https://img87.pixhost.to/images/599/359020115_tuto.jpg


Pluralsight - Learning Path - CompTIA Security+ (SY0-601)
Language: English | Size:2.56 GB
Genre:eLearning

Files Included :

01  Module Overview.mp4 (3.01 MB)
MP4
02  What Is Social Engineering.mp4 (3.05 MB)
MP4
03  Phishing.mp4 (6.36 MB)
MP4
04  Types of Phishing.mp4 (5.76 MB)
MP4
05  Vishing.mp4 (4.78 MB)
MP4
06  SPAM.mp4 (4.65 MB)
MP4
07  Dumpter Diving.mp4 (1.87 MB)
MP4
08  Shoulder Surfing.mp4 (4.85 MB)
MP4
09  Pharming.mp4 (4.29 MB)
MP4
10  Tailgating.mp4 (5.85 MB)
MP4
11  Hoaxes.mp4 (6.29 MB)
MP4
12  Prepending.mp4 (3.15 MB)
MP4
13  Impersonation.mp4 (1.85 MB)
MP4
14  Identity Fraud.mp4 (2.58 MB)
MP4
15  Invoice Scam.mp4 (4.61 MB)
MP4
16  Credential Harvesting.mp4 (4.53 MB)
MP4
17  Watering Hole Attack.mp4 (4.97 MB)
MP4
18  Typo Squatting  URL Hijacking.mp4 (3.49 MB)
MP4
19  Hybrid Warfare.mp4 (4.45 MB)
MP4
20  Social Media and Influence Campaigns.mp4 (2.02 MB)
MP4
21  Reasons for Effectiveness - Authority and Intimidation.mp4 (3.06 MB)
MP4
22  Consensus and Social Proof.mp4 (1.5 MB)
MP4
23  Familiarity  Liking.mp4 (1.19 MB)
MP4
24  Trust.mp4 (1.15 MB)
MP4
25  Scarcity  Urgency.mp4 (933.82 KB)
MP4
26  Module Review.mp4 (1.45 MB)
MP4
01  Module Overview.mp4 (1.09 MB)
MP4
02  Indicators of Compromise (IOC).mp4 (4.05 MB)
MP4
03  Virus.mp4 (4 MB)
MP4
04  Crypto-malware  Ransomware.mp4 (5.98 MB)
MP4
05  Trojan.mp4 (7.07 MB)
MP4
06  Worms.mp4 (1.4 MB)
MP4
07  Potentially Unwanted Programs (PUP).mp4 (2.72 MB)
MP4
08  Fileless Virus.mp4 (3.66 MB)
MP4
09  Botnets.mp4 (4.69 MB)
MP4
10  Logic Bomb.mp4 (1.64 MB)
MP4
11  Spyware.mp4 (2.47 MB)
MP4
12  Keylogger.mp4 (1.53 MB)
MP4
13  Rootkits.mp4 (2.24 MB)
MP4
14  Backdoors.mp4 (2.02 MB)
MP4
15  Spraying.mp4 (3.05 MB)
MP4
16  Brute Force and Dictionary Attacks.mp4 (5.15 MB)
MP4
17  Rainbow Tables.mp4 (3.37 MB)
MP4
18  Known Plain Text  Ciphertext.mp4 (1.72 MB)
MP4
19  Birthday Attack.mp4 (4.76 MB)
MP4
20  Downgrade Attack.mp4 (1.85 MB)
MP4
21  Physical Attacks, Malicious USB, and Skimming.mp4 (6.25 MB)
MP4
22  Adversarial Artificial Intelligence (AI).mp4 (3.46 MB)
MP4
23  Supply Chain Attacks.mp4 (3.74 MB)
MP4
24  Supply Chain Attack Example.mp4 (2.59 MB)
MP4
25  Cloud-Based vs  On-prem Attacks.mp4 (7.11 MB)
MP4
26  Module Review.mp4 (803.38 KB)
MP4
01  Module Overview.mp4 (972.08 KB)
MP4
02  Privilege Escalation.mp4 (4.31 MB)
MP4
03  Cross Site Scripting (XSS).mp4 (6.69 MB)
MP4
04  SQL Injection.mp4 (2.51 MB)
MP4
05  DLL Injection.mp4 (7.07 MB)
MP4
06  LDAP Injection.mp4 (1.21 MB)
MP4
07  XML Injection.mp4 (1.8 MB)
MP4
08  Pointer Dereference.mp4 (2.76 MB)
MP4
09  Directory Traversal  Command Injection.mp4 (3.11 MB)
MP4
10  Buffer Overflow.mp4 (2.84 MB)
MP4
11  Race Conditions.mp4 (3.39 MB)
MP4
12  Time of Check.mp4 (2.28 MB)
MP4
13  Secure Coding Concepts, Error Handling, and Input Validation.mp4 (6.96 MB)
MP4
14  Replay Attacks.mp4 (2.15 MB)
MP4
15  Integer Overflow.mp4 (2.4 MB)
MP4
16  Cross Site Request Forgery (XSRF).mp4 (4.38 MB)
MP4
17  API Attacks.mp4 (3.28 MB)
MP4
18  Resource Exhaustion.mp4 (4.1 MB)
MP4
19  Memory Leak.mp4 (3.01 MB)
MP4
20  SSL Stripping.mp4 (3.07 MB)
MP4
21  Shimming.mp4 (1.71 MB)
MP4
22  Refactoring.mp4 (1.41 MB)
MP4
23  Pass the Hash.mp4 (4.2 MB)
MP4
24  Module Review.mp4 (641.12 KB)
MP4
01  Module Overview.mp4 (1.28 MB)
MP4
02  Rogue Access Points and Evil Twin.mp4 (5.14 MB)
MP4
03  Bluejack and Bluesnarfing.mp4 (5.45 MB)
MP4
04  Dissociation.mp4 (2.67 MB)
MP4
05  Jamming.mp4 (1.65 MB)
MP4
06  RFID.mp4 (2.18 MB)
MP4
07  Near Field Communication (NFC).mp4 (2.91 MB)
MP4
08  IV Attack.mp4 (4.85 MB)
MP4
09  On-path Attacks (Formerly MiTM).mp4 (1.99 MB)
MP4
10  On-path Attacks (Formerly MiTB).mp4 (4.09 MB)
MP4
11  ARP Poisoning.mp4 (2.59 MB)
MP4
12  IPMAC Spoofing.mp4 (1.61 MB)
MP4
13  MAC Flooding.mp4 (3.58 MB)
MP4
14  MAC Cloning.mp4 (3 MB)
MP4
15  DNS Poisoning.mp4 (1.86 MB)
MP4
16  Typo Squatting  URL Hijacking.mp4 (3.5 MB)
MP4
17  Distributed Denial of Service (DDoS).mp4 (4.27 MB)
MP4
18  Smurf Attack (Amplification).mp4 (5.26 MB)
MP4
19  DDoS Attack Vectors.mp4 (1.93 MB)
MP4
20  Malicious Code Execution.mp4 (2.97 MB)
MP4
01  Module Review.mp4 (1.83 MB)
MP4
02  Script Kiddies.mp4 (1.69 MB)
MP4
03  Hacktivists.mp4 (1.63 MB)
MP4
04  Organized Crime.mp4 (2.09 MB)
MP4
05  Nation States  APT.mp4 (2.13 MB)
MP4
06  Insiders.mp4 (2.57 MB)
MP4
07  Competitors.mp4 (2.09 MB)
MP4
08  Threat Actor Attributes.mp4 (1.35 MB)
MP4
09  Attack Vectors.mp4 (12.61 MB)
MP4
10  Use of Open Source Intelligence.mp4 (7 MB)
MP4
11  Closed  Proprietary Intelligence.mp4 (1.36 MB)
MP4
12  Vulnerability Databases.mp4 (2.44 MB)
MP4
13  Public and Private Information Sharing.mp4 (1.94 MB)
MP4
14  Dark Web.mp4 (3.95 MB)
MP4
15  Indicators of Compromise (IOC).mp4 (3.01 MB)
MP4
16  Automate Indicator Sharing (AIS).mp4 (2.48 MB)
MP4
17  TAXII Layout.mp4 (1.65 MB)
MP4
18  MITRE.mp4 (6.18 MB)
MP4
19  Gathering and Correlating Information.mp4 (3.57 MB)
MP4
20  Predictive Analysis.mp4 (2.01 MB)
MP4
