FileMood

Download [FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23

FreeCourseSite com Udemy The Complete Certified in Cybersecurity CC course ISC2 23

Name

[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23

 DOWNLOAD Copy Link

Total Size

5.8 GB

Total Files

294

Last Seen

2024-10-15 23:38

Hash

2570DBE15BEC901F6B4C7CF73BA5E9686622FFCA

/0. Websites you may like/

[CourseClub.Me].url

0.1 KB

[FreeCourseSite.com].url

0.1 KB

[GigaCourse.Com].url

0.0 KB

/01 - Introduction/

001 2023-CC-Domain-1-Study-guide-by-ThorTeaches.com-v1.1.pdf

1.4 MB

001 2023-CC-Domain-2-Study-guide-by-ThorTeaches.com-v1.1.pdf

833.2 KB

001 2023-CC-Domain-3-Study-guide-by-ThorTeaches.com-v1.1.pdf

1.2 MB

001 2023-CC-Domain-4-Study-guide-by-ThorTeaches.com-v1.1.pdf

4.6 MB

001 2023-CC-Domain-5-Study-guide-by-ThorTeaches.com-v1.1.pdf

772.7 KB

001 2023-CC-Mnemonics-by-ThorTeaches.pdf

288.5 KB

001 Introduction and download your free study guides.mp4

12.1 MB

001 Introduction and download your free study guides_en.srt

1.2 KB

002 Connect with me on Social media and the Udemy ratings system.mp4

12.7 MB

002 Connect with me on Social media and the Udemy ratings system_en.srt

2.9 KB

003 How to get the most out of my courses and the Udemy interface.mp4

30.7 MB

003 How to get the most out of my courses and the Udemy interface_en.srt

4.0 KB

004 How to approach certification studying.mp4

27.8 MB

004 How to approach certification studying_en.srt

6.2 KB

005 General Certified in Cybersecurity (CC) links.html

3.2 KB

/02 - Domain 1 Security Principles/

001 Domain 1 - What we will be covering.mp4

10.9 MB

001 Domain 1 - What we will be covering_en.srt

1.3 KB

002 The differences between Information Security, IT Security, and Cybersecurity.mp4

58.7 MB

002 The differences between Information Security, IT Security, and Cybersecurity_en.srt

10.5 KB

003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4

22.5 MB

003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1_en.srt

11.5 KB

004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4

19.5 MB

004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2_en.srt

13.2 KB

005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4

9.9 MB

005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3_en.srt

6.5 KB

006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4

24.5 MB

006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4_en.srt

16.4 KB

007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4

13.3 MB

007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5_en.srt

6.6 KB

008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4

46.4 MB

008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1_en.srt

14.0 KB

009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4

22.6 MB

009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2_en.srt

5.1 KB

010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4

36.0 MB

010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3_en.srt

13.3 KB

011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4

71.2 MB

011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4_en.srt

15.5 KB

012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4

19.7 MB

012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5_en.srt

7.3 KB

013 Privacy.mp4

16.9 MB

013 Privacy_en.srt

10.2 KB

