Torrent details for "CompTIA Security SY0 701 Complete Course Exam" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
16.9 GB
Info Hash:
0A4141016405FE278104046F1D57B798045C299A
Added By:
Added:
March 15, 2024, 10:10 a.m.
Stats:
|
(Last updated: May 10, 2025, 8:23 p.m.)
| File | Size |
|---|---|
| 001 Conclusion.mp4 | 280.7 MB |
| 001 Security-701-Study-Plan.pdf | 132.4 KB |
| 001 comptia-security-sy0-701-exam-objectives-5-0.pdf | 186.6 KB |
| 001 Download the Study Guide.html | 222 bytes |
| 006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt | 71.1 KB |
| 008 Securing Network Communications (OBJ 3.2)_en.srt | 44.4 KB |
| 008 Performing a Basic PenTest (OBJ 5.5)_en.srt | 37.5 KB |
| 009 Configuring a DLP (OBJ 4.5)_en.srt | 36.7 KB |
| 009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt | 35.2 KB |
| 013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt | 33.6 KB |
| 002 Ports and Protocols (OBJ 4.5)_en.srt | 32.7 KB |
| 004 Password Security (OBJ 4.6)_en.srt | 31.6 KB |
| 001 Conclusion_en.srt | 30.0 KB |
| 007 Door Locks (OBJ 1.2)_en.srt | 30.0 KB |
| 003 Multifactor Authentication (OBJ 4.6)_en.srt | 29.9 KB |
| 007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt | 29.5 KB |
| 008 Digital Certificates (OBJ 1.4)_en.srt | 29.3 KB |
| 009 Redundant Site Considerations (OBJ 3.4)_en.srt | 28.9 KB |
| 003 Firewalls (OBJ 3.2)_en.srt | 28.7 KB |
| 003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt | 28.2 KB |
| 004 Configuring Firewalls (OBJ 4.5)_en.srt | 28.2 KB |
| 002 Investigating with Data (OBJ 4.9)_en.srt | 27.9 KB |
| 010 Selecting Secure Protocols (OBJ 4.5)_en.srt | 27.7 KB |
| 007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt | 27.6 KB |
| 003 Wireless Security Settings (OBJ 4.1)_en.srt | 27.1 KB |
| 006 Digital Forensic Procedures (OBJ 4.8)_en.srt | 27.0 KB |
| 008 Integrations and APIs (OBJ 4.7)_en.srt | 26.6 KB |
| 005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt | 26.1 KB |
| 001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt | 26.1 KB |
| 005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt | 25.5 KB |
| 005 Vulnerability Scans (OBJ 4.9)_en.srt | 25.1 KB |
| 010 Infrastructure Considerations (OBJ 3.2)_en.srt | 24.9 KB |
| 004 Application Security (OBJ 4.1)_en.srt | 24.9 KB |
| 007 Data Backups (OBJ 3.4)_en.srt | 24.8 KB |
| 006 Powering Data Centers (OBJ 3.4)_en.srt | 24.4 KB |
| 007 Port Security (OBJ 3.2)_en.srt | 23.2 KB |
| 002 Incident Response Process (OBJ 4.8)_en.srt | 23.1 KB |
| 010 Vulnerability Reporting (OBJ 4.3)_en.srt | 22.8 KB |
| TutsNode.org.txt | 59 bytes |
| 0 | 2.2 KB |
| 001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 | 257.2 MB |
| 003 Password Management (OBJ 5.6)_en.srt | 22.5 KB |
| 008 Continuity of Operations Plan (OBJ 3.4)_en.srt | 22.3 KB |
| 002 Motivational Triggers (OBJ 5.6)_en.srt | 22.2 KB |
| 006 Network Appliances (OBJ 3.2)_en.srt | 22.1 KB |
| 007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt | 21.6 KB |
| 005 Hashing (OBJ 1.4)_en.srt | 20.6 KB |
| 002 When to Automate and Orchestrate (OBJ 4.7)_en.srt | 20.6 KB |
| 008 Group Policies (OBJ 2.5 & 4.5)_en.srt | 20.4 KB |
| 005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt | 20.4 KB |
| 007 Patch Management (OBJ 2.5)_en.srt | 20.1 KB |
| 002 High Availability (OBJ 3.4)_en.srt | 20.1 KB |
| 005 Password Attacks (OBJ 2.4)_en.srt | 19.9 KB |
| 011 Outsmarting Threat Actors (OBJ 1.2)_en.srt | 19.9 KB |
| 001 Fundamentals of Security_en.srt | 19.6 KB |
| 005 Incident Response Training and Testing (OBJ 4.8)_en.srt | 19.5 KB |
| 012 Obfuscation (OBJ 1.4)_en.srt | 19.5 KB |
| 003 Data Redundancy (OBJ 3.4)_en.srt | 19.5 KB |
| 011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt | 19.5 KB |
| 002 On-premise versus the Cloud (OBJ 3.1)_en.srt | 19.4 KB |
| 004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt | 19.4 KB |
| 001 Malware (OBJ 2.4)_en.srt | 19.3 KB |
| 006 Packet Captures (OBJ 4.9)_en.srt | 19.2 KB |
| 007 Automating Application Development (OBJ 4.7)_en.srt | 19.2 KB |
| 010 Other Social Engineering Attacks (OBJ 2.2)_en.srt | 19.1 KB |
| 008 Access Badge Cloning (OBJ 2.4)_en.srt | 19.1 KB |
| 007 Data Collection Procedures (OBJ 4.8)_en.srt | 19.0 KB |
| 005 Capacity Planning (OBJ 3.4)_en.srt | 19.0 KB |
| 006 Single Sign-On (SSO) (OBJ 4.6)_en.srt | 19.0 KB |
| 004 Avoiding Social Engineering (OBJ 5.6)_en.srt | 18.5 KB |
| 009 Access Control Models (OBJ 4.6)_en.srt | 18.4 KB |
