FileMood

Download [ CourseBoat.com ] PluralSight - CompTIA Security + (SY0-601) (Path)

CourseBoat com PluralSight CompTIA Security SY0 601 Path

Name

[ CourseBoat.com ] PluralSight - CompTIA Security + (SY0-601) (Path)

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.9 GB

Total Files

1637

Last Seen

2025-07-18 23:41

Hash

93EDAC4596FE07B5FA78D4976959573435D902F9

/

Get Bonus Downloads Here.url

0.2 KB

/.../02. Understanding Security Concepts in an Enterprise Environment/

01. Module Intro.mp4

3.2 MB

01. Module Intro.vtt

3.0 KB

02. Configuration Management.mp4

7.9 MB

02. Configuration Management.vtt

7.2 KB

03. Diagrams.mp4

4.7 MB

03. Diagrams.vtt

2.2 KB

04. Baseline Configuration.mp4

3.8 MB

04. Baseline Configuration.vtt

3.8 KB

05. IP Address Schema.mp4

3.9 MB

05. IP Address Schema.vtt

4.0 KB

06. Data Sovereignty.mp4

2.6 MB

06. Data Sovereignty.vtt

2.6 KB

07. Data Loss Prevention (DLP).mp4

4.0 MB

07. Data Loss Prevention (DLP).vtt

4.4 KB

08. Types of Data to Secure.mp4

2.5 MB

08. Types of Data to Secure.vtt

2.2 KB

09. Data Masking.mp4

6.2 MB

09. Data Masking.vtt

7.9 KB

10. Tokenization.mp4

5.0 MB

10. Tokenization.vtt

4.1 KB

11. Digital Rights Management (DRM).mp4

1.6 MB

11. Digital Rights Management (DRM).vtt

1.8 KB

12. Hardware Based Encryption (TPM and HSM).mp4

3.1 MB

12. Hardware Based Encryption (TPM and HSM).vtt

2.5 KB

13. Geographical Considerations.mp4

3.1 MB

13. Geographical Considerations.vtt

2.8 KB

14. Cloud Access Security Broker (CASB).mp4

2.2 MB

14. Cloud Access Security Broker (CASB).vtt

2.0 KB

15. Security-as-a-Service (SECaaS).mp4

2.1 MB

15. Security-as-a-Service (SECaaS).vtt

2.0 KB

16. Differences between CASB and SECaaS.mp4

2.3 MB

16. Differences between CASB and SECaaS.vtt

2.0 KB

17. Recovery.mp4

2.7 MB

17. Recovery.vtt

2.9 KB

18. Secure Protocols and SSLTLS Inspection.mp4

3.3 MB

18. Secure Protocols and SSLTLS Inspection.vtt

2.8 KB

19. Hashing.mp4

3.4 MB

19. Hashing.vtt

3.2 KB

20. API Considerations and API Gateways.mp4

5.1 MB

20. API Considerations and API Gateways.vtt

4.0 KB

21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).mp4

5.4 MB

21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).vtt

5.6 KB

22. Disaster Area Example.mp4

3.3 MB

22. Disaster Area Example.vtt

3.3 KB

23. Honeypots and Honeyfiles.mp4

2.2 MB

23. Honeypots and Honeyfiles.vtt

1.9 KB

24. Honeynets.mp4

2.1 MB

24. Honeynets.vtt

1.9 KB

25. Fake Telemetry.mp4

2.3 MB

25. Fake Telemetry.vtt

2.3 KB

26. DNS Sinkhole.mp4

5.6 MB

26. DNS Sinkhole.vtt

3.6 KB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/02/

understanding-security-concepts-in-an-enterprise-environment-slides.pdf

7.7 MB

/.../03. Understanding Virtualization and Cloud Computing/

01. Module Intro.mp4

1.4 MB

01. Module Intro.vtt

1.4 KB

02. Cloud Storage.mp4

3.5 MB

02. Cloud Storage.vtt

4.6 KB

03. Cloud Computing.mp4

2.1 MB

03. Cloud Computing.vtt

2.7 KB

04. [X] as a Service.mp4

1.1 MB

04. [X] as a Service.vtt

1.1 KB

05. Infrastructure as a Service (IaaS).mp4

3.2 MB

05. Infrastructure as a Service (IaaS).vtt

3.1 KB

06. IaaS and Automation.mp4

2.9 MB

06. IaaS and Automation.vtt

3.1 KB

07. Platform as a Service (PaaS).mp4

3.5 MB

07. Platform as a Service (PaaS).vtt

3.4 KB

08. Software as a Service (SaaS).mp4

2.1 MB

08. Software as a Service (SaaS).vtt

2.3 KB

09. IaaS, PaaS, and SaaS Differentiators.mp4

2.1 MB

09. IaaS, PaaS, and SaaS Differentiators.vtt

1.9 KB

10. Types of Clouds.mp4

1.6 MB

10. Types of Clouds.vtt

1.8 KB

11. Managed Service Providers (MSP).mp4

7.9 MB

11. Managed Service Providers (MSP).vtt

8.3 KB

12. Fog Computing.mp4

5.0 MB

12. Fog Computing.vtt

5.1 KB

13. Edge Computing.mp4

1.0 MB

13. Edge Computing.vtt

0.9 KB

14. VDI.mp4

7.9 MB

14. VDI.vtt

8.3 KB

15. Virtualization.mp4

8.3 MB

15. Virtualization.vtt

7.0 KB

16. Containers.mp4

10.2 MB

16. Containers.vtt

10.9 KB

17. Microservices and APIs.mp4

6.7 MB

17. Microservices and APIs.vtt

6.9 KB

18. Infrastructure as Code (IAC).mp4

1.5 MB

18. Infrastructure as Code (IAC).vtt

1.4 KB

19. Software Defined Networking (SDN).mp4

2.1 MB

19. Software Defined Networking (SDN).vtt

1.8 KB

20. Software Defined Visibility (SDV).mp4

1.6 MB

20. Software Defined Visibility (SDV).vtt

1.1 KB

21. Serverless Architecture.mp4

5.0 MB

21. Serverless Architecture.vtt

3.3 KB

22. IaaS, PaaS, FaaS, and SaaS Differentiators.mp4

2.0 MB

22. IaaS, PaaS, FaaS, and SaaS Differentiators.vtt

1.8 KB

23. Service Integrations and Resource Policies.mp4

2.6 MB

23. Service Integrations and Resource Policies.vtt

2.8 KB

24. Transit Gateway.mp4

1.4 MB

24. Transit Gateway.vtt

1.2 KB

25. VM Sprawl Avoidance.mp4

3.5 MB

25. VM Sprawl Avoidance.vtt

2.8 KB

26. VM Escape.mp4

2.5 MB

26. VM Escape.vtt

2.8 KB

27. Module Review.mp4

796.5 KB

27. Module Review.vtt

1.0 KB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/03/

understanding-virtualization-and-cloud-computing-slides.pdf

4.0 MB

/.../04. Implementing Secure Application Development, Deployment, and Automation/