21  Threat Maps.mp4 (1.37 MB)
MP4
22  Live Cyber Threat Map.mp4 (3.85 MB)
MP4
23  File  Code Repositories.mp4 (2.56 MB)
MP4
24  Research Sources.mp4 (7.41 MB)
MP4
01  Module Overview.mp4 (1.22 MB)
MP4
02  Cloud-based vs  On-premise.mp4 (4.14 MB)
MP4
03  New Threats  Zero Days.mp4 (2.85 MB)
MP4
04  Mis-configuration  Weak Configuration.mp4 (2.31 MB)
MP4
05  Shared Accounts (Improperly Configured).mp4 (2.31 MB)
MP4
06  Weak Configuration Considerations.mp4 (3.13 MB)
MP4
07  Weak Cipher Suites and Implementations.mp4 (2.97 MB)
MP4
08  Improper Certificate and Key Management.mp4 (2.56 MB)
MP4
09  Secure Protocols.mp4 (5.51 MB)
MP4
10  Default Configurations.mp4 (2.33 MB)
MP4
11  Third-party Risks.mp4 (3.76 MB)
MP4
12  Vendor Management.mp4 (4.99 MB)
MP4
13  Vulnerable Business Processes.mp4 (4.36 MB)
MP4
14  Outsourced Code Mangement.mp4 (1.57 MB)
MP4
15  Improper or Weak Patch Management.mp4 (3.37 MB)
MP4
16  Legacy Platforms.mp4 (2.7 MB)
MP4
17  Impact Areas.mp4 (1.8 MB)
MP4
18  Effects of Impacts.mp4 (2.5 MB)
MP4
01  Module Overview.mp4 (1.39 MB)
MP4
02  Specific Types of Threats.mp4 (1.04 MB)
MP4
03  What Is Cyber Threat Intelligence.mp4 (2.39 MB)
MP4
04  Importance of Cyber Threat Intelligence.mp4 (1.35 MB)
MP4
05  Threat Intelligence Classification.mp4 (2.49 MB)
MP4
06  Strategic, Operational, and Tactical Intelligence.mp4 (2.62 MB)
MP4
07  Gathering and Correlating Information.mp4 (3.72 MB)
MP4
08  Stages of Risk Management.mp4 (4.73 MB)
MP4
09  Risk Management Data Sources.mp4 (4.31 MB)
MP4
10  Vulnerability Scanning.mp4 (1.26 MB)
MP4
11  False Positive.mp4 (1.69 MB)
MP4
12  False Positive Audits.mp4 (1.25 MB)
MP4
13  False Negatives.mp4 (1.23 MB)
MP4
14  Intrusive vs  Non-intrusive.mp4 (971.06 KB)
MP4
15  Passively Test Security Controls.mp4 (946.72 KB)
MP4
16  Credentialed vs  Non-credentialed.mp4 (4.62 MB)
MP4
17  Identify Vulnerabilities and Lack of Security Controls.mp4 (2.86 MB)
MP4
18  Identify Common Misconfigurations.mp4 (3.05 MB)
MP4
19  Things to Remember.mp4 (3.96 MB)
MP4
20  Common Vulnerabilities and Exposures (CVE).mp4 (8.21 MB)
MP4
21  CVSS.mp4 (4.71 MB)
MP4
22  Security Information and Event Management (SEIM).mp4 (4.35 MB)
MP4
23  Security Orchestration, Automation, and Response.mp4 (2.79 MB)
MP4
01  Module Intro.mp4 (874.88 KB)
MP4
02  Penetration Testing.mp4 (1.82 MB)
MP4
03  Penetration Testing Steps.mp4 (3.09 MB)
MP4
04  Known, Unknown, and Partially Known Environments.mp4 (1.51 MB)
MP4
05  Rules of Engagement.mp4 (3.15 MB)
MP4
06  Lateral Movement.mp4 (1.7 MB)
MP4
07  Escalation of Privilege.mp4 (1.07 MB)
MP4
09  Persistence.mp4 (757.99 KB)
MP4
10  Cleanup.mp4 (1.72 MB)
MP4
11  Bug Bounty.mp4 (3.91 MB)
MP4
12  Pivoting.mp4 (3.37 MB)
MP4
13  Types of Reconnaissance.mp4 (4.61 MB)
MP4
14  War Flying.mp4 (2.75 MB)
MP4
15  War Driving.mp4 (2.17 MB)
MP4
16  Red, Blue, Purple, and White Security Teams.mp4 (3.13 MB)
MP4
17  Module Review.mp4 (1.34 MB)
MP4
1  Course Overview.mp4 (3.71 MB)
MP4
01  Module Intro.mp4 (3.08 MB)
MP4
02  Configuration Management.mp4 (7.5 MB)
MP4
03  Diagrams.mp4 (4.51 MB)
MP4
04  Baseline Configuration.mp4 (3.66 MB)
MP4
05  IP Address Schema.mp4 (3.74 MB)
MP4
06  Data Sovereignty.mp4 (2.47 MB)
MP4
07  Data Loss Prevention (DLP).mp4 (3.8 MB)
MP4
08  Types of Data to Secure.mp4 (2.38 MB)
MP4
09  Data Masking.mp4 (5.93 MB)
MP4
10  Tokenization.mp4 (4.77 MB)
MP4
11  Digital Rights Management (DRM).mp4 (1.52 MB)
MP4
12  Hardware Based Encryption (TPM and HSM).mp4 (2.94 MB)
MP4
13  Geographical Considerations.mp4 (2.93 MB)
MP4
14  Cloud Access Security Broker (CASB).mp4 (2.09 MB)
MP4
15  Security-as-a-Service (SECaaS).mp4 (1.96 MB)
MP4
16  Differences between CASB and SECaaS.mp4 (2.15 MB)
MP4
17  Recovery.mp4 (2.56 MB)
MP4
18  Secure Protocols and SSLTLS Inspection.mp4 (3.11 MB)
MP4
19  Hashing.mp4 (3.27 MB)
MP4
20  API Considerations and API Gateways.mp4 (4.89 MB)
MP4
21  Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).mp4 (5.11 MB)
MP4
22  Disaster Area Example.mp4 (3.1 MB)
MP4
23  Honeypots and Honeyfiles.mp4 (2.13 MB)
MP4
24  Honeynets.mp4 (1.97 MB)
MP4
25  Fake Telemetry.mp4 (2.18 MB)
MP4
26  DNS Sinkhole.mp4 (5.31 MB)
MP4
01  Module Intro.mp4 (1.3 MB)
MP4
02  Cloud Storage.mp4 (3.38 MB)
MP4
03  Cloud Computing.mp4 (1.97 MB)
MP4
04  [X] as a Service.mp4 (1.03 MB)
MP4
05  Infrastructure as a Service (IaaS).mp4 (3.05 MB)
MP4
06  IaaS and Automation.mp4 (2.74 MB)
MP4
07  Platform as a Service (PaaS).mp4 (3.31 MB)
MP4
08  Software as a Service (SaaS).mp4 (1.96 MB)
MP4
09  IaaS, PaaS, and SaaS Differentiators.mp4 (2.02 MB)
MP4
10  Types of Clouds.mp4 (1.53 MB)
MP4
11  Managed Service Providers (MSP).mp4 (7.55 MB)
MP4
12  Fog Computing.mp4 (4.79 MB)
MP4
13  Edge Computing.mp4 (977.26 KB)
MP4
14  VDI.mp4 (7.53 MB)
MP4
15  Virtualization.mp4 (7.89 MB)
MP4
16  Containers.mp4 (9.72 MB)
MP4
17  Microservices and APIs.mp4 (6.43 MB)
MP4
18  Infrastructure as Code (IAC).mp4 (1.39 MB)
MP4
19  Software Defined Networking (SDN).mp4 (2.02 MB)
MP4
20  Software Defined Visibility (SDV).mp4 (1.57 MB)