| 006 Ransomware (OBJ 2.4)_en.srt | 18.2 KB |
| 002 Wireless Infrastructure Security (OBJ 4.1)_en.srt | 17.9 KB |
| 010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt | 17.8 KB |
| 002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt | 17.8 KB |
| 006 Access Control Vestibules (OBJ 1.2)_en.srt | 17.7 KB |
| 002 Recognizing Insider Threats (OBJ 5.6)_en.srt | 17.6 KB |
| 006 Increasing Hash Security (OBJ 1.4)_en.srt | 17.5 KB |
| 005 Policy and Handbooks (OBJ 5.6)_en.srt | 17.5 KB |
| 002 Distributed Denial of Service (OBJ 2.4)_en.srt | 17.4 KB |
| 002 Viruses (OBJ 2.4)_en.srt | 17.4 KB |
| 006 Preventing Phishing Attacks (OBJ 5.6)_en.srt | 17.3 KB |
| 008 Disk Imaging and Analysis (OBJ 4.8)_en.srt | 17.2 KB |
| 002 Exam Tips_en.srt | 17.0 KB |
| 003 Threat Intelligence Feeds (OBJ 4.3)_en.srt | 16.9 KB |
| 1 | 3.3 KB |
| 001 Fundamentals of Security.mp4 | 194.6 MB |
| 006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt | 16.7 KB |
| 003 Restricting Applications (OBJ 2.5)_en.srt | 16.7 KB |
| 013 Zero Trust (OBJ 1.2)_en.srt | 16.6 KB |
| 005 Viruses and Trojans (OBJ 2.4)_en.srt | 16.5 KB |
| 006 Change Management (OBJ 1.3)_en.srt | 16.5 KB |
| 009 SD-WAN and SASE (OBJ 3.2)_en.srt | 16.4 KB |
| 005 Phishing Attacks (OBJ 2.2)_en.srt | 16.4 KB |
| 003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt | 16.1 KB |
| 004 Surveillance Systems (OBJ 1.2)_en.srt | 16.1 KB |
| 004 Root Cause Analysis (OBJ 4.8)_en.srt | 16.0 KB |
| 004 Asymmetric Algorithms (OBJ 1.4)_en.srt | 16.0 KB |
| 002 Threat Actor Motivations (OBJ 2.1)_en.srt | 16.0 KB |
| 010 Resilience and Recovery Testing (OBJ 3.4)_en.srt | 15.8 KB |
| 004 Directory Traversal Attack (OBJ 2.4)_en.srt | 15.7 KB |
| 002 Data Classifications (OBJ 3.3)_en.srt | 15.7 KB |
| 008 NetFlow and Flow Analysis_en.srt | 15.6 KB |
| 003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt | 15.6 KB |
| 002 Acquisition and Procurement (OBJ 4.2)_en.srt | 15.3 KB |
| 003 Threat Hunting (OBJ 4.8)_en.srt | 15.3 KB |
| 005 Automating Onboarding (OBJ 4.7)_en.srt | 15.1 KB |
| 004 Automated Reports (OBJ 4.9)_en.srt | 15.1 KB |
| 004 Asset Management (OBJ 4.2)_en.srt | 15.1 KB |
| 002 Internal Audits and Assessments (OBJ 5.5)_en.srt | 15.0 KB |
| 003 Impersonation (OBJ 2.2)_en.srt | 15.0 KB |
| 007 Authentication (OBJ 1.2)_en.srt | 15.0 KB |
| 008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt | 14.8 KB |
| 007 Change Management Processes (OBJ 1.3)_en.srt | 14.7 KB |
| 010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt | 14.7 KB |
| 008 Endpoint Detection and Response (OBJ 4.5)_en.srt | 14.7 KB |
| 002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt | 14.6 KB |
| 004 Risk Register (OBJ 5.2)_en.srt | 14.5 KB |
| 010 Indicators of Compromise (IoC)_en.srt | 14.4 KB |
| 004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt | 14.4 KB |
| 003 Mobile Asset Deployments (OBJ 4.1)_en.srt | 14.4 KB |
| 001 Automation and Orchestration (OBJ 4.7)_en.srt | 14.4 KB |
| 004 Responsible Disclosure Programs (OBJ 4.3)_en.srt | 14.4 KB |
| 007 Email Security (OBJ 4.5)_en.srt | 14.4 KB |
| 001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt | 14.3 KB |
| 002 Fencing and Bollards (OBJ 1.2)_en.srt | 14.3 KB |
| 003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt | 14.3 KB |
| 011 Race Conditions (OBJ 2.3)_en.srt | 14.1 KB |
| 008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt | 14.1 KB |
| 004 External Audits and Assessments (OBJ 5.5)_en.srt | 14.0 KB |
| 005 Execution and Escalation Attack (OBJ 2.4)_en.srt | 14.0 KB |
| 006 Web and DNS Filtering (OBJ 4.5)_en.srt | 14.0 KB |
| 009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt | 13.9 KB |
| 005 Availability (OBJ 1.2)_en.srt | 13.8 KB |
| 004 Automating Support Tickets (OBJ 4.7)_en.srt | 13.8 KB |
| 010 Assigning Permissions (OBJ 4.6)_en.srt | 13.8 KB |
| 009 Attestation of Findings (OBJ 5.5)_en.srt | 13.5 KB |
| 007 Nation-state Actor (OBJ 2.1)_en.srt | 13.5 KB |
| 009 Single Pane of Glass (OBJ 4.4)_en.srt | 13.4 KB |
| 007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt | 13.3 KB |
| 009 SELinux (OBJ 2.5 & 4.5)_en.srt | 13.2 KB |
| 009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt | 13.1 KB |
| 004 Integrity (OBJ 1.2)_en.srt | 13.0 KB |
| 005 IDS and IPS (OBJ 3.2)_en.srt | 13.0 KB |
| 002 Identifying Vulnerabilities (OBJ 4.3)_en.srt | 12.8 KB |
| 003 Confidentiality (OBJ 1.2)_en.srt | 12.8 KB |
| 001 Alerting and Monitoring (OBJ 4.4)_en.srt | 12.8 KB |
