搜索
CompTIA Security+ (SY0-701) Complete Course & Exam
磁力链接/BT种子名称
CompTIA Security+ (SY0-701) Complete Course & Exam
磁力链接/BT种子简介
种子哈希:
d4c7c2cae5c70cd8cd24cbb0fbbecf57dcc0ac99
文件大小:
7.91G
已经下载:
4066
次
下载速度:
极快
收录时间:
2024-10-09
最近下载:
2025-06-15
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:D4C7C2CAE5C70CD8CD24CBB0FBBECF57DCC0AC99
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
91未成年
乱伦巴士
呦乐园
萝莉岛
最近搜索
好可怜
password
服部
the edge of darkness 2020
听狼友指挥
淫荡巨乳
巨乳极品
heydouga-4017
信
★patreon★+ai+generated
会社の
外表很是妖嬈
破处 生
超人作乐探花约啪+西服装文静良家妹子,有些害羞口交,床上被操的娇嗔呻吟
淫妻被人
外貌
ssis-172- uncensored
约啪
deeplush
水宜方spa养生会所
偷吃
分7期之第1期
fc2ppv4696205
全网
和狗
ssis-541- uncensored
kerberos 番外編
teen+mom
小红
门把
文件列表
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4
115.0 MB
28 - Conclusion/001 Conclusion.mp4
93.6 MB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4
92.7 MB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4
90.2 MB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4
87.6 MB
02 - Fundamentals of Security/001 Fundamentals of Security.mp4
68.6 MB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4
66.2 MB
04 - Physical Security/007 Door Locks (OBJ 1.2).mp4
66.1 MB
06 - Malware/001 Malware (OBJ 2.4).mp4
65.9 MB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4
64.5 MB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4
64.0 MB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4
62.6 MB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4
62.5 MB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4
60.9 MB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4
60.7 MB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4
60.3 MB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4
60.0 MB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4
59.0 MB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4
58.2 MB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4
57.1 MB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4
56.4 MB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4
56.3 MB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4
55.6 MB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4
55.4 MB
01 - Introduction/002 Exam Tips.mp4
55.1 MB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4
54.3 MB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4
53.9 MB
21 - Security Techniques/004 Application Security (OBJ 4.1).mp4
51.2 MB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4
50.9 MB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4
50.7 MB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4
49.9 MB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4
49.8 MB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4
49.7 MB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4
49.6 MB
16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4
49.4 MB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4
48.5 MB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4
45.8 MB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4
45.6 MB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4
45.3 MB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4
45.0 MB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4
44.9 MB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4
44.5 MB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4
44.4 MB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4
44.3 MB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4
44.0 MB
27 - Security Awareness/003 Password Management (OBJ 5.6).mp4
43.6 MB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4
43.5 MB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4
43.3 MB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4
42.5 MB
24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4
42.5 MB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4
42.0 MB
06 - Malware/006 Ransomware (OBJ 2.4).mp4
41.4 MB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4
41.4 MB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4
40.8 MB
06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4
40.5 MB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4
40.2 MB
20 - Hardening/007 Patch Management (OBJ 2.5).mp4
39.9 MB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4
39.5 MB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4
39.2 MB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4
39.2 MB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4
38.2 MB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4
38.0 MB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4
37.7 MB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4
37.0 MB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4
37.0 MB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4
36.8 MB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4
36.7 MB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4
36.6 MB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4
36.5 MB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4
36.4 MB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4
36.4 MB
05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4
36.0 MB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4
35.7 MB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4
35.7 MB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4
35.5 MB
09 - Risk Management/001 Risk Management (OBJ 5.2).mp4
35.5 MB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4
35.3 MB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4
35.1 MB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4
34.9 MB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4
34.9 MB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4
34.2 MB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4
34.1 MB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4
33.9 MB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4
33.8 MB
03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4
33.6 MB
06 - Malware/002 Viruses (OBJ 2.4).mp4
33.2 MB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4
33.2 MB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4
33.1 MB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4
33.0 MB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4
32.8 MB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4
32.5 MB
05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4
32.3 MB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4
32.3 MB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4
32.2 MB
20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4
32.2 MB
20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4
32.0 MB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4
31.8 MB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4
31.8 MB
12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4
31.7 MB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4
31.6 MB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4
31.5 MB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4
31.5 MB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4
31.4 MB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4
31.4 MB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4
31.4 MB
07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4
31.3 MB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4
31.2 MB
21 - Security Techniques/007 Email Security (OBJ 4.5).mp4
31.0 MB
09 - Risk Management/004 Risk Register (OBJ 5.2).mp4
31.0 MB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4
30.9 MB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4
30.8 MB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4
30.7 MB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4
30.7 MB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4
30.6 MB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4
30.4 MB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4
30.1 MB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4
30.1 MB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4
29.7 MB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4
29.5 MB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4
29.5 MB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4
29.4 MB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4
29.3 MB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4
29.2 MB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4
