Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt |
12.57KB |
001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4 |
42.60MB |
001 __ Workflow Orchestration (OBJ 2.3).en.srt |
9.13KB |
001 __ Workflow Orchestration (OBJ 2.3).mp4 |
24.11MB |
001 Access Control (OBJ 3.8).en.srt |
2.11KB |
001 Access Control (OBJ 3.8).mp4 |
18.60MB |
001 Application Security.en.srt |
3.51KB |
001 Application Security.mp4 |
38.61MB |
001 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt |
14.03KB |
001 Authentication (OBJ 2.4, 3.5, & 3.8).mp4 |
129.73MB |
001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt |
7.80KB |
001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4 |
76.42MB |
001 Conclusion.en.srt |
21.96KB |
001 Conclusion.mp4 |
212.10MB |
001 Cryptography (OBJ 2.1 & 2.8).en.srt |
11.49KB |
001 Cryptography (OBJ 2.1 & 2.8).mp4 |
107.94MB |
001 Facilities Security (OBJ 2.7).en.srt |
1.41KB |
001 Facilities Security (OBJ 2.7).mp4 |
13.93MB |
001 Hardening (OBJ 3.2).en.srt |
3.51KB |
001 Hardening (OBJ 3.2).mp4 |
39.72MB |
001 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt |
16.20KB |
001 Hashing (OBJ 1.2, 2.8 & 3.2).mp4 |
166.15MB |
001 Incident Response Procedures (OBJ 4.2).en.srt |
10.67KB |
001 Incident Response Procedures (OBJ 4.2).mp4 |
99.10MB |
001 Malware (OBJ 1.2).en.srt |
1.21KB |
001 Malware (OBJ 1.2).mp4 |
15.01MB |
001 Malware Infections.en.srt |
8.50KB |
001 Malware Infections.mp4 |
93.17MB |
001 Mobile Device Security (OBJ 1.5).en.srt |
2.62KB |
001 Mobile Device Security (OBJ 1.5).mp4 |
28.44MB |
001 Monitoring Types (OBJ 3.3).en.srt |
6.17KB |
001 Monitoring Types (OBJ 3.3).mp4 |
62.46MB |
001 Network Attacks (OBJ 1.4).en.srt |
1.35KB |
001 Network Attacks (OBJ 1.4).mp4 |
14.53MB |
001 Network Security.en.srt |
1.65KB |
001 Network Security.mp4 |
16.60MB |
001 Perimeter Security.en.srt |
1.74KB |
001 Perimeter Security.mp4 |
17.79MB |
001 Physical Security (OBJ 2.7).en.srt |
3.62KB |
001 Physical Security (OBJ 2.7).mp4 |
33.92MB |
001 Planning for the Worst (OBJ 2.5 & 5.4).en.srt |
4.87KB |
001 Planning for the Worst (OBJ 2.5 & 5.4).mp4 |
47.74MB |
001 Policies and Procedures (OBJ 5.2 & 5.3).en.srt |
12.78KB |
001 Policies and Procedures (OBJ 5.2 & 5.3).mp4 |
126.68MB |
001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt |
7.65KB |
001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4 |
51.15MB |
001 Risk Assessments (OBJ 5.4).en.srt |
19.21KB |
001 Risk Assessments (OBJ 5.4).mp4 |
188.59MB |
001 Securing Networks (OBJ 3.3).en.srt |
1.97KB |
001 Securing Networks (OBJ 3.3).mp4 |
18.57MB |
001 Security Applications and Devices.en.srt |
1.13KB |
001 Security Applications and Devices.mp4 |
12.76MB |
001 Security Protocols (OBJ 3.1).en.srt |
779B |
001 Security Protocols (OBJ 3.1).mp4 |
8.70MB |
001 Social Engineering (OBJ 1.1).en.srt |
1.91KB |
001 Social Engineering (OBJ 1.1).mp4 |
19.74MB |
001 Software Development (OBJ 2.1 & 2.3).en.srt |
18.45KB |
001 Software Development (OBJ 2.1 & 2.3).mp4 |
188.76MB |
001 Virtualization (OBJ 2.2).en.srt |
4.34KB |
001 Virtualization (OBJ 2.2).mp4 |
46.65MB |
001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt |
17.63KB |
001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4 |
171.62MB |
001 Welcome.en.srt |
11.51KB |
001 Welcome.mp4 |
91.41MB |
002 __ CI_CD (OBJ 2.3).en.srt |
16.18KB |
002 __ CI_CD (OBJ 2.3).mp4 |
48.32MB |
002 __ Incident Response Planning (OBJ 4.2).en.srt |
41.74KB |
002 __ Incident Response Planning (OBJ 4.2).mp4 |
113.29MB |
002 __ Root of Trust (OBJ 3.2).en.srt |
10.08KB |
002 __ Root of Trust (OBJ 3.2).mp4 |
31.06MB |
002 Access Control Models (OBJ 3.8).en.srt |
19.76KB |
002 Access Control Models (OBJ 3.8).mp4 |
