[CourseClub NET] CBT Nuggets - Comptia Security Plus sy0-501

Photo unavailable
Category:
Date:
07/11/18 at 1:07pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
4.4 GB in 88 files

Torrent Status:
  This torrent has been verified.

Infohash:
c62b089215e5a6a85b1126bf48a12661305a458e


File list

  • [CourseClub NET] CBT Nuggets - Comptia Security Plus sy0-501
  • icon 001 Welcome to Security+.mp4 25.5 MB
    icon 002 Infrastructure Security Devices.mp4 89 MB
    icon 003 Application and Traffic Analysis .mp4 38.7 MB
    icon 004 Network Segmentation and Separation with VLANs.mp4 51.9 MB
    icon 005 ACL Case Study.mp4 59.9 MB
    icon 006 Design Considerations.mp4 75.3 MB
    icon 007 NAT and PAT Case Study.mp4 45.7 MB
    icon 008 Firewall and Switch Protection Mechanisms.mp4 58 MB
    icon 009 Virtualization Overview.mp4 52.7 MB
    icon 010 IPsec_ Protocols_ and Well-known Ports.mp4 68.3 MB
    icon 011 ICMP and a Few More Protocols.mp4 60.4 MB
    icon 012 Security for WiFi.mp4 95 MB
    icon 013 Risk Overview.mp4 92.5 MB
    icon 014 Risk Calculation.mp4 68.9 MB
    icon 015 Attack Vectors_ Risk Management_ and Recovery.mp4 42 MB
    icon 016 Third-Party Risk from Integration.mp4 39.9 MB
    icon 017 Change Management and Account Auditing.mp4 59 MB
    icon 018 Data Loss Prevention (DLP).mp4 40.9 MB
    icon 019 Forensics.mp4 73.1 MB
    icon 020 Incident Response Concepts.mp4 43.5 MB
    icon 021 Security Awareness_ RBAC_ and Data Labeling .mp4 54.4 MB
    icon 022 Passwords_ Best Practices_ and Standards.mp4 54.3 MB
    icon 023 Environmental Controls.mp4 39.8 MB
    icon 024 Physical Security.mp4 48 MB
    icon 025 Business Continuity.mp4 65.1 MB
    icon 026 Fault Tolerance.mp4 67.2 MB
    icon 027 Controls for Confidentiality .mp4 50 MB
    icon 028 Tools and Controls for Data Integrity.mp4 68.8 MB
    icon 029 Availability and Safety.mp4 20.9 MB
    icon 030 Malware_ Adware - Spyware.mp4 43.3 MB
    icon 031 Trojans_ Backdoors_ and More Malware.mp4 68.8 MB
    icon 032 Attack Types MITM - Spear Fishing.mp4 72.2 MB
    icon 033 Attack Types_ Xmas - Client Side.mp4 55.1 MB
    icon 034 Password Attacks and Watering Holes.mp4 51 MB
    icon 035 Social Engineering Threats.mp4 48.9 MB
    icon 036 Vishing and Why Social Engineering Works.mp4 43.1 MB
    icon 037 Wireless Attacks.mp4 55.8 MB
    icon 038 Cross-site and Injection Attacks.mp4 64.6 MB
    icon 039 Application Attacks.mp4 46.8 MB
    icon 040 Monitoring and Device Hardening.mp4 70.6 MB
    icon 041 Baselines_ Detection_ and Reporting.mp4 38.7 MB
    icon 042 Analyzers and Scanners.mp4 75.2 MB
    icon 043 Discovering and Assessing Threats.mp4 58.1 MB
    icon 044 Penetration Testing.mp4 48.8 MB
    icon 045 Techniques for Securing Apps.mp4 39.7 MB
    icon 046 Application Security Controls.mp4 56.1 MB
    icon 047 Mobile Device Security Overview.mp4 70.6 MB
    icon 048 Host Security.mp4 43 MB
    icon 049 Hardware and Virtualization Security.mp4 46.4 MB
    icon 050 Data Security.mp4 40.1 MB
    icon 051 Securing Data with H_W_ Controls_ and Policy.mp4 39.5 MB
    icon 052 Security in Static Environments.mp4 54.4 MB
    icon 053 AAA Concepts.mp4 36.9 MB
    icon 054 Authentication Protocols and Services.mp4 68.7 MB
    icon 055 Multifactor Authentication.mp4 51.2 MB
    icon 056 Authentication Controls.mp4 71.7 MB
    icon 057 Controlling Access via Authorization.mp4 68.9 MB
    icon 058 Account Management.mp4 76.8 MB
    icon 059 Symmetric and Asymmetric Encryption.mp4 69.6 MB
    icon 060 Crypto Key Management.mp4 81.8 MB
    icon 061 Hashing and Encryption Protocols.mp4 72.2 MB
    icon 062 Comparing Cryptography Algorithms.mp4 63 MB
    icon 063 PKI Overview.mp4 55.2 MB
    icon 064 Certificate Warnings and Trust Models.mp4 37.7 MB
    icon 065 Layered Security Case Study.mp4 39.2 MB
    icon 066 Attack Types and Vectors.mp4 15.7 MB
    icon 067 Threat Actor Types and Ethics.mp4 20.2 MB
    icon 068 Reconnaissance Information Gathering Concepts.mp4 36.6 MB
    icon 069 Hacking Vocabulary and Terms.mp4 22.4 MB
    icon 070 Malware Concepts.mp4 34 MB
    icon 071 Network Scanning Overview.mp4 13.7 MB
    icon 072 Trojans.mp4 37.3 MB
    icon 073 Port Security.mp4 38.8 MB
    icon 074 Scanning Methodologies.mp4 32.7 MB
    icon 075 Sniffing Overview.mp4 43.5 MB
    icon 076 Vulnerability Scanning.mp4 29.5 MB
    icon 077 Social Engineering Overview.mp4 50.9 MB
    icon 078 System Hacking Stages and Goals.mp4 34.2 MB
    icon 079 Buffer Overflow.mp4 48.4 MB
    icon 080 OWASP BWAP.mp4 36.2 MB
    icon 081 Honeypots and Honeynets.mp4 41.3 MB
    icon 082 Centralized Identity Management.mp4 49.8 MB
    icon 083 SSO_ Kerberos_ and Security Threats.mp4 63.8 MB
    icon 084 Incident Response.mp4 44.2 MB
    icon 085 Penetration Testing Legally.mp4 37.5 MB
    icon 086 Case Study #1.mp4 75.9 MB
    icon [CourseClub.NET].txt 1.2 KB
    icon [FreeCourseSite.com].txt 1.1 KB

Similar Torrents