CompTIA Security+ Certification (SY0-601)
Welcome to the TOTAL: CompTIA Security+ Certification (SY0-601), a course from the production studios of Total Seminars with subject matter experts Mike Meyers and Dan Lachance.
Since the requirements and costs are high (the exam voucher is $392), you'll want to make sure you're prepared to pass the exam the first time and never pay full price. This course will prepare you and then you can get discounted exam vouchers at the Total Seminars website
This course covers everything you need to know to pass your CompTIA Security+ (SY0-601) certification exam. With over 17 hours of in-depth and fascinating content and 125 video lectures, this course will not only make you a good IT security tech, but make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is the President of Total Seminars and well known as the "Alpha Geek". Mike is widely known at the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry.
This course shows you how to:
- Apply the three “A’s” of security: authentication, authorization, and accounting
- Scan your wired or wireless network and assess it for various weaknesses
- Use cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)
- Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilities
- Identify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breaches
- Prevent attacks ranging from simple malware to sophisticated exploits to social engineering that takes advantage of people’s trust, relationships, and lack of knowledge
- Apply the techniques used in penetration testing, including passive and active reconnaissance
- Secure an enterprise environment, including creating incident response, business continuity, and disaster recovery plans
WHY SHOULD I TAKE THIS COURSE?
Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course’s subject matter experts, Mike Meyers and Dan Lachance, have a combined 50+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc. and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor.
This course will also prepare you for the CompTIA Security+ exam, which is industry standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense.
The average beginner IT security salary is $74,000, and an information security analyst can make a much as is $117,000 starting out. If you’re looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.
WHAT’S COVERED?
The course covers all the CompTIA Security+ (SY0-601) objective domains:
- Threats, Attacks, and Vulnerabilities (24%)
- Architecture and Design (21%)
- Implementation (25%)
- Operations and Incident Response (16%)
- Governance, Risk, and Compliance (14%)
EXAM INFO
- Exam code: SY0-601
- Max. 90 questions (performance-based and multiple choice)
- Length of exam: 90 minutes
- Passing score: 750 (on a scale of 100-900)
- Exam voucher cost: $349 USD (be sure to go to Total Seminars' website for discount vouchers!)
- Recommended experience: CompTIA Network+ and two years of experience in IT administration with a security focus
- Testing provider: Pearson VUE (in-person and online at-home options available)
HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?
Buy an exam voucher (get your discount voucher at Total Seminars' website), schedule your exam on the Pearson VUE Web site, then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.
- Schedule through a testing center: pearsonvue. com
- Schedule an at-home (or at-work) exam: onvue. com
WHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?
- Security or systems administrator
- Security engineer/analyst
- Security IT auditor
- IT project manager
- Beginner cybersecurity specialist
- Junior IT auditor
- Junior penetration tester
CompTIA Security+ (SY0-701)
Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.
You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.
CompTIA Security+ (SY0-701) is the world's most popular cybersecurity certification today!
This course is designed to help prepare you for the CompTIA Security (SY0-701) certification exam and covers all the domains the Security+ (SY0-701) certification exam:
CompTIA Security+ (SY0-701):
- General Security Concepts
- Threats, Vulnerabilities, and Mitigations
- Security Architecture
- Security Operations
- Security Program Management and Oversight
- Video lectures with the essential information needed to pass the Security+ (SY0-701) exam
- A complete downloadable study guide in PDF format based on the lessons
- Practice quizzes to ensure mastery of each section of the course
- A full-length practice exam with multiple choice and mock simulations
This course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-701), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!