176.15MB |
002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt |
10.89KB |
002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4 |
112.74MB |
002 BONUS_ What's Next_.en.srt |
8.62KB |
002 BONUS_ What's Next_.mp4 |
76.89MB |
002 Cloud Types (OBJ 2.2 & 3.6).en.srt |
5.66KB |
002 Cloud Types (OBJ 2.2 & 3.6).mp4 |
63.19MB |
002 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt |
9.25KB |
002 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 |
96.88MB |
002 CompTIA Security+ 601 Study Guide.pdf |
22.89MB |
002 CompTIA-Security-Study-Notes 501.pdf |
19.28MB |
002 Data Classifications (OBJ 5.3 & 5.5).en.srt |
15.55KB |
002 Data Classifications (OBJ 5.3 & 5.5).mp4 |
145.37MB |
002 Demo_ Hashing (OBJ 2.8).en.srt |
5.59KB |
002 Demo_ Hashing (OBJ 2.8).mp4 |
38.54MB |
002 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt |
11.25KB |
002 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4 |
94.00MB |
002 Digital Certificates (OBJ 3.9).en.srt |
15.01KB |
002 Digital Certificates (OBJ 3.9).mp4 |
144.50MB |
002 Download the Study Guide.html |
1.09KB |
002 Fire Suppression (OBJ 2.7).en.srt |
13.33KB |
002 Fire Suppression (OBJ 2.7).mp4 |
138.65MB |
002 Firewalls (OBJ 3.3 & 4.4).en.srt |
17.02KB |
002 Firewalls (OBJ 3.3 & 4.4).mp4 |
175.29MB |
002 Hypervisors (OBJ 2.2).en.srt |
5.01KB |
002 Hypervisors (OBJ 2.2).mp4 |
57.45MB |
002 Penetration Testing (OBJ 1.8).en.srt |
10.11KB |
002 Penetration Testing (OBJ 1.8).mp4 |
98.42MB |
002 Performance Baselining (OBJ 2.1).en.srt |
10.43KB |
002 Performance Baselining (OBJ 2.1).mp4 |
102.38MB |
002 Ports and Protocols (OBJ 3.1).en.srt |
8.89KB |
002 Ports and Protocols (OBJ 3.1).mp4 |
95.70MB |
002 Qualitative Risk (OBJ 5.4).en.srt |
9.57KB |
002 Qualitative Risk (OBJ 5.4).mp4 |
91.50MB |
002 Redundant Power (OBJ 2.5).en.srt |
7.01KB |
002 Redundant Power (OBJ 2.5).mp4 |
68.69MB |
002 S_MIME (OBJ 3.1).en.srt |
3.12KB |
002 S_MIME (OBJ 3.1).mp4 |
33.00MB |
002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt |
13.11KB |
002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4 |
136.96MB |
002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt |
15.20KB |
002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4 |
146.75MB |
002 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt |
2.74KB |
002 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4 |
33.55MB |
002 Software Firewalls (OBJ 3.2).en.srt |
8.16KB |
002 Software Firewalls (OBJ 3.2).mp4 |
91.43MB |
002 Surveillance (OBJ 2.7).en.srt |
6.37KB |
002 Surveillance (OBJ 2.7).mp4 |
60.79MB |
002 Symmetric vs Asymmetric (OBJ 2.8).en.srt |
12.70KB |
002 Symmetric vs Asymmetric (OBJ 2.8).mp4 |
134.00MB |
002 The OSI Model (OBJ 3.3 & 3.6).en.srt |
12.37KB |
002 The OSI Model (OBJ 3.3 & 3.6).mp4 |
128.51MB |
002 Unnecessary Applications (OBJ 1.6).en.srt |
6.21KB |
002 Unnecessary Applications (OBJ 1.6).mp4 |
69.15MB |
002 Viruses (OBJ 1.2).en.srt |
12.72KB |
002 Viruses (OBJ 1.2).mp4 |
134.66MB |
002 Web Browser Security (OBJ 3.2 & 3.3).en.srt |
14.76KB |
002 Web Browser Security (OBJ 3.2 & 3.3).mp4 |
145.13MB |
003 __ Data Ownership.en.srt |
8.79KB |
003 __ Data Ownership.mp4 |
24.59MB |
003 __ DevSecOps (OBJ 2.3).en.srt |
11.37KB |
003 __ DevSecOps (OBJ 2.3).mp4 |
31.38MB |
003 __ Investigative Data (OBJ 4.3).en.srt |
28.26KB |
003 __ Investigative Data (OBJ 4.3).mp4 |
74.72MB |
003 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt |
11.20KB |
003 __ Training and Exercises (OBJ 1.8 & 4.2).mp4 |
32.48MB |
003 __ Trusted Firmware (OBJ 3.2).en.srt |
11.03KB |
003 __ Trusted Firmware (OBJ 3.2).mp4 |
33.00MB |
003 802.1x (OBJ 3.4 & 3.8).en.srt |
7.39KB |
003 802.1x (OBJ 3.4 & 3.8).mp4 |
79.81MB |