014 Risk Management - part 1.mp4

13.6 MB

014 Risk Management - part 1_en.srt

8.7 KB

015 Risk Management - part 2.mp4

31.8 MB

015 Risk Management - part 2_en.srt

14.7 KB

016 Risk Management - part 3.mp4

28.1 MB

016 Risk Management - part 3_en.srt

17.4 KB

017 Risk Management - part 4.mp4

32.3 MB

017 Risk Management - part 4_en.srt

16.4 KB

018 Risk Management - part 5.mp4

49.6 MB

018 Risk Management - part 5_en.srt

14.8 KB

019 Risk Management - part 6.mp4

25.2 MB

019 Risk Management - part 6_en.srt

10.4 KB

020 Access Control Categories and Types - part 1.mp4

29.6 MB

020 Access Control Categories and Types - part 1_en.srt

14.6 KB

021 Access Control Categories and Types - part 2.mp4

41.2 MB

021 Access Control Categories and Types - part 2_en.srt

17.4 KB

022 The Ethics of your organizations and (ISC)2.mp4

18.6 MB

022 The Ethics of your organizations and (ISC)2_en.srt

7.0 KB

023 Governance vs. Management.mp4

47.7 MB

023 Governance vs. Management_en.srt

13.9 KB

024 Laws and regulations - part 1.mp4

81.2 MB

024 Laws and regulations - part 1_en.srt

14.2 KB

025 Laws and regulations - part 2.mp4

58.2 MB

025 Laws and regulations - part 2_en.srt

15.4 KB

026 Security governance principles.mp4

63.2 MB

026 Security governance principles_en.srt

17.9 KB

027 What we covered in Domain 1.mp4

8.7 MB

027 What we covered in Domain 1_en.srt

1.0 KB

028 Certified in Cybersecurity (CC) Domain 1 links.html

5.0 KB

/03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/

001 Domain 2 - What we will be covering.mp4

9.6 MB

001 Domain 2 - What we will be covering_en.srt

1.3 KB

002 BCP - Business Continuity Planning - Part 1.mp4

42.1 MB

002 BCP - Business Continuity Planning - Part 1_en.srt

12.0 KB

003 BCP - Business Continuity Planning - Part 2.mp4

32.5 MB

003 BCP - Business Continuity Planning - Part 2_en.srt

21.2 KB

004 BCP - Business Continuity Planning - Part 3.mp4

47.7 MB

004 BCP - Business Continuity Planning - Part 3_en.srt

20.6 KB

005 DRP - Disaster Recovery Planning - Part 1.mp4

47.1 MB

005 DRP - Disaster Recovery Planning - Part 1_en.srt

20.2 KB

006 DRP - Disaster Recovery Planning - Part 2.mp4

39.5 MB

006 DRP - Disaster Recovery Planning - Part 2_en.srt

9.7 KB

007 DRP - Disaster Recovery Planning - Part 3.mp4

49.4 MB

007 DRP - Disaster Recovery Planning - Part 3_en.srt

16.3 KB

008 DRP - Disaster Recovery Planning - Part 4.mp4

67.6 MB

008 DRP - Disaster Recovery Planning - Part 4_en.srt

21.5 KB

009 Incidents Response - Part 1.mp4

37.6 MB

009 Incidents Response - Part 1_en.srt

21.4 KB

010 Incidents Response - Part 2.mp4

29.9 MB

010 Incidents Response - Part 2_en.srt

17.0 KB

011 Incidents Response - Part 3.mp4

19.4 MB

011 Incidents Response - Part 3_en.srt

13.4 KB

012 Incidents Response - Part 4.mp4

24.3 MB

012 Incidents Response - Part 4_en.srt

18.4 KB

013 Incidents Response - Part 5.mp4

46.2 MB

013 Incidents Response - Part 5_en.srt

12.6 KB

014 What we covered in Domain 2.mp4

7.3 MB

014 What we covered in Domain 2_en.srt

1.0 KB

015 Certified in Cybersecurity (CC) Domain 2 links.html

2.2 KB

/04 - Domain 3 Access Controls Concepts/

001 Domain 3 - What we will be covering.mp4

7.9 MB

001 Domain 3 - What we will be covering_en.srt

1.2 KB

002 Physical Security - part 1.mp4

45.6 MB

002 Physical Security - part 1_en.srt

19.5 KB

