Magnetic link has been copied to the cutting board

Name CompTIA Security+ SY0-701 Certification

File Type video

Size 700.78MB

UpdateDate 2025-3-13

hash *****A8A34073779E81CB4DCCF5E47EF29971FC

Hot 3

Files Chapter 01 General Security Concepts/004. 1.2 - Summarize fundamental security concepts.mp4 | 53.81MB Chapter 01 General Security Concepts/001. How to Use the Video Course.mp4 | 2.05MB Chapter 01 General Security Concepts/002. Introduction to CompTIA Security Plus+ Certification Exam Objectives EXAM NUMBER SY0-701 video course.en.srt | 2.85KB Chapter 01 General Security Concepts/002. Introduction to CompTIA Security Plