FileMood

Download [ DevCourseWeb.com ] Udemy - Security + Comptia Security Plus Sy0-701 Certification Prep

DevCourseWeb com Udemy Security Comptia Security Plus Sy0 701 Certification Prep

Name

[ DevCourseWeb.com ] Udemy - Security + Comptia Security Plus Sy0-701 Certification Prep

 DOWNLOAD Copy Link

Total Size

4.3 GB

Total Files

231

Last Seen

2024-12-21 23:49

Hash

9908439A4F45C2393E1C2BCDF1E1875CD7E70A78

/

Get Bonus Downloads Here.url

0.2 KB

/.../1 - Introduction to Security CompTIA Security Plus SY0701 Certification Prep/

1 - Introduction to security.mp4

29.2 MB

/.../10 - Intrusion Detection Systems/

53 - Understanding IDSs and IPSs.mp4

38.0 MB

54 - Detection Methods.mp4

18.0 MB

55 - Honeypots.mp4

20.0 MB

/.../11 - Virtual Private Network VPN Technologies/

56 - Using VPNs for Remote Access.mp4

48.4 MB

57 - VPN Tunnel Protocols.mp4

21.6 MB

58 - SitetoSite VPNs.mp4

14.3 MB

/.../12 - Security Threats/

59 - Understanding Threat Actors.mp4

59.0 MB

60 - Viruses.mp4

9.5 MB

61 - Logic Bombs.mp4

10.0 MB

62 - Trojans.mp4

16.8 MB

63 - Ransomware.mp4

14.3 MB

64 - Spyware.mp4

9.2 MB

65 - Bots and Botnets.mp4

13.7 MB

66 - Unified Threat ManagementUTM.mp4

24.8 MB

/.../13 - Securing Wireless Networks/

67 - Disable SSID Broadcasting or Not.mp4

4.4 MB

68 - Enable MAC Filtering.mp4

9.5 MB

/.../14 - Understanding Wireless Attacks/

69 - Disassociation Attacks.mp4

8.9 MB

70 - WPS and WPS Attacks.mp4

7.9 MB

71 - Rogue AP.mp4

8.9 MB

72 - Evil Twin.mp4

8.4 MB

73 - Jamming Attacks.mp4

17.7 MB

74 - Bluetooth Attacks.mp4

10.3 MB

75 - RFID Attacks.mp4

9.1 MB

76 - Wireless Replay Attacks.mp4

6.0 MB

/.../15 - Network Attacks/

77 - Network Attacks.mp4

16.4 MB

78 - SYN Flood Attack.mp4

12.8 MB

79 - MAC Flood Attacks.mp4

12.3 MB

80 - ManintheMiddle Attacks.mp4

7.0 MB

81 - ARP Poisoning Attacks.mp4

20.2 MB

82 - DNS Attacks.mp4

34.4 MB

/.../16 - Password Attacks/

83 - Brute Force Attacks.mp4

19.7 MB

84 - Password Hashes.mp4

23.8 MB

85 - Birthday Attacks.mp4

28.3 MB

86 - Replay Attacks.mp4

14.0 MB

87 - Hijacking and Related Attacks.mp4

22.8 MB

88 - Driver Manipulation.mp4

11.7 MB

/.../17 - ZeroDay Attacks/

89 - ZeroDay Attacks.mp4

16.0 MB

/.../18 - Code Attacks/

90 - Code Reuse and SDKs.mp4

17.7 MB

91 - Code Quality and Testing.mp4

11.8 MB

92 - Development LifeCycle Models.mp4

15.1 MB

93 - Secure DevOps.mp4

13.1 MB

94 - Version Control and Change Management.mp4

10.4 MB

95 - Provisioning and Deprovisioning.mp4

7.7 MB

/.../19 - Web Server Attacks/

100 - CrossSite Scripting.mp4

26.3 MB

96 - Web Servers.mp4

5.7 MB

97 - SQL Injection Attacks.mp4

20.6 MB

98 - Protecting Against SQL Injection Attacks.mp4

11.6 MB

99 - DLL Injection.mp4

12.4 MB

/.../2 - Basic Security Concepts/

10 - Introducing Basic Risk Concepts.mp4

11.6 MB

2 - What is Security.mp4

8.9 MB

3 - PrivacyIntegrityAvailability.mp4

15.8 MB

4 - Encryption and Access Control.mp4

12.3 MB

5 - 3 A Rule Authentication Authorization and Accounting.mp4

12.7 MB

6 - Threat.mp4

13.2 MB

7 - What is a Hacker.mp4

18.6 MB

8 - What is Attack What are the Stages.mp4

12.6 MB

9 - Single Point Of Failure SPOF.mp4

10.9 MB

/.../20 - Social Engineering Attacks/

101 - Social Engineering.mp4

21.5 MB

102 - Shoulder Surfing.mp4

4.6 MB

103 - Tricking Users with Hoaxes.mp4

5.2 MB

104 - Tailgating and Mantraps.mp4

5.9 MB

105 - Dumpster Diving.mp4

8.0 MB

106 - Watering Hole Attacks.mp4

5.8 MB

107 - Spam.mp4

10.0 MB

108 - Phishing.mp4

62.7 MB

109 - Whaling.mp4

13.8 MB

110 - Vishing.mp4

15.5 MB

/.../21 - Memory Buffer Vulnerabilities/

111 - Buffer Overflow Attacks.mp4

18.0 MB

112 - Pointer Dereference.mp4

8.9 MB

113 - Compiled Versus Runtime Code.mp4

5.7 MB

114 - Proper Input Validation.mp4

17.4 MB

115 - Side Input Validation.mp4

14.0 MB

116 - Avoiding Race Conditions.mp4

10.3 MB

117 - Proper Error Handling.mp4

9.6 MB

118 - Cryptographic Techniques.mp4

7.4 MB

/.../22 - Preventing Attacks/

119 - Protecting Systems from Malware.mp4

8.7 MB

120 - Antivirus and AntiMalware Software.mp4

46.5 MB

121 - Advanced Malware Tools.mp4

14.0 MB

122 - Educating Users.mp4

7.8 MB

/.../23 - Server Security/

123 - Implementing Secure Systems.mp4

18.8 MB

124 - Operating systems.mp4

13.4 MB

125 - Secure Operating System Configurations.mp4

38.2 MB

126 - Resiliency and Automation Strategies.mp4

27.8 MB

127 - Change Management Policy.mp4

68.0 MB

128 - Secure Staging and Deployment.mp4

23.9 MB

129 - Peripherals.mp4

21.7 MB

130 - EMI and EMP.mp4

36.1 MB

131 - Hardware Security Module.mp4

8.7 MB

132 - Cloud Deployment Models.mp4

20.5 MB

133 - Cloud Services.mp4

70.5 MB

134 - Security Responsibilities with Cloud Models.mp4

12.1 MB

135 - Advanced Cloud Services.mp4

17.4 MB

/.../24 - Mobile Devices/

136 - Deploying Mobile Devices Securely.mp4

7.5 MB

137 - Deployment Models.mp4

46.5 MB

138 - Mobile Device Management.mp4

41.1 MB

139 - Unauthorized Connections.mp4

16.0 MB

140 - Hardware Control.mp4

8.1 MB

/.../25 - Data Security/

141 - Protecting Data.mp4

46.7 MB

142 - Data Loss Prevention.mp4

18.0 MB

/.../26 - Database Security/

143 - Database Concepts.mp4

9.5 MB

144 - Normalization.mp4

14.3 MB

145 - SQL Queries.mp4

8.2 MB

146 - Database Security.mp4

3.1 MB

/.../27 - Risk Management/

147 - Understanding Risk Management.mp4

9.4 MB

148 - Risk Management.mp4

8.5 MB

149 - Threats and Threat Assessments.mp4

14.3 MB

150 - Vulnerabilities.mp4

6.0 MB

151 - Risk Assessment.mp4

42.1 MB

152 - Risk Registers.mp4

19.9 MB

/.../28 - Cloud Vendors Relationships/

153 - Finding and Evaluating Cloud Vendors.mp4

41.1 MB

154 - Job Notification.mp4

11.3 MB

155 - Conducting Evaluations.mp4

