |
|
954.7 KB |
|
956.0 KB |
|
412.0 KB |
|
441.9 KB |
|
530.9 KB |
|
633.8 KB |
|
742.6 KB |
|
830.8 KB |
|
318.6 KB |
|
732.0 KB |
|
964.6 KB |
|
1.0 MB |
|
0.3 KB |
|
285.8 KB |
|
670.1 KB |
|
929.5 KB |
|
545.8 KB |
|
550.7 KB |
|
517.6 KB |
|
530.7 KB |
|
623.1 KB |
|
724.0 KB |
|
93.8 KB |
|
126.7 KB |
|
566.8 KB |
|
801.7 KB |
|
199.2 KB |
|
768.4 KB |
|
809.6 KB |
|
879.4 KB |
|
444.9 KB |
|
502.2 KB |
|
52.0 KB |
|
215.4 KB |
|
113.7 KB |
|
282.9 KB |
|
695.6 KB |
|
966.6 KB |
|
871.9 KB |
|
1.0 MB |
|
496.5 KB |
|
159.6 KB |
|
468.7 KB |
|
1.0 MB |
|
9.0 KB |
|
221.3 KB |
|
531.6 KB |
|
1.0 MB |
|
143.2 KB |
|
69.9 KB |
|
139.5 KB |
|
694.9 KB |
|
422.0 KB |
|
20.2 KB |
|
113.4 KB |
|
283.8 KB |
|
593.4 KB |
|
294.1 KB |
|
1.0 MB |
|
432.9 KB |
|
457.1 KB |
|
666.8 KB |
|
3.3 KB |
|
94.0 KB |
|
530.7 KB |
|
177.1 KB |
|
13.7 KB |
|
159.4 KB |
|
131.6 KB |
|
723.7 KB |
|
43.6 KB |
|
429.8 KB |
|
850.4 KB |
|
78.0 KB |
|
470.6 KB |
|
794.7 KB |
|
1.0 MB |
|
29.1 KB |
|
310.3 KB |
|
380.3 KB |
|
737.8 KB |
|
741.6 KB |
|
181.3 KB |
|
768.8 KB |
|
850.6 KB |
|
925.7 KB |
|
662.6 KB |
|
675.0 KB |
|
688.4 KB |
|
950.0 KB |
|
520.5 KB |
|
888.2 KB |
|
448.0 KB |
|
1.0 MB |
|
461.7 KB |
|
491.0 KB |
|
723.2 KB |
|
845.7 KB |
|
8.9 KB |
|
669.5 KB |
|
685.7 KB |
|
743.1 KB |
|
953.7 KB |
|
44.4 KB |
|
309.6 KB |
|
311.5 KB |
|
318.0 KB |
|
386.1 KB |
|
403.0 KB |
|
573.1 KB |
|
603.1 KB |
|
641.4 KB |
|
807.3 KB |
|
875.5 KB |
|
899.0 KB |
|
955.0 KB |
|
35.4 KB |
|
80.0 KB |
|
112.3 KB |
|
128.9 KB |
|
198.5 KB |
|
281.0 KB |
|
281.5 KB |
|
304.8 KB |
/.../Lesson 2 Summarize Fundamental Security Concepts/ |
|
|
0.8 KB |
|
28.7 KB |
|
28.3 KB |
|
23.2 KB |
|
22.0 KB |
|
18.7 KB |
|
15.0 KB |
|
67.5 MB |
|
60.9 MB |
|
53.9 MB |
|
50.4 MB |
|
45.0 MB |
|
38.1 MB |
|
3.4 MB |
/.../Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/ |
|
|
32.3 KB |
|
22.9 KB |
|
19.6 KB |
|
16.8 KB |
|
79.0 MB |
|
13.4 KB |
|
0.7 KB |
|
52.8 MB |
|
51.9 MB |
|
43.8 MB |
|
35.5 MB |
|
3.6 MB |
/.../Lesson 23 Summarize Effective Security Governance/ |
|
|
29.8 KB |
|
27.0 KB |
|
14.1 KB |
|
0.7 KB |
|
69.1 MB |
|
67.7 MB |
|
28.0 MB |
|
3.2 MB |
/.../Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/ |
|
|
29.8 KB |
|
27.2 KB |
|
22.6 KB |
|
18.1 KB |
|
15.4 KB |
|
0.8 KB |
|
72.1 MB |
|
68.1 MB |
