[FreeCourseSite.com] Udemy - CompTIA Security+ Certification (SY0-501) The Total Course

mp4   Hot:1263   Size:19.13 GB   Created:2019-06-27 10:41:31   Update:2021-12-12 22:56:52  

File List

  • 2. Cryptography/13. Cryptographic Attacks.mp4 416.57 MB
    5. Securing Individual Systems/3. Man-in-the-Middle.mp4 410.13 MB
    5. Securing Individual Systems/9. Host Hardening.mp4 334.6 MB
    2. Cryptography/12. Public Key Infrastructure.mp4 320.2 MB
    5. Securing Individual Systems/16. Analyzing Output.mp4 297.74 MB
    2. Cryptography/11. Certificates and Trust.mp4 278.64 MB
    7. Beyond the Basic LAN/8. Wireless Access Points.mp4 277.12 MB
    7. Beyond the Basic LAN/7. Wireless Hardening.mp4 272.51 MB
    5. Securing Individual Systems/6. NAS and SAN.mp4 265.97 MB
    7. Beyond the Basic LAN/19. Mobile Enforcement.mp4 265.51 MB
    3. Identity and Access Management/1. Identification.mp4 260.88 MB
    2. Cryptography/1. Cryptography Basics.mp4 260.18 MB
    7. Beyond the Basic LAN/17. Mobile Connectivity.mp4 256.07 MB
    1. Risk Management/5. Managing Risk.mp4 255.51 MB
    7. Beyond the Basic LAN/10. Virtual Security.mp4 254.76 MB
    4. Tools of the Trade/1. OS Utilities, Part 1.mp4 247.71 MB
    5. Securing Individual Systems/14. Securing Peripherals.mp4 241.79 MB
    9. Testing Your Infrastructure/8. Vulnerability Impact.mp4 237.33 MB
    8. Secure Protocols/9. Secure Deployment Concepts.mp4 223.46 MB
    3. Identity and Access Management/6. Windows File Permissions.mp4 220.83 MB
    1. Risk Management/14. Business Impact Analysis.mp4 220.29 MB
    1. Risk Management/15. Organizing Data.mp4 217.68 MB
    7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.mp4 217.01 MB
    5. Securing Individual Systems/15. Malware.mp4 214.65 MB
    1. Risk Management/4. What is Risk.mp4 213.86 MB
    6. The Basic LAN/6. Proxy Servers.mp4 211.78 MB
    4. Tools of the Trade/2. OS Utilities, Part 2.mp4 210.61 MB
    6. The Basic LAN/9. IPSec.mp4 210.05 MB
    3. Identity and Access Management/9. Authentication Methods.mp4 206.27 MB
    4. Tools of the Trade/5. SNMP.mp4 203.52 MB
    7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.mp4 196.32 MB
    8. Secure Protocols/5. Transport Layer Security (TLS).mp4 195.77 MB
    2. Cryptography/5. RSA Cryptosystems.mp4 193.89 MB
    2. Cryptography/3. Symmetric Cryptosystems.mp4 193.39 MB
    8. Secure Protocols/1. Secure Applications and Protocols.mp4 191.53 MB
    5. Securing Individual Systems/4. System Resiliency.mp4 191.02 MB
    6. The Basic LAN/5. The Network Firewall.mp4 190.87 MB
    3. Identity and Access Management/5. Linux File Permissions.mp4 190.84 MB
    5. Securing Individual Systems/12. HardwareFirmware Security.mp4 189.84 MB
    2. Cryptography/7. PGPGPG.mp4 188.43 MB
    5. Securing Individual Systems/2. Host Threats.mp4 186.71 MB
    7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.mp4 185.74 MB
    4. Tools of the Trade/4. Protocol Analyzers.mp4 185.27 MB
    8. Secure Protocols/8. Secure Code Development.mp4 182.38 MB
    9. Testing Your Infrastructure/6. Attacking Applications.mp4 181.96 MB
    6. The Basic LAN/8. Virtual Private Networks.mp4 179.47 MB
    7. Beyond the Basic LAN/11. Containers.mp4 176.51 MB
    7. Beyond the Basic LAN/21. Physical Controls.mp4 176.1 MB
