FileMood

Download Pluralsight - Security for CompTIA A Plus (220-902)

Pluralsight Security for CompTIA Plus 220 902

Name

Pluralsight - Security for CompTIA A Plus (220-902)

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

657.4 MB

Total Files

109

Hash

B554B488BBA591BB3611CC66EBCF95CAF0012BB4

/01. Common Security Threats and Vulnerabilities/

01_01-Overview.mp4

10.0 MB

01_02-Meanwhile, in the Real World.mp4

1.3 MB

01_03-Preliminary Definitions.mp4

6.6 MB

01_04-Malware Trends.mp4

7.9 MB

01_05-Spyware.mp4

10.2 MB

01_06-Ransomware.mp4

5.7 MB

01_07-Worms.mp4

2.3 MB

01_08-Viruses.mp4

8.8 MB

01_09-Trojans and Rootkits.mp4

11.6 MB

01_10-Zeroday Exploits.mp4

2.2 MB

01_11-Phishing and Spear Phishing.mp4

12.0 MB

01_12-Man in the Middle Attacks.mp4

3.4 MB

01_13-Botnets.mp4

4.2 MB

01_14-Password Attacks.mp4

4.1 MB

01_15-Social Engineering, Tailgating, and Shoulder Surfing.mp4

7.9 MB

01_16-Security Best Practices.mp4

1.9 MB

01_17-Demo Cleaning Malware in Windows 8.1.mp4

15.3 MB

01_18-Back to the Real World.mp4

461.8 KB

01_19-Homework.mp4

477.6 KB

01_20-For Further Learning.mp4

2.3 MB

01_21-Summary.mp4

1.8 MB

/02. Common Prevention Methods/

02_01-Overview.mp4

3.9 MB

02_02-Meanwhile, in the Real World.mp4

1.5 MB

02_03-Secure Doors.mp4

8.6 MB

02_04-Access Controls.mp4

6.3 MB

02_05-Elements of a Secure Office.mp4

9.5 MB

02_06-AAA.mp4

5.1 MB

02_07-Digital Loss Prevention DLP.mp4

10.5 MB

02_08-User Education.mp4

5.8 MB

02_09-Demo 1 Applying Authentication and Authorization.mp4

18.2 MB

02_10-Demo 2 Applying Accounting.mp4

14.3 MB

02_11-Back to the Real World.mp4

4.4 MB

02_12-Homework.mp4

1.6 MB

02_13-For Further Learning.mp4

1.9 MB

02_14-Summary.mp4

1.8 MB

/03. Windows OS Security Settings/

03_01-Overview.mp4

6.0 MB

03_02-Meanwhile, in the Real World.mp4

740.0 KB

03_03-Demo 1 Managing Users and Groups.mp4

15.1 MB

03_04-Demo 2 Managing Users and Groups, Continued.mp4

6.9 MB

03_05-File System Security Concepts.mp4

14.0 MB

03_06-BitLocker vs. EFS.mp4

7.2 MB

03_07-Demo 3 Using BitLocker.mp4

7.4 MB

03_08-Demo 4 Using Encrypting File System.mp4

7.1 MB

03_09-Demo 5 Using NTFS and Shared Folder Permissions.mp4

19.5 MB

03_10-Back to the Real World.mp4

1.0 MB

03_11-Homework.mp4

2.1 MB

03_12-For Further Learning.mp4

2.3 MB

03_13-Summary.mp4

2.3 MB

/04. Securing Workstations/

04_01-Overview.mp4

5.4 MB

04_02-Meanwhile, in the Real World.mp4

1.3 MB

04_03-Defining Best Practice.mp4

1.8 MB

04_04-Password Principles.mp4

12.0 MB

04_05-Elements of a Strong Password.mp4

8.4 MB

04_06-The Password Security Balancing Act.mp4

11.2 MB

04_07-User Account Management.mp4

10.1 MB

04_08-System Security Principles.mp4

6.5 MB

04_09-Demo 1 Implementing Account and Password Policies.mp4

21.2 MB

04_10-Demo 2 Security Policies and the User Experience.mp4

7.0 MB

04_11-Back to the Real World.mp4

2.8 MB

04_12-Homework.mp4

1.4 MB

04_13-For Further Learning.mp4

1.9 MB

04_14-Summary.mp4

2.0 MB

/05. Securing Mobile Devices/

05_01-Overview.mp4

5.4 MB

05_02-Meanwhile, in the Real World.mp4

2.4 MB

05_03-Defining BYOD and MDM.mp4

3.6 MB

05_04-BYODMDM Security Concerns.mp4

14.3 MB

05_05-Policies and Procedures.mp4

8.9 MB

05_06-Popular MDM Solutions.mp4

6.7 MB

05_07-Screen Locks.mp4

7.3 MB

05_08-MDM Common Features.mp4

6.3 MB

05_09-Authenticator Apps.mp4

1.9 MB

05_10-Demo 1 Introducing the Cisco Meraki MDM Solution.mp4

14.4 MB

05_11-Demo 2 Introducing Microsoft Intune.mp4

6.9 MB

05_12-Back to the Real World.mp4

806.1 KB

05_13-Homework.mp4

1.0 MB

05_14-For Further Learning.mp4

2.3 MB

05_15-Summary.mp4

2.4 MB

/06. Data Destruction and Disposal Methods/

06_01-Overview.mp4

5.6 MB

06_02-Meanwhile, in the Real World.mp4

1.0 MB

06_03-Use Cases for Data Destruction.mp4

5.0 MB

06_04-Physical Data Destruction Methods.mp4

9.6 MB

06_05-Certificate of Destruction.mp4

7.2 MB

06_06-Ewaste.mp4

5.7 MB

06_07-Hard Drive Formatting Methods.mp4

6.3 MB

06_08-Securely Deleting Hard Drive Data.mp4

5.3 MB

06_09-Demo 1 Data Deletion and Recovery.mp4

13.2 MB

06_10-Demo 2 Performing Secure Data Erasure.mp4

11.1 MB

06_11-Back to the Real World.mp4

1.5 MB

06_12-Homework.mp4

2.2 MB

06_13-For Further Learning.mp4

1.2 MB

06_14-Summary.mp4

1.8 MB

/07. Securing SOHO Wireless and Wired Networks/

07_01-Overview.mp4

4.3 MB

07_02-Meanwhile, in the Real World.mp4

1.0 MB

07_03-Understanding the SOHO Environment.mp4

5.2 MB

07_04-SOHO Networking Challenges.mp4

3.7 MB

07_05-The Myth of Perfect Security.mp4

7.9 MB

07_06-Common WLAN Protection Mechanisms.mp4

11.8 MB

07_07-WiFi Security Protocols.mp4

6.9 MB

07_08-Radio and Antenna.mp4

3.3 MB

07_09-Switch Port Security.mp4

4.2 MB

07_10-Web Content Filtering.mp4

3.4 MB

07_11-Firewalls.mp4

4.7 MB

07_12-Converged SOHO Network Appliances.mp4

3.0 MB

07_13-Demo SOHO Router Basic Configuration.mp4

19.5 MB

07_14-Back to the Real World.mp4

2.5 MB

07_15-Homework.mp4

879.0 KB

07_16-For Further Learning.mp4

1.8 MB

07_17-Summary.mp4

2.9 MB

/Exercise files/

securitycomptiaaplus220902.zip

10.5 MB

 

Total files 109


Copyright © 2025 FileMood.com