| 003 Attacking with Brute Force (OBJ 2.4)_en.srt | 12.7 KB |
| 011 IPSIDS Logs (OBJ 4.9)_en.srt | 12.6 KB |
| 005 Network Access Control (NAC) (OBJ 4.5)_en.srt | 12.5 KB |
| 007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt | 12.4 KB |
| 002 Threats and Vulnerabilities_en.srt | 12.4 KB |
| 013 Indications of Malware Attacks (OBJ 2.4)_en.srt | 12.4 KB |
| 005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt | 12.3 KB |
| 007 Governance Considerations (OBJ 5.1)_en.srt | 12.2 KB |
| 006 Data from Security Tools (OBJ 4.4)_en.srt | 12.2 KB |
| 010 Blockchain (OBJ 1.4)_en.srt | 12.1 KB |
| 007 Firewall Logs (OBJ 4.9)_en.srt | 12.1 KB |
| 009 User Behavior Analytics (OBJ 4.5)_en.srt | 12.1 KB |
| 011 Encryption Tools (OBJ 1.4)_en.srt | 12.1 KB |
| 008 Rootkits (OBJ 2.4)_en.srt | 12.0 KB |
| 011 Security Control Types (OBJ 1.1)_en.srt | 12.0 KB |
| 003 Symmetric Algorithms (OBJ 1.4)_en.srt | 12.0 KB |
| 010 Keylogger (OBJ 2.4)_en.srt | 11.9 KB |
| 006 Penetration Testing (OBJ 5.5)_en.srt | 11.9 KB |
| 012 Gap Analysis (OBJ 1.1)_en.srt | 11.8 KB |
| 008 Frauds and Scams (OBJ 2.2)_en.srt | 11.8 KB |
| 008 Insider Threats (OBJ 2.1)_en.srt | 11.8 KB |
| 007 Creating a Culture of Security (OBJ 5.6)_en.srt | 11.7 KB |
| 006 Contracts and Agreements (OBJ 5.3)_en.srt | 11.6 KB |
| 005 Trusted Operating Systems (OBJ 2.5)_en.srt | 11.6 KB |
| 004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt | 11.6 KB |
| 006 Updates and Patches (OBJ 2.5)_en.srt | 11.5 KB |
| 007 Risk Management Strategies (OBJ 5.2)_en.srt | 11.4 KB |
| 004 Vendor Assessment (OBJ 5.3)_en.srt | 11.4 KB |
| 007 Session Hijacking (OBJ 2.4)_en.srt | 11.4 KB |
| 007 Zombies and Botnets (OBJ 2.4)_en.srt | 11.4 KB |
| 011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt | 11.4 KB |
| 008 Technical Implications of Changes (OBJ 1.3)_en.srt | 11.4 KB |
| 011 Spyware and Bloatware (OBJ 2.4)_en.srt | 11.3 KB |
| 006 Non-repudiation (OBJ 1.2)_en.srt | 11.3 KB |
| 007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt | 11.2 KB |
| 012 Malware Attack Techniques (OBJ 2.4)_en.srt | 11.2 KB |
| 012 Network Logs (OBJ 4.9)_en.srt | 11.0 KB |
| 003 Cloud Security (OBJ 3.1 & 4.1)_en.srt | 11.0 KB |
| 002 Changing Default Configurations (OBJ 2.5)_en.srt | 11.0 KB |
| 002 Monitoring Resources (OBJ 4.4)_en.srt | 10.9 KB |
| 006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt | 10.9 KB |
| 010 Security Control Categories (OBJ 1.1)_en.srt | 10.8 KB |
| 009 Influence Campaigns (OBJ 2.2)_en.srt | 10.8 KB |
| 004 Unnecessary Services (OBJ 2.5)_en.srt | 10.8 KB |
| 006 Organized Crime (OBJ 2.1)_en.srt | 8.5 KB |
| 2 | 81 bytes |
| 001 Malware (OBJ 2.4).mp4 | 186.2 MB |
| 001 CompTIA-Security-SY0-701-Study-Guide.pdf | 1.4 MB |
| 003 Risk Identification (OBJ 5.2)_en.srt | 10.8 KB |
| 001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt | 10.8 KB |
| 001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt | 10.7 KB |
| 009 Documenting Changes (OBJ 1.3)_en.srt | 10.7 KB |
| 010 Data Encryption Levels (2.5)_en.srt | 10.5 KB |
| 007 Federation (OBJ 4.6)_en.srt | 10.5 KB |
| 005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt | 10.4 KB |
| 013 Metadata (OBJ 4.9)_en.srt | 10.4 KB |
| 005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt | 10.4 KB |
| 004 Pretexting (OBJ 2.2)_en.srt | 10.3 KB |
| 008 Compliance (OBJ 5.4)_en.srt | 10.2 KB |
| 003 Data Ownership (OBJ 4.2 & 5.1)_en.srt | 10.1 KB |
| 009 Shadow IT (OBJ 2.1)_en.srt | 10.0 KB |
| 001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt | 9.8 KB |
| 006 Automating Security (OBJ 4.7)_en.srt | 9.8 KB |
| 002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt | 9.7 KB |
| 002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt | 9.7 KB |
| 003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt | 9.6 KB |
| 013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt | 9.5 KB |
| 004 Data States (OBJ 3.3)_en.srt | 9.5 KB |
| 001 Audits and Assessments (OBJ 5.5)_en.srt | 9.4 KB |
| 011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt | 9.2 KB |
| 005 Performing an External Assessment (OBJ 5.5)_en.srt | 9.2 KB |
| 003 Dashboards (OBJ 4.9)_en.srt | 9.2 KB |
| 004 Policies (OBJ 5.1)_en.srt | 9.1 KB |
| 001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt | 9.1 KB |
| 001 Risk Management (OBJ 5.2)_en.srt | 9.0 KB |
| 003 Threat Actor Attributes (OBJ 2.1)_en.srt | 9.0 KB |
| 001 Security Awareness (OBJ 5.6)_en.srt | 9.0 KB |