    7. Beyond the Basic LAN/2. Living in Open Networks.mp4 175.38 MB
    1. Risk Management/11. Security Policies.mp4 174.01 MB
    7. Beyond the Basic LAN/1. Wireless Review.mp4 172.7 MB
    3. Identity and Access Management/10. Single Sign-On.mp4 172.05 MB
    1. Risk Management/12. Frameworks.mp4 170.88 MB
    3. Identity and Access Management/8. AAA.mp4 170.76 MB
    9. Testing Your Infrastructure/7. Exploiting a Target.mp4 168.36 MB
    10. Dealing with Incidents/2. Digital Forensics.mp4 167.92 MB
    5. Securing Individual Systems/13. Secure OS Types.mp4 167.51 MB
    10. Dealing with Incidents/3. Contingency Planning.mp4 165.1 MB
    4. Tools of the Trade/3. Network Scanners.mp4 164.81 MB
    2. Cryptography/2. Cryptographic Methods.mp4 160.57 MB
    3. Identity and Access Management/4. Password Security.mp4 160.4 MB
    9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.mp4 159.58 MB
    6. The Basic LAN/4. Network Access Controls.mp4 159.44 MB
    5. Securing Individual Systems/5. RAID.mp4 154.53 MB
    7. Beyond the Basic LAN/12. IaaS.mp4 149.17 MB
    8. Secure Protocols/2. Network Models.mp4 147.98 MB
    3. Identity and Access Management/7. User Account Management.mp4 143.25 MB
    1. Risk Management/3. Threat Actors.mp4 142.12 MB
    7. Beyond the Basic LAN/16. Static Hosts.mp4 141.81 MB
    7. Beyond the Basic LAN/15. Deployment Models.mp4 141.38 MB
    6. The Basic LAN/11. SIEM.mp4 139.42 MB
    1. Risk Management/10. IT Security Governance.mp4 139.4 MB
    7. Beyond the Basic LAN/9. Virtualization Basics.mp4 139.29 MB
    5. Securing Individual Systems/7. Physical Hardening.mp4 138.46 MB
    7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.mp4 135.76 MB
    7. Beyond the Basic LAN/22. HVAC.mp4 135.35 MB
    7. Beyond the Basic LAN/13. PaaS.mp4 133.49 MB
    5. Securing Individual Systems/11. Disk Encryption.mp4 133.08 MB
    8. Secure Protocols/3. Know Your Protocols - TCPIP.mp4 131.84 MB
    9. Testing Your Infrastructure/4. Social Engineering Attacks.mp4 131.62 MB
    4. Tools of the Trade/6. Logs.mp4 125.73 MB
    7. Beyond the Basic LAN/20. Mobile Device Management.mp4 125.04 MB
    6. The Basic LAN/3. Network Zone Review.mp4 124.64 MB
    1. Risk Management/16. Security Training.mp4 122.68 MB
    6. The Basic LAN/1. LAN Review.mp4 120.24 MB
    3. Identity and Access Management/2. Authorization Concepts.mp4 116.48 MB
    5. Securing Individual Systems/1. Denial of Service.mp4 116.12 MB
    6. The Basic LAN/10. NIDSNIPS.mp4 115.04 MB
    1. Risk Management/6. Using Guides for Risk Assessment.mp4 114.52 MB
    2. Cryptography/4. Symmetric Block Modes.mp4 114.29 MB
    2. Cryptography/8. Hashing.mp4 106.5 MB
    5. Securing Individual Systems/18. Automation Strategies.mp4 104.43 MB
    5. Securing Individual Systems/19. Data Destruction.mp4 103.84 MB
    1. Risk Management/17. Third Party Agreements.mp4 103.64 MB
    8. Secure Protocols/10. Code Quality and Testing.mp4 102.99 MB
    9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.mp4 100.52 MB
    1. Risk Management/9. Defense in Depth.mp4 97.94 MB
    2. Cryptography/6. Diffie-Hellman.mp4 97.3 MB
    1. Risk Management/7. Security Controls.mp4 96.83 MB
    1. Risk Management/13. Quantitative Risk Calculations.mp4 94.82 MB
    5. Securing Individual Systems/17. IDS and IPS.mp4 94.65 MB
