File List
-
01 Overview of Security/001 Welcome.mp4 93.8 MB
01 Overview of Security/002 CompTIA-Security-Study-Guide.pdf 5.02 MB
01 Overview of Security/002 Download the Study Guide.html 1.06 KB
01 Overview of Security/003 Overview of Security.mp4 64.44 MB
01 Overview of Security/004 CIA Triad.mp4 74.47 MB
01 Overview of Security/005 AAA of Security.mp4 59.85 MB
01 Overview of Security/006 Security Threats.mp4 64.17 MB
01 Overview of Security/007 Mitigating Threats.mp4 54.86 MB
01 Overview of Security/008 Hackers.mp4 104.89 MB
01 Overview of Security/009 Threat Actors.mp4 68.27 MB
02 Malware/010 Malware.mp4 15.01 MB
02 Malware/011 Viruses.mp4 134.66 MB
02 Malware/012 Worms.mp4 47.86 MB
02 Malware/013 Trojans.mp4 62.5 MB
02 Malware/014 Demo Viruses and Trojans.mp4 91.56 MB
02 Malware/015 Ransomware.mp4 53.37 MB
02 Malware/016 Spyware.mp4 58.14 MB
02 Malware/017 Rootkits.mp4 75.59 MB
02 Malware/018 Spam.mp4 65.14 MB
02 Malware/019 Summary of Malware.mp4 44.67 MB
03 Malware Infections/020 Malware Infections.mp4 93.17 MB
03 Malware Infections/021 Common Delivery Methods.mp4 96.88 MB
03 Malware Infections/022 Demo Phishing.mp4 49.92 MB
03 Malware Infections/023 Botnets and Zombies.mp4 62.46 MB
03 Malware Infections/024 Active Interception and Privilege Escalation.mp4 40.59 MB
03 Malware Infections/025 Demo Privilege Escalation.mp4 75.49 MB
03 Malware Infections/026 Backdoors and Logic Bombs.mp4 84.09 MB
03 Malware Infections/027 Symptoms of Infection.mp4 91.4 MB
03 Malware Infections/028 Removing Malware.mp4 108.29 MB
03 Malware Infections/029 Preventing Malware.mp4 128.84 MB
04 Security Applications and Devices/030 Security Applications and Devices.mp4 12.76 MB
04 Security Applications and Devices/031 Software Firewalls.mp4 91.43 MB
04 Security Applications and Devices/032 Demo Software Firewalls.mp4 61.53 MB
04 Security Applications and Devices/033 IDS.mp4 105.77 MB
04 Security Applications and Devices/034 Pop-up Blockers.mp4 66.62 MB
04 Security Applications and Devices/035 Data Loss Prevention (DLP).mp4 81.64 MB
04 Security Applications and Devices/036 Securing the BIOS.mp4 86.17 MB
04 Security Applications and Devices/037 Securing Storage Devices.mp4 73.04 MB
04 Security Applications and Devices/038 Disk Encryption.mp4 106.73 MB
05 Mobile Device Security/039 Mobile Device Security.mp4 28.44 MB
05 Mobile Device Security/040 Securing Wireless Devices.mp4 33.55 MB
05 Mobile Device Security/041 Mobile Malware.mp4 139.49 MB
05 Mobile Device Security/042 SIM Cloning ID Theft.mp4 86.69 MB
05 Mobile Device Security/043 Bluetooth Attacks.mp4 47.75 MB
05 Mobile Device Security/044 Mobile Device Theft.mp4 69.78 MB
05 Mobile Device Security/045 Security of Apps.mp4 109.42 MB
05 Mobile Device Security/046 BYOD.mp4 107.63 MB
05 Mobile Device Security/047 Hardening Mobile Devices.mp4 81.84 MB
06 Hardening/048 Hardening.mp4 39.72 MB
06 Hardening/049 Unnecessary Applications.mp4 69.15 MB
06 Hardening/050 Restricting Applications.mp4 61.92 MB
06 Hardening/051 Demo Unnecessary Services.mp4 62.36 MB
06 Hardening/052 Trusted Operating System.mp4 42.64 MB
06 Hardening/053 Updates and Patches.mp4 74.21 MB
06 Hardening/054 Patch Management.mp4 83.43 MB
06 Hardening/055 Group Policies.mp4 56.44 MB
06 Hardening/056 Demo Group Policies.mp4 30.89 MB
