• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Resource icon

CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide 12 GB 2024 (Arabic language)

No permission to download

CompTIA Security+ Certification (SY0-601)

Welcome to the TOTAL: CompTIA Security+ Certification (SY0-601), a course from the production studios of Total Seminars with subject matter experts Mike Meyers and Dan Lachance.

Since the requirements and costs are high (the exam voucher is $392), you'll want to make sure you're prepared to pass the exam the first time and never pay full price. This course will prepare you and then you can get discounted exam vouchers at the Total Seminars website

This course covers everything you need to know to pass your CompTIA Security+ (SY0-601) certification exam. With over 17 hours of in-depth and fascinating content and 125 video lectures, this course will not only make you a good IT security tech, but make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is the President of Total Seminars and well known as the "Alpha Geek". Mike is widely known at the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry.

This course shows you how to:

  • Apply the three “A’s” of security: authentication, authorization, and accounting
  • Scan your wired or wireless network and assess it for various weaknesses
  • Use cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)
  • Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilities
  • Identify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breaches
  • Prevent attacks ranging from simple malware to sophisticated exploits to social engineering that takes advantage of people’s trust, relationships, and lack of knowledge
  • Apply the techniques used in penetration testing, including passive and active reconnaissance
  • Secure an enterprise environment, including creating incident response, business continuity, and disaster recovery plans


WHY SHOULD I TAKE THIS COURSE?

Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course’s subject matter experts, Mike Meyers and Dan Lachance, have a combined 50+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc. and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor.

This course will also prepare you for the CompTIA Security+ exam, which is industry standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense.

The average beginner IT security salary is $74,000, and an information security analyst can make a much as is $117,000 starting out. If you’re looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.



WHAT’S COVERED?

The course covers all the CompTIA Security+ (SY0-601) objective domains:

  • Threats, Attacks, and Vulnerabilities (24%)
  • Architecture and Design (21%)
  • Implementation (25%)
  • Operations and Incident Response (16%)
  • Governance, Risk, and Compliance (14%)


EXAM INFO

  • Exam code: SY0-601
  • Max. 90 questions (performance-based and multiple choice)
  • Length of exam: 90 minutes
  • Passing score: 750 (on a scale of 100-900)
  • Exam voucher cost: $349 USD (be sure to go to Total Seminars' website for discount vouchers!)
  • Recommended experience: CompTIA Network+ and two years of experience in IT administration with a security focus
  • Testing provider: Pearson VUE (in-person and online at-home options available)


HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?

Buy an exam voucher (get your discount voucher at Total Seminars' website), schedule your exam on the Pearson VUE Web site, then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.

  • Schedule through a testing center: pearsonvue. com
  • Schedule an at-home (or at-work) exam: onvue. com


WHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?

  • Security or systems administrator
  • Security engineer/analyst
  • Security IT auditor
  • IT project manager
  • Beginner cybersecurity specialist
  • Junior IT auditor
  • Junior penetration tester




CompTIA Security+ (SY0-701)


Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.



You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.



CompTIA Security+ (SY0-701) is the world's most popular cybersecurity certification today!



This course is designed to help prepare you for the CompTIA Security (SY0-701) certification exam and covers all the domains the Security+ (SY0-701) certification exam:

CompTIA Security+ (SY0-701):

  1. General Security Concepts
  2. Threats, Vulnerabilities, and Mitigations
  3. Security Architecture
  4. Security Operations
  5. Security Program Management and Oversight

What You Will Receive In The Course:

  • Video lectures with the essential information needed to pass the Security+ (SY0-701) exam
  • A complete downloadable study guide in PDF format based on the lessons
  • Practice quizzes to ensure mastery of each section of the course
  • A full-length practice exam with multiple choice and mock simulations


This course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-701), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!