01. Module Intro.mp4

1.7 MB

01. Module Intro.vtt

1.7 KB

02. Environments (Dev, Test, Staging, and Production).mp4

5.9 MB

02. Environments (Dev, Test, Staging, and Production).vtt

7.3 KB

03. Environment Example.mp4

6.5 MB

03. Environment Example.vtt

4.6 KB

04. Provisioning and Deprovisioning.mp4

3.8 MB

04. Provisioning and Deprovisioning.vtt

4.6 KB

05. Integrity Measurement.mp4

3.3 MB

05. Integrity Measurement.vtt

3.7 KB

06. Static Code Analysis.mp4

3.8 MB

06. Static Code Analysis.vtt

4.3 KB

07. Secure Coding Techniques.mp4

14.9 MB

07. Secure Coding Techniques.vtt

12.9 KB

08. Security Automation.mp4

4.5 MB

08. Security Automation.vtt

4.9 KB

09. Continuous Monitoring and Validation.mp4

2.1 MB

09. Continuous Monitoring and Validation.vtt

2.6 KB

10. Continuous Integration.mp4

3.2 MB

10. Continuous Integration.vtt

3.2 KB

11. Continuous Delivery and Continuous Development.mp4

3.8 MB

11. Continuous Delivery and Continuous Development.vtt

3.8 KB

12. OWASP.mp4

963.5 KB

12. OWASP.vtt

1.1 KB

13. Software Diversity, Compiler, and Binary.mp4

2.8 MB

13. Software Diversity, Compiler, and Binary.vtt

2.7 KB

14. Elasticity and Scalability.mp4

1.9 MB

14. Elasticity and Scalability.vtt

2.2 KB

15. Version Control.mp4

4.4 MB

15. Version Control.vtt

4.4 KB

/.../05. Understanding Authentication and Authorizations Methods/

01. Module Intro.mp4

1.4 MB

01. Module Intro.vtt

1.4 KB

02. Directory Services.mp4

2.9 MB

02. Directory Services.vtt

2.9 KB

03. Usernames.mp4

2.0 MB

03. Usernames.vtt

1.7 KB

04. Federation.mp4

1.9 MB

04. Federation.vtt

1.8 KB

05. Transitive Trust Authentication.mp4

1.9 MB

05. Transitive Trust Authentication.vtt

1.8 KB

06. Attestation.mp4

1.4 MB

06. Attestation.vtt

1.2 KB

07. Time-Based One-Time Password (TOTP).mp4

2.6 MB

07. Time-Based One-Time Password (TOTP).vtt

2.9 KB

08. HMAC-Based One-Time Password (HOTP).mp4

1.5 MB

08. HMAC-Based One-Time Password (HOTP).vtt

1.5 KB

09. SMS Authentication.mp4

2.0 MB

09. SMS Authentication.vtt

1.7 KB

10. Tokens.mp4

2.0 MB

10. Tokens.vtt

2.1 KB

11. Static Codes.mp4

1.4 MB

11. Static Codes.vtt

1.3 KB

12. Authentication Applications.mp4

2.1 MB

12. Authentication Applications.vtt

1.8 KB

13. Push Notifications.mp4

1.7 MB

13. Push Notifications.vtt

1.8 KB

14. Smart Cards.mp4

1.6 MB

14. Smart Cards.vtt

1.8 KB

15. Proximity Cards.mp4

2.1 MB

15. Proximity Cards.vtt

2.3 KB

16. Personal Identification Verification Card (PIV).mp4

1.9 MB

16. Personal Identification Verification Card (PIV).vtt

1.4 KB

17. Common Access Card.mp4

1.8 MB

17. Common Access Card.vtt

1.4 KB

18. Biometric Factors.mp4

1.4 MB

18. Biometric Factors.vtt

2.1 KB

19. Facial Recognition.mp4

3.0 MB

19. Facial Recognition.vtt

2.9 KB

20. Vein and Gait Analysis.mp4

3.8 MB

20. Vein and Gait Analysis.vtt

2.9 KB

21. Efficacy Rates.mp4

1.7 MB

21. Efficacy Rates.vtt

2.2 KB

22. Identification vs. Authentication vs. Authorization.mp4

2.1 MB

22. Identification vs. Authentication vs. Authorization.vtt

2.1 KB

23. Multifactor Authentication.mp4

1.7 MB

23. Multifactor Authentication.vtt

2.0 KB

24. Authentication Factors.mp4

3.5 MB

24. Authentication Factors.vtt

3.7 KB

25. Authorization.mp4

1.7 MB

25. Authorization.vtt

1.8 KB

26. Authentication Factors.mp4

1.9 MB

26. Authentication Factors.vtt

2.2 KB

27. Authentication, Authorization, and Accounting (AAA).mp4

1.3 MB

27. Authentication, Authorization, and Accounting (AAA).vtt

1.3 KB

28. On-prem vs. Cloud Requirements.mp4

4.6 MB

28. On-prem vs. Cloud Requirements.vtt

5.0 KB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/05/

understanding-authentication-and-authorizations-methods-slides.pdf

3.2 MB

/.../06. Implementing Cybersecurity Resilience/

01. Module Intro.mp4

3.7 MB

01. Module Intro.vtt

4.3 KB

02. Geographically Disperse.mp4

1.6 MB

02. Geographically Disperse.vtt

1.6 KB

03. Geographical Dispersal of Assets.mp4

2.4 MB

03. Geographical Dispersal of Assets.vtt

2.4 KB

04. RAID.mp4

5.4 MB

04. RAID.vtt

4.8 KB

05. Multipath.mp4

3.8 MB

05. Multipath.vtt

3.6 KB

06. Load Balancer.mp4

2.4 MB

06. Load Balancer.vtt

2.1 KB

07. Power Resiliency.mp4

4.0 MB

07. Power Resiliency.vtt

3.8 KB

08. Replication.mp4

4.4 MB

08. Replication.vtt

3.7 KB

09. On-prem vs. Cloud.mp4

3.3 MB

09. On-prem vs. Cloud.vtt

2.9 KB

10. Backup Plans Policies.mp4

1.9 MB

10. Backup Plans Policies.vtt

2.2 KB

11. Backup Execution Frequency.mp4

2.3 MB

11. Backup Execution Frequency.vtt

2.3 KB

12. Backup Types.mp4

5.8 MB

12. Backup Types.vtt

6.2 KB

13. Backup Environments.mp4

2.1 MB

13. Backup Environments.vtt

2.5 KB

14. Online vs. Offline Backups.mp4

2.6 MB

14. Online vs. Offline Backups.vtt

2.7 KB

15. Backups - Distance Considerations.mp4

3.6 MB

15. Backups - Distance Considerations.vtt

3.8 KB

16. Non-persistence, Snapshots, and Live Boot Media.mp4

3.5 MB

16. Non-persistence, Snapshots, and Live Boot Media.vtt

3.9 KB

17. High Availability.mp4

3.6 MB

17. High Availability.vtt

4.3 KB

18. Redundancy.mp4

2.8 MB

18. Redundancy.vtt

2.9 KB

19. Fault Tolerant Hardware.mp4

1.4 MB

19. Fault Tolerant Hardware.vtt

1.4 KB

20. Technology and Vendor Diversity.mp4

4.1 MB

20. Technology and Vendor Diversity.vtt

3.0 KB

21. Crypto and Control Diversity.mp4

4.3 MB

21. Crypto and Control Diversity.vtt

4.6 KB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/06/

implementing-cybersecurity-resilience-slides.pdf

5.8 MB

/.../07. Recognizing Security Implications of Embedded and Specialized Systems/

01. Module Intro.mp4

2.0 MB

01. Module Intro.vtt

2.3 KB

02. Module Goal.mp4

2.1 MB

02. Module Goal.vtt

2.7 KB

03. Embedded Systems.mp4

1.9 MB

03. Embedded Systems.vtt

1.7 KB

04. Embedded Systems Examples.mp4

3.5 MB

04. Embedded Systems Examples.vtt

3.1 KB

05. SCADA ICS.mp4

9.9 MB

05. SCADA ICS.vtt

7.9 KB

06. SCADA Security Concerns.mp4

5.7 MB

06. SCADA Security Concerns.vtt

5.3 KB

07. Smart Devices IoT.mp4

4.2 MB

07. Smart Devices IoT.vtt

4.5 KB

08. Smart Devices IoT Weak Defaults.mp4

2.0 MB

08. Smart Devices IoT Weak Defaults.vtt

1.9 KB

09. Special Purpose Devices.mp4

2.0 MB

09. Special Purpose Devices.vtt

1.8 KB

10. Vehicles.mp4

2.8 MB

10. Vehicles.vtt

2.9 KB

11. Voice over IP (VoIP).mp4

5.3 MB

11. Voice over IP (VoIP).vtt

3.9 KB

12. HVAC.mp4

4.0 MB

12. HVAC.vtt

4.9 KB

13. AircraftUAV.mp4

3.1 MB

13. AircraftUAV.vtt

3.4 KB

14. PrintersMFDs.mp4

3.1 MB

14. PrintersMFDs.vtt

4.4 KB

15. Real Time Operating Systems (RTOS).mp4

1.5 MB

15. Real Time Operating Systems (RTOS).vtt

1.6 KB

16. Surveillance Systems.mp4

2.8 MB

16. Surveillance Systems.vtt

3.1 KB

17. System on a Chip (SoC).mp4

1.9 MB

17. System on a Chip (SoC).vtt

2.2 KB

18. 5G Networks and Security Concerns.mp4

3.2 MB

18. 5G Networks and Security Concerns.vtt

2.8 KB

19. Narrow-band and Baseband Radio.mp4

1.1 MB

19. Narrow-band and Baseband Radio.vtt

1.2 KB

20. Zigbee.mp4

5.1 MB

20. Zigbee.vtt

4.6 KB

21. Constraints.mp4

4.6 MB

21. Constraints.vtt

4.6 KB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/07/

recognizing-security-implications-of-embedded-and-specialized-systems-slides.pdf

3.5 MB

/.../08. Understanding the Importance of Physical Security Controls/

01. Module Intro.mp4

1.4 MB

01. Module Intro.vtt

1.4 KB

02. Barricades.mp4

3.7 MB

02. Barricades.vtt

2.1 KB

03. Mantraps.mp4

1.4 MB

03. Mantraps.vtt

1.4 KB

04. Badges.mp4

3.0 MB

04. Badges.vtt

3.4 KB

05. Alarms.mp4

2.7 MB

05. Alarms.vtt

3.1 KB

06. Lighting and Signs.mp4

3.8 MB

06. Lighting and Signs.vtt

3.3 KB

07. Cameras and Video Surveillance.mp4

3.0 MB

07. Cameras and Video Surveillance.vtt

2.9 KB

08. Guards.mp4

1.2 MB

08. Guards.vtt

1.1 KB

09. Robot Sentries.mp4

2.5 MB

09. Robot Sentries.vtt

2.6 KB

10. Reception.mp4

1.9 MB

10. Reception.vtt

1.5 KB

11. Two Person Integrity (TPI) Control.mp4

1.7 MB

11. Two Person Integrity (TPI) Control.vtt

1.3 KB

12. Hardware Locks.mp4

1.2 MB

12. Hardware Locks.vtt

1.5 KB

13. Biometrics.mp4

1.7 MB

13. Biometrics.vtt

1.6 KB

14. Cable Locks, Safes, and Locking Cabinets.mp4

2.0 MB

14. Cable Locks, Safes, and Locking Cabinets.vtt

2.6 KB

15. USB Data Blocker.mp4

2.2 MB

15. USB Data Blocker.vtt

2.0 KB

16. Fencing.mp4

4.6 MB

16. Fencing.vtt

2.8 KB

17. Fire Suppression.mp4

6.3 MB

17. Fire Suppression.vtt

5.2 KB

18. Motion Detection Infrared.mp4

1.5 MB

18. Motion Detection Infrared.vtt

1.5 KB

19. Proximity Readers.mp4

2.1 MB

19. Proximity Readers.vtt

2.1 KB

20. Drones UAV.mp4

1.7 MB

20. Drones UAV.vtt

1.7 KB

21. Logs.mp4

1.3 MB

21. Logs.vtt

1.5 KB

22. Air Gaps.mp4

5.8 MB

22. Air Gaps.vtt

6.4 KB

23. Demilitarized Zone (DMZ).mp4

7.1 MB

23. Demilitarized Zone (DMZ).vtt

8.3 KB

24. Protected Distribution System (PDS).mp4

8.4 MB

24. Protected Distribution System (PDS).vtt

7.2 KB

25. Hot and Cold Aisles.mp4

5.1 MB

25. Hot and Cold Aisles.vtt

4.4 KB

26. Non-Digital and Digital Data Destruction.mp4

2.1 MB

26. Non-Digital and Digital Data Destruction.vtt

2.9 KB

27. Shredding.mp4

1.3 MB

27. Shredding.vtt

1.7 KB

28. Pulping and Pulverizing.mp4

2.4 MB

28. Pulping and Pulverizing.vtt

2.5 KB

29. Deguassing.mp4

3.1 MB

29. Deguassing.vtt

3.0 KB

30. Purging.mp4

2.1 MB

30. Purging.vtt

1.1 KB

31. Wiping.mp4

4.4 MB

31. Wiping.vtt

4.7 KB

32. Module Review.mp4

842.9 KB

32. Module Review.vtt

1.1 KB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/08/

understanding-the-importance-of-physical-security-controls-slides.pdf

8.0 MB

/.../09. Understanding the Basics of Cryptographic Concepts/

01. Module Intro.mp4

1.3 MB

01. Module Intro.vtt

1.3 KB

02. Why You Should Care.mp4

1.5 MB

02. Why You Should Care.vtt

1.5 KB

03. Cryptographic Terminology and History.mp4

6.1 MB

03. Cryptographic Terminology and History.vtt

6.7 KB

04. Vigenere Table.mp4

10.7 MB

04. Vigenere Table.vtt

6.1 KB

05. Digital Signatures.mp4

2.6 MB

05. Digital Signatures.vtt

2.5 KB

06. Key Stretching.mp4

6.3 MB

06. Key Stretching.vtt

6.2 KB

07. Hashing.mp4

4.6 MB

07. Hashing.vtt

4.0 KB

08. In-band vs. Out-of-band Key Exchange.mp4

2.7 MB

08. In-band vs. Out-of-band Key Exchange.vtt

2.9 KB

09. Elliptic Curve Cryptography (ECC).mp4

2.0 MB

09. Elliptic Curve Cryptography (ECC).vtt

2.2 KB

10. Perfect Forward Secrecy.mp4

2.8 MB

10. Perfect Forward Secrecy.vtt

2.1 KB

11. Quantum Communications.mp4

8.7 MB

11. Quantum Communications.vtt

6.1 KB

12. Quantum Computing.mp4

2.6 MB

12. Quantum Computing.vtt

2.3 KB

13. Post Quantum.mp4

1.8 MB

13. Post Quantum.vtt

1.8 KB

14. Ephemeral Key.mp4

1.7 MB

14. Ephemeral Key.vtt

1.2 KB

15. Cipher Modes.mp4

1.2 MB

15. Cipher Modes.vtt

1.2 KB

16. XOR Function.mp4

2.4 MB

16. XOR Function.vtt

2.0 KB

17. Cryptographic Methods and Design.mp4

7.0 MB

17. Cryptographic Methods and Design.vtt

5.9 KB

18. Blockchain.mp4

8.2 MB

18. Blockchain.vtt

7.0 KB

19. Fundamental Differences and Encryption Methods.mp4

5.1 MB

19. Fundamental Differences and Encryption Methods.vtt

4.4 KB

20. Session Keys.mp4

1.6 MB

20. Session Keys.vtt

1.6 KB

21. Asymmetric Encryption.mp4

8.1 MB

21. Asymmetric Encryption.vtt

6.2 KB

22. Lightweight Encryption.mp4

1.8 MB

22. Lightweight Encryption.vtt

1.6 KB

23. Steganography.mp4

4.7 MB

23. Steganography.vtt

4.0 KB

24. Homomorphic Encryption.mp4

3.5 MB

24. Homomorphic Encryption.vtt

3.9 KB

25. Common Use Cases.mp4

6.3 MB

25. Common Use Cases.vtt

7.1 KB

26. Cipher Suites.mp4

2.6 MB

26. Cipher Suites.vtt

3.3 KB

27. Limitations.mp4

3.1 MB

27. Limitations.vtt

4.5 KB

28. Random and Pseudorandom Number Generators (PRNG).mp4

3.7 MB

28. Random and Pseudorandom Number Generators (PRNG).vtt

2.2 KB

29. Quantum Random Number Generators (QRNG).mp4

1.6 MB

29. Quantum Random Number Generators (QRNG).vtt

2.0 KB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/09/

understanding-the-basics-of-cryptographic-concepts-slides.pdf

8.7 MB

/.../Architecture and Design for CompTIA Security+ By Christopher Rees/1. Course Overview/

