Torrent Info
Title CompTIA Security+ (SY0-601)
Category
Size 3.09GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 169B
01. Module Intro.mp4 874.88KB
01. Module Intro.mp4 3.56MB
01. Module Intro.mp4 3.08MB
01. Module Intro.mp4 1.93MB
01. Module Intro.mp4 1.76MB
01. Module Intro.mp4 1.58MB
01. Module Intro.mp4 1.43MB
01. Module Intro.mp4 1.38MB
01. Module Intro.mp4 1.37MB
01. Module Intro.mp4 1.35MB
01. Module Intro.mp4 1.30MB
01. Module Intro.mp4 1.29MB
01. Module Intro.mp4 1.26MB
01. Module Intro.mp4 1.15MB
01. Module Intro.vtt 2.95KB
01. Module Intro.vtt 1.38KB
01. Module Intro.vtt 1.71KB
01. Module Intro.vtt 1.39KB
01. Module Intro.vtt 2.25KB
01. Module Intro.vtt 1.32KB
01. Module Intro.vtt 1.25KB
01. Module Intro.vtt 4.21KB
01. Module Intro.vtt 2.21KB
01. Module Intro.vtt 1.07KB
01. Module Intro.vtt 1.65KB
01. Module Intro.vtt 1.45KB
01. Module Intro.vtt 1.45KB
01. Module Intro.vtt 1.31KB
01. Module Overview.mp4 972.08KB
01. Module Overview.mp4 3.01MB
01. Module Overview.mp4 1.72MB
01. Module Overview.mp4 1.51MB
01. Module Overview.mp4 1.39MB
01. Module Overview.mp4 1.39MB
01. Module Overview.mp4 1.38MB
01. Module Overview.mp4 1.37MB
01. Module Overview.mp4 1.32MB
01. Module Overview.mp4 1.31MB
01. Module Overview.mp4 1.30MB
01. Module Overview.mp4 1.28MB
01. Module Overview.mp4 1.22MB
01. Module Overview.mp4 1.15MB
01. Module Overview.mp4 1.09MB
01. Module Overview.mp4 1.07MB
01. Module Overview.mp4 1.07MB
01. Module Overview.mp4 1.01MB
01. Module Overview.vtt 1.34KB
01. Module Overview.vtt 2.70KB
01. Module Overview.vtt 1.25KB
01. Module Overview.vtt 1.20KB
01. Module Overview.vtt 1.26KB
01. Module Overview.vtt 1.56KB
01. Module Overview.vtt 2.26KB
01. Module Overview.vtt 1.73KB
01. Module Overview.vtt 1.52KB
01. Module Overview.vtt 1.51KB
01. Module Overview.vtt 1.43KB
01. Module Overview.vtt 1.37KB
01. Module Overview.vtt 1.26KB
01. Module Overview.vtt 1.22KB
01. Module Overview.vtt 1.08KB
01. Module Overview.vtt 1.06KB
01. Module Overview.vtt 1.06KB
01. Module Overview.vtt 1.04KB
01. Module Review.mp4 890.20KB
01. Module Review.mp4 1.83MB
01. Module Review.mp4 1.22MB
01. Module Review.vtt 2.05KB
01. Module Review.vtt 1.10KB
01. Module Review.vtt 860B
02. Antivirus.mp4 2.35MB
02. Antivirus.vtt 2.26KB
02. Application WhitelistingBlacklisting.mp4 2.10MB
02. Application WhitelistingBlacklisting.vtt 2.55KB
02. Authentication Management.mp4 5.13MB
02. Authentication Management.vtt 5.95KB
02. Barricades.mp4 3.54MB
02. Barricades.vtt 2.07KB
02. Cellular.mp4 10.78MB
02. Cellular.vtt 14.20KB
02. Certificate Authorities and Digital Certificates.mp4 1.31MB
02. Certificate Authorities and Digital Certificates.vtt 1.48KB
02. Cloud-based vs. On-premise.mp4 4.14MB
02. Cloud-based vs. On-premise.vtt 5.39KB
02. Cloud Storage.mp4 3.38MB
02. Cloud Storage.vtt 4.48KB
02. Company Obligations to Protect Security.mp4 2.25MB
02. Company Obligations to Protect Security.vtt 3.28KB
02. Computer Forensics.mp4 3.57MB
02. Computer Forensics.vtt 4.43KB
02. Configuration Management.mp4 7.50MB
02. Configuration Management.vtt 7.07KB
02. Directory Services.mp4 2.72MB
02. Directory Services.vtt 2.84KB
02. Environments (Dev, Test, Staging, and Production).mp4 5.66MB
02. Environments (Dev, Test, Staging, and Production).vtt 7.10KB
02. Filtering Through the Noise.mp4 7.47MB
02. Filtering Through the Noise.vtt 6.73KB
02. Geographically Disperse.mp4 1.53MB
02. Geographically Disperse.vtt 1.53KB
02. High Availability.mp4 4.49MB
02. High Availability.vtt 3.98KB
02. Identity Provider (IdP).mp4 2.80MB
02. Identity Provider (IdP).vtt 2.66KB
02. Importance of Policies in Reducing Risk.mp4 792.11KB
02. Importance of Policies in Reducing Risk.vtt 821B
02. Indicators of Compromise (IOC).mp4 4.05MB
02. Indicators of Compromise (IOC).vtt 3.65KB
02. Jump Server.mp4 3.45MB
02. Jump Server.vtt 4.06KB
02. Load Balancers.mp4 6.45MB
02. Load Balancers.vtt 7.55KB
02. Module Goal.mp4 2.01MB
02. Module Goal.vtt 2.60KB
02. Networking Protocols and TCP Three-way Handshake.mp4 6.34MB
02. Networking Protocols and TCP Three-way Handshake.vtt 6.98KB
02. Penetration Testing.mp4 1.82MB
02. Penetration Testing.vtt 2.08KB
02. Privacy and Compliance Challenges.mp4 9.35MB
02. Privacy and Compliance Challenges.vtt 9.57KB
02. Privilege Escalation.mp4 4.31MB
02. Privilege Escalation.vtt 4.07KB
02. Risk Types.mp4 3.33MB
02. Risk Types.vtt 6.84KB
02. Rogue Access Points and Evil Twin.mp4 5.14MB
02. Rogue Access Points and Evil Twin.vtt 6.02KB
02. Script Kiddies.mp4 1.69MB
02. Script Kiddies.vtt 1.88KB
02. Specific Types of Threats.mp4 1.04MB
02. Specific Types of Threats.vtt 1.29KB
02. Traceroutetracert.mp4 2.89MB
02. Traceroutetracert.vtt 3.49KB
02. What Is Social Engineering.mp4 3.05MB
02. What Is Social Engineering.vtt 3.66KB
02. Who Should Watch this Course.mp4 5.18MB
02. Who Should Watch this Course.vtt 5.24KB
02. Why You Should Care.mp4 1.42MB
02. Why You Should Care.vtt 1.49KB
02. Wireless Definitions.mp4 3.27MB
02. Wireless Definitions.vtt 3.25KB
03. Bluejack and Bluesnarfing.mp4 5.45MB
03. Bluejack and Bluesnarfing.vtt 6.01KB
03. Certificate Authority.mp4 3.01MB
03. Certificate Authority.vtt 3.65KB
03. Cloud Computing.mp4 1.97MB
03. Cloud Computing.vtt 2.66KB
03. Cross Site Scripting (XSS).mp4 6.69MB
03. Cross Site Scripting (XSS).vtt 5.14KB
03. Cryptographic Terminology and History.mp4 5.80MB
03. Cryptographic Terminology and History.vtt 6.58KB
03. Diagrams.mp4 4.51MB
03. Diagrams.vtt 2.17KB
03. DNSSEC.mp4 7.01MB
03. DNSSEC.vtt 6.65KB
03. Embedded Systems.mp4 1.77MB
03. Embedded Systems.vtt 1.62KB
03. Endpoint Detection and Response (EDR).mp4 3.16MB
03. Endpoint Detection and Response (EDR).vtt 3.94KB
03. Environment Example.mp4 6.16MB
03. Environment Example.vtt 4.49KB
03. Extensible Authentication Protocol (EAP).mp4 1.42MB
03. Extensible Authentication Protocol (EAP).vtt 1.33KB
03. GDPR and Key Terminology.mp4 3.03MB
03. GDPR and Key Terminology.vtt 2.99KB
03. Geographical Dispersal of Assets.mp4 2.26MB
03. Geographical Dispersal of Assets.vtt 2.31KB
03. Hacktivists.mp4 1.63MB
03. Hacktivists.vtt 1.85KB
03. IdP Example.mp4 2.51MB
03. IdP Example.vtt 2.93KB
03. Job Rotation.mp4 2.81MB
03. Job Rotation.vtt 3.13KB
03. Managing Risk.mp4 1.19MB
03. Managing Risk.vtt 1.30KB
03. Mantraps.mp4 1.32MB
03. Mantraps.vtt 1.39KB
03. New Threats Zero Days.mp4 2.85MB
03. New Threats Zero Days.vtt 4.11KB
03. nslookupdig.mp4 2.91MB
03. nslookupdig.vtt 2.91KB
03. Order of Volatility.mp4 8.94MB
03. Order of Volatility.vtt 9.21KB
03. Penetration Testing Steps.mp4 3.09MB
03. Penetration Testing Steps.vtt 4.84KB
03. Phishing.mp4 6.36MB
03. Phishing.vtt 3.44KB
03. Potential Damages from Mishandled Data.mp4 2.11MB
03. Potential Damages from Mishandled Data.vtt 2.60KB
03. Proxies.mp4 5.87MB
03. Proxies.vtt 6.94KB
03. Quarantine.mp4 3.77MB
03. Quarantine.vtt 4.42KB
03. Resource Policies.mp4 2.25MB
03. Resource Policies.vtt 2.42KB
03. Securing Wi-Fi.mp4 3.18MB
03. Securing Wi-Fi.vtt 3.22KB
03. Security Segmentation Models.mp4 4.21MB
03. Security Segmentation Models.vtt 5.38KB
03. Team Models.mp4 2.19MB
03. Team Models.vtt 2.37KB
03. Usernames.mp4 1.91MB
03. Usernames.vtt 1.67KB
03. Virus.mp4 4.00MB
03. Virus.vtt 4.95KB
03. Vulnerability Scanner Demo.mp4 10.37MB
03. Vulnerability Scanner Demo.vtt 6.24KB
03. WEPWPAWPA2.mp4 2.42MB
03. WEPWPAWPA2.vtt 2.56KB
03. What Is Cyber Threat Intelligence.mp4 2.39MB
03. What Is Cyber Threat Intelligence.vtt 2.61KB
04. [X] as a Service.mp4 1.03MB
04. [X] as a Service.vtt 1.11KB
04. Badges.mp4 2.84MB
04. Badges.vtt 3.33KB
04. Baseline Configuration.mp4 3.66MB
04. Baseline Configuration.vtt 3.74KB
04. Certificates, Tokens, and SSH Keys.mp4 3.67MB
04. Certificates, Tokens, and SSH Keys.vtt 2.49KB
04. Chain of Custody.mp4 5.37MB
04. Chain of Custody.vtt 4.81KB
04. Challenge Handshake Authentication Protocol (CHAP).mp4 1.68MB
04. Challenge Handshake Authentication Protocol (CHAP).vtt 1.64KB
04. CRLs.mp4 2.36MB
04. CRLs.vtt 2.90KB
04. Crypto-malware Ransomware.mp4 5.98MB
04. Crypto-malware Ransomware.vtt 3.82KB
04. Data Loss Prevention (DLP).mp4 3.76MB
04. Data Loss Prevention (DLP).vtt 4.39KB
04. Dissociation.mp4 2.67MB
04. Dissociation.vtt 2.28KB
04. Embedded Systems Examples.mp4 3.30MB
04. Embedded Systems Examples.vtt 3.00KB
04. Federation.mp4 1.82MB
04. Federation.vtt 1.75KB
04. Firewalls.mp4 8.90MB
04. Firewalls.vtt 11.82KB
04. GDPR Key Terms and Data Processing Princ.mp4 3.26MB
04. GDPR Key Terms and Data Processing Princ.vtt 3.63KB
04. Importance of Cyber Threat Intelligence.mp4 1.35MB
04. Importance of Cyber Threat Intelligence.vtt 1.57KB
04. Incident Notification and Escalation.mp4 3.38MB
04. Incident Notification and Escalation.vtt 3.84KB
04. Incident Response Process.mp4 2.82MB
04. Incident Response Process.vtt 3.20KB