| 006 Procedures (OBJ 5.1)_en.srt | 9.0 KB |
| 001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt | 8.9 KB |
| 009 Accounting (OBJ 1.2)_en.srt | 8.9 KB |
| 003 Performing an Internal Assessment (OBJ 5.5)_en.srt | 8.8 KB |
| 002 Governance (OBJ 5.1)_en.srt | 8.7 KB |
| 001 Security Architecture (OBJ 3.1 & 4.1)_en.srt | 8.7 KB |
| 3 | 1.4 KB |
| 008 Securing Network Communications (OBJ 3.2).mp4 | 183.4 MB |
| 009 Injection Attacks_en.srt | 8.7 KB |
| 004 Trojans (OBJ 2.4)_en.srt | 8.6 KB |
| 001 Social Engineering (OBJ 2.2 & 5.6)_en.srt | 8.6 KB |
| 001 Physical Security (OBJ 1.2 & 2.4)_en.srt | 8.6 KB |
| 001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt | 8.5 KB |
| 006 Quantitative Risk Analysis (OBJ 5.2)_en.srt | 8.4 KB |
| 009 Endpoint Logs (OBJ 4.9)_en.srt | 8.3 KB |
| 010 OS-specific Security Logs (OBJ 4.9)_en.srt | 8.3 KB |
| 005 Data Types (OBJ 3.3 & 1.4)_en.srt | 8.2 KB |
| 008 Application Logs (OBJ 4.9)_en.srt | 8.0 KB |
| 005 Standards (OBJ 5.1)_en.srt | 8.0 KB |
| 005 Hacktivists (OBJ 2.1)_en.srt | 8.0 KB |
| 008 Authorization (OBJ 1.2)_en.srt | 7.9 KB |
| 009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt | 7.8 KB |
| 008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt | 7.8 KB |
| 008 On-Path Attacks_en.srt | 7.8 KB |
| 001 Investigating an Incident (OBJ 4.9)_en.srt | 7.7 KB |
| 002 BONUS Where do I go from here_en.srt | 7.7 KB |
| 010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt | 7.6 KB |
| 012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt | 7.5 KB |
| 006 Microservices (OBJ 3.1)_en.srt | 7.5 KB |
| 003 Worms (OBJ 2.4)_en.srt | 7.4 KB |
| 001 Malicious Activity (OBJ 2.4)_en.srt | 7.4 KB |
| 001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt | 7.3 KB |
| 001 Security Techniques (OBJ 4.1 & 4.5)_en.srt | 7.3 KB |
| 004 Configuring a RAID (OBJ 3.4)_en.srt | 7.3 KB |
| 008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt | 7.2 KB |
| 001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt | 7.2 KB |
| 007 Securing Data (OBJ 3.3)_en.srt | 7.1 KB |
| 009 Non-compliance Consequences (OBJ 5.4)_en.srt | 6.9 KB |
| 001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt | 6.9 KB |
| 005 Serverless (OBJ 3.1)_en.srt | 6.8 KB |
| 009 Exploring Digital Certificates (OBJ 1.4)_en.srt | 6.7 KB |
| 005 Qualitative Risk Analysis (OBJ 5.2)_en.srt | 6.7 KB |
| 001 Vulnerability Management (OBJ 4.3)_en.srt | 6.6 KB |
| 008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt | 6.5 KB |
| 003 Governance Structures (OBJ 5.1)_en.srt | 6.5 KB |
| 002 Risk Assessment Frequency (OBJ 5.2)_en.srt | 6.5 KB |
| 004 Unskilled Attackers (OBJ 2.1)_en.srt | 6.3 KB |
| 007 Network Infrastructure (OBJ 3.1)_en.srt | 6.2 KB |
| 001 Incident Response (OBJ 4.8)_en.srt | 6.0 KB |
| 006 Data Sovereignty (OBJ 3.3)_en.srt | 5.5 KB |
| 006 Replay Attacks (OBJ 2.4)_en.srt | 5.5 KB |
| 008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt | 5.4 KB |
| 4 | 325.8 KB |
| 006 Conducting Vulnerability Scans (OBJ 4.3).mp4 | 163.0 MB |
| 5 | 1006.4 KB |
| 002 Exam Tips.mp4 | 157.6 MB |
| 6 | 372.5 KB |
| 008 Performing a Basic PenTest (OBJ 5.5).mp4 | 154.0 MB |
| 7 | 2.0 MB |
| 001 Automation and Orchestration (OBJ 4.7).mp4 | 140.8 MB |
| 8 | 1.2 MB |
| 001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 | 139.5 MB |
| 9 | 535.5 KB |
| 007 Door Locks (OBJ 1.2).mp4 | 135.2 MB |
| 10 | 830.4 KB |
| 006 Digital Forensic Procedures (OBJ 4.8).mp4 | 134.1 MB |
| 11 | 1.9 MB |
| 009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 | 132.3 MB |
| 12 | 1.7 MB |
| 004 Password Security (OBJ 4.6).mp4 | 123.3 MB |
| 13 | 721.2 KB |
| 002 Motivational Triggers (OBJ 5.6).mp4 | 120.3 MB |
| 14 | 1.7 MB |
| 001 Alerting and Monitoring (OBJ 4.4).mp4 | 119.8 MB |
| 15 | 204.4 KB |
| 010 Selecting Secure Protocols (OBJ 4.5).mp4 | 115.7 MB |
| 16 | 320.8 KB |
| 003 Multifactor Authentication (OBJ 4.6).mp4 | 110.8 MB |
| 17 | 1.2 MB |
| 009 Redundant Site Considerations (OBJ 3.4).mp4 | 108.9 MB |
| 18 | 1.1 MB |
| 008 Digital Certificates (OBJ 1.4).mp4 | 108.4 MB |
| 19 | 1.6 MB |
| 003 Alerting and Monitoring Activities (OBJ 4.4).mp4 | 105.9 MB |
| 20 | 145.3 KB |
| 004 Configuring Firewalls (OBJ 4.5).mp4 | 105.7 MB |
| 21 | 357.1 KB |
| 001 Governance and Compliance (OBJ 5.1 & 5.4).mp4 | 104.6 MB |
| 22 | 1.4 MB |
| 001 Audits and Assessments (OBJ 5.5).mp4 | 103.2 MB |
| 23 | 865.7 KB |
| 002 On-premise versus the Cloud (OBJ 3.1).mp4 | 102.3 MB |
| 24 | 1.7 MB |
