FileMood

Download Packt – CompTIA Advanced Security Practitioner (CASP)

Packt CompTIA Advanced Security Practitioner CASP

Name

Packt – CompTIA Advanced Security Practitioner (CASP)

 DOWNLOAD Copy Link

Total Size

5.0 GB

Total Files

195

Last Seen

2024-07-22 23:47

Hash

1B22BA022C8529C64FC7498E5DAF3D3E611BF334

/

Packt – CompTIA Advanced Security Practitioner (CASP) description.pdf

214.4 KB

Приватные видеокурсы.pdf

356.7 KB

Это очень важно!.txt

0.8 KB

/learning_videos/

03 - Risk Management.mp4

10.7 MB

42 - Disposal Terms and Concepts.mp4

13.9 MB

33 - Sensitive Information-Internal Security Policies.mp4

35.0 MB

34 - Incident Response Process.mp4

37.5 MB

35 - Forensic Tasks.mp4

19.9 MB

36 - Employment and Termination Procedures.mp4

31.1 MB

37 - Network Auditing.mp4

18.6 MB

38 - Incident Response and Recovery Procedures.mp4

4.2 MB

39 - E-Discovery and Data Retention Policies.mp4

60.8 MB

40 - Data Recovery-Storage and Backup Schemes.mp4

83.8 MB

41 - Data Owner and Data Handling.mp4

16.1 MB

43 - Data Breach and Data Analysis.mp4

13.3 MB

31 - Security Policy Business Documents.mp4

52.3 MB

44 - Incident Response Guidelines.mp4

59.8 MB

45 - Incident and Emergency Response.mp4

24.9 MB

46 - Media-Software and Network Analysis.mp4

35.9 MB

47 - Order of Volatility.mp4

10.9 MB

48 - Industry Trends Overview.mp4

6.8 MB

49 - Performing Ongoing Research.mp4

10.5 MB

50 - Security Practices.mp4

32.2 MB

51 - Evolution of Technology.mp4

8.6 MB

52 - Situational Awareness and Vulnerability Assessments.mp4

45.7 MB

32 - Outage Impact and Estimating Downtime Terms.mp4

94.7 MB

30 - Legal Compliance Part2.mp4

67.2 MB

54 - Global Industry Security Response.mp4

12.2 MB

191 - Asset Management.mp4

13.3 MB

183 - Mobile and Personal Device Management.mp4

29.6 MB

184 - Over Air Technology Concerns.mp4

28.3 MB

185 - WLAN Concepts-Terms-Standards.mp4

35.3 MB

186 - WLAN Security and Attacks.mp4

42.9 MB

187 - Security Across the Technology Life Cycle.mp4

5.6 MB

188 - End to End Solution Ownership.mp4

53.3 MB

189 - System Development Life Cycle.mp4

60.9 MB

19 - Risk Management Process.mp4

14.1 MB

190 - Security Implications of Software Development Methodologies.mp4

24.3 MB

192 - Course End.mp4

2.1 MB

29 - Legal Compliance Part1.mp4

55.7 MB

20 - Identifying Vulnerabilities and Threats.mp4

20.0 MB

21 - Security Architecture Frameworks.mp4

28.4 MB

22 - Business Continuity Planning.mp4

17.1 MB

23 - IT Governance.mp4

14.6 MB

24 - Security Policies.mp4

24.1 MB

25 - Security-Privacy Policies and Procedures Part1.mp4

5.8 MB

26 - Security-Privacy Policies and Procedures Part2.mp4

3.6 MB

27 - Policy Development Updates.mp4

41.2 MB

28 - Developing Processes and Procedures.mp4

20.8 MB

53 - Researching Security Implications.mp4

29.3 MB

55 - Threat Actors.mp4

19.9 MB

181 - Cloud Based Collaboration.mp4

25.4 MB

90 - Strength vs Performance and Cryptographic Implementations.mp4

23.0 MB

81 - Cryptographic Concepts.mp4

59.9 MB

82 - Transport Encryption Protocol.mp4

35.1 MB

83 - Symmetric Algorithms.mp4

74.5 MB

84 - Asymmetric Algorithms.mp4

41.1 MB

85 - Hybrid Encryption and Digital Signatures.mp4

33.0 MB

86 - Public Key Infrastructure.mp4

67.7 MB

87 - Digital Certificate Classes and Cypher Types.mp4

16.1 MB

88 - Des Modes.mp4

47.5 MB

89 - Cryptographic Attacks.mp4

70.6 MB

91 - Enterprise Storage.mp4

6.2 MB

79 - Hashing Algorithms.mp4

