FileMood

Download UD59

UD59

Name

UD59

 DOWNLOAD Copy Link

Total Size

19.0 GB

Total Files

230

Hash

808231A824B3BB57F18810121B6E23E91384BEDE

/01 Overview of Security/

001 Welcome.mp4

98.4 MB

002 CompTIA-Security-Study-Guide.pdf

5.3 MB

002 Download the Study Guide.html

1.1 KB

003 Overview of Security.mp4

67.6 MB

004 CIA Triad.mp4

78.1 MB

005 AAA of Security.mp4

62.8 MB

006 Security Threats.mp4

67.3 MB

007 Mitigating Threats.mp4

57.5 MB

008 Hackers.mp4

110.0 MB

009 Threat Actors.mp4

71.6 MB

/02 Malware/

010 Malware.mp4

15.7 MB

011 Viruses.mp4

141.2 MB

012 Worms.mp4

50.2 MB

013 Trojans.mp4

65.5 MB

014 Demo Viruses and Trojans.mp4

96.0 MB

015 Ransomware.mp4

56.0 MB

016 Spyware.mp4

61.0 MB

017 Rootkits.mp4

79.3 MB

018 Spam.mp4

68.3 MB

019 Summary of Malware.mp4

46.8 MB

/03 Malware Infections/

020 Malware Infections.mp4

97.7 MB

021 Common Delivery Methods.mp4

101.6 MB

022 Demo Phishing.mp4

52.3 MB

023 Botnets and Zombies.mp4

65.5 MB

024 Active Interception and Privilege Escalation.mp4

42.6 MB

025 Demo Privilege Escalation.mp4

79.2 MB

026 Backdoors and Logic Bombs.mp4

88.2 MB

027 Symptoms of Infection.mp4

95.8 MB

028 Removing Malware.mp4

113.6 MB

029 Preventing Malware.mp4

135.1 MB

/04 Security Applications and Devices/

030 Security Applications and Devices.mp4

13.4 MB

031 Software Firewalls.mp4

95.9 MB

032 Demo Software Firewalls.mp4

64.5 MB

033 IDS.mp4

110.9 MB

034 Pop-up Blockers.mp4

69.9 MB

035 Data Loss Prevention (DLP).mp4

85.6 MB

036 Securing the BIOS.mp4

90.4 MB

037 Securing Storage Devices.mp4

76.6 MB

038 Disk Encryption.mp4

111.9 MB

/05 Mobile Device Security/

039 Mobile Device Security.mp4

29.8 MB

040 Securing Wireless Devices.mp4

35.2 MB

041 Mobile Malware.mp4

146.3 MB

042 SIM Cloning ID Theft.mp4

90.9 MB

043 Bluetooth Attacks.mp4

50.1 MB

044 Mobile Device Theft.mp4

73.2 MB

045 Security of Apps.mp4

114.7 MB

046 BYOD.mp4

112.9 MB

047 Hardening Mobile Devices.mp4

85.8 MB

/06 Hardening/

048 Hardening.mp4

41.6 MB

049 Unnecessary Applications.mp4

72.5 MB

050 Restricting Applications.mp4

64.9 MB

051 Demo Unnecessary Services.mp4

65.4 MB

052 Trusted Operating System.mp4

44.7 MB

053 Updates and Patches.mp4

77.8 MB

054 Patch Management.mp4

87.5 MB

055 Group Policies.mp4

59.2 MB

056 Demo Group Policies.mp4

32.4 MB

057 File Systems and Hard Drives.mp4

72.4 MB

/07 Virtualization/

058 Virtualization.mp4

48.9 MB

059 Hypervisors.mp4

60.2 MB

060 Demo How to create a VM.mp4

40.6 MB

061 Threats to VMs.mp4

84.9 MB

062 Securing VMs.mp4

86.4 MB

063 Demo Securing VMs.mp4

45.2 MB

/08 Application Security/

064 Application Security.mp4

40.5 MB

065 Web Browser Security.mp4

152.2 MB

066 Web Browser Concerns.mp4

74.5 MB

067 Demo Web Browser Configuration.mp4

48.3 MB

068 Securing Applications.mp4

111.4 MB

/09 Secure Software Development/

069 Software Development.mp4

197.9 MB

070 SDLC Principles.mp4

143.6 MB

071 Testing Methods.mp4

158.4 MB