What Other Students Are Saying About My CompTIA Security+ Course:
- Solid information, acronym break downs throughout the course (allows for better note taking). Jason is easy to follow, listen to, and understand during your study period (I sit for hours listening and taking notes and replaying the section) (Mark Guillen, 5 stars)
- Just passed my security+ today! Dion's course was excellent. It was all I needed, and I took his practice tests I also purchased. The only thing I think would help other testers is more sophisticated and harder performance-based questions as I experienced ones today that were pretty tough and required more hands-on experience. Overall, though completely worth the money. (Duran navarro, 5 stars)
- The course is very informative and good for people that has no knowledge about cybersecurity so far. It teaches us about the harm caused by attacks and how to prevent them. I would suggest everyone to take this course, even if they don't wan the certificate from Comptia. (Mahmoud Choumar, 5 stars)
- Jason is a great pedagogue. He is thorough and amiable. The course has very minimal errors and you can tell he is very strict with the format of his lessons. I had very few questions during the lectures and only experience one issue throughout the whole experience. I will definitely buy more courses from him. I also bought the voucher from his website to get the retake for only 100 bucks! Good job Dion Training! Keep up the great job! (Victor Cabrales, 5 stars)
- Passed the exam in December of 2022 using this course - FIRST TRY!! This course gave the back bone of everything I needed to pass the Sec. + exam. When the time came to study up a day or two before the actual exam, I used all the practice quizzes/tests from the CompTIA Sec. + study book. Seems thoughtless or stupid to not use the book for actual studying, but I found I learn slightly better in a class environment and this course/videos allowed me that. Thank you for this course and I look forward to many more in the future! Honestly, I haven't taken an ACTUAL exam in years - many years. If I can do it, you all can too! Good luck and God speed! (Nathaniel Shumaker, 5 stars)
Who is this course for?
- IT Professionals
- Entry-Level Security Personnel
- Military Personnel
- Government Employees
- Security Consultants
- Students and Recent Graduates
Content
Code:
+---CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide [HTDark.CoM]
ª ?????.mp4
ª
+---Chapter 1 Welcome to the Course SY0-701
ª 001. Introduction To The Comptia Security+ Ex(1).mp4
ª 002. Introduction To The Comptia Security+ Exam.Ar(1).mp4
ª 003. Introduction To The Course.Ar(1).mp4
ª 004. How To Prepare For The Exam.Ar(1).mp4
ª
+---Chapter 10 Part 9 - Evaluate Network Security Capabilities
ª 001. Section Preview.Ar(1).mp4
ª 002. Bench Marks & Secure Configuration Guide(1).mp4
ª 003. Wi-Fi Authentication Methods - Part 1.Ar(1).mp4
ª 004. Wi-Fi Authentication Methods - Part 2.Ar(1).mp4
ª 005. Network Security Monitoring.Ar(1).mp4
ª 006. Web Filtering.Ar(1).mp4
ª
+---Chapter 11 Part 10 - Assess Endpoint Security Capabilities
ª 001. Section Preview.Ar(1).mp4
ª 002. Endpoint Security.Ar(1).mp4
ª 003. Segmentation.Ar(1).mp4