What Other Students Are Saying About My CompTIA Security+ Course:

  • Solid information, acronym break downs throughout the course (allows for better note taking). Jason is easy to follow, listen to, and understand during your study period (I sit for hours listening and taking notes and replaying the section) (Mark Guillen, 5 stars)


  • Just passed my security+ today! Dion's course was excellent. It was all I needed, and I took his practice tests I also purchased. The only thing I think would help other testers is more sophisticated and harder performance-based questions as I experienced ones today that were pretty tough and required more hands-on experience. Overall, though completely worth the money. (Duran navarro, 5 stars)


  • The course is very informative and good for people that has no knowledge about cybersecurity so far. It teaches us about the harm caused by attacks and how to prevent them. I would suggest everyone to take this course, even if they don't wan the certificate from Comptia. (Mahmoud Choumar, 5 stars)


  • Jason is a great pedagogue. He is thorough and amiable. The course has very minimal errors and you can tell he is very strict with the format of his lessons. I had very few questions during the lectures and only experience one issue throughout the whole experience. I will definitely buy more courses from him. I also bought the voucher from his website to get the retake for only 100 bucks! Good job Dion Training! Keep up the great job! (Victor Cabrales, 5 stars)


  • Passed the exam in December of 2022 using this course - FIRST TRY!! This course gave the back bone of everything I needed to pass the Sec. + exam. When the time came to study up a day or two before the actual exam, I used all the practice quizzes/tests from the CompTIA Sec. + study book. Seems thoughtless or stupid to not use the book for actual studying, but I found I learn slightly better in a class environment and this course/videos allowed me that. Thank you for this course and I look forward to many more in the future! Honestly, I haven't taken an ACTUAL exam in years - many years. If I can do it, you all can too! Good luck and God speed! (Nathaniel Shumaker, 5 stars)

Upon completion of this course, you will earn 31 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

Who is this course for?​

  • IT Professionals
  • Entry-Level Security Personnel
  • Military Personnel
  • Government Employees
  • Security Consultants
  • Students and Recent Graduates