MP4
21  Serverless Architecture.mp4 (4.8 MB)
MP4
22  IaaS, PaaS, FaaS, and SaaS Differentiators.mp4 (1.92 MB)
MP4
23  Service Integrations and Resource Policies.mp4 (2.47 MB)
MP4
24  Transit Gateway.mp4 (1.37 MB)
MP4
25  VM Sprawl Avoidance.mp4 (3.38 MB)
MP4
26  VM Escape.mp4 (2.42 MB)
MP4
27  Module Review.mp4 (777.87 KB)
MP4
01  Module Intro.mp4 (1.58 MB)
MP4
02  Environments (Dev, Test, Staging, and Production).mp4 (5.66 MB)
MP4
03  Environment Example.mp4 (6.16 MB)
MP4
04  Provisioning and Deprovisioning.mp4 (3.62 MB)
MP4
05  Integrity Measurement.mp4 (3.15 MB)
MP4
06  Static Code Analysis.mp4 (3.59 MB)
MP4
07  Secure Coding Techniques.mp4 (14.24 MB)
MP4
08  Security Automation.mp4 (4.25 MB)
MP4
09  Continuous Monitoring and Validation.mp4 (1.98 MB)
MP4
10  Continuous Integration.mp4 (3.02 MB)
MP4
11  Continuous Delivery and Continuous Development.mp4 (3.59 MB)
MP4
12  OWASP.mp4 (940.96 KB)
MP4
13  Software Diversity, Compiler, and Binary.mp4 (2.67 MB)
MP4
14  Elasticity and Scalability.mp4 (1.8 MB)
MP4
15  Version Control.mp4 (4.17 MB)
MP4
01  Module Intro.mp4 (1.38 MB)
MP4
02  Directory Services.mp4 (2.72 MB)
MP4
03  Usernames.mp4 (1.91 MB)
MP4
04  Federation.mp4 (1.82 MB)
MP4
05  Transitive Trust  Authentication.mp4 (1.86 MB)
MP4
06  Attestation.mp4 (1.33 MB)
MP4
07  Time-Based One-Time Password (TOTP).mp4 (2.47 MB)
MP4
08  HMAC-Based One-Time Password (HOTP).mp4 (1.4 MB)
MP4
09  SMS Authentication.mp4 (1.95 MB)
MP4
10  Tokens.mp4 (1.91 MB)
MP4
11  Static Codes.mp4 (1.31 MB)
MP4
12  Authentication Applications.mp4 (2 MB)
MP4
13  Push Notifications.mp4 (1.6 MB)
MP4
14  Smart Cards.mp4 (1.54 MB)
MP4
15  Proximity Cards.mp4 (2 MB)
MP4
16  Personal Identification Verification Card (PIV).mp4 (1.77 MB)
MP4
17  Common Access Card.mp4 (1.67 MB)
MP4
18  Biometric Factors.mp4 (1.38 MB)
MP4
19  Facial Recognition.mp4 (2.84 MB)
MP4
20  Vein and Gait Analysis.mp4 (3.65 MB)
MP4
21  Efficacy Rates.mp4 (1.61 MB)
MP4
22  Identification vs  Authentication vs  Authorization.mp4 (1.99 MB)
MP4
23  Multifactor Authentication.mp4 (1.62 MB)
MP4
24  Authentication Factors.mp4 (3.29 MB)
MP4
25  Authorization.mp4 (1.65 MB)
MP4
26  Authentication Factors.mp4 (1.83 MB)
MP4
27  Authentication, Authorization, and Accounting (AAA).mp4 (1.24 MB)
MP4
28  On-prem vs  Cloud Requirements.mp4 (4.37 MB)
MP4
01  Module Intro.mp4 (3.56 MB)
MP4
02  Geographically Disperse.mp4 (1.53 MB)
MP4
03  Geographical Dispersal of Assets.mp4 (2.26 MB)
MP4
04  RAID.mp4 (5.14 MB)
MP4
05  Multipath.mp4 (3.67 MB)
MP4
06  Load Balancer.mp4 (2.27 MB)
MP4
07  Power Resiliency.mp4 (3.82 MB)
MP4
08  Replication.mp4 (4.2 MB)
MP4
09  On-prem vs  Cloud.mp4 (3.11 MB)
MP4
10  Backup Plans  Policies.mp4 (1.83 MB)
MP4
11  Backup Execution  Frequency.mp4 (2.21 MB)
MP4
12  Backup Types.mp4 (5.5 MB)
MP4
13  Backup Environments.mp4 (1.99 MB)
MP4
14  Online vs  Offline Backups.mp4 (2.44 MB)
MP4
15  Backups - Distance Considerations.mp4 (3.41 MB)
MP4
16  Non-persistence, Snapshots, and Live Boot Media.mp4 (3.3 MB)
MP4
17  High Availability.mp4 (3.43 MB)
MP4
18  Redundancy.mp4 (2.7 MB)
MP4
19  Fault Tolerant Hardware.mp4 (1.38 MB)
MP4
20  Technology and Vendor Diversity.mp4 (3.88 MB)
MP4
21  Crypto and Control Diversity.mp4 (4.14 MB)
MP4
01  Module Intro.mp4 (1.93 MB)
MP4
02  Module Goal.mp4 (2.01 MB)
MP4
03  Embedded Systems.mp4 (1.77 MB)
MP4
04  Embedded Systems Examples.mp4 (3.3 MB)
MP4
05  SCADA  ICS.mp4 (9.42 MB)
MP4
06  SCADA Security Concerns.mp4 (5.47 MB)
MP4
07  Smart Devices  IoT.mp4 (4.05 MB)
MP4
08  Smart Devices  IoT Weak Defaults.mp4 (1.89 MB)
MP4
09  Special Purpose Devices.mp4 (1.87 MB)
MP4
10  Vehicles.mp4 (2.64 MB)
MP4
11  Voice over IP (VoIP).mp4 (5.09 MB)
MP4
12  HVAC.mp4 (3.83 MB)
MP4
13  AircraftUAV.mp4 (2.94 MB)
MP4
14  PrintersMFDs.mp4 (2.91 MB)
MP4
15  Real Time Operating Systems (RTOS).mp4 (1.42 MB)
MP4
16  Surveillance Systems.mp4 (2.67 MB)
MP4
17  System on a Chip (SoC).mp4 (1.79 MB)
MP4
18  5G Networks and Security Concerns.mp4 (3.03 MB)
MP4
19  Narrow-band and Baseband Radio.mp4 (1.05 MB)
MP4
20  Zigbee.mp4 (4.84 MB)
MP4
21  Constraints.mp4 (4.36 MB)
MP4
01  Module Intro.mp4 (1.37 MB)
MP4
02  Barricades.mp4 (3.54 MB)
MP4
03  Mantraps.mp4 (1.32 MB)
MP4
04  Badges.mp4 (2.84 MB)
MP4
05  Alarms.mp4 (2.53 MB)
MP4
06  Lighting and Signs.mp4 (3.66 MB)
MP4
07  Cameras and Video Surveillance.mp4 (2.89 MB)
MP4
08  Guards.mp4 (1.16 MB)
MP4
09  Robot Sentries.mp4 (2.4 MB)
MP4
10  Reception.mp4 (1.83 MB)
MP4
11  Two Person Integrity (TPI)  Control.mp4 (1.58 MB)
MP4
12  Hardware Locks.mp4 (1.15 MB)
MP4
13  Biometrics.mp4 (1.66 MB)
MP4
14  Cable Locks, Safes, and Locking Cabinets.mp4 (1.9 MB)
MP4
15  USB Data Blocker.mp4 (2.1 MB)
MP4
16  Fencing.mp4 (4.35 MB)
MP4
17  Fire Suppression.mp4 (5.97 MB)
MP4
18  Motion Detection  Infrared.mp4 (1.42 MB)
MP4
19  Proximity Readers.mp4 (1.99 MB)
MP4
20  Drones  UAV.mp4 (1.64 MB)
MP4
21  Logs.mp4 (1.27 MB)
MP4
22  Air Gaps.mp4 (5.56 MB)
MP4
23  Demilitarized Zone (DMZ).mp4 (6.79 MB)
MP4
