Udemy - Security + Comptia Security Plus Sy0-701 Certification Prep

Photo unavailable
Category:
Date:
12/14/23 at 6:21pm GMT+1
Submitter:
Seeders:
12
Leechers:
1
File size:
4 GB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
9908439a4f45c2393e1c2bcdf1e1875cd7e70a78


File list

  • Udemy - Security + Comptia Security Plus Sy0-701 Certification Prep
  • icon ~Get Your Files Here !/1 - Introduction to Security CompTIA Security Plus SY0701 Certification Prep/1 - Introduction to security.mp4 27.9 MB
    icon ~Get Your Files Here !/10 - Intrusion Detection Systems/53 - Understanding IDSs and IPSs.mp4 36.2 MB
    icon ~Get Your Files Here !/10 - Intrusion Detection Systems/54 - Detection Methods.mp4 17.2 MB
    icon ~Get Your Files Here !/10 - Intrusion Detection Systems/55 - Honeypots.mp4 19.1 MB
    icon ~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/56 - Using VPNs for Remote Access.mp4 46.2 MB
    icon ~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/57 - VPN Tunnel Protocols.mp4 20.6 MB
    icon ~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/58 - SitetoSite VPNs.mp4 13.6 MB
    icon ~Get Your Files Here !/12 - Security Threats/59 - Understanding Threat Actors.mp4 56.2 MB
    icon ~Get Your Files Here !/12 - Security Threats/60 - Viruses.mp4 9 MB
    icon ~Get Your Files Here !/12 - Security Threats/61 - Logic Bombs.mp4 9.5 MB
    icon ~Get Your Files Here !/12 - Security Threats/62 - Trojans.mp4 16 MB
    icon ~Get Your Files Here !/12 - Security Threats/63 - Ransomware.mp4 13.6 MB
    icon ~Get Your Files Here !/12 - Security Threats/64 - Spyware.mp4 8.8 MB
    icon ~Get Your Files Here !/12 - Security Threats/65 - Bots and Botnets.mp4 13.1 MB
    icon ~Get Your Files Here !/12 - Security Threats/66 - Unified Threat ManagementUTM.mp4 23.7 MB
    icon ~Get Your Files Here !/13 - Securing Wireless Networks/67 - Disable SSID Broadcasting or Not.mp4 4.2 MB
    icon ~Get Your Files Here !/13 - Securing Wireless Networks/68 - Enable MAC Filtering.mp4 9.1 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/69 - Disassociation Attacks.mp4 8.5 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/70 - WPS and WPS Attacks.mp4 7.5 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/71 - Rogue AP.mp4 8.5 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/72 - Evil Twin.mp4 8 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/73 - Jamming Attacks.mp4 16.9 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/74 - Bluetooth Attacks.mp4 9.8 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/75 - RFID Attacks.mp4 8.7 MB
    icon ~Get Your Files Here !/14 - Understanding Wireless Attacks/76 - Wireless Replay Attacks.mp4 5.7 MB
    icon ~Get Your Files Here !/15 - Network Attacks/77 - Network Attacks.mp4 15.6 MB
    icon ~Get Your Files Here !/15 - Network Attacks/78 - SYN Flood Attack.mp4 12.2 MB
    icon ~Get Your Files Here !/15 - Network Attacks/79 - MAC Flood Attacks.mp4 11.7 MB
    icon ~Get Your Files Here !/15 - Network Attacks/80 - ManintheMiddle Attacks.mp4 6.7 MB
    icon ~Get Your Files Here !/15 - Network Attacks/81 - ARP Poisoning Attacks.mp4 19.3 MB
    icon ~Get Your Files Here !/15 - Network Attacks/82 - DNS Attacks.mp4 32.8 MB
    icon ~Get Your Files Here !/16 - Password Attacks/83 - Brute Force Attacks.mp4 18.8 MB
    icon ~Get Your Files Here !/16 - Password Attacks/84 - Password Hashes.mp4 22.7 MB
    icon ~Get Your Files Here !/16 - Password Attacks/85 - Birthday Attacks.mp4 27 MB
    icon ~Get Your Files Here !/16 - Password Attacks/86 - Replay Attacks.mp4 13.3 MB
    icon ~Get Your Files Here !/16 - Password Attacks/87 - Hijacking and Related Attacks.mp4 21.7 MB
    icon ~Get Your Files Here !/16 - Password Attacks/88 - Driver Manipulation.mp4 11.2 MB
    icon ~Get Your Files Here !/17 - ZeroDay Attacks/89 - ZeroDay Attacks.mp4 15.3 MB
    icon ~Get Your Files Here !/18 - Code Attacks/90 - Code Reuse and SDKs.mp4 16.8 MB
    icon ~Get Your Files Here !/18 - Code Attacks/91 - Code Quality and Testing.mp4 11.3 MB
    icon ~Get Your Files Here !/18 - Code Attacks/92 - Development LifeCycle Models.mp4 14.4 MB
    icon ~Get Your Files Here !/18 - Code Attacks/93 - Secure DevOps.mp4 12.5 MB
    icon ~Get Your Files Here !/18 - Code Attacks/94 - Version Control and Change Management.mp4 10 MB
    icon ~Get Your Files Here !/18 - Code Attacks/95 - Provisioning and Deprovisioning.mp4 7.3 MB
    icon ~Get Your Files Here !/19 - Web Server Attacks/100 - CrossSite Scripting.mp4 25.1 MB
    icon ~Get Your Files Here !/19 - Web Server Attacks/96 - Web Servers.mp4 5.4 MB
    icon ~Get Your Files Here !/19 - Web Server Attacks/97 - SQL Injection Attacks.mp4 19.6 MB