ª 004. Mobile Device Management - Part 1.Ar(1).mp4
ª 005. Mobile Device Management - Part 2.Ar(1).mp4
ª 006. Secure Mobile Device Connections.Ar(1).mp4
ª 007. Secure Design Principles.Ar(1).mp4
ª
+---Chapter 12 Part 11 - Enhance Application Security Capabilities
ª 001. Section Preview.Ar(1).mp4
ª 002. Dns Security, Directory Services & Snmp.(1).mp4
ª 003. File Transfer Email And Video Services.A(1).mp4
ª 004. Secure Coding Techniques - Part 1.Ar(1).mp4
ª 005. Secure Coding Techniques - Part 2.Ar(1).mp4
ª
+---Chapter 13 Part 12 - Explain Incident Response and Monitoring Concepts
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Incident Response Process.Ar(1).mp4
ª 003. Cyber Incident Response Team.Ar(1).mp4
ª 004. Incident Identification - Part 1.Ar(1).mp4
ª 005. Incident Identification Part 2.Ar(1).mp4
ª 006. Incident Response Plan.Ar(1).mp4
ª 007. Incident Response Exercises, Recovery An(1).mp4
ª 008. Digital Forensics Documentation.Ar(1).mp4
ª 009. Digital Forensics Evidence Acquisition P(1).mp4
ª 010. Digital Forensics Evidence Acquisition P(1).mp4
ª 011. Data Sources.Ar(1).mp4
ª
+---Chapter 14 Part 13 - Analyze Indicators of Malicious Activity
ª 001. Section Preview.Ar(1).mp4
ª 002. Malware Classification.Ar(1).mp4
ª 003. Computer Viruses.Ar(1).mp4
ª 004. Computer Worms & Fileless Malware.Ar(1).mp4
ª 005. Spyware, Keyloggers, Rootkits, Backdoors(1).mp4
ª 006. Malware Indicators And Process Analysis,(1).mp4
ª 007. Password Attacks.Ar(1).mp4
ª 008. Tactics, Techniques & Procedures.Ar(1).mp4
ª 009. Privilege Escalation & Error Handling.Ar(1).mp4
ª 010. Uniform Resource Locator Analysis & Perc(1).mp4
ª 011. Api & Replay Attacks, Csrf, Clickjacking(1).mp4
ª 012. Other Injection Attacks.Ar(1).mp4
ª
+---Chapter 15 Part 14 - Summarize Security Governance Concepts
ª 001. Section Preview.Ar(1).mp4
ª 002. Regulations, Standards & Legislation.Ar(1).mp4
ª 003. Iso And Cloud Frameworks.Ar(1).mp4
ª 004. Governance Structure.Ar(1).mp4
ª 005. Governance Documents.Ar(1).mp4
ª 006. Change Management.Ar(1).mp4
ª 007. Configuration Management.Ar(1).mp4
ª 008. Scripting, Automation And Orchestration.(1).mp4
ª
+---Chapter 16 Part 15 - Explain Risk Management
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Risk Management Process.Ar(1).mp4
ª 003. Risk Controls.Ar(1).mp4
ª 004. Pop Quiz.Ar(1).mp4
ª 005. Business Impact Analysis.Ar(1).mp4
ª 006. Third-Party Risk Management & Security A(1).mp4
ª 007. Audit And Assurance.Ar(1).mp4
ª 008. Introduction To Penetration Testing.Ar(1).mp4
ª 009. Pen Test Attack Life Cycle.Ar(1).mp4
ª
+---Chapter 17 Part 16 - Summarize Data Protection and Compliance Concepts
ª 001. Section Preview(1).mp4
ª 002. Privacy And Sensitive Data Concepts.Ar(1).mp4
ª 003. Data Sovereignty, Privacy Breaches & Dat(1).mp4
ª 004. Privacy And Data Controls.Ar(1).mp4
ª 005. Pop Quiz.Ar(1).mp4
ª 006. Privacy Principles.Ar(1).mp4
ª 007. Compliance Monitoring.Ar(1).mp4
ª 008. Education, Training And Awareness.Ar(1).mp4
ª 009. Personnel Policies.Ar(1).mp4
ª
+---Chapter 18 Conclusion
ª 001. Conclusion.Ar(1).mp4
ª
+---Chapter 19 Welcome to the Course (SY0-601)
ª 001. Introduction To The Comptia Security+ Ex(1).mp4
ª
+---Chapter 2 Part 1 - Summarize Fundamental Security Concepts
ª 001. Section Preview.Ar(1).mp4