24  Protected Distribution System (PDS).mp4 (8.03 MB)
MP4
25  Hot and Cold Aisles.mp4 (4.87 MB)
MP4
26  Non-Digital and Digital Data Destruction.mp4 (1.96 MB)
MP4
27  Shredding.mp4 (1.27 MB)
MP4
28  Pulping and Pulverizing.mp4 (2.24 MB)
MP4
29  Deguassing.mp4 (2.94 MB)
MP4
30  Purging.mp4 (2.04 MB)
MP4
31  Wiping.mp4 (4.16 MB)
MP4
32  Module Review.mp4 (823.16 KB)
MP4
01  Module Intro.mp4 (1.26 MB)
MP4
02  Why You Should Care.mp4 (1.42 MB)
MP4
03  Cryptographic Terminology and History.mp4 (5.8 MB)
MP4
04  Vigenere Table.mp4 (10.21 MB)
MP4
05  Digital Signatures.mp4 (2.52 MB)
MP4
06  Key Stretching.mp4 (6.04 MB)
MP4
07  Hashing.mp4 (4.4 MB)
MP4
08  In-band vs  Out-of-band Key Exchange.mp4 (2.58 MB)
MP4
09  Elliptic Curve Cryptography (ECC).mp4 (1.91 MB)
MP4
10  Perfect Forward Secrecy.mp4 (2.67 MB)
MP4
11  Quantum Communications.mp4 (8.3 MB)
MP4
12  Quantum Computing.mp4 (2.48 MB)
MP4
13  Post Quantum.mp4 (1.7 MB)
MP4
14  Ephemeral Key.mp4 (1.63 MB)
MP4
15  Cipher Modes.mp4 (1.1 MB)
MP4
16  XOR Function.mp4 (2.25 MB)
MP4
17  Cryptographic Methods and Design.mp4 (6.71 MB)
MP4
18  Blockchain.mp4 (7.78 MB)
MP4
19  Fundamental Differences and Encryption Methods.mp4 (4.85 MB)
MP4
20  Session Keys.mp4 (1.57 MB)
MP4
21  Asymmetric Encryption.mp4 (7.71 MB)
MP4
22  Lightweight Encryption.mp4 (1.76 MB)
MP4
23  Steganography.mp4 (4.47 MB)
MP4
24  Homomorphic Encryption.mp4 (3.35 MB)
MP4
25  Common Use Cases.mp4 (5.98 MB)
MP4
26  Cipher Suites.mp4 (2.5 MB)
MP4
27  Limitations.mp4 (3 MB)
MP4
28  Random and Pseudorandom Number Generators (PRNG).mp4 (3.54 MB)
MP4
29  Quantum Random Number Generators (QRNG).mp4 (1.53 MB)
MP4
1  Course Overview.mp4 (3.94 MB)
MP4
01  Module Intro.mp4 (1.35 MB)
MP4
02  Networking Protocols and TCP Three-way Handshake.mp4 (6.34 MB)
MP4
03  DNSSEC.mp4 (7.01 MB)
MP4
04  SSH.mp4 (1.94 MB)
MP4
05  SMIME.mp4 (1.8 MB)
MP4
06  Secure Real-Time Transport Protocol (SRTP).mp4 (1.19 MB)
MP4
07  Lightweight Directory Access Protocol over SSL (LDAPS).mp4 (1.64 MB)
MP4
08  FTPS and SFTP.mp4 (2.32 MB)
MP4
09  SNMP v3.mp4 (1.76 MB)
MP4
10  SSLTLS.mp4 (1.85 MB)
MP4
11  HTTPS.mp4 (2.5 MB)
MP4
12  Secure POPIMAP.mp4 (4.9 MB)
MP4
13  Use Cases.mp4 (5.46 MB)
MP4
14  Module Review.mp4 (1.43 MB)
MP4
01  Module Overview.mp4 (1.3 MB)
MP4
02  Antivirus.mp4 (2.35 MB)
MP4
03  Endpoint Detection and Response (EDR).mp4 (3.16 MB)
MP4
04  Data Loss Prevention (DLP).mp4 (3.76 MB)
MP4
05  Next-generation Firewall (NGFW).mp4 (2.9 MB)
MP4
06  HIDSHIPS.mp4 (1.51 MB)
MP4
07  Host-based Firewall.mp4 (2.53 MB)
MP4
08  Boot Loader Protections and Secure Boot.mp4 (4.96 MB)
MP4
09  Measured Launch.mp4 (1.22 MB)
MP4
10  Integrity Measurement Architecture (IMA).mp4 (749.51 KB)
MP4
11  BIOSUEFI.mp4 (964.31 KB)
MP4
12  Hashing.mp4 (4.38 MB)
MP4
13  Salt.mp4 (1.77 MB)
MP4
14  Secure Coding Techniques.mp4 (14.24 MB)
MP4
15  Code Quality and Testing.mp4 (4.66 MB)
MP4
16  Static Code Analysis.mp4 (3.59 MB)
MP4
17  Fuzzing.mp4 (8.42 MB)
MP4
18  Additional Secure Coding Concepts.mp4 (2.98 MB)
MP4
19  Peripherals Security.mp4 (3.46 MB)
MP4
20  Hardening the Environment.mp4 (4.1 MB)
MP4
21  Common Ports.mp4 (2.45 MB)
MP4
22  Registry Hardening.mp4 (2.51 MB)
MP4
23  Self-encrypting Drives (SED).mp4 (3.82 MB)
MP4
24  Hardware Root of Trust.mp4 (2.28 MB)
MP4
25  Hardware Based Encryption.mp4 (4.83 MB)
MP4
26  Sandboxing.mp4 (4.92 MB)
MP4
01  Module Overview.mp4 (1.37 MB)
MP4
02  Load Balancers.mp4 (6.45 MB)
MP4
03  Security Segmentation Models.mp4 (4.21 MB)
MP4
04  Virtualization.mp4 (2.29 MB)
MP4
05  Air Gaps.mp4 (3.65 MB)
MP4
06  East-west Traffic.mp4 (3.26 MB)
MP4
07  Zero Trust.mp4 (3.04 MB)
MP4
08  VPN.mp4 (6.95 MB)
MP4
09  Split Tunnel.mp4 (1.65 MB)
MP4
10  IPSec and Transport Encryption.mp4 (2.18 MB)
MP4
11  VPN Concentrator.mp4 (2.16 MB)
MP4
12  DNSSEC.mp4 (7.09 MB)
MP4
13  Network Access Control (NAC).mp4 (4.05 MB)
MP4
14  In-band vs  Out-of-band Management.mp4 (7.83 MB)
MP4
15  Port Security and 802 1x.mp4 (7.45 MB)
MP4
16  Loop Protection and Flood Guards.mp4 (3.03 MB)
MP4
17  Spanning Tree Protocol (STP).mp4 (5 MB)
MP4
18  DHCP Snooping.mp4 (1.89 MB)
MP4
19  MAC Filtering.mp4 (4.4 MB)
MP4
20  Module Review.mp4 (615.53 KB)
MP4
01  Module Overview.mp4 (1.39 MB)
MP4
02  Jump Server.mp4 (3.45 MB)
MP4
03  Proxies.mp4 (5.87 MB)
MP4
04  Web Security Gateways.mp4 (2.78 MB)
MP4
05  Intrusion Detection and Prevention.mp4 (9.11 MB)
MP4
06  IDSIPS Component Workflow.mp4 (2.13 MB)
MP4
07  Four Approaches to IDS.mp4 (2.72 MB)
MP4
08  Network-based IDS.mp4 (3.71 MB)
MP4
09  Security Device Placement.mp4 (3.99 MB)
MP4
10  Firewalls.mp4 (12.08 MB)
MP4
11  Web Application Firewalls.mp4 (3.98 MB)
MP4
12  Unified Threat Management (UTM).mp4 (1.57 MB)
MP4
13  Content Filters.mp4 (2.09 MB)
MP4
14  Implicit Deny and ACLs.mp4 (1001.55 KB)
MP4
15  Route Security.mp4 (2.77 MB)
MP4
16  Quality of Service (QoS).mp4 (3.03 MB)
MP4
17  Implications of IPv6.mp4 (4.3 MB)
MP4
18  Port Mirroring, Port Spanning, and Port Taps.mp4 (6.52 MB)
MP4
20  Module Review.mp4 (667.92 KB)
MP4