Content​

Code:
+---CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide [HTDark.CoM]
    ª   ?????.mp4
    ª   
    +---Chapter 1  Welcome to the Course SY0-701
    ª       001. Introduction To The Comptia Security+ Ex(1).mp4
    ª       002. Introduction To The Comptia Security+ Exam.Ar(1).mp4
    ª       003. Introduction To The Course.Ar(1).mp4
    ª       004. How To Prepare For The Exam.Ar(1).mp4
    ª       
    +---Chapter 10  Part 9 - Evaluate Network Security Capabilities
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Bench Marks & Secure Configuration Guide(1).mp4
    ª       003. Wi-Fi Authentication Methods - Part 1.Ar(1).mp4
    ª       004. Wi-Fi Authentication Methods - Part 2.Ar(1).mp4
    ª       005. Network Security Monitoring.Ar(1).mp4
    ª       006. Web Filtering.Ar(1).mp4
    ª       
    +---Chapter 11  Part 10 - Assess Endpoint Security Capabilities
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Endpoint Security.Ar(1).mp4
    ª       003. Segmentation.Ar(1).mp4
    ª       004. Mobile Device Management - Part 1.Ar(1).mp4
    ª       005. Mobile Device Management - Part 2.Ar(1).mp4
    ª       006. Secure Mobile Device Connections.Ar(1).mp4
    ª       007. Secure Design Principles.Ar(1).mp4
    ª       
    +---Chapter 12  Part 11 - Enhance Application Security Capabilities
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Dns Security, Directory Services & Snmp.(1).mp4
    ª       003. File Transfer Email And Video Services.A(1).mp4
    ª       004. Secure Coding Techniques - Part 1.Ar(1).mp4
    ª       005. Secure Coding Techniques - Part 2.Ar(1).mp4
    ª       
    +---Chapter 13  Part 12 - Explain Incident Response and Monitoring Concepts
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Incident Response Process.Ar(1).mp4
    ª       003. Cyber Incident Response Team.Ar(1).mp4
    ª       004. Incident Identification - Part 1.Ar(1).mp4
    ª       005. Incident Identification Part 2.Ar(1).mp4
    ª       006. Incident Response Plan.Ar(1).mp4
    ª       007. Incident Response Exercises, Recovery An(1).mp4
    ª       008. Digital Forensics Documentation.Ar(1).mp4
    ª       009. Digital Forensics Evidence Acquisition P(1).mp4
    ª       010. Digital Forensics Evidence Acquisition P(1).mp4
    ª       011. Data Sources.Ar(1).mp4
    ª       
    +---Chapter 14  Part 13 - Analyze Indicators of Malicious Activity
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Malware Classification.Ar(1).mp4
    ª       003. Computer Viruses.Ar(1).mp4
    ª       004. Computer Worms & Fileless Malware.Ar(1).mp4
    ª       005. Spyware, Keyloggers, Rootkits, Backdoors(1).mp4
    ª       006. Malware Indicators And Process Analysis,(1).mp4
    ª       007. Password Attacks.Ar(1).mp4
    ª       008. Tactics, Techniques & Procedures.Ar(1).mp4
    ª       009. Privilege Escalation & Error Handling.Ar(1).mp4
    ª       010. Uniform Resource Locator Analysis & Perc(1).mp4
    ª       011. Api & Replay Attacks, Csrf, Clickjacking(1).mp4
    ª       012. Other Injection Attacks.Ar(1).mp4
    ª       
    +---Chapter 15  Part 14 - Summarize Security Governance Concepts
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Regulations, Standards & Legislation.Ar(1).mp4
    ª       003. Iso And Cloud Frameworks.Ar(1).mp4
    ª       004. Governance Structure.Ar(1).mp4
    ª       005. Governance Documents.Ar(1).mp4
    ª       006. Change Management.Ar(1).mp4
    ª       007. Configuration Management.Ar(1).mp4
    ª       008. Scripting, Automation And Orchestration.(1).mp4
    ª       
    +---Chapter 16  Part 15 - Explain Risk Management
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Risk Management Process.Ar(1).mp4
    ª       003. Risk Controls.Ar(1).mp4
    ª       004. Pop Quiz.Ar(1).mp4
    ª       005. Business Impact Analysis.Ar(1).mp4
    ª       006. Third-Party Risk Management & Security A(1).mp4
    ª       007. Audit And Assurance.Ar(1).mp4
    ª       008. Introduction To Penetration Testing.Ar(1).mp4
    ª       009. Pen Test Attack Life Cycle.Ar(1).mp4
    ª       