| 008 Integrations and APIs (OBJ 4.7).mp4 | 102.3 MB |
| 25 | 1.7 MB |
| 008 Disk Imaging and Analysis (OBJ 4.8).mp4 | 101.8 MB |
| 26 | 165.7 KB |
| 013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4 | 101.5 MB |
| 27 | 494.8 KB |
| 001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4 | 101.4 MB |
| 28 | 657.4 KB |
| 001 Risk Management (OBJ 5.2).mp4 | 100.8 MB |
| 29 | 1.2 MB |
| 007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4 | 100.6 MB |
| 30 | 1.4 MB |
| 002 Investigating with Data (OBJ 4.9).mp4 | 100.5 MB |
| 31 | 1.5 MB |
| 010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4 | 100.1 MB |
| 32 | 1.9 MB |
| 001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4 | 97.9 MB |
| 33 | 59.6 KB |
| 006 Ransomware (OBJ 2.4).mp4 | 97.2 MB |
| 34 | 831.4 KB |
| 003 Wireless Security Settings (OBJ 4.1).mp4 | 97.1 MB |
| 35 | 925.8 KB |
| 010 Infrastructure Considerations (OBJ 3.2).mp4 | 96.4 MB |
| 36 | 1.6 MB |
| 007 Patch Management (OBJ 2.5).mp4 | 94.3 MB |
| 37 | 1.7 MB |
| 002 Incident Response Process (OBJ 4.8).mp4 | 93.5 MB |
| 38 | 528.1 KB |
| 007 Port Security (OBJ 3.2).mp4 | 91.5 MB |
| 39 | 549.8 KB |
| 001 Security Infrastructure (OBJ 3.2 & 4.5).mp4 | 90.7 MB |
| 40 | 1.3 MB |
| 001 Social Engineering (OBJ 2.2 & 5.6).mp4 | 90.0 MB |
| 41 | 2.0 MB |
| 007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4 | 89.5 MB |
| 42 | 462.4 KB |
| 006 Network Appliances (OBJ 3.2).mp4 | 88.9 MB |
| 43 | 1.1 MB |
| 005 Hashing (OBJ 1.4).mp4 | 88.5 MB |
| 44 | 1.5 MB |
| 001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4 | 87.5 MB |
| 45 | 526.1 KB |
| 005 Viruses and Trojans (OBJ 2.4).mp4 | 87.0 MB |
| 46 | 989.0 KB |
| 005 Capacity Planning (OBJ 3.4).mp4 | 86.8 MB |
| 47 | 1.2 MB |
| 001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4 | 86.6 MB |
| 48 | 1.4 MB |
| 001 Security Architecture (OBJ 3.1 & 4.1).mp4 | 86.5 MB |
| 49 | 1.5 MB |
| 007 Nation-state Actor (OBJ 2.1).mp4 | 85.8 MB |
| 50 | 205.1 KB |
| 006 Packet Captures (OBJ 4.9).mp4 | 85.5 MB |
| 51 | 540.2 KB |
| 004 Application Security (OBJ 4.1).mp4 | 83.8 MB |
| 52 | 236.0 KB |
| 002 Ports and Protocols (OBJ 4.5).mp4 | 83.7 MB |
| 53 | 280.8 KB |
| 002 Wireless Infrastructure Security (OBJ 4.1).mp4 | 83.6 MB |
| 54 | 409.8 KB |
| 005 Analyzing Vulnerabilities (OBJ 4.3).mp4 | 82.7 MB |
| 55 | 1.3 MB |
| 001 Security Techniques (OBJ 4.1 & 4.5).mp4 | 82.4 MB |
| 56 | 1.6 MB |
| 004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4 | 82.0 MB |
| 57 | 2.0 MB |
| 006 Powering Data Centers (OBJ 3.4).mp4 | 81.3 MB |
| 58 | 682.3 KB |
| 012 Obfuscation (OBJ 1.4).mp4 | 80.7 MB |
| 59 | 1.3 MB |
| 001 Security Awareness (OBJ 5.6).mp4 | 79.8 MB |
| 60 | 169.2 KB |
| 003 Password Management (OBJ 5.6).mp4 | 79.8 MB |
| 61 | 197.3 KB |
| 011 Outsmarting Threat Actors (OBJ 1.2).mp4 | 79.6 MB |
| 62 | 431.8 KB |
| 002 Recognizing Insider Threats (OBJ 5.6).mp4 | 79.5 MB |
| 63 | 532.0 KB |
| 002 When to Automate and Orchestrate (OBJ 4.7).mp4 | 79.5 MB |
| 64 | 534.4 KB |
| 001 Physical Security (OBJ 1.2 & 2.4).mp4 | 79.0 MB |
| 65 | 1.0 MB |
| 010 Vulnerability Reporting (OBJ 4.3).mp4 | 78.8 MB |
| 66 | 1.2 MB |
| 005 Vulnerability Scans (OBJ 4.9).mp4 | 78.5 MB |
| 67 | 1.5 MB |
| 009 Configuring a DLP (OBJ 4.5).mp4 | 78.5 MB |
| 68 | 1.5 MB |
| 010 Other Social Engineering Attacks (OBJ 2.2).mp4 | 78.4 MB |
| 69 | 1.6 MB |
| 005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4 | 78.2 MB |
| 70 | 1.8 MB |
| 008 Insider Threats (OBJ 2.1).mp4 | 77.0 MB |
| 71 | 1008.9 KB |
| 003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4 | 76.7 MB |
| 72 | 1.3 MB |
| 008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4 | 76.5 MB |
| 73 | 1.5 MB |
| 009 Access Control Models (OBJ 4.6).mp4 | 76.2 MB |
| 74 | 1.8 MB |
| 008 Continuity of Operations Plan (OBJ 3.4).mp4 | 76.0 MB |
| 75 | 2.0 MB |
| 007 Automating Application Development (OBJ 4.7).mp4 | 75.5 MB |
| 76 | 519.4 KB |
| 003 Firewalls (OBJ 3.2).mp4 | 75.1 MB |
| 77 | 890.6 KB |
| 005 Phishing Attacks (OBJ 2.2).mp4 | 75.1 MB |
| 78 | 932.3 KB |
| 001 Malicious Activity (OBJ 2.4).mp4 | 74.1 MB |
| 79 | 1.9 MB |
| 002 Symmetric vs Asymmetric (OBJ 1.4).mp4 | 73.9 MB |
| 80 | 132.0 KB |
| 004 Avoiding Social Engineering (OBJ 5.6).mp4 | 73.8 MB |
| 81 | 163.8 KB |
| 006 Single Sign-On (SSO) (OBJ 4.6).mp4 | 73.3 MB |
| 82 | 749.7 KB |
| 004 Pretexting (OBJ 2.2).mp4 | 72.9 MB |
| 83 | 1.1 MB |
| 008 Access Badge Cloning (OBJ 2.4).mp4 | 72.5 MB |