003 As a Service (OBJ 2.2).en.srt |
15.43KB |
003 As a Service (OBJ 2.2).mp4 |
154.35MB |
003 Backup Power (OBJ 2.5).en.srt |
7.30KB |
003 Backup Power (OBJ 2.5).mp4 |
68.99MB |
003 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt |
13.55KB |
003 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4 |
126.18MB |
003 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt |
6.71KB |
003 Demo_ Certificates (OBJ 2.8 & 3.9).mp4 |
27.99MB |
003 Demo_ How to create a VM (OBJ 2.2).en.srt |
7.96KB |
003 Demo_ How to create a VM (OBJ 2.2).mp4 |
38.72MB |
003 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt |
11.12KB |
003 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 |
49.92MB |
003 Demo_ Software Firewalls (OBJ 3.2).en.srt |
13.52KB |
003 Demo_ Software Firewalls (OBJ 3.2).mp4 |
61.53MB |
003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt |
8.17KB |
003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4 |
28.93MB |
003 Door Locks (OBJ 2.7).en.srt |
9.04KB |
003 Door Locks (OBJ 2.7).mp4 |
85.01MB |
003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt |
6.97KB |
003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4 |
70.64MB |
003 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt |
5.07KB |
003 HVAC (OBJ 2.5, 2.6, & 2.7).mp4 |
53.25MB |
003 Insider Threat (OBJ 1.5).en.srt |
4.99KB |
003 Insider Threat (OBJ 1.5).mp4 |
48.34MB |
003 Memorization of Ports (OBJ 3.1).en.srt |
22.38KB |
003 Memorization of Ports (OBJ 3.1).mp4 |
238.39MB |
003 Mobile Malware (OBJ 1.1 & 3.5).en.srt |
13.34KB |
003 Mobile Malware (OBJ 1.1 & 3.5).mp4 |
139.49MB |
003 Overview of Security.en.srt |
6.45KB |
003 Overview of Security.mp4 |
64.44MB |
003 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt |
6.43KB |
003 Protocol Analyzers (OBJ 3.3 & 4.1).mp4 |
64.92MB |
003 Quantitative Risk (OBJ 5.4).en.srt |
11.15KB |
003 Quantitative Risk (OBJ 5.4).mp4 |
119.95MB |
003 Restricting Applications (OBJ 3.2 & 4.4).en.srt |
6.00KB |
003 Restricting Applications (OBJ 3.2 & 4.4).mp4 |
61.92MB |
003 Securing Network Media (OBJ 2.7).en.srt |
18.98KB |
003 Securing Network Media (OBJ 2.7).mp4 |
189.94MB |
003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt |
11.82KB |
003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4 |
121.66MB |
003 Switches (OBJ 1.4 & 2.7).en.srt |
7.38KB |
003 Switches (OBJ 1.4 & 2.7).mp4 |
77.26MB |
003 Symmetric Algorithms (OBJ 2.8).en.srt |
9.58KB |
003 Symmetric Algorithms (OBJ 2.8).mp4 |
103.40MB |
003 Testing Methods (OBJ 2.3 & 3.2).en.srt |
14.31KB |
003 Testing Methods (OBJ 2.3 & 3.2).mp4 |
151.04MB |
003 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt |
7.03KB |
003 Web Browser Concerns (OBJ 3.2 & 3.3).mp4 |
71.04MB |
003 Worms (OBJ 1.2).en.srt |
4.20KB |
003 Worms (OBJ 1.2).mp4 |
47.86MB |
004 __ Forensic Procedures (OBJ 4.5).en.srt |
32.38KB |
004 __ Forensic Procedures (OBJ 4.5).mp4 |
82.94MB |
004 __ IAC (OBJ 2.2).en.srt |
9.72KB |
004 __ IAC (OBJ 2.2).mp4 |
29.60MB |
004 __ Secure Processing (OBJ 3.2).en.srt |
8.53KB |
004 __ Secure Processing (OBJ 3.2).mp4 |
24.51MB |
004 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt |
7.13KB |
004 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 |
62.46MB |
004 Certificate Authorities (OBJ 3.2 & 3.9).en.srt |
8.89KB |
004 Certificate Authorities (OBJ 3.2 & 3.9).mp4 |
89.81MB |
004 CIA Triad.en.srt |
8.23KB |
004 CIA Triad.mp4 |
74.47MB |
004 Cloud Security (OBJ 2.5 & 3.6).en.srt |
5.17KB |
004 Cloud Security (OBJ 2.5 & 3.6).mp4 |
53.42MB |
004 Data Redundancy (OBJ 2.5).en.srt |
9.59KB |
004 Data Redundancy (OBJ 2.5).mp4 |
100.31MB |
004 Demo_ Lock Picking (OBJ 2.7).en.srt |
3.40KB |
004 Demo_ Lock Picking (OBJ 2.7).mp4 |