    +---Chapter 17  Part 16 - Summarize Data Protection and Compliance Concepts
    ª       001. Section Preview(1).mp4
    ª       002. Privacy And Sensitive Data Concepts.Ar(1).mp4
    ª       003. Data Sovereignty, Privacy Breaches & Dat(1).mp4
    ª       004. Privacy And Data Controls.Ar(1).mp4
    ª       005. Pop Quiz.Ar(1).mp4
    ª       006. Privacy Principles.Ar(1).mp4
    ª       007. Compliance Monitoring.Ar(1).mp4
    ª       008. Education, Training And Awareness.Ar(1).mp4
    ª       009. Personnel Policies.Ar(1).mp4
    ª       
    +---Chapter 18  Conclusion
    ª       001. Conclusion.Ar(1).mp4
    ª       
    +---Chapter 19  Welcome to the Course (SY0-601)
    ª       001. Introduction To The Comptia Security+ Ex(1).mp4
    ª       
    +---Chapter 2  Part 1 - Summarize Fundamental Security Concepts
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Introduction To Information Security.Ar(1).mp4
    ª       003. Cybersecurity Framework.Ar(1).mp4
    ª       004. Control Objectives.Ar(1).mp4
    ª       005. Security Control Categories.Ar(1).mp4
    ª       006. Security Control Functional Types.Ar(1).mp4
    ª       007. Pop Quiz.Ar(1).mp4
    ª       008. Information Security Roles & Responsibil(1).mp4
    ª       
    +---Chapter 20  Part 1 - Intro To Information Security And Security Roles & Responsibilities
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Introduction To Information Security.Ar(1).mp4
    ª       003. Cybersecurity Framework.Ar(1).mp4
    ª       004. Security Roles & Responsibilities.Ar(1).mp4
    ª       005. Security Control Categories.Ar(1).mp4
    ª       006. Security Control Functional Types.Ar(1).mp4
    ª       007. Iso And Cloud Frameworks.Ar(1).mp4
    ª       008. Bench Marks & Secure Configuration Guide(1).mp4
    ª       009. Regulations, Standards & Legislation.Ar(1).mp4
    ª       
    +---Chapter 21  Section 2 - Explaining Threat Actors And Threat Vectors
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Vulnerability, Threat And Risk.Ar(1)(1).mp4
    ª       003. Attributes Of Threat Actors.Ar(1).mp4
    ª       004. Threat Actors.Ar(1).mp4
    ª       005. Attack Surface & Attack Vectors.Ar(1).mp4
    ª       006. Threat Research Sources.Ar(1).mp4
    ª       
    +---Chapter 22  Part 3 - Performing Security Assessments
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Network Reconnaissance Tools.Ar(1).mp4
    ª       003. Other Network Reconnaissance Tools.Ar(1).mp4
    ª       004. Demo - Ipconfig, Ping, Tracert, Netstat .mp4
    ª       005. Simulated Question Test.Ar(1).mp4
    ª       006. Software Vulnerabilities And Patch Manag(1).mp4
    ª       007. Weak Host And Network Configurations.Ar(1).mp4
    ª       008. Vulnerability Impacts.Ar(1).mp4
    ª       009. Third Party Risks.Ar(1).mp4
    ª       010. Introduction To Penetration Testing.Ar(1).mp4
    ª       011. Reconnaissance.Ar(1).mp4
    ª       012. Pen Test Attack Life Cycle.Ar(1).mp4
    ª       013. Demo - Nmap.Ar(1).mp4
    ª       
    +---Chapter 23  Part 4 - Social Engineering Techniques & Malware
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Intro To Social Engineering.Ar(1).mp4
    ª       003. Social Engineering Techniques Part 1.Ar(1).mp4
    ª       004. Social Engineering Techniques Part 2.Ar(1).mp4
    ª       005. Social Engineering Techniques Part 3.Ar(1).mp4
    ª       006. Malware Classification.Ar(1).mp4
    ª       007. Computer Viruses.Ar(1).mp4
    ª       008. Computer Worms & Fileless Malware.Ar(1).mp4
    ª       009. Spyware, Keyloggers, Rootkits, Backdoors(1).mp4
    ª       010. Malware Indicators & Process Analysis.Ar(1).mp4
    ª       
    +---Chapter 24  Part 5 - Cryptographic Concepts, Hashing, Ciphers & Encryption
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Introduction To Cryptography.Ar(1).mp4
    ª       003. Encryption.Ar(1).mp4
    ª       004. Cryptographic Modes Of Operation.Ar(1).mp4
    ª       005. Cipher Suites & Modes Of Operation.Ar(1).mp4
    ª       006. Cryptographic Use Cases.Ar(1).mp4
    ª       007. Cryptographic Limitations.Ar(1).mp4
    ª       008. Longevity, Salting, And Key Stretching.A(1).mp4