| 84 | 1.5 MB |
| 005 Policy and Handbooks (OBJ 5.6).mp4 | 72.5 MB |
| 85 | 1.5 MB |
| 001 Investigating an Incident (OBJ 4.9).mp4 | 72.1 MB |
| 86 | 1.9 MB |
| 009 Attestation of Findings (OBJ 5.5).mp4 | 70.7 MB |
| 87 | 1.3 MB |
| 013 Indications of Malware Attacks (OBJ 2.4).mp4 | 70.5 MB |
| 88 | 1.5 MB |
| 001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4 | 70.5 MB |
| 89 | 1.5 MB |
| 006 Change Management (OBJ 1.3).mp4 | 70.5 MB |
| 90 | 1.5 MB |
| 003 Restricting Applications (OBJ 2.5).mp4 | 70.0 MB |
| 91 | 2.0 MB |
| 001 Cyber Resilience and Redundancy (OBJ 3.4).mp4 | 69.9 MB |
| 92 | 65.6 KB |
| 013 Zero Trust (OBJ 1.2).mp4 | 68.6 MB |
| 93 | 1.4 MB |
| 001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4 | 67.1 MB |
| 94 | 882.1 KB |
| 006 Preventing Phishing Attacks (OBJ 5.6).mp4 | 66.7 MB |
| 95 | 1.3 MB |
| 007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4 | 66.5 MB |
| 96 | 1.5 MB |
| 006 Access Control Vestibules (OBJ 1.2).mp4 | 66.4 MB |
| 97 | 1.6 MB |
| 009 Shadow IT (OBJ 2.1).mp4 | 66.4 MB |
| 98 | 1.6 MB |
| 010 Resilience and Recovery Testing (OBJ 3.4).mp4 | 66.1 MB |
| 99 | 1.9 MB |
| 001 Incident Response (OBJ 4.8).mp4 | 65.6 MB |
| 100 | 379.1 KB |
| 009 SD-WAN and SASE (OBJ 3.2).mp4 | 65.5 MB |
| 101 | 463.4 KB |
| 005 Asset Disposal and Decommissioning (OBJ 4.2).mp4 | 65.4 MB |
| 102 | 599.4 KB |
| 004 Root Cause Analysis (OBJ 4.8).mp4 | 65.2 MB |
| 103 | 801.8 KB |
| 007 Data Backups (OBJ 3.4).mp4 | 65.1 MB |
| 104 | 956.0 KB |
| 002 Distributed Denial of Service (OBJ 2.4).mp4 | 64.9 MB |
| 105 | 1.1 MB |
| 010 Assigning Permissions (OBJ 4.6).mp4 | 63.8 MB |
| 106 | 214.8 KB |
| 011 Selecting Infrastructure Controls (OBJ 3.2).mp4 | 63.2 MB |
| 107 | 839.7 KB |
| 002 Fencing and Bollards (OBJ 1.2).mp4 | 63.1 MB |
| 108 | 883.5 KB |
| 008 Frauds and Scams (OBJ 2.2).mp4 | 63.1 MB |
| 109 | 955.6 KB |
| 002 BONUS Where do I go from here.mp4 | 62.6 MB |
| 110 | 1.4 MB |
| 006 Web and DNS Filtering (OBJ 4.5).mp4 | 62.1 MB |
| 111 | 1.9 MB |
| 003 Impersonation (OBJ 2.2).mp4 | 62.0 MB |
| 112 | 10.7 KB |
| 004 Risk Register (OBJ 5.2).mp4 | 61.8 MB |
| 113 | 181.4 KB |
| 008 Endpoint Detection and Response (OBJ 4.5).mp4 | 61.5 MB |
| 114 | 464.7 KB |
| 001 Vulnerability Management (OBJ 4.3).mp4 | 61.3 MB |
| 115 | 702.1 KB |
| 005 Automating Onboarding (OBJ 4.7).mp4 | 61.1 MB |
| 116 | 883.6 KB |
| 006 Remote and Hybrid Work Environments (OBJ 5.6).mp4 | 61.0 MB |
| 117 | 999.9 KB |
| 003 Attacking with Brute Force (OBJ 2.4).mp4 | 60.8 MB |
| 118 | 1.2 MB |
| 002 High Availability (OBJ 3.4).mp4 | 60.8 MB |
| 119 | 1.2 MB |
| 007 Authentication (OBJ 1.2).mp4 | 60.5 MB |
| 120 | 1.5 MB |
| 009 User Behavior Analytics (OBJ 4.5).mp4 | 60.3 MB |
| 121 | 1.7 MB |
| 002 Viruses (OBJ 2.4).mp4 | 59.9 MB |
| 122 | 130.6 KB |
| 009 Backdoors and Logic Bombs (OBJ 2.4).mp4 | 59.8 MB |
| 123 | 237.4 KB |
| 003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4 | 59.7 MB |
| 124 | 337.9 KB |
| 002 Internal Audits and Assessments (OBJ 5.5).mp4 | 58.0 MB |
| 125 | 2.0 MB |
| 008 Vulnerability Response and Remediation (OBJ 4.3).mp4 | 57.8 MB |
| 126 | 176.8 KB |
| 011 Race Conditions (OBJ 2.3).mp4 | 57.7 MB |
| 127 | 272.4 KB |
| 004 Asset Management (OBJ 4.2).mp4 | 57.3 MB |
| 128 | 729.3 KB |
| 011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4 | 57.3 MB |
| 129 | 746.9 KB |
| 006 Increasing Hash Security (OBJ 1.4).mp4 | 57.2 MB |
| 130 | 774.4 KB |
| 006 Organized Crime (OBJ 2.1).mp4 | 57.1 MB |
| 131 | 875.6 KB |
| 002 Data Classifications (OBJ 3.3).mp4 | 56.7 MB |
| 132 | 1.3 MB |
| 005 Password Attacks (OBJ 2.4).mp4 | 56.5 MB |
| 133 | 1.5 MB |
| 002 Acquisition and Procurement (OBJ 4.2).mp4 | 56.5 MB |
| 134 | 1.5 MB |
| 010 Keylogger (OBJ 2.4).mp4 | 56.5 MB |
| 135 | 1.5 MB |
| 011 Secure Baselines (OBJ 2.5 and 4.1).mp4 | 56.3 MB |
| 136 | 1.7 MB |
| 004 Unnecessary Services (OBJ 2.5).mp4 | 55.6 MB |
| 137 | 375.8 KB |
| 003 Threat Intelligence Feeds (OBJ 4.3).mp4 | 55.6 MB |
| 138 | 406.0 KB |
| 006 Non-repudiation (OBJ 1.2).mp4 | 54.8 MB |
| 139 | 1.2 MB |
| 006 Contracts and Agreements (OBJ 5.3).mp4 | 54.4 MB |
| 140 | 1.6 MB |
| 007 Email Security (OBJ 4.5).mp4 | 54.3 MB |
| 141 | 1.7 MB |
| 007 Data Collection Procedures (OBJ 4.8).mp4 | 54.2 MB |
| 142 | 1.8 MB |
| 004 Automating Support Tickets (OBJ 4.7).mp4 | 54.1 MB |
| 143 | 1.9 MB |
| 009 Non-compliance Consequences (OBJ 5.4).mp4 | 54.0 MB |
| 144 | 2.0 MB |