|
58.4 MB |
|
41.5 MB |
|
33.5 MB |
|
3.9 MB |
/.../Lesson 16 Explain Various Activities Associated with Vulnerability Management/ |
|
|
28.3 KB |
|
21.4 KB |
|
13.1 KB |
|
0.7 KB |
|
73.5 MB |
|
56.8 MB |
|
28.8 MB |
|
3.1 MB |
/.../Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/ |
|
|
28.2 KB |
|
27.5 KB |
|
26.9 KB |
|
24.9 KB |
|
21.1 KB |
|
17.4 KB |
|
16.4 KB |
|
0.8 KB |
|
71.8 MB |
|
69.0 MB |
|
60.1 MB |
|
54.0 MB |
|
49.8 MB |
|
45.0 MB |
|
41.4 MB |
|
3.8 MB |
/.../Lesson 26 Summarize Elements of Effective Security Compliance/ |
|
|
28.1 KB |
|
16.1 KB |
|
9.1 KB |
|
0.9 KB |
|
71.6 MB |
|
42.1 MB |
|
17.8 MB |
|
3.6 MB |
/.../Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/ |
|
|
27.6 KB |
|
18.1 KB |
|
13.4 KB |
|
0.9 KB |
|
68.0 MB |
|
48.2 MB |
|
27.3 MB |
|
4.1 MB |
/.../Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/ |
|
|
27.4 KB |
|
22.4 KB |
|
21.2 KB |
|
14.6 KB |
|
1.0 KB |
|
66.7 MB |
|
51.0 MB |
|
49.9 MB |
|
30.0 MB |
|
4.5 MB |
/.../Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/ |
|
|
0.7 KB |
|
20.9 KB |
|
20.3 KB |
|
15.7 KB |
|
52.3 MB |
|
48.6 MB |
|
33.0 MB |
|
2.9 MB |
/.../Lesson 24 Explain Elements of the Risk Management Process/ |
|
|
26.1 KB |
|
25.0 KB |
|
24.4 KB |
|
19.7 KB |
|
16.0 KB |
|
0.9 KB |
|
69.1 MB |
|
56.4 MB |
|
54.8 MB |
|
51.9 MB |
|
37.8 MB |
|
3.9 MB |
/.../Lesson 5 Compare and Contrast Common Threat Actors and Motivations/ |
|
|
26.1 KB |
|
0.7 KB |
|
16.3 KB |
|
11.1 KB |
|
59.3 MB |
|
39.8 MB |
|
22.9 MB |
|
3.0 MB |
/.../Module 1 General Security Concepts/ |
|
|
2.1 KB |
|
8.9 MB |
/.../Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/ |
|
|
24.7 KB |
|
23.4 KB |
|
22.2 KB |
|
20.7 KB |
|
0.8 KB |
|
19.8 KB |
|
17.1 KB |
|
16.7 KB |
|
13.6 KB |
|
58.8 MB |
|
50.4 MB |
|
49.6 MB |
|
48.3 MB |
|
45.6 MB |
|
39.6 MB |
|
36.9 MB |
|
30.8 MB |
|
3.8 MB |
/.../Lesson 21 Explain Appropriate Incident Response Activities/ |
|
|
24.3 KB |
|
23.9 KB |
|
21.8 KB |
|
21.7 KB |
|
20.1 KB |
|
19.6 KB |
|
1.1 KB |
|
61.8 MB |
|
53.4 MB |
|
52.5 MB |
|
52.5 MB |
|
49.7 MB |
|
49.5 MB |
|
4.6 MB |
/.../Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/ |
|
|
23.8 KB |
|
23.2 KB |
|
21.5 KB |
|
20.3 KB |
|
20.0 KB |
|
18.3 KB |
|
17.6 KB |
|
14.4 KB |
|
1.0 KB |
|
59.5 MB |
|
58.9 MB |
|
51.9 MB |
|
49.9 MB |