    ª       009. Man In The Middle And Downgrade Attacks.(1).mp4
    ª       010. Homomorphic Encryption, Blockchain, and .mp4
    ª       011. Quantum And Post Quantum.Ar(1).mp4
    ª       012. Demo - Calculating Hash Values With Powe(1).mp4
    ª       
    +---Chapter 25  Part 6 - Implementing Public Key Infrastructure
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Certificates, Pkis, Ras, And Csrs.Ar(1).mp4
    ª       003. Digital Certificates.Ar(1).mp4
    ª       004. Key Management.Ar(1).mp4
    ª       005. Certificate Management.Ar(1).mp4
    ª       006. Certificate Formats & Openssl.Ar(1).mp4
    ª       007. Demo - Digital Certificates?(1)(1).mp4
    ª       
    +---Chapter 26  Part 7 - Authentication Design Concepts
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Identity & Access Management.Ar(1).mp4
    ª       003. Authentication Factors, Design & Attribu(1).mp4
    ª       004. Local, Network & Remote Authentication.A(1).mp4
    ª       005. Kerberos Authentication & Authorization.(1).mp4
    ª       006. Pap, Chap, And Ms-Chap Authentication.Ar(1).mp4
    ª       007. Authentication Technologies And Protocol(1).mp4
    ª       008. Biometric Authentication.Ar(1).mp4
    ª       
    +---Chapter 27  Part 8 - Identity and Management Controls
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Identity Management Controls.Ar(1).mp4
    ª       003. Pop Quiz.Ar(1).mp4
    ª       004. Account Attributes And Access Policies.A(1).mp4
    ª       005. Authorization Solutions - Part 1.Ar(1).mp4
    ª       006. Authorization Solutions - Part 2.Ar(1).mp4
    ª       007. Personnel Policies.Ar(1).mp4
    ª       008. Demo - Account Password Policy.Ar(1)(1).mp4
    ª       
    +---Chapter 28  Part 9 - Implementing Secure Network Designs
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Secure Network Designs.Ar(1).mp4
    ª       003. Network Segmentation, Topology & Dmzs.Ar(1).mp4
    ª       004. Secure Switching And Routing.Ar(1).mp4
    ª       005. Routing And Switching Protocols.Ar(1).mp4
    ª       006. Wi-Fi Authentication Methods - Part 1.Ar(1).mp4
    ª       007. Wi-Fi Authentication Methods - Part 2.Ar(1).mp4
    ª       008. Network Attacks.Ar(1).mp4
    ª       009. Network Attacks Mitigation.Ar(1).mp4
    ª       
    +---Chapter 29  Part 10 - Firewalls and Proxy Servers
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Firewalls(1).mp4
    ª       003. Firewall Implementation.Ar(1).mp4
    ª       004. Access Control Lists, Nat,(1).mp4
    ª       005. Next-Generation Firewalls & Hbids.Ar(1).mp4
    ª       006. Demo - Windows 10 Firewall Configuration(1)(1).mp4
    ª       007. Demo - How To Create An Outbound Rule.Ar(1).mp4
    ª       008. Network Security Monitoring.Ar(1).mp4
    ª       009. Monitoring Services And Siems.Ar(1).mp4
    ª       010. File Manipulation, Regex And Grep.Ar(1).mp4
    ª       
    +---Chapter 3  Part 2 - Compare Threat Types
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Vulnerability, Threat, And Risk.Ar(1).mp4
    ª       003. Attributes Of Threat Actors.Ar(1).mp4
    ª       004. Threat Actors.Ar(1).mp4
    ª       005. Attack Surface & Attack Vectors.Ar(1).mp4
    ª       006. Vulnerable Software & Network Vectors.Ar(1).mp4
    ª       007. Lure-Based & Message-Based Vectors.Ar(1).mp4
    ª       008. Third Party Risks.Ar(1).mp4
    ª       009. Introduction To Social Engineering.Ar(1).mp4
    ª       010. Social Engineering Techniques Part 1.Ar(1).mp4
    ª       011. Social Engineering Techniques Part 2.Ar(1).mp4
    ª       012. Social Engineering Techniques Part 3.Ar(1).mp4
    ª       
    +---Chapter 30  Part 11 - Implement Secure Network Operations Protocols
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Secure Network Operations.Ar(1).mp4
    ª       003. Dns Security Directory Services And Snmp(1)(1).mp4
    ª       004. Secure Application Protocols.Ar(1).mp4
    ª       005. File Transfer Email And Video Services.A(1).mp4
    ª       006. Remote Access Architecture Part 1.Ar(1).mp4
    ª       007. Remote Access Architecture Part 2.Ar(1).mp4