01  Module Review.mp4 (1.22 MB)
MP4
02  Wireless Definitions.mp4 (3.27 MB)
MP4
03  WEPWPAWPA2.mp4 (2.42 MB)
MP4
04  WPA and WPA2 Security.mp4 (6.74 MB)
MP4
05  WPA3.mp4 (8.42 MB)
MP4
06  Wireless Security Examples.mp4 (4.09 MB)
MP4
07  Wireless Security and Pen Testing Tools.mp4 (5.03 MB)
MP4
08  EAP, PEAP, and LEAP.mp4 (3.73 MB)
MP4
09  802 11x Wireless Protocols.mp4 (4.96 MB)
MP4
10  RADIUS Federation.mp4 (742.83 KB)
MP4
11  Wi-Fi Protected Setup (WPS).mp4 (1.73 MB)
MP4
12  Captive Portal.mp4 (3.93 MB)
MP4
13  Installation Considerations.mp4 (2.06 MB)
MP4
14  Access PointsWi-Fi Security.mp4 (6.16 MB)
MP4
15  Band SelectionWidth.mp4 (3.51 MB)
MP4
16  Fat vs  Thin Access Points and Stand-alone vs  Controller-based.mp4 (5.79 MB)
MP4
17  Module Review.mp4 (593.17 KB)
MP4
01  Module Overview.mp4 (1.07 MB)
MP4
02  Cellular.mp4 (10.78 MB)
MP4
03  Securing Wi-Fi.mp4 (3.18 MB)
MP4
04  Near Field Communication (NFC).mp4 (2.15 MB)
MP4
05  Additional Areas of Concern.mp4 (4.96 MB)
MP4
06  MicroSD HSM.mp4 (1.47 MB)
MP4
07  Mobile Device Management (MDM, MAM, and UEM).mp4 (2.21 MB)
MP4
08  SEAndroid.mp4 (2.58 MB)
MP4
09  Device Security.mp4 (6.61 MB)
MP4
10  Application Security and Key Credential Management.mp4 (4.05 MB)
MP4
11  Authentication.mp4 (2.7 MB)
MP4
12  Geo-tagging.mp4 (2.61 MB)
MP4
13  Context-aware Authentication.mp4 (4.28 MB)
MP4
14  Enforcement and Monitoring.mp4 (7.25 MB)
MP4
15  BYOD Concerns and Deployment Models.mp4 (6.01 MB)
MP4
16  Additional BYOD Concerns.mp4 (4.24 MB)
MP4
17  Module Review.mp4 (598.32 KB)
MP4
01  Module Intro.mp4 (1.15 MB)
MP4
02  High Availability.mp4 (4.49 MB)
MP4
03  Resource Policies.mp4 (2.25 MB)
MP4
04  Secrets Management.mp4 (4.89 MB)
MP4
05  Storage in the Cloud.mp4 (4.44 MB)
MP4
06  Virtual Networks.mp4 (6.35 MB)
MP4
07  API Inspection and Integration.mp4 (2.31 MB)
MP4
08  Growth of Enterprise Cloud Application.mp4 (1.85 MB)
MP4
09  Cyber Kill Chain in the Cloud.mp4 (8.31 MB)
MP4
10  Compute in the Cloud.mp4 (5.78 MB)
MP4
11  Cloud Access Security Broker (CASB).mp4 (1.69 MB)
MP4
12  Application Security.mp4 (1.73 MB)
MP4
13  Next-gen Secure Web Gateway (NG-SWG).mp4 (1.22 MB)
MP4
14  Firewall Considerations in a Cloud Environment.mp4 (3.97 MB)
MP4
15  TCPIP and OSI Models.mp4 (1.22 MB)
MP4
16  Application Layer, Protocol Layer, and Volumetric Attacks.mp4 (3.85 MB)
MP4
17  Cost.mp4 (2.02 MB)
MP4
18  Cloud Native Controls vs  Third-party Solutions.mp4 (5.44 MB)
MP4
01  Module Review.mp4 (890.2 KB)
MP4
02  Identity Provider (IdP).mp4 (2.8 MB)
MP4
03  IdP Example.mp4 (2.51 MB)
MP4
04  Certificates, Tokens, and SSH Keys.mp4 (3.67 MB)
MP4
05  Certificate Issues.mp4 (4.43 MB)
MP4
06  Smart Cards.mp4 (1.48 MB)
MP4
07  User Accounts.mp4 (1.95 MB)
MP4
08  Account Management.mp4 (3.62 MB)
MP4
09  Password Complexity.mp4 (2.3 MB)
MP4
10  Password History.mp4 (3.52 MB)
MP4
11  Password Reuse.mp4 (1.96 MB)
MP4
12  Time of Day Restrictions.mp4 (1.88 MB)
MP4
13  User Access Best Practices.mp4 (3.69 MB)
MP4
14  Permissions Auditing and Review.mp4 (2.11 MB)
MP4
15  Recertification.mp4 (2.6 MB)
MP4
16  Group Policy.mp4 (3.45 MB)
MP4
17  Expiration.mp4 (3.78 MB)
MP4
18  Recovery.mp4 (2.79 MB)
MP4
19  Impossible TravelRisky Login.mp4 (4.4 MB)
MP4
20  Lockout.mp4 (1.18 MB)
MP4
21  Disablement.mp4 (1.72 MB)
MP4
22  Module Review.mp4 (586.86 KB)
MP4
1  Course Overview.mp4 (3.8 MB)
MP4
01  Module Overview.mp4 (1.38 MB)
MP4
02  Authentication Management.mp4 (5.13 MB)
MP4
03  Extensible Authentication Protocol (EAP).mp4 (1.42 MB)
MP4
04  Challenge Handshake Authentication Protocol (CHAP).mp4 (1.68 MB)
MP4
05  Password Authentication Protocol (PAP).mp4 (1.38 MB)
MP4
06  Port Security and 802 1x Authentication.mp4 (7.96 MB)
MP4
07  RADIUS.mp4 (4.14 MB)
MP4
08  Single Sign-on (SSO).mp4 (8.92 MB)
MP4
09  SAML.mp4 (3.92 MB)
MP4
10  TACACS.mp4 (1.94 MB)
MP4
11  TACACS+.mp4 (4.47 MB)
MP4
12  oAUTH.mp4 (3.25 MB)
MP4
13  OpenID and Shibboleth.mp4 (2.35 MB)
MP4
14  Kerberos.mp4 (6 MB)
MP4
15  Attribute Based Access Control (ABAC).mp4 (5.19 MB)
MP4
16  Rule-basedRole-based Access Control (RBAC).mp4 (3.02 MB)
MP4
17  Access Control Methods.mp4 (1.81 MB)
MP4
18  Mandatory Access Control (MAC).mp4 (1.9 MB)
MP4
19  Discretionary Access Control (DAC).mp4 (1.27 MB)
MP4
20  Conditional Access.mp4 (1.79 MB)
MP4
21  Privileged Accounts.mp4 (1.98 MB)
MP4
22  Filesystem Permissions.mp4 (2.35 MB)
MP4
01  Module Overview.mp4 (1.01 MB)
MP4
02  Certificate Authorities and Digital Certificates.mp4 (1.31 MB)
MP4
03  Certificate Authority.mp4 (3.01 MB)
MP4
04  CRLs.mp4 (2.36 MB)
MP4
05  OCSP.mp4 (2.63 MB)
MP4
06  CSR and PKCS Standards.mp4 (1.82 MB)
MP4
07  PKI.mp4 (8.48 MB)
MP4
08  Public Key.mp4 (1.9 MB)
MP4
09  Private Key.mp4 (976.99 KB)
MP4
10  Object Identifiers (OID).mp4 (3.48 MB)
MP4
11  Types of Certificates.mp4 (6.2 MB)
MP4
12  Certificate Formats.mp4 (1.63 MB)
MP4
13  Online vs  Offline Certificate Authority (CA).mp4 (3.47 MB)
MP4
14  Stapling and Pinning.mp4 (1.38 MB)
MP4
15  Trust Models.mp4 (2.88 MB)
MP4