1. Course Overview.mp4

4.1 MB

1. Course Overview.vtt

3.1 KB

/.../02. Comparing Different Types of Social Engineering Techniques/

01. Module Overview.mp4

3.2 MB

01. Module Overview.vtt

2.8 KB

02. What Is Social Engineering.mp4

3.2 MB

02. What Is Social Engineering.vtt

3.7 KB

03. Phishing.mp4

6.7 MB

03. Phishing.vtt

3.5 KB

04. Types of Phishing.mp4

6.0 MB

04. Types of Phishing.vtt

6.5 KB

05. Vishing.mp4

5.0 MB

05. Vishing.vtt

4.9 KB

06. SPAM.mp4

4.9 MB

06. SPAM.vtt

4.9 KB

07. Dumpter Diving.mp4

2.0 MB

07. Dumpter Diving.vtt

2.4 KB

08. Shoulder Surfing.mp4

5.1 MB

08. Shoulder Surfing.vtt

5.3 KB

09. Pharming.mp4

4.5 MB

09. Pharming.vtt

4.3 KB

10. Tailgating.mp4

6.1 MB

10. Tailgating.vtt

4.5 KB

11. Hoaxes.mp4

6.6 MB

11. Hoaxes.vtt

5.7 KB

12. Prepending.mp4

3.3 MB

12. Prepending.vtt

3.1 KB

13. Impersonation.mp4

1.9 MB

13. Impersonation.vtt

2.3 KB

14. Identity Fraud.mp4

2.7 MB

14. Identity Fraud.vtt

2.4 KB

15. Invoice Scam.mp4

4.8 MB

15. Invoice Scam.vtt

2.8 KB

16. Credential Harvesting.mp4

4.8 MB

16. Credential Harvesting.vtt

4.6 KB

17. Watering Hole Attack.mp4

5.2 MB

17. Watering Hole Attack.vtt

3.5 KB

18. Typo Squatting URL Hijacking.mp4

3.7 MB

18. Typo Squatting URL Hijacking.vtt

4.3 KB

19. Hybrid Warfare.mp4

4.7 MB

19. Hybrid Warfare.vtt

5.2 KB

20. Social Media and Influence Campaigns.mp4

2.1 MB

20. Social Media and Influence Campaigns.vtt

2.0 KB

21. Reasons for Effectiveness - Authority and Intimidation.mp4

3.2 MB

21. Reasons for Effectiveness - Authority and Intimidation.vtt

3.6 KB

22. Consensus and Social Proof.mp4

1.6 MB

22. Consensus and Social Proof.vtt

1.7 KB

23. Familiarity Liking.mp4

1.3 MB

23. Familiarity Liking.vtt

1.4 KB

24. Trust.mp4

1.2 MB

24. Trust.vtt

1.4 KB

25. Scarcity Urgency.mp4

956.2 KB

25. Scarcity Urgency.vtt

1.0 KB

26. Module Review.mp4

1.5 MB

26. Module Review.vtt

1.9 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/02/

comparing-different-types-of-social-engineering-techniques-slides.pdf

10.7 MB

/.../03. Analyzing Malware and Other Attacks/

01. Module Overview.mp4

1.1 MB

01. Module Overview.vtt

1.3 KB

02. Indicators of Compromise (IOC).mp4

4.2 MB

02. Indicators of Compromise (IOC).vtt

3.7 KB

03. Virus.mp4

4.2 MB

03. Virus.vtt

5.1 KB

04. Crypto-malware Ransomware.mp4

6.3 MB

04. Crypto-malware Ransomware.vtt

3.9 KB

05. Trojan.mp4

7.4 MB

05. Trojan.vtt

7.8 KB

06. Worms.mp4

1.5 MB

06. Worms.vtt

1.4 KB

07. Potentially Unwanted Programs (PUP).mp4

2.9 MB

07. Potentially Unwanted Programs (PUP).vtt

3.0 KB

08. Fileless Virus.mp4

3.8 MB

08. Fileless Virus.vtt

4.0 KB

09. Botnets.mp4

4.9 MB

09. Botnets.vtt

4.6 KB

10. Logic Bomb.mp4

1.7 MB

10. Logic Bomb.vtt

2.4 KB

11. Spyware.mp4

2.6 MB

11. Spyware.vtt

3.1 KB

12. Keylogger.mp4

1.6 MB

12. Keylogger.vtt

1.8 KB

13. Rootkits.mp4

2.3 MB

13. Rootkits.vtt

2.6 KB

14. Backdoors.mp4

2.1 MB

14. Backdoors.vtt

2.7 KB

15. Spraying.mp4

3.2 MB

15. Spraying.vtt

2.4 KB

16. Brute Force and Dictionary Attacks.mp4

5.4 MB

16. Brute Force and Dictionary Attacks.vtt

4.0 KB

17. Rainbow Tables.mp4

3.5 MB

17. Rainbow Tables.vtt

3.6 KB

18. Known Plain Text Ciphertext.mp4

1.8 MB

18. Known Plain Text Ciphertext.vtt

1.6 KB

19. Birthday Attack.mp4

5.0 MB

19. Birthday Attack.vtt

4.1 KB

20. Downgrade Attack.mp4

1.9 MB

20. Downgrade Attack.vtt

1.7 KB

21. Physical Attacks, Malicious USB, and Skimming.mp4

6.6 MB

21. Physical Attacks, Malicious USB, and Skimming.vtt

7.4 KB

22. Adversarial Artificial Intelligence (AI).mp4

3.6 MB

22. Adversarial Artificial Intelligence (AI).vtt

3.4 KB

23. Supply Chain Attacks.mp4

3.9 MB

23. Supply Chain Attacks.vtt

3.9 KB

24. Supply Chain Attack Example.mp4

2.7 MB

24. Supply Chain Attack Example.vtt

2.8 KB

25. Cloud-Based vs. On-prem Attacks.mp4

7.5 MB

25. Cloud-Based vs. On-prem Attacks.vtt

6.7 KB

26. Module Review.mp4

822.7 KB

26. Module Review.vtt

1.0 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/03/

analyzing-malware-and-other-attacks-slides.pdf

6.6 MB

/.../04. Recognizing Application Attacks/

01. Module Overview.mp4

995.4 KB

01. Module Overview.vtt

1.2 KB

02. Privilege Escalation.mp4

4.5 MB

02. Privilege Escalation.vtt

4.2 KB

03. Cross Site Scripting (XSS).mp4

7.0 MB

03. Cross Site Scripting (XSS).vtt

5.3 KB

04. SQL Injection.mp4

2.6 MB

04. SQL Injection.vtt

2.2 KB

05. DLL Injection.mp4

7.4 MB

05. DLL Injection.vtt

3.6 KB

06. LDAP Injection.mp4

1.3 MB

06. LDAP Injection.vtt

1.3 KB

07. XML Injection.mp4

1.9 MB

07. XML Injection.vtt

1.9 KB

08. Pointer Dereference.mp4

2.9 MB

08. Pointer Dereference.vtt

2.6 KB

09. Directory Traversal Command Injection.mp4

3.3 MB

09. Directory Traversal Command Injection.vtt

3.1 KB

10. Buffer Overflow.mp4

3.0 MB

10. Buffer Overflow.vtt

1.8 KB

11. Race Conditions.mp4

3.6 MB

11. Race Conditions.vtt

3.0 KB

12. Time of Check.mp4

2.4 MB

12. Time of Check.vtt

2.1 KB

13. Secure Coding Concepts, Error Handling, and Input Validation.mp4

7.3 MB

13. Secure Coding Concepts, Error Handling, and Input Validation.vtt

8.8 KB

14. Replay Attacks.mp4

2.3 MB

14. Replay Attacks.vtt

1.9 KB

15. Integer Overflow.mp4

2.5 MB

15. Integer Overflow.vtt

2.0 KB

16. Cross Site Request Forgery (XSRF).mp4

4.6 MB

16. Cross Site Request Forgery (XSRF).vtt

4.6 KB

17. API Attacks.mp4

3.4 MB

17. API Attacks.vtt

3.6 KB

18. Resource Exhaustion.mp4

4.3 MB

18. Resource Exhaustion.vtt

3.7 KB

19. Memory Leak.mp4

3.2 MB

19. Memory Leak.vtt

3.4 KB

20. SSL Stripping.mp4

3.2 MB

20. SSL Stripping.vtt

3.7 KB

21. Shimming.mp4

1.8 MB

21. Shimming.vtt

2.0 KB

22. Refactoring.mp4

1.5 MB

22. Refactoring.vtt

1.8 KB

23. Pass the Hash.mp4

4.4 MB

23. Pass the Hash.vtt

3.3 KB

24. Module Review.mp4

656.5 KB

24. Module Review.vtt

0.9 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/04/

recognizing-application-attacks-slides.pdf

4.0 MB

/.../05. Identifying Network Attacks/

01. Module Overview.mp4

1.3 MB

01. Module Overview.vtt

1.3 KB

02. Rogue Access Points and Evil Twin.mp4

5.4 MB

02. Rogue Access Points and Evil Twin.vtt

6.2 KB

03. Bluejack and Bluesnarfing.mp4

5.7 MB

03. Bluejack and Bluesnarfing.vtt

6.2 KB

04. Dissociation.mp4

2.8 MB

04. Dissociation.vtt

2.3 KB

05. Jamming.mp4

1.7 MB

05. Jamming.vtt

1.9 KB

06. RFID.mp4

2.3 MB

06. RFID.vtt

2.1 KB

07. Near Field Communication (NFC).mp4

3.0 MB

07. Near Field Communication (NFC).vtt

2.4 KB

08. IV Attack.mp4

5.1 MB

08. IV Attack.vtt

5.4 KB

09. On-path Attacks (Formerly MiTM).mp4

2.1 MB

09. On-path Attacks (Formerly MiTM).vtt

1.9 KB

10. On-path Attacks (Formerly MiTB).mp4

4.3 MB

10. On-path Attacks (Formerly MiTB).vtt

4.5 KB

11. ARP Poisoning.mp4

2.7 MB

11. ARP Poisoning.vtt

2.5 KB

12. IPMAC Spoofing.mp4

1.7 MB

12. IPMAC Spoofing.vtt

1.5 KB

13. MAC Flooding.mp4

3.8 MB

13. MAC Flooding.vtt

3.8 KB

14. MAC Cloning.mp4

3.1 MB

14. MAC Cloning.vtt

3.0 KB

15. DNS Poisoning.mp4

1.9 MB

15. DNS Poisoning.vtt

1.8 KB

16. Typo Squatting URL Hijacking.mp4

3.7 MB

16. Typo Squatting URL Hijacking.vtt

4.4 KB

17. Distributed Denial of Service (DDoS).mp4

4.5 MB

17. Distributed Denial of Service (DDoS).vtt

3.9 KB

18. Smurf Attack (Amplification).mp4

5.5 MB

18. Smurf Attack (Amplification).vtt

5.5 KB

19. DDoS Attack Vectors.mp4

2.0 MB

19. DDoS Attack Vectors.vtt

1.9 KB

20. Malicious Code Execution.mp4

3.1 MB

20. Malicious Code Execution.vtt

3.4 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/05/

identifying-network-attacks-slides.pdf

3.5 MB

/.../06. Distinguishing Threat Actors, Vectors, and Intelligence Sources/

01. Module Review.mp4

1.9 MB

01. Module Review.vtt

2.1 KB

02. Script Kiddies.mp4

1.8 MB

02. Script Kiddies.vtt

1.9 KB

03. Hacktivists.mp4

1.7 MB

03. Hacktivists.vtt

1.9 KB

04. Organized Crime.mp4

2.2 MB

04. Organized Crime.vtt

2.5 KB

05. Nation States APT.mp4

2.2 MB

05. Nation States APT.vtt

2.3 KB

06. Insiders.mp4

2.7 MB

06. Insiders.vtt

2.7 KB

07. Competitors.mp4

2.2 MB

07. Competitors.vtt

2.6 KB

08. Threat Actor Attributes.mp4

1.4 MB

08. Threat Actor Attributes.vtt

1.2 KB

09. Attack Vectors.mp4

13.2 MB

09. Attack Vectors.vtt

14.7 KB

10. Use of Open Source Intelligence.mp4

7.3 MB

10. Use of Open Source Intelligence.vtt

5.1 KB

11. Closed Proprietary Intelligence.mp4

1.4 MB

11. Closed Proprietary Intelligence.vtt

1.3 KB

12. Vulnerability Databases.mp4

2.6 MB

12. Vulnerability Databases.vtt

2.7 KB

13. Public and Private Information Sharing.mp4

2.0 MB

13. Public and Private Information Sharing.vtt

2.4 KB

14. Dark Web.mp4

4.1 MB

14. Dark Web.vtt

4.3 KB

15. Indicators of Compromise (IOC).mp4

3.2 MB

15. Indicators of Compromise (IOC).vtt

3.4 KB

16. Automate Indicator Sharing (AIS).mp4

2.6 MB

16. Automate Indicator Sharing (AIS).vtt

1.7 KB

17. TAXII Layout.mp4

1.7 MB

17. TAXII Layout.vtt

1.9 KB

18. MITRE.mp4

6.5 MB

18. MITRE.vtt

4.2 KB

19. Gathering and Correlating Information.mp4

3.7 MB

19. Gathering and Correlating Information.vtt

3.5 KB

20. Predictive Analysis.mp4

2.1 MB

20. Predictive Analysis.vtt

1.9 KB

21. Threat Maps.mp4

1.4 MB

