zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501
magnet:?xt=urn:btih:c62b089215e5a6a85b1126bf48a12661305a458e&dn=[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501
磁力链接详情
Hash值:
c62b089215e5a6a85b1126bf48a12661305a458e
点击数:
257
文件大小:
4.37 GB
文件数量:
86
创建日期:
2021-1-6 21:12
最后访问:
2024-12-26 05:52
访问标签:
CourseClub
NET
CBT
Nuggets
-
Comptia
Security
Plus
sy0-501
文件列表详情
001 Welcome to Security+.mp4 25.54 MB
002 Infrastructure Security Devices.mp4 89 MB
003 Application and Traffic Analysis .mp4 38.66 MB
004 Network Segmentation and Separation with VLANs.mp4 51.92 MB
005 ACL Case Study.mp4 59.91 MB
006 Design Considerations.mp4 75.33 MB
007 NAT and PAT Case Study.mp4 45.73 MB
008 Firewall and Switch Protection Mechanisms.mp4 57.96 MB
009 Virtualization Overview.mp4 52.68 MB
010 IPsec_ Protocols_ and Well-known Ports.mp4 68.28 MB
011 ICMP and a Few More Protocols.mp4 60.39 MB
012 Security for WiFi.mp4 94.98 MB
013 Risk Overview.mp4 92.54 MB
014 Risk Calculation.mp4 68.94 MB
015 Attack Vectors_ Risk Management_ and Recovery.mp4 41.97 MB
016 Third-Party Risk from Integration.mp4 39.89 MB
017 Change Management and Account Auditing.mp4 59.04 MB
018 Data Loss Prevention (DLP).mp4 40.92 MB
019 Forensics.mp4 73.11 MB
020 Incident Response Concepts.mp4 43.5 MB
021 Security Awareness_ RBAC_ and Data Labeling .mp4 54.39 MB
022 Passwords_ Best Practices_ and Standards.mp4 54.34 MB
023 Environmental Controls.mp4 39.83 MB
024 Physical Security.mp4 48.01 MB
025 Business Continuity.mp4 65.06 MB
026 Fault Tolerance.mp4 67.18 MB
027 Controls for Confidentiality .mp4 50.04 MB
028 Tools and Controls for Data Integrity.mp4 68.77 MB
029 Availability and Safety.mp4 20.93 MB
030 Malware_ Adware - Spyware.mp4 43.25 MB
031 Trojans_ Backdoors_ and More Malware.mp4 68.76 MB
032 Attack Types MITM - Spear Fishing.mp4 72.17 MB
033 Attack Types_ Xmas - Client Side.mp4 55.05 MB
034 Password Attacks and Watering Holes.mp4 51 MB
035 Social Engineering Threats.mp4 48.85 MB
036 Vishing and Why Social Engineering Works.mp4 43.11 MB
037 Wireless Attacks.mp4 55.83 MB
038 Cross-site and Injection Attacks.mp4 64.64 MB
039 Application Attacks.mp4 46.84 MB
040 Monitoring and Device Hardening.mp4 70.63 MB
041 Baselines_ Detection_ and Reporting.mp4 38.7 MB
042 Analyzers and Scanners.mp4 75.25 MB
043 Discovering and Assessing Threats.mp4 58.08 MB
044 Penetration Testing.mp4 48.82 MB
045 Techniques for Securing Apps.mp4 39.67 MB
046 Application Security Controls.mp4 56.08 MB
047 Mobile Device Security Overview.mp4 70.63 MB
048 Host Security.mp4 43.03 MB
049 Hardware and Virtualization Security.mp4 46.43 MB
050 Data Security.mp4 40.12 MB
051 Securing Data with H_W_ Controls_ and Policy.mp4 39.53 MB
052 Security in Static Environments.mp4 54.43 MB
053 AAA Concepts.mp4 36.92 MB
054 Authentication Protocols and Services.mp4 68.67 MB
055 Multifactor Authentication.mp4 51.23 MB
056 Authentication Controls.mp4 71.7 MB
057 Controlling Access via Authorization.mp4 68.9 MB
058 Account Management.mp4 76.8 MB
059 Symmetric and Asymmetric Encryption.mp4 69.62 MB
060 Crypto Key Management.mp4 81.85 MB
061 Hashing and Encryption Protocols.mp4 72.19 MB
062 Comparing Cryptography Algorithms.mp4 63.03 MB
063 PKI Overview.mp4 55.21 MB
064 Certificate Warnings and Trust Models.mp4 37.73 MB
065 Layered Security Case Study.mp4 39.2 MB
066 Attack Types and Vectors.mp4 15.7 MB
067 Threat Actor Types and Ethics.mp4 20.18 MB
068 Reconnaissance Information Gathering Concepts.mp4 36.56 MB
069 Hacking Vocabulary and Terms.mp4 22.36 MB
070 Malware Concepts.mp4 33.96 MB
071 Network Scanning Overview.mp4 13.71 MB
072 Trojans.mp4 37.27 MB
073 Port Security.mp4 38.77 MB
074 Scanning Methodologies.mp4 32.68 MB
075 Sniffing Overview.mp4 43.48 MB
076 Vulnerability Scanning.mp4 29.48 MB
077 Social Engineering Overview.mp4 50.85 MB
078 System Hacking Stages and Goals.mp4 34.21 MB
079 Buffer Overflow.mp4 48.36 MB
080 OWASP BWAP.mp4 36.16 MB
081 Honeypots and Honeynets.mp4 41.26 MB
082 Centralized Identity Management.mp4 49.79 MB
083 SSO_ Kerberos_ and Security Threats.mp4 63.84 MB
084 Incident Response.mp4 44.24 MB
085 Penetration Testing Legally.mp4 37.51 MB
086 Case Study #1.mp4 75.92 MB
其他位置