    9. Testing Your Infrastructure/5. Attacking Web Sites.mp4 91.14 MB
    10. Dealing with Incidents/4. Backups.mp4 91.13 MB
    8. Secure Protocols/7. Protecting Your Servers.mp4 86.62 MB
    6. The Basic LAN/7. Honeypots.mp4 81.32 MB
    8. Secure Protocols/6. Internet Service Hardening.mp4 79.03 MB
    7. Beyond the Basic LAN/18. Deploying Mobile Devices.mp4 78.92 MB
    2. Cryptography/10. Steganography.mp4 78.6 MB
    5. Securing Individual Systems/10. Data and System Security.mp4 76.6 MB
    1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.mp4 75.28 MB
    7. Beyond the Basic LAN/23. Fire Suppression.mp4 72.58 MB
    3. Identity and Access Management/3. Access Control List.mp4 67.61 MB
    2. Cryptography/9. HMAC.mp4 65.56 MB
    6. The Basic LAN/2. Network Topologies Review.mp4 62.19 MB
    7. Beyond the Basic LAN/14. SaaS.mp4 54.06 MB
    8. Secure Protocols/4. Know Your Protocols - Applications.mp4 48.84 MB
    10. Dealing with Incidents/1. Incident Response.mp4 48.33 MB
    1. Risk Management/2. The CIA of Security.mp4 44.71 MB
    9. Testing Your Infrastructure/3. Social Engineering Principles.mp4 39.69 MB
    5. Securing Individual Systems/8. RFI, EMI and ESD.mp4 32.96 MB
    1. Risk Management/8. Interesting Security Controls.mp4 30.97 MB
    1. Risk Management/1.1 CompTIA Security (SY0-501).pdf.pdf 540.61 KB
    2. Cryptography/13. Cryptographic Attacks.vtt 30.1 KB
    2. Cryptography/12. Public Key Infrastructure.vtt 27.37 KB
    5. Securing Individual Systems/3. Man-in-the-Middle.vtt 27.21 KB
    2. Cryptography/1. Cryptography Basics.vtt 20.89 KB
    5. Securing Individual Systems/9. Host Hardening.vtt 20.83 KB
    5. Securing Individual Systems/16. Analyzing Output.vtt 19.05 KB
    7. Beyond the Basic LAN/10. Virtual Security.vtt 18.95 KB
    4. Tools of the Trade/5. SNMP.vtt 18.68 KB
    5. Securing Individual Systems/6. NAS and SAN.vtt 18.44 KB
    3. Identity and Access Management/5. Linux File Permissions.vtt 18.08 KB
    4. Tools of the Trade/1. OS Utilities, Part 1.vtt 17.95 KB
    2. Cryptography/11. Certificates and Trust.vtt 17.67 KB
    7. Beyond the Basic LAN/7. Wireless Hardening.vtt 17.18 KB
    4. Tools of the Trade/2. OS Utilities, Part 2.vtt 17.1 KB
    3. Identity and Access Management/6. Windows File Permissions.vtt 16.83 KB
    6. The Basic LAN/8. Virtual Private Networks.vtt 16.63 KB
    3. Identity and Access Management/1. Identification.vtt 16.44 KB
    6. The Basic LAN/5. The Network Firewall.vtt 15.83 KB
    7. Beyond the Basic LAN/8. Wireless Access Points.vtt 15.71 KB
    8. Secure Protocols/5. Transport Layer Security (TLS).vtt 15.7 KB
    7. Beyond the Basic LAN/19. Mobile Enforcement.vtt 15.5 KB
    1. Risk Management/5. Managing Risk.vtt 15.2 KB
    6. The Basic LAN/6. Proxy Servers.vtt 14.97 KB
    1. Risk Management/14. Business Impact Analysis.vtt 14.71 KB
    8. Secure Protocols/9. Secure Deployment Concepts.vtt 14.29 KB
    2. Cryptography/3. Symmetric Cryptosystems.vtt 14.28 KB
    5. Securing Individual Systems/5. RAID.vtt 14.06 KB
    7. Beyond the Basic LAN/11. Containers.vtt 14.03 KB
    5. Securing Individual Systems/4. System Resiliency.vtt 13.98 KB
    10. Dealing with Incidents/2. Digital Forensics.vtt 13.98 KB
