本站已收录 番号和无损神作磁力链接/BT种子 

CompTIA Security+ Certification (SY0-501) The Total Course

种子简介

种子名称: CompTIA Security+ Certification (SY0-501) The Total Course
文件类型: 视频
文件数目: 121个文件
文件大小: 19.13 GB
收录时间: 2019-10-19 04:12
已经下载: 3
资源热度: 262
最近下载: 2024-12-17 20:10

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:da685c53a1fbdde43e041c0a3d55d6c798e93953&dn=CompTIA Security+ Certification (SY0-501) The Total Course 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

CompTIA Security+ Certification (SY0-501) The Total Course.torrent
  • 02 Cryptography/030 Cryptographic Attacks.mp4416.56MB
  • 01 Risk Management/001 Introduction to the CompTIA Security Exam SY0-501.mp475.28MB
  • 01 Risk Management/002 The CIA of Security.mp444.71MB
  • 01 Risk Management/003 Threat Actors.mp4142.12MB
  • 01 Risk Management/004 What is Risk.mp4213.85MB
  • 01 Risk Management/005 Managing Risk.mp4255.51MB
  • 01 Risk Management/006 Using Guides for Risk Assessment.mp4114.51MB
  • 01 Risk Management/007 Security Controls.mp496.82MB
  • 01 Risk Management/008 Interesting Security Controls.mp430.96MB
  • 01 Risk Management/009 Defense in Depth.mp497.93MB
  • 01 Risk Management/010 IT Security Governance.mp4139.4MB
  • 01 Risk Management/011 Security Policies.mp4174MB
  • 01 Risk Management/012 Frameworks.mp4170.87MB
  • 01 Risk Management/013 Quantitative Risk Calculations.mp494.82MB
  • 01 Risk Management/014 Business Impact Analysis.mp4220.29MB
  • 01 Risk Management/015 Organizing Data.mp4217.67MB
  • 01 Risk Management/016 Security Training.mp4122.68MB
  • 01 Risk Management/017 Third Party Agreements.mp4103.64MB
  • 02 Cryptography/018 Cryptography Basics.mp4260.17MB
  • 02 Cryptography/019 Cryptographic Methods.mp4160.57MB
  • 02 Cryptography/020 Symmetric Cryptosystems.mp4193.38MB
  • 02 Cryptography/021 Symmetric Block Modes.mp4114.29MB
  • 02 Cryptography/022 RSA Cryptosystems.mp4193.89MB
  • 02 Cryptography/023 Diffie-Hellman.mp497.29MB
  • 02 Cryptography/024 PGPGPG.mp4188.42MB
  • 02 Cryptography/025 Hashing.mp4106.49MB
  • 02 Cryptography/026 HMAC.mp465.55MB
  • 02 Cryptography/027 Steganography.mp478.59MB
  • 02 Cryptography/028 Certificates and Trust.mp4278.63MB
  • 02 Cryptography/029 Public Key Infrastructure.mp4320.19MB
  • 03 Identity and Access Management/031 Identification.mp4260.87MB
  • 03 Identity and Access Management/032 Authorization Concepts.mp4116.48MB
  • 03 Identity and Access Management/033 Access Control List.mp467.61MB
  • 03 Identity and Access Management/034 Password Security.mp4160.4MB
  • 03 Identity and Access Management/035 Linux File Permissions.mp4190.83MB
  • 03 Identity and Access Management/036 Windows File Permissions.mp4220.82MB
  • 03 Identity and Access Management/037 User Account Management.mp4143.24MB
  • 03 Identity and Access Management/038 AAA.mp4170.75MB
  • 03 Identity and Access Management/039 Authentication Methods.mp4206.26MB
  • 03 Identity and Access Management/040 Single Sign-On.mp4172.04MB
  • 04 Tools of the Trade/041 OS Utilities Part 1.mp4247.7MB
  • 04 Tools of the Trade/042 OS Utilities Part 2.mp4210.6MB
  • 04 Tools of the Trade/043 Network Scanners.mp4164.81MB
  • 04 Tools of the Trade/044 Protocol Analyzers.mp4185.27MB
  • 04 Tools of the Trade/045 SNMP.mp4203.51MB
  • 04 Tools of the Trade/046 Logs.mp4125.72MB
  • 05 Securing Individual Systems/047 Denial of Service.mp4116.11MB
  • 05 Securing Individual Systems/048 Host Threats.mp4186.7MB
  • 05 Securing Individual Systems/049 Man-in-the-Middle.mp4410.12MB
  • 05 Securing Individual Systems/050 System Resiliency.mp4191.02MB
  • 05 Securing Individual Systems/051 RAID.mp4154.52MB
  • 05 Securing Individual Systems/052 NAS and SAN.mp4265.96MB
  • 05 Securing Individual Systems/053 Physical Hardening.mp4138.46MB
  • 05 Securing Individual Systems/054 RFI EMI and ESD.mp432.96MB
  • 05 Securing Individual Systems/055 Host Hardening.mp4334.6MB
  • 05 Securing Individual Systems/056 Data and System Security.mp476.59MB
  • 05 Securing Individual Systems/057 Disk Encryption.mp4133.08MB