    icon ~Get Your Files Here !/19 - Web Server Attacks/98 - Protecting Against SQL Injection Attacks.mp4 11.1 MB
    icon ~Get Your Files Here !/19 - Web Server Attacks/99 - DLL Injection.mp4 11.8 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/10 - Introducing Basic Risk Concepts.mp4 11.1 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/2 - What is Security.mp4 8.5 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/3 - PrivacyIntegrityAvailability.mp4 15.1 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/4 - Encryption and Access Control.mp4 11.8 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/5 - 3 A Rule Authentication Authorization and Accounting.mp4 12.1 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/6 - Threat.mp4 12.6 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/7 - What is a Hacker.mp4 17.7 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/8 - What is Attack What are the Stages.mp4 12 MB
    icon ~Get Your Files Here !/2 - Basic Security Concepts/9 - Single Point Of Failure SPOF.mp4 10.4 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/101 - Social Engineering.mp4 20.5 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/102 - Shoulder Surfing.mp4 4.4 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/103 - Tricking Users with Hoaxes.mp4 5 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/104 - Tailgating and Mantraps.mp4 5.7 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/105 - Dumpster Diving.mp4 7.6 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/106 - Watering Hole Attacks.mp4 5.6 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/107 - Spam.mp4 9.5 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/108 - Phishing.mp4 59.8 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/109 - Whaling.mp4 13.1 MB
    icon ~Get Your Files Here !/20 - Social Engineering Attacks/110 - Vishing.mp4 14.8 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/111 - Buffer Overflow Attacks.mp4 17.2 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/112 - Pointer Dereference.mp4 8.5 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/113 - Compiled Versus Runtime Code.mp4 5.4 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/114 - Proper Input Validation.mp4 16.6 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/115 - Side Input Validation.mp4 13.3 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/116 - Avoiding Race Conditions.mp4 9.8 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/117 - Proper Error Handling.mp4 9.1 MB
    icon ~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/118 - Cryptographic Techniques.mp4 7 MB
    icon ~Get Your Files Here !/22 - Preventing Attacks/119 - Protecting Systems from Malware.mp4 8.3 MB
    icon ~Get Your Files Here !/22 - Preventing Attacks/120 - Antivirus and AntiMalware Software.mp4 44.3 MB
    icon ~Get Your Files Here !/22 - Preventing Attacks/121 - Advanced Malware Tools.mp4 13.3 MB
    icon ~Get Your Files Here !/22 - Preventing Attacks/122 - Educating Users.mp4 7.5 MB
    icon ~Get Your Files Here !/23 - Server Security/123 - Implementing Secure Systems.mp4 17.9 MB
    icon ~Get Your Files Here !/23 - Server Security/124 - Operating systems.mp4 12.7 MB
    icon ~Get Your Files Here !/23 - Server Security/125 - Secure Operating System Configurations.mp4 36.4 MB
    icon ~Get Your Files Here !/23 - Server Security/126 - Resiliency and Automation Strategies.mp4 26.5 MB
    icon ~Get Your Files Here !/23 - Server Security/127 - Change Management Policy.mp4 64.8 MB
    icon ~Get Your Files Here !/23 - Server Security/128 - Secure Staging and Deployment.mp4 22.8 MB
    icon ~Get Your Files Here !/23 - Server Security/129 - Peripherals.mp4 20.7 MB
    icon ~Get Your Files Here !/23 - Server Security/130 - EMI and EMP.mp4 34.5 MB
    icon ~Get Your Files Here !/23 - Server Security/131 - Hardware Security Module.mp4 8.3 MB
    icon ~Get Your Files Here !/23 - Server Security/132 - Cloud Deployment Models.mp4 19.5 MB
    icon ~Get Your Files Here !/23 - Server Security/133 - Cloud Services.mp4 67.3 MB
    icon ~Get Your Files Here !/23 - Server Security/134 - Security Responsibilities with Cloud Models.mp4 11.6 MB
    icon ~Get Your Files Here !/23 - Server Security/135 - Advanced Cloud Services.mp4 16.6 MB
    icon ~Get Your Files Here !/24 - Mobile Devices/136 - Deploying Mobile Devices Securely.mp4 7.1 MB
    icon ~Get Your Files Here !/24 - Mobile Devices/137 - Deployment Models.mp4 44.3 MB
    icon ~Get Your Files Here !/24 - Mobile Devices/138 - Mobile Device Management.mp4 39.2 MB
    icon ~Get Your Files Here !/24 - Mobile Devices/139 - Unauthorized Connections.mp4 15.3 MB
    icon ~Get Your Files Here !/24 - Mobile Devices/140 - Hardware Control.mp4 7.8 MB

Similar Torrents