04. ipconfigifconfig.mp4 1.31MB
04. ipconfigifconfig.vtt 1.55KB
04. Known, Unknown, and Partially Known Environments.mp4 1.51MB
04. Known, Unknown, and Partially Known Environments.vtt 1.64KB
04. Mandatory Vacations.mp4 1.20MB
04. Mandatory Vacations.vtt 1.10KB
04. Mis-configuration Weak Configuration.mp4 2.31MB
04. Mis-configuration Weak Configuration.vtt 2.15KB
04. Near Field Communication (NFC).mp4 2.15MB
04. Near Field Communication (NFC).vtt 2.53KB
04. Organized Crime.mp4 2.09MB
04. Organized Crime.vtt 2.48KB
04. Provisioning and Deprovisioning.mp4 3.62MB
04. Provisioning and Deprovisioning.vtt 4.46KB
04. RAID.mp4 5.14MB
04. RAID.vtt 4.65KB
04. Risk Management Defined.mp4 2.30MB
04. Risk Management Defined.vtt 2.02KB
04. Secrets Management.mp4 4.89MB
04. Secrets Management.vtt 4.28KB
04. SIEM.mp4 6.62MB
04. SIEM.vtt 6.08KB
04. SQL Injection.mp4 2.51MB
04. SQL Injection.vtt 2.19KB
04. SSH.mp4 1.94MB
04. SSH.vtt 2.30KB
04. Types of Phishing.mp4 5.76MB
04. Types of Phishing.vtt 6.34KB
04. Vigenere Table.mp4 10.21MB
04. Vigenere Table.vtt 5.98KB
04. Virtualization.mp4 2.29MB
04. Virtualization.vtt 2.34KB
04. Web Security Gateways.mp4 2.78MB
04. Web Security Gateways.vtt 2.92KB
04. WPA and WPA2 Security.mp4 6.74MB
04. WPA and WPA2 Security.vtt 6.49KB
05. Additional Areas of Concern.mp4 4.96MB
05. Additional Areas of Concern.vtt 4.73KB
05. Air Gaps.mp4 3.65MB
05. Air Gaps.vtt 4.17KB
05. Alarms.mp4 2.53MB
05. Alarms.vtt 3.00KB
05. Certificate Issues.mp4 4.43MB
05. Certificate Issues.vtt 5.22KB
05. Demo - Configuring Firewall Rules.mp4 19.10MB
05. Demo - Configuring Firewall Rules.vtt 6.93KB
05. Digital Signatures.mp4 2.52MB
05. Digital Signatures.vtt 2.48KB
05. DLL Injection.mp4 7.07MB
05. DLL Injection.vtt 3.53KB
05. Infrastructure as a Service (IaaS).mp4 3.05MB
05. Infrastructure as a Service (IaaS).vtt 3.01KB
05. Integrity Measurement.mp4 3.15MB
05. Integrity Measurement.vtt 3.65KB
05. Intrusion Detection and Prevention.mp4 9.11MB
05. Intrusion Detection and Prevention.vtt 9.70KB
05. IP Address Schema.mp4 3.74MB
05. IP Address Schema.vtt 3.93KB
05. Jamming.mp4 1.65MB
05. Jamming.vtt 1.81KB
05. Legal Hold.mp4 2.24MB
05. Legal Hold.vtt 2.61KB
05. Log Files.mp4 6.83MB
05. Log Files.vtt 7.82KB
05. Multipath.mp4 3.67MB
05. Multipath.vtt 3.47KB
05. Nation States APT.mp4 2.13MB
05. Nation States APT.vtt 2.27KB
05. Next-generation Firewall (NGFW).mp4 2.90MB
05. Next-generation Firewall (NGFW).vtt 3.20KB
05. nmap and nmap demo.mp4 6.98MB
05. nmap and nmap demo.vtt 6.04KB
05. Notifying Outside Agencies.mp4 2.51MB
05. Notifying Outside Agencies.vtt 2.74KB
05. OCSP.mp4 2.63MB
05. OCSP.vtt 3.40KB
05. Password Authentication Protocol (PAP).mp4 1.38MB
05. Password Authentication Protocol (PAP).vtt 1.78KB
05. Preparation.mp4 2.05MB
05. Preparation.vtt 2.82KB
05. Risk Management Concepts.mp4 5.52MB
05. Risk Management Concepts.vtt 4.89KB
05. Rules of Engagement.mp4 3.15MB
05. Rules of Engagement.vtt 3.32KB
05. SCADA ICS.mp4 9.42MB
05. SCADA ICS.vtt 7.71KB
05. Separation of Duties.mp4 997.25KB
05. Separation of Duties.vtt 947B
05. Shared Accounts (Improperly Configured).mp4 2.31MB
05. Shared Accounts (Improperly Configured).vtt 2.26KB
05. Six Legal Grounds for Processing Persona.mp4 2.12MB
05. Six Legal Grounds for Processing Persona.vtt 2.40KB
05. SMIME.mp4 1.80MB
05. SMIME.vtt 2.06KB
05. Storage in the Cloud.mp4 4.44MB
05. Storage in the Cloud.vtt 5.25KB
05. Threat Intelligence Classification.mp4 2.49MB
05. Threat Intelligence Classification.vtt 3.27KB
05. Transitive Trust Authentication.mp4 1.86MB
05. Transitive Trust Authentication.vtt 1.80KB
05. Trojan.mp4 7.07MB
05. Trojan.vtt 7.58KB
05. Vishing.mp4 4.78MB
05. Vishing.vtt 4.81KB
05. WPA3.mp4 8.42MB
05. WPA3.vtt 7.03KB
06. Attestation.mp4 1.33MB
06. Attestation.vtt 1.16KB
06. CSR and PKCS Standards.mp4 1.82MB
06. CSR and PKCS Standards.vtt 1.29KB
06. Data Classification.mp4 5.08MB
06. Data Classification.vtt 5.19KB
06. Data Sovereignty.mp4 2.47MB
06. Data Sovereignty.vtt 2.55KB
06. Detection and Analysis.mp4 6.26MB
06. Detection and Analysis.vtt 5.53KB
06. East-west Traffic.mp4 3.26MB
06. East-west Traffic.vtt 3.39KB
06. First Responder Best Practices.mp4 9.58MB
06. First Responder Best Practices.vtt 9.10KB
06. GDPR Compliance and Penalties.mp4 1.13MB
06. GDPR Compliance and Penalties.vtt 1.09KB
06. HIDSHIPS.mp4 1.51MB
06. HIDSHIPS.vtt 1.78KB
06. IaaS and Automation.mp4 2.74MB
06. IaaS and Automation.vtt 3.03KB
06. IDSIPS Component Workflow.mp4 2.13MB
06. IDSIPS Component Workflow.vtt 2.32KB
06. Insiders.mp4 2.57MB
06. Insiders.vtt 2.59KB
06. Key Stretching.mp4 6.04MB
06. Key Stretching.vtt 6.02KB
06. Lateral Movement.mp4 1.70MB
06. Lateral Movement.vtt 2.63KB
06. LDAP Injection.mp4 1.21MB
06. LDAP Injection.vtt 1.27KB
06. Least Privilege.mp4 1.21MB
06. Least Privilege.vtt 1.26KB
06. Lighting and Signs.mp4 3.66MB
06. Lighting and Signs.vtt 3.20KB
06. Load Balancer.mp4 2.27MB
06. Load Balancer.vtt 2.00KB
06. Log Management, Syslog, Rsyslog, and Syslog-ng.mp4 6.54MB
06. Log Management, Syslog, Rsyslog, and Syslog-ng.vtt 5.77KB
06. MicroSD HSM.mp4 1.47MB
06. MicroSD HSM.vtt 1.30KB
06. Mobile Device Management.mp4 9.64MB
06. Mobile Device Management.vtt 8.10KB
06. Ping and Pathping.mp4 5.52MB
06. Ping and Pathping.vtt 4.44KB
06. Port Security and 802.1x Authentication.mp4 7.96MB
06. Port Security and 802.1x Authentication.vtt 7.08KB
06. RFID.mp4 2.18MB
06. RFID.vtt 2.06KB
06. SCADA Security Concerns.mp4 5.47MB
06. SCADA Security Concerns.vtt 5.14KB
06. Secure Real-Time Transport Protocol (SRTP).mp4 1.19MB
06. Secure Real-Time Transport Protocol (SRTP).vtt 1.14KB
06. Smart Cards.mp4 1.48MB
06. Smart Cards.vtt 1.63KB
06. SPAM.mp4 4.65MB
06. SPAM.vtt 4.75KB
06. Static Code Analysis.mp4 3.59MB
06. Static Code Analysis.vtt 4.19KB
06. Strategic, Operational, and Tactical Intelligence.mp4 2.62MB
06. Strategic, Operational, and Tactical Intelligence.vtt 2.22KB
06. Strategic Options.mp4 3.18MB
06. Strategic Options.vtt 3.45KB
06. Virtual Networks.mp4 6.35MB
06. Virtual Networks.vtt 5.09KB
06. Weak Configuration Considerations.mp4 3.13MB
06. Weak Configuration Considerations.vtt 4.87KB
06. Wireless Security Examples.mp4 4.09MB
06. Wireless Security Examples.vtt 3.69KB
06. Worms.mp4 1.40MB
06. Worms.vtt 1.33KB
07. API Inspection and Integration.mp4 2.31MB
07. API Inspection and Integration.vtt 3.02KB
07. Cameras and Video Surveillance.mp4 2.89MB
07. Cameras and Video Surveillance.vtt 2.86KB
07. Capture a System Image.mp4 6.52MB
07. Capture a System Image.vtt 6.39KB
07. Clean Desk Policies.mp4 1.87MB
07. Clean Desk Policies.vtt 2.51KB
07. Competitors.mp4 2.09MB
07. Competitors.vtt 2.57KB
07. Compliance Frameworks.mp4 4.08MB
07. Compliance Frameworks.vtt 4.31KB
07. Data Loss Prevention (DLP).mp4 3.80MB
07. Data Loss Prevention (DLP).vtt 4.30KB
07. Dumpter Diving.mp4 1.87MB
07. Dumpter Diving.vtt 2.31KB
07. Escalation of Privilege.mp4 1.07MB
07. Escalation of Privilege.vtt 1.17KB
07. Four Approaches to IDS.mp4 2.72MB
07. Four Approaches to IDS.vtt 3.22KB
07. Gathering and Correlating Information.mp4 3.72MB
07. Gathering and Correlating Information.vtt 3.71KB
07. Hashing.mp4 4.40MB
07. Hashing.vtt 3.95KB
07. Host-based Firewall.mp4 2.53MB
07. Host-based Firewall.vtt 2.67KB
07. hping and hping demo.mp4 5.28MB
07. hping and hping demo.vtt 4.53KB
07. Journalctl.mp4 10.13MB
07. Journalctl.vtt 5.84KB
07. Lightweight Directory Access Protocol over SSL (LDAPS).mp4 1.64MB
07. Lightweight Directory Access Protocol over SSL (LDAPS).vtt 1.64KB
07. Mobile Device Management (MDM, MAM, and UEM).mp4 2.21MB
07. Mobile Device Management (MDM, MAM, and UEM).vtt 2.21KB
07. Near Field Communication (NFC).mp4 2.91MB
07. Near Field Communication (NFC).vtt 2.33KB
07. PKI.mp4 8.48MB
07. PKI.vtt 6.89KB
07. Platform as a Service (PaaS).mp4 3.31MB
07. Platform as a Service (PaaS).vtt 3.35KB
07. Potentially Unwanted Programs (PUP).mp4 2.72MB
07. Potentially Unwanted Programs (PUP).vtt 2.95KB
07. Power Resiliency.mp4 3.82MB
07. Power Resiliency.vtt 3.71KB
07. Privacy-enhancing Technologies, Data Masking, and Tokenization.mp4 2.52MB
07. Privacy-enhancing Technologies, Data Masking, and Tokenization.vtt 3.32KB
07. RADIUS.mp4 4.14MB
07. RADIUS.vtt 4.94KB
07. Risk Register, Risk Matrix, and Heat Map.mp4 1.63MB
07. Risk Register, Risk Matrix, and Heat Map.vtt 2.14KB
07. Secure Coding Techniques.mp4 14.24MB
07. Secure Coding Techniques.vtt 12.55KB
07. Smart Devices IoT.mp4 4.05MB
07. Smart Devices IoT.vtt 4.44KB
07. Stopping the Spread.mp4 3.44MB
07. Stopping the Spread.vtt 4.81KB
07. Time-Based One-Time Password (TOTP).mp4 2.47MB
07. Time-Based One-Time Password (TOTP).vtt 2.86KB
07. User Accounts.mp4 1.95MB
07. User Accounts.vtt 1.84KB
07. Using MDM to Locate and Secure and Lost Device.mp4 2.03MB