    5. Securing Individual Systems/14. Securing Peripherals.vtt 13.96 KB
    6. The Basic LAN/9. IPSec.vtt 13.9 KB
    7. Beyond the Basic LAN/17. Mobile Connectivity.vtt 13.89 KB
    4. Tools of the Trade/6. Logs.vtt 13.83 KB
    4. Tools of the Trade/3. Network Scanners.vtt 13.64 KB
    10. Dealing with Incidents/3. Contingency Planning.vtt 13.32 KB
    9. Testing Your Infrastructure/8. Vulnerability Impact.vtt 13.25 KB
    8. Secure Protocols/1. Secure Applications and Protocols.vtt 13.19 KB
    9. Testing Your Infrastructure/7. Exploiting a Target.vtt 13.08 KB
    3. Identity and Access Management/10. Single Sign-On.vtt 12.96 KB
    4. Tools of the Trade/4. Protocol Analyzers.vtt 12.96 KB
    8. Secure Protocols/8. Secure Code Development.vtt 12.93 KB
    9. Testing Your Infrastructure/6. Attacking Applications.vtt 12.9 KB
    1. Risk Management/4. What is Risk.vtt 12.66 KB
    7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.vtt 12.56 KB
    7. Beyond the Basic LAN/20. Mobile Device Management.vtt 12.49 KB
    6. The Basic LAN/4. Network Access Controls.vtt 12.48 KB
    6. The Basic LAN/3. Network Zone Review.vtt 12.42 KB
    3. Identity and Access Management/9. Authentication Methods.vtt 12.32 KB
    2. Cryptography/5. RSA Cryptosystems.vtt 12.27 KB
    5. Securing Individual Systems/15. Malware.vtt 12.16 KB
    1. Risk Management/15. Organizing Data.vtt 12.07 KB
    7. Beyond the Basic LAN/2. Living in Open Networks.vtt 11.82 KB
    1. Risk Management/16. Security Training.vtt 11.81 KB
    3. Identity and Access Management/4. Password Security.vtt 11.77 KB
    7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.vtt 11.71 KB
    7. Beyond the Basic LAN/12. IaaS.vtt 11.55 KB
    9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.vtt 11.54 KB
    2. Cryptography/7. PGPGPG.vtt 11.44 KB
    5. Securing Individual Systems/12. HardwareFirmware Security.vtt 11.37 KB
    1. Risk Management/12. Frameworks.vtt 10.9 KB
    7. Beyond the Basic LAN/1. Wireless Review.vtt 10.81 KB
    5. Securing Individual Systems/1. Denial of Service.vtt 10.8 KB
    7. Beyond the Basic LAN/15. Deployment Models.vtt 10.55 KB
    5. Securing Individual Systems/2. Host Threats.vtt 10.51 KB
    7. Beyond the Basic LAN/21. Physical Controls.vtt 10.49 KB
    1. Risk Management/11. Security Policies.vtt 10.46 KB
    1. Risk Management/10. IT Security Governance.vtt 10.33 KB
    3. Identity and Access Management/8. AAA.vtt 10.24 KB
    7. Beyond the Basic LAN/13. PaaS.vtt 10.19 KB
    9. Testing Your Infrastructure/5. Attacking Web Sites.vtt 9.78 KB
    1. Risk Management/13. Quantitative Risk Calculations.vtt 9.77 KB
    1. Risk Management/17. Third Party Agreements.vtt 9.77 KB
    6. The Basic LAN/1. LAN Review.vtt 9.68 KB
    10. Dealing with Incidents/4. Backups.vtt 9.65 KB
    7. Beyond the Basic LAN/16. Static Hosts.vtt 9.62 KB
    7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.vtt 9.44 KB
    2. Cryptography/4. Symmetric Block Modes.vtt 9.36 KB
    5. Securing Individual Systems/13. Secure OS Types.vtt 9.3 KB
    9. Testing Your Infrastructure/4. Social Engineering Attacks.vtt 9.28 KB
    7. Beyond the Basic LAN/9. Virtualization Basics.vtt 9.22 KB
    1. Risk Management/7. Security Controls.vtt 9.19 KB
    6. The Basic LAN/11. SIEM.vtt 9.17 KB
    8. Secure Protocols/2. Network Models.vtt 8.98 KB