    ª       
    +---Chapter 31  Part 12 - Implement Host Security Solutions
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Hardware Root Of Trust.Ar(1).mp4
    ª       003. Boot Integrity.Ar(1).mp4
    ª       004. Disk Encryption & Usb Flash Drive Securi(1).mp4
    ª       005. Pop Quiz.Ar(1).mp4
    ª       006. Third-Party Risk Management.Ar(1).mp4
    ª       007. Endpoint Security.Ar(1).mp4
    ª       008. Embedded Systems.Ar(1).mp4
    ª       009. Embedded Systems Communications Consideration(1).mp4
    ª       010. Industrial Control Systems & Internet Of(1).mp4
    ª       011. Specialized Systems.Ar(1).mp4
    ª       
    +---Chapter 32  Part 13 - Implement Secure Mobile Solutions
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Mobile Device Management Part 1.Ar(1).mp4
    ª       003. Mobile Device Management Part 2.Ar(1).mp4
    ª       004. Secure Mobile Device Connections.Ar(1).mp4
    ª       
    +---Chapter 33  Part 14 - Application Attacks
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Privilege Escalation & Error Handling.Ar(1).mp4
    ª       003. Overflows, Resource Exhaustion, Memory Leaks .mp4
    ª       004. Uniform Resource Locator Analysis & Percent E(1).mp4
    ª       005. Api & Replay Attacks, Csrf, Clickjacking(1).mp4
    ª       006. Cross-Site Scripting Attack.Ar(1).mp4
    ª       007. Sql Injection.Ar(1).mp4
    ª       008. Other Injection Attacks.Ar(1).mp4
    ª       009. Secure Coding Techniques - Part 1.Ar(1).mp4
    ª       010. Secure Coding Techniques - Part 2.Ar(1).mp4
    ª       011. Implement Secure Script Environments.Ar(1).mp4
    ª       012. Deployment And Automation Concepts.Ar(1).mp4
    ª       
    +---Chapter 34  Part 15 - Implement Secure Cloud Solutions
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Cloud Deployment Models.Ar(1).mp4
    ª       003. Virtualization Technology & .mp4
    ª       004. Cloud Security Solutions - Part 1.Ar(1).mp4
    ª       005. Cloud Security Solutions Part 2.Ar(1).mp4
    ª       006. Infrastructure As Code Concepts(1).mp4
    ª       
    +---Chapter 35  Part 16 - Data Privacy & Protection Concepts
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Privacy And Sensitive Data Concepts.Ar(1).mp4
    ª       003. Data Sovereignty, Privacy Breaches & Data Sha(1).mp4
    ª       004. Privacy And Data Controls.Ar(1).mp4
    ª       
    +---Chapter 36  Part 17 - Incident Response Procedures
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Incident Response Process.Ar(1).mp4
    ª       003. Cyber Incident Response Team.Ar(1).mp4
    ª       004. Incident Response Plan.Ar(1).mp4
    ª       005. Incident Response Exercises, Recovery And Ret(1).mp4
    ª       006. Incident Identification Part 1.Ar(1).mp4
    ª       007. Incident Identification Part 2.Ar(1).mp4
    ª       008. Mitigation Controls.Ar(1).mp4
    ª       
    +---Chapter 37  Part 18 - Digital Forensics
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Digital Forensics Documentation.Ar(1).mp4
    ª       003. Digital Forensics Evidence Acquisition P(1).mp4
    ª       004. Digital Forensics Evidence Acquisition P(1).mp4
    ª       
    +---Chapter 38  Part 19 - Risk Management Processes and Concepts
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Risk Management Process.Ar(1).mp4
    ª       003. Risk Controls.Ar(1).mp4
    ª       004. Pop Quiz.Ar(1).mp4
    ª       005. Business Impact Analysis.Ar(1).mp4
    ª       
    +---Chapter 39  Part 20 - Implement Cyber Security Resilience
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Cyber Security Resilient Strategies.Ar(1).mp4
    ª       003. Implementing Redundancy.Ar(1).mp4
    ª       004. Backup Strategies.Ar(1).mp4
    ª       005. Backup Storage.Ar(1).mp4
    ª       006. Defense In Depth.Ar(1).mp4
    ª       
    +---Chapter 4  Part 3 - Explain Cryptographic Solutions
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Introduction To Cryptography And Hashing(1)(1).mp4
    ª       003. Encryption.Ar(1).mp4
    ª       004. Cryptographic Modes Of Operation.Ar(1).mp4
    ª       005. Demo - Calculating Hash Values With Powe(1).mp4