36.73MB |
004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt |
10.73KB |
004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4 |
62.36MB |
004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt |
10.92KB |
004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4 |
46.06MB |
004 IDS (OBJ 3.2 & 3.3).en.srt |
10.26KB |
004 IDS (OBJ 3.2 & 3.3).mp4 |
105.77MB |
004 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt |
3.18KB |
004 Increasing Hash Security (OBJ 2.8 & 3.7).mp4 |
31.97MB |
004 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt |
4.92KB |
004 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4 |
53.68MB |
004 Methodologies (OBJ 1.7 & 5.4).en.srt |
6.22KB |
004 Methodologies (OBJ 1.7 & 5.4).mp4 |
59.43MB |
004 OVAL (OBJ 1.7).en.srt |
3.43KB |
004 OVAL (OBJ 1.7).mp4 |
32.66MB |
004 Phishing (OBJ 1.1 & 5.3).en.srt |
14.13KB |
004 Phishing (OBJ 1.1 & 5.3).mp4 |
135.84MB |
004 PII and PHI (OBJ 5.2 & 5.5).en.srt |
13.14KB |
004 PII and PHI (OBJ 5.2 & 5.5).mp4 |
134.04MB |
004 Proxy Servers (OBJ 3.3 & 4.4).en.srt |
9.04KB |
004 Proxy Servers (OBJ 3.3 & 4.4).mp4 |
91.68MB |
004 Public Key Cryptography (OBJ 2.8).en.srt |
6.75KB |
004 Public Key Cryptography (OBJ 2.8).mp4 |
52.38MB |
004 Routers (OBJ 3.3).en.srt |
5.13KB |
004 Routers (OBJ 3.3).mp4 |
54.31MB |
004 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt |
9.95KB |
004 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4 |
97.01MB |
004 Shielding (OBJ 2.7).en.srt |
5.40KB |
004 Shielding (OBJ 2.7).mp4 |
55.21MB |
004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt |
8.27KB |
004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4 |
86.69MB |
004 SNMP (OBJ 3.1).en.srt |
7.68KB |
004 SNMP (OBJ 3.1).mp4 |
79.36MB |
004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt |
7.67KB |
004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4 |
80.73MB |
004 SSH (OBJ 3.1 & 4.1).en.srt |
5.40KB |
004 SSH (OBJ 3.1 & 4.1).mp4 |
54.40MB |
004 Threats to VMs (OBJ 2.2).en.srt |
7.46KB |
004 Threats to VMs (OBJ 2.2).mp4 |
80.93MB |
004 Trojans (OBJ 1.2).en.srt |
5.36KB |
004 Trojans (OBJ 1.2).mp4 |
62.50MB |
004 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt |
7.33KB |
004 Unnecessary Ports (OBJ 1.6 & 3.2).mp4 |
75.22MB |
004 Users and Groups (OBJ 3.7 & 3.8).en.srt |
20.99KB |
004 Users and Groups (OBJ 3.7 & 3.8).mp4 |
201.38MB |
005 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt |
12.89KB |
005 __ Legal Requirements (OBJ 5.2 & 5.5).mp4 |
41.27MB |
005 __ Machine Learning (OBJ 1.2).en.srt |
19.34KB |
005 __ Machine Learning (OBJ 1.2).mp4 |
68.01MB |
005 __ Motivation Factors (OBJ 1.1).en.srt |
16.57KB |
005 __ Motivation Factors (OBJ 1.1).mp4 |
159.04MB |
005 AAA of Security (OBJ 2.4).en.srt |
6.72KB |
005 AAA of Security (OBJ 2.4).mp4 |
59.85MB |
005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt |
5.25KB |
005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 |
40.59MB |
005 Asymmetric Algorithms (OBJ 2.8).en.srt |
7.44KB |
005 Asymmetric Algorithms (OBJ 2.8).mp4 |
81.35MB |
005 Biometric Readers (OBJ 2.4).en.srt |
9.12KB |
005 Biometric Readers (OBJ 2.4).mp4 |
92.13MB |
005 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt |
4.15KB |
005 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4 |
47.75MB |
005 Buffer Overflows (OBJ 1.3).en.srt |
12.93KB |
005 Buffer Overflows (OBJ 1.3).mp4 |
135.64MB |
005 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt |
18.76KB |
005 Data Collection Procedures (OBJ 4.1 & 4.5).mp4 |
101.16MB |
005 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt |
9.86KB |
005 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4 |
99.54MB |
005 Demo_ Analytical Tools (OBJ 4.1).en.srt |
