Pluralsight - Learning Path - CompTIA Security+ (SY0-601)
Language: English | Size:2.56 GB
Genre:eLearning
Files Included :
01 Module Overview.mp4 (3.01 MB)
MP4
02 What Is Social Engineering.mp4 (3.05 MB)
MP4
03 Phishing.mp4 (6.36 MB)
MP4
04 Types of Phishing.mp4 (5.76 MB)
MP4
05 Vishing.mp4 (4.78 MB)
MP4
06 SPAM.mp4 (4.65 MB)
MP4
07 Dumpter Diving.mp4 (1.87 MB)
MP4
08 Shoulder Surfing.mp4 (4.85 MB)
MP4
09 Pharming.mp4 (4.29 MB)
MP4
10 Tailgating.mp4 (5.85 MB)
MP4
11 Hoaxes.mp4 (6.29 MB)
MP4
12 Prepending.mp4 (3.15 MB)
MP4
13 Impersonation.mp4 (1.85 MB)
MP4
14 Identity Fraud.mp4 (2.58 MB)
MP4
15 Invoice Scam.mp4 (4.61 MB)
MP4
16 Credential Harvesting.mp4 (4.53 MB)
MP4
17 Watering Hole Attack.mp4 (4.97 MB)
MP4
18 Typo Squatting URL Hijacking.mp4 (3.49 MB)
MP4
19 Hybrid Warfare.mp4 (4.45 MB)
MP4
20 Social Media and Influence Campaigns.mp4 (2.02 MB)
MP4
21 Reasons for Effectiveness - Authority and Intimidation.mp4 (3.06 MB)
MP4
22 Consensus and Social Proof.mp4 (1.5 MB)
MP4
23 Familiarity Liking.mp4 (1.19 MB)
MP4
24 Trust.mp4 (1.15 MB)
MP4
25 Scarcity Urgency.mp4 (933.82 KB)
MP4
26 Module Review.mp4 (1.45 MB)
MP4
01 Module Overview.mp4 (1.09 MB)
MP4
02 Indicators of Compromise (IOC).mp4 (4.05 MB)
MP4
03 Virus.mp4 (4 MB)
MP4
04 Crypto-malware Ransomware.mp4 (5.98 MB)
MP4
05 Trojan.mp4 (7.07 MB)
MP4
06 Worms.mp4 (1.4 MB)
MP4
07 Potentially Unwanted Programs (PUP).mp4 (2.72 MB)
MP4
08 Fileless Virus.mp4 (3.66 MB)
MP4
09 Botnets.mp4 (4.69 MB)
MP4
10 Logic Bomb.mp4 (1.64 MB)
MP4
11 Spyware.mp4 (2.47 MB)
MP4
12 Keylogger.mp4 (1.53 MB)
MP4
13 Rootkits.mp4 (2.24 MB)
MP4
14 Backdoors.mp4 (2.02 MB)
MP4
15 Spraying.mp4 (3.05 MB)
MP4
16 Brute Force and Dictionary Attacks.mp4 (5.15 MB)
MP4
17 Rainbow Tables.mp4 (3.37 MB)
MP4
18 Known Plain Text Ciphertext.mp4 (1.72 MB)
MP4
19 Birthday Attack.mp4 (4.76 MB)
MP4
20 Downgrade Attack.mp4 (1.85 MB)
MP4
21 Physical Attacks, Malicious USB, and Skimming.mp4 (6.25 MB)
MP4
22 Adversarial Artificial Intelligence (AI).mp4 (3.46 MB)
MP4
23 Supply Chain Attacks.mp4 (3.74 MB)
MP4
24 Supply Chain Attack Example.mp4 (2.59 MB)
MP4
25 Cloud-Based vs On-prem Attacks.mp4 (7.11 MB)
MP4
26 Module Review.mp4 (803.38 KB)
MP4
01 Module Overview.mp4 (972.08 KB)
MP4
02 Privilege Escalation.mp4 (4.31 MB)
MP4
03 Cross Site Scripting (XSS).mp4 (6.69 MB)
MP4
04 SQL Injection.mp4 (2.51 MB)
MP4
05 DLL Injection.mp4 (7.07 MB)
MP4
06 LDAP Injection.mp4 (1.21 MB)
MP4
07 XML Injection.mp4 (1.8 MB)
MP4
08 Pointer Dereference.mp4 (2.76 MB)
MP4
09 Directory Traversal Command Injection.mp4 (3.11 MB)
MP4
10 Buffer Overflow.mp4 (2.84 MB)
MP4
11 Race Conditions.mp4 (3.39 MB)
MP4
12 Time of Check.mp4 (2.28 MB)
MP4
13 Secure Coding Concepts, Error Handling, and Input Validation.mp4 (6.96 MB)
MP4
14 Replay Attacks.mp4 (2.15 MB)
MP4
15 Integer Overflow.mp4 (2.4 MB)
MP4
16 Cross Site Request Forgery (XSRF).mp4 (4.38 MB)
MP4
17 API Attacks.mp4 (3.28 MB)
MP4
18 Resource Exhaustion.mp4 (4.1 MB)
MP4
19 Memory Leak.mp4 (3.01 MB)
MP4
20 SSL Stripping.mp4 (3.07 MB)
MP4
21 Shimming.mp4 (1.71 MB)
MP4
22 Refactoring.mp4 (1.41 MB)
MP4
23 Pass the Hash.mp4 (4.2 MB)
MP4
24 Module Review.mp4 (641.12 KB)
MP4
01 Module Overview.mp4 (1.28 MB)
MP4
02 Rogue Access Points and Evil Twin.mp4 (5.14 MB)
MP4
03 Bluejack and Bluesnarfing.mp4 (5.45 MB)
MP4
04 Dissociation.mp4 (2.67 MB)
MP4
05 Jamming.mp4 (1.65 MB)
MP4
06 RFID.mp4 (2.18 MB)
MP4
07 Near Field Communication (NFC).mp4 (2.91 MB)
MP4
08 IV Attack.mp4 (4.85 MB)
MP4
09 On-path Attacks (Formerly MiTM).mp4 (1.99 MB)
MP4
10 On-path Attacks (Formerly MiTB).mp4 (4.09 MB)
MP4
11 ARP Poisoning.mp4 (2.59 MB)
MP4
12 IPMAC Spoofing.mp4 (1.61 MB)
MP4
13 MAC Flooding.mp4 (3.58 MB)
MP4
14 MAC Cloning.mp4 (3 MB)
MP4
15 DNS Poisoning.mp4 (1.86 MB)
MP4
16 Typo Squatting URL Hijacking.mp4 (3.5 MB)
MP4
17 Distributed Denial of Service (DDoS).mp4 (4.27 MB)
MP4
18 Smurf Attack (Amplification).mp4 (5.26 MB)
MP4
19 DDoS Attack Vectors.mp4 (1.93 MB)
MP4
20 Malicious Code Execution.mp4 (2.97 MB)
MP4
01 Module Review.mp4 (1.83 MB)
MP4
02 Script Kiddies.mp4 (1.69 MB)
MP4
03 Hacktivists.mp4 (1.63 MB)
MP4
04 Organized Crime.mp4 (2.09 MB)
MP4
05 Nation States APT.mp4 (2.13 MB)
MP4
06 Insiders.mp4 (2.57 MB)
MP4
07 Competitors.mp4 (2.09 MB)
MP4
08 Threat Actor Attributes.mp4 (1.35 MB)
MP4
09 Attack Vectors.mp4 (12.61 MB)
MP4
10 Use of Open Source Intelligence.mp4 (7 MB)
MP4
11 Closed Proprietary Intelligence.mp4 (1.36 MB)
MP4
12 Vulnerability Databases.mp4 (2.44 MB)
MP4
13 Public and Private Information Sharing.mp4 (1.94 MB)
MP4
14 Dark Web.mp4 (3.95 MB)