06 Hardening/057 File Systems and Hard Drives.mp4 69.02 MB
07 Virtualization/058 Virtualization.mp4 46.65 MB
07 Virtualization/059 Hypervisors.mp4 57.45 MB
07 Virtualization/060 Demo How to create a VM.mp4 38.72 MB
07 Virtualization/061 Threats to VMs.mp4 80.93 MB
07 Virtualization/062 Securing VMs.mp4 82.44 MB
07 Virtualization/063 Demo Securing VMs.mp4 43.11 MB
08 Application Security/064 Application Security.mp4 38.61 MB
08 Application Security/065 Web Browser Security.mp4 145.13 MB
08 Application Security/066 Web Browser Concerns.mp4 71.04 MB
08 Application Security/067 Demo Web Browser Configuration.mp4 46.06 MB
08 Application Security/068 Securing Applications.mp4 106.28 MB
09 Secure Software Development/069 Software Development.mp4 188.76 MB
09 Secure Software Development/070 SDLC Principles.mp4 136.96 MB
09 Secure Software Development/071 Testing Methods.mp4 151.04 MB
09 Secure Software Development/072 Software Vulnerabilities and Exploits.mp4 81.85 MB
09 Secure Software Development/073 Buffer Overflows.mp4 135.64 MB
09 Secure Software Development/074 Demo Buffer Overflow Attack.mp4 101.76 MB
09 Secure Software Development/075 XSS and XSRF.mp4 68.72 MB
09 Secure Software Development/076 SQL Injection.mp4 141.47 MB
09 Secure Software Development/077 Demo SQL Injection.mp4 74.85 MB
10 Network Design/078 Network Security.mp4 16.6 MB
10 Network Design/079 The OSI Model.mp4 128.51 MB
10 Network Design/080 Switches.mp4 77.26 MB
10 Network Design/081 Routers.mp4 54.31 MB
10 Network Design/082 Network Zones.mp4 69.46 MB
10 Network Design/083 Network Access Control.mp4 56.67 MB
10 Network Design/084 VLANs.mp4 33.11 MB
10 Network Design/085 Subnetting.mp4 41.36 MB
10 Network Design/086 Network Address Translation.mp4 52.66 MB
10 Network Design/087 Telephony.mp4 130.69 MB
11 Perimeter Security/088 Perimeter Security.mp4 17.79 MB
11 Perimeter Security/089 Firewalls.mp4 175.29 MB
11 Perimeter Security/090 Demo SOHO Firewall.mp4 28.93 MB
11 Perimeter Security/091 Proxy Servers.mp4 91.68 MB
11 Perimeter Security/092 Honeypots and Honeynets.mp4 30.69 MB
11 Perimeter Security/093 Data Loss Prevention.mp4 35.35 MB
11 Perimeter Security/094 NIDS and NIPS.mp4 92.37 MB
11 Perimeter Security/095 Unified Threat Management.mp4 41.62 MB
12 Cloud Security/096 Cloud Computing.mp4 76.42 MB
12 Cloud Security/097 Cloud Types.mp4 63.19 MB
12 Cloud Security/098 As a Service.mp4 154.35 MB
12 Cloud Security/099 Cloud Security.mp4 53.42 MB
12 Cloud Security/100 Defending Servers.mp4 99.54 MB
13 Network Attacks/101 Network Attacks.mp4 14.53 MB
13 Network Attacks/102 Ports and Protocols.mp4 95.7 MB
13 Network Attacks/103 Memorization of Ports.mp4 238.39 MB
13 Network Attacks/104 Unnecessary Ports.mp4 75.22 MB
13 Network Attacks/105 Denial of Service.mp4 170.22 MB
13 Network Attacks/106 DDoS.mp4 33.73 MB
13 Network Attacks/107 Stopping a DDoS.mp4 52.44 MB
13 Network Attacks/108 Spoofing.mp4 28.53 MB
13 Network Attacks/109 Hijacking.mp4 74.66 MB
13 Network Attacks/110 Replay Attack.mp4 32.02 MB
13 Network Attacks/111 Demo Null Sessions.mp4 38.61 MB
13 Network Attacks/112 Transitive Attacks.mp4 31.63 MB
13 Network Attacks/113 DNS Attacks.mp4 96.23 MB
13 Network Attacks/114 ARP Poisoning.mp4 32.57 MB