    ª       006. Certificates, Pkis, Ras, And Csrs.Ar(1).mp4
    ª       007. Digital Certificates.Ar(1).mp4
    ª       008. Key Management.mp4
    ª       009. Certificate Management.Ar(1).mp4
    ª       010. Certificate Formats & Openssl.Ar(1).mp4
    ª       011. Demo - Digital Certificates.Ar(1).mp4
    ª       012. Longevity, Salting & Key Stretching.Ar(1).mp4
    ª       013. Homomorphic Encryption, Blockchain, and .mp4
    ª       8.srt-ar-translation.srt
    ª       
    +---Chapter 40  Part 21 - Implement Physical Security
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Physical Host Security Controls.Ar(1).mp4
    ª       003. Physical Host Security Controls Part 1.A(1).mp4
    ª       004. Physical Host Security Host Controls Par(1).mp4
    ª       
    +---Chapter 5  Part 4 - Implement Identity and Access Management
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Identity Access Management.Ar(1).mp4
    ª       003. Authentication Factors, Design & Attribu(1).mp4
    ª       004. Biometric Authentication.Ar(1).mp4
    ª       005. Password Concepts.Ar(1).mp4
    ª       006. Demo - Account Password Policy.Ar(1).mp4
    ª       007. Authorization Solutions - Part 1.Ar(1).mp4
    ª       008. Authorization Solutions - Part 2.Ar(1).mp4
    ª       009. Account Attributes And Access Policies.A(1).mp4
    ª       010. Local, Network, And Remote Authenticatio(1).mp4
    ª       011. Kerberos Authentication & Authorization.(1).mp4
    ª       
    +---Chapter 6  Part 5 - Secure Enterprise Network Architecture
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Secure Network Designs.Ar(1).mp4
    ª       003. Network Segmentation, Topology & Dmzs.Ar(1).mp4
    ª       004. Routing And Switching Protocols.Ar(1).mp4
    ª       005. Secure Switching And Routing.Ar(1).mp4
    ª       006. Firewalls.Ar(1).mp4
    ª       007. Firewall Implementation.Ar(1).mp4
    ª       008. Demo - Windows 10 Firewall Configuration(1)(1).mp4
    ª       009. Demo - Creating An Outbound Rule.Ar(1).mp4
    ª       010. Next-Generation Firewalls & Hbids.Ar(1).mp4
    ª       011. Remote Access Architecture Part 1.Ar(1).mp4
    ª       012. Remote Access Architecture Part 2.Ar(1).mp4
    ª       
    +---Chapter 7  Part 6 - Secure Cloud Network Architecture
    ª       001. Section Preview.Ar(1)(1).mp4
    ª       002. Cloud Deployment Models.Ar(1).mp4
    ª       003. Cloud Security Solutions - Part 1.Ar(1).mp4
    ª       004. Cloud Security Solutions - Part 2.Ar(1).mp4
    ª       005. Infrastructure As Code Concepts.Ar(1).mp4
    ª       006. Zero Trust.Ar(1).mp4
    ª       007. Embedded Systems.Ar(1).mp4
    ª       008. Industrial Control Systems & Internet Of(1).mp4
    ª       
    +---Chapter 8  Part 7 - Explain Resiliency and Site Security Concepts
    ª       001. Section Preview.Ar(1).mp4
    ª       002. Backup Strategies,Ar(1).mp4
    ª       003. Backup Storage.Ar(1).mp4
    ª       004. Cyber Security Resilience.Ar(1).mp4
    ª       005. Implementing Redundancy Strategies.Ar(1).mp4
    ª       006. Diversity And Defense In Depth.Ar(1).mp4
    ª       007. Physical Security Controls - Part 1.Ar(1).mp4
    ª       008. Physical Security Controls - Part 2.Ar(1).mp4
    ª       009. Physical Host Security Controls.Ar(1).mp4
    ª       
    +---Chapter 9  Part 8 - Explain Vulnerability Management
            001. Section Preview.Ar(1)(1).mp4
            002. Vulnerability Discovery.Ar(1).mp4
            003. Weak Host And Network Configurations.Ar(1).mp4
            004. Evaluation Scope.Ar(1).mp4
            005. Overflows, Resource Exhaustion, Memory Leaks .mp4
            006. Cross-Site Scripting Attack.Ar(1).mp4
            007. Standard Query Language Injection Attack(1)(1).mp4
            008. Sideloading, Rooting & Jailbreaking.Ar(1).mp4
            009. Threat Research Sources.Ar(1).mp4
            010. Threat Intelligence Providers.Ar(1).mp4
            011. Threat Data Feeds & Ai.Ar(1).mp4
            012. Vulnerability Response & Remediation.Ar(1).mp4

Download​

Free download to users PRIV8

Paswword​

htdark.com
Back
Top