9.32KB |
005 Demo_ Analytical Tools (OBJ 4.1).mp4 |
48.58MB |
005 Demo_ RAIDs (OBJ 2.5).en.srt |
7.61KB |
005 Demo_ RAIDs (OBJ 2.5).mp4 |
39.33MB |
005 Demo_ Viruses and Trojans (OBJ 1.2).en.srt |
12.74KB |
005 Demo_ Viruses and Trojans (OBJ 1.2).mp4 |
91.56MB |
005 Denial of Service (OBJ 1.3 & 1.4).en.srt |
17.59KB |
005 Denial of Service (OBJ 1.3 & 1.4).mp4 |
170.22MB |
005 Honeypots and Honeynets (OBJ 2.1).en.srt |
2.97KB |
005 Honeypots and Honeynets (OBJ 2.1).mp4 |
30.69MB |
005 Network Zones (OBJ 3.3).en.srt |
7.07KB |
005 Network Zones (OBJ 3.3).mp4 |
69.46MB |
005 Permissions (OBJ 3.8).en.srt |
8.52KB |
005 Permissions (OBJ 3.8).mp4 |
81.02MB |
005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt |
6.62KB |
005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4 |
66.62MB |
005 Remote Desktop Services (OBJ 3.1).en.srt |
3.69KB |
005 Remote Desktop Services (OBJ 3.1).mp4 |
40.36MB |
005 Securing Applications (OBJ 1.4 & 3.2).en.srt |
9.60KB |
005 Securing Applications (OBJ 1.4 & 3.2).mp4 |
101.49MB |
005 Securing VMs (OBJ 2.2).en.srt |
7.77KB |
005 Securing VMs (OBJ 2.2).mp4 |
82.44MB |
005 Security Controls (OBJ 5.1).en.srt |
14.95KB |
005 Security Controls (OBJ 5.1).mp4 |
149.03MB |
005 Trusted Operating System (OBJ 3.2).en.srt |
3.75KB |
005 Trusted Operating System (OBJ 3.2).mp4 |
42.64MB |
005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt |
4.54KB |
005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4 |
43.89MB |
005 VPN Protocols (OBJ 3.1 & 3..3).en.srt |
13.76KB |
005 VPN Protocols (OBJ 3.1 & 3..3).mp4 |
141.32MB |
005 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt |
15.21KB |
005 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4 |
139.57MB |
005 Web of Trust (OBJ 3.9).en.srt |
5.98KB |
005 Web of Trust (OBJ 3.9).mp4 |
57.34MB |
005 Wireless Encryption (OBJ 1.6 & 3.4).en.srt |
11.62KB |
005 Wireless Encryption (OBJ 1.6 & 3.4).mp4 |
120.29MB |
006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt |
16.21KB |
006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4 |
50.91MB |
006 __ IoT Vulnerabilities (OBJ 2.6).en.srt |
8.25KB |
006 __ IoT Vulnerabilities (OBJ 2.6).mp4 |
29.61MB |
006 __ Jumpbox (OBJ 3.5).en.srt |
12.88KB |
006 __ Jumpbox (OBJ 3.5).mp4 |
35.05MB |
006 __ Privacy Technologies (OBJ 5.5).en.srt |
14.75KB |
006 __ Privacy Technologies (OBJ 5.5).mp4 |
38.15MB |
006 __ Types of Risk (OBJ 1.6 & 5.4).en.srt |
16.01KB |
006 __ Types of Risk (OBJ 1.6 & 5.4).mp4 |
54.76MB |
006 Auditing (OBJ 1.7).en.srt |
4.21KB |
006 Auditing (OBJ 1.7).mp4 |
42.70MB |
006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt |
7.75KB |
006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4 |
81.64MB |
006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt |
3.22KB |
006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4 |
35.35MB |
006 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt |
3.34KB |
006 DDoS (OBJ 1.2, 1.3, & 1.4).mp4 |
33.73MB |
006 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt |
12.00KB |
006 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4 |
101.76MB |
006 Demo_ Disk Imaging (OBJ 4.1).en.srt |
13.62KB |
006 Demo_ Disk Imaging (OBJ 4.1).mp4 |
63.03MB |
006 Demo_ Nmap Scanning (OBJ 4.1).en.srt |
15.31KB |
006 Demo_ Nmap Scanning (OBJ 4.1).mp4 |
97.26MB |
006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt |
11.30KB |
006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 |
75.49MB |
006 Demo_ Securing VMs.en.srt |
8.79KB |
006 Demo_ Securing VMs.mp4 |
43.11MB |
006 Demo_ Setting up a VPN (OBJ 3.3).en.srt |
3.21KB |
006 Demo_ Setting up a VPN (OBJ 3.3).mp4 |
24.77MB |
006 Mobile Device Theft (OBJ 3.5).en.srt |