14 Securing Networks/115 Securing Networks.mp4 18.57 MB
14 Securing Networks/116 Securing Network Devices.mp4 146.75 MB
14 Securing Networks/117 Securing Network Media.mp4 189.94 MB
14 Securing Networks/118 Securing WiFi Devices.mp4 97.01 MB
14 Securing Networks/119 Wireless Encryption.mp4 120.29 MB
14 Securing Networks/120 Wireless Access Points.mp4 136.64 MB
14 Securing Networks/121 Wireless Attacks.mp4 91.49 MB
14 Securing Networks/122 Demo Wireless Attack.mp4 103.31 MB
14 Securing Networks/123 Other Wireless Technologies.mp4 132.2 MB
15 Physical Security/124 Physical Security.mp4 33.92 MB
15 Physical Security/125 Surveillance.mp4 60.79 MB
15 Physical Security/126 Door Locks.mp4 85.01 MB
15 Physical Security/127 Demo Lock Picking.mp4 36.73 MB
15 Physical Security/128 Biometric Readers.mp4 92.13 MB
16 Facilities Security/129 Facilities Security.mp4 13.93 MB
16 Facilities Security/130 Fire Suppression.mp4 138.65 MB
16 Facilities Security/131 HVAC.mp4 53.25 MB
16 Facilities Security/132 Shielding.mp4 55.21 MB
16 Facilities Security/133 Vehicles.mp4 45.26 MB
17 Authentication/134 Authentication.mp4 129.73 MB
17 Authentication/135 Authentication Models.mp4 114.32 MB
17 Authentication/136 802.1x.mp4 79.81 MB
17 Authentication/137 LDAP and Kerberos.mp4 53.68 MB
17 Authentication/138 Remote Desktop Services.mp4 40.36 MB
17 Authentication/139 Remote Access Service.mp4 44.42 MB
17 Authentication/140 VPN.mp4 63.56 MB
17 Authentication/141 RADIUS vs TACACS.mp4 49.87 MB
17 Authentication/142 Authentication Summary.mp4 43.71 MB
18 Access Control/143 Access Control.mp4 18.6 MB
18 Access Control/144 Access Control Models.mp4 176.15 MB
18 Access Control/145 Best Practices.mp4 126.18 MB
18 Access Control/146 Users and Groups.mp4 201.38 MB
18 Access Control/147 Permissions.mp4 81.02 MB
18 Access Control/148 Usernames and Passwords.mp4 55.61 MB
18 Access Control/149 Demo Policies.mp4 32.95 MB
18 Access Control/150 User Account Control.mp4 40.83 MB
19 Risk Assessments/151 Risk Assessments.mp4 188.59 MB
19 Risk Assessments/152 Qualitative Risk.mp4 91.5 MB
19 Risk Assessments/153 Quantitative Risk.mp4 119.95 MB
19 Risk Assessments/154 Methodologies.mp4 59.43 MB
19 Risk Assessments/155 Security Controls.mp4 149.03 MB
19 Risk Assessments/156 Vulnerability Management.mp4 171.62 MB
19 Risk Assessments/157 Penetration Testing.mp4 98.42 MB
19 Risk Assessments/158 OVAL.mp4 32.66 MB
19 Risk Assessments/159 Vulnerability Assessments.mp4 139.57 MB
19 Risk Assessments/160 Demo Nmap Scanning.mp4 97.26 MB
19 Risk Assessments/161 Demo Vulnerability Scanning.mp4 96.56 MB
19 Risk Assessments/162 Password Analysis.mp4 127.42 MB
19 Risk Assessments/163 Demo Password Cracking.mp4 39.04 MB
20 Monitoring and Auditing/164 Monitoring Types.mp4 62.46 MB
20 Monitoring and Auditing/165 Performance Baselining.mp4 102.38 MB
20 Monitoring and Auditing/166 Protocol Analyzers.mp4 64.92 MB
20 Monitoring and Auditing/167 SNMP.mp4 79.36 MB
20 Monitoring and Auditing/168 Demo Analytical Tools.mp4 48.58 MB
20 Monitoring and Auditing/169 Auditing.mp4 42.7 MB
20 Monitoring and Auditing/170 Demo Auditing Files.mp4 52.84 MB
20 Monitoring and Auditing/171 Logging.mp4 79.54 MB
20 Monitoring and Auditing/172 Log Files.mp4 114.82 MB
20 Monitoring and Auditing/173 SIEM.mp4 63.01 MB