ª 002. Introduction To Information Security.Ar(1).mp4
ª 003. Cybersecurity Framework.Ar(1).mp4
ª 004. Control Objectives.Ar(1).mp4
ª 005. Security Control Categories.Ar(1).mp4
ª 006. Security Control Functional Types.Ar(1).mp4
ª 007. Pop Quiz.Ar(1).mp4
ª 008. Information Security Roles & Responsibil(1).mp4
ª
+---Chapter 20 Part 1 - Intro To Information Security And Security Roles & Responsibilities
ª 001. Section Preview.Ar(1).mp4
ª 002. Introduction To Information Security.Ar(1).mp4
ª 003. Cybersecurity Framework.Ar(1).mp4
ª 004. Security Roles & Responsibilities.Ar(1).mp4
ª 005. Security Control Categories.Ar(1).mp4
ª 006. Security Control Functional Types.Ar(1).mp4
ª 007. Iso And Cloud Frameworks.Ar(1).mp4
ª 008. Bench Marks & Secure Configuration Guide(1).mp4
ª 009. Regulations, Standards & Legislation.Ar(1).mp4
ª
+---Chapter 21 Section 2 - Explaining Threat Actors And Threat Vectors
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Vulnerability, Threat And Risk.Ar(1)(1).mp4
ª 003. Attributes Of Threat Actors.Ar(1).mp4
ª 004. Threat Actors.Ar(1).mp4
ª 005. Attack Surface & Attack Vectors.Ar(1).mp4
ª 006. Threat Research Sources.Ar(1).mp4
ª
+---Chapter 22 Part 3 - Performing Security Assessments
ª 001. Section Preview.Ar(1).mp4
ª 002. Network Reconnaissance Tools.Ar(1).mp4
ª 003. Other Network Reconnaissance Tools.Ar(1).mp4
ª 004. Demo - Ipconfig, Ping, Tracert, Netstat .mp4
ª 005. Simulated Question Test.Ar(1).mp4
ª 006. Software Vulnerabilities And Patch Manag(1).mp4
ª 007. Weak Host And Network Configurations.Ar(1).mp4
ª 008. Vulnerability Impacts.Ar(1).mp4
ª 009. Third Party Risks.Ar(1).mp4
ª 010. Introduction To Penetration Testing.Ar(1).mp4
ª 011. Reconnaissance.Ar(1).mp4
ª 012. Pen Test Attack Life Cycle.Ar(1).mp4
ª 013. Demo - Nmap.Ar(1).mp4
ª
+---Chapter 23 Part 4 - Social Engineering Techniques & Malware
ª 001. Section Preview.Ar(1).mp4
ª 002. Intro To Social Engineering.Ar(1).mp4
ª 003. Social Engineering Techniques Part 1.Ar(1).mp4
ª 004. Social Engineering Techniques Part 2.Ar(1).mp4
ª 005. Social Engineering Techniques Part 3.Ar(1).mp4
ª 006. Malware Classification.Ar(1).mp4
ª 007. Computer Viruses.Ar(1).mp4
ª 008. Computer Worms & Fileless Malware.Ar(1).mp4
ª 009. Spyware, Keyloggers, Rootkits, Backdoors(1).mp4
ª 010. Malware Indicators & Process Analysis.Ar(1).mp4
ª
+---Chapter 24 Part 5 - Cryptographic Concepts, Hashing, Ciphers & Encryption
ª 001. Section Preview.Ar(1).mp4
ª 002. Introduction To Cryptography.Ar(1).mp4
ª 003. Encryption.Ar(1).mp4
ª 004. Cryptographic Modes Of Operation.Ar(1).mp4
ª 005. Cipher Suites & Modes Of Operation.Ar(1).mp4
ª 006. Cryptographic Use Cases.Ar(1).mp4
ª 007. Cryptographic Limitations.Ar(1).mp4
ª 008. Longevity, Salting, And Key Stretching.A(1).mp4
ª 009. Man In The Middle And Downgrade Attacks.(1).mp4
ª 010. Homomorphic Encryption, Blockchain, and .mp4
ª 011. Quantum And Post Quantum.Ar(1).mp4
ª 012. Demo - Calculating Hash Values With Powe(1).mp4
ª
+---Chapter 25 Part 6 - Implementing Public Key Infrastructure
ª 001. Section Preview.Ar(1).mp4
ª 002. Certificates, Pkis, Ras, And Csrs.Ar(1).mp4
ª 003. Digital Certificates.Ar(1).mp4
ª 004. Key Management.Ar(1).mp4
ª 005. Certificate Management.Ar(1).mp4