21. Threat Maps.vtt

1.4 KB

22. Live Cyber Threat Map.mp4

4.0 MB

22. Live Cyber Threat Map.vtt

1.0 KB

23. File Code Repositories.mp4

2.7 MB

23. File Code Repositories.vtt

2.9 KB

24. Research Sources.mp4

7.8 MB

24. Research Sources.vtt

6.0 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/06/

distinguishing-threat-actors-vectors-and-intelligence-sources-slides.pdf

3.7 MB

/.../07. Understanding Vulnerabilities and Security Risks/

01. Module Overview.mp4

1.3 MB

01. Module Overview.vtt

1.6 KB

02. Cloud-based vs. On-premise.mp4

4.3 MB

02. Cloud-based vs. On-premise.vtt

5.5 KB

03. New Threats Zero Days.mp4

3.0 MB

03. New Threats Zero Days.vtt

4.2 KB

04. Mis-configuration Weak Configuration.mp4

2.4 MB

04. Mis-configuration Weak Configuration.vtt

2.2 KB

05. Shared Accounts (Improperly Configured).mp4

2.4 MB

05. Shared Accounts (Improperly Configured).vtt

2.3 KB

06. Weak Configuration Considerations.mp4

3.3 MB

06. Weak Configuration Considerations.vtt

5.0 KB

07. Weak Cipher Suites and Implementations.mp4

3.1 MB

07. Weak Cipher Suites and Implementations.vtt

3.7 KB

08. Improper Certificate and Key Management.mp4

2.7 MB

08. Improper Certificate and Key Management.vtt

2.7 KB

09. Secure Protocols.mp4

5.8 MB

09. Secure Protocols.vtt

5.9 KB

10. Default Configurations.mp4

2.4 MB

10. Default Configurations.vtt

2.6 KB

11. Third-party Risks.mp4

3.9 MB

11. Third-party Risks.vtt

5.1 KB

12. Vendor Management.mp4

5.2 MB

12. Vendor Management.vtt

3.9 KB

13. Vulnerable Business Processes.mp4

4.6 MB

13. Vulnerable Business Processes.vtt

4.6 KB

14. Outsourced Code Mangement.mp4

1.6 MB

14. Outsourced Code Mangement.vtt

2.0 KB

15. Improper or Weak Patch Management.mp4

3.5 MB

15. Improper or Weak Patch Management.vtt

4.6 KB

16. Legacy Platforms.mp4

2.8 MB

16. Legacy Platforms.vtt

3.1 KB

17. Impact Areas.mp4

1.9 MB

17. Impact Areas.vtt

3.6 KB

18. Effects of Impacts.mp4

2.6 MB

18. Effects of Impacts.vtt

3.5 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/07/

understanding-vulnerabilities-and-security-risks-slides.pdf

2.2 MB

/.../08. Defining Security Assessment Techniques/

01. Module Overview.mp4

1.5 MB

01. Module Overview.vtt

1.8 KB

02. Specific Types of Threats.mp4

1.1 MB

02. Specific Types of Threats.vtt

1.3 KB

03. What Is Cyber Threat Intelligence.mp4

2.5 MB

03. What Is Cyber Threat Intelligence.vtt

2.7 KB

04. Importance of Cyber Threat Intelligence.mp4

1.4 MB

04. Importance of Cyber Threat Intelligence.vtt

1.6 KB

05. Threat Intelligence Classification.mp4

2.6 MB

05. Threat Intelligence Classification.vtt

3.4 KB

06. Strategic, Operational, and Tactical Intelligence.mp4

2.7 MB

06. Strategic, Operational, and Tactical Intelligence.vtt

2.3 KB

07. Gathering and Correlating Information.mp4

3.9 MB

07. Gathering and Correlating Information.vtt

3.8 KB

08. Stages of Risk Management.mp4

5.0 MB

08. Stages of Risk Management.vtt

5.5 KB

09. Risk Management Data Sources.mp4

4.5 MB

09. Risk Management Data Sources.vtt

4.8 KB

10. Vulnerability Scanning.mp4

1.3 MB

10. Vulnerability Scanning.vtt

1.5 KB

11. False Positive.mp4

1.8 MB

11. False Positive.vtt

1.6 KB

12. False Positive Audits.mp4

1.3 MB

12. False Positive Audits.vtt

1.1 KB

13. False Negatives.mp4

1.3 MB

13. False Negatives.vtt

1.4 KB

14. Intrusive vs. Non-intrusive.mp4

994.4 KB

14. Intrusive vs. Non-intrusive.vtt

0.9 KB

15. Passively Test Security Controls.mp4

969.4 KB

15. Passively Test Security Controls.vtt

1.2 KB

16. Credentialed vs. Non-credentialed.mp4

4.8 MB

16. Credentialed vs. Non-credentialed.vtt

4.5 KB

17. Identify Vulnerabilities and Lack of Security Controls.mp4

3.0 MB

17. Identify Vulnerabilities and Lack of Security Controls.vtt

3.1 KB

18. Identify Common Misconfigurations.mp4

3.2 MB

18. Identify Common Misconfigurations.vtt

3.3 KB

19. Things to Remember.mp4

4.2 MB

19. Things to Remember.vtt

4.9 KB

20. Common Vulnerabilities and Exposures (CVE).mp4

8.6 MB

20. Common Vulnerabilities and Exposures (CVE).vtt

5.2 KB

21. CVSS.mp4

4.9 MB

21. CVSS.vtt

3.3 KB

22. Security Information and Event Management (SEIM).mp4

4.6 MB

22. Security Information and Event Management (SEIM).vtt

3.8 KB

23. Security Orchestration, Automation, and Response.mp4

2.9 MB

23. Security Orchestration, Automation, and Response.vtt

3.7 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/08/

defining-security-assessment-techniques-slides.pdf

4.7 MB

/.../09. Defining Penetration Testing/

01. Module Intro.mp4

895.9 KB

01. Module Intro.vtt

1.1 KB

02. Penetration Testing.mp4

1.9 MB

02. Penetration Testing.vtt

2.1 KB

03. Penetration Testing Steps.mp4

3.2 MB

03. Penetration Testing Steps.vtt

5.0 KB

04. Known, Unknown, and Partially Known Environments.mp4

1.6 MB

04. Known, Unknown, and Partially Known Environments.vtt

1.7 KB

05. Rules of Engagement.mp4

3.3 MB

05. Rules of Engagement.vtt

3.4 KB

06. Lateral Movement.mp4

1.8 MB

06. Lateral Movement.vtt

2.7 KB

07. Escalation of Privilege.mp4

1.1 MB

07. Escalation of Privilege.vtt

1.2 KB

08. Methods of Privilege Escalation.vtt

3.1 KB

09. Persistence.mp4

776.2 KB

09. Persistence.vtt

1.1 KB

10. Cleanup.mp4

1.8 MB

10. Cleanup.vtt

2.4 KB

11. Bug Bounty.mp4

4.1 MB

11. Bug Bounty.vtt

2.5 KB

12. Pivoting.mp4

3.5 MB

12. Pivoting.vtt

4.1 KB

13. Types of Reconnaissance.mp4

4.8 MB

13. Types of Reconnaissance.vtt

5.3 KB

14. War Flying.mp4

2.9 MB

14. War Flying.vtt

2.3 KB

15. War Driving.mp4

2.3 MB

15. War Driving.vtt

2.4 KB

16. Red, Blue, Purple, and White Security Teams.mp4

3.3 MB

16. Red, Blue, Purple, and White Security Teams.vtt

4.2 KB

17. Module Review.mp4

1.4 MB

17. Module Review.vtt

2.2 KB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/09/

defining-penetration-testing-slides.pdf

3.7 MB

/.../Attacks, Threats, and Vulnerabilities for CompTIA Security+ By Christopher Rees/1. Course Overview/

1. Course Overview.mp4

3.9 MB

1. Course Overview.vtt

2.9 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

/.../CompTIA Security+ - Exam Briefing By Christopher Rees/01/

comptia-security-exam-overview-slides.pdf

6.3 MB

/.../CompTIA Security+ - Exam Briefing By Christopher Rees/02/

tips-and-advice-for-passing-the-exam-slides.pdf

4.1 MB

/.../1. CompTIA Security+ Exam Overview/

1. Module Overview and Domains.mp4

4.7 MB

1. Module Overview and Domains.vtt

4.4 KB

2. Passing the Exam - Whats Next.mp4

2.4 MB

2. Passing the Exam - Whats Next.vtt

2.6 KB

3. Example Certifications.mp4

2.0 MB

3. Example Certifications.vtt

2.4 KB

4. Security+ Exam Format.mp4

3.6 MB

4. Security+ Exam Format.vtt

2.2 KB

5. Registering for an Exam.mp4

2.0 MB

5. Registering for an Exam.vtt

2.4 KB

6. Exam Lifecycle.mp4

1.7 MB

6. Exam Lifecycle.vtt

1.6 KB

7. Prerequisite Experience.mp4

2.8 MB

7. Prerequisite Experience.vtt

2.2 KB

/.../2. Tips and Advice for Passing the Exam/

1. Module Intro and Study Tips.mp4

6.1 MB

1. Module Intro and Study Tips.vtt

6.9 KB

2. Exam Tips.mp4

2.5 MB

2. Exam Tips.vtt

2.7 KB

3. Key Areas to Focus On.mp4

2.0 MB

3. Key Areas to Focus On.vtt

3.0 KB

4. Objectives Study Guide.mp4

6.1 MB

4. Objectives Study Guide.vtt

6.1 KB

/.../Governance, Risk, and Compliance for CompTIA Security+ By Christopher Rees/02/

comparing-and-contrasting-various-types-of-controls-slides.pdf

543.0 KB

/.../03. Applicable Regulations, Standards, or Frameworks that Impact a Security Organization/

01. Module Overview.mp4

1.2 MB

01. Module Overview.vtt

1.1 KB

02. Privacy and Compliance Challenges.mp4

9.8 MB

02. Privacy and Compliance Challenges.vtt

9.8 KB

03. GDPR and Key Terminology.mp4

3.2 MB

03. GDPR and Key Terminology.vtt

3.1 KB

04. GDPR Key Terms and Data Processing Princ.mp4

3.4 MB

04. GDPR Key Terms and Data Processing Princ.vtt

3.7 KB

05. Six Legal Grounds for Processing Persona.mp4

2.2 MB

05. Six Legal Grounds for Processing Persona.vtt

2.5 KB

06. GDPR Compliance and Penalties.mp4

1.2 MB

06. GDPR Compliance and Penalties.vtt

1.1 KB

07. Compliance Frameworks.mp4

4.3 MB

07. Compliance Frameworks.vtt

4.4 KB

08. NIST and the Cyber-security Framework (C.mp4

1.7 MB

08. NIST and the Cyber-security Framework (C.vtt

2.0 KB

09. PCI-DSS.mp4

1.6 MB

09. PCI-DSS.vtt

2.0 KB

10. Enterprise Security Framework (ESF).mp4

2.3 MB

10. Enterprise Security Framework (ESF).vtt

2.2 KB

11. NIST SP 800-53 and ISO 27001.mp4

8.3 MB

11. NIST SP 800-53 and ISO 27001.vtt

5.1 KB

12. Cloud Security Alliance (CSA).mp4

2.3 MB

12. Cloud Security Alliance (CSA).vtt

1.5 KB

13. SSAE 18, SOC 1, 2, and 3.mp4

5.3 MB

13. SSAE 18, SOC 1, 2, and 3.vtt

5.3 KB

14. Benchmarks and Secure Configuration Guid.mp4

3.4 MB

14. Benchmarks and Secure Configuration Guid.vtt

3.6 KB

15. Systems Hardening.mp4

4.3 MB

15. Systems Hardening.vtt

5.1 KB

16. Vendor and Control Diversity.mp4

2.5 MB

16. Vendor and Control Diversity.vtt

3.1 KB

17. Module Review.mp4

528.4 KB

17. Module Review.vtt

0.7 KB

/.../Governance, Risk, and Compliance for CompTIA Security+ By Christopher Rees/03/

applicable-regulations-standards-or-frameworks-that-impact-a-security-organization-slides.pdf