13.7 MB

156 - Negotiating Contracts and Billing.mp4

33.1 MB

157 - Professional Services.mp4

15.2 MB

158 - Chargebacks.mp4

44.3 MB

159 - Laws Regulations And Safety Standards.mp4

12.0 MB

/29 - Advising/

160 - Key Stakeholders.mp4

14.5 MB

161 - Using Baselines.mp4

10.3 MB

162 - Conducting Feasibility Study.mp4

9.7 MB

163 - Making GAP Analysis.mp4

10.2 MB

164 - Using Reporting.mp4

5.2 MB

165 - Understanding Benchmarks.mp4

12.1 MB

/3 - Identity Management/

11 - What is Identity Management.mp4

8.8 MB

12 - KERBEROS NTLMLDAP.mp4

22.2 MB

13 - Single SignOn SSO.mp4

29.0 MB

14 - Smart Cards.mp4

8.9 MB

15 - Tokens or Key Fobs.mp4

15.2 MB

16 - Biometric Methods.mp4

72.8 MB

17 - DualFactor and Multifactor Authentication.mp4

4.2 MB

18 - PAP CHAP MSCHAP.mp4

8.7 MB

19 - RADIUS.mp4

15.5 MB

/.../30 - Checking for Vulnerabilities/

166 - Checking for Vulnerabilities.mp4

6.6 MB

167 - Password Crackers.mp4

6.7 MB

168 - Network Scanners.mp4

22.0 MB

169 - Wireless Scanners Cracker.mp4

33.5 MB

170 - Banner Grabbing.mp4

4.5 MB

171 - Vulnerability Scanning.mp4

71.8 MB

/.../31 - Penetration Tests/

172 - Penetration Tests.mp4

9.3 MB

173 - Passive Active Reconnaissance.mp4

6.3 MB

174 - Initial Exploitation.mp4

12.1 MB

175 - White Gray and Black Box Testing.mp4

9.4 MB

176 - Intrusive and NonIntrusive Testing.mp4

4.1 MB

177 - Passive Versus Active Tools.mp4

73.4 MB

/.../32 - Physical Security Precautions/

178 - Comparing Physical Security Controls.mp4

10.8 MB

179 - Comparing Door Lock Types.mp4

17.7 MB

180 - Preventing Tailgating with Mantraps.mp4

6.6 MB

181 - Increasing Physical Security with Guards.mp4

28.3 MB

182 - Using Hardware Locks.mp4

9.9 MB

183 - Asset Management.mp4

7.9 MB

184 - Implementing Environmental Controls.mp4

60.0 MB

/.../33 - Single Point of Failure/

185 - Single Point of Failure.mp4

5.6 MB

186 - Disk Redundancies.mp4

16.6 MB

187 - Server Redundancy and High Availability.mp4

52.6 MB

188 - Backup.mp4

63.5 MB

/.../34 - Business Continuity Plans/

189 - Comparing Business Continuity Elements.mp4

27.5 MB

190 - Impact.mp4

11.0 MB

191 - Recovery Time Objective.mp4

15.9 MB

192 - Recovery Sites.mp4

17.9 MB

193 - Disaster Recovery.mp4

30.7 MB

/.../35 - Examination of Logs/

194 - Monitoring Logs for Event Anomalies.mp4

55.0 MB

195 - OtherLogsSIEM.mp4

22.3 MB

196 - Continuous Monitoring.mp4

17.1 MB

/36 - Controls/

197 - Understanding Control Types.mp4

31.3 MB

198 - Control Goals.mp4

44.5 MB

/.../37 - Cryptography and PKI/

199 - Introducing Cryptography Concepts.mp4

10.8 MB

200 - Hashing.mp4

13.6 MB

201 - MD5.mp4

2.7 MB

202 - SHA.mp4

8.4 MB

203 - HMAC.mp4

7.7 MB

204 - Hashing Files.mp4

9.2 MB

205 - Digital Signatures Certificates and Nonrepudiation.mp4

10.2 MB

206 - Providing Confidentiality with Encryption.mp4

34.7 MB