07. Using MDM to Locate and Secure and Lost Device.vtt 1.92KB
07. Weak Cipher Suites and Implementations.mp4 2.97MB
07. Weak Cipher Suites and Implementations.vtt 3.62KB
07. Wireless Security and Pen Testing Tools.mp4 5.03MB
07. Wireless Security and Pen Testing Tools.vtt 4.69KB
07. XML Injection.mp4 1.80MB
07. XML Injection.vtt 1.86KB
07. Zero Trust.mp4 3.04MB
07. Zero Trust.vtt 3.13KB
08. Account Management.mp4 3.62MB
08. Account Management.vtt 3.57KB
08. Anonymization and Pseudo-anonymization.mp4 2.52MB
08. Anonymization and Pseudo-anonymization.vtt 1.54KB
08. Background Checks, NDAs, and Role-based Awareness Training.mp4 3.15MB
08. Background Checks, NDAs, and Role-based Awareness Training.vtt 3.30KB
08. Boot Loader Protections and Secure Boot.mp4 4.96MB
08. Boot Loader Protections and Secure Boot.vtt 4.65KB
08. Defining Goals and Expected Outcomes.mp4 7.53MB
08. Defining Goals and Expected Outcomes.vtt 6.85KB
08. DLP, Content FiltersURL Filters and UpdatingRevoking Certificates.mp4 5.92MB
08. DLP, Content FiltersURL Filters and UpdatingRevoking Certificates.vtt 5.77KB
08. EAP, PEAP, and LEAP.mp4 3.73MB
08. EAP, PEAP, and LEAP.vtt 4.02KB
08. Fileless Virus.mp4 3.66MB
08. Fileless Virus.vtt 3.90KB
08. FTPS and SFTP.mp4 2.32MB
08. FTPS and SFTP.vtt 2.63KB
08. Growth of Enterprise Cloud Application.mp4 1.85MB
08. Growth of Enterprise Cloud Application.vtt 2.68KB
08. Guards.mp4 1.16MB
08. Guards.vtt 1.10KB
08. HMAC-Based One-Time Password (HOTP).mp4 1.40MB
08. HMAC-Based One-Time Password (HOTP).vtt 1.44KB
08. Improper Certificate and Key Management.mp4 2.56MB
08. Improper Certificate and Key Management.vtt 2.63KB
08. In-band vs. Out-of-band Key Exchange.mp4 2.58MB
08. In-band vs. Out-of-band Key Exchange.vtt 2.80KB
08. IV Attack.mp4 4.85MB
08. IV Attack.vtt 5.31KB
08. Methods of Privilege Escalation.vtt 3.04KB
08. Netstat.mp4 2.38MB
08. Netstat.vtt 2.31KB
08. Network-based IDS.mp4 3.71MB
08. Network-based IDS.vtt 3.86KB
08. Network Traffic and Logs.mp4 6.31MB
08. Network Traffic and Logs.vtt 6.71KB
08. NIST and the Cyber-security Framework (C.mp4 1.65MB
08. NIST and the Cyber-security Framework (C.vtt 1.98KB
08. NXLOG.mp4 2.12MB
08. NXLOG.vtt 1.23KB
08. Pointer Dereference.mp4 2.76MB
08. Pointer Dereference.vtt 2.58KB
08. Public Key.mp4 1.90MB
08. Public Key.vtt 2.10KB
08. Replication.mp4 4.20MB
08. Replication.vtt 3.63KB
08. Risk Control Self-assessment (RCSA).mp4 3.91MB
08. Risk Control Self-assessment (RCSA).vtt 4.64KB
08. SEAndroid.mp4 2.58MB
08. SEAndroid.vtt 1.90KB
08. Security Automation.mp4 4.25MB
08. Security Automation.vtt 4.74KB
08. Shoulder Surfing.mp4 4.85MB
08. Shoulder Surfing.vtt 5.15KB
08. Single Sign-on (SSO).mp4 8.92MB
08. Single Sign-on (SSO).vtt 2.59KB
08. Smart Devices IoT Weak Defaults.mp4 1.89MB
08. Smart Devices IoT Weak Defaults.vtt 1.82KB
08. Software as a Service (SaaS).mp4 1.96MB
08. Software as a Service (SaaS).vtt 2.29KB
08. Stages of Risk Management.mp4 4.73MB
08. Stages of Risk Management.vtt 5.39KB
08. Threat Actor Attributes.mp4 1.35MB
08. Threat Actor Attributes.vtt 1.20KB
08. Types of Data to Secure.mp4 2.38MB
08. Types of Data to Secure.vtt 2.16KB
08. VPN.mp4 6.95MB
08. VPN.vtt 7.92KB
09. 802.11x Wireless Protocols.mp4 4.96MB
09. 802.11x Wireless Protocols.vtt 3.36KB
09. Attack Vectors.mp4 12.61MB
09. Attack Vectors.vtt 14.32KB
09. Botnets.mp4 4.69MB
09. Botnets.vtt 4.48KB
09. Capturing Video.mp4 1.82MB
09. Capturing Video.vtt 1.57KB
09. Continuous Monitoring and Validation.mp4 1.98MB
09. Continuous Monitoring and Validation.vtt 2.50KB
09. Cyber Kill Chain in the Cloud.mp4 8.31MB
09. Cyber Kill Chain in the Cloud.vtt 7.25KB
09. Data Masking.mp4 5.93MB
09. Data Masking.vtt 7.67KB
09. Data Owner.mp4 1.00MB
09. Data Owner.vtt 1.08KB
09. Device Security.mp4 6.61MB
09. Device Security.vtt 8.13KB
09. Directory Traversal Command Injection.mp4 3.11MB
09. Directory Traversal Command Injection.vtt 3.01KB
09. Elliptic Curve Cryptography (ECC).mp4 1.91MB
09. Elliptic Curve Cryptography (ECC).vtt 2.14KB
09. IaaS, PaaS, and SaaS Differentiators.mp4 2.02MB
09. IaaS, PaaS, and SaaS Differentiators.vtt 1.84KB
09. Measured Launch.mp4 1.22MB
09. Measured Launch.vtt 1.27KB
09. netcat.mp4 3.61MB
09. netcat.vtt 3.85KB
09. On-path Attacks (Formerly MiTM).mp4 1.99MB
09. On-path Attacks (Formerly MiTM).vtt 1.86KB
09. On-prem vs. Cloud.mp4 3.11MB
09. On-prem vs. Cloud.vtt 2.80KB
09. Password Complexity.mp4 2.30MB
09. Password Complexity.vtt 2.46KB
09. PCI-DSS.mp4 1.55MB
09. PCI-DSS.vtt 1.92KB
09. Persistence.mp4 757.99KB
09. Persistence.vtt 1.10KB
09. Pharming.mp4 4.29MB
09. Pharming.vtt 4.24KB
09. Private Key.mp4 976.99KB
09. Private Key.vtt 1.16KB
09. Retention (Auditing, Compliance and Investigations).mp4 2.77MB
09. Retention (Auditing, Compliance and Investigations).vtt 3.89KB
09. Risk Awareness (Inherent, Residual, Control, and Risk Appetite).mp4 2.06MB
09. Risk Awareness (Inherent, Residual, Control, and Risk Appetite).vtt 2.74KB
09. Risk Management Data Sources.mp4 4.31MB
09. Risk Management Data Sources.vtt 4.67KB
09. Robot Sentries.mp4 2.40MB
09. Robot Sentries.vtt 2.55KB
09. SAML.mp4 3.92MB
09. SAML.vtt 4.37KB
09. Secure Protocols.mp4 5.51MB
09. Secure Protocols.vtt 5.74KB
09. Security Device Placement.mp4 3.99MB
09. Security Device Placement.vtt 4.79KB
09. Segregation, Segmentation and Isolation.mp4 5.65MB
09. Segregation, Segmentation and Isolation.vtt 5.40KB
09. SMS Authentication.mp4 1.95MB
09. SMS Authentication.vtt 1.65KB
09. SNMP v3.mp4 1.76MB
09. SNMP v3.vtt 2.19KB
09. Special Purpose Devices.mp4 1.87MB
09. Special Purpose Devices.vtt 1.80KB
09. Split Tunnel.mp4 1.65MB
09. Split Tunnel.vtt 1.44KB
09. Test the Plan.mp4 1.05MB
09. Test the Plan.vtt 1.68KB
09. Use Cases for Monitoring.mp4 3.40MB
09. Use Cases for Monitoring.vtt 3.90KB
1 2B
1. Course Overview.mp4 4.89MB
1. Course Overview.mp4 3.94MB
1. Course Overview.mp4 3.80MB
1. Course Overview.mp4 3.71MB
1. Course Overview.mp4 3.71MB
1. Course Overview.vtt 2.84KB
1. Course Overview.vtt 3.16KB
1. Course Overview.vtt 3.10KB
1. Course Overview.vtt 3.02KB
1. Course Overview.vtt 2.98KB
1. Module Intro and Study Tips.mp4 5.85MB
1. Module Intro and Study Tips.vtt 6.73KB
1. Module Overview.mp4 1.42MB
1. Module Overview.vtt 1.82KB
1. Module Overview and Domains.mp4 4.51MB
1. Module Overview and Domains.vtt 4.34KB
10 226.33KB
10. Application Security and Key Credential Management.mp4 4.05MB
10. Application Security and Key Credential Management.vtt 5.66KB
10. Backup Plans Policies.mp4 1.83MB
10. Backup Plans Policies.vtt 2.11KB
10. Bandwidth Monitors.mp4 2.20MB
10. Bandwidth Monitors.vtt 2.52KB
10. Buffer Overflow.mp4 2.84MB
10. Buffer Overflow.vtt 1.76KB
10. Cleanup.mp4 1.72MB
10. Cleanup.vtt 2.35KB
10. Compute in the Cloud.mp4 5.78MB
10. Compute in the Cloud.vtt 7.51KB
10. Continuous Integration.mp4 3.02MB
10. Continuous Integration.vtt 3.08KB
10. Data Controller and Processor.mp4 578.02KB
10. Data Controller and Processor.vtt 622B
10. Default Configurations.mp4 2.33MB
10. Default Configurations.vtt 2.54KB
10. Enterprise Security Framework (ESF).mp4 2.17MB
10. Enterprise Security Framework (ESF).vtt 2.17KB
10. Firewalls.mp4 12.08MB
10. Firewalls.vtt 12.14KB
10. Integrity Measurement Architecture (IMA).mp4 749.51KB
10. Integrity Measurement Architecture (IMA).vtt 918B
10. IP Scanners.mp4 1.77MB
10. IP Scanners.vtt 1.64KB
10. IPSec and Transport Encryption.mp4 2.18MB
10. IPSec and Transport Encryption.vtt 2.65KB
10. Logic Bomb.mp4 1.64MB
10. Logic Bomb.vtt 2.38KB
10. Object Identifiers (OID).mp4 3.48MB
10. Object Identifiers (OID).vtt 2.90KB
10. On-path Attacks (Formerly MiTB).mp4 4.09MB
10. On-path Attacks (Formerly MiTB).vtt 4.37KB
10. Password History.mp4 3.52MB
10. Password History.vtt 3.47KB
10. Perfect Forward Secrecy.mp4 2.67MB
10. Perfect Forward Secrecy.vtt 2.06KB
10. RADIUS Federation.mp4 742.83KB
10. RADIUS Federation.vtt 728B
10. Reception.mp4 1.83MB
10. Reception.vtt 1.42KB
10. Record Time Offset.mp4 4.29MB
10. Record Time Offset.vtt 4.56KB
10. Regulatory Examples.mp4 1.15MB
10. Regulatory Examples.vtt 1.25KB
10. SSLTLS.mp4 1.85MB
10. SSLTLS.vtt 1.73KB
10. TACACS.mp4 1.94MB
10. TACACS.vtt 2.02KB
10. Tailgating.mp4 5.85MB
10. Tailgating.vtt 4.37KB
10. Things Typically Monitored.mp4 2.38MB
10. Things Typically Monitored.vtt 3.08KB
10. Tokenization.mp4 4.77MB
10. Tokenization.vtt 3.98KB
10. Tokens.mp4 1.91MB
10. Tokens.vtt 2.08KB
10. Types of Clouds.mp4 1.53MB
10. Types of Clouds.vtt 1.76KB
10. Use of Open Source Intelligence.mp4 7.00MB
10. Use of Open Source Intelligence.vtt 5.02KB
10. Vehicles.mp4 2.64MB
10. Vehicles.vtt 2.79KB
10. Virtualization.mp4 2.20MB
10. Virtualization.vtt 2.18KB
10. Vulnerability Scanning.mp4 1.26MB
10. Vulnerability Scanning.vtt 1.47KB
10. Walkthrough Tests.mp4 2.77MB
10. Walkthrough Tests.vtt 3.49KB