MP4
15 Indicators of Compromise (IOC).mp4 (3.01 MB)
MP4
16 Automate Indicator Sharing (AIS).mp4 (2.48 MB)
MP4
17 TAXII Layout.mp4 (1.65 MB)
MP4
18 MITRE.mp4 (6.18 MB)
MP4
19 Gathering and Correlating Information.mp4 (3.57 MB)
MP4
20 Predictive Analysis.mp4 (2.01 MB)
MP4
21 Threat Maps.mp4 (1.37 MB)
MP4
22 Live Cyber Threat Map.mp4 (3.85 MB)
MP4
23 File Code Repositories.mp4 (2.56 MB)
MP4
24 Research Sources.mp4 (7.41 MB)
MP4
01 Module Overview.mp4 (1.22 MB)
MP4
02 Cloud-based vs On-premise.mp4 (4.14 MB)
MP4
03 New Threats Zero Days.mp4 (2.85 MB)
MP4
04 Mis-configuration Weak Configuration.mp4 (2.31 MB)
MP4
05 Shared Accounts (Improperly Configured).mp4 (2.31 MB)
MP4
06 Weak Configuration Considerations.mp4 (3.13 MB)
MP4
07 Weak Cipher Suites and Implementations.mp4 (2.97 MB)
MP4
08 Improper Certificate and Key Management.mp4 (2.56 MB)
MP4
09 Secure Protocols.mp4 (5.51 MB)
MP4
10 Default Configurations.mp4 (2.33 MB)
MP4
11 Third-party Risks.mp4 (3.76 MB)
MP4
12 Vendor Management.mp4 (4.99 MB)
MP4
13 Vulnerable Business Processes.mp4 (4.36 MB)
MP4
14 Outsourced Code Mangement.mp4 (1.57 MB)
MP4
15 Improper or Weak Patch Management.mp4 (3.37 MB)
MP4
16 Legacy Platforms.mp4 (2.7 MB)
MP4
17 Impact Areas.mp4 (1.8 MB)
MP4
18 Effects of Impacts.mp4 (2.5 MB)
MP4
01 Module Overview.mp4 (1.39 MB)
MP4
02 Specific Types of Threats.mp4 (1.04 MB)
MP4
03 What Is Cyber Threat Intelligence.mp4 (2.39 MB)
MP4
04 Importance of Cyber Threat Intelligence.mp4 (1.35 MB)
MP4
05 Threat Intelligence Classification.mp4 (2.49 MB)
MP4
06 Strategic, Operational, and Tactical Intelligence.mp4 (2.62 MB)
MP4
07 Gathering and Correlating Information.mp4 (3.72 MB)
MP4
08 Stages of Risk Management.mp4 (4.73 MB)
MP4
09 Risk Management Data Sources.mp4 (4.31 MB)
MP4
10 Vulnerability Scanning.mp4 (1.26 MB)
MP4
11 False Positive.mp4 (1.69 MB)
MP4
12 False Positive Audits.mp4 (1.25 MB)
MP4
13 False Negatives.mp4 (1.23 MB)
MP4
14 Intrusive vs Non-intrusive.mp4 (971.06 KB)
MP4
15 Passively Test Security Controls.mp4 (946.72 KB)
MP4
16 Credentialed vs Non-credentialed.mp4 (4.62 MB)
MP4
17 Identify Vulnerabilities and Lack of Security Controls.mp4 (2.86 MB)
MP4
18 Identify Common Misconfigurations.mp4 (3.05 MB)
MP4
19 Things to Remember.mp4 (3.96 MB)
MP4
20 Common Vulnerabilities and Exposures (CVE).mp4 (8.21 MB)
MP4
21 CVSS.mp4 (4.71 MB)
MP4
22 Security Information and Event Management (SEIM).mp4 (4.35 MB)
MP4
23 Security Orchestration, Automation, and Response.mp4 (2.79 MB)
MP4
01 Module Intro.mp4 (874.88 KB)
MP4
02 Penetration Testing.mp4 (1.82 MB)
MP4
03 Penetration Testing Steps.mp4 (3.09 MB)
MP4
04 Known, Unknown, and Partially Known Environments.mp4 (1.51 MB)
MP4
05 Rules of Engagement.mp4 (3.15 MB)
MP4
06 Lateral Movement.mp4 (1.7 MB)
MP4
07 Escalation of Privilege.mp4 (1.07 MB)
MP4
09 Persistence.mp4 (757.99 KB)
MP4
10 Cleanup.mp4 (1.72 MB)
MP4
11 Bug Bounty.mp4 (3.91 MB)
MP4
12 Pivoting.mp4 (3.37 MB)
MP4
13 Types of Reconnaissance.mp4 (4.61 MB)
MP4
14 War Flying.mp4 (2.75 MB)
MP4
15 War Driving.mp4 (2.17 MB)
MP4
16 Red, Blue, Purple, and White Security Teams.mp4 (3.13 MB)
MP4
17 Module Review.mp4 (1.34 MB)
MP4
1 Course Overview.mp4 (3.71 MB)
MP4
01 Module Intro.mp4 (3.08 MB)
MP4
02 Configuration Management.mp4 (7.5 MB)
MP4
03 Diagrams.mp4 (4.51 MB)
MP4
04 Baseline Configuration.mp4 (3.66 MB)
MP4
05 IP Address Schema.mp4 (3.74 MB)
MP4
06 Data Sovereignty.mp4 (2.47 MB)
MP4
07 Data Loss Prevention (DLP).mp4 (3.8 MB)
MP4
08 Types of Data to Secure.mp4 (2.38 MB)
MP4
09 Data Masking.mp4 (5.93 MB)
MP4
10 Tokenization.mp4 (4.77 MB)
MP4
11 Digital Rights Management (DRM).mp4 (1.52 MB)
MP4
12 Hardware Based Encryption (TPM and HSM).mp4 (2.94 MB)
MP4
13 Geographical Considerations.mp4 (2.93 MB)
MP4
14 Cloud Access Security Broker (CASB).mp4 (2.09 MB)
MP4
15 Security-as-a-Service (SECaaS).mp4 (1.96 MB)
MP4
16 Differences between CASB and SECaaS.mp4 (2.15 MB)
MP4
17 Recovery.mp4 (2.56 MB)
MP4
18 Secure Protocols and SSLTLS Inspection.mp4 (3.11 MB)
MP4
19 Hashing.mp4 (3.27 MB)
MP4
20 API Considerations and API Gateways.mp4 (4.89 MB)
MP4
21 Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).mp4 (5.11 MB)
MP4
22 Disaster Area Example.mp4 (3.1 MB)
MP4
23 Honeypots and Honeyfiles.mp4 (2.13 MB)
MP4
24 Honeynets.mp4 (1.97 MB)
MP4
25 Fake Telemetry.mp4 (2.18 MB)
MP4
26 DNS Sinkhole.mp4 (5.31 MB)
MP4
01 Module Intro.mp4 (1.3 MB)
MP4
02 Cloud Storage.mp4 (3.38 MB)
MP4
03 Cloud Computing.mp4 (1.97 MB)
MP4
04 [X] as a Service.mp4 (1.03 MB)
MP4
05 Infrastructure as a Service (IaaS).mp4 (3.05 MB)