16  Key Escrow.mp4 (2.71 MB)
MP4
17  Certificate Chaining.mp4 (1.52 MB)
MP4
01  Module Overview.mp4 (1.51 MB)
MP4
02  Traceroutetracert.mp4 (2.89 MB)
MP4
03  nslookupdig.mp4 (2.91 MB)
MP4
04  ipconfigifconfig.mp4 (1.31 MB)
MP4
05  nmap and nmap demo.mp4 (6.98 MB)
MP4
06  Ping and Pathping.mp4 (5.52 MB)
MP4
07  hping and hping demo.mp4 (5.28 MB)
MP4
08  Netstat.mp4 (2.38 MB)
MP4
09  netcat.mp4 (3.61 MB)
MP4
10  IP Scanners.mp4 (1.77 MB)
MP4
11  ARP.mp4 (1.27 MB)
MP4
12  Route.mp4 (983.76 KB)
MP4
13  Curl and Curl Demo.mp4 (2.61 MB)
MP4
14  TheHarvester and Demo.mp4 (4.66 MB)
MP4
15  Sn1per and Demo.mp4 (13.75 MB)
MP4
16  Scanless and Demo.mp4 (5.47 MB)
MP4
17  DNSenum.mp4 (1.78 MB)
MP4
18  Nessus and Cuckoo.mp4 (4.82 MB)
MP4
19  File Manipulation (Head, Tail, Cat, GREP and Logger).mp4 (4.48 MB)
MP4
20  CHMOD.mp4 (1.85 MB)
MP4
22  Packet Capture and TCPDump Demo.mp4 (8.46 MB)
MP4
23  Forensics.mp4 (8.75 MB)
MP4
24  Exploitation Frameworks.mp4 (4.29 MB)
MP4
25  Data Sanitization Tools.mp4 (10.41 MB)
MP4
26  Module Review.mp4 (820.66 KB)
MP4
01  Module Intro.mp4 (1.43 MB)
MP4
02  Who Should Watch this Course.mp4 (5.18 MB)
MP4
03  Team Models.mp4 (2.19 MB)
MP4
04  Incident Response Process.mp4 (2.82 MB)
MP4
05  Preparation.mp4 (2.05 MB)
MP4
06  Detection and Analysis.mp4 (6.26 MB)
MP4
07  Stopping the Spread.mp4 (3.44 MB)
MP4
08  Defining Goals and Expected Outcomes.mp4 (7.53 MB)
MP4
09  Test the Plan.mp4 (1.05 MB)
MP4
10  Walkthrough Tests.mp4 (2.77 MB)
MP4
11  Communication Tests.mp4 (2.13 MB)
MP4
12  Simulation (Tabletop) Tests.mp4 (1.49 MB)
MP4
13  Partial Exercise.mp4 (1.58 MB)
MP4
14  Full Exercise.mp4 (1.26 MB)
MP4
15  Overall Cost and Complexity of Testing.mp4 (1.34 MB)
MP4
16  Plan Review and Maintenance.mp4 (4.92 MB)
MP4
17  Review Process Outcomes.mp4 (1.99 MB)
MP4
18  Wired Brain Coffees Testing.mp4 (4.01 MB)
MP4
19  Intelligence Lifecycle.mp4 (810.98 KB)
MP4
20  Threat Intelligence Lifecycle.mp4 (2.25 MB)
MP4
21  Cyberthreat Intelligence Frameworks.mp4 (1.77 MB)
MP4
22  Cyber Kill Chain.mp4 (3.99 MB)
MP4
23  Diamond Model.mp4 (2.99 MB)
MP4
24  MITRE Attack Framework.mp4 (6.25 MB)
MP4
25  Key Points to Remember.mp4 (4.02 MB)
MP4
26  Types of Plans.mp4 (1.13 MB)
MP4
27  Disaster Recovery Plan.mp4 (2.19 MB)
MP4
28  Business Continuity Plan.mp4 (1.68 MB)
MP4
29  Business Resumption Plan.mp4 (1.73 MB)
MP4
30  Incident Management Plan.mp4 (3.05 MB)
MP4
31  Data Retention.mp4 (6.04 MB)
MP4
32  Putting It All Together.mp4 (5.5 MB)
MP4
33  Example Process.mp4 (7.27 MB)
MP4
01  Module Intro.mp4 (1.76 MB)
MP4
02  Filtering Through the Noise.mp4 (7.47 MB)
MP4
03  Vulnerability Scanner Demo.mp4 (10.37 MB)
MP4
04  SIEM.mp4 (6.62 MB)
MP4
05  Log Files.mp4 (6.83 MB)
MP4
06  Log Management, Syslog, Rsyslog, and Syslog-ng.mp4 (6.54 MB)
MP4
07  Journalctl.mp4 (10.13 MB)
MP4
08  NXLOG.mp4 (2.12 MB)
MP4
09  Retention (Auditing, Compliance and Investigations).mp4 (2.77 MB)
MP4
10  Bandwidth Monitors.mp4 (2.2 MB)
MP4
11  Metadata.mp4 (6.14 MB)
MP4
12  Netflow, sFlow, and IPFIX.mp4 (9.22 MB)
MP4
13  Detecting an Amplification Attack (ICMP echo).mp4 (3.99 MB)
MP4
14  Protocol Analyzer Output.mp4 (25.45 MB)
MP4
01  Module Intro.mp4 (1.29 MB)
MP4
02  Application WhitelistingBlacklisting.mp4 (2.1 MB)
MP4
03  Quarantine.mp4 (3.77 MB)
MP4
04  Firewalls.mp4 (8.9 MB)
MP4
05  Demo - Configuring Firewall Rules.mp4 (19.1 MB)
MP4
06  Mobile Device Management.mp4 (9.64 MB)
MP4
07  Using MDM to Locate and Secure and Lost Device.mp4 (2.03 MB)
MP4
09  Segregation, Segmentation and Isolation.mp4 (5.65 MB)
MP4
10  Virtualization.mp4 (2.2 MB)
MP4
11  Air Gaps.mp4 (3.37 MB)
MP4
13  SOAR and RunbooksPlaybooks.mp4 (8.83 MB)
MP4
01  Module Overview.mp4 (1.72 MB)
MP4
02  Computer Forensics.mp4 (3.57 MB)
MP4
03  Order of Volatility.mp4 (8.94 MB)
MP4
04  Chain of Custody.mp4 (5.37 MB)
MP4
05  Legal Hold.mp4 (2.24 MB)
MP4
06  First Responder Best Practices.mp4 (9.58 MB)
MP4
07  Capture a System Image.mp4 (6.52 MB)
MP4
08  Network Traffic and Logs.mp4 (6.31 MB)
MP4
09  Capturing Video.mp4 (1.82 MB)
MP4
10  Record Time Offset.mp4 (4.29 MB)
MP4
11  Taking Hashes.mp4 (3.31 MB)
MP4
12  Screenshots.mp4 (1.62 MB)
MP4
13  Witnesses.mp4 (3.84 MB)
MP4
14  Preservation of Evidence.mp4 (1.86 MB)
MP4
15  Recovery.mp4 (2.33 MB)
MP4
16  Strategic Intelligence  Counterintelligence Gathering.mp4 (3 MB)
MP4
17  Data Integrity.mp4 (3.01 MB)
MP4
18  Non-repudiation.mp4 (1.41 MB)
MP4
19  On-prem vs  Cloud Challenges and Right to Audit.mp4 (5.79 MB)
MP4
20  Regulatory  Jurisdictional Issues.mp4 (4.51 MB)
MP4
21  Data Breach Notification Laws.mp4 (4.1 MB)
MP4
1  Course Overview.mp4 (4.89 MB)
MP4
01  Module Overview.mp4 (1.15 MB)
MP4
02  Privacy and Compliance Challenges.mp4 (9.35 MB)
MP4
03  GDPR and Key Terminology.mp4 (3.03 MB)
MP4
06  GDPR Compliance and Penalties.mp4 (1.13 MB)
MP4
07  Compliance Frameworks.mp4 (4.08 MB)
MP4
09  PCI-DSS.mp4 (1.55 MB)
MP4
10  Enterprise Security Framework (ESF).mp4 (2.17 MB)
MP4
11  NIST SP 800-53 and ISO 27001.mp4 (7.92 MB)
MP4