100 209.29KB
101 212.07KB
102 216.75KB
103 229.08KB
104 250.56KB
105 345.49KB
106 353.94KB
107 447.79KB
108 487.13KB
109 488.85KB
11 6.86KB
11. Air Gaps.mp4 3.37MB
11. Air Gaps.vtt 3.98KB
11. ARP.mp4 1.27MB
11. ARP.vtt 1.30KB
11. ARP Poisoning.mp4 2.59MB
11. ARP Poisoning.vtt 2.41KB
11. Authentication.mp4 2.70MB
11. Authentication.vtt 3.57KB
11. Backup Execution Frequency.mp4 2.21MB
11. Backup Execution Frequency.vtt 2.25KB
11. Balancing Whats Reasonable.mp4 1.20MB
11. Balancing Whats Reasonable.vtt 1.59KB
11. BIOSUEFI.mp4 964.31KB
11. BIOSUEFI.vtt 1001B
11. Bug Bounty.mp4 3.91MB
11. Bug Bounty.vtt 2.47KB
11. Closed Proprietary Intelligence.mp4 1.36MB
11. Closed Proprietary Intelligence.vtt 1.28KB
11. Cloud Access Security Broker (CASB).mp4 1.69MB
11. Cloud Access Security Broker (CASB).vtt 1.72KB
11. Communication Tests.mp4 2.13MB
11. Communication Tests.vtt 1.89KB
11. Continuous Delivery and Continuous Development.mp4 3.59MB
11. Continuous Delivery and Continuous Development.vtt 3.75KB
11. Data Steward Custodian.mp4 2.29MB
11. Data Steward Custodian.vtt 2.52KB
11. Digital Rights Management (DRM).mp4 1.52MB
11. Digital Rights Management (DRM).vtt 1.77KB
11. False Positive.mp4 1.69MB
11. False Positive.vtt 1.59KB
11. Gramm-Leach-Bliley Act (GLBA).mp4 2.46MB
11. Gramm-Leach-Bliley Act (GLBA).vtt 2.53KB
11. Hoaxes.mp4 6.29MB
11. Hoaxes.vtt 5.57KB
11. HTTPS.mp4 2.50MB
11. HTTPS.vtt 2.78KB
11. Managed Service Providers (MSP).mp4 7.55MB
11. Managed Service Providers (MSP).vtt 8.08KB
11. Metadata.mp4 6.14MB
11. Metadata.vtt 6.01KB
11. NIST SP 800-53 and ISO 27001.mp4 7.92MB
11. NIST SP 800-53 and ISO 27001.vtt 4.97KB
11. Password Reuse.mp4 1.96MB
11. Password Reuse.vtt 2.15KB
11. Quantum Communications.mp4 8.30MB
11. Quantum Communications.vtt 5.97KB
11. Race Conditions.mp4 3.39MB
11. Race Conditions.vtt 2.92KB
11. Spyware.mp4 2.47MB
11. Spyware.vtt 2.99KB
11. Static Codes.mp4 1.31MB
11. Static Codes.vtt 1.26KB
11. TACACS+.mp4 4.47MB
11. TACACS+.vtt 3.65KB
11. Taking Hashes.mp4 3.31MB
11. Taking Hashes.vtt 3.45KB
11. Third-party Risks.mp4 3.76MB
11. Third-party Risks.vtt 5.01KB
11. Two Person Integrity (TPI) Control.mp4 1.58MB
11. Two Person Integrity (TPI) Control.vtt 1.30KB
11. Types of Certificates.mp4 6.20MB
11. Types of Certificates.vtt 9.05KB
11. Voice over IP (VoIP).mp4 5.09MB
11. Voice over IP (VoIP).vtt 3.84KB
11. VPN Concentrator.mp4 2.16MB
11. VPN Concentrator.vtt 2.09KB
11. Web Application Firewalls.mp4 3.98MB
11. Web Application Firewalls.vtt 4.29KB
11. Wi-Fi Protected Setup (WPS).mp4 1.73MB
11. Wi-Fi Protected Setup (WPS).vtt 1.77KB
110 505.98KB
111 513.09KB
112 515.21KB
113 542.78KB
114 545.15KB
115 552.67KB
116 562.05KB
117 570.65KB
118 649.23KB
119 701.75KB
12 5.11KB
12. Application Security.mp4 1.73MB
12. Application Security.vtt 2.03KB
12. Authentication Applications.mp4 2.00MB
12. Authentication Applications.vtt 1.76KB
12. Backup Types.mp4 5.50MB
12. Backup Types.vtt 6.09KB
12. Captive Portal.mp4 3.93MB
12. Captive Portal.vtt 4.06KB
12. Certificate Formats.mp4 1.63MB
12. Certificate Formats.vtt 1.75KB
12. Cloud Security Alliance (CSA).mp4 2.18MB
12. Cloud Security Alliance (CSA).vtt 1.46KB
12. DNSSEC.mp4 7.09MB
12. DNSSEC.vtt 6.96KB
12. False Positive Audits.mp4 1.25MB
12. False Positive Audits.vtt 1.04KB
12. Fog Computing.mp4 4.79MB
12. Fog Computing.vtt 5.01KB
12. Geo-tagging.mp4 2.61MB
12. Geo-tagging.vtt 2.96KB
12. Hardware Based Encryption (TPM and HSM).mp4 2.94MB
12. Hardware Based Encryption (TPM and HSM).vtt 2.44KB
12. Hardware Locks.mp4 1.15MB
12. Hardware Locks.vtt 1.48KB
12. Hashing.mp4 4.38MB
12. Hashing.vtt 3.92KB
12. HIPAA.mp4 2.38MB
12. HIPAA.vtt 2.25KB
12. HVAC.mp4 3.83MB
12. HVAC.vtt 4.82KB
12. IPMAC Spoofing.mp4 1.61MB
12. IPMAC Spoofing.vtt 1.51KB
12. Keylogger.mp4 1.53MB
12. Keylogger.vtt 1.80KB
12. Netflow, sFlow, and IPFIX.mp4 9.22MB
12. Netflow, sFlow, and IPFIX.vtt 9.49KB
12. New Tools Are Constantly Developed.mp4 2.02MB
12. New Tools Are Constantly Developed.vtt 1.63KB
12. oAUTH.mp4 3.25MB
12. oAUTH.vtt 3.40KB
12. OWASP.mp4 940.96KB
12. OWASP.vtt 1.05KB
12. Pivoting.mp4 3.37MB
12. Pivoting.vtt 3.99KB
12. Prepending.mp4 3.15MB
12. Prepending.vtt 3.02KB
12. Privacy Officer.mp4 851.66KB
12. Privacy Officer.vtt 923B
12. Quantum Computing.mp4 2.48MB
12. Quantum Computing.vtt 2.25KB
12. Route.mp4 983.76KB
12. Route.vtt 946B
12. Screenshots.mp4 1.62MB
12. Screenshots.vtt 2.00KB
12. Secure POPIMAP.mp4 4.90MB
12. Secure POPIMAP.vtt 5.72KB
12. Securing the Environment using Isolation, Containment and Segment.mp4 3.20MB
12. Securing the Environment using Isolation, Containment and Segment.vtt 3.68KB
12. Simulation (Tabletop) Tests.mp4 1.49MB
12. Simulation (Tabletop) Tests.vtt 1.80KB
12. Time of Check.mp4 2.28MB
12. Time of Check.vtt 2.07KB
12. Time of Day Restrictions.mp4 1.88MB
12. Time of Day Restrictions.vtt 1.73KB
12. Unified Threat Management (UTM).mp4 1.57MB
12. Unified Threat Management (UTM).vtt 1.87KB
12. Vendor Management.mp4 4.99MB
12. Vendor Management.vtt 3.78KB
12. Vulnerability Databases.mp4 2.44MB
12. Vulnerability Databases.vtt 2.66KB
120 739.91KB
121 757.60KB
122 830.32KB
123 844.53KB
124 873.42KB
125 874.26KB
126 876.48KB
127 879.69KB
128 888.27KB
129 914.94KB
13 5.77KB
13. AircraftUAV.mp4 2.94MB
13. AircraftUAV.vtt 3.36KB
13. Backup Environments.mp4 1.99MB
13. Backup Environments.vtt 2.41KB
13. Biometrics.mp4 1.66MB
13. Biometrics.vtt 1.57KB
13. Content Filters.mp4 2.09MB
13. Content Filters.vtt 1.88KB
13. Context-aware Authentication.mp4 4.28MB
13. Context-aware Authentication.vtt 3.84KB
13. Curl and Curl Demo.mp4 2.61MB
13. Curl and Curl Demo.vtt 2.83KB
13. Detecting an Amplification Attack (ICMP echo).mp4 3.99MB
13. Detecting an Amplification Attack (ICMP echo).vtt 3.98KB
13. Edge Computing.mp4 977.26KB
13. Edge Computing.vtt 944B
13. False Negatives.mp4 1.23MB
13. False Negatives.vtt 1.33KB
13. Geographical Considerations.mp4 2.93MB
13. Geographical Considerations.vtt 2.71KB
13. HITECH Act.mp4 3.83MB
13. HITECH Act.vtt 3.46KB
13. Impersonation.mp4 1.85MB
13. Impersonation.vtt 2.20KB
13. Information Lifecycle.mp4 2.89MB
13. Information Lifecycle.vtt 3.78KB
13. Installation Considerations.mp4 2.06MB
13. Installation Considerations.vtt 1.99KB
13. MAC Flooding.mp4 3.58MB
13. MAC Flooding.vtt 3.69KB
13. Monitoring Social Media.mp4 1.31MB
13. Monitoring Social Media.vtt 1.06KB
13. Network Access Control (NAC).mp4 4.05MB
13. Network Access Control (NAC).vtt 5.18KB
13. Next-gen Secure Web Gateway (NG-SWG).mp4 1.22MB
13. Next-gen Secure Web Gateway (NG-SWG).vtt 1.39KB
13. Online vs. Offline Certificate Authority (CA).mp4 3.47MB
13. Online vs. Offline Certificate Authority (CA).vtt 3.65KB
13. OpenID and Shibboleth.mp4 2.35MB
13. OpenID and Shibboleth.vtt 2.40KB
13. Partial Exercise.mp4 1.58MB
13. Partial Exercise.vtt 1.73KB
13. Post Quantum.mp4 1.70MB
13. Post Quantum.vtt 1.78KB
13. Public and Private Information Sharing.mp4 1.94MB
13. Public and Private Information Sharing.vtt 2.33KB
13. Push Notifications.mp4 1.60MB
13. Push Notifications.vtt 1.73KB
13. Rootkits.mp4 2.24MB
13. Rootkits.vtt 2.54KB
13. Salt.mp4 1.77MB
13. Salt.vtt 1.85KB
13. Secure Coding Concepts, Error Handling, and Input Validation.mp4 6.96MB
13. Secure Coding Concepts, Error Handling, and Input Validation.vtt 8.61KB
13. SOAR and RunbooksPlaybooks.mp4 8.83MB
13. SOAR and RunbooksPlaybooks.vtt 10.26KB
13. Software Diversity, Compiler, and Binary.mp4 2.67MB
13. Software Diversity, Compiler, and Binary.vtt 2.65KB
13. SSAE 18, SOC 1, 2, and 3.mp4 5.08MB
13. SSAE 18, SOC 1, 2, and 3.vtt 5.16KB
13. Types of Reconnaissance.mp4 4.61MB
13. Types of Reconnaissance.vtt 5.21KB
13. Use Cases.mp4 5.46MB
13. Use Cases.vtt 8.52KB
13. User Access Best Practices.mp4 3.69MB
13. User Access Best Practices.vtt 4.82KB
13. Vulnerable Business Processes.mp4 4.36MB
13. Vulnerable Business Processes.vtt 4.51KB
13. Witnesses.mp4 3.84MB
13. Witnesses.vtt 3.82KB
130 929.23KB
131 939.31KB
132 943.18KB
133 944.24KB
134 988.26KB
135 4.38KB
136 5.23KB
137 25.79KB
138 42.70KB
139 44.41KB
14 41.77KB
14. Access PointsWi-Fi Security.mp4 6.16MB
14. Access PointsWi-Fi Security.vtt 6.77KB
14. Backdoors.mp4 2.02MB
14. Backdoors.vtt 2.61KB
14. Benchmarks and Secure Configuration Guid.mp4 3.22MB
14. Benchmarks and Secure Configuration Guid.vtt 3.53KB
14. Cable Locks, Safes, and Locking Cabinets.mp4 1.90MB
14. Cable Locks, Safes, and Locking Cabinets.vtt 2.55KB
14. Cloud Access Security Broker (CASB).mp4 2.09MB
14. Cloud Access Security Broker (CASB).vtt 1.95KB
14. Dark Web.mp4 3.95MB
14. Dark Web.vtt 4.18KB
14. Elasticity and Scalability.mp4 1.80MB
14. Elasticity and Scalability.vtt 2.16KB
14. Employee Protections.mp4 1.25MB
14. Employee Protections.vtt 1.27KB
14. Enforcement and Monitoring.mp4 7.25MB