MP4
06 IaaS and Automation.mp4 (2.74 MB)
MP4
07 Platform as a Service (PaaS).mp4 (3.31 MB)
MP4
08 Software as a Service (SaaS).mp4 (1.96 MB)
MP4
09 IaaS, PaaS, and SaaS Differentiators.mp4 (2.02 MB)
MP4
10 Types of Clouds.mp4 (1.53 MB)
MP4
11 Managed Service Providers (MSP).mp4 (7.55 MB)
MP4
12 Fog Computing.mp4 (4.79 MB)
MP4
13 Edge Computing.mp4 (977.26 KB)
MP4
14 VDI.mp4 (7.53 MB)
MP4
15 Virtualization.mp4 (7.89 MB)
MP4
16 Containers.mp4 (9.72 MB)
MP4
17 Microservices and APIs.mp4 (6.43 MB)
MP4
18 Infrastructure as Code (IAC).mp4 (1.39 MB)
MP4
19 Software Defined Networking (SDN).mp4 (2.02 MB)
MP4
20 Software Defined Visibility (SDV).mp4 (1.57 MB)
MP4
21 Serverless Architecture.mp4 (4.8 MB)
MP4
22 IaaS, PaaS, FaaS, and SaaS Differentiators.mp4 (1.92 MB)
MP4
23 Service Integrations and Resource Policies.mp4 (2.47 MB)
MP4
24 Transit Gateway.mp4 (1.37 MB)
MP4
25 VM Sprawl Avoidance.mp4 (3.38 MB)
MP4
26 VM Escape.mp4 (2.42 MB)
MP4
27 Module Review.mp4 (777.87 KB)
MP4
01 Module Intro.mp4 (1.58 MB)
MP4
02 Environments (Dev, Test, Staging, and Production).mp4 (5.66 MB)
MP4
03 Environment Example.mp4 (6.16 MB)
MP4
04 Provisioning and Deprovisioning.mp4 (3.62 MB)
MP4
05 Integrity Measurement.mp4 (3.15 MB)
MP4
06 Static Code Analysis.mp4 (3.59 MB)
MP4
07 Secure Coding Techniques.mp4 (14.24 MB)
MP4
08 Security Automation.mp4 (4.25 MB)
MP4
09 Continuous Monitoring and Validation.mp4 (1.98 MB)
MP4
10 Continuous Integration.mp4 (3.02 MB)
MP4
11 Continuous Delivery and Continuous Development.mp4 (3.59 MB)
MP4
12 OWASP.mp4 (940.96 KB)
MP4
13 Software Diversity, Compiler, and Binary.mp4 (2.67 MB)
MP4
14 Elasticity and Scalability.mp4 (1.8 MB)
MP4
15 Version Control.mp4 (4.17 MB)
MP4
01 Module Intro.mp4 (1.38 MB)
MP4
02 Directory Services.mp4 (2.72 MB)
MP4
03 Usernames.mp4 (1.91 MB)
MP4
04 Federation.mp4 (1.82 MB)
MP4
05 Transitive Trust Authentication.mp4 (1.86 MB)
MP4
06 Attestation.mp4 (1.33 MB)
MP4
07 Time-Based One-Time Password (TOTP).mp4 (2.47 MB)
MP4
08 HMAC-Based One-Time Password (HOTP).mp4 (1.4 MB)
MP4
09 SMS Authentication.mp4 (1.95 MB)
MP4
10 Tokens.mp4 (1.91 MB)
MP4
11 Static Codes.mp4 (1.31 MB)
MP4
12 Authentication Applications.mp4 (2 MB)
MP4
13 Push Notifications.mp4 (1.6 MB)
MP4
14 Smart Cards.mp4 (1.54 MB)
MP4
15 Proximity Cards.mp4 (2 MB)
MP4
16 Personal Identification Verification Card (PIV).mp4 (1.77 MB)
MP4
17 Common Access Card.mp4 (1.67 MB)
MP4
18 Biometric Factors.mp4 (1.38 MB)
MP4
19 Facial Recognition.mp4 (2.84 MB)
MP4
20 Vein and Gait Analysis.mp4 (3.65 MB)
MP4
21 Efficacy Rates.mp4 (1.61 MB)
MP4
22 Identification vs Authentication vs Authorization.mp4 (1.99 MB)
MP4
23 Multifactor Authentication.mp4 (1.62 MB)
MP4
24 Authentication Factors.mp4 (3.29 MB)
MP4
25 Authorization.mp4 (1.65 MB)
MP4
26 Authentication Factors.mp4 (1.83 MB)
MP4
27 Authentication, Authorization, and Accounting (AAA).mp4 (1.24 MB)
MP4
28 On-prem vs Cloud Requirements.mp4 (4.37 MB)
MP4
01 Module Intro.mp4 (3.56 MB)
MP4
02 Geographically Disperse.mp4 (1.53 MB)
MP4
03 Geographical Dispersal of Assets.mp4 (2.26 MB)
MP4
04 RAID.mp4 (5.14 MB)
MP4
05 Multipath.mp4 (3.67 MB)
MP4
06 Load Balancer.mp4 (2.27 MB)
MP4
07 Power Resiliency.mp4 (3.82 MB)
MP4
08 Replication.mp4 (4.2 MB)
MP4
09 On-prem vs Cloud.mp4 (3.11 MB)
MP4
10 Backup Plans Policies.mp4 (1.83 MB)
MP4
11 Backup Execution Frequency.mp4 (2.21 MB)
MP4
12 Backup Types.mp4 (5.5 MB)
MP4
13 Backup Environments.mp4 (1.99 MB)
MP4
14 Online vs Offline Backups.mp4 (2.44 MB)
MP4
15 Backups - Distance Considerations.mp4 (3.41 MB)
MP4
16 Non-persistence, Snapshots, and Live Boot Media.mp4 (3.3 MB)
MP4
17 High Availability.mp4 (3.43 MB)
MP4
18 Redundancy.mp4 (2.7 MB)
MP4
19 Fault Tolerant Hardware.mp4 (1.38 MB)
MP4
20 Technology and Vendor Diversity.mp4 (3.88 MB)
MP4
21 Crypto and Control Diversity.mp4 (4.14 MB)
MP4
01 Module Intro.mp4 (1.93 MB)
MP4
02 Module Goal.mp4 (2.01 MB)
MP4
03 Embedded Systems.mp4 (1.77 MB)
MP4
04 Embedded Systems Examples.mp4 (3.3 MB)
MP4
05 SCADA ICS.mp4 (9.42 MB)
MP4
06 SCADA Security Concerns.mp4 (5.47 MB)
MP4
07 Smart Devices IoT.mp4 (4.05 MB)
MP4
08 Smart Devices IoT Weak Defaults.mp4 (1.89 MB)
MP4
09 Special Purpose Devices.mp4 (1.87 MB)
MP4
10 Vehicles.mp4 (2.64 MB)
MP4
11 Voice over IP (VoIP).mp4 (5.09 MB)
MP4
12 HVAC.mp4 (3.83 MB)
MP4
13 AircraftUAV.mp4 (2.94 MB)
MP4
14 PrintersMFDs.mp4 (2.91 MB)
MP4
15 Real Time Operating Systems (RTOS).mp4 (1.42 MB)
MP4
16 Surveillance Systems.mp4 (2.67 MB)
MP4
17 System on a Chip (SoC).mp4 (1.79 MB)
MP4