79.2 MB

92 - Virtual Storage Types and Challenges.mp4

23.3 MB

93 - Cloud Storage.mp4

47.9 MB

94 - Data Warehousing.mp4

18.9 MB

95 - Data Archiving.mp4

19.8 MB

96 - Storage Area Networks (SANs) and (VSANs).mp4

21.1 MB

97 - Network Attached Storage (NAS).mp4

13.2 MB

98 - Storage Protocols and Fiber Channel over Ethernet (FCoE).mp4

25.3 MB

99 - Storage Network File Systems.mp4

15.8 MB

02 - Business Influences and Associated Security Risks.mp4

4.7 MB

80 - Message Authentication Code.mp4

17.4 MB

78 - Cryptographic Benefits and Techniques.mp4

31.1 MB

56 - Contract Security Requirements.mp4

10.7 MB

66 - Assessment Tools and Methods.mp4

6.9 MB

57 - Contract Documents.mp4

9.5 MB

58 - Securing the Enterprise Overview.mp4

5.4 MB

59 - Benchmarks and Baselines.mp4

22.1 MB

60 - Prototyping and Testing Multiple Solutions.mp4

21.4 MB

61 - Cost_Benefit Analysis.mp4

9.6 MB

62 - Metrics Collection and Trend Data.mp4

21.6 MB

63 - Security Controls-Reverse Engineering and Deconstructing.mp4

16.4 MB

64 - Security Solutions Business Needs.mp4

20.2 MB

65 - Lesson Learned- After Action Report.mp4

12.9 MB

67 - Port Scanners and Vulnerability Scanners.mp4

25.7 MB

77 - Social Cryptographic Concepts and Techniques.mp4

5.4 MB

68 - Protocol Analyzer- Network Enumerator-Password Cracker.mp4

28.5 MB

69 - Fuzzers and HTTP Interceptors.mp4

20.6 MB

70 - Exploitation Tools.mp4

18.2 MB

71 - Passive Reconnaissance Tools.mp4

57.0 MB

72 - Vulnerability Assessments and Malware Sandboxing.mp4

18.5 MB

73 - Memory Dumping and Penetration Testing.mp4

37.6 MB

74 - Reconnaissance and Fingerprinting.mp4

17.9 MB

75 - Code Review.mp4

15.6 MB

76 - Social Engineering.mp4

26.5 MB

182 - Remote Access and IPsec.mp4

46.9 MB

180 - Telephony-VoIP and Social Media.mp4

27.5 MB

04 - Business Model Strategies.mp4

12.6 MB

125 - Configuring and Managing Interface Security.mp4

39.1 MB

117 - Network Device Accessibility and Security.mp4

68.7 MB

118 - Security Controls for Hosts.mp4

6.2 MB

119 - Trusted Operation Systems.mp4

23.0 MB

12 - Information Life Cycle and Steak-Holder Input.mp4

19.9 MB

120 - Endpoint Security Software and Data Loss Prevention.mp4

39.7 MB

121 - Host Based Firewalls.mp4

9.1 MB

122 - Log Monitoring and Host Hardening.mp4

23.8 MB

123 - Standard Operating Environment and Group Policy Security.mp4

36.8 MB

124 - Command Shell Restrictions.mp4

7.2 MB

126 - USB-Bluetooth-Firewire Restrictions and Security.mp4

33.5 MB

115 - Advanced Router and Switch Configuration.mp4

30.7 MB

127 - Full Disk Encryption.mp4

23.9 MB

128 - Virtualization Security.mp4

21.0 MB

129 - Cloud Security Services.mp4

30.2 MB

13 - Implementing Technical Controls.mp4

43.1 MB

130 - Boot Loader Protections.mp4

26.3 MB

131 - Virtual Host Vulnerabilities.mp4

11.9 MB

132 - Virtual Desktop Infrastructure.mp4

18.8 MB

133 - Terminal Services.mp4

3.8 MB

134 - Virtual TPM.mp4

16.3 MB

116 - Data Flow Enforcement of Applications and Networks.mp4

11.3 MB

114 - Availability Controls-Terms and Techniques.mp4

49.5 MB

136 - Web Application Security Design.mp4

11.3 MB

103 - Network and Security Components-Concepts-Security Architectures.mp4

6.1 MB

05 - Integrating Diverse Industries.mp4

6.2 MB

06 - Third Party Information Security and Providers.mp4

15.6 MB

07 - Internal and External Influences.mp4

18.8 MB

08 - Impact of De-Perimeterization.mp4

8.4 MB

09 - Risk Mitigation Planning - Strategies and Controls.mp4