003 Physical Security - part 2.mp4

46.0 MB

003 Physical Security - part 2_en.srt

12.1 KB

004 Physical Security - part 3.mp4

29.1 MB

004 Physical Security - part 3_en.srt

20.7 KB

005 Physical Security - part 4.mp4

26.3 MB

005 Physical Security - part 4_en.srt

14.6 KB

006 Physical Security - part 5.mp4

23.7 MB

006 Physical Security - part 5_en.srt

12.3 KB

007 Logical Access Control - Part 1.mp4

28.4 MB

007 Logical Access Control - Part 1_en.srt

14.8 KB

008 Logical Access Control - Part 2.mp4

19.1 MB

008 Logical Access Control - Part 2_en.srt

12.6 KB

009 Logical Access Control - Part 3.mp4

82.3 MB

009 Logical Access Control - Part 3_en.srt

19.5 KB

010 Logical Access Control - Part 4.mp4

46.1 MB

010 Logical Access Control - Part 4_en.srt

13.4 KB

011 Logical Access Control - Part 5.mp4

85.1 MB

011 Logical Access Control - Part 5_en.srt

19.1 KB

012 What we covered in Domain 3.mp4

7.2 MB

012 What we covered in Domain 3_en.srt

1.1 KB

013 Certified in Cybersecurity Domain (CC) 3 links.html

5.2 KB

/.../0. Websites you may like/

[CourseClub.Me].url

0.1 KB

[FreeCourseSite.com].url

0.1 KB

[GigaCourse.Com].url

0.0 KB

/05 - Domain 4 Network Security/

001 Domain 4 - What we will be covering.mp4

8.6 MB

001 Domain 4 - What we will be covering_en.srt

1.1 KB

002 Network Basics and Definitions - Part 1.mp4

46.7 MB

002 Network Basics and Definitions - Part 1_en.srt

19.0 KB

003 Network Basics and Definitions - Part 2.mp4

40.7 MB

003 Network Basics and Definitions - Part 2_en.srt

16.9 KB

004 The OSI Model - Part 1.mp4

105.9 MB

004 The OSI Model - Part 1_en.srt

26.0 KB

005 The OSI Model - Part 2.mp4

52.2 MB

005 The OSI Model - Part 2_en.srt

13.7 KB

006 The OSI Model - Part 3.mp4

59.6 MB

006 The OSI Model - Part 3_en.srt

13.0 KB

007 The TCPIP model.mp4

51.1 MB

007 The TCPIP model_en.srt

15.0 KB

008 IP addresses, port numbers, and MAC addresses - Part 1.mp4

48.1 MB

008 IP addresses, port numbers, and MAC addresses - Part 1_en.srt

19.0 KB

009 IP addresses, port numbers, and MAC addresses - Part 2.mp4

25.5 MB

009 IP addresses, port numbers, and MAC addresses - Part 2_en.srt

9.3 KB

010 IP addresses, port numbers, and MAC addresses - Part 3.mp4

21.9 MB

010 IP addresses, port numbers, and MAC addresses - Part 3_en.srt

7.7 KB

011 IP support protocols - Part 1.mp4

48.8 MB

011 IP support protocols - Part 1_en.srt

12.5 KB

012 IP support protocols - Part 2.mp4

35.5 MB

012 IP support protocols - Part 2_en.srt

10.3 KB

013 Cables - Part 1.mp4

23.4 MB

013 Cables - Part 1_en.srt

12.3 KB

014 Cables - Part 2.mp4

48.2 MB

014 Cables - Part 2_en.srt

13.6 KB

015 LAN topologies.mp4

27.5 MB

015 LAN topologies_en.srt

14.5 KB

016 Wi-Fi.mp4

54.3 MB

016 Wi-Fi_en.srt

16.5 KB

017 Wireless networks - Part 1.mp4

21.0 MB

017 Wireless networks - Part 1_en.srt

11.8 KB

018 Wireless networks - Part 2.mp4

42.5 MB

018 Wireless networks - Part 2_en.srt

10.6 KB

019 VLANs and Routers - Part 1.mp4

43.4 MB

019 VLANs and Routers - Part 1_en.srt

12.3 KB

020 VLANs and Routers - Part 2.mp4

44.6 MB

020 VLANs and Routers - Part 2_en.srt

14.6 KB

021 VPNs, NAC, and third-party connectivity.mp4

51.7 MB

021 VPNs, NAC, and third-party connectivity_en.srt

22.1 KB

022 SDN, SD-WAN, and SDX.mp4

39.5 MB

022 SDN, SD-WAN, and SDX_en.srt

15.9 KB