18 5G Networks and Security Concerns.mp4 (3.03 MB)
MP4
19 Narrow-band and Baseband Radio.mp4 (1.05 MB)
MP4
20 Zigbee.mp4 (4.84 MB)
MP4
21 Constraints.mp4 (4.36 MB)
MP4
01 Module Intro.mp4 (1.37 MB)
MP4
02 Barricades.mp4 (3.54 MB)
MP4
03 Mantraps.mp4 (1.32 MB)
MP4
04 Badges.mp4 (2.84 MB)
MP4
05 Alarms.mp4 (2.53 MB)
MP4
06 Lighting and Signs.mp4 (3.66 MB)
MP4
07 Cameras and Video Surveillance.mp4 (2.89 MB)
MP4
08 Guards.mp4 (1.16 MB)
MP4
09 Robot Sentries.mp4 (2.4 MB)
MP4
10 Reception.mp4 (1.83 MB)
MP4
11 Two Person Integrity (TPI) Control.mp4 (1.58 MB)
MP4
12 Hardware Locks.mp4 (1.15 MB)
MP4
13 Biometrics.mp4 (1.66 MB)
MP4
14 Cable Locks, Safes, and Locking Cabinets.mp4 (1.9 MB)
MP4
15 USB Data Blocker.mp4 (2.1 MB)
MP4
16 Fencing.mp4 (4.35 MB)
MP4
17 Fire Suppression.mp4 (5.97 MB)
MP4
18 Motion Detection Infrared.mp4 (1.42 MB)
MP4
19 Proximity Readers.mp4 (1.99 MB)
MP4
20 Drones UAV.mp4 (1.64 MB)
MP4
21 Logs.mp4 (1.27 MB)
MP4
22 Air Gaps.mp4 (5.56 MB)
MP4
23 Demilitarized Zone (DMZ).mp4 (6.79 MB)
MP4
24 Protected Distribution System (PDS).mp4 (8.03 MB)
MP4
25 Hot and Cold Aisles.mp4 (4.87 MB)
MP4
26 Non-Digital and Digital Data Destruction.mp4 (1.96 MB)
MP4
27 Shredding.mp4 (1.27 MB)
MP4
28 Pulping and Pulverizing.mp4 (2.24 MB)
MP4
29 Deguassing.mp4 (2.94 MB)
MP4
30 Purging.mp4 (2.04 MB)
MP4
31 Wiping.mp4 (4.16 MB)
MP4
32 Module Review.mp4 (823.16 KB)
MP4
01 Module Intro.mp4 (1.26 MB)
MP4
02 Why You Should Care.mp4 (1.42 MB)
MP4
03 Cryptographic Terminology and History.mp4 (5.8 MB)
MP4
04 Vigenere Table.mp4 (10.21 MB)
MP4
05 Digital Signatures.mp4 (2.52 MB)
MP4
06 Key Stretching.mp4 (6.04 MB)
MP4
07 Hashing.mp4 (4.4 MB)
MP4
08 In-band vs Out-of-band Key Exchange.mp4 (2.58 MB)
MP4
09 Elliptic Curve Cryptography (ECC).mp4 (1.91 MB)
MP4
10 Perfect Forward Secrecy.mp4 (2.67 MB)
MP4
11 Quantum Communications.mp4 (8.3 MB)
MP4
12 Quantum Computing.mp4 (2.48 MB)
MP4
13 Post Quantum.mp4 (1.7 MB)
MP4
14 Ephemeral Key.mp4 (1.63 MB)
MP4
15 Cipher Modes.mp4 (1.1 MB)
MP4
16 XOR Function.mp4 (2.25 MB)
MP4
17 Cryptographic Methods and Design.mp4 (6.71 MB)
MP4
18 Blockchain.mp4 (7.78 MB)
MP4
19 Fundamental Differences and Encryption Methods.mp4 (4.85 MB)
MP4
20 Session Keys.mp4 (1.57 MB)
MP4
21 Asymmetric Encryption.mp4 (7.71 MB)
MP4
22 Lightweight Encryption.mp4 (1.76 MB)
MP4
23 Steganography.mp4 (4.47 MB)
MP4
24 Homomorphic Encryption.mp4 (3.35 MB)
MP4
25 Common Use Cases.mp4 (5.98 MB)
MP4
26 Cipher Suites.mp4 (2.5 MB)
MP4
27 Limitations.mp4 (3 MB)
MP4
28 Random and Pseudorandom Number Generators (PRNG).mp4 (3.54 MB)
MP4
29 Quantum Random Number Generators (QRNG).mp4 (1.53 MB)
MP4
1 Course Overview.mp4 (3.94 MB)
MP4
01 Module Intro.mp4 (1.35 MB)
MP4
02 Networking Protocols and TCP Three-way Handshake.mp4 (6.34 MB)
MP4
03 DNSSEC.mp4 (7.01 MB)
MP4
04 SSH.mp4 (1.94 MB)
MP4
05 SMIME.mp4 (1.8 MB)
MP4
06 Secure Real-Time Transport Protocol (SRTP).mp4 (1.19 MB)
MP4
07 Lightweight Directory Access Protocol over SSL (LDAPS).mp4 (1.64 MB)
MP4
08 FTPS and SFTP.mp4 (2.32 MB)
MP4
09 SNMP v3.mp4 (1.76 MB)
MP4
10 SSLTLS.mp4 (1.85 MB)
MP4
11 HTTPS.mp4 (2.5 MB)
MP4
12 Secure POPIMAP.mp4 (4.9 MB)
MP4
13 Use Cases.mp4 (5.46 MB)
MP4
14 Module Review.mp4 (1.43 MB)
MP4
01 Module Overview.mp4 (1.3 MB)
MP4
02 Antivirus.mp4 (2.35 MB)
MP4
03 Endpoint Detection and Response (EDR).mp4 (3.16 MB)
MP4
04 Data Loss Prevention (DLP).mp4 (3.76 MB)
MP4
05 Next-generation Firewall (NGFW).mp4 (2.9 MB)
MP4
06 HIDSHIPS.mp4 (1.51 MB)
MP4
07 Host-based Firewall.mp4 (2.53 MB)
MP4
08 Boot Loader Protections and Secure Boot.mp4 (4.96 MB)
MP4
09 Measured Launch.mp4 (1.22 MB)
MP4
10 Integrity Measurement Architecture (IMA).mp4 (749.51 KB)
MP4
11 BIOSUEFI.mp4 (964.31 KB)
MP4
12 Hashing.mp4 (4.38 MB)
MP4
13 Salt.mp4 (1.77 MB)
MP4
14 Secure Coding Techniques.mp4 (14.24 MB)
MP4
15 Code Quality and Testing.mp4 (4.66 MB)
MP4
16 Static Code Analysis.mp4 (3.59 MB)
MP4
17 Fuzzing.mp4 (8.42 MB)
MP4
18 Additional Secure Coding Concepts.mp4 (2.98 MB)
MP4
19 Peripherals Security.mp4 (3.46 MB)
MP4
20 Hardening the Environment.mp4 (4.1 MB)
MP4
21 Common Ports.mp4 (2.45 MB)
MP4
22 Registry Hardening.mp4 (2.51 MB)
MP4
23 Self-encrypting Drives (SED).mp4 (3.82 MB)
MP4
24 Hardware Root of Trust.mp4 (2.28 MB)
MP4
25 Hardware Based Encryption.mp4 (4.83 MB)
MP4
26 Sandboxing.mp4 (4.92 MB)
MP4
01 Module Overview.mp4 (1.37 MB)
MP4
02 Load Balancers.mp4 (6.45 MB)
MP4
03 Security Segmentation Models.mp4 (4.21 MB)
MP4
04 Virtualization.mp4 (2.29 MB)
MP4
05 Air Gaps.mp4 (3.65 MB)
MP4
06 East-west Traffic.mp4 (3.26 MB)
MP4