12  Cloud Security Alliance (CSA).mp4 (2.18 MB)
MP4
13  SSAE 18, SOC 1, 2, and 3.mp4 (5.08 MB)
MP4
15  Systems Hardening.mp4 (4.15 MB)
MP4
16  Vendor and Control Diversity.mp4 (2.34 MB)
MP4
17  Module Review.mp4 (516.01 KB)
MP4
01  Module Overview.mp4 (1.32 MB)
MP4
02  Importance of Policies in Reducing Risk.mp4 (792.11 KB)
MP4
03  Job Rotation.mp4 (2.81 MB)
MP4
04  Mandatory Vacations.mp4 (1.2 MB)
MP4
05  Separation of Duties.mp4 (997.25 KB)
MP4
06  Least Privilege.mp4 (1.21 MB)
MP4
07  Clean Desk Policies.mp4 (1.87 MB)
MP4
08  Background Checks, NDAs, and Role-based Awareness Training.mp4 (3.15 MB)
MP4
09  Use Cases for Monitoring.mp4 (3.4 MB)
MP4
10  Things Typically Monitored.mp4 (2.38 MB)
MP4
11  Balancing Whats Reasonable.mp4 (1.2 MB)
MP4
12  New Tools Are Constantly Developed.mp4 (2.02 MB)
MP4
13  Monitoring Social Media.mp4 (1.31 MB)
MP4
14  Employee Protections.mp4 (1.25 MB)
MP4
15  Onboarding  Offboarding.mp4 (1.28 MB)
MP4
16  Culture and Creating a Culture of Security.mp4 (3.14 MB)
MP4
17  Setting the Stage.mp4 (1.42 MB)
MP4
18  Awareness Training.mp4 (2.1 MB)
MP4
19  Skills Training.mp4 (3.14 MB)
MP4
20  Funding and Executive Buy-in.mp4 (2.43 MB)
MP4
21  Continuous Improvement.mp4 (1.21 MB)
MP4
22  Wired Brain Coffees Approach to Training.mp4 (2.92 MB)
MP4
23  Technology Diversity.mp4 (1.18 MB)
MP4
24  Vendor Diversity.mp4 (2.14 MB)
MP4
25  Service-level Agreement (SLA).mp4 (1018.07 KB)
MP4
27  Business Partner Agreement (BPA).mp4 (886.86 KB)
MP4
28  EOL  EOS.mp4 (2.97 MB)
MP4
29  Data Retention.mp4 (1.69 MB)
MP4
30  User Account.mp4 (1.18 MB)
MP4
31  Shared, Generic, Guest, and Service Accounts.mp4 (2.94 MB)
MP4
32  Privileged Accounts.mp4 (1.76 MB)
MP4
33  Change Management.mp4 (3.2 MB)
MP4
34  Asset Management.mp4 (2.27 MB)
MP4
01  Module Overview.mp4 (1.07 MB)
MP4
02  Risk  Types.mp4 (3.33 MB)
MP4
03  Managing Risk.mp4 (1.19 MB)
MP4
04  Risk Management Defined.mp4 (2.3 MB)
MP4
05  Risk Management Concepts.mp4 (5.52 MB)
MP4
06  Strategic Options.mp4 (3.18 MB)
MP4
07  Risk Register, Risk Matrix, and Heat Map.mp4 (1.63 MB)
MP4
08  Risk Control Self-assessment (RCSA).mp4 (3.91 MB)
MP4
09  Risk Awareness (Inherent, Residual, Control, and Risk Appetite).mp4 (2.06 MB)
MP4
10  Regulatory Examples.mp4 (1.15 MB)
MP4
11  Gramm-Leach-Bliley Act (GLBA).mp4 (2.46 MB)
MP4
12  HIPAA.mp4 (2.38 MB)
MP4
13  HITECH Act.mp4 (3.83 MB)
MP4
14  Sarbanes-Oxley Act (SOX).mp4 (6.68 MB)
MP4
15  GDPR.mp4 (1.74 MB)
MP4
16  Qualitative and Quantitative Analysis.mp4 (4.79 MB)
MP4
17  Risk Calculation.mp4 (2.09 MB)
MP4
18  Likelihood of Threat.mp4 (1.76 MB)
MP4
19  Impact of Threat.mp4 (1.08 MB)
MP4
20  Loss Calculation Terms (ALE, SLE, and ARO).mp4 (4.87 MB)
MP4
21  Threat Assessment (Disaster).mp4 (2.75 MB)
MP4
22  Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).mp4 (2.3 MB)
MP4
23  Business Impact Analysis - Key Terminology.mp4 (9.13 MB)
MP4
24  Mission Essential Functions.mp4 (3.57 MB)
MP4
25  Identification of Critical Systems.mp4 (4.01 MB)
MP4
26  Single Point of Failure (SPOF).mp4 (3.85 MB)
MP4
27  Order of Restoration.mp4 (2.8 MB)
MP4
28  Phased Approach.mp4 (3.64 MB)
MP4
29  Identifying Most Critical Systems First.mp4 (5.08 MB)
MP4
30  Risk Assessment.mp4 (1.88 MB)
MP4
31  Continuity of Operations.mp4 (1.72 MB)
MP4
32  IT Contingency Planning.mp4 (5.15 MB)
MP4
01  Module Overview.mp4 (1.31 MB)
MP4
02  Company Obligations to Protect Security.mp4 (2.25 MB)
MP4
03  Potential Damages from Mishandled Data.mp4 (2.11 MB)
MP4
04  Incident Notification and Escalation.mp4 (3.38 MB)
MP4
05  Notifying Outside Agencies.mp4 (2.51 MB)
MP4
06  Data Classification.mp4 (5.08 MB)
MP4
07  Privacy-enhancing Technologies, Data Masking, and Tokenization.mp4 (2.52 MB)
MP4
08  Anonymization and Pseudo-anonymization.mp4 (2.52 MB)
MP4
09  Data Owner.mp4 (1 MB)
MP4
10  Data Controller and Processor.mp4 (578.02 KB)
MP4
11  Data Steward  Custodian.mp4 (2.29 MB)
MP4
12  Privacy Officer.mp4 (851.66 KB)
MP4
13  Information Lifecycle.mp4 (2.89 MB)
MP4
14  Privacy Impact Assessment.mp4 (3.16 MB)
MP4
15  Terms of Agreement and Privacy Notice.mp4 (3.19 MB)
MP4
1  Course Overview.mp4 (3.71 MB)
MP4
1  Module Overview.mp4 (1.42 MB)
MP4
2  Goals of the Module.mp4 (2.37 MB)
MP4
3  Threat Types.mp4 (1.27 MB)
MP4
4  Types of Access Control (Managerial, Operational, and Physical).mp4 (1.73 MB)
MP4
5  Deterrent.mp4 (746.28 KB)
MP4
6  Preventive.mp4 (847.79 KB)
MP4
7  Detective.mp4 (933.23 KB)
MP4
8  Corrective  Recovery and Compensating.mp4 (2.63 MB)
MP4
9  Module Review.mp4 (614.7 KB)
MP4
1  Module Overview and Domains.mp4 (4.51 MB)
MP4
2  Passing the Exam - Whats Next.mp4 (2.31 MB)
MP4
3  Example Certifications.mp4 (1.86 MB)
MP4
4  Security+ Exam Format.mp4 (3.44 MB)
MP4
5  Registering for an Exam.mp4 (1.87 MB)
MP4
6  Exam Lifecycle.mp4 (1.59 MB)
MP4
7  Prerequisite Experience.mp4 (2.67 MB)
MP4
1  Module Intro and Study Tips.mp4 (5.85 MB)
MP4
2  Exam Tips.mp4 (2.36 MB)
MP4
3  Key Areas to Focus On.mp4 (1.92 MB)
MP4
4  Objectives Study Guide.mp4 (5.8 MB)
MP4