072 Software Vulnerabilities and Exploits.mp4

85.8 MB

073 Buffer Overflows.mp4

142.2 MB

074 Demo Buffer Overflow Attack.mp4

106.7 MB

075 XSS and XSRF.mp4

72.1 MB

076 SQL Injection.mp4

148.3 MB

077 Demo SQL Injection.mp4

78.5 MB

/10 Network Design/

078 Network Security.mp4

17.4 MB

079 The OSI Model.mp4

134.8 MB

080 Switches.mp4

81.0 MB

081 Routers.mp4

57.0 MB

082 Network Zones.mp4

72.8 MB

083 Network Access Control.mp4

59.4 MB

084 VLANs.mp4

34.7 MB

085 Subnetting.mp4

43.4 MB

086 Network Address Translation.mp4

55.2 MB

087 Telephony.mp4

137.0 MB

/11 Perimeter Security/

088 Perimeter Security.mp4

18.7 MB

089 Firewalls.mp4

183.8 MB

090 Demo SOHO Firewall.mp4

30.3 MB

091 Proxy Servers.mp4

96.1 MB

092 Honeypots and Honeynets.mp4

32.2 MB

093 Data Loss Prevention.mp4

37.1 MB

094 NIDS and NIPS.mp4

96.9 MB

095 Unified Threat Management.mp4

43.6 MB

/12 Cloud Security/

096 Cloud Computing.mp4

80.1 MB

097 Cloud Types.mp4

66.3 MB

098 As a Service.mp4

161.9 MB

099 Cloud Security.mp4

56.0 MB

100 Defending Servers.mp4

104.4 MB

/13 Network Attacks/

101 Network Attacks.mp4

15.2 MB

102 Ports and Protocols.mp4

100.4 MB

103 Memorization of Ports.mp4

250.0 MB

104 Unnecessary Ports.mp4

78.9 MB

105 Denial of Service.mp4

178.5 MB

106 DDoS.mp4

35.4 MB

107 Stopping a DDoS.mp4

55.0 MB

108 Spoofing.mp4

29.9 MB

109 Hijacking.mp4

78.3 MB

110 Replay Attack.mp4

33.6 MB

111 Demo Null Sessions.mp4

40.5 MB

112 Transitive Attacks.mp4

33.2 MB

113 DNS Attacks.mp4

100.9 MB

114 ARP Poisoning.mp4

34.1 MB

/14 Securing Networks/

115 Securing Networks.mp4

19.5 MB

116 Securing Network Devices.mp4

153.9 MB

117 Securing Network Media.mp4

199.2 MB

118 Securing WiFi Devices.mp4

101.7 MB

119 Wireless Encryption.mp4

126.1 MB

120 Wireless Access Points.mp4

143.3 MB

121 Wireless Attacks.mp4

95.9 MB

122 Demo Wireless Attack.mp4

108.3 MB

123 Other Wireless Technologies.mp4

138.6 MB

/15 Physical Security/

124 Physical Security.mp4

35.6 MB

125 Surveillance.mp4

63.7 MB

126 Door Locks.mp4

89.1 MB

127 Demo Lock Picking.mp4

38.5 MB

128 Biometric Readers.mp4

96.6 MB

/16 Facilities Security/

129 Facilities Security.mp4

14.6 MB

130 Fire Suppression.mp4

145.4 MB

131 HVAC.mp4

55.8 MB

132 Shielding.mp4

57.9 MB

133 Vehicles.mp4

47.5 MB

/17 Authentication/

134 Authentication.mp4

136.0 MB

135 Authentication Models.mp4

119.9 MB

136 802.1x.mp4

83.7 MB

137 LDAP and Kerberos.mp4

56.3 MB

138 Remote Desktop Services.mp4

42.3 MB

139 Remote Access Service.mp4

46.6 MB

140 VPN.mp4

66.6 MB

141 RADIUS vs TACACS.mp4

52.3 MB

142 Authentication Summary.mp4

45.8 MB

/18 Access Control/

143 Access Control.mp4

19.5 MB

144 Access Control Models.mp4

184.7 MB

145 Best Practices.mp4

132.3 MB

146 Users and Groups.mp4

211.2 MB

147 Permissions.mp4

85.0 MB

148 Usernames and Passwords.mp4

58.3 MB

149 Demo Policies.mp4

34.6 MB

150 User Account Control.mp4

42.8 MB

/19 Risk Assessments/

151 Risk Assessments.mp4

197.8 MB