07 Zero Trust.mp4 (3.04 MB)
MP4
08 VPN.mp4 (6.95 MB)
MP4
09 Split Tunnel.mp4 (1.65 MB)
MP4
10 IPSec and Transport Encryption.mp4 (2.18 MB)
MP4
11 VPN Concentrator.mp4 (2.16 MB)
MP4
12 DNSSEC.mp4 (7.09 MB)
MP4
13 Network Access Control (NAC).mp4 (4.05 MB)
MP4
14 In-band vs Out-of-band Management.mp4 (7.83 MB)
MP4
15 Port Security and 802 1x.mp4 (7.45 MB)
MP4
16 Loop Protection and Flood Guards.mp4 (3.03 MB)
MP4
17 Spanning Tree Protocol (STP).mp4 (5 MB)
MP4
18 DHCP Snooping.mp4 (1.89 MB)
MP4
19 MAC Filtering.mp4 (4.4 MB)
MP4
20 Module Review.mp4 (615.53 KB)
MP4
01 Module Overview.mp4 (1.39 MB)
MP4
02 Jump Server.mp4 (3.45 MB)
MP4
03 Proxies.mp4 (5.87 MB)
MP4
04 Web Security Gateways.mp4 (2.78 MB)
MP4
05 Intrusion Detection and Prevention.mp4 (9.11 MB)
MP4
06 IDSIPS Component Workflow.mp4 (2.13 MB)
MP4
07 Four Approaches to IDS.mp4 (2.72 MB)
MP4
08 Network-based IDS.mp4 (3.71 MB)
MP4
09 Security Device Placement.mp4 (3.99 MB)
MP4
10 Firewalls.mp4 (12.08 MB)
MP4
11 Web Application Firewalls.mp4 (3.98 MB)
MP4
12 Unified Threat Management (UTM).mp4 (1.57 MB)
MP4
13 Content Filters.mp4 (2.09 MB)
MP4
14 Implicit Deny and ACLs.mp4 (1001.55 KB)
MP4
15 Route Security.mp4 (2.77 MB)
MP4
16 Quality of Service (QoS).mp4 (3.03 MB)
MP4
17 Implications of IPv6.mp4 (4.3 MB)
MP4
18 Port Mirroring, Port Spanning, and Port Taps.mp4 (6.52 MB)
MP4
20 Module Review.mp4 (667.92 KB)
MP4
01 Module Review.mp4 (1.22 MB)
MP4
02 Wireless Definitions.mp4 (3.27 MB)
MP4
03 WEPWPAWPA2.mp4 (2.42 MB)
MP4
04 WPA and WPA2 Security.mp4 (6.74 MB)
MP4
05 WPA3.mp4 (8.42 MB)
MP4
06 Wireless Security Examples.mp4 (4.09 MB)
MP4
07 Wireless Security and Pen Testing Tools.mp4 (5.03 MB)
MP4
08 EAP, PEAP, and LEAP.mp4 (3.73 MB)
MP4
09 802 11x Wireless Protocols.mp4 (4.96 MB)
MP4
10 RADIUS Federation.mp4 (742.83 KB)
MP4
11 Wi-Fi Protected Setup (WPS).mp4 (1.73 MB)
MP4
12 Captive Portal.mp4 (3.93 MB)
MP4
13 Installation Considerations.mp4 (2.06 MB)
MP4
14 Access PointsWi-Fi Security.mp4 (6.16 MB)
MP4
15 Band SelectionWidth.mp4 (3.51 MB)
MP4
16 Fat vs Thin Access Points and Stand-alone vs Controller-based.mp4 (5.79 MB)
MP4
17 Module Review.mp4 (593.17 KB)
MP4
01 Module Overview.mp4 (1.07 MB)
MP4
02 Cellular.mp4 (10.78 MB)
MP4
03 Securing Wi-Fi.mp4 (3.18 MB)
MP4
04 Near Field Communication (NFC).mp4 (2.15 MB)
MP4
05 Additional Areas of Concern.mp4 (4.96 MB)
MP4
06 MicroSD HSM.mp4 (1.47 MB)
MP4
07 Mobile Device Management (MDM, MAM, and UEM).mp4 (2.21 MB)
MP4
08 SEAndroid.mp4 (2.58 MB)
MP4
09 Device Security.mp4 (6.61 MB)
MP4
10 Application Security and Key Credential Management.mp4 (4.05 MB)
MP4
11 Authentication.mp4 (2.7 MB)
MP4
12 Geo-tagging.mp4 (2.61 MB)
MP4
13 Context-aware Authentication.mp4 (4.28 MB)
MP4
14 Enforcement and Monitoring.mp4 (7.25 MB)
MP4
15 BYOD Concerns and Deployment Models.mp4 (6.01 MB)
MP4
16 Additional BYOD Concerns.mp4 (4.24 MB)
MP4
17 Module Review.mp4 (598.32 KB)
MP4
01 Module Intro.mp4 (1.15 MB)
MP4
02 High Availability.mp4 (4.49 MB)
MP4
03 Resource Policies.mp4 (2.25 MB)
MP4
04 Secrets Management.mp4 (4.89 MB)
MP4
05 Storage in the Cloud.mp4 (4.44 MB)
MP4
06 Virtual Networks.mp4 (6.35 MB)
MP4
07 API Inspection and Integration.mp4 (2.31 MB)
MP4
08 Growth of Enterprise Cloud Application.mp4 (1.85 MB)
MP4
09 Cyber Kill Chain in the Cloud.mp4 (8.31 MB)
MP4
10 Compute in the Cloud.mp4 (5.78 MB)
MP4
11 Cloud Access Security Broker (CASB).mp4 (1.69 MB)
MP4
12 Application Security.mp4 (1.73 MB)
MP4
13 Next-gen Secure Web Gateway (NG-SWG).mp4 (1.22 MB)
MP4
14 Firewall Considerations in a Cloud Environment.mp4 (3.97 MB)
MP4
15 TCPIP and OSI Models.mp4 (1.22 MB)
MP4
16 Application Layer, Protocol Layer, and Volumetric Attacks.mp4 (3.85 MB)
MP4
17 Cost.mp4 (2.02 MB)
MP4
18 Cloud Native Controls vs Third-party Solutions.mp4 (5.44 MB)
MP4
01 Module Review.mp4 (890.2 KB)
MP4
02 Identity Provider (IdP).mp4 (2.8 MB)
MP4
03 IdP Example.mp4 (2.51 MB)
MP4
04 Certificates, Tokens, and SSH Keys.mp4 (3.67 MB)
MP4
05 Certificate Issues.mp4 (4.43 MB)
MP4
06 Smart Cards.mp4 (1.48 MB)
MP4
07 User Accounts.mp4 (1.95 MB)
MP4
08 Account Management.mp4 (3.62 MB)
MP4
09 Password Complexity.mp4 (2.3 MB)
MP4
10 Password History.mp4 (3.52 MB)
MP4
11 Password Reuse.mp4 (1.96 MB)
MP4
12 Time of Day Restrictions.mp4 (1.88 MB)
MP4
13 User Access Best Practices.mp4 (3.69 MB)
MP4
14 Permissions Auditing and Review.mp4 (2.11 MB)
MP4
15 Recertification.mp4 (2.6 MB)
MP4
16 Group Policy.mp4 (3.45 MB)
MP4
17 Expiration.mp4 (3.78 MB)
MP4
18 Recovery.mp4 (2.79 MB)
MP4
19 Impossible TravelRisky Login.mp4 (4.4 MB)