  • 05 Securing Individual Systems/058 HardwareFirmware Security.mp4189.84MB
  • 05 Securing Individual Systems/059 Secure OS Types.mp4167.5MB
  • 05 Securing Individual Systems/060 Securing Peripherals.mp4241.78MB
  • 05 Securing Individual Systems/061 Malware.mp4214.64MB
  • 05 Securing Individual Systems/062 Analyzing Output.mp4297.73MB
  • 05 Securing Individual Systems/063 IDS and IPS.mp494.64MB
  • 05 Securing Individual Systems/064 Automation Strategies.mp4104.43MB
  • 05 Securing Individual Systems/065 Data Destruction.mp4103.84MB
  • 06 The Basic LAN/066 LAN Review.mp4120.24MB
  • 06 The Basic LAN/067 Network Topologies Review.mp462.18MB
  • 06 The Basic LAN/068 Network Zone Review.mp4124.63MB
  • 06 The Basic LAN/069 Network Access Controls.mp4159.43MB
  • 06 The Basic LAN/070 The Network Firewall.mp4190.86MB
  • 06 The Basic LAN/071 Proxy Servers.mp4211.77MB
  • 06 The Basic LAN/072 Honeypots.mp481.31MB
  • 06 The Basic LAN/073 Virtual Private Networks.mp4179.46MB
  • 06 The Basic LAN/074 IPSec.mp4210.05MB
  • 06 The Basic LAN/075 NIDSNIPS.mp4115.03MB
  • 06 The Basic LAN/076 SIEM.mp4139.41MB
  • 07 Beyond the Basic LAN/077 Wireless Review.mp4172.69MB
  • 07 Beyond the Basic LAN/078 Living in Open Networks.mp4175.38MB
  • 07 Beyond the Basic LAN/079 Vulnerabilities with Wireless Access Points.mp4135.76MB
  • 07 Beyond the Basic LAN/080 Cracking 802.11 WEP.mp4217.01MB
  • 07 Beyond the Basic LAN/081 Cracking 802.11 WPA.mp4185.74MB
  • 07 Beyond the Basic LAN/082 Cracking 802.11 WPS.mp4196.32MB
  • 07 Beyond the Basic LAN/083 Wireless Hardening.mp4272.51MB
  • 07 Beyond the Basic LAN/084 Wireless Access Points.mp4277.12MB
  • 07 Beyond the Basic LAN/085 Virtualization Basics.mp4139.29MB
  • 07 Beyond the Basic LAN/086 Virtual Security.mp4254.76MB
  • 07 Beyond the Basic LAN/087 Containers.mp4176.51MB
  • 07 Beyond the Basic LAN/088 IaaS.mp4149.17MB
  • 07 Beyond the Basic LAN/089 PaaS.mp4133.48MB
  • 07 Beyond the Basic LAN/090 SaaS.mp454.06MB
  • 07 Beyond the Basic LAN/091 Deployment Models.mp4141.38MB
  • 07 Beyond the Basic LAN/092 Static Hosts.mp4141.81MB
  • 07 Beyond the Basic LAN/093 Mobile Connectivity.mp4256.07MB
  • 07 Beyond the Basic LAN/094 Deploying Mobile Devices.mp478.92MB
  • 07 Beyond the Basic LAN/095 Mobile Enforcement.mp4265.51MB
  • 07 Beyond the Basic LAN/096 Mobile Device Management.mp4125.04MB
  • 07 Beyond the Basic LAN/097 Physical Controls.mp4176.09MB
  • 07 Beyond the Basic LAN/098 HVAC.mp4135.35MB
  • 07 Beyond the Basic LAN/099 Fire Suppression.mp472.57MB
  • 08 Secure Protocols/100 Secure Applications and Protocols.mp4191.52MB
  • 08 Secure Protocols/101 Network Models.mp4147.97MB
  • 08 Secure Protocols/102 Know Your Protocols - TCPIP.mp4131.84MB
  • 08 Secure Protocols/103 Know Your Protocols - Applications.mp448.83MB
  • 08 Secure Protocols/104 Transport Layer Security (TLS).mp4195.76MB
  • 08 Secure Protocols/105 Internet Service Hardening.mp479.02MB
  • 08 Secure Protocols/106 Protecting Your Servers.mp486.62MB
  • 08 Secure Protocols/107 Secure Code Development.mp4182.37MB
  • 08 Secure Protocols/108 Secure Deployment Concepts.mp4223.45MB
  • 08 Secure Protocols/109 Code Quality and Testing.mp4102.99MB
  • 09 Testing Your Infrastructure/110 Vulnerability Scanning Tools.mp4159.57MB
  • 09 Testing Your Infrastructure/111 Vulnerability Scanning Assessment.mp4100.51MB
  • 09 Testing Your Infrastructure/112 Social Engineering Principles.mp439.68MB
  • 09 Testing Your Infrastructure/113 Social Engineering Attacks.mp4131.61MB
  • 09 Testing Your Infrastructure/114 Attacking Applications.mp4181.96MB
  • 09 Testing Your Infrastructure/115 Attacking Web Sites.mp491.14MB
  • 09 Testing Your Infrastructure/116 Exploiting a Target.mp4168.36MB
  • 09 Testing Your Infrastructure/117 Vulnerability Impact.mp4237.32MB
  • 10 Dealing with Incidents/118 Incident Response.mp448.32MB
  • 10 Dealing with Incidents/119 Digital Forensics.mp4167.91MB
  • 10 Dealing with Incidents/120 Contingency Planning.mp4165.09MB
  • 10 Dealing with Incidents/121 Backups.mp491.12MB