6.53KB |
006 Mobile Device Theft (OBJ 3.5).mp4 |
69.78MB |
006 More Social Engineering (OBJ 1.1 & 1.2).en.srt |
8.95KB |
006 More Social Engineering (OBJ 1.1 & 1.2).mp4 |
88.13MB |
006 Network Redundancy (OBJ 2.5).en.srt |
4.83KB |
006 Network Redundancy (OBJ 2.5).mp4 |
46.67MB |
006 Pretty Good Privacy (OBJ 2.8).en.srt |
3.23KB |
006 Pretty Good Privacy (OBJ 2.8).mp4 |
38.63MB |
006 Ransomware (OBJ 1.2).en.srt |
4.96KB |
006 Ransomware (OBJ 1.2).mp4 |
53.37MB |
006 Remote Access Service (OBJ 3.1 & 3.8).en.srt |
4.25KB |
006 Remote Access Service (OBJ 3.1 & 3.8).mp4 |
44.42MB |
006 Security Threats (OBJ 1.1 & 1.2).en.srt |
5.94KB |
006 Security Threats (OBJ 1.1 & 1.2).mp4 |
64.17MB |
006 Updates and Patches (OBJ 1.6 & 3.2).en.srt |
6.61KB |
006 Updates and Patches (OBJ 1.6 & 3.2).mp4 |
74.21MB |
006 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt |
5.74KB |
006 Usernames and Passwords (OBJ 1.6 & 3.7).mp4 |
55.61MB |
006 Wireless Access Points (OBJ 1.4 & 3.4).en.srt |
16.04KB |
006 Wireless Access Points (OBJ 1.4 & 3.4).mp4 |
136.64MB |
007 __ CASB (OBJ 2.1).en.srt |
9.84KB |
007 __ CASB (OBJ 2.1).mp4 |
29.81MB |
007 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt |
15.62KB |
007 __ Embedded System Vulnerabilities (OBJ 2.6).mp4 |
47.93MB |
007 __ Fraud and Scams (OBJ 1.1).en.srt |
11.87KB |
007 __ Fraud and Scams (OBJ 1.1).mp4 |
42.61MB |
007 __ Security Tools (OBJ 4.1).en.srt |
37.04KB |
007 __ Security Tools (OBJ 4.1).mp4 |
137.20MB |
007 Backdoors and Logic Bombs (OBJ 1.2).en.srt |
7.91KB |
007 Backdoors and Logic Bombs (OBJ 1.2).mp4 |
84.09MB |
007 Demo_ Auditing Files (OBJ 1.7).en.srt |
7.66KB |
007 Demo_ Auditing Files (OBJ 1.7).mp4 |
52.84MB |
007 Demo_ Policies (OBJ 3.7).en.srt |
9.92KB |
007 Demo_ Policies (OBJ 3.7).mp4 |
32.95MB |
007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt |
19.40KB |
007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4 |
96.56MB |
007 Key Management (OBJ 2.8).en.srt |
5.11KB |
007 Key Management (OBJ 2.8).mp4 |
47.95MB |
007 Mitigating Threats (OBJ 5.1).en.srt |
5.64KB |
007 Mitigating Threats (OBJ 5.1).mp4 |
56.32MB |
007 Network Access Control (OBJ 3.3 & 4.4).en.srt |
5.80KB |
007 Network Access Control (OBJ 3.3 & 4.4).mp4 |
56.67MB |
007 NIDS and NIPS (OBJ 3.3).en.srt |
9.22KB |
007 NIDS and NIPS (OBJ 3.3).mp4 |
92.37MB |
007 Patch Management (OBJ 1.6 & 3.2).en.srt |
7.63KB |
007 Patch Management (OBJ 1.6 & 3.2).mp4 |
83.43MB |
007 Securing the BIOS (OBJ 3.2).en.srt |
8.13KB |
007 Securing the BIOS (OBJ 3.2).mp4 |
86.17MB |
007 Security of Apps (OBJ 3.1 & 3.5).en.srt |
10.48KB |
007 Security of Apps (OBJ 3.1 & 3.5).mp4 |
109.42MB |
007 Security Policies (OBJ 5.3 & 5.5).en.srt |
24.25KB |
007 Security Policies (OBJ 5.3 & 5.5).mp4 |
225.33MB |
007 Server Redundancy (OBJ 2.5 &3.3).en.srt |
3.69KB |
007 Server Redundancy (OBJ 2.5 &3.3).mp4 |
38.34MB |
007 Spyware (OBJ 1.2).en.srt |
5.44KB |
007 Spyware (OBJ 1.2).mp4 |
58.14MB |
007 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt |
5.31KB |
007 Stopping a DDoS (OBJ 2.1 & 2.3).mp4 |
52.44MB |
007 VPN (OBJ 3.3).en.srt |
6.47KB |
007 VPN (OBJ 3.3).mp4 |
63.56MB |
007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt |
9.78KB |
007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4 |
91.49MB |
007 XSS and XSRF (OBJ 1.3).en.srt |
6.44KB |
007 XSS and XSRF (OBJ 1.3).mp4 |
68.72MB |
008 __ API (OBJ 2.1).en.srt |
13.38KB |
008 __ API (OBJ 2.1).mp4 |
40.62MB |
008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt |
17.96KB |
008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4 |
49.63MB |
008 __ Influence Campaigns (OBJ 1.1).en.srt |
9.07KB |
008 __ Influence Campaigns (OBJ 1.1).mp4 |
40.10MB |