MP4
20 Lockout.mp4 (1.18 MB)
MP4
21 Disablement.mp4 (1.72 MB)
MP4
22 Module Review.mp4 (586.86 KB)
MP4
1 Course Overview.mp4 (3.8 MB)
MP4
01 Module Overview.mp4 (1.38 MB)
MP4
02 Authentication Management.mp4 (5.13 MB)
MP4
03 Extensible Authentication Protocol (EAP).mp4 (1.42 MB)
MP4
04 Challenge Handshake Authentication Protocol (CHAP).mp4 (1.68 MB)
MP4
05 Password Authentication Protocol (PAP).mp4 (1.38 MB)
MP4
06 Port Security and 802 1x Authentication.mp4 (7.96 MB)
MP4
07 RADIUS.mp4 (4.14 MB)
MP4
08 Single Sign-on (SSO).mp4 (8.92 MB)
MP4
09 SAML.mp4 (3.92 MB)
MP4
10 TACACS.mp4 (1.94 MB)
MP4
11 TACACS+.mp4 (4.47 MB)
MP4
12 oAUTH.mp4 (3.25 MB)
MP4
13 OpenID and Shibboleth.mp4 (2.35 MB)
MP4
14 Kerberos.mp4 (6 MB)
MP4
15 Attribute Based Access Control (ABAC).mp4 (5.19 MB)
MP4
16 Rule-basedRole-based Access Control (RBAC).mp4 (3.02 MB)
MP4
17 Access Control Methods.mp4 (1.81 MB)
MP4
18 Mandatory Access Control (MAC).mp4 (1.9 MB)
MP4
19 Discretionary Access Control (DAC).mp4 (1.27 MB)
MP4
20 Conditional Access.mp4 (1.79 MB)
MP4
21 Privileged Accounts.mp4 (1.98 MB)
MP4
22 Filesystem Permissions.mp4 (2.35 MB)
MP4
01 Module Overview.mp4 (1.01 MB)
MP4
02 Certificate Authorities and Digital Certificates.mp4 (1.31 MB)
MP4
03 Certificate Authority.mp4 (3.01 MB)
MP4
04 CRLs.mp4 (2.36 MB)
MP4
05 OCSP.mp4 (2.63 MB)
MP4
06 CSR and PKCS Standards.mp4 (1.82 MB)
MP4
07 PKI.mp4 (8.48 MB)
MP4
08 Public Key.mp4 (1.9 MB)
MP4
09 Private Key.mp4 (976.99 KB)
MP4
10 Object Identifiers (OID).mp4 (3.48 MB)
MP4
11 Types of Certificates.mp4 (6.2 MB)
MP4
12 Certificate Formats.mp4 (1.63 MB)
MP4
13 Online vs Offline Certificate Authority (CA).mp4 (3.47 MB)
MP4
14 Stapling and Pinning.mp4 (1.38 MB)
MP4
15 Trust Models.mp4 (2.88 MB)
MP4
16 Key Escrow.mp4 (2.71 MB)
MP4
17 Certificate Chaining.mp4 (1.52 MB)
MP4
01 Module Overview.mp4 (1.51 MB)
MP4
02 Traceroutetracert.mp4 (2.89 MB)
MP4
03 nslookupdig.mp4 (2.91 MB)
MP4
04 ipconfigifconfig.mp4 (1.31 MB)
MP4
05 nmap and nmap demo.mp4 (6.98 MB)
MP4
06 Ping and Pathping.mp4 (5.52 MB)
MP4
07 hping and hping demo.mp4 (5.28 MB)
MP4
08 Netstat.mp4 (2.38 MB)
MP4
09 netcat.mp4 (3.61 MB)
MP4
10 IP Scanners.mp4 (1.77 MB)
MP4
11 ARP.mp4 (1.27 MB)
MP4
12 Route.mp4 (983.76 KB)
MP4
13 Curl and Curl Demo.mp4 (2.61 MB)
MP4
14 TheHarvester and Demo.mp4 (4.66 MB)
MP4
15 Sn1per and Demo.mp4 (13.75 MB)
MP4
16 Scanless and Demo.mp4 (5.47 MB)
MP4
17 DNSenum.mp4 (1.78 MB)
MP4
18 Nessus and Cuckoo.mp4 (4.82 MB)
MP4
19 File Manipulation (Head, Tail, Cat, GREP and Logger).mp4 (4.48 MB)
MP4
20 CHMOD.mp4 (1.85 MB)
MP4
22 Packet Capture and TCPDump Demo.mp4 (8.46 MB)
MP4
23 Forensics.mp4 (8.75 MB)
MP4
24 Exploitation Frameworks.mp4 (4.29 MB)
MP4
25 Data Sanitization Tools.mp4 (10.41 MB)
MP4
26 Module Review.mp4 (820.66 KB)
MP4
01 Module Intro.mp4 (1.43 MB)
MP4
02 Who Should Watch this Course.mp4 (5.18 MB)
MP4
03 Team Models.mp4 (2.19 MB)
MP4
04 Incident Response Process.mp4 (2.82 MB)
MP4
05 Preparation.mp4 (2.05 MB)
MP4
06 Detection and Analysis.mp4 (6.26 MB)
MP4
07 Stopping the Spread.mp4 (3.44 MB)
MP4
08 Defining Goals and Expected Outcomes.mp4 (7.53 MB)
MP4
09 Test the Plan.mp4 (1.05 MB)
MP4
10 Walkthrough Tests.mp4 (2.77 MB)
MP4
11 Communication Tests.mp4 (2.13 MB)
MP4
12 Simulation (Tabletop) Tests.mp4 (1.49 MB)
MP4
13 Partial Exercise.mp4 (1.58 MB)
MP4
14 Full Exercise.mp4 (1.26 MB)
MP4
15 Overall Cost and Complexity of Testing.mp4 (1.34 MB)
MP4
16 Plan Review and Maintenance.mp4 (4.92 MB)
MP4
17 Review Process Outcomes.mp4 (1.99 MB)
MP4
18 Wired Brain Coffees Testing.mp4 (4.01 MB)
MP4
19 Intelligence Lifecycle.mp4 (810.98 KB)
MP4
20 Threat Intelligence Lifecycle.mp4 (2.25 MB)
MP4
21 Cyberthreat Intelligence Frameworks.mp4 (1.77 MB)
MP4
22 Cyber Kill Chain.mp4 (3.99 MB)
MP4
23 Diamond Model.mp4 (2.99 MB)
MP4
24 MITRE Attack Framework.mp4 (6.25 MB)
MP4
25 Key Points to Remember.mp4 (4.02 MB)
MP4
26 Types of Plans.mp4 (1.13 MB)
MP4
27 Disaster Recovery Plan.mp4 (2.19 MB)
MP4
28 Business Continuity Plan.mp4 (1.68 MB)
MP4
29 Business Resumption Plan.mp4 (1.73 MB)
MP4
30 Incident Management Plan.mp4 (3.05 MB)
MP4
31 Data Retention.mp4 (6.04 MB)
MP4
32 Putting It All Together.mp4 (5.5 MB)
MP4
33 Example Process.mp4 (7.27 MB)
MP4
01 Module Intro.mp4 (1.76 MB)
MP4
02 Filtering Through the Noise.mp4 (7.47 MB)
MP4
03 Vulnerability Scanner Demo.mp4 (10.37 MB)
MP4
04 SIEM.mp4 (6.62 MB)
MP4
05 Log Files.mp4 (6.83 MB)
MP4
06 Log Management, Syslog, Rsyslog, and Syslog-ng.mp4 (6.54 MB)
MP4
07 Journalctl.mp4 (10.13 MB)
MP4
08 NXLOG.mp4 (2.12 MB)