21 Cryptography/174 Cryptography.mp4 107.94 MB
21 Cryptography/175 Symmetric vs Asymmetric.mp4 134 MB
21 Cryptography/176 Symmetric Algorithms.mp4 103.4 MB
21 Cryptography/177 Public Key Cryptography.mp4 52.38 MB
21 Cryptography/178 Asymmetric Algorithms.mp4 81.35 MB
21 Cryptography/179 Pretty Good Privacy.mp4 38.63 MB
21 Cryptography/180 Key Management.mp4 47.95 MB
21 Cryptography/181 One-Time Pad.mp4 94.51 MB
21 Cryptography/182 Demo Steganography.mp4 42.15 MB
21 Cryptography/183 Hashing.mp4 170.04 MB
21 Cryptography/184 Demo Hashing.mp4 38.54 MB
21 Cryptography/185 Hashing Attacks.mp4 70.64 MB
21 Cryptography/186 Increasing Hash Security.mp4 31.97 MB
22 Public Key Infrastructure/187 Public Key Infrastructure.mp4 51.15 MB
22 Public Key Infrastructure/188 Digital Certificates.mp4 144.5 MB
22 Public Key Infrastructure/189 Demo Certificates.mp4 27.99 MB
22 Public Key Infrastructure/190 Certificate Authorities.mp4 89.81 MB
22 Public Key Infrastructure/191 Web of Trust.mp4 57.34 MB
23 Security Protocols/192 Security Protocols.mp4 8.7 MB
23 Security Protocols/193 SMIME.mp4 33 MB
23 Security Protocols/194 SSL and TLS.mp4 127.62 MB
23 Security Protocols/195 SSH.mp4 54.4 MB
23 Security Protocols/196 VPN Protocols.mp4 143.55 MB
23 Security Protocols/197 Demo Setting up a VPN.mp4 24.77 MB
24 Planning for the Worst/198 Planning for the Worst.mp4 47.74 MB
24 Planning for the Worst/199 Redundant Power.mp4 68.69 MB
24 Planning for the Worst/200 Backup Power.mp4 68.99 MB
24 Planning for the Worst/201 Data Redundancy.mp4 100.31 MB
24 Planning for the Worst/202 Demo RAIDs.mp4 39.33 MB
24 Planning for the Worst/203 Network Redundancy.mp4 46.67 MB
24 Planning for the Worst/204 Server Redundancy.mp4 38.34 MB
24 Planning for the Worst/205 Redundant Sites.mp4 50.7 MB
24 Planning for the Worst/206 Data Backup.mp4 62.71 MB
24 Planning for the Worst/207 Tape Rotation.mp4 85.12 MB
24 Planning for the Worst/208 Disaster Recovery Plan.mp4 123.19 MB
25 Social Engineering/209 Social Engineering.mp4 19.74 MB
25 Social Engineering/210 Demo Pretexting.mp4 94 MB
25 Social Engineering/211 Insider Threat.mp4 48.34 MB
25 Social Engineering/212 Phishing.mp4 27.37 MB
25 Social Engineering/213 More Social Engineering.mp4 88.13 MB
25 Social Engineering/214 User Education.mp4 105.26 MB
26 Policies and Procedures/215 Policies and Procedures.mp4 126.68 MB
26 Policies and Procedures/216 Data Classifications.mp4 145.37 MB
26 Policies and Procedures/217 PII and PHI.mp4 134.04 MB
26 Policies and Procedures/218 Security Policies.mp4 225.33 MB
26 Policies and Procedures/219 User Education.mp4 88.88 MB
26 Policies and Procedures/220 Vendor Relationships.mp4 169.41 MB
26 Policies and Procedures/221 Disposal Policies.mp4 110.05 MB
26 Policies and Procedures/222 Incident Response Procedures.mp4 100.53 MB
26 Policies and Procedures/223 Data Collection Procedures.mp4 70.77 MB
26 Policies and Procedures/224 Demo Disk Imaging.mp4 69.47 MB
26 Policies and Procedures/225 IT Security Frameworks.mp4 71.12 MB
27 Conclusion/226 Conclusion.mp4 71.64 MB
27 Conclusion/227 Exam Tricks.mp4 92.72 MB
27 Conclusion/228 BONUS Where to go from here.mp4 59.93 MB
27 Conclusion/external-assets-links.txt 151 B
Download Info
-
Tips
“UD59” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.