2.4 MB

/.../04. Implementing Policies within Organizational Security/

01. Module Overview.mp4

1.4 MB

01. Module Overview.vtt

1.4 KB

02. Importance of Policies in Reducing Risk.mp4

811.1 KB

02. Importance of Policies in Reducing Risk.vtt

0.8 KB

03. Job Rotation.mp4

3.0 MB

03. Job Rotation.vtt

3.2 KB

04. Mandatory Vacations.mp4

1.3 MB

04. Mandatory Vacations.vtt

1.1 KB

05. Separation of Duties.mp4

1.0 MB

05. Separation of Duties.vtt

0.9 KB

06. Least Privilege.mp4

1.3 MB

06. Least Privilege.vtt

1.3 KB

07. Clean Desk Policies.mp4

2.0 MB

07. Clean Desk Policies.vtt

2.6 KB

08. Background Checks, NDAs, and Role-based Awareness Training.mp4

3.3 MB

08. Background Checks, NDAs, and Role-based Awareness Training.vtt

3.4 KB

09. Use Cases for Monitoring.mp4

3.6 MB

09. Use Cases for Monitoring.vtt

4.0 KB

10. Things Typically Monitored.mp4

2.5 MB

10. Things Typically Monitored.vtt

3.2 KB

11. Balancing Whats Reasonable.mp4

1.3 MB

11. Balancing Whats Reasonable.vtt

1.6 KB

12. New Tools Are Constantly Developed.mp4

2.1 MB

12. New Tools Are Constantly Developed.vtt

1.7 KB

13. Monitoring Social Media.mp4

1.4 MB

13. Monitoring Social Media.vtt

1.1 KB

14. Employee Protections.mp4

1.3 MB

14. Employee Protections.vtt

1.3 KB

15. Onboarding Offboarding.mp4

1.3 MB

15. Onboarding Offboarding.vtt

1.5 KB

16. Culture and Creating a Culture of Security.mp4

3.3 MB

16. Culture and Creating a Culture of Security.vtt

3.3 KB

17. Setting the Stage.mp4

1.5 MB

17. Setting the Stage.vtt

2.0 KB

18. Awareness Training.mp4

2.2 MB

18. Awareness Training.vtt

1.3 KB

19. Skills Training.mp4

3.3 MB

19. Skills Training.vtt

2.9 KB

20. Funding and Executive Buy-in.mp4

2.6 MB

20. Funding and Executive Buy-in.vtt

2.0 KB

21. Continuous Improvement.mp4

1.3 MB

21. Continuous Improvement.vtt

1.2 KB

22. Wired Brain Coffees Approach to Training.mp4

3.1 MB

22. Wired Brain Coffees Approach to Training.vtt

3.6 KB

23. Technology Diversity.mp4

1.2 MB

23. Technology Diversity.vtt

1.4 KB

24. Vendor Diversity.mp4

2.2 MB

24. Vendor Diversity.vtt

1.2 KB

25. Service-level Agreement (SLA).mp4

1.0 MB

25. Service-level Agreement (SLA).vtt

0.9 KB

26. Memorandum of Understanding (MOU) and Master Services Agreement (MSA).mp4

3.6 MB

26. Memorandum of Understanding (MOU) and Master Services Agreement (MSA).vtt

3.2 KB

27. Business Partner Agreement (BPA).mp4

908.1 KB

27. Business Partner Agreement (BPA).vtt

1.0 KB

28. EOL EOS.mp4

3.1 MB

28. EOL EOS.vtt

3.6 KB

29. Data Retention.mp4

1.8 MB

29. Data Retention.vtt

1.0 KB

30. User Account.mp4

1.2 MB

30. User Account.vtt

1.2 KB

31. Shared, Generic, Guest, and Service Accounts.mp4

3.1 MB

31. Shared, Generic, Guest, and Service Accounts.vtt

3.1 KB

32. Privileged Accounts.mp4

1.8 MB

32. Privileged Accounts.vtt

1.9 KB

33. Change Management.mp4

3.4 MB

33. Change Management.vtt

3.6 KB

34. Asset Management.mp4

2.4 MB

34. Asset Management.vtt

3.2 KB

/.../Governance, Risk, and Compliance for CompTIA Security+ By Christopher Rees/04/

implementing-policies-within-organizational-security-slides.pdf

6.7 MB

/.../05. Review the Risk Management Process and Concepts/

01. Module Overview.mp4

1.1 MB

01. Module Overview.vtt

1.1 KB

02. Risk Types.mp4

3.5 MB

02. Risk Types.vtt

7.0 KB

03. Managing Risk.mp4

1.2 MB

03. Managing Risk.vtt

1.3 KB

04. Risk Management Defined.mp4

2.4 MB

04. Risk Management Defined.vtt

2.1 KB

05. Risk Management Concepts.mp4

5.8 MB

05. Risk Management Concepts.vtt

5.0 KB

06. Strategic Options.mp4

3.3 MB

06. Strategic Options.vtt

3.5 KB

07. Risk Register, Risk Matrix, and Heat Map.mp4

1.7 MB

07. Risk Register, Risk Matrix, and Heat Map.vtt

2.2 KB

08. Risk Control Self-assessment (RCSA).mp4

4.1 MB

08. Risk Control Self-assessment (RCSA).vtt

4.7 KB

09. Risk Awareness (Inherent, Residual, Control, and Risk Appetite).mp4

2.2 MB

09. Risk Awareness (Inherent, Residual, Control, and Risk Appetite).vtt

2.8 KB

10. Regulatory Examples.mp4

1.2 MB

10. Regulatory Examples.vtt

1.3 KB

11. Gramm-Leach-Bliley Act (GLBA).mp4

2.6 MB

11. Gramm-Leach-Bliley Act (GLBA).vtt

2.6 KB

12. HIPAA.mp4

2.5 MB

12. HIPAA.vtt

2.3 KB

13. HITECH Act.mp4

4.0 MB

13. HITECH Act.vtt

3.5 KB

14. Sarbanes-Oxley Act (SOX).mp4

7.0 MB

14. Sarbanes-Oxley Act (SOX).vtt

6.0 KB

15. GDPR.mp4

1.8 MB

15. GDPR.vtt

1.5 KB

16. Qualitative and Quantitative Analysis.mp4

5.0 MB

16. Qualitative and Quantitative Analysis.vtt

4.5 KB

17. Risk Calculation.mp4

2.2 MB

17. Risk Calculation.vtt

2.5 KB

18. Likelihood of Threat.mp4

1.8 MB

18. Likelihood of Threat.vtt

1.5 KB

19. Impact of Threat.mp4

1.1 MB

19. Impact of Threat.vtt

1.1 KB

20. Loss Calculation Terms (ALE, SLE, and ARO).mp4

5.1 MB

20. Loss Calculation Terms (ALE, SLE, and ARO).vtt

4.4 KB

21. Threat Assessment (Disaster).mp4

2.9 MB

21. Threat Assessment (Disaster).vtt

3.9 KB

22. Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).mp4

2.4 MB

22. Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).vtt

2.2 KB

23. Business Impact Analysis - Key Terminology.mp4

9.6 MB

23. Business Impact Analysis - Key Terminology.vtt

9.3 KB

24. Mission Essential Functions.mp4

3.7 MB

24. Mission Essential Functions.vtt

3.9 KB

25. Identification of Critical Systems.mp4

4.2 MB

25. Identification of Critical Systems.vtt

4.8 KB

26. Single Point of Failure (SPOF).mp4

4.0 MB

26. Single Point of Failure (SPOF).vtt

4.5 KB

27. Order of Restoration.mp4

2.9 MB

27. Order of Restoration.vtt

3.3 KB

28. Phased Approach.mp4

3.8 MB

28. Phased Approach.vtt

2.6 KB

29. Identifying Most Critical Systems First.mp4

5.3 MB

29. Identifying Most Critical Systems First.vtt

4.7 KB

30. Risk Assessment.mp4

2.0 MB

30. Risk Assessment.vtt

2.2 KB

31. Continuity of Operations.mp4

1.8 MB

31. Continuity of Operations.vtt

1.8 KB

32. IT Contingency Planning.mp4

5.4 MB

32. IT Contingency Planning.vtt

5.8 KB

/.../Governance, Risk, and Compliance for CompTIA Security+ By Christopher Rees/05/

review-the-risk-management-process-and-concepts-slides.pdf

3.6 MB

/.../06. Privacy and Sensitive Data Concepts and Considerations/

01. Module Overview.mp4

1.4 MB

01. Module Overview.vtt

1.3 KB

02. Company Obligations to Protect Security.mp4

2.4 MB

02. Company Obligations to Protect Security.vtt

3.4 KB

03. Potential Damages from Mishandled Data.mp4

2.2 MB

03. Potential Damages from Mishandled Data.vtt

2.7 KB

04. Incident Notification and Escalation.mp4

3.5 MB

04. Incident Notification and Escalation.vtt

3.9 KB

05. Notifying Outside Agencies.mp4

2.6 MB

05. Notifying Outside Agencies.vtt

2.8 KB

06. Data Classification.mp4

5.3 MB

06. Data Classification.vtt

5.3 KB

07. Privacy-enhancing Technologies, Data Masking, and Tokenization.mp4

2.6 MB

07. Privacy-enhancing Technologies, Data Masking, and Tokenization.vtt

3.4 KB

08. Anonymization and Pseudo-anonymization.mp4

2.6 MB

08. Anonymization and Pseudo-anonymization.vtt

1.6 KB

09. Data Owner.mp4

1.0 MB

09. Data Owner.vtt

1.1 KB

10. Data Controller and Processor.mp4

591.9 KB

10. Data Controller and Processor.vtt

0.6 KB

11. Data Steward Custodian.mp4

2.4 MB

11. Data Steward Custodian.vtt

2.6 KB

12. Privacy Officer.mp4

872.1 KB

12. Privacy Officer.vtt

0.9 KB

13. Information Lifecycle.mp4

3.0 MB

13. Information Lifecycle.vtt

3.9 KB

14. Privacy Impact Assessment.mp4

3.3 MB

14. Privacy Impact Assessment.vtt

3.3 KB

15. Terms of Agreement and Privacy Notice.mp4

3.3 MB

15. Terms of Agreement and Privacy Notice.vtt

3.8 KB

/.../Governance, Risk, and Compliance for CompTIA Security+ By Christopher Rees/06/

privacy-and-sensitive-data-concepts-and-considerations-slides.pdf

2.8 MB

/.../Governance, Risk, and Compliance for CompTIA Security+ By Christopher Rees/1. Course Overview/