MP4
09 Retention (Auditing, Compliance and Investigations).mp4 (2.77 MB)
MP4
10 Bandwidth Monitors.mp4 (2.2 MB)
MP4
11 Metadata.mp4 (6.14 MB)
MP4
12 Netflow, sFlow, and IPFIX.mp4 (9.22 MB)
MP4
13 Detecting an Amplification Attack (ICMP echo).mp4 (3.99 MB)
MP4
14 Protocol Analyzer Output.mp4 (25.45 MB)
MP4
01 Module Intro.mp4 (1.29 MB)
MP4
02 Application WhitelistingBlacklisting.mp4 (2.1 MB)
MP4
03 Quarantine.mp4 (3.77 MB)
MP4
04 Firewalls.mp4 (8.9 MB)
MP4
05 Demo - Configuring Firewall Rules.mp4 (19.1 MB)
MP4
06 Mobile Device Management.mp4 (9.64 MB)
MP4
07 Using MDM to Locate and Secure and Lost Device.mp4 (2.03 MB)
MP4
09 Segregation, Segmentation and Isolation.mp4 (5.65 MB)
MP4
10 Virtualization.mp4 (2.2 MB)
MP4
11 Air Gaps.mp4 (3.37 MB)
MP4
13 SOAR and RunbooksPlaybooks.mp4 (8.83 MB)
MP4
01 Module Overview.mp4 (1.72 MB)
MP4
02 Computer Forensics.mp4 (3.57 MB)
MP4
03 Order of Volatility.mp4 (8.94 MB)
MP4
04 Chain of Custody.mp4 (5.37 MB)
MP4
05 Legal Hold.mp4 (2.24 MB)
MP4
06 First Responder Best Practices.mp4 (9.58 MB)
MP4
07 Capture a System Image.mp4 (6.52 MB)
MP4
08 Network Traffic and Logs.mp4 (6.31 MB)
MP4
09 Capturing Video.mp4 (1.82 MB)
MP4
10 Record Time Offset.mp4 (4.29 MB)
MP4
11 Taking Hashes.mp4 (3.31 MB)
MP4
12 Screenshots.mp4 (1.62 MB)
MP4
13 Witnesses.mp4 (3.84 MB)
MP4
14 Preservation of Evidence.mp4 (1.86 MB)
MP4
15 Recovery.mp4 (2.33 MB)
MP4
16 Strategic Intelligence Counterintelligence Gathering.mp4 (3 MB)
MP4
17 Data Integrity.mp4 (3.01 MB)
MP4
18 Non-repudiation.mp4 (1.41 MB)
MP4
19 On-prem vs Cloud Challenges and Right to Audit.mp4 (5.79 MB)
MP4
20 Regulatory Jurisdictional Issues.mp4 (4.51 MB)
MP4
21 Data Breach Notification Laws.mp4 (4.1 MB)
MP4
1 Course Overview.mp4 (4.89 MB)
MP4
01 Module Overview.mp4 (1.15 MB)
MP4
02 Privacy and Compliance Challenges.mp4 (9.35 MB)
MP4
03 GDPR and Key Terminology.mp4 (3.03 MB)
MP4
06 GDPR Compliance and Penalties.mp4 (1.13 MB)
MP4
07 Compliance Frameworks.mp4 (4.08 MB)
MP4
09 PCI-DSS.mp4 (1.55 MB)
MP4
10 Enterprise Security Framework (ESF).mp4 (2.17 MB)
MP4
11 NIST SP 800-53 and ISO 27001.mp4 (7.92 MB)
MP4
12 Cloud Security Alliance (CSA).mp4 (2.18 MB)
MP4
13 SSAE 18, SOC 1, 2, and 3.mp4 (5.08 MB)
MP4
15 Systems Hardening.mp4 (4.15 MB)
MP4
16 Vendor and Control Diversity.mp4 (2.34 MB)
MP4
17 Module Review.mp4 (516.01 KB)
MP4
01 Module Overview.mp4 (1.32 MB)
MP4
02 Importance of Policies in Reducing Risk.mp4 (792.11 KB)
MP4
03 Job Rotation.mp4 (2.81 MB)
MP4
04 Mandatory Vacations.mp4 (1.2 MB)
MP4
05 Separation of Duties.mp4 (997.25 KB)
MP4
06 Least Privilege.mp4 (1.21 MB)
MP4
07 Clean Desk Policies.mp4 (1.87 MB)
MP4
08 Background Checks, NDAs, and Role-based Awareness Training.mp4 (3.15 MB)
MP4
09 Use Cases for Monitoring.mp4 (3.4 MB)
MP4
10 Things Typically Monitored.mp4 (2.38 MB)
MP4
11 Balancing Whats Reasonable.mp4 (1.2 MB)
MP4
12 New Tools Are Constantly Developed.mp4 (2.02 MB)
MP4
13 Monitoring Social Media.mp4 (1.31 MB)
MP4
14 Employee Protections.mp4 (1.25 MB)
MP4
15 Onboarding Offboarding.mp4 (1.28 MB)
MP4
16 Culture and Creating a Culture of Security.mp4 (3.14 MB)
MP4
17 Setting the Stage.mp4 (1.42 MB)
MP4
18 Awareness Training.mp4 (2.1 MB)
MP4
19 Skills Training.mp4 (3.14 MB)
MP4
20 Funding and Executive Buy-in.mp4 (2.43 MB)
MP4
21 Continuous Improvement.mp4 (1.21 MB)
MP4
22 Wired Brain Coffees Approach to Training.mp4 (2.92 MB)
MP4
23 Technology Diversity.mp4 (1.18 MB)
MP4
24 Vendor Diversity.mp4 (2.14 MB)
MP4
25 Service-level Agreement (SLA).mp4 (1018.07 KB)
MP4
27 Business Partner Agreement (BPA).mp4 (886.86 KB)
MP4
28 EOL EOS.mp4 (2.97 MB)
MP4
29 Data Retention.mp4 (1.69 MB)
MP4
30 User Account.mp4 (1.18 MB)
MP4
31 Shared, Generic, Guest, and Service Accounts.mp4 (2.94 MB)
MP4
32 Privileged Accounts.mp4 (1.76 MB)
MP4
33 Change Management.mp4 (3.2 MB)
MP4
34 Asset Management.mp4 (2.27 MB)
MP4
01 Module Overview.mp4 (1.07 MB)
MP4
02 Risk Types.mp4 (3.33 MB)
MP4
03 Managing Risk.mp4 (1.19 MB)
MP4
04 Risk Management Defined.mp4 (2.3 MB)
MP4
05 Risk Management Concepts.mp4 (5.52 MB)
MP4
06 Strategic Options.mp4 (3.18 MB)
MP4
07 Risk Register, Risk Matrix, and Heat Map.mp4 (1.63 MB)
MP4
08 Risk Control Self-assessment (RCSA).mp4 (3.91 MB)
MP4
09 Risk Awareness (Inherent, Residual, Control, and Risk Appetite).mp4 (2.06 MB)
MP4
10 Regulatory Examples.mp4 (1.15 MB)
MP4
11 Gramm-Leach-Bliley Act (GLBA).mp4 (2.46 MB)
MP4
12 HIPAA.mp4 (2.38 MB)
MP4
13 HITECH Act.mp4 (3.83 MB)
MP4
14 Sarbanes-Oxley Act (SOX).mp4 (6.68 MB)
MP4
15 GDPR.mp4 (1.74 MB)
MP4