ª 006. Certificate Formats & Openssl.Ar(1).mp4
ª 007. Demo - Digital Certificates?(1)(1).mp4
ª
+---Chapter 26 Part 7 - Authentication Design Concepts
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Identity & Access Management.Ar(1).mp4
ª 003. Authentication Factors, Design & Attribu(1).mp4
ª 004. Local, Network & Remote Authentication.A(1).mp4
ª 005. Kerberos Authentication & Authorization.(1).mp4
ª 006. Pap, Chap, And Ms-Chap Authentication.Ar(1).mp4
ª 007. Authentication Technologies And Protocol(1).mp4
ª 008. Biometric Authentication.Ar(1).mp4
ª
+---Chapter 27 Part 8 - Identity and Management Controls
ª 001. Section Preview.Ar(1).mp4
ª 002. Identity Management Controls.Ar(1).mp4
ª 003. Pop Quiz.Ar(1).mp4
ª 004. Account Attributes And Access Policies.A(1).mp4
ª 005. Authorization Solutions - Part 1.Ar(1).mp4
ª 006. Authorization Solutions - Part 2.Ar(1).mp4
ª 007. Personnel Policies.Ar(1).mp4
ª 008. Demo - Account Password Policy.Ar(1)(1).mp4
ª
+---Chapter 28 Part 9 - Implementing Secure Network Designs
ª 001. Section Preview.Ar(1).mp4
ª 002. Secure Network Designs.Ar(1).mp4
ª 003. Network Segmentation, Topology & Dmzs.Ar(1).mp4
ª 004. Secure Switching And Routing.Ar(1).mp4
ª 005. Routing And Switching Protocols.Ar(1).mp4
ª 006. Wi-Fi Authentication Methods - Part 1.Ar(1).mp4
ª 007. Wi-Fi Authentication Methods - Part 2.Ar(1).mp4
ª 008. Network Attacks.Ar(1).mp4
ª 009. Network Attacks Mitigation.Ar(1).mp4
ª
+---Chapter 29 Part 10 - Firewalls and Proxy Servers
ª 001. Section Preview.Ar(1).mp4
ª 002. Firewalls(1).mp4
ª 003. Firewall Implementation.Ar(1).mp4
ª 004. Access Control Lists, Nat,(1).mp4
ª 005. Next-Generation Firewalls & Hbids.Ar(1).mp4
ª 006. Demo - Windows 10 Firewall Configuration(1)(1).mp4
ª 007. Demo - How To Create An Outbound Rule.Ar(1).mp4
ª 008. Network Security Monitoring.Ar(1).mp4
ª 009. Monitoring Services And Siems.Ar(1).mp4
ª 010. File Manipulation, Regex And Grep.Ar(1).mp4
ª
+---Chapter 3 Part 2 - Compare Threat Types
ª 001. Section Preview.Ar(1).mp4
ª 002. Vulnerability, Threat, And Risk.Ar(1).mp4
ª 003. Attributes Of Threat Actors.Ar(1).mp4
ª 004. Threat Actors.Ar(1).mp4
ª 005. Attack Surface & Attack Vectors.Ar(1).mp4
ª 006. Vulnerable Software & Network Vectors.Ar(1).mp4
ª 007. Lure-Based & Message-Based Vectors.Ar(1).mp4
ª 008. Third Party Risks.Ar(1).mp4
ª 009. Introduction To Social Engineering.Ar(1).mp4
ª 010. Social Engineering Techniques Part 1.Ar(1).mp4
ª 011. Social Engineering Techniques Part 2.Ar(1).mp4
ª 012. Social Engineering Techniques Part 3.Ar(1).mp4
ª
+---Chapter 30 Part 11 - Implement Secure Network Operations Protocols
ª 001. Section Preview.Ar(1).mp4
ª 002. Secure Network Operations.Ar(1).mp4
ª 003. Dns Security Directory Services And Snmp(1)(1).mp4
ª 004. Secure Application Protocols.Ar(1).mp4
ª 005. File Transfer Email And Video Services.A(1).mp4
ª 006. Remote Access Architecture Part 1.Ar(1).mp4
ª 007. Remote Access Architecture Part 2.Ar(1).mp4
ª
+---Chapter 31 Part 12 - Implement Host Security Solutions
ª 001. Section Preview.Ar(1).mp4
ª 002. Hardware Root Of Trust.Ar(1).mp4
ª 003. Boot Integrity.Ar(1).mp4
ª 004. Disk Encryption & Usb Flash Drive Securi(1).mp4
ª 005. Pop Quiz.Ar(1).mp4
ª 006. Third-Party Risk Management.Ar(1).mp4