14. Enforcement and Monitoring.vtt 8.74KB
14. Ephemeral Key.mp4 1.63MB
14. Ephemeral Key.vtt 1.21KB
14. Firewall Considerations in a Cloud Environment.mp4 3.97MB
14. Firewall Considerations in a Cloud Environment.vtt 3.70KB
14. Full Exercise.mp4 1.26MB
14. Full Exercise.vtt 1.20KB
14. Identity Fraud.mp4 2.58MB
14. Identity Fraud.vtt 2.30KB
14. Implicit Deny and ACLs.mp4 1001.55KB
14. Implicit Deny and ACLs.vtt 1.21KB
14. In-band vs. Out-of-band Management.mp4 7.83MB
14. In-band vs. Out-of-band Management.vtt 7.12KB
14. Intrusive vs. Non-intrusive.mp4 971.06KB
14. Intrusive vs. Non-intrusive.vtt 937B
14. Kerberos.mp4 6.00MB
14. Kerberos.vtt 6.64KB
14. MAC Cloning.mp4 3.00MB
14. MAC Cloning.vtt 2.98KB
14. Module Review.mp4 1.43MB
14. Module Review.vtt 1.70KB
14. Online vs. Offline Backups.mp4 2.44MB
14. Online vs. Offline Backups.vtt 2.61KB
14. Outsourced Code Mangement.mp4 1.57MB
14. Outsourced Code Mangement.vtt 1.92KB
14. Permissions Auditing and Review.mp4 2.11MB
14. Permissions Auditing and Review.vtt 2.58KB
14. Preservation of Evidence.mp4 1.86MB
14. Preservation of Evidence.vtt 2.86KB
14. PrintersMFDs.mp4 2.91MB
14. PrintersMFDs.vtt 4.30KB
14. Privacy Impact Assessment.mp4 3.16MB
14. Privacy Impact Assessment.vtt 3.18KB
14. Protocol Analyzer Output.mp4 25.45MB
14. Protocol Analyzer Output.vtt 10.40KB
14. Replay Attacks.mp4 2.15MB
14. Replay Attacks.vtt 1.90KB
14. Sarbanes-Oxley Act (SOX).mp4 6.68MB
14. Sarbanes-Oxley Act (SOX).vtt 5.85KB
14. Secure Coding Techniques.mp4 14.24MB
14. Secure Coding Techniques.vtt 12.63KB
14. Smart Cards.mp4 1.54MB
14. Smart Cards.vtt 1.77KB
14. Stapling and Pinning.mp4 1.38MB
14. Stapling and Pinning.vtt 1.51KB
14. TheHarvester and Demo.mp4 4.66MB
14. TheHarvester and Demo.vtt 3.46KB
14. VDI.mp4 7.53MB
14. VDI.vtt 8.14KB
14. War Flying.mp4 2.75MB
14. War Flying.vtt 2.29KB
140 45.35KB
141 79.39KB
142 83.50KB
143 98.01KB
144 112.31KB
145 116.71KB
146 117.64KB
147 134.26KB
148 136.84KB
149 151.44KB
15 285.61KB
15. Attribute Based Access Control (ABAC).mp4 5.19MB
15. Attribute Based Access Control (ABAC).vtt 4.92KB
15. Backups - Distance Considerations.mp4 3.41MB
15. Backups - Distance Considerations.vtt 3.71KB
15. Band SelectionWidth.mp4 3.51MB
15. Band SelectionWidth.vtt 2.94KB
15. BYOD Concerns and Deployment Models.mp4 6.01MB
15. BYOD Concerns and Deployment Models.vtt 7.47KB
15. Cipher Modes.mp4 1.10MB
15. Cipher Modes.vtt 1.20KB
15. Code Quality and Testing.mp4 4.66MB
15. Code Quality and Testing.vtt 5.47KB
15. DNS Poisoning.mp4 1.86MB
15. DNS Poisoning.vtt 1.78KB
15. GDPR.mp4 1.74MB
15. GDPR.vtt 1.45KB
15. Improper or Weak Patch Management.mp4 3.37MB
15. Improper or Weak Patch Management.vtt 4.48KB
15. Indicators of Compromise (IOC).mp4 3.01MB
15. Indicators of Compromise (IOC).vtt 3.33KB
15. Integer Overflow.mp4 2.40MB
15. Integer Overflow.vtt 2.00KB
15. Invoice Scam.mp4 4.61MB
15. Invoice Scam.vtt 2.70KB
15. Onboarding Offboarding.mp4 1.28MB
15. Onboarding Offboarding.vtt 1.48KB
15. Overall Cost and Complexity of Testing.mp4 1.34MB
15. Overall Cost and Complexity of Testing.vtt 1.77KB
15. Passively Test Security Controls.mp4 946.72KB
15. Passively Test Security Controls.vtt 1.13KB
15. Port Security and 802.1x.mp4 7.45MB
15. Port Security and 802.1x.vtt 7.55KB
15. Proximity Cards.mp4 2.00MB
15. Proximity Cards.vtt 2.27KB
15. Real Time Operating Systems (RTOS).mp4 1.42MB
15. Real Time Operating Systems (RTOS).vtt 1.58KB
15. Recertification.mp4 2.60MB
15. Recertification.vtt 3.33KB
15. Recovery.mp4 2.33MB
15. Recovery.vtt 2.79KB
15. Route Security.mp4 2.77MB
15. Route Security.vtt 2.84KB
15. Security-as-a-Service (SECaaS).mp4 1.96MB
15. Security-as-a-Service (SECaaS).vtt 1.92KB
15. Sn1per and Demo.mp4 13.75MB
15. Sn1per and Demo.vtt 7.55KB
15. Spraying.mp4 3.05MB
15. Spraying.vtt 2.35KB
15. Systems Hardening.mp4 4.15MB
15. Systems Hardening.vtt 4.99KB
15. TCPIP and OSI Models.mp4 1.22MB
15. TCPIP and OSI Models.vtt 1.22KB
15. Terms of Agreement and Privacy Notice.mp4 3.19MB
15. Terms of Agreement and Privacy Notice.vtt 3.68KB
15. Trust Models.mp4 2.88MB
15. Trust Models.vtt 3.17KB
15. USB Data Blocker.mp4 2.10MB
15. USB Data Blocker.vtt 1.92KB
15. Version Control.mp4 4.17MB
15. Version Control.vtt 4.33KB
15. Virtualization.mp4 7.89MB
15. Virtualization.vtt 6.80KB
15. War Driving.mp4 2.17MB
15. War Driving.vtt 2.32KB
150 157.18KB
151 158.39KB
152 159.80KB
153 178.39KB
154 185.46KB
155 205.20KB
156 218.68KB
157 220.07KB
158 227.85KB
159 238.03KB
16 359.48KB
16. Additional BYOD Concerns.mp4 4.24MB
16. Additional BYOD Concerns.vtt 5.66KB
16. Application Layer, Protocol Layer, and Volumetric Attacks.mp4 3.85MB
16. Application Layer, Protocol Layer, and Volumetric Attacks.vtt 3.71KB
16. Automate Indicator Sharing (AIS).mp4 2.48MB
16. Automate Indicator Sharing (AIS).vtt 1.65KB
16. Brute Force and Dictionary Attacks.mp4 5.15MB
16. Brute Force and Dictionary Attacks.vtt 3.90KB
16. Containers.mp4 9.72MB
16. Containers.vtt 10.61KB
16. Credentialed vs. Non-credentialed.mp4 4.62MB
16. Credentialed vs. Non-credentialed.vtt 4.43KB
16. Credential Harvesting.mp4 4.53MB
16. Credential Harvesting.vtt 4.53KB
16. Cross Site Request Forgery (XSRF).mp4 4.38MB
16. Cross Site Request Forgery (XSRF).vtt 4.51KB
16. Culture and Creating a Culture of Security.mp4 3.14MB
16. Culture and Creating a Culture of Security.vtt 3.18KB
16. Differences between CASB and SECaaS.mp4 2.15MB
16. Differences between CASB and SECaaS.vtt 1.94KB
16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based.mp4 5.79MB
16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based.vtt 5.63KB
16. Fencing.mp4 4.35MB
16. Fencing.vtt 2.71KB
16. Group Policy.mp4 3.45MB
16. Group Policy.vtt 4.16KB
16. Key Escrow.mp4 2.71MB
16. Key Escrow.vtt 2.50KB
16. Legacy Platforms.mp4 2.70MB
16. Legacy Platforms.vtt 3.07KB
16. Loop Protection and Flood Guards.mp4 3.03MB
16. Loop Protection and Flood Guards.vtt 4.06KB
16. Non-persistence, Snapshots, and Live Boot Media.mp4 3.30MB
16. Non-persistence, Snapshots, and Live Boot Media.vtt 3.81KB
16. Personal Identification Verification Card (PIV).mp4 1.77MB
16. Personal Identification Verification Card (PIV).vtt 1.41KB
16. Plan Review and Maintenance.mp4 4.92MB
16. Plan Review and Maintenance.vtt 3.28KB
16. Qualitative and Quantitative Analysis.mp4 4.79MB
16. Qualitative and Quantitative Analysis.vtt 4.40KB
16. Quality of Service (QoS).mp4 3.03MB
16. Quality of Service (QoS).vtt 3.41KB
16. Red, Blue, Purple, and White Security Teams.mp4 3.13MB
16. Red, Blue, Purple, and White Security Teams.vtt 4.12KB
16. Rule-basedRole-based Access Control (RBAC).mp4 3.02MB
16. Rule-basedRole-based Access Control (RBAC).vtt 2.81KB
16. Scanless and Demo.mp4 5.47MB
16. Scanless and Demo.vtt 3.12KB
16. Static Code Analysis.mp4 3.59MB
16. Static Code Analysis.vtt 4.31KB
16. Strategic Intelligence Counterintelligence Gathering.mp4 3.00MB
16. Strategic Intelligence Counterintelligence Gathering.vtt 2.64KB
16. Surveillance Systems.mp4 2.67MB
16. Surveillance Systems.vtt 3.05KB
16. Typo Squatting URL Hijacking.mp4 3.50MB
16. Typo Squatting URL Hijacking.vtt 4.33KB
16. Vendor and Control Diversity.mp4 2.34MB
16. Vendor and Control Diversity.vtt 3.04KB
16. XOR Function.mp4 2.25MB
16. XOR Function.vtt 1.92KB
160 240.79KB
161 272.39KB
162 293.48KB
163 317.20KB
164 345.21KB
165 346.06KB
166 355.87KB
167 387.38KB
168 399.04KB
169 399.16KB
17 365.33KB
17. Access Control Methods.mp4 1.81MB
17. Access Control Methods.vtt 2.14KB
17. API Attacks.mp4 3.28MB
17. API Attacks.vtt 3.47KB
17. Certificate Chaining.mp4 1.52MB
17. Certificate Chaining.vtt 1.80KB
17. Common Access Card.mp4 1.67MB
17. Common Access Card.vtt 1.35KB
17. Cost.mp4 2.02MB
17. Cost.vtt 2.43KB
17. Cryptographic Methods and Design.mp4 6.71MB
17. Cryptographic Methods and Design.vtt 5.72KB
17. Data Integrity.mp4 3.01MB
17. Data Integrity.vtt 3.65KB
17. Distributed Denial of Service (DDoS).mp4 4.27MB
17. Distributed Denial of Service (DDoS).vtt 3.85KB
17. DNSenum.mp4 1.78MB
17. DNSenum.vtt 1.13KB
17. Expiration.mp4 3.78MB
17. Expiration.vtt 4.64KB
17. Fire Suppression.mp4 5.97MB
17. Fire Suppression.vtt 5.11KB
17. Fuzzing.mp4 8.42MB
17. Fuzzing.vtt 6.83KB
17. High Availability.mp4 3.43MB
17. High Availability.vtt 4.17KB
17. Identify Vulnerabilities and Lack of Security Controls.mp4 2.86MB
17. Identify Vulnerabilities and Lack of Security Controls.vtt 3.01KB
17. Impact Areas.mp4 1.80MB
17. Impact Areas.vtt 3.47KB
17. Implications of IPv6.mp4 4.30MB
17. Implications of IPv6.vtt 4.19KB
17. Microservices and APIs.mp4 6.43MB
17. Microservices and APIs.vtt 6.76KB
17. Module Review.mp4 516.01KB
17. Module Review.mp4 598.32KB
17. Module Review.mp4 593.17KB
17. Module Review.mp4 1.34MB
17. Module Review.vtt 2.10KB
17. Module Review.vtt 952B
17. Module Review.vtt 704B