1. Course Overview.mp4

3.9 MB

1. Course Overview.vtt

3.2 KB

/.../2. Comparing and Contrasting Various Types of Controls/

1. Module Overview.mp4

1.5 MB

1. Module Overview.vtt

1.9 KB

2. Goals of the Module.mp4

2.5 MB

2. Goals of the Module.vtt

2.6 KB

3. Threat Types.mp4

1.3 MB

3. Threat Types.vtt

1.9 KB

4. Types of Access Control (Managerial, Operational, and Physical).mp4

1.8 MB

4. Types of Access Control (Managerial, Operational, and Physical).vtt

1.9 KB

5. Deterrent.mp4

764.2 KB

5. Deterrent.vtt

0.8 KB

6. Preventive.mp4

868.1 KB

6. Preventive.vtt

1.1 KB

7. Detective.mp4

955.6 KB

7. Detective.vtt

1.0 KB

8. Corrective Recovery and Compensating.mp4

2.8 MB

8. Corrective Recovery and Compensating.vtt

2.7 KB

9. Module Review.mp4

629.4 KB

9. Module Review.vtt

0.8 KB

/.../02. Implementing Secure Protocols/

01. Module Intro.mp4

1.4 MB

01. Module Intro.vtt

1.5 KB

02. Networking Protocols and TCP Three-way Handshake.mp4

6.6 MB

02. Networking Protocols and TCP Three-way Handshake.vtt

7.1 KB

03. DNSSEC.mp4

7.3 MB

03. DNSSEC.vtt

6.8 KB

04. SSH.mp4

2.0 MB

04. SSH.vtt

2.4 KB

05. SMIME.mp4

1.9 MB

05. SMIME.vtt

2.1 KB

06. Secure Real-Time Transport Protocol (SRTP).mp4

1.2 MB

06. Secure Real-Time Transport Protocol (SRTP).vtt

1.2 KB

07. Lightweight Directory Access Protocol over SSL (LDAPS).mp4

1.7 MB

07. Lightweight Directory Access Protocol over SSL (LDAPS).vtt

1.7 KB

08. FTPS and SFTP.mp4

2.4 MB

08. FTPS and SFTP.vtt

2.7 KB

09. SNMP v3.mp4

1.8 MB

09. SNMP v3.vtt

2.2 KB

10. SSLTLS.mp4

1.9 MB

10. SSLTLS.vtt

1.8 KB

11. HTTPS.mp4

2.6 MB

11. HTTPS.vtt

2.8 KB

12. Secure POPIMAP.mp4

5.1 MB

12. Secure POPIMAP.vtt

5.9 KB

13. Use Cases.mp4

5.7 MB

13. Use Cases.vtt

8.7 KB

14. Module Review.mp4

1.5 MB

14. Module Review.vtt

1.7 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/02/

implementing-secure-protocols-slides.pdf

1.4 MB

/.../03. Understanding Host or Application Security Solutions/

01. Module Overview.mp4

1.4 MB

01. Module Overview.vtt

1.4 KB

02. Antivirus.mp4

2.5 MB

02. Antivirus.vtt

2.3 KB

03. Endpoint Detection and Response (EDR).mp4

3.3 MB

03. Endpoint Detection and Response (EDR).vtt

4.0 KB

04. Data Loss Prevention (DLP).mp4

3.9 MB

04. Data Loss Prevention (DLP).vtt

4.5 KB

05. Next-generation Firewall (NGFW).mp4

3.0 MB

05. Next-generation Firewall (NGFW).vtt

3.3 KB

06. HIDSHIPS.mp4

1.6 MB

06. HIDSHIPS.vtt

1.8 KB

07. Host-based Firewall.mp4

2.7 MB

07. Host-based Firewall.vtt

2.7 KB

08. Boot Loader Protections and Secure Boot.mp4

5.2 MB

08. Boot Loader Protections and Secure Boot.vtt

4.8 KB

09. Measured Launch.mp4

1.3 MB

09. Measured Launch.vtt

1.3 KB

10. Integrity Measurement Architecture (IMA).mp4

767.5 KB

10. Integrity Measurement Architecture (IMA).vtt

0.9 KB

11. BIOSUEFI.mp4

987.5 KB

11. BIOSUEFI.vtt

1.0 KB

12. Hashing.mp4

4.6 MB

12. Hashing.vtt

4.0 KB

13. Salt.mp4

1.9 MB

13. Salt.vtt

1.9 KB

14. Secure Coding Techniques.mp4

14.9 MB

14. Secure Coding Techniques.vtt

12.9 KB

15. Code Quality and Testing.mp4

4.9 MB

15. Code Quality and Testing.vtt

5.6 KB

16. Static Code Analysis.mp4

3.8 MB

16. Static Code Analysis.vtt

4.4 KB

17. Fuzzing.mp4

8.8 MB

17. Fuzzing.vtt

7.0 KB

18. Additional Secure Coding Concepts.mp4

3.1 MB

18. Additional Secure Coding Concepts.vtt

3.8 KB

19. Peripherals Security.mp4

3.6 MB

19. Peripherals Security.vtt

4.7 KB

20. Hardening the Environment.mp4

4.3 MB

20. Hardening the Environment.vtt

5.0 KB

21. Common Ports.mp4

2.6 MB

21. Common Ports.vtt

2.1 KB

22. Registry Hardening.mp4

2.6 MB

22. Registry Hardening.vtt

3.0 KB

23. Self-encrypting Drives (SED).mp4

4.0 MB

23. Self-encrypting Drives (SED).vtt

4.0 KB

24. Hardware Root of Trust.mp4

2.4 MB

24. Hardware Root of Trust.vtt

2.3 KB

25. Hardware Based Encryption.mp4

5.1 MB

25. Hardware Based Encryption.vtt

4.7 KB

26. Sandboxing.mp4

5.2 MB

26. Sandboxing.vtt

3.8 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/03/

understanding-host-or-application-security-solutions-slides.pdf

2.7 MB

/.../04. Implementing Secure Network Designs Part 1/

01. Module Overview.mp4

1.4 MB

01. Module Overview.vtt

1.5 KB

02. Load Balancers.mp4

6.8 MB

02. Load Balancers.vtt

7.7 KB

03. Security Segmentation Models.mp4

4.4 MB

03. Security Segmentation Models.vtt

5.5 KB

04. Virtualization.mp4

2.4 MB

04. Virtualization.vtt

2.4 KB

05. Air Gaps.mp4

3.8 MB

05. Air Gaps.vtt

4.3 KB

06. East-west Traffic.mp4

3.4 MB

06. East-west Traffic.vtt

3.5 KB

07. Zero Trust.mp4

3.2 MB

07. Zero Trust.vtt

3.2 KB

08. VPN.mp4

7.3 MB

08. VPN.vtt

8.1 KB

09. Split Tunnel.mp4

1.7 MB

09. Split Tunnel.vtt

1.5 KB

10. IPSec and Transport Encryption.mp4

2.3 MB

10. IPSec and Transport Encryption.vtt

2.7 KB

11. VPN Concentrator.mp4

2.3 MB

11. VPN Concentrator.vtt

2.1 KB

12. DNSSEC.mp4

7.4 MB

12. DNSSEC.vtt

7.1 KB

13. Network Access Control (NAC).mp4

4.2 MB

13. Network Access Control (NAC).vtt

5.3 KB

14. In-band vs. Out-of-band Management.mp4

8.2 MB

14. In-band vs. Out-of-band Management.vtt

7.3 KB

15. Port Security and 802.1x.mp4

7.8 MB

15. Port Security and 802.1x.vtt

7.7 KB

16. Loop Protection and Flood Guards.mp4

3.2 MB

16. Loop Protection and Flood Guards.vtt

4.2 KB

17. Spanning Tree Protocol (STP).mp4

5.2 MB

17. Spanning Tree Protocol (STP).vtt

5.4 KB

18. DHCP Snooping.mp4

2.0 MB

18. DHCP Snooping.vtt

1.9 KB

19. MAC Filtering.mp4

4.6 MB

19. MAC Filtering.vtt

3.5 KB

20. Module Review.mp4

630.3 KB

20. Module Review.vtt

0.8 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/04/

implementing-secure-network-designs-part-1-slides.pdf

2.2 MB

/.../05. Implementing Secure Network Designs Part 2/

01. Module Overview.mp4

1.5 MB

01. Module Overview.vtt

1.3 KB

02. Jump Server.mp4

3.6 MB

02. Jump Server.vtt

4.2 KB

03. Proxies.mp4

6.2 MB

03. Proxies.vtt

7.1 KB

04. Web Security Gateways.mp4

2.9 MB

04. Web Security Gateways.vtt

3.0 KB

05. Intrusion Detection and Prevention.mp4

9.5 MB

05. Intrusion Detection and Prevention.vtt

9.9 KB

06. IDSIPS Component Workflow.mp4

2.2 MB

06. IDSIPS Component Workflow.vtt

2.4 KB

07. Four Approaches to IDS.mp4

2.9 MB

07. Four Approaches to IDS.vtt

3.3 KB

08. Network-based IDS.mp4

3.9 MB

08. Network-based IDS.vtt

4.0 KB

09. Security Device Placement.mp4

4.2 MB

09. Security Device Placement.vtt

4.9 KB

10. Firewalls.mp4

12.7 MB

10. Firewalls.vtt

12.4 KB

11. Web Application Firewalls.mp4

4.2 MB

11. Web Application Firewalls.vtt

4.4 KB

12. Unified Threat Management (UTM).mp4

1.6 MB

12. Unified Threat Management (UTM).vtt

1.9 KB

13. Content Filters.mp4

2.2 MB

13. Content Filters.vtt

1.9 KB

14. Implicit Deny and ACLs.mp4

1.0 MB

14. Implicit Deny and ACLs.vtt

1.2 KB

15. Route Security.mp4

2.9 MB

15. Route Security.vtt

2.9 KB

16. Quality of Service (QoS).mp4

3.2 MB

16. Quality of Service (QoS).vtt

3.5 KB

17. Implications of IPv6.mp4

4.5 MB

17. Implications of IPv6.vtt

4.3 KB

18. Port Mirroring, Port Spanning, and Port Taps.mp4

6.8 MB

18. Port Mirroring, Port Spanning, and Port Taps.vtt

5.7 KB

19. File Integrity Check.vtt

4.1 KB

20. Module Review.mp4

683.9 KB

20. Module Review.vtt

0.8 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/05/

implementing-secure-network-designs-part-2-slides.pdf

5.1 MB

/.../06. Installing and Configuring Wireless Security Settings/

01. Module Review.mp4

1.3 MB

01. Module Review.vtt

1.1 KB

02. Wireless Definitions.mp4

3.4 MB

02. Wireless Definitions.vtt

3.3 KB

03. WEPWPAWPA2.mp4

2.5 MB

03. WEPWPAWPA2.vtt

2.6 KB

04. WPA and WPA2 Security.mp4

7.1 MB

04. WPA and WPA2 Security.vtt

6.6 KB

05. WPA3.mp4

8.8 MB

05. WPA3.vtt

7.2 KB

06. Wireless Security Examples.mp4

4.3 MB

06. Wireless Security Examples.vtt

3.8 KB

07. Wireless Security and Pen Testing Tools.mp4

5.3 MB

07. Wireless Security and Pen Testing Tools.vtt

4.8 KB

08. EAP, PEAP, and LEAP.mp4

3.9 MB

08. EAP, PEAP, and LEAP.vtt

4.1 KB

09. 802.11x Wireless Protocols.mp4

5.2 MB

09. 802.11x Wireless Protocols.vtt

3.4 KB

10. RADIUS Federation.mp4

760.7 KB

10. RADIUS Federation.vtt

0.7 KB

11. Wi-Fi Protected Setup (WPS).mp4

1.8 MB

11. Wi-Fi Protected Setup (WPS).vtt

1.8 KB

12. Captive Portal.mp4

4.1 MB

12. Captive Portal.vtt

4.2 KB

13. Installation Considerations.mp4

2.2 MB

13. Installation Considerations.vtt

2.0 KB

14. Access PointsWi-Fi Security.mp4

6.5 MB

14. Access PointsWi-Fi Security.vtt

6.9 KB

15. Band SelectionWidth.mp4

3.7 MB

15. Band SelectionWidth.vtt

3.0 KB

16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based.mp4

6.1 MB

16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based.vtt

5.8 KB

17. Module Review.mp4

607.4 KB

17. Module Review.vtt

1.0 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/06/

installing-and-configuring-wireless-security-settings-slides.pdf

1.6 MB

/.../07. Implementing Secure Mobile Solutions/

01. Module Overview.mp4

1.1 MB

01. Module Overview.vtt

1.1 KB

02. Cellular.mp4

11.3 MB

02. Cellular.vtt

14.5 KB

03. Securing Wi-Fi.mp4

3.3 MB

03. Securing Wi-Fi.vtt

3.3 KB

04. Near Field Communication (NFC).mp4

2.3 MB

04. Near Field Communication (NFC).vtt

2.6 KB

05. Additional Areas of Concern.mp4

5.2 MB

05. Additional Areas of Concern.vtt

4.8 KB

06. MicroSD HSM.mp4

1.5 MB

06. MicroSD HSM.vtt

1.3 KB

07. Mobile Device Management (MDM, MAM, and UEM).mp4

2.3 MB

07. Mobile Device Management (MDM, MAM, and UEM).vtt

2.3 KB

08. SEAndroid.mp4

2.7 MB

08. SEAndroid.vtt

1.9 KB

09. Device Security.mp4

6.9 MB

09. Device Security.vtt

8.3 KB

10. Application Security and Key Credential Management.mp4

4.2 MB

10. Application Security and Key Credential Management.vtt