29.0 MB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4
28.9 MB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4
28.9 MB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
28.8 MB
27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4
28.6 MB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4
28.5 MB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4
28.3 MB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4
28.3 MB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4
28.2 MB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4
28.1 MB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4
28.0 MB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4
28.0 MB
28 - Conclusion/002 BONUS Where do I go from here.mp4
28.0 MB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4
28.0 MB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4
27.7 MB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4
27.7 MB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4
27.5 MB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4
27.4 MB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4
27.3 MB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4
27.3 MB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4
27.1 MB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4
26.9 MB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4
26.8 MB
06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4
26.8 MB
03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4
26.7 MB
24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4
26.7 MB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4
26.6 MB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4
26.6 MB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4
26.3 MB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4
26.2 MB
19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4
26.1 MB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4
25.9 MB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4
25.8 MB
06 - Malware/010 Keylogger (OBJ 2.4).mp4
25.7 MB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4
25.6 MB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4
25.6 MB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4
25.6 MB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4
25.4 MB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4
25.3 MB
02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4
25.2 MB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4
25.2 MB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4
25.1 MB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4
25.1 MB
11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4
25.0 MB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4
24.9 MB
06 - Malware/008 Rootkits (OBJ 2.4).mp4
24.9 MB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4
24.7 MB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4
24.7 MB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4
24.7 MB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4
24.7 MB
09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4
24.6 MB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4
24.5 MB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4
24.5 MB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4
24.2 MB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4
24.2 MB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4
24.0 MB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4
23.9 MB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4
23.9 MB
02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4
23.9 MB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4
23.7 MB
03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4
23.7 MB
24 - Incident Response/001 Incident Response (OBJ 4.8).mp4
23.5 MB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4
23.5 MB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4
23.4 MB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4
23.4 MB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4
23.3 MB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4
23.2 MB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4
23.2 MB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4
23.1 MB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4
23.1 MB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4
23.0 MB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4
22.8 MB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4
22.8 MB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4
22.7 MB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4
22.7 MB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4
22.6 MB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4
22.5 MB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4
22.1 MB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4
21.9 MB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4
21.8 MB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4
21.7 MB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
21.6 MB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4
21.6 MB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4
21.5 MB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4
21.3 MB
11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4
21.3 MB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4
21.2 MB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4
21.1 MB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4
21.1 MB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4
21.0 MB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4
21.0 MB
20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4
20.9 MB
11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4
20.9 MB
25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4
20.8 MB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4
20.7 MB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4
20.6 MB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4
20.5 MB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4
20.4 MB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4
20.4 MB
11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4
20.3 MB
11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4
20.3 MB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4
20.3 MB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4
20.2 MB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4
20.2 MB
15 - Security Architecture/006 Microservices (OBJ 3.1).mp4
20.1 MB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4
20.1 MB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4
19.5 MB
06 - Malware/004 Trojans (OBJ 2.4).mp4
19.4 MB
07 - Data Protection/004 Data States (OBJ 3.3).mp4
19.4 MB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4
19.1 MB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4
18.9 MB
20 - Hardening/010 Data Encryption Levels (2.5).mp4
18.9 MB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4
18.6 MB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4
18.5 MB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4
18.5 MB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4
18.5 MB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4
18.4 MB
19 - Malicious Activity/008 On-Path Attacks.mp4
17.6 MB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4
17.3 MB
06 - Malware/003 Worms (OBJ 2.4).mp4
17.3 MB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4
17.1 MB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4
17.0 MB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4
16.8 MB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4
16.7 MB
15 - Security Architecture/005 Serverless (OBJ 3.1).mp4
16.6 MB
03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4
16.6 MB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4
16.6 MB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4
16.6 MB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4
16.1 MB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4
16.0 MB
19 - Malicious Activity/009 Injection Attacks.mp4
15.8 MB
07 - Data Protection/007 Securing Data (OBJ 3.3).mp4
14.5 MB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4
14.5 MB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4
14.0 MB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4
13.8 MB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4