| 002 Threat Actor Motivations (OBJ 2.1).mp4 | 54.0 MB |
| 145 | 21.9 KB |
| 003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 | 53.4 MB |
| 146 | 617.9 KB |
| 007 Zombies and Botnets (OBJ 2.4).mp4 | 53.2 MB |
| 147 | 840.6 KB |
| 002 Threats and Vulnerabilities.mp4 | 52.6 MB |
| 148 | 1.4 MB |
| 005 Incident Response Training and Testing (OBJ 4.8).mp4 | 52.6 MB |
| 149 | 1.4 MB |
| 010 Indicators of Compromise (IoC).mp4 | 52.5 MB |
| 150 | 1.5 MB |
| 004 Integrity (OBJ 1.2).mp4 | 52.4 MB |
| 151 | 1.6 MB |
| 004 External Audits and Assessments (OBJ 5.5).mp4 | 52.3 MB |
| 152 | 1.7 MB |
| 004 Surveillance Systems (OBJ 1.2).mp4 | 52.3 MB |
| 153 | 1.7 MB |
| 005 Vendor Selection and Monitoring (OBJ 5.3).mp4 | 52.2 MB |
| 154 | 1.8 MB |
| 011 IPSIDS Logs (OBJ 4.9).mp4 | 52.0 MB |
| 155 | 2.0 MB |
| 005 Availability (OBJ 1.2).mp4 | 51.7 MB |
| 156 | 286.6 KB |
| 003 Threat Hunting (OBJ 4.8).mp4 | 51.6 MB |
| 157 | 380.7 KB |
| 007 Reconnaissance in Pentesting (OBJ 5.5).mp4 | 51.1 MB |
| 158 | 878.6 KB |
| 002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4 | 51.1 MB |
| 159 | 905.8 KB |
| 006 Penetration Testing (OBJ 5.5).mp4 | 50.9 MB |
| 160 | 1.1 MB |
| 004 Vendor Assessment (OBJ 5.3).mp4 | 50.8 MB |
| 161 | 1.2 MB |
| 008 NetFlow and Flow Analysis.mp4 | 49.0 MB |
| 162 | 1023.3 KB |
| 012 Gap Analysis (OBJ 1.1).mp4 | 48.7 MB |
| 163 | 1.3 MB |
| 009 Influence Campaigns (OBJ 2.2).mp4 | 48.5 MB |
| 164 | 1.5 MB |
| 006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4 | 48.5 MB |
| 165 | 1.5 MB |
| 004 Automated Reports (OBJ 4.9).mp4 | 48.5 MB |
| 166 | 1.5 MB |
| 003 Cloud Security (OBJ 3.1 & 4.1).mp4 | 48.3 MB |
| 167 | 1.7 MB |
| 005 Bypassing Surveillance Systems (OBJ 2.4).mp4 | 47.7 MB |
| 168 | 342.2 KB |
| 003 Data Ownership (OBJ 4.2 & 5.1).mp4 | 47.6 MB |
| 169 | 440.9 KB |
| 011 Encryption Tools (OBJ 1.4).mp4 | 47.5 MB |
| 170 | 553.1 KB |
| 006 Updates and Patches (OBJ 2.5).mp4 | 47.4 MB |
| 171 | 582.4 KB |
| 008 Data Loss Prevention (DLP) (OBJ 4.4).mp4 | 47.2 MB |
| 172 | 772.1 KB |
| 008 Compliance (OBJ 5.4).mp4 | 47.0 MB |
| 173 | 986.1 KB |
| 008 Rootkits (OBJ 2.4).mp4 | 46.9 MB |
| 174 | 1.1 MB |
| 007 Risk Management Strategies (OBJ 5.2).mp4 | 46.7 MB |
| 175 | 1.3 MB |
| 010 Security Control Categories (OBJ 1.1).mp4 | 46.7 MB |
| 176 | 1.3 MB |
| 002 Changing Default Configurations (OBJ 2.5).mp4 | 46.6 MB |
| 177 | 1.4 MB |
| 004 Responsible Disclosure Programs (OBJ 4.3).mp4 | 46.4 MB |
| 178 | 1.6 MB |
| 003 Mobile Asset Deployments (OBJ 4.1).mp4 | 46.3 MB |
| 179 | 1.7 MB |
| 002 Identity and Access Management (IAM) (OBJ 4.6).mp4 | 46.1 MB |
| 180 | 1.9 MB |
| 004 Directory Traversal Attack (OBJ 2.4).mp4 | 45.8 MB |
| 181 | 237.0 KB |
| 005 Trusted Operating Systems (OBJ 2.5).mp4 | 45.5 MB |
| 182 | 499.5 KB |
| 007 Governance Considerations (OBJ 5.1).mp4 | 45.3 MB |
| 183 | 699.4 KB |
| 004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 | 44.9 MB |
| 184 | 1.1 MB |
| 007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4 | 44.5 MB |
| 185 | 1.5 MB |
| 002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4 | 44.4 MB |
| 186 | 1.6 MB |
| 011 Security Control Types (OBJ 1.1).mp4 | 43.6 MB |
| 187 | 422.3 KB |
| 010 Buffer Overflow (OBJ 2.3 & 2.4).mp4 | 43.5 MB |
| 188 | 509.9 KB |
| 005 Network Access Control (NAC) (OBJ 4.5).mp4 | 43.4 MB |
| 189 | 644.2 KB |
| 002 Monitoring Resources (OBJ 4.4).mp4 | 43.3 MB |
| 190 | 710.6 KB |
| 003 Symmetric Algorithms (OBJ 1.4).mp4 | 43.3 MB |
| 191 | 761.3 KB |
| 005 Execution and Escalation Attack (OBJ 2.4).mp4 | 43.1 MB |
| 192 | 907.8 KB |
| 003 Data Redundancy (OBJ 3.4).mp4 | 42.9 MB |
| 193 | 1.1 MB |
| 003 Risk Identification (OBJ 5.2).mp4 | 42.7 MB |
| 194 | 1.3 MB |
| 003 Confidentiality (OBJ 1.2).mp4 | 42.4 MB |
| 195 | 1.6 MB |
| 013 Embedded Systems (OBJ 3.1 & 4.1).mp4 | 42.0 MB |
| 196 | 9.8 KB |
| 012 Malware Attack Techniques (OBJ 2.4).mp4 | 41.7 MB |
| 197 | 313.1 KB |
| 004 Asymmetric Algorithms (OBJ 1.4).mp4 | 41.5 MB |
| 198 | 546.6 KB |
| 009 Single Pane of Glass (OBJ 4.4).mp4 | 41.2 MB |
| 199 | 841.9 KB |
| 012 Network Logs (OBJ 4.9).mp4 | 40.7 MB |
| 200 | 1.3 MB |
| 006 Microservices (OBJ 3.1).mp4 | 40.3 MB |
| 201 | 1.7 MB |
| 007 Change Management Processes (OBJ 1.3).mp4 | 39.6 MB |
| 202 | 432.1 KB |
| 010 Blockchain (OBJ 1.4).mp4 | 39.4 MB |
| 203 | 616.9 KB |
| 007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4 | 39.4 MB |
| 204 | 628.8 KB |