023 Attacks and attackers - Part 1.mp4

30.7 MB

023 Attacks and attackers - Part 1_en.srt

13.9 KB

024 Attacks and attackers - Part 2.mp4

39.5 MB

024 Attacks and attackers - Part 2_en.srt

20.8 KB

025 Attacks and attackers - Part 3.mp4

67.7 MB

025 Attacks and attackers - Part 3_en.srt

16.1 KB

026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4

27.8 MB

026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1_en.srt

12.0 KB

027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4

37.7 MB

027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2_en.srt

15.7 KB

028 SIEM and SOAR systems.mp4

27.5 MB

028 SIEM and SOAR systems_en.srt

10.7 KB

029 Honeynets and Honeypots.mp4

11.4 MB

029 Honeynets and Honeypots_en.srt

5.6 KB

030 Firewalls - Part 1.mp4

30.4 MB

030 Firewalls - Part 1_en.srt

9.5 KB

031 Firewalls - Part 2.mp4

36.5 MB

031 Firewalls - Part 2_en.srt

17.1 KB

032 0-day attacks and exploits.mp4

58.8 MB

032 0-day attacks and exploits_en.srt

14.1 KB

033 Vulnerability Scanning.mp4

17.2 MB

033 Vulnerability Scanning_en.srt

8.6 KB

034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4

30.7 MB

034 Virtualization, Cloud, and Distributed Computing - Part 1_en.srt

12.6 KB

035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4

27.8 MB

035 Virtualization, Cloud, and Distributed Computing - Part 2_en.srt

14.2 KB

036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4

22.6 MB

036 Virtualization, Cloud, and Distributed Computing - Part 3_en.srt

10.2 KB

037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4

61.4 MB

037 Virtualization, Cloud, and Distributed Computing - Part 4_en.srt

18.0 KB

038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4

91.7 MB

038 Virtualization, Cloud, and Distributed Computing - Part 5_en.srt

19.4 KB

039 The Internet of Things (IoT).mp4

20.9 MB

039 The Internet of Things (IoT)_en.srt

10.6 KB

040 Asset tracking and hardware hardening.mp4

25.7 MB

040 Asset tracking and hardware hardening_en.srt

14.9 KB

041 Electricity.mp4

61.0 MB

041 Electricity_en.srt

18.3 KB

042 Backups - Part 1.mp4

35.1 MB

042 Backups - Part 1_en.srt

18.5 KB

043 Backups - Part 2.mp4

31.6 MB

043 Backups - Part 2_en.srt

14.5 KB

044 Fault tolerance, redundancy, and resiliency - Part 1.mp4

20.6 MB

044 Fault tolerance, redundancy, and resiliency - Part 1_en.srt

11.2 KB

045 Fault tolerance, redundancy, and resiliency - Part 2.mp4

23.1 MB

045 Fault tolerance, redundancy, and resiliency - Part 2_en.srt

17.3 KB

046 Fault tolerance, redundancy, and resiliency - Part 3.mp4

24.2 MB

046 Fault tolerance, redundancy, and resiliency - Part 3_en.srt

10.9 KB

047 Fire suppression - Part 1.mp4

19.5 MB

047 Fire suppression - Part 1_en.srt

10.6 KB

048 Fire suppression - Part 2.mp4

31.9 MB

048 Fire suppression - Part 2_en.srt

14.8 KB

049 Secure design principles - Part 1.mp4

60.1 MB

049 Secure design principles - Part 1_en.srt

15.0 KB

050 Secure design principles - Part 2.mp4

37.8 MB

050 Secure design principles - Part 2_en.srt

17.5 KB

051 What we covered in Domain 4.mp4

7.8 MB

051 What we covered in Domain 4_en.srt

1.2 KB

052 Certified in Cybersecurity (CC) Domain 4 links.html

13.8 KB

/06 - Domain 5 Security Operations/

001 Domain 5 - What we will be covering.mp4

6.7 MB

001 Domain 5 - What we will be covering_en.srt

1.0 KB