5.8 KB

11. Authentication.mp4

2.8 MB

11. Authentication.vtt

3.7 KB

12. Geo-tagging.mp4

2.7 MB

12. Geo-tagging.vtt

3.0 KB

13. Context-aware Authentication.mp4

4.5 MB

13. Context-aware Authentication.vtt

3.9 KB

14. Enforcement and Monitoring.mp4

7.6 MB

14. Enforcement and Monitoring.vtt

8.9 KB

15. BYOD Concerns and Deployment Models.mp4

6.3 MB

15. BYOD Concerns and Deployment Models.vtt

7.6 KB

16. Additional BYOD Concerns.mp4

4.4 MB

16. Additional BYOD Concerns.vtt

5.8 KB

17. Module Review.mp4

612.7 KB

17. Module Review.vtt

0.7 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/07/

implementing-secure-mobile-solutions-slides.pdf

2.3 MB

/.../08. Applying Cybersecurity Solutions to the Cloud/

01. Module Intro.mp4

1.2 MB

01. Module Intro.vtt

1.3 KB

02. High Availability.mp4

4.7 MB

02. High Availability.vtt

4.1 KB

03. Resource Policies.mp4

2.4 MB

03. Resource Policies.vtt

2.5 KB

04. Secrets Management.mp4

5.1 MB

04. Secrets Management.vtt

4.4 KB

05. Storage in the Cloud.mp4

4.7 MB

05. Storage in the Cloud.vtt

5.4 KB

06. Virtual Networks.mp4

6.7 MB

06. Virtual Networks.vtt

5.2 KB

07. API Inspection and Integration.mp4

2.4 MB

07. API Inspection and Integration.vtt

3.1 KB

08. Growth of Enterprise Cloud Application.mp4

1.9 MB

08. Growth of Enterprise Cloud Application.vtt

2.7 KB

09. Cyber Kill Chain in the Cloud.mp4

8.7 MB

09. Cyber Kill Chain in the Cloud.vtt

7.4 KB

10. Compute in the Cloud.mp4

6.1 MB

10. Compute in the Cloud.vtt

7.7 KB

11. Cloud Access Security Broker (CASB).mp4

1.8 MB

11. Cloud Access Security Broker (CASB).vtt

1.8 KB

12. Application Security.mp4

1.8 MB

12. Application Security.vtt

2.1 KB

13. Next-gen Secure Web Gateway (NG-SWG).mp4

1.3 MB

13. Next-gen Secure Web Gateway (NG-SWG).vtt

1.4 KB

14. Firewall Considerations in a Cloud Environment.mp4

4.2 MB

14. Firewall Considerations in a Cloud Environment.vtt

3.8 KB

15. TCPIP and OSI Models.mp4

1.3 MB

15. TCPIP and OSI Models.vtt

1.2 KB

16. Application Layer, Protocol Layer, and Volumetric Attacks.mp4

4.0 MB

16. Application Layer, Protocol Layer, and Volumetric Attacks.vtt

3.8 KB

17. Cost.mp4

2.1 MB

17. Cost.vtt

2.5 KB

18. Cloud Native Controls vs. Third-party Solutions.mp4

5.7 MB

18. Cloud Native Controls vs. Third-party Solutions.vtt

5.8 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/08/

applying-cybersecurity-solutions-to-the-cloud-slides.pdf

3.1 MB

/.../09. Implementing Identity and Account Management Controls/

01. Module Review.mp4

911.6 KB

01. Module Review.vtt

0.9 KB

02. Identity Provider (IdP).mp4

2.9 MB

02. Identity Provider (IdP).vtt

2.7 KB

03. IdP Example.mp4

2.6 MB

03. IdP Example.vtt

3.0 KB

04. Certificates, Tokens, and SSH Keys.mp4

3.9 MB

04. Certificates, Tokens, and SSH Keys.vtt

2.5 KB

05. Certificate Issues.mp4

4.6 MB

05. Certificate Issues.vtt

5.4 KB

06. Smart Cards.mp4

1.5 MB

06. Smart Cards.vtt

1.7 KB

07. User Accounts.mp4

2.0 MB

07. User Accounts.vtt

1.9 KB

08. Account Management.mp4

3.8 MB

08. Account Management.vtt

3.7 KB

09. Password Complexity.mp4

2.4 MB

09. Password Complexity.vtt

2.5 KB

10. Password History.mp4

3.7 MB

10. Password History.vtt

3.6 KB

11. Password Reuse.mp4

2.1 MB

11. Password Reuse.vtt

2.2 KB

12. Time of Day Restrictions.mp4

2.0 MB

12. Time of Day Restrictions.vtt

1.8 KB

13. User Access Best Practices.mp4

3.9 MB

13. User Access Best Practices.vtt

4.9 KB

14. Permissions Auditing and Review.mp4

2.2 MB

14. Permissions Auditing and Review.vtt

2.6 KB

15. Recertification.mp4

2.7 MB

15. Recertification.vtt

3.4 KB

16. Group Policy.mp4

3.6 MB

16. Group Policy.vtt

4.3 KB

17. Expiration.mp4

4.0 MB

17. Expiration.vtt

4.8 KB

18. Recovery.mp4

2.9 MB

18. Recovery.vtt

2.9 KB

19. Impossible TravelRisky Login.mp4

4.6 MB

19. Impossible TravelRisky Login.vtt

4.7 KB

20. Lockout.mp4

1.2 MB

20. Lockout.vtt

1.4 KB

21. Disablement.mp4

1.8 MB

21. Disablement.vtt

1.5 KB

22. Module Review.mp4

600.9 KB

22. Module Review.vtt

0.9 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/09/

implementing-identity-and-account-management-controls-slides.pdf

3.9 MB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/1. Course Overview/

1. Course Overview.mp4

4.0 MB

1. Course Overview.vtt

3.0 KB

/.../10. Implementing Authentication and Authorization Solutions/

01. Module Overview.mp4

1.4 MB

01. Module Overview.vtt

1.5 KB

02. Authentication Management.mp4

5.4 MB

02. Authentication Management.vtt

6.1 KB

03. Extensible Authentication Protocol (EAP).mp4

1.5 MB

03. Extensible Authentication Protocol (EAP).vtt

1.4 KB

04. Challenge Handshake Authentication Protocol (CHAP).mp4

1.8 MB

04. Challenge Handshake Authentication Protocol (CHAP).vtt

1.7 KB

05. Password Authentication Protocol (PAP).mp4

1.4 MB

05. Password Authentication Protocol (PAP).vtt

1.8 KB

06. Port Security and 802.1x Authentication.mp4

8.3 MB

06. Port Security and 802.1x Authentication.vtt

7.3 KB

07. RADIUS.mp4

4.3 MB

07. RADIUS.vtt

5.1 KB

08. Single Sign-on (SSO).mp4

9.4 MB

08. Single Sign-on (SSO).vtt

2.6 KB

09. SAML.mp4

4.1 MB

09. SAML.vtt

4.5 KB

10. TACACS.mp4

2.0 MB

10. TACACS.vtt

2.1 KB

11. TACACS+.mp4

4.7 MB

11. TACACS+.vtt

3.7 KB

12. oAUTH.mp4

3.4 MB

12. oAUTH.vtt

3.5 KB

13. OpenID and Shibboleth.mp4

2.5 MB

13. OpenID and Shibboleth.vtt

2.5 KB

14. Kerberos.mp4

6.3 MB

14. Kerberos.vtt

6.8 KB

15. Attribute Based Access Control (ABAC).mp4

5.4 MB

15. Attribute Based Access Control (ABAC).vtt

5.0 KB

16. Rule-basedRole-based Access Control (RBAC).mp4

3.2 MB

16. Rule-basedRole-based Access Control (RBAC).vtt

2.9 KB

17. Access Control Methods.mp4

1.9 MB

17. Access Control Methods.vtt

2.2 KB

18. Mandatory Access Control (MAC).mp4

2.0 MB

18. Mandatory Access Control (MAC).vtt

1.9 KB

19. Discretionary Access Control (DAC).mp4

1.3 MB

19. Discretionary Access Control (DAC).vtt

1.4 KB

20. Conditional Access.mp4

1.9 MB

20. Conditional Access.vtt

2.1 KB

21. Privileged Accounts.mp4

2.1 MB

21. Privileged Accounts.vtt

2.2 KB

22. Filesystem Permissions.mp4

2.5 MB

22. Filesystem Permissions.vtt

2.9 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/10/

implementing-authentication-and-authorization-solutions-slides.pdf

4.8 MB

/.../11. Implementing Public Key Infrastructure/

01. Module Overview.mp4

1.1 MB

01. Module Overview.vtt

1.1 KB

02. Certificate Authorities and Digital Certificates.mp4

1.4 MB

02. Certificate Authorities and Digital Certificates.vtt

1.5 KB

03. Certificate Authority.mp4

3.2 MB

03. Certificate Authority.vtt

3.7 KB

04. CRLs.mp4

2.5 MB

04. CRLs.vtt

3.0 KB

05. OCSP.mp4

2.8 MB

05. OCSP.vtt

3.5 KB

06. CSR and PKCS Standards.mp4

1.9 MB

06. CSR and PKCS Standards.vtt

1.3 KB

07. PKI.mp4

8.9 MB

07. PKI.vtt

7.1 KB

08. Public Key.mp4

2.0 MB

08. Public Key.vtt

2.2 KB

09. Private Key.mp4

1.0 MB

09. Private Key.vtt

1.2 KB

10. Object Identifiers (OID).mp4

3.7 MB

10. Object Identifiers (OID).vtt

3.0 KB

11. Types of Certificates.mp4

6.5 MB

11. Types of Certificates.vtt

9.3 KB

12. Certificate Formats.mp4

1.7 MB

12. Certificate Formats.vtt

1.8 KB

13. Online vs. Offline Certificate Authority (CA).mp4

3.6 MB

13. Online vs. Offline Certificate Authority (CA).vtt

3.7 KB

14. Stapling and Pinning.mp4

1.5 MB

14. Stapling and Pinning.vtt

1.5 KB

15. Trust Models.mp4

3.0 MB

15. Trust Models.vtt

3.2 KB

16. Key Escrow.mp4

2.8 MB

16. Key Escrow.vtt

2.6 KB

17. Certificate Chaining.mp4

1.6 MB

17. Certificate Chaining.vtt

1.8 KB

/.../Implementation of Secure Solutions for CompTIA Security+ By Christopher Rees/11/

implementing-public-key-infrastructure-slides.pdf

827.0 KB

/.../02. Implementing Appropriate Tools to Assess Organizational Security/

01. Module Overview.mp4

1.6 MB

01. Module Overview.vtt

1.6 KB

02. Traceroutetracert.mp4

3.0 MB

02. Traceroutetracert.vtt

3.6 KB

03. nslookupdig.mp4

3.0 MB

03. nslookupdig.vtt

3.0 KB

04. ipconfigifconfig.mp4

1.4 MB

04. ipconfigifconfig.vtt

1.6 KB

05. nmap and nmap demo.mp4

7.3 MB

05. nmap and nmap demo.vtt

6.2 KB

06. Ping and Pathping.mp4

5.8 MB

06. Ping and Pathping.vtt

4.6 KB

07. hping and hping demo.mp4

5.5 MB

07. hping and hping demo.vtt

4.6 KB

08. Netstat.mp4

2.5 MB

08. Netstat.vtt

2.4 KB

09. netcat.mp4

3.8 MB

09. netcat.vtt

3.9 KB

10. IP Scanners.mp4

1.9 MB

10. IP Scanners.vtt

1.7 KB

11. ARP.mp4

1.3 MB

11. ARP.vtt

1.3 KB

12. Route.mp4

1.0 MB

12. Route.vtt

0.9 KB

13. Curl and Curl Demo.mp4

2.7 MB

13. Curl and Curl Demo.vtt

2.9 KB

14. TheHarvester and Demo.mp4

4.9 MB

14. TheHarvester and Demo.vtt

3.5 KB

15. Sn1per and Demo.mp4

14.4 MB

15. Sn1per and Demo.vtt

7.7 KB

16. Scanless and Demo.mp4

5.7 MB

16. Scanless and Demo.vtt

3.2 KB

17. DNSenum.mp4

1.9 MB

17. DNSenum.vtt

1.2 KB

18. Nessus and Cuckoo.mp4

5.1 MB

18. Nessus and Cuckoo.vtt

4.7 KB

19. File Manipulation (Head, Tail, Cat, GREP and Logger).mp4

4.7 MB

19. File Manipulation (Head, Tail, Cat, GREP and Logger).vtt

4.8 KB

20. CHMOD.mp4

1.9 MB

20. CHMOD.vtt

1.9 KB

21. Shell and Script Environments (SSH, PowerShell, Python and O.mp4

2.5 MB

21. Shell and Script Environments (SSH, PowerShell, Python and O.vtt

2.4 KB

22. Packet Capture and TCPDump Demo.mp4

8.9 MB

22. Packet Capture and TCPDump Demo.vtt

4.8 KB

23. Forensics.mp4

9.2 MB

23. Forensics.vtt

10.3 KB

24. Exploitation Frameworks.mp4

4.5 MB

24. Exploitation Frameworks.vtt

4.0 KB

25. Data Sanitization Tools.mp4

10.9 MB

25. Data Sanitization Tools.vtt

9.0 KB

26. Module Review.mp4

840.4 KB

26. Module Review.vtt

1.1 KB

/.../Operations and Incident Response for CompTIA Security+ By Christopher Rees/02/