https://thumbs2.imgbox.com/05/cc/8JgSjGGC_t.jpg

https://img87.pixhost.to/images/1010/363506399_rg.png
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z01

Код:
https://rapidgator.net/file/93a6f5194de97497657d0471a077d7df/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z01

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z02

Код:
https://rapidgator.net/file/a229fe5ed91742c4903dfd31ef2aa789/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z02

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z03

Код:
https://rapidgator.net/file/e9c4ae8d7201c14b9893889a42c5d9d1/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z03

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z04

Код:
https://rapidgator.net/file/8d7f9cb3fa3a54a5c994c1bed3fdfec3/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z04

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z05

Код:
https://rapidgator.net/file/9b0f626[цензура]39f6177dba38ef17438c6e/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z05

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).zip

Код:
https://rapidgator.net/file/da8d70cd6335a60557f052de2c159366/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.zip

https://img87.pixhost.to/images/1103/364146951_nitroflare.jpg
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z01

Код:
https://nitroflare.com/view/364E795BA5A7BA3/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z01

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z02

Код:
https://nitroflare.com/view/2203EB1213E4872/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z02

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z03

Код:
https://nitroflare.com/view/8E5C63E968D152E/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z03

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z04

Код:
https://nitroflare.com/view/67F697259CE73E4/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z04

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z05

Код:
https://nitroflare.com/view/1E08FF5CDC8131C/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z05

Pluralsight - Learning Path - CompTIA Security+ (SY0-601).zip

Код:
https://nitroflare.com/view/7493EEC5BF46DA7/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.zip