种子简介
种子名称:
[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501
文件类型:
视频
文件数目:
86个文件
文件大小:
4.37 GB
收录时间:
2021-1-6 21:12
已经下载:
3次
资源热度:
253
最近下载:
2024-12-22 13:18
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:c62b089215e5a6a85b1126bf48a12661305a458e&dn=[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501.torrent
001 Welcome to Security+.mp425.54MB
002 Infrastructure Security Devices.mp489MB
003 Application and Traffic Analysis .mp438.66MB
004 Network Segmentation and Separation with VLANs.mp451.92MB
005 ACL Case Study.mp459.91MB
006 Design Considerations.mp475.33MB
007 NAT and PAT Case Study.mp445.73MB
008 Firewall and Switch Protection Mechanisms.mp457.96MB
009 Virtualization Overview.mp452.68MB
010 IPsec_ Protocols_ and Well-known Ports.mp468.28MB
011 ICMP and a Few More Protocols.mp460.39MB
012 Security for WiFi.mp494.98MB
013 Risk Overview.mp492.54MB
014 Risk Calculation.mp468.94MB
015 Attack Vectors_ Risk Management_ and Recovery.mp441.97MB
016 Third-Party Risk from Integration.mp439.89MB
017 Change Management and Account Auditing.mp459.04MB
018 Data Loss Prevention (DLP).mp440.92MB
019 Forensics.mp473.11MB
020 Incident Response Concepts.mp443.5MB
021 Security Awareness_ RBAC_ and Data Labeling .mp454.39MB
022 Passwords_ Best Practices_ and Standards.mp454.34MB
023 Environmental Controls.mp439.83MB
024 Physical Security.mp448.01MB
025 Business Continuity.mp465.06MB
026 Fault Tolerance.mp467.18MB
027 Controls for Confidentiality .mp450.04MB
028 Tools and Controls for Data Integrity.mp468.77MB
029 Availability and Safety.mp420.93MB
030 Malware_ Adware - Spyware.mp443.25MB
031 Trojans_ Backdoors_ and More Malware.mp468.76MB
032 Attack Types MITM - Spear Fishing.mp472.17MB
033 Attack Types_ Xmas - Client Side.mp455.05MB
034 Password Attacks and Watering Holes.mp451MB
035 Social Engineering Threats.mp448.85MB
036 Vishing and Why Social Engineering Works.mp443.11MB
037 Wireless Attacks.mp455.83MB
038 Cross-site and Injection Attacks.mp464.64MB
039 Application Attacks.mp446.84MB
040 Monitoring and Device Hardening.mp470.63MB
041 Baselines_ Detection_ and Reporting.mp438.7MB
042 Analyzers and Scanners.mp475.25MB
043 Discovering and Assessing Threats.mp458.08MB
044 Penetration Testing.mp448.82MB
045 Techniques for Securing Apps.mp439.67MB
046 Application Security Controls.mp456.08MB
047 Mobile Device Security Overview.mp470.63MB
048 Host Security.mp443.03MB
049 Hardware and Virtualization Security.mp446.43MB
050 Data Security.mp440.12MB
051 Securing Data with H_W_ Controls_ and Policy.mp439.53MB
052 Security in Static Environments.mp454.43MB
053 AAA Concepts.mp436.92MB
054 Authentication Protocols and Services.mp468.67MB
055 Multifactor Authentication.mp451.23MB
056 Authentication Controls.mp471.7MB
057 Controlling Access via Authorization.mp468.9MB
058 Account Management.mp476.8MB
059 Symmetric and Asymmetric Encryption.mp469.62MB
060 Crypto Key Management.mp481.85MB
061 Hashing and Encryption Protocols.mp472.19MB
062 Comparing Cryptography Algorithms.mp463.03MB
063 PKI Overview.mp455.21MB
064 Certificate Warnings and Trust Models.mp437.73MB
065 Layered Security Case Study.mp439.2MB
066 Attack Types and Vectors.mp415.7MB
067 Threat Actor Types and Ethics.mp420.18MB
068 Reconnaissance Information Gathering Concepts.mp436.56MB
069 Hacking Vocabulary and Terms.mp422.36MB
070 Malware Concepts.mp433.96MB
071 Network Scanning Overview.mp413.71MB
072 Trojans.mp437.27MB
073 Port Security.mp438.77MB
074 Scanning Methodologies.mp432.68MB
075 Sniffing Overview.mp443.48MB
076 Vulnerability Scanning.mp429.48MB
077 Social Engineering Overview.mp450.85MB
078 System Hacking Stages and Goals.mp434.21MB
079 Buffer Overflow.mp448.36MB
080 OWASP BWAP.mp436.16MB
081 Honeypots and Honeynets.mp441.26MB
082 Centralized Identity Management.mp449.79MB
083 SSO_ Kerberos_ and Security Threats.mp463.84MB
084 Incident Response.mp444.24MB
085 Penetration Testing Legally.mp437.51MB
086 Case Study #1.mp475.92MB