| 011 Spyware and Bloatware (OBJ 2.4).mp4 | 39.3 MB |
| 205 | 699.0 KB |
| 002 Governance (OBJ 5.1).mp4 | 38.8 MB |
| 206 | 1.2 MB |
| 008 Group Policies (OBJ 2.5 & 4.5).mp4 | 38.6 MB |
| 207 | 1.4 MB |
| 007 Network Infrastructure (OBJ 3.1).mp4 | 38.5 MB |
| 208 | 1.5 MB |
| 005 Zero-day Vulnerabilities (OBJ 2.3).mp4 | 37.9 MB |
| 209 | 91.9 KB |
| 005 IDS and IPS (OBJ 3.2).mp4 | 37.2 MB |
| 210 | 802.3 KB |
| 002 Identifying Vulnerabilities (OBJ 4.3).mp4 | 37.1 MB |
| 211 | 963.8 KB |
| 005 Qualitative Risk Analysis (OBJ 5.2).mp4 | 36.9 MB |
| 212 | 1.1 MB |
| 005 Serverless (OBJ 3.1).mp4 | 36.8 MB |
| 213 | 1.2 MB |
| 003 Performing an Internal Assessment (OBJ 5.5).mp4 | 36.6 MB |
| 214 | 1.4 MB |
| 005 Data Types (OBJ 3.3 & 1.4).mp4 | 36.0 MB |
| 215 | 2.0 MB |
| 009 Documenting Changes (OBJ 1.3).mp4 | 35.8 MB |
| 216 | 244.9 KB |
| 007 Firewall Logs (OBJ 4.9).mp4 | 35.5 MB |
| 217 | 562.9 KB |
| 007 Federation (OBJ 4.6).mp4 | 35.2 MB |
| 218 | 807.8 KB |
| 009 SELinux (OBJ 2.5 & 4.5).mp4 | 35.0 MB |
| 219 | 1016.4 KB |
| 007 Creating a Culture of Security (OBJ 5.6).mp4 | 34.9 MB |
| 220 | 1.1 MB |
| 004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4 | 34.5 MB |
| 221 | 1.5 MB |
| 003 Dashboards (OBJ 4.9).mp4 | 34.4 MB |
| 222 | 1.6 MB |
| 009 Validating Vulnerability Remediation (OBJ 4.3).mp4 | 34.1 MB |
| 223 | 1.9 MB |
| 005 Performing an External Assessment (OBJ 5.5).mp4 | 34.1 MB |
| 224 | 1.9 MB |
| 009 Infrastructure as Code (IaC) (OBJ 3.1).mp4 | 34.0 MB |
| 225 | 26.3 KB |
| 003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4 | 33.8 MB |
| 226 | 158.2 KB |
| 005 Standards (OBJ 5.1).mp4 | 33.8 MB |
| 227 | 199.7 KB |
| 007 Session Hijacking (OBJ 2.4).mp4 | 33.8 MB |
| 228 | 217.5 KB |
| 010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4 | 33.8 MB |
| 229 | 232.9 KB |
| 006 Data from Security Tools (OBJ 4.4).mp4 | 33.5 MB |
| 230 | 538.2 KB |
| 003 Threat Actor Attributes (OBJ 2.1).mp4 | 33.0 MB |
| 231 | 1.0 MB |
| 008 Software-Defined Network (SDN) (OBJ 3.1).mp4 | 32.8 MB |
| 232 | 1.2 MB |
| 010 Data Encryption Levels (2.5).mp4 | 32.7 MB |
| 233 | 1.3 MB |
| 004 Data States (OBJ 3.3).mp4 | 32.6 MB |
| 234 | 1.4 MB |
| 012 ICS and SCADA (OBJ 3.1 & 4.1).mp4 | 32.5 MB |
| 235 | 1.5 MB |
| 006 Automating Security (OBJ 4.7).mp4 | 32.4 MB |
| 236 | 1.6 MB |
| 008 Technical Implications of Changes (OBJ 1.3).mp4 | 32.4 MB |
| 237 | 1.6 MB |
| 005 Hacktivists (OBJ 2.1).mp4 | 32.3 MB |
| 238 | 1.7 MB |
| 008 On-Path Attacks.mp4 | 31.9 MB |
| 239 | 88.1 KB |
| 004 Policies (OBJ 5.1).mp4 | 31.9 MB |
| 240 | 101.1 KB |
| 006 Procedures (OBJ 5.1).mp4 | 30.7 MB |
| 241 | 1.3 MB |
| 009 Accounting (OBJ 1.2).mp4 | 30.7 MB |
| 242 | 1.3 MB |
| 013 Metadata (OBJ 4.9).mp4 | 29.8 MB |
| 243 | 174.8 KB |
| 004 Trojans (OBJ 2.4).mp4 | 29.8 MB |
| 244 | 241.3 KB |
| 008 Risk Monitoring and Reporting (OBJ 5.2).mp4 | 28.8 MB |
| 245 | 1.2 MB |
| 009 Endpoint Logs (OBJ 4.9).mp4 | 28.6 MB |
| 246 | 1.4 MB |
| 008 Authorization (OBJ 1.2).mp4 | 28.6 MB |
| 247 | 1.4 MB |
| 006 Replay Attacks (OBJ 2.4).mp4 | 28.5 MB |
| 248 | 1.5 MB |
| 008 Application Logs (OBJ 4.9).mp4 | 27.5 MB |
| 249 | 478.2 KB |
| 003 Governance Structures (OBJ 5.1).mp4 | 27.0 MB |
| 250 | 1.0 MB |
| 003 Worms (OBJ 2.4).mp4 | 26.1 MB |
| 251 | 1.9 MB |
| 004 Unskilled Attackers (OBJ 2.1).mp4 | 25.9 MB |
| 252 | 91.3 KB |
| 010 OS-specific Security Logs (OBJ 4.9).mp4 | 25.7 MB |
| 253 | 264.4 KB |
| 004 Configuring a RAID (OBJ 3.4).mp4 | 25.6 MB |
| 254 | 360.9 KB |
| 009 Exploring Digital Certificates (OBJ 1.4).mp4 | 23.8 MB |
| 255 | 221.1 KB |
| 009 Injection Attacks.mp4 | 23.7 MB |
| 256 | 325.5 KB |
| 008 Privileged Access Management (PAM) (OBJ 4.6).mp4 | 23.7 MB |
| 257 | 328.0 KB |
| 007 Securing Data (OBJ 3.3).mp4 | 22.3 MB |
| 258 | 1.7 MB |
| 006 Data Sovereignty (OBJ 3.3).mp4 | 22.1 MB |
| 259 | 1.9 MB |
| 002 Risk Assessment Frequency (OBJ 5.2).mp4 | 21.3 MB |
| 260 | 722.9 KB |
| 006 Quantitative Risk Analysis (OBJ 5.2).mp4 | 21.2 MB |
Name
DL
Uploader
Size
S/L
Added
-
11.0 MB
[4
/
0]
2023-07-01
| Uploaded by FreeCourseWeb | Size 11.0 MB | Health [ 4 /0 ] | Added 2023-07-01 |
-
70.5 MB
[2
/
1]
2023-12-11
| Uploaded by FreeCourseWeb | Size 70.5 MB | Health [ 2 /1 ] | Added 2023-12-11 |
-
2.6 MB
[19
/
0]
2024-05-16
| Uploaded by FreeCourseWeb | Size 2.6 MB | Health [ 19 /0 ] | Added 2024-05-16 |
NOTE
SOURCE: CompTIA Security SY0 701 Complete Course Exam
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