|
47.9 MB |
|
47.3 MB |
|
43.3 MB |
|
33.6 MB |
|
4.3 MB |
/.../Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/ |
|
|
22.2 KB |
|
18.9 KB |
|
16.1 KB |
|
0.8 KB |
|
54.0 MB |
|
45.4 MB |
|
38.7 MB |
|
3.6 MB |
/.../Lesson 27 Explain Types and Purposes of Audits and Assessment/ |
|
|
21.9 KB |
|
19.5 KB |
|
18.9 KB |
|
16.3 KB |
|
1.1 KB |
|
53.3 MB |
|
49.0 MB |
|
47.6 MB |
|
33.3 MB |
|
4.6 MB |
/.../Lesson 7 Explain Various Types of Vulnerabilities/ |
|
|
0.6 KB |
|
17.0 KB |
|
16.7 KB |
|
15.4 KB |
|
38.5 MB |
|
36.7 MB |
|
32.5 MB |
|
2.9 MB |
/.../Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/ |
|
|
20.5 KB |
|
1.3 KB |
|
18.3 KB |
|
15.5 KB |
|
52.5 MB |
|
45.6 MB |
|
31.3 MB |
|
5.2 MB |
/.../Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/ |
|
|
20.3 KB |
|
9.1 KB |
|
1.3 KB |
|
54.1 MB |
|
19.1 MB |
|
5.6 MB |
/.../Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/ |
|
|
20.0 KB |
|
13.6 KB |
|
0.8 KB |
|
44.5 MB |
|
29.1 MB |
|
3.3 MB |
/.../Module 5 Closer Look Labs/ |
|
|
14.1 KB |
|
9.5 KB |
|
7.6 KB |
|
6.9 KB |
|
21.3 MB |
|
19.5 MB |
|
14.3 MB |
|
7.9 MB |
/.../Module 4 Closer Look Labs/ |
|
|
13.2 KB |
|
10.0 KB |
|
9.3 KB |
|
9.1 KB |
|
8.8 KB |
|
8.2 KB |
|
5.3 KB |
|
29.2 MB |
|
26.8 MB |
|
26.6 MB |
|
23.9 MB |
|
21.9 MB |
|
18.4 MB |
|
10.7 MB |
/Introduction/ |
|
|
11.0 KB |
|
53.6 MB |
/.../Module 3 Closer Look Labs/ |
|
|
10.6 KB |
|
7.5 KB |
|
5.7 KB |
|
35.2 MB |
|
17.5 MB |
|
11.8 MB |
/.../Module 2 Closer Look Labs/ |
|
|
9.8 KB |
|
9.0 KB |
|
6.7 KB |
|
4.6 KB |
|
4.5 KB |
|
17.8 MB |
|
13.9 MB |
|
11.4 MB |
|
9.8 MB |
|
8.5 MB |
/.../Module 1 Closer Look Labs/ |
|
|
9.3 KB |
|
7.5 KB |
|
5.7 KB |
|
25.1 MB |
|
18.1 MB |
|
10.6 MB |
/.../Module 4 Security Operations/ |
|
|
2.4 KB |
|
10.8 MB |
/.../Module 2 Threats, Vulnerabilities and Mitigations/ |
|
|
2.4 KB |
|
9.8 MB |
/.../Module 5 Security Program Management and Oversight/ |
|
|
2.2 KB |
|
9.5 MB |
/.../Module 3 Security Architecture/ |
|
|
1.7 KB |
|
7.4 MB |
/.../Lesson 29 Attaining Your SY0-701 Security+ Certification/ |
|
|
36.2 MB |
|
24.6 MB |
002. 29.1 Understanding the SY0-701 Security+ Exam Structure.mp4 |
18.8 MB |
|
9.8 MB |
|
2.9 MB |
/Summary/ |
|
|
5.8 MB |
/.../Module 6 Preparing for the Exam/ |
|
|
1.9 MB |
Total files 540 |
Copyright © 2024 FileMood.com