17. Module Review.vtt 678B
17. Rainbow Tables.mp4 3.37MB
17. Rainbow Tables.vtt 3.51KB
17. Recovery.mp4 2.56MB
17. Recovery.vtt 2.81KB
17. Review Process Outcomes.mp4 1.99MB
17. Review Process Outcomes.vtt 1.40KB
17. Risk Calculation.mp4 2.09MB
17. Risk Calculation.vtt 2.43KB
17. Setting the Stage.mp4 1.42MB
17. Setting the Stage.vtt 1.96KB
17. Spanning Tree Protocol (STP).mp4 5.00MB
17. Spanning Tree Protocol (STP).vtt 5.24KB
17. System on a Chip (SoC).mp4 1.79MB
17. System on a Chip (SoC).vtt 2.13KB
17. TAXII Layout.mp4 1.65MB
17. TAXII Layout.vtt 1.87KB
17. Watering Hole Attack.mp4 4.97MB
17. Watering Hole Attack.vtt 3.41KB
170 480.52KB
171 498.57KB
172 500.59KB
173 503.44KB
174 519.20KB
175 532.25KB
176 545.70KB
177 547.17KB
178 560.97KB
179 574.02KB
18 425.61KB
18. 5G Networks and Security Concerns.mp4 3.03MB
18. 5G Networks and Security Concerns.vtt 2.71KB
18. Additional Secure Coding Concepts.mp4 2.98MB
18. Additional Secure Coding Concepts.vtt 3.75KB
18. Awareness Training.mp4 2.10MB
18. Awareness Training.vtt 1.30KB
18. Biometric Factors.mp4 1.38MB
18. Biometric Factors.vtt 2.09KB
18. Blockchain.mp4 7.78MB
18. Blockchain.vtt 6.80KB
18. Cloud Native Controls vs. Third-party Solutions.mp4 5.44MB
18. Cloud Native Controls vs. Third-party Solutions.vtt 5.63KB
18. DHCP Snooping.mp4 1.89MB
18. DHCP Snooping.vtt 1.89KB
18. Effects of Impacts.mp4 2.50MB
18. Effects of Impacts.vtt 3.45KB
18. Identify Common Misconfigurations.mp4 3.05MB
18. Identify Common Misconfigurations.vtt 3.21KB
18. Infrastructure as Code (IAC).mp4 1.39MB
18. Infrastructure as Code (IAC).vtt 1.32KB
18. Known Plain Text Ciphertext.mp4 1.72MB
18. Known Plain Text Ciphertext.vtt 1.54KB
18. Likelihood of Threat.mp4 1.76MB
18. Likelihood of Threat.vtt 1.43KB
18. Mandatory Access Control (MAC).mp4 1.90MB
18. Mandatory Access Control (MAC).vtt 1.84KB
18. MITRE.mp4 6.18MB
18. MITRE.vtt 4.12KB
18. Motion Detection Infrared.mp4 1.42MB
18. Motion Detection Infrared.vtt 1.48KB
18. Nessus and Cuckoo.mp4 4.82MB
18. Nessus and Cuckoo.vtt 4.60KB
18. Non-repudiation.mp4 1.41MB
18. Non-repudiation.vtt 1.59KB
18. Port Mirroring, Port Spanning, and Port Taps.mp4 6.52MB
18. Port Mirroring, Port Spanning, and Port Taps.vtt 5.59KB
18. Recovery.mp4 2.79MB
18. Recovery.vtt 2.87KB
18. Redundancy.mp4 2.70MB
18. Redundancy.vtt 2.88KB
18. Resource Exhaustion.mp4 4.10MB
18. Resource Exhaustion.vtt 3.62KB
18. Secure Protocols and SSLTLS Inspection.mp4 3.11MB
18. Secure Protocols and SSLTLS Inspection.vtt 2.73KB
18. Smurf Attack (Amplification).mp4 5.26MB
18. Smurf Attack (Amplification).vtt 5.40KB
18. Typo Squatting URL Hijacking.mp4 3.49MB
18. Typo Squatting URL Hijacking.vtt 4.23KB
18. Wired Brain Coffees Testing.mp4 4.01MB
18. Wired Brain Coffees Testing.vtt 3.49KB
180 581.34KB
181 613.51KB
182 617.98KB
183 618.16KB
184 633.35KB
185 637.16KB
186 643.57KB
187 653.44KB
188 658.48KB
189 663.76KB
19 3.93KB
19. Birthday Attack.mp4 4.76MB
19. Birthday Attack.vtt 4.04KB
19. DDoS Attack Vectors.mp4 1.93MB
19. DDoS Attack Vectors.vtt 1.82KB
19. Discretionary Access Control (DAC).mp4 1.27MB
19. Discretionary Access Control (DAC).vtt 1.33KB
19. Facial Recognition.mp4 2.84MB
19. Facial Recognition.vtt 2.81KB
19. Fault Tolerant Hardware.mp4 1.38MB
19. Fault Tolerant Hardware.vtt 1.40KB
19. File Integrity Check.vtt 3.99KB
19. File Manipulation (Head, Tail, Cat, GREP and Logger).mp4 4.48MB
19. File Manipulation (Head, Tail, Cat, GREP and Logger).vtt 4.71KB
19. Fundamental Differences and Encryption Methods.mp4 4.85MB
19. Fundamental Differences and Encryption Methods.vtt 4.26KB
19. Gathering and Correlating Information.mp4 3.57MB
19. Gathering and Correlating Information.vtt 3.38KB
19. Hashing.mp4 3.27MB
19. Hashing.vtt 3.08KB
19. Hybrid Warfare.mp4 4.45MB
19. Hybrid Warfare.vtt 5.12KB
19. Impact of Threat.mp4 1.08MB
19. Impact of Threat.vtt 1.05KB
19. Impossible TravelRisky Login.mp4 4.40MB
19. Impossible TravelRisky Login.vtt 4.62KB
19. Intelligence Lifecycle.mp4 810.98KB
19. Intelligence Lifecycle.vtt 914B
19. MAC Filtering.mp4 4.40MB
19. MAC Filtering.vtt 3.46KB
19. Memory Leak.mp4 3.01MB
19. Memory Leak.vtt 3.27KB
19. Narrow-band and Baseband Radio.mp4 1.05MB
19. Narrow-band and Baseband Radio.vtt 1.17KB
19. On-prem vs. Cloud Challenges and Right to Audit.mp4 5.79MB
19. On-prem vs. Cloud Challenges and Right to Audit.vtt 6.61KB
19. Peripherals Security.mp4 3.46MB
19. Peripherals Security.vtt 4.56KB
19. Proximity Readers.mp4 1.99MB
19. Proximity Readers.vtt 2.00KB
19. Skills Training.mp4 3.14MB
19. Skills Training.vtt 2.84KB
19. Software Defined Networking (SDN).mp4 2.02MB
19. Software Defined Networking (SDN).vtt 1.78KB
19. Things to Remember.mp4 3.96MB
19. Things to Remember.vtt 4.75KB
190 666.95KB
191 707.10KB
192 710.99KB
193 720.82KB
194 724.00KB
195 730.41KB
196 731.37KB
197 734.01KB
198 746.29KB
199 767.48KB
2 545B
2. Exam Tips.mp4 2.36MB
2. Exam Tips.vtt 2.61KB
2. Goals of the Module.mp4 2.37MB
2. Goals of the Module.vtt 2.55KB
2. Passing the Exam - Whats Next.mp4 2.31MB
2. Passing the Exam - Whats Next.vtt 2.57KB
20 47.81KB
20. API Considerations and API Gateways.mp4 4.89MB
20. API Considerations and API Gateways.vtt 3.91KB
20. CHMOD.mp4 1.85MB
20. CHMOD.vtt 1.81KB
20. Common Vulnerabilities and Exposures (CVE).mp4 8.21MB
20. Common Vulnerabilities and Exposures (CVE).vtt 5.07KB
20. Conditional Access.mp4 1.79MB
20. Conditional Access.vtt 2.08KB
20. Downgrade Attack.mp4 1.85MB
20. Downgrade Attack.vtt 1.70KB
20. Drones UAV.mp4 1.64MB
20. Drones UAV.vtt 1.70KB
20. Funding and Executive Buy-in.mp4 2.43MB
20. Funding and Executive Buy-in.vtt 1.91KB
20. Hardening the Environment.mp4 4.10MB
20. Hardening the Environment.vtt 4.89KB
20. Lockout.mp4 1.18MB
20. Lockout.vtt 1.33KB
20. Loss Calculation Terms (ALE, SLE, and ARO).mp4 4.87MB
20. Loss Calculation Terms (ALE, SLE, and ARO).vtt 4.26KB
20. Malicious Code Execution.mp4 2.97MB
20. Malicious Code Execution.vtt 3.32KB
20. Module Review.mp4 667.92KB
20. Module Review.mp4 615.53KB
20. Module Review.vtt 835B
20. Module Review.vtt 758B
20. Predictive Analysis.mp4 2.01MB
20. Predictive Analysis.vtt 1.83KB
20. Regulatory Jurisdictional Issues.mp4 4.51MB
20. Regulatory Jurisdictional Issues.vtt 3.78KB
20. Session Keys.mp4 1.57MB
20. Session Keys.vtt 1.52KB
20. Social Media and Influence Campaigns.mp4 2.02MB
20. Social Media and Influence Campaigns.vtt 1.99KB
20. Software Defined Visibility (SDV).mp4 1.57MB
20. Software Defined Visibility (SDV).vtt 1.11KB
20. SSL Stripping.mp4 3.07MB
20. SSL Stripping.vtt 3.66KB
20. Technology and Vendor Diversity.mp4 3.88MB
20. Technology and Vendor Diversity.vtt 2.89KB
20. Threat Intelligence Lifecycle.mp4 2.25MB
20. Threat Intelligence Lifecycle.vtt 2.66KB
20. Vein and Gait Analysis.mp4 3.65MB
20. Vein and Gait Analysis.vtt 2.87KB
20. Zigbee.mp4 4.84MB
20. Zigbee.vtt 4.45KB
200 776.37KB
201 806.50KB
202 823.10KB
203 823.91KB
204 852.10KB
205 855.34KB
206 873.74KB
207 875.55KB
208 881.18KB
209 881.88KB
21 2.00KB
21. Asymmetric Encryption.mp4 7.71MB
21. Asymmetric Encryption.vtt 6.03KB
21. Common Ports.mp4 2.45MB
21. Common Ports.vtt 2.09KB
21. Constraints.mp4 4.36MB
21. Constraints.vtt 4.49KB
21. Continuous Improvement.mp4 1.21MB
21. Continuous Improvement.vtt 1.16KB
21. Crypto and Control Diversity.mp4 4.14MB
21. Crypto and Control Diversity.vtt 4.49KB
21. CVSS.mp4 4.71MB
21. CVSS.vtt 3.21KB
21. Cyberthreat Intelligence Frameworks.mp4 1.77MB
21. Cyberthreat Intelligence Frameworks.vtt 1.73KB
21. Data Breach Notification Laws.mp4 4.10MB
21. Data Breach Notification Laws.vtt 4.22KB
21. Disablement.mp4 1.72MB
21. Disablement.vtt 1.44KB
21. Efficacy Rates.mp4 1.61MB
21. Efficacy Rates.vtt 2.15KB
21. Logs.mp4 1.27MB
21. Logs.vtt 1.50KB
21. Physical Attacks, Malicious USB, and Skimming.mp4 6.25MB
21. Physical Attacks, Malicious USB, and Skimming.vtt 7.24KB
21. Privileged Accounts.mp4 1.98MB
21. Privileged Accounts.vtt 2.11KB
21. Reasons for Effectiveness - Authority and Intimidation.mp4 3.06MB
21. Reasons for Effectiveness - Authority and Intimidation.vtt 3.47KB
21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).mp4 5.11MB
21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).vtt 5.44KB
21. Serverless Architecture.mp4 4.80MB
21. Serverless Architecture.vtt 3.23KB
21. Shell and Script Environments (SSH, PowerShell, Python and O.mp4 2.40MB
21. Shell and Script Environments (SSH, PowerShell, Python and O.vtt 2.36KB
21. Shimming.mp4 1.71MB
21. Shimming.vtt 1.98KB
21. Threat Assessment (Disaster).mp4 2.75MB
21. Threat Assessment (Disaster).vtt 3.85KB
21. Threat Maps.mp4 1.37MB
21. Threat Maps.vtt 1.39KB
210 916.89KB
211 919.61KB
212 925.12KB
213 930.23KB
214 931.49KB
215 945.38KB
216 970.86KB
217 971.40KB
218 973.57KB
219 975.14KB
22 39.28KB
22. Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).mp4 2.30MB
22. Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).vtt 2.19KB
22. Adversarial Artificial Intelligence (AI).mp4 3.46MB
22. Adversarial Artificial Intelligence (AI).vtt 3.31KB
22. Air Gaps.mp4 5.56MB
22. Air Gaps.vtt 6.23KB
22. Consensus and Social Proof.mp4 1.50MB
22. Consensus and Social Proof.vtt 1.62KB
22. Cyber Kill Chain.mp4 3.99MB
22. Cyber Kill Chain.vtt 3.28KB
22. Disaster Area Example.mp4 3.10MB
22. Disaster Area Example.vtt 3.21KB
22. Filesystem Permissions.mp4 2.35MB
22. Filesystem Permissions.vtt 2.82KB
22. IaaS, PaaS, FaaS, and SaaS Differentiators.mp4 1.92MB
22. IaaS, PaaS, FaaS, and SaaS Differentiators.vtt 1.77KB
22. Identification vs. Authentication vs. Authorization.mp4 1.99MB
22. Identification vs. Authentication vs. Authorization.vtt 2.07KB
22. Lightweight Encryption.mp4 1.76MB
22. Lightweight Encryption.vtt 1.55KB
22. Live Cyber Threat Map.mp4 3.85MB
22. Live Cyber Threat Map.vtt 988B
22. Module Review.mp4 586.86KB
22. Module Review.vtt 892B
22. Packet Capture and TCPDump Demo.mp4 8.46MB
22. Packet Capture and TCPDump Demo.vtt 4.66KB
22. Refactoring.mp4 1.41MB
22. Refactoring.vtt 1.75KB
22. Registry Hardening.mp4 2.51MB
22. Registry Hardening.vtt 2.89KB
22. Security Information and Event Management (SEIM).mp4 4.35MB
22. Security Information and Event Management (SEIM).vtt 3.71KB
22. Wired Brain Coffees Approach to Training.mp4 2.92MB
22. Wired Brain Coffees Approach to Training.vtt 3.47KB
220 1006.08KB
221 1013.16KB
222 1015.76KB
223 1020.70KB
224 5.63KB
225 12.50KB
226 14.07KB
227 21.26KB
228 28.79KB
229 38.95KB
23 92.97KB
23. Business Impact Analysis - Key Terminology.mp4 9.13MB
23. Business Impact Analysis - Key Terminology.vtt 9.06KB
23. Demilitarized Zone (DMZ).mp4 6.79MB
23. Demilitarized Zone (DMZ).vtt 8.09KB
23. Diamond Model.mp4 2.99MB
23. Diamond Model.vtt 3.54KB
23. Familiarity Liking.mp4 1.19MB
23. Familiarity Liking.vtt 1.39KB
23. File Code Repositories.mp4 2.56MB
23. File Code Repositories.vtt 2.79KB
23. Forensics.mp4 8.75MB
23. Forensics.vtt 10.04KB
23. Honeypots and Honeyfiles.mp4 2.13MB
23. Honeypots and Honeyfiles.vtt 1.84KB
23. Multifactor Authentication.mp4 1.62MB
23. Multifactor Authentication.vtt 1.96KB
23. Pass the Hash.mp4 4.20MB
23. Pass the Hash.vtt 3.21KB
23. Security Orchestration, Automation, and Response.mp4 2.79MB
23. Security Orchestration, Automation, and Response.vtt 3.59KB
23. Self-encrypting Drives (SED).mp4 3.82MB
23. Self-encrypting Drives (SED).vtt 3.87KB
23. Service Integrations and Resource Policies.mp4 2.47MB
23. Service Integrations and Resource Policies.vtt 2.69KB
23. Steganography.mp4 4.47MB
23. Steganography.vtt 3.95KB
23. Supply Chain Attacks.mp4 3.74MB
23. Supply Chain Attacks.vtt 3.82KB
23. Technology Diversity.mp4 1.18MB
23. Technology Diversity.vtt 1.40KB
230 49.74KB
231 62.01KB
232 68.10KB
233 83.40KB
234 87.46KB
235 92.34KB
236 126.30KB
237 153.36KB
238 156.32KB
239 157.71KB
24 58.75KB
24. Authentication Factors.mp4 3.29MB
24. Authentication Factors.vtt 3.63KB
24. Exploitation Frameworks.mp4 4.29MB
24. Exploitation Frameworks.vtt 3.87KB
24. Hardware Root of Trust.mp4 2.28MB
24. Hardware Root of Trust.vtt 2.21KB
24. Homomorphic Encryption.mp4 3.35MB
24. Homomorphic Encryption.vtt 3.83KB
24. Honeynets.mp4 1.97MB
24. Honeynets.vtt 1.83KB
24. Mission Essential Functions.mp4 3.57MB
24. Mission Essential Functions.vtt 3.82KB
24. MITRE Attack Framework.mp4 6.25MB
24. MITRE Attack Framework.vtt 4.35KB
24. Module Review.mp4 641.12KB
24. Module Review.vtt 854B
24. Protected Distribution System (PDS).mp4 8.03MB
24. Protected Distribution System (PDS).vtt 6.99KB
24. Research Sources.mp4 7.41MB
24. Research Sources.vtt 5.81KB
24. Supply Chain Attack Example.mp4 2.59MB
24. Supply Chain Attack Example.vtt 2.73KB
24. Transit Gateway.mp4 1.37MB
24. Transit Gateway.vtt 1.13KB
24. Trust.mp4 1.15MB
24. Trust.vtt 1.35KB
24. Vendor Diversity.mp4 2.14MB
24. Vendor Diversity.vtt 1.20KB
240 162.79KB
241 172.06KB
242 177.37KB
243 185.38KB
244 185.69KB
245 201.91KB
246 208.28KB
247 221.41KB
248 234.79KB
249 247.96KB
25 84.06KB
25. Authorization.mp4 1.65MB
25. Authorization.vtt 1.77KB
25. Cloud-Based vs. On-prem Attacks.mp4 7.11MB
25. Cloud-Based vs. On-prem Attacks.vtt 6.50KB
25. Common Use Cases.mp4 5.98MB
25. Common Use Cases.vtt 6.98KB
25. Data Sanitization Tools.mp4 10.41MB
25. Data Sanitization Tools.vtt 8.80KB
25. Fake Telemetry.mp4 2.18MB
25. Fake Telemetry.vtt 2.25KB
25. Hardware Based Encryption.mp4 4.83MB
25. Hardware Based Encryption.vtt 4.62KB
25. Hot and Cold Aisles.mp4 4.87MB
25. Hot and Cold Aisles.vtt 4.33KB
25. Identification of Critical Systems.mp4 4.01MB
25. Identification of Critical Systems.vtt 4.67KB
25. Key Points to Remember.mp4 4.02MB
25. Key Points to Remember.vtt 3.52KB
25. Scarcity Urgency.mp4 933.82KB
25. Scarcity Urgency.vtt 1019B
25. Service-level Agreement (SLA).mp4 1018.07KB
25. Service-level Agreement (SLA).vtt 938B
25. VM Sprawl Avoidance.mp4 3.38MB
25. VM Sprawl Avoidance.vtt 2.78KB
250 249.24KB
251 264.95KB
252 270.75KB
253 278.52KB
254 291.62KB
255 292.42KB
256 292.51KB
257 299.23KB
258 316.27KB
259 332.95KB
26 104.44KB
26. Authentication Factors.mp4 1.83MB
26. Authentication Factors.vtt 2.18KB
26. Cipher Suites.mp4 2.50MB
26. Cipher Suites.vtt 3.22KB
26. DNS Sinkhole.mp4 5.31MB
26. DNS Sinkhole.vtt 3.53KB
26. Memorandum of Understanding (MOU) and Master Services Agreement (MSA).mp4 3.45MB
26. Memorandum of Understanding (MOU) and Master Services Agreement (MSA).vtt 3.09KB
26. Module Review.mp4 803.38KB
26. Module Review.mp4 820.66KB
26. Module Review.mp4 1.45MB
26. Module Review.vtt 1.81KB
26. Module Review.vtt 985B
26. Module Review.vtt 1.12KB
26. Non-Digital and Digital Data Destruction.mp4 1.96MB
26. Non-Digital and Digital Data Destruction.vtt 2.80KB
26. Sandboxing.mp4 4.92MB
26. Sandboxing.vtt 3.68KB
26. Single Point of Failure (SPOF).mp4 3.85MB
26. Single Point of Failure (SPOF).vtt 4.43KB
26. Types of Plans.mp4 1.13MB
26. Types of Plans.vtt 1.33KB
26. VM Escape.mp4 2.42MB
26. VM Escape.vtt 2.74KB
260 336.83KB
261 343.37KB
262 344.60KB
263 345.23KB
264 358.01KB
265 360.99KB
266 368.50KB
267 388.69KB
268 390.98KB
269 396.42KB
27 172.88KB
27. Authentication, Authorization, and Accounting (AAA).mp4 1.24MB
27. Authentication, Authorization, and Accounting (AAA).vtt 1.25KB
27. Business Partner Agreement (BPA).mp4 886.86KB
27. Business Partner Agreement (BPA).vtt 1010B
27. Disaster Recovery Plan.mp4 2.19MB
27. Disaster Recovery Plan.vtt 1.65KB
27. Limitations.mp4 3.00MB
27. Limitations.vtt 4.37KB
27. Module Review.mp4 777.87KB
27. Module Review.vtt 1.02KB
27. Order of Restoration.mp4 2.80MB
27. Order of Restoration.vtt 3.20KB
27. Shredding.mp4 1.27MB
27. Shredding.vtt 1.64KB
270 415.12KB
271 416.30KB
272 416.56KB
273 428.46KB
274 435.55KB
275 438.25KB
276 442.63KB
277 448.76KB
278 467.98KB
279 475.66KB
28 258.45KB
28. Business Continuity Plan.mp4 1.68MB
28. Business Continuity Plan.vtt 1.51KB
28. EOL EOS.mp4 2.97MB
28. EOL EOS.vtt 3.48KB
28. On-prem vs. Cloud Requirements.mp4 4.37MB
28. On-prem vs. Cloud Requirements.vtt 4.85KB
28. Phased Approach.mp4 3.64MB
28. Phased Approach.vtt 2.58KB
28. Pulping and Pulverizing.mp4 2.24MB
28. Pulping and Pulverizing.vtt 2.44KB
28. Random and Pseudorandom Number Generators (PRNG).mp4 3.54MB
28. Random and Pseudorandom Number Generators (PRNG).vtt 2.20KB
280 493.79KB
281 506.27KB
282 516.89KB
283 526.63KB
284 530.08KB
285 539.27KB
286 553.60KB
287 554.34KB
288 560.36KB
289 563.47KB
29 528.54KB
29. Business Resumption Plan.mp4 1.73MB
29. Business Resumption Plan.vtt 1.42KB
29. Data Retention.mp4 1.69MB
29. Data Retention.vtt 1006B
29. Deguassing.mp4 2.94MB
29. Deguassing.vtt 2.95KB
29. Identifying Most Critical Systems First.mp4 5.08MB
29. Identifying Most Critical Systems First.vtt 4.55KB
29. Quantum Random Number Generators (QRNG).mp4 1.53MB
29. Quantum Random Number Generators (QRNG).vtt 1.97KB
290 565.83KB
291 571.67KB
292 572.41KB
293 579.75KB
294 605.42KB
295 610.42KB
296 620.32KB
297 633.21KB
298 635.59KB
299 638.29KB
3 515B
3. Example Certifications.mp4 1.86MB
3. Example Certifications.vtt 2.30KB
3. Key Areas to Focus On.mp4 1.92MB
3. Key Areas to Focus On.vtt 2.93KB
3. Threat Types.mp4 1.27MB
3. Threat Types.vtt 1.86KB
30 553.17KB
30. Incident Management Plan.mp4 3.05MB
30. Incident Management Plan.vtt 2.21KB
30. Purging.mp4 2.04MB
30. Purging.vtt 1.11KB
30. Risk Assessment.mp4 1.88MB
30. Risk Assessment.vtt 2.18KB
30. User Account.mp4 1.18MB
30. User Account.vtt 1.18KB
300 641.29KB
301 646.49KB
302 648.36KB
303 649.80KB
304 669.33KB
305 682.21KB
306 705.75KB
307 710.45KB
308 721.11KB
309 721.44KB
31 2.13KB
31. Continuity of Operations.mp4 1.72MB
31. Continuity of Operations.vtt 1.78KB
31. Data Retention.mp4 6.04MB
