种子简介
种子名称:
[FreeTutorials.us] comptia-security-certification-sy0-401-the-total-course
文件类型:
视频
文件数目:
87个文件
文件大小:
5.78 GB
收录时间:
2018-2-13 08:08
已经下载:
3次
资源热度:
165
最近下载:
2024-11-1 12:20
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:2be140ca2a45de3f7e567b9b4e421c6206518e49&dn=[FreeTutorials.us] comptia-security-certification-sy0-401-the-total-course
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeTutorials.us] comptia-security-certification-sy0-401-the-total-course.torrent
01 The CompTIA Security Exam/001 Introduction to CompTIA Security Exam SY0-401.mp426.86MB
01 The CompTIA Security Exam/002 The Security Exam basics.mp455.83MB
01 The CompTIA Security Exam/003 Passing the Security Exam.mp441.66MB
02 Stepping Up to IT Security/004 The CIA of Security.mp420.53MB
02 Stepping Up to IT Security/005 Security Controls.mp428MB
02 Stepping Up to IT Security/006 Interesting Security Controls.mp420.38MB
02 Stepping Up to IT Security/007 IT Security Governance.mp459.07MB
02 Stepping Up to IT Security/008 Security Policies.mp470.56MB
02 Stepping Up to IT Security/009 What is Risk.mp4112.12MB
02 Stepping Up to IT Security/010 Managing Risk.mp4119.71MB
02 Stepping Up to IT Security/011 Quantitative Risk Calculations.mp447.65MB
03 Core Security Concepts/012 Cryptography Basics.mp471.2MB
03 Core Security Concepts/013 Hashing.mp446.14MB
03 Core Security Concepts/014 Hash-based Message Authentication Code - HMAC.mp427.02MB
03 Core Security Concepts/015 Symmetric Algorithms.mp491.04MB
03 Core Security Concepts/016 Asymmetric Algorithms.mp4140.24MB
03 Core Security Concepts/017 Secure Applications and Protocols.mp486.36MB
03 Core Security Concepts/018 Steganography.mp432.72MB
03 Core Security Concepts/019 Certificates and Trust.mp4113.5MB
03 Core Security Concepts/020 Public Key Infrastructure.mp4119.93MB
04 Authentication and Authorization/021 Identification and Authentication.mp4141.05MB
04 Authentication and Authorization/022 Understanding Authorization.mp479.49MB
04 Authentication and Authorization/023 Authentication Methods.mp482.59MB
04 Authentication and Authorization/024 AAA.mp468.9MB
04 Authentication and Authorization/025 Linux File Permissions.mp485.48MB
04 Authentication and Authorization/026 Windows File Permissions.mp4107.66MB
04 Authentication and Authorization/027 Single Sign On.mp485.34MB
04 Authentication and Authorization/028 Password Security.mp473.05MB
04 Authentication and Authorization/029 Account Issues.mp466.18MB
05 Host Security/030 Host Threats.mp477.53MB
05 Host Security/031 Malware.mp497.5MB
05 Host Security/032 Cryptographic Attacks.mp4176.37MB
05 Host Security/033 Man-in-the-Middle.mp4166.2MB
05 Host Security/034 Denial of Service.mp449.85MB
05 Host Security/035 Host Hardening.mp4133.94MB
05 Host Security/036 Network Models.mp459.76MB
05 Host Security/037 Know your protocols-TCPIP.mp449.63MB
05 Host Security/038 Know your protocols-Applications.mp417.97MB
05 Host Security/039 Transport Layer Security - TLS.mp470.98MB
05 Host Security/040 IPsec.mp4103.09MB
05 Host Security/041 NAS and SAN.mp4112.92MB
05 Host Security/042 RAID Security.mp480.53MB
05 Host Security/043 Securing Data.mp441.95MB
05 Host Security/044 Disk Encryption.mp465.34MB
05 Host Security/045 Static Hosts.mp458.19MB
06 LAN Security/046 LAN Security Review.mp446.61MB
06 LAN Security/047 Access Control Lists.mp426.44MB
06 LAN Security/048 Proxy Servers.mp498.27MB
06 LAN Security/049 IDS vs. IPS.mp447.54MB
06 LAN Security/050 Network Access Control.mp473.24MB
06 LAN Security/051 Virtual Private Networks.mp475.85MB
06 LAN Security/052 SNMP.mp479.19MB
06 LAN Security/053 Logs.mp465.25MB
07 Application Security/054 Attacking Applications.mp489.48MB
07 Application Security/055 Attacking Websites.mp443.86MB
07 Application Security/056 Hardening Web Servers.mp486.48MB
07 Application Security/057 Internet Service Hardening.mp436.39MB
07 Application Security/058 Virtualization Basics.mp451.84MB
07 Application Security/059 Virtual Security.mp4103.9MB
08 Wireless Security/060 Wireless Review.mp475.78MB
08 Wireless Security/061 Living in Open Networks.mp479.48MB
08 Wireless Security/062 Fun with Access Points.mp459.71MB
08 Wireless Security/063 Cracking 802.11 Part 1 - WEP.mp463.16MB
08 Wireless Security/064 Cracking 802.11 Part 2 - WPA.mp465.83MB
08 Wireless Security/065 Cracking 802.11 Part 3 - WPS.mp482.5MB
08 Wireless Security/066 Wireless Hardening.mp4117.45MB
09 Physical Security/067 RFI EMI ESD.mp414.15MB
09 Physical Security/068 HVAC.mp456.21MB
09 Physical Security/069 Fire Suppression.mp430.5MB
09 Physical Security/070 Classifying Security Controls.mp432.21MB
09 Physical Security/071 Physical Controls.mp469.92MB
10 Outside Security/072 Third Party Agreements.mp443.62MB
10 Outside Security/073 Infrastructure as a Service IaaS.mp450.9MB
10 Outside Security/074 Platform as a Service PaaS.mp450.86MB
10 Outside Security/075 Software as a Service SaaS.mp419.62MB
10 Outside Security/076 Deploying Mobile Devices.mp450.63MB
10 Outside Security/077 Mobile Device Management.mp455.15MB
11 People Security/078 Social Engineering Principles.mp417.77MB
11 People Security/079 Social Engineering Attacks.mp447.49MB
11 People Security/080 Security Training.mp452.87MB
12 Proactive Security/081 Vulnerability Scanning Tools.mp457.8MB
12 Proactive Security/082 Vulnerability Assessment.mp441.26MB
12 Proactive Security/083 Penetration Pen Testing.mp468.99MB
12 Proactive Security/084 Incident Response.mp423.11MB
12 Proactive Security/085 Forensic Procedures.mp470.87MB
12 Proactive Security/086 Contingency Planning.mp475.48MB
12 Proactive Security/087 Backups.mp439.61MB