152 Qualitative Risk.mp4

95.9 MB

153 Quantitative Risk.mp4

125.8 MB

154 Methodologies.mp4

62.3 MB

155 Security Controls.mp4

156.3 MB

156 Vulnerability Management.mp4

180.0 MB

157 Penetration Testing.mp4

103.2 MB

158 OVAL.mp4

34.2 MB

159 Vulnerability Assessments.mp4

146.3 MB

160 Demo Nmap Scanning.mp4

102.0 MB

161 Demo Vulnerability Scanning.mp4

101.3 MB

162 Password Analysis.mp4

133.6 MB

163 Demo Password Cracking.mp4

40.9 MB

/20 Monitoring and Auditing/

164 Monitoring Types.mp4

65.5 MB

165 Performance Baselining.mp4

107.4 MB

166 Protocol Analyzers.mp4

68.1 MB

167 SNMP.mp4

83.2 MB

168 Demo Analytical Tools.mp4

50.9 MB

169 Auditing.mp4

44.8 MB

170 Demo Auditing Files.mp4

55.4 MB

171 Logging.mp4

83.4 MB

172 Log Files.mp4

120.4 MB

173 SIEM.mp4

66.1 MB

/21 Cryptography/

174 Cryptography.mp4

113.2 MB

175 Symmetric vs Asymmetric.mp4

140.5 MB

176 Symmetric Algorithms.mp4

108.4 MB

177 Public Key Cryptography.mp4

54.9 MB

178 Asymmetric Algorithms.mp4

85.3 MB

179 Pretty Good Privacy.mp4

40.5 MB

180 Key Management.mp4

50.3 MB

181 One-Time Pad.mp4

99.1 MB

182 Demo Steganography.mp4

44.2 MB

183 Hashing.mp4

178.3 MB

184 Demo Hashing.mp4

40.4 MB

185 Hashing Attacks.mp4

74.1 MB

186 Increasing Hash Security.mp4

33.5 MB

/22 Public Key Infrastructure/

187 Public Key Infrastructure.mp4

53.6 MB

188 Digital Certificates.mp4

151.5 MB

189 Demo Certificates.mp4

29.3 MB

190 Certificate Authorities.mp4

94.2 MB

191 Web of Trust.mp4

60.1 MB

/23 Security Protocols/

192 Security Protocols.mp4

9.1 MB

193 SMIME.mp4

34.6 MB

194 SSL and TLS.mp4

133.8 MB

195 SSH.mp4

57.0 MB

196 VPN Protocols.mp4

150.5 MB

197 Demo Setting up a VPN.mp4

26.0 MB

/24 Planning for the Worst/

198 Planning for the Worst.mp4

50.1 MB

199 Redundant Power.mp4

72.0 MB

200 Backup Power.mp4

72.3 MB

201 Data Redundancy.mp4

105.2 MB

202 Demo RAIDs.mp4

41.2 MB

203 Network Redundancy.mp4

48.9 MB

204 Server Redundancy.mp4

40.2 MB

205 Redundant Sites.mp4

53.2 MB

206 Data Backup.mp4

65.8 MB

207 Tape Rotation.mp4

89.3 MB

208 Disaster Recovery Plan.mp4

129.2 MB

/25 Social Engineering/

209 Social Engineering.mp4

20.7 MB

210 Demo Pretexting.mp4

98.6 MB

211 Insider Threat.mp4

50.7 MB

212 Phishing.mp4

28.7 MB

213 More Social Engineering.mp4

92.4 MB

214 User Education.mp4

110.4 MB

/26 Policies and Procedures/

215 Policies and Procedures.mp4

132.8 MB

216 Data Classifications.mp4

152.4 MB

217 PII and PHI.mp4

140.5 MB

218 Security Policies.mp4

236.3 MB

219 User Education.mp4

93.2 MB

220 Vendor Relationships.mp4

177.6 MB

221 Disposal Policies.mp4

115.4 MB

222 Incident Response Procedures.mp4

105.4 MB

223 Data Collection Procedures.mp4

74.2 MB

224 Demo Disk Imaging.mp4

72.8 MB

225 IT Security Frameworks.mp4

74.6 MB

/27 Conclusion/

226 Conclusion.mp4

75.1 MB

227 Exam Tricks.mp4

97.2 MB

228 BONUS Where to go from here.mp4

62.8 MB

external-assets-links.txt

0.2 KB

 

Total files 230


Copyright © 2024 FileMood.com