31. Data Retention.vtt 5.08KB
31. Shared, Generic, Guest, and Service Accounts.mp4 2.94MB
31. Shared, Generic, Guest, and Service Accounts.vtt 3.03KB
31. Wiping.mp4 4.16MB
31. Wiping.vtt 4.59KB
310 724.73KB
311 740.51KB
312 744.22KB
313 750.15KB
314 759.74KB
315 761.03KB
316 768.44KB
317 795.24KB
318 819.84KB
319 823.88KB
32 20.34KB
32. IT Contingency Planning.mp4 5.15MB
32. IT Contingency Planning.vtt 5.68KB
32. Module Review.mp4 823.16KB
32. Module Review.vtt 1.11KB
32. Privileged Accounts.mp4 1.76MB
32. Privileged Accounts.vtt 1.85KB
32. Putting It All Together.mp4 5.50MB
32. Putting It All Together.vtt 4.77KB
320 830.29KB
321 835.13KB
322 835.27KB
323 857.49KB
324 859.45KB
325 869.17KB
326 872.02KB
327 873.58KB
328 874.19KB
329 878.10KB
33 89.71KB
33. Change Management.mp4 3.20MB
33. Change Management.vtt 3.49KB
33. Example Process.mp4 7.27MB
33. Example Process.vtt 8.43KB
330 878.50KB
331 886.20KB
332 894.69KB
333 909.38KB
334 911.82KB
335 915.30KB
336 918.73KB
337 931.22KB
338 941.94KB
339 949.91KB
34 716.35KB
34. Asset Management.mp4 2.27MB
34. Asset Management.vtt 3.15KB
340 959.87KB
341 969.82KB
342 970.95KB
343 972.54KB
344 975.04KB
345 975.58KB
346 979.73KB
347 988.74KB
348 990.99KB
349 992.07KB
35 28.78KB
350 995.92KB
351 1004.34KB
352 1005.86KB
353 1009.79KB
354 1011.56KB
355 1015.78KB
356 1017.22KB
357 1017.33KB
358 1019.84KB
359 1022.65KB
36 167.78KB
360 1023.98KB
361 11.47KB
362 18.65KB
363 30.71KB
364 34.03KB
365 34.10KB
366 57.18KB
367 57.79KB
368 61.03KB
369 62.99KB
37 45.82KB
370 76.11KB
371 82.45KB
372 91.37KB
373 95.82KB
374 96.53KB
375 103.94KB
376 110.55KB
377 111.96KB
378 112.35KB
379 125.42KB
38 83.70KB
380 147.36KB
381 149.04KB
382 161.26KB
383 162.87KB
384 167.49KB
385 179.86KB
386 190.96KB
387 201.18KB
388 209.91KB
389 213.93KB
39 114.88KB
390 214.40KB
391 225.33KB
392 232.38KB
393 232.57KB
394 233.30KB
395 249.09KB
396 251.97KB
397 260.55KB
398 270.14KB
399 288.29KB
4 186B
4. Objectives Study Guide.mp4 5.80MB
4. Objectives Study Guide.vtt 5.98KB
4. Security+ Exam Format.mp4 3.44MB
4. Security+ Exam Format.vtt 2.17KB
4. Types of Access Control (Managerial, Operational, and Physical).mp4 1.73MB
4. Types of Access Control (Managerial, Operational, and Physical).vtt 1.85KB
40 170.73KB
400 288.59KB
401 288.71KB
402 299.70KB
403 304.86KB
404 306.04KB
405 312.09KB
406 333.03KB
407 337.01KB
408 338.75KB
409 340.11KB
41 222.47KB
410 340.63KB
411 373.13KB
412 379.81KB
413 380.95KB
414 391.48KB
415 398.65KB
416 401.81KB
417 411.56KB
418 418.38KB
419 418.75KB
42 301.31KB
420 427.25KB
421 427.95KB
422 428.84KB
423 439.12KB
424 448.79KB
425 454.42KB
426 454.90KB
427 480.57KB
428 482.13KB
429 487.90KB
43 458.03KB
430 493.46KB
431 494.46KB
432 496.68KB
433 497.41KB
434 503.91KB
435 505.34KB
436 512.92KB
437 514.02KB
438 514.98KB
439 527.02KB
44 479.08KB
440 530.34KB
441 537.32KB
442 539.17KB
443 540.59KB
444 543.34KB
445 544.90KB
446 555.50KB
447 567.08KB
448 568.78KB
449 569.93KB
45 482.50KB
450 579.34KB
451 595.89KB
452 598.71KB
453 613.07KB
454 617.99KB
455 619.11KB
456 625.41KB
457 629.86KB
458 631.52KB
459 632.87KB
46 516.06KB
460 637.84KB
461 645.54KB
462 651.97KB
463 652.29KB
464 662.78KB
465 662.87KB
466 666.97KB
467 675.17KB
468 681.71KB
469 687.81KB
47 540.12KB
470 697.24KB
471 704.61KB
472 708.41KB
473 708.67KB
474 709.37KB
475 712.12KB
476 713.66KB
477 721.41KB
478 728.06KB
479 730.76KB
48 567.10KB
480 735.38KB
481 736.25KB
482 747.52KB
483 751.22KB
484 754.10KB
485 766.79KB
486 770.31KB
487 770.56KB
488 771.07KB
489 776.56KB
49 600.07KB
490 778.34KB
491 782.46KB
492 807.71KB
493 810.60KB
494 820.01KB
495 822.46KB
496 828.41KB
497 832.80KB
498 837.22KB
499 839.50KB
5 5B
5. Deterrent.mp4 746.28KB
5. Deterrent.vtt 791B
5. Registering for an Exam.mp4 1.87MB
5. Registering for an Exam.vtt 2.31KB
50 1.02KB
500 840.61KB
501 844.45KB
502 847.58KB
503 848.13KB
504 864.62KB
505 866.19KB
506 870.69KB
507 872.77KB
508 881.02KB
509 886.69KB
51 26.81KB
510 888.04KB
511 888.53KB
512 893.57KB
513 900.43KB
514 902.03KB
515 910.71KB
516 915.41KB
517 921.28KB
518 923.41KB
519 925.95KB
52 102.21KB
520 927.33KB
521 932.86KB
522 933.66KB
523 934.26KB
524 934.70KB
525 960.07KB
526 966.81KB
527 973.59KB
528 981.19KB
529 988.97KB
53 931.06KB
530 999.85KB
531 1000.15KB
532 1001.18KB
533 1002.22KB
534 1004.67KB
535 1006.85KB
536 1009.40KB
537 1010.50KB
538 1022.02KB
539 4.74KB
54 948.57KB
540 7.92KB
541 8.11KB
542 8.94KB
543 9.33KB
544 10.36KB
545 24.35KB
546 24.70KB
547 30.65KB
548 32.17KB
549 39.50KB
55 953.98KB
550 42.56KB
551 42.61KB
552 43.19KB
553 48.22KB
554 54.17KB
555 60.24KB
556 64.03KB
557 65.88KB
558 68.37KB
559 75.99KB
56 1016.69KB
560 79.13KB
561 83.14KB
562 87.56KB
563 92.66KB
564 94.82KB
565 101.19KB
566 103.41KB
567 107.23KB
568 110.06KB
569 113.95KB
57 4.69KB
570 122.58KB
571 126.73KB
572 131.08KB
573 131.63KB
574 131.76KB
575 132.21KB
576 139.99KB
577 140.27KB
578 146.27KB
579 147.17KB
58 24.73KB
580 150.16KB
581 150.83KB
582 153.06KB
583 153.15KB
584 155.87KB
585 171.27KB
586 171.50KB
587 178.38KB
588 178.64KB
589 180.14KB
59 38.57KB
590 183.15KB
591 186.27KB
592 188.38KB
593 197.70KB
594 200.83KB
595 204.51KB
596 205.76KB
597 207.68KB
598 212.37KB
599 214.60KB
6 13B
6. Exam Lifecycle.mp4 1.59MB
6. Exam Lifecycle.vtt 1.55KB
6. Preventive.mp4 847.79KB
6. Preventive.vtt 1.06KB
60 46.27KB
600 221.89KB
601 233.74KB
602 234.17KB
603 238.22KB
604 239.09KB
605 240.62KB
606 242.08KB
607 245.18KB
608 247.41KB
609 248.05KB
61 178.26KB
610 250.19KB
611 267.74KB
612 272.71KB
613 273.58KB
614 274.04KB
615 275.04KB
616 285.92KB
617 287.23KB
618 288.54KB
619 288.61KB
62 214.54KB
620 290.31KB
621 300.25KB
622 302.34KB
623 309.51KB
624 312.71KB
625 317.36KB
626 318.44KB
627 321.63KB
628 330.02KB
629 331.87KB
63 271.21KB
630 337.75KB
631 346.45KB
632 354.63KB
633 354.80KB
634 356.81KB
635 361.37KB
636 363.31KB
637 368.42KB
638 369.93KB
639 372.08KB
64 295.05KB
640 378.80KB
641 381.38KB
642 382.73KB
643 383.87KB
644 385.26KB
645 386.96KB
646 398.75KB
647 402.22KB
648 408.51KB
649 420.95KB
65 315.19KB
650 425.02KB
651 430.02KB
652 434.23KB
653 437.07KB
654 440.76KB
655 444.32KB
656 445.01KB
657 461.98KB
658 470.32KB
659 478.22KB
66 324.62KB
660 480.54KB
661 481.52KB
662 485.80KB
663 486.75KB
664 487.20KB
665 499.49KB
666 501.35KB
667 502.03KB
668 515.62KB
669 523.64KB
67 392.56KB
670 535.28KB
671 546.08KB
672 566.42KB
673 582.12KB
674 587.89KB
675 590.23KB
676 592.98KB
677 593.91KB
678 597.40KB
679 597.70KB
68 400.04KB
680 597.71KB
681 603.65KB
682 605.63KB
683 613.37KB
684 615.47KB
685 620.88KB
686 623.66KB
687 628.71KB
688 630.37KB
689 633.51KB
69 466.69KB
690 634.75KB
691 637.43KB
692 638.53KB
693 639.13KB
694 640.40KB
695 647.09KB
696 648.06KB
697 648.32KB
698 652.72KB
699 661.19KB
7 13B
7. Detective.mp4 933.23KB
7. Detective.vtt 980B
7. Prerequisite Experience.mp4 2.67MB
7. Prerequisite Experience.vtt 2.10KB
70 491.45KB
700 664.31KB
701 669.31KB
702 674.59KB
703 676.40KB
704 689.82KB
705 695.43KB
706 699.40KB
707 703.58KB
708 706.53KB
709 707.82KB
71 496.24KB
710 708.85KB
711 709.11KB
712 711.84KB
713 712.28KB
714 725.12KB
715 735.33KB
716 739.26KB
717 742.71KB
718 743.94KB
719 747.72KB
72 559.89KB
720 748.70KB
721 750.44KB
722 757.25KB
723 759.43KB
724 760.19KB
725 764.93KB
726 769.09KB
727 779.66KB
728 787.56KB
729 795.09KB
73 584.89KB
730 795.23KB
731 798.55KB
732 798.76KB
733 799.14KB
734 805.27KB
735 806.72KB
736 809.42KB
737 820.36KB
738 820.37KB
739 825.93KB
74 659.52KB
740 832.36KB
741 833.18KB
742 835.02KB
743 838.28KB
744 843.07KB
745 860.65KB
746 867.35KB
747 869.94KB
748 871.29KB
749 872.00KB
75 665.27KB
750 873.61KB
751 889.44KB
752 895.10KB
753 920.41KB
754 929.10KB
755 941.73KB
756 947.21KB
757 949.78KB
758 957.41KB
759 972.41KB
76 673.98KB
760 973.93KB
761 979.41KB
762 998.35KB
763 1013.07KB
77 702.18KB
78 729.34KB
79 753.03KB
8 107.86KB
8. Corrective Recovery and Compensating.mp4 2.63MB
8. Corrective Recovery and Compensating.vtt 2.59KB
80 763.39KB
81 768.86KB
82 818.76KB
83 836.70KB
84 860.19KB
85 865.26KB
86 878.25KB
87 979.03KB
88 982.78KB
89 1014.54KB
9 67.23KB
9. Module Review.mp4 614.70KB
9. Module Review.vtt 818B
90 1021.67KB
91 17.06KB
92 24.84KB
93 34.95KB
94 70.44KB
95 82.26KB
96 132.14KB
97 156.29KB
98 157.19KB
99 199.71KB
architecture-design-comptia-security-plus.zip 35.53MB
attacks-threats-vulnerabilities-comptia-security-plus.zip 34.31MB
comptia-security-plus-exam-briefing.zip 9.65MB
governance-risk-compliance-comptia-security-plus.zip 13.49MB
implementation-comptia-security-plus.zip 22.86MB
operations-incident-response-comptia-security-plus.zip 25.04MB
TutsNode.net.txt 63B
Distribution statistics by country
Poland (PL) 1
United States (US) 1
Russia (RU) 1
Serbia (RS) 1
China (CN) 1
Romania (RO) 1
Total 6
IP List List of IP addresses which were distributed this torrent