ª 007. Endpoint Security.Ar(1).mp4
ª 008. Embedded Systems.Ar(1).mp4
ª 009. Embedded Systems Communications Consideration(1).mp4
ª 010. Industrial Control Systems & Internet Of(1).mp4
ª 011. Specialized Systems.Ar(1).mp4
ª
+---Chapter 32 Part 13 - Implement Secure Mobile Solutions
ª 001. Section Preview.Ar(1).mp4
ª 002. Mobile Device Management Part 1.Ar(1).mp4
ª 003. Mobile Device Management Part 2.Ar(1).mp4
ª 004. Secure Mobile Device Connections.Ar(1).mp4
ª
+---Chapter 33 Part 14 - Application Attacks
ª 001. Section Preview.Ar(1).mp4
ª 002. Privilege Escalation & Error Handling.Ar(1).mp4
ª 003. Overflows, Resource Exhaustion, Memory Leaks .mp4
ª 004. Uniform Resource Locator Analysis & Percent E(1).mp4
ª 005. Api & Replay Attacks, Csrf, Clickjacking(1).mp4
ª 006. Cross-Site Scripting Attack.Ar(1).mp4
ª 007. Sql Injection.Ar(1).mp4
ª 008. Other Injection Attacks.Ar(1).mp4
ª 009. Secure Coding Techniques - Part 1.Ar(1).mp4
ª 010. Secure Coding Techniques - Part 2.Ar(1).mp4
ª 011. Implement Secure Script Environments.Ar(1).mp4
ª 012. Deployment And Automation Concepts.Ar(1).mp4
ª
+---Chapter 34 Part 15 - Implement Secure Cloud Solutions
ª 001. Section Preview.Ar(1).mp4
ª 002. Cloud Deployment Models.Ar(1).mp4
ª 003. Virtualization Technology & .mp4
ª 004. Cloud Security Solutions - Part 1.Ar(1).mp4
ª 005. Cloud Security Solutions Part 2.Ar(1).mp4
ª 006. Infrastructure As Code Concepts(1).mp4
ª
+---Chapter 35 Part 16 - Data Privacy & Protection Concepts
ª 001. Section Preview.Ar(1).mp4
ª 002. Privacy And Sensitive Data Concepts.Ar(1).mp4
ª 003. Data Sovereignty, Privacy Breaches & Data Sha(1).mp4
ª 004. Privacy And Data Controls.Ar(1).mp4
ª
+---Chapter 36 Part 17 - Incident Response Procedures
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Incident Response Process.Ar(1).mp4
ª 003. Cyber Incident Response Team.Ar(1).mp4
ª 004. Incident Response Plan.Ar(1).mp4
ª 005. Incident Response Exercises, Recovery And Ret(1).mp4
ª 006. Incident Identification Part 1.Ar(1).mp4
ª 007. Incident Identification Part 2.Ar(1).mp4
ª 008. Mitigation Controls.Ar(1).mp4
ª
+---Chapter 37 Part 18 - Digital Forensics
ª 001. Section Preview.Ar(1).mp4
ª 002. Digital Forensics Documentation.Ar(1).mp4
ª 003. Digital Forensics Evidence Acquisition P(1).mp4
ª 004. Digital Forensics Evidence Acquisition P(1).mp4
ª
+---Chapter 38 Part 19 - Risk Management Processes and Concepts
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Risk Management Process.Ar(1).mp4
ª 003. Risk Controls.Ar(1).mp4
ª 004. Pop Quiz.Ar(1).mp4
ª 005. Business Impact Analysis.Ar(1).mp4
ª
+---Chapter 39 Part 20 - Implement Cyber Security Resilience
ª 001. Section Preview.Ar(1).mp4
ª 002. Cyber Security Resilient Strategies.Ar(1).mp4
ª 003. Implementing Redundancy.Ar(1).mp4
ª 004. Backup Strategies.Ar(1).mp4
ª 005. Backup Storage.Ar(1).mp4
ª 006. Defense In Depth.Ar(1).mp4
ª
+---Chapter 4 Part 3 - Explain Cryptographic Solutions
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Introduction To Cryptography And Hashing(1)(1).mp4
ª 003. Encryption.Ar(1).mp4
ª 004. Cryptographic Modes Of Operation.Ar(1).mp4
ª 005. Demo - Calculating Hash Values With Powe(1).mp4
ª 006. Certificates, Pkis, Ras, And Csrs.Ar(1).mp4