002 Configuration Management.mp4

16.0 MB

002 Configuration Management_en.srt

11.8 KB

003 Patch Management.mp4

29.7 MB

003 Patch Management_en.srt

22.0 KB

004 Change Management.mp4

44.7 MB

004 Change Management_en.srt

21.8 KB

005 Cryptography - Part 1.mp4

33.2 MB

005 Cryptography - Part 1_en.srt

15.5 KB

006 Cryptography - Part 2.mp4

53.6 MB

006 Cryptography - Part 2_en.srt

12.0 KB

007 Cryptography - Part 3.mp4

34.3 MB

007 Cryptography - Part 3_en.srt

11.1 KB

008 Hashing.mp4

19.9 MB

008 Hashing_en.srt

10.6 KB

009 Attacks on our cryptography.mp4

29.2 MB

009 Attacks on our cryptography_en.srt

15.7 KB

010 Data handling, data storage and data retention - Part 1.mp4

59.7 MB

010 Data handling, data storage and data retention - Part 1_en.srt

15.6 KB

011 Data handling, data storage and data retention - Part 2.mp4

41.1 MB

011 Data handling, data storage and data retention - Part 2_en.srt

17.2 KB

012 Data handling, data storage and data retention - Part 3.mp4

29.7 MB

012 Data handling, data storage and data retention - Part 3_en.srt

9.3 KB

013 Administrative (Directive) Controls.mp4

92.2 MB

013 Administrative (Directive) Controls_en.srt

27.0 KB

014 Training and awareness.mp4

29.5 MB

014 Training and awareness_en.srt

14.7 KB

015 Social Engineering attacks - Part 1.mp4

33.0 MB

015 Social Engineering attacks - Part 1_en.srt

17.9 KB

016 Social Engineering attacks - Part 2.mp4

43.6 MB

016 Social Engineering attacks - Part 2_en.srt

18.4 KB

017 What we covered in Domain 5.mp4

8.9 MB

017 What we covered in Domain 5_en.srt

1.4 KB

018 Certified in Cybersecurity (CC) Domain 5 links.html

5.8 KB

/07 - Domain recaps/

001 Domain 1 recap Certified in Cybersecurity (CC).mp4

126.1 MB

001 Domain 1 recap Certified in Cybersecurity (CC)_en.srt

34.6 KB

002 Domain 2 recap Certified in Cybersecurity (CC).mp4

91.8 MB

002 Domain 2 recap Certified in Cybersecurity (CC)_en.srt

28.6 KB

003 Domain 3 recap Certified in Cybersecurity (CC).mp4

92.9 MB

003 Domain 3 recap Certified in Cybersecurity (CC)_en.srt

21.6 KB

004 Domain 4 recap Certified in Cybersecurity (CC).mp4

427.8 MB

004 Domain 4 recap Certified in Cybersecurity (CC)_en.srt

128.7 KB

005 Domain 5 recap Certified in Cybersecurity (CC).mp4

169.4 MB

005 Domain 5 recap Certified in Cybersecurity (CC)_en.srt

51.6 KB

/08 - The study process, material, tips, tricks and practice tests!/

001 Why you should want to get Certified in Cybersecurity.mp4

18.9 MB

001 Why you should want to get Certified in Cybersecurity_en.srt

9.5 KB

002 Scheduling your exam and what to expect.mp4

44.8 MB

002 Scheduling your exam and what to expect_en.srt

9.4 KB

003 What to expect on exam day and after.mp4

34.8 MB

003 What to expect on exam day and after_en.srt

14.0 KB

004 I passed the exam now what.mp4

21.3 MB

004 I passed the exam now what_en.srt

8.9 KB

005 I failed the exam now what.mp4

25.7 MB

005 I failed the exam now what_en.srt

16.8 KB

006 CC-Fillable-study-plan-2023.pdf

379.9 KB

006 CC-Study-plan-by-ThorTeaches.xlsx

10.8 KB

006 How to approach practice questions.mp4

124.3 MB

006 How to approach practice questions_en.srt

18.7 KB

007 How to design your career and certification path.mp4

78.0 MB

007 How to design your career and certification path_en.srt

24.3 KB

 

Total files 294


Copyright © 2024 FileMood.com