3.8 MB

10 - CIA Triad.mp4

12.6 MB

100 - Secure Storage Management Techniques.mp4

53.5 MB

101 - LUN Masking_Mapping and HBA Allocation.mp4

21.2 MB

102 - Replication and Encryption Methods.mp4

29.7 MB

104 - Remote Access Protocols.mp4

57.8 MB

113 - Network Security Solutions.mp4

35.1 MB

105 - IPv6 and Transport Encryption.mp4

43.9 MB

106 - Network Authentication Methods.mp4

45.2 MB

107 - 802.1x and Mesh Networks.mp4

22.1 MB

108 - Security Devices.mp4

52.3 MB

109 - Network Devices.mp4

42.1 MB

11 - Business Classifications.mp4

18.8 MB

110 - Firewalls.mp4

31.3 MB

111 - Wireless Controllers.mp4

19.4 MB

112 - Router Security and Port Numbers.mp4

17.0 MB

135 - Application Vulnerabilities and Security Controls.mp4

7.1 MB

137 - Specific Application Issues.mp4

25.2 MB

18 - Total Cost of Ownership and Risk Strategies.mp4

28.1 MB

17 - Return Of Investment.mp4

35.1 MB

161 - Biometrics.mp4

36.3 MB

162 - Dual-Multi Factor and Certificate Authentication.mp4

16.8 MB

163 - Single Sign On Issues.mp4

9.7 MB

164 - Access Control Models and Open Authorization.mp4

29.3 MB

165 - Extensible Access Control Markup Language (XACML).mp4

20.0 MB

166 - Service Provisioning Markup Language (SPML).mp4

8.5 MB

167 - Attestation and Identity Propagation.mp4

20.1 MB

168 - Federation and Security Assertion Markup Language (SAML).mp4

21.0 MB

169 - OpenID-Shibboleth and WAYF.mp4

22.9 MB

170 - Advanced Trust Models.mp4

12.4 MB

16 - Calculation Tools and Attacker Motivation.mp4

28.1 MB

171 - Business Unit Collaboration.mp4

4.7 MB

172 - Identifying and Communicating Security Requirements.mp4

93.0 MB

173 - Security Controls Recommendations.mp4

9.6 MB

174 - Secure Solutions Collaboration.mp4

5.5 MB

175 - Secure Communication and Collaboration.mp4

5.9 MB

176 - Web-Video Conferencing-Instant Messaging.mp4

69.2 MB

177 - Desktop Sharing.mp4

29.0 MB

178 - Presence Guidelines.mp4

19.6 MB

01 - Course Introduction.mp4

5.1 MB

160 - Authentication Factors.mp4

10.2 MB

159 - Password Types-Management and Policies.mp4

35.4 MB

138 - Session Management.mp4

13.6 MB

147 - Host-Storage-Network and Application Integration.mp4

4.8 MB

139 - Input Validation.mp4

23.8 MB

14 - Determine Aggregate CIA Score.mp4

17.3 MB

140 - Web Vulnerabilities and Input Mitigation Issues.mp4

22.0 MB

141 - Buffer Overflow and other Application Issues.mp4

37.1 MB

142 - Application Security Framework.mp4

22.1 MB

143 - Web Service Security and Secure Coding Standards.mp4

11.8 MB

144 - Software Development Methods.mp4

41.8 MB

145 - Monitoring Mechanisms and Client-Server Side Processing.mp4

22.5 MB

146 - Browser Extensions and Other Web Development Techniques.mp4

34.2 MB

148 - Securing Data Flows.mp4

25.1 MB

158 - Authentication and Identity Management.mp4

18.8 MB

149 - Standards Concepts.mp4

18.3 MB

15 - Worst Case Scenario Planning.mp4

46.7 MB

150 - Interoperability Issues.mp4

16.8 MB

151 - In House Commercial and Customized Applications.mp4

8.4 MB

152 - Cloud and Virtualization Models.mp4

34.1 MB

153 - Logical and Physical Deployment Diagrams.mp4

7.3 MB

154 - Secure Infrastructure Design.mp4

24.4 MB

155 - Storage Integration Security.mp4

7.5 MB

156 - Enterprise Application Integration Enablers.mp4

39.6 MB

157 - Authentication and Authorization Technologies.mp4

4.9 MB

179 - Email Messaging Protocol.mp4

32.8 MB

 

Total files 195


Copyright © 2024 FileMood.com