    5. Securing Individual Systems/7. Physical Hardening.vtt 8.96 KB
    7. Beyond the Basic LAN/22. HVAC.vtt 8.79 KB
    7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.vtt 8.55 KB
    2. Cryptography/8. Hashing.vtt 8.54 KB
    1. Risk Management/3. Threat Actors.vtt 8.52 KB
    2. Cryptography/2. Cryptographic Methods.vtt 8.46 KB
    3. Identity and Access Management/7. User Account Management.vtt 8.3 KB
    1. Risk Management/6. Using Guides for Risk Assessment.vtt 8.1 KB
    5. Securing Individual Systems/11. Disk Encryption.vtt 7.83 KB
    3. Identity and Access Management/3. Access Control List.vtt 7.7 KB
    8. Secure Protocols/6. Internet Service Hardening.vtt 7.65 KB
    2. Cryptography/6. Diffie-Hellman.vtt 7.59 KB
    10. Dealing with Incidents/1. Incident Response.vtt 7.56 KB
    8. Secure Protocols/7. Protecting Your Servers.vtt 7.38 KB
    3. Identity and Access Management/2. Authorization Concepts.vtt 7.18 KB
    8. Secure Protocols/3. Know Your Protocols - TCPIP.vtt 7.08 KB
    6. The Basic LAN/10. NIDSNIPS.vtt 6.96 KB
    2. Cryptography/10. Steganography.vtt 6.94 KB
    7. Beyond the Basic LAN/18. Deploying Mobile Devices.vtt 6.3 KB
    8. Secure Protocols/4. Know Your Protocols - Applications.vtt 6.3 KB
    8. Secure Protocols/10. Code Quality and Testing.vtt 6.23 KB
    1. Risk Management/9. Defense in Depth.vtt 6.19 KB
    5. Securing Individual Systems/18. Automation Strategies.vtt 6.04 KB
    9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.vtt 5.78 KB
    6. The Basic LAN/2. Network Topologies Review.vtt 5.76 KB
    5. Securing Individual Systems/19. Data Destruction.vtt 5.6 KB
    5. Securing Individual Systems/10. Data and System Security.vtt 5.24 KB
    6. The Basic LAN/7. Honeypots.vtt 5.23 KB
    5. Securing Individual Systems/17. IDS and IPS.vtt 5.11 KB
    7. Beyond the Basic LAN/23. Fire Suppression.vtt 4.86 KB
    1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.vtt 4.49 KB
    2. Cryptography/9. HMAC.vtt 4.25 KB
    1. Risk Management/2. The CIA of Security.vtt 4.17 KB
    1. Risk Management/8. Interesting Security Controls.vtt 3.98 KB
    5. Securing Individual Systems/8. RFI, EMI and ESD.vtt 3.53 KB
    7. Beyond the Basic LAN/14. SaaS.vtt 3.05 KB
    9. Testing Your Infrastructure/3. Social Engineering Principles.vtt 2.36 KB
    1. Risk Management/18. Risk Management Quiz.html 162 B
    10. Dealing with Incidents/5. Dealing with Incidents Quiz.html 162 B
    2. Cryptography/14. Cryptography Quiz.html 162 B
    3. Identity and Access Management/11. Identity and Access Management Quiz.html 162 B
    4. Tools of the Trade/7. Tools of the Trade Quiz.html 162 B
    5. Securing Individual Systems/20. Securing Individual Systems Quiz.html 162 B
    6. The Basic LAN/12. The Basic LAN Quiz.html 162 B
    7. Beyond the Basic LAN/24. Beyond the Basic LAN Quiz.html 162 B
    8. Secure Protocols/11. Secure Protocols Quiz.html 162 B
    9. Testing Your Infrastructure/9. Testing Your Infrastructure Quiz.html 162 B
    [FCS Forum].url 133 B
    [FreeCourseSite.com].url 127 B
    [CourseClub.NET].url 123 B

Download Info

  • Tips

    “[FreeCourseSite.com] Udemy - CompTIA Security+ Certification (SY0-501) The Total Course” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.