008 BYOD (OBJ 3.5).en.srt |
10.19KB |
008 BYOD (OBJ 3.5).mp4 |
107.63MB |
008 Demo_ Wireless Attack (OBJ 1.4).en.srt |
13.36KB |
008 Demo_ Wireless Attack (OBJ 1.4).mp4 |
103.31MB |
008 Group Policies (OBJ 2.1).en.srt |
4.91KB |
008 Group Policies (OBJ 2.1).mp4 |
56.44MB |
008 Hackers (OBJ 1.5).en.srt |
9.94KB |
008 Hackers (OBJ 1.5).mp4 |
104.89MB |
008 Logging (OBJ 1.7, 4.3, & 4.5).en.srt |
7.90KB |
008 Logging (OBJ 1.7, 4.3, & 4.5).mp4 |
79.54MB |
008 One-Time Pad (OBJ 2.8).en.srt |
9.27KB |
008 One-Time Pad (OBJ 2.8).mp4 |
94.51MB |
008 Password Analysis (OBJ 1.2).en.srt |
13.06KB |
008 Password Analysis (OBJ 1.2).mp4 |
127.42MB |
008 RADIUS vs TACACS+ (OBJ 3.8).en.srt |
4.48KB |
008 RADIUS vs TACACS+ (OBJ 3.8).mp4 |
49.87MB |
008 Redundant Sites (OBJ 2.1).en.srt |
5.44KB |
008 Redundant Sites (OBJ 2.1).mp4 |
50.70MB |
008 Rootkits (OBJ 1.2 & 1.3).en.srt |
6.86KB |
008 Rootkits (OBJ 1.2 & 1.3).mp4 |
75.59MB |
008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt |
6.76KB |
008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4 |
73.04MB |
008 Spoofing (OBJ 1.4 & 3.3).en.srt |
2.82KB |
008 Spoofing (OBJ 1.4 & 3.3).mp4 |
28.53MB |
008 SQL Injection (OBJ 1.3).en.srt |
12.60KB |
008 SQL Injection (OBJ 1.3).mp4 |
141.47MB |
008 Symptoms of Infection (OBJ 1.2).en.srt |
8.74KB |
008 Symptoms of Infection (OBJ 1.2).mp4 |
91.40MB |
008 Unified Threat Management (OBJ 3.2 & 3.3).en.srt |
3.73KB |
008 Unified Threat Management (OBJ 3.2 & 3.3).mp4 |
41.62MB |
008 User Account Control (OBJ 3.7 & 3.8).en.srt |
4.34KB |
008 User Account Control (OBJ 3.7 & 3.8).mp4 |
40.83MB |
008 User Education (OBJ 5.3).en.srt |
9.32KB |
008 User Education (OBJ 5.3).mp4 |
88.88MB |
008 VLANs (OBJ 3.3).en.srt |
3.02KB |
008 VLANs (OBJ 3.3).mp4 |
33.11MB |
009 __ FAAS and Serverless (OBJ 2.2).en.srt |
18.13KB |
009 __ FAAS and Serverless (OBJ 2.2).mp4 |
51.28MB |
009 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt |
7.98KB |
009 __ Mitigating Vulnerabilities (OBJ 2.6).mp4 |
22.23MB |
009 __ WPA3 (OBJ 3.4).en.srt |
12.15KB |
009 __ WPA3 (OBJ 3.4).mp4 |
39.08MB |
009 Authentication Summary (OBJ 3.8).en.srt |
3.62KB |
009 Authentication Summary (OBJ 3.8).mp4 |
43.71MB |
009 Data Backup (OBJ 2.5).en.srt |
6.22KB |
009 Data Backup (OBJ 2.5).mp4 |
62.71MB |
009 Demo_ Group Policies (OBJ 3.2).en.srt |
7.87KB |
009 Demo_ Group Policies (OBJ 3.2).mp4 |
30.89MB |
009 Demo_ Password Cracking (OBJ 4.1).en.srt |
4.83KB |
009 Demo_ Password Cracking (OBJ 4.1).mp4 |
39.04MB |
009 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt |
13.44KB |
009 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4 |
74.85MB |
009 Demo_ Steganography (OBJ 2.8).en.srt |
7.99KB |
009 Demo_ Steganography (OBJ 2.8).mp4 |
42.15MB |
009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt |
9.13KB |
009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4 |
106.73MB |
009 Hardening Mobile Devices (OBJ 3.5).en.srt |
7.26KB |
009 Hardening Mobile Devices (OBJ 3.5).mp4 |
81.84MB |
009 Hijacking (OBJ 1.3 & 1.4).en.srt |
8.50KB |
009 Hijacking (OBJ 1.3 & 1.4).mp4 |
74.66MB |
009 Log Files (OBJ 4.3).en.srt |
11.21KB |
009 Log Files (OBJ 4.3).mp4 |
114.82MB |
009 Removing Malware (OBJ 4.2).en.srt |
10.79KB |
009 Removing Malware (OBJ 4.2).mp4 |
108.29MB |
009 Spam (OBJ 1.1).en.srt |
5.84KB |
009 Spam (OBJ 1.1).mp4 |
65.14MB |
009 Subnetting (OBJ 3.6).en.srt |
4.17KB |
009 Subnetting (OBJ 3.6).mp4 |
41.36MB |
009 Threat Actors (1.5).en.srt |
6.48KB |
009 Threat Actors (1.5).mp4 |
68.27MB |
009 User Education (OBJ 5.3).en.srt |
11.07KB |
009 User Education (OBJ 5.3).mp4 |
105.26MB |
009 Vendor Relationships (OBJ 5.3).en.srt |
17.68KB |
009 Vendor Relationships (OBJ 5.3).mp4 |