16 Qualitative and Quantitative Analysis.mp4 (4.79 MB)
MP4
17 Risk Calculation.mp4 (2.09 MB)
MP4
18 Likelihood of Threat.mp4 (1.76 MB)
MP4
19 Impact of Threat.mp4 (1.08 MB)
MP4
20 Loss Calculation Terms (ALE, SLE, and ARO).mp4 (4.87 MB)
MP4
21 Threat Assessment (Disaster).mp4 (2.75 MB)
MP4
22 Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).mp4 (2.3 MB)
MP4
23 Business Impact Analysis - Key Terminology.mp4 (9.13 MB)
MP4
24 Mission Essential Functions.mp4 (3.57 MB)
MP4
25 Identification of Critical Systems.mp4 (4.01 MB)
MP4
26 Single Point of Failure (SPOF).mp4 (3.85 MB)
MP4
27 Order of Restoration.mp4 (2.8 MB)
MP4
28 Phased Approach.mp4 (3.64 MB)
MP4
29 Identifying Most Critical Systems First.mp4 (5.08 MB)
MP4
30 Risk Assessment.mp4 (1.88 MB)
MP4
31 Continuity of Operations.mp4 (1.72 MB)
MP4
32 IT Contingency Planning.mp4 (5.15 MB)
MP4
01 Module Overview.mp4 (1.31 MB)
MP4
02 Company Obligations to Protect Security.mp4 (2.25 MB)
MP4
03 Potential Damages from Mishandled Data.mp4 (2.11 MB)
MP4
04 Incident Notification and Escalation.mp4 (3.38 MB)
MP4
05 Notifying Outside Agencies.mp4 (2.51 MB)
MP4
06 Data Classification.mp4 (5.08 MB)
MP4
07 Privacy-enhancing Technologies, Data Masking, and Tokenization.mp4 (2.52 MB)
MP4
08 Anonymization and Pseudo-anonymization.mp4 (2.52 MB)
MP4
09 Data Owner.mp4 (1 MB)
MP4
10 Data Controller and Processor.mp4 (578.02 KB)
MP4
11 Data Steward Custodian.mp4 (2.29 MB)
MP4
12 Privacy Officer.mp4 (851.66 KB)
MP4
13 Information Lifecycle.mp4 (2.89 MB)
MP4
14 Privacy Impact Assessment.mp4 (3.16 MB)
MP4
15 Terms of Agreement and Privacy Notice.mp4 (3.19 MB)
MP4
1 Course Overview.mp4 (3.71 MB)
MP4
1 Module Overview.mp4 (1.42 MB)
MP4
2 Goals of the Module.mp4 (2.37 MB)
MP4
3 Threat Types.mp4 (1.27 MB)
MP4
4 Types of Access Control (Managerial, Operational, and Physical).mp4 (1.73 MB)
MP4
5 Deterrent.mp4 (746.28 KB)
MP4
6 Preventive.mp4 (847.79 KB)
MP4
7 Detective.mp4 (933.23 KB)
MP4
8 Corrective Recovery and Compensating.mp4 (2.63 MB)
MP4
9 Module Review.mp4 (614.7 KB)
MP4
1 Module Overview and Domains.mp4 (4.51 MB)
MP4
2 Passing the Exam - Whats Next.mp4 (2.31 MB)
MP4
3 Example Certifications.mp4 (1.86 MB)
MP4
4 Security+ Exam Format.mp4 (3.44 MB)
MP4
5 Registering for an Exam.mp4 (1.87 MB)
MP4
6 Exam Lifecycle.mp4 (1.59 MB)
MP4
7 Prerequisite Experience.mp4 (2.67 MB)
MP4
1 Module Intro and Study Tips.mp4 (5.85 MB)
MP4
2 Exam Tips.mp4 (2.36 MB)
MP4
3 Key Areas to Focus On.mp4 (1.92 MB)
MP4
4 Objectives Study Guide.mp4 (5.8 MB)
MP4
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z01
https://rapidgator.net/file/93a6f5194de97497657d0471a077d7df/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z01
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z02
https://rapidgator.net/file/a229fe5ed91742c4903dfd31ef2aa789/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z02
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z03
https://rapidgator.net/file/e9c4ae8d7201c14b9893889a42c5d9d1/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z03
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z04
https://rapidgator.net/file/8d7f9cb3fa3a54a5c994c1bed3fdfec3/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z04
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z05
https://rapidgator.net/file/9b0f626[цензура]39f6177dba38ef17438c6e/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.z05
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).zip
https://rapidgator.net/file/da8d70cd6335a60557f052de2c159366/Pluralsight_-_Learning_Path_-_CompTIA_Security__SY0-601.zip
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z01
https://nitroflare.com/view/364E795BA5A7BA3/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z01
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z02
https://nitroflare.com/view/2203EB1213E4872/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z02
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z03
https://nitroflare.com/view/8E5C63E968D152E/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z03
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z04
https://nitroflare.com/view/67F697259CE73E4/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z04
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).z05
https://nitroflare.com/view/1E08FF5CDC8131C/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.z05
Pluralsight - Learning Path - CompTIA Security+ (SY0-601).zip
https://nitroflare.com/view/7493EEC5BF46DA7/Pluralsight_-_Learning_Path_-_CompTIA_Security%2B_SY0-601.zip