13.7 MB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4
12.8 MB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4
12.8 MB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4
11.7 MB
01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf
1.5 MB
01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf
191.1 kB
01 - Introduction/001 Security-701-Study-Plan.pdf
135.6 kB
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt
72.8 kB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt
45.5 kB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt
38.4 kB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt
37.5 kB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt
36.0 kB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt
34.4 kB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt
33.5 kB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt
32.3 kB
28 - Conclusion/001 Conclusion_en.srt
30.8 kB
04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt
30.7 kB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt
30.6 kB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt
30.2 kB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt
30.0 kB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt
29.6 kB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt
29.4 kB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt
28.9 kB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt
28.8 kB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt
28.5 kB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt
28.3 kB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt
28.3 kB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt
27.8 kB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt
27.7 kB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt
27.2 kB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt
26.8 kB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt
26.8 kB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt
26.1 kB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt
25.7 kB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt
25.5 kB
21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt
25.5 kB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt
25.4 kB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt
25.0 kB
16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt
23.7 kB
24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt
23.6 kB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt
23.3 kB
27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt
23.0 kB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt
22.8 kB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt
22.7 kB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt
22.6 kB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt
22.2 kB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt
21.1 kB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt
21.1 kB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt
20.9 kB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt
20.9 kB
20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt
20.6 kB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt
20.6 kB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt
20.4 kB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt
20.3 kB
02 - Fundamentals of Security/001 Fundamentals of Security_en.srt
20.1 kB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt
20.0 kB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt
19.9 kB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt
19.9 kB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt
19.9 kB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt
19.9 kB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt
19.8 kB
06 - Malware/001 Malware (OBJ 2.4)_en.srt
19.7 kB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt
19.7 kB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt
19.6 kB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt
19.6 kB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt
19.6 kB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt
19.5 kB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt
19.5 kB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt
19.4 kB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt
19.0 kB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt
18.9 kB
06 - Malware/006 Ransomware (OBJ 2.4)_en.srt
18.7 kB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt
18.3 kB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt
18.2 kB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt
18.2 kB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt
18.2 kB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt
18.1 kB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt
18.0 kB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt
17.9 kB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt
17.9 kB
06 - Malware/002 Viruses (OBJ 2.4)_en.srt
17.8 kB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt
17.7 kB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt
17.6 kB
01 - Introduction/002 Exam Tips_en.srt
17.4 kB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt
17.3 kB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt
17.1 kB
20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt
17.1 kB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt
17.0 kB
06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt
16.9 kB
12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt
16.9 kB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt
16.8 kB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt
16.8 kB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt
16.5 kB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt
16.5 kB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt
16.4 kB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt
16.4 kB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt
16.4 kB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt
16.1 kB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt
16.1 kB
07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt
16.1 kB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt
16.0 kB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
16.0 kB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt
15.7 kB
24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt
15.7 kB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt
15.5 kB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt
15.5 kB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt
15.4 kB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt
15.4 kB
05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt
15.4 kB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt
15.4 kB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt
15.2 kB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt
15.1 kB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt
15.1 kB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt
15.0 kB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt
15.0 kB
09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt
14.8 kB
19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt
14.8 kB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt
14.8 kB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt
14.8 kB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt
14.7 kB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt
14.7 kB
21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt
14.7 kB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt
14.7 kB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt
14.6 kB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt
14.6 kB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt
14.5 kB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt
14.4 kB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt
14.3 kB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt
14.3 kB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt
14.3 kB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt
14.2 kB
02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt
14.2 kB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt
14.1 kB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt
14.1 kB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt
13.8 kB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt
13.8 kB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt
13.7 kB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt
13.6 kB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt
13.5 kB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt
13.4 kB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt
13.3 kB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt
13.3 kB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt
13.1 kB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt
13.1 kB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt
13.1 kB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt
13.0 kB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt
12.9 kB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt
12.8 kB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt
12.7 kB
02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt
12.7 kB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt
12.7 kB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt
12.6 kB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt
12.5 kB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt
12.4 kB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt
12.4 kB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt
12.4 kB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt
12.4 kB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt
12.4 kB
06 - Malware/008 Rootkits (OBJ 2.4)_en.srt
12.3 kB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt
12.3 kB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt
12.3 kB
06 - Malware/010 Keylogger (OBJ 2.4)_en.srt
12.2 kB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt
12.2 kB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt
12.1 kB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt
12.1 kB
03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt
12.1 kB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt
12.0 kB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt
11.9 kB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt
11.8 kB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt
11.8 kB
20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt
11.8 kB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt
11.7 kB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt
11.7 kB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt
11.7 kB
06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt
11.7 kB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt
11.7 kB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt
11.6 kB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt
11.6 kB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt
11.5 kB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt
11.5 kB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt
11.5 kB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt
11.3 kB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt
11.2 kB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt
11.2 kB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt
11.2 kB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt
11.2 kB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt
11.1 kB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt
11.1 kB
20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt
11.1 kB
09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt
11.1 kB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt
11.0 kB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt
11.0 kB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt
10.9 kB
20 - Hardening/010 Data Encryption Levels (2.5)_en.srt
10.8 kB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt
10.7 kB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt
10.6 kB
25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt
10.6 kB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt
10.6 kB
05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt
10.5 kB
11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt
10.5 kB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt
10.4 kB
03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt
10.2 kB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt
10.0 kB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt
10.0 kB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt
10.0 kB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt
9.9 kB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt
9.8 kB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt
9.7 kB
07 - Data Protection/004 Data States (OBJ 3.3)_en.srt
9.7 kB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt
9.6 kB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt
9.5 kB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt
9.5 kB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt
9.4 kB
11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt
9.4 kB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt
9.3 kB
09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt
9.2 kB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt
9.2 kB
27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt
9.2 kB
11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt
9.2 kB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt
9.1 kB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt
9.1 kB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt
9.0 kB
11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt
8.9 kB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt
8.9 kB
19 - Malicious Activity/009 Injection Attacks_en.srt
8.9 kB
06 - Malware/004 Trojans (OBJ 2.4)_en.srt
8.8 kB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt
8.8 kB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt
8.8 kB
03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt
8.7 kB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt
8.7 kB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt
8.6 kB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt
8.5 kB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt
8.5 kB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt
8.4 kB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt
8.2 kB
11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt
8.2 kB
03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt
8.2 kB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt
8.1 kB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt
8.0 kB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt
8.0 kB
19 - Malicious Activity/008 On-Path Attacks_en.srt
7.9 kB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt
7.9 kB
28 - Conclusion/002 BONUS Where do I go from here_en.srt
7.9 kB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt
7.8 kB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt
7.7 kB
15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt
7.6 kB
06 - Malware/003 Worms (OBJ 2.4)_en.srt
7.6 kB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt
7.5 kB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt
7.5 kB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt
7.4 kB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt
7.4 kB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt
7.4 kB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt
7.3 kB
07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt
7.2 kB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt
7.1 kB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt
7.0 kB
15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt
7.0 kB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt
6.9 kB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt
6.9 kB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt
6.8 kB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt
6.7 kB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt
6.7 kB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt
6.7 kB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt
6.5 kB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt
6.3 kB
24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt
6.1 kB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt
5.7 kB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt
5.6 kB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt
5.5 kB
01 - Introduction/001 Download the Study Guide.html
222 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>