167.16MB |
010 __ Authentication Attacks (OBJ 1.2).en.srt |
16.46KB |
010 __ Authentication Attacks (OBJ 1.2).mp4 |
42.44MB |
010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt |
18.30KB |
010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4 |
40.96MB |
010 __ Cryptography Considerations (OBJ 2.8).en.srt |
27.49KB |
010 __ Cryptography Considerations (OBJ 2.8).mp4 |
76.61MB |
010 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt |
12.06KB |
010 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4 |
52.40MB |
010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt |
14.21KB |
010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4 |
47.82MB |
010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt |
19.60KB |
010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 |
58.00MB |
010 __ XML Vulnerabilities (OBJ 1.3).en.srt |
10.97KB |
010 __ XML Vulnerabilities (OBJ 1.3).mp4 |
49.28MB |
010 Disposal Policies (OBJ 2.7 & 4.1).en.srt |
12.29KB |
010 Disposal Policies (OBJ 2.7 & 4.1).mp4 |
110.05MB |
010 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt |
6.26KB |
010 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4 |
69.02MB |
010 Network Address Translation (OBJ 3.3).en.srt |
4.84KB |
010 Network Address Translation (OBJ 3.3).mp4 |
52.66MB |
010 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt |
13.80KB |
010 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4 |
132.20MB |
010 Preventing Malware (OBJ 1.6 & 3.2).en.srt |
12.21KB |
010 Preventing Malware (OBJ 1.6 & 3.2).mp4 |
128.84MB |
010 Replay Attack (OBJ 1.3).en.srt |
3.22KB |
010 Replay Attack (OBJ 1.3).mp4 |
32.02MB |
010 SIEM (OBJ 1.7 & 4.3).en.srt |
19.00KB |
010 SIEM (OBJ 1.7 & 4.3).mp4 |
65.87MB |
010 Summary of Malware.en.srt |
4.17KB |
010 Summary of Malware.mp4 |
44.67MB |
010 Tape Rotation (OBJ 2.5).en.srt |
8.49KB |
010 Tape Rotation (OBJ 2.5).mp4 |
85.12MB |
011 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt |
17.37KB |
011 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 |
39.54MB |
011 __ Race Conditions (OBJ 1.3).en.srt |
12.92KB |
011 __ Race Conditions (OBJ 1.3).mp4 |
34.59MB |
011 __ Syslog (OBJ 1.7 & 4.3).en.srt |
12.30KB |
011 __ Syslog (OBJ 1.7 & 4.3).mp4 |
42.49MB |
011 __ Threat Hunting (OBJ 1.7).en.srt |
15.26KB |
011 __ Threat Hunting (OBJ 1.7).mp4 |
42.98MB |
011 Demo_ Null Sessions (OBJ 1.6).en.srt |
4.85KB |
011 Demo_ Null Sessions (OBJ 1.6).mp4 |
38.61MB |
011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt |
13.52KB |
011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4 |
123.19MB |
011 IT Security Frameworks (OBJ 5.2).en.srt |
7.13KB |
011 IT Security Frameworks (OBJ 5.2).mp4 |
71.12MB |
011 Telephony (OBJ 3.1).en.srt |
13.10KB |
011 Telephony (OBJ 3.1).mp4 |
130.69MB |
012 __ Attack Frameworks (OBJ 4.2).en.srt |
24.75KB |
012 __ Attack Frameworks (OBJ 4.2).mp4 |
87.68MB |
012 __ Business Impact Analysis (OBJ 5.4).en.srt |
35.13KB |
012 __ Business Impact Analysis (OBJ 5.4).mp4 |
118.33MB |
012 __ Design Vulnerabilities (OBJ 1.3).en.srt |
9.49KB |
012 __ Design Vulnerabilities (OBJ 1.3).mp4 |
26.86MB |
012 __ Key Frameworks (OBJ 5.2).en.srt |
17.99KB |
012 __ Key Frameworks (OBJ 5.2).mp4 |
77.23MB |
012 __ SOAR (OBJ 1.7 & 4.4).en.srt |
7.50KB |
012 __ SOAR (OBJ 1.7 & 4.4).mp4 |
21.26MB |
012 Transitive Attacks (OBJ 2.4).en.srt |
3.20KB |
012 Transitive Attacks (OBJ 2.4).mp4 |
31.63MB |
013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt |
9.83KB |
013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4 |
96.23MB |
014 ARP Poisoning (OBJ 1.4).en.srt |
3.25KB |
014 ARP Poisoning (OBJ 1.4).mp4 |
32.57MB |
external-assets-links.txt |
151B |
udemy-dl.log |
0B |