ª 007. Digital Certificates.Ar(1).mp4
ª 008. Key Management.mp4
ª 009. Certificate Management.Ar(1).mp4
ª 010. Certificate Formats & Openssl.Ar(1).mp4
ª 011. Demo - Digital Certificates.Ar(1).mp4
ª 012. Longevity, Salting & Key Stretching.Ar(1).mp4
ª 013. Homomorphic Encryption, Blockchain, and .mp4
ª 8.srt-ar-translation.srt
ª
+---Chapter 40 Part 21 - Implement Physical Security
ª 001. Section Preview.Ar(1).mp4
ª 002. Physical Host Security Controls.Ar(1).mp4
ª 003. Physical Host Security Controls Part 1.A(1).mp4
ª 004. Physical Host Security Host Controls Par(1).mp4
ª
+---Chapter 5 Part 4 - Implement Identity and Access Management
ª 001. Section Preview.Ar(1).mp4
ª 002. Identity Access Management.Ar(1).mp4
ª 003. Authentication Factors, Design & Attribu(1).mp4
ª 004. Biometric Authentication.Ar(1).mp4
ª 005. Password Concepts.Ar(1).mp4
ª 006. Demo - Account Password Policy.Ar(1).mp4
ª 007. Authorization Solutions - Part 1.Ar(1).mp4
ª 008. Authorization Solutions - Part 2.Ar(1).mp4
ª 009. Account Attributes And Access Policies.A(1).mp4
ª 010. Local, Network, And Remote Authenticatio(1).mp4
ª 011. Kerberos Authentication & Authorization.(1).mp4
ª
+---Chapter 6 Part 5 - Secure Enterprise Network Architecture
ª 001. Section Preview.Ar(1).mp4
ª 002. Secure Network Designs.Ar(1).mp4
ª 003. Network Segmentation, Topology & Dmzs.Ar(1).mp4
ª 004. Routing And Switching Protocols.Ar(1).mp4
ª 005. Secure Switching And Routing.Ar(1).mp4
ª 006. Firewalls.Ar(1).mp4
ª 007. Firewall Implementation.Ar(1).mp4
ª 008. Demo - Windows 10 Firewall Configuration(1)(1).mp4
ª 009. Demo - Creating An Outbound Rule.Ar(1).mp4
ª 010. Next-Generation Firewalls & Hbids.Ar(1).mp4
ª 011. Remote Access Architecture Part 1.Ar(1).mp4
ª 012. Remote Access Architecture Part 2.Ar(1).mp4
ª
+---Chapter 7 Part 6 - Secure Cloud Network Architecture
ª 001. Section Preview.Ar(1)(1).mp4
ª 002. Cloud Deployment Models.Ar(1).mp4
ª 003. Cloud Security Solutions - Part 1.Ar(1).mp4
ª 004. Cloud Security Solutions - Part 2.Ar(1).mp4
ª 005. Infrastructure As Code Concepts.Ar(1).mp4
ª 006. Zero Trust.Ar(1).mp4
ª 007. Embedded Systems.Ar(1).mp4
ª 008. Industrial Control Systems & Internet Of(1).mp4
ª
+---Chapter 8 Part 7 - Explain Resiliency and Site Security Concepts
ª 001. Section Preview.Ar(1).mp4
ª 002. Backup Strategies,Ar(1).mp4
ª 003. Backup Storage.Ar(1).mp4
ª 004. Cyber Security Resilience.Ar(1).mp4
ª 005. Implementing Redundancy Strategies.Ar(1).mp4
ª 006. Diversity And Defense In Depth.Ar(1).mp4
ª 007. Physical Security Controls - Part 1.Ar(1).mp4
ª 008. Physical Security Controls - Part 2.Ar(1).mp4
ª 009. Physical Host Security Controls.Ar(1).mp4
ª
+---Chapter 9 Part 8 - Explain Vulnerability Management
001. Section Preview.Ar(1)(1).mp4
002. Vulnerability Discovery.Ar(1).mp4
003. Weak Host And Network Configurations.Ar(1).mp4
004. Evaluation Scope.Ar(1).mp4
005. Overflows, Resource Exhaustion, Memory Leaks .mp4
006. Cross-Site Scripting Attack.Ar(1).mp4
007. Standard Query Language Injection Attack(1)(1).mp4
008. Sideloading, Rooting & Jailbreaking.Ar(1).mp4
009. Threat Research Sources.Ar(1).mp4
010. Threat Intelligence Providers.Ar(1).mp4
011. Threat Data Feeds & Ai.Ar(1).mp4
012. Vulnerability Response & Remediation.Ar(1).mp4