implementing-appropriate-tools-to-assess-organizational-security-slides.pdf

6.9 MB

/.../03. Applying Policies, Processes and Procedures for Incident Response/

01. Module Intro.mp4

1.5 MB

01. Module Intro.vtt

1.7 KB

02. Who Should Watch this Course.mp4

5.4 MB

02. Who Should Watch this Course.vtt

5.4 KB

03. Team Models.mp4

2.3 MB

03. Team Models.vtt

2.4 KB

04. Incident Response Process.mp4

3.0 MB

04. Incident Response Process.vtt

3.3 KB

05. Preparation.mp4

2.1 MB

05. Preparation.vtt

2.9 KB

06. Detection and Analysis.mp4

6.6 MB

06. Detection and Analysis.vtt

5.7 KB

07. Stopping the Spread.mp4

3.6 MB

07. Stopping the Spread.vtt

4.9 KB

08. Defining Goals and Expected Outcomes.mp4

7.9 MB

08. Defining Goals and Expected Outcomes.vtt

7.0 KB

09. Test the Plan.mp4

1.1 MB

09. Test the Plan.vtt

1.7 KB

10. Walkthrough Tests.mp4

2.9 MB

10. Walkthrough Tests.vtt

3.6 KB

11. Communication Tests.mp4

2.2 MB

11. Communication Tests.vtt

1.9 KB

12. Simulation (Tabletop) Tests.mp4

1.6 MB

12. Simulation (Tabletop) Tests.vtt

1.8 KB

13. Partial Exercise.mp4

1.7 MB

13. Partial Exercise.vtt

1.8 KB

14. Full Exercise.mp4

1.3 MB

14. Full Exercise.vtt

1.2 KB

15. Overall Cost and Complexity of Testing.mp4

1.4 MB

15. Overall Cost and Complexity of Testing.vtt

1.8 KB

16. Plan Review and Maintenance.mp4

5.2 MB

16. Plan Review and Maintenance.vtt

3.4 KB

17. Review Process Outcomes.mp4

2.1 MB

17. Review Process Outcomes.vtt

1.4 KB

18. Wired Brain Coffees Testing.mp4

4.2 MB

18. Wired Brain Coffees Testing.vtt

3.6 KB

19. Intelligence Lifecycle.mp4

830.4 KB

19. Intelligence Lifecycle.vtt

0.9 KB

20. Threat Intelligence Lifecycle.mp4

2.4 MB

20. Threat Intelligence Lifecycle.vtt

2.7 KB

21. Cyberthreat Intelligence Frameworks.mp4

1.9 MB

21. Cyberthreat Intelligence Frameworks.vtt

1.8 KB

22. Cyber Kill Chain.mp4

4.2 MB

22. Cyber Kill Chain.vtt

3.4 KB

23. Diamond Model.mp4

3.1 MB

23. Diamond Model.vtt

3.6 KB

24. MITRE Attack Framework.mp4

6.6 MB

24. MITRE Attack Framework.vtt

4.5 KB

25. Key Points to Remember.mp4

4.2 MB

25. Key Points to Remember.vtt

3.6 KB

26. Types of Plans.mp4

1.2 MB

26. Types of Plans.vtt

1.4 KB

27. Disaster Recovery Plan.mp4

2.3 MB

27. Disaster Recovery Plan.vtt

1.7 KB

28. Business Continuity Plan.mp4

1.8 MB

28. Business Continuity Plan.vtt

1.5 KB

29. Business Resumption Plan.mp4

1.8 MB

29. Business Resumption Plan.vtt

1.5 KB

30. Incident Management Plan.mp4

3.2 MB

30. Incident Management Plan.vtt

2.3 KB

31. Data Retention.mp4

6.3 MB

31. Data Retention.vtt

5.2 KB

32. Putting It All Together.mp4

5.8 MB

32. Putting It All Together.vtt

4.9 KB

33. Example Process.mp4

7.6 MB

33. Example Process.vtt

8.6 KB

/.../Operations and Incident Response for CompTIA Security+ By Christopher Rees/03/

applying-policies-processes-and-procedures-for-incident-response-slides.pdf

9.1 MB

/.../04. Implementing Appropriate Data Sources to Support an Investigation/

01. Module Intro.mp4

1.8 MB

01. Module Intro.vtt

2.3 KB

02. Filtering Through the Noise.mp4

7.8 MB

02. Filtering Through the Noise.vtt

6.9 KB

03. Vulnerability Scanner Demo.mp4

10.9 MB

03. Vulnerability Scanner Demo.vtt

6.4 KB

04. SIEM.mp4

6.9 MB

04. SIEM.vtt

6.2 KB

05. Log Files.mp4

7.2 MB

05. Log Files.vtt

8.0 KB

06. Log Management, Syslog, Rsyslog, and Syslog-ng.mp4

6.9 MB

06. Log Management, Syslog, Rsyslog, and Syslog-ng.vtt

5.9 KB

07. Journalctl.mp4

10.6 MB

07. Journalctl.vtt

6.0 KB

08. NXLOG.mp4

2.2 MB

08. NXLOG.vtt

1.3 KB

09. Retention (Auditing, Compliance and Investigations).mp4

2.9 MB

09. Retention (Auditing, Compliance and Investigations).vtt

4.0 KB

10. Bandwidth Monitors.mp4

2.3 MB

10. Bandwidth Monitors.vtt

2.6 KB

11. Metadata.mp4

6.4 MB

11. Metadata.vtt

6.2 KB

12. Netflow, sFlow, and IPFIX.mp4

9.7 MB

12. Netflow, sFlow, and IPFIX.vtt

9.7 KB

13. Detecting an Amplification Attack (ICMP echo).mp4

4.2 MB

13. Detecting an Amplification Attack (ICMP echo).vtt

4.1 KB

14. Protocol Analyzer Output.mp4

26.7 MB

14. Protocol Analyzer Output.vtt

10.6 KB

/.../Operations and Incident Response for CompTIA Security+ By Christopher Rees/04/

implementing-appropriate-data-sources-to-support-an-investigation-slides.pdf

6.2 MB

/.../05. Implementing Mitigation Techniques to Secure an Environment/

01. Module Intro.mp4

1.4 MB

01. Module Intro.vtt

1.5 KB

02. Application WhitelistingBlacklisting.mp4

2.2 MB

02. Application WhitelistingBlacklisting.vtt

2.6 KB

03. Quarantine.mp4

4.0 MB

03. Quarantine.vtt

4.5 KB

04. Firewalls.mp4

9.3 MB

04. Firewalls.vtt

12.1 KB

05. Demo - Configuring Firewall Rules.mp4

20.0 MB

05. Demo - Configuring Firewall Rules.vtt

7.1 KB

06. Mobile Device Management.mp4

10.1 MB

06. Mobile Device Management.vtt

8.3 KB

07. Using MDM to Locate and Secure and Lost Device.mp4

2.1 MB

07. Using MDM to Locate and Secure and Lost Device.vtt

2.0 KB

08. DLP, Content FiltersURL Filters and UpdatingRevoking Certificates.mp4

6.2 MB

08. DLP, Content FiltersURL Filters and UpdatingRevoking Certificates.vtt

5.9 KB

09. Segregation, Segmentation and Isolation.mp4

5.9 MB

09. Segregation, Segmentation and Isolation.vtt

5.5 KB

10. Virtualization.mp4

2.3 MB

10. Virtualization.vtt

2.2 KB

11. Air Gaps.mp4

3.5 MB

11. Air Gaps.vtt

4.1 KB

12. Securing the Environment using Isolation, Containment and Segment.mp4

3.4 MB

12. Securing the Environment using Isolation, Containment and Segment.vtt

3.8 KB

13. SOAR and RunbooksPlaybooks.mp4

9.3 MB

13. SOAR and RunbooksPlaybooks.vtt

10.5 KB

/.../Operations and Incident Response for CompTIA Security+ By Christopher Rees/05/

implementing-mitigation-techniques-to-secure-an-environment-slides.pdf

1.8 MB

/.../06. Understanding the Key Aspects of Digital Forensics/

01. Module Overview.mp4

1.8 MB

01. Module Overview.vtt

2.3 KB

02. Computer Forensics.mp4

3.7 MB

02. Computer Forensics.vtt

4.5 KB

03. Order of Volatility.mp4

9.4 MB

03. Order of Volatility.vtt

9.4 KB

04. Chain of Custody.mp4

5.6 MB

04. Chain of Custody.vtt

4.9 KB

05. Legal Hold.mp4

2.3 MB

05. Legal Hold.vtt

2.7 KB

06. First Responder Best Practices.mp4

10.0 MB

06. First Responder Best Practices.vtt

9.3 KB

07. Capture a System Image.mp4

6.8 MB

07. Capture a System Image.vtt

6.5 KB

08. Network Traffic and Logs.mp4

6.6 MB

08. Network Traffic and Logs.vtt

6.9 KB

09. Capturing Video.mp4

1.9 MB

09. Capturing Video.vtt

1.6 KB

10. Record Time Offset.mp4

4.5 MB

10. Record Time Offset.vtt

4.7 KB

11. Taking Hashes.mp4

3.5 MB

11. Taking Hashes.vtt

3.5 KB

12. Screenshots.mp4

1.7 MB

12. Screenshots.vtt

2.1 KB

13. Witnesses.mp4

4.0 MB

13. Witnesses.vtt

3.9 KB

14. Preservation of Evidence.mp4

2.0 MB

14. Preservation of Evidence.vtt

2.9 KB

15. Recovery.mp4

2.4 MB

15. Recovery.vtt

2.9 KB

16. Strategic Intelligence Counterintelligence Gathering.mp4

3.1 MB

16. Strategic Intelligence Counterintelligence Gathering.vtt

2.7 KB

17. Data Integrity.mp4

3.2 MB

17. Data Integrity.vtt

3.7 KB

18. Non-repudiation.mp4

1.5 MB

18. Non-repudiation.vtt

1.6 KB

19. On-prem vs. Cloud Challenges and Right to Audit.mp4

6.1 MB

19. On-prem vs. Cloud Challenges and Right to Audit.vtt

6.8 KB

20. Regulatory Jurisdictional Issues.mp4

4.7 MB

20. Regulatory Jurisdictional Issues.vtt

3.9 KB

21. Data Breach Notification Laws.mp4

4.3 MB

21. Data Breach Notification Laws.vtt

4.3 KB

/.../Operations and Incident Response for CompTIA Security+ By Christopher Rees/06/

understanding-the-key-aspects-of-digital-forensics-slides.pdf

4.4 MB

/.../Operations and Incident Response for CompTIA Security+ By Christopher Rees/1. Course Overview/

1. Course Overview.mp4

5.1 MB

1. Course Overview.vtt

3.2 KB

 

Total files 1637


Copyright © 2025 FileMood.com