207 - Block Versus Stream Ciphers.mp4

15.5 MB

208 - Symmetric Encryption.mp4

6.4 MB

209 - Symmetric Encryption Methods.mp4

19.2 MB

210 - Asymmetric Encryption.mp4

7.4 MB

211 - Certificates.mp4

12.0 MB

212 - Steganography And Obfuscation.mp4

10.6 MB

213 - Using Cryptographic Protocols.mp4

5.9 MB

214 - Cipher Suites.mp4

9.2 MB

215 - Exploring PKI Components.mp4

56.6 MB

216 - Comparing Certificate Types.mp4

15.2 MB

/.../38 - Secure Web Page/

217 - HTTPS Transport Encryption.mp4

15.4 MB

/.../39 - Risk Mitigation Methods/

218 - Exploring Security Policies.mp4

4.5 MB

219 - Personnel Management Policies.mp4

37.4 MB

220 - Background Check.mp4

15.6 MB

221 - NDA.mp4

17.7 MB

222 - Policy Violations and Adverse Actions.mp4

6.2 MB

223 - Agreement Types.mp4

11.7 MB

224 - PII and PHI.mp4

15.4 MB

225 - Responding to Incidents.mp4

8.1 MB

226 - Providing Training.mp4

19.2 MB

227 - Troubleshooting Personnel Issues.mp4

8.0 MB

228 - Incident ResponseEducation.mp4

18.4 MB

/.../4 - Users in CompTIA/

20 - Create a User in comptia.mp4

6.4 MB

21 - Managing Accounts 1.mp4

47.2 MB

22 - Managing Accounts 2.mp4

43.7 MB

23 - Passwords.mp4

23.9 MB

24 - Password Policy.mp4

28.5 MB

/40 - Extra/

229 - Security CompTIA Security Plus SY0701 Certification Prep.html

0.3 KB

/.../5 - Comparing Access Control Models/

25 - Comparing Access Control Models.mp4

8.3 MB

26 - RoleBased Access Control.mp4

11.3 MB

27 - Establishing Access with GroupBased Privileges.mp4

15.2 MB

28 - Rule Based and Discretionary Access Control.mp4

18.4 MB

29 - Mandatory Access Control.mp4

8.9 MB

/6 - Virtualization/

30 - What is Virtualization.mp4

16.4 MB

31 - Virtualization Technologies.mp4

29.5 MB

32 - Benefits of Virtualization.mp4

9.6 MB

33 - Security Issues of Virtualization.mp4

18.6 MB

/7 - Network Technologies/

34 - Basic Network Concepts.mp4

11.6 MB

35 - Domain Name ServicesDNS.mp4

42.7 MB

36 - What is the port How does it work.mp4

27.1 MB

37 - What is the Network Address.mp4

13.3 MB

38 - Combining the IP Address and the Port.mp4

17.5 MB

39 - Switches.mp4

13.9 MB

40 - Bridge.mp4

16.0 MB

41 - Understanding NAT and PAT.mp4

11.8 MB

42 - Network Separation.mp4

25.6 MB

43 - Proxy Servers.mp4

7.6 MB

44 - Types of Using Network Technologies 1.mp4

11.5 MB

45 - Routers.mp4

20.9 MB

46 - Types of Using Network Technologies 2.mp4

26.7 MB

/8 - Wireless Networks/

47 - Reviewing Basic Wireless Network Information.mp4

23.7 MB

48 - Wireless Cryptographic Protocols.mp4

18.0 MB

49 - Authentication Protocols for Wireless Networks.mp4

21.8 MB

/.../9 - Network Security Technologies/

50 - Firewalls.mp4

19.2 MB

51 - Network Access Control.mp4

8.6 MB

52 - Implementing a Secure Network.mp4

37.3 MB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

 

Total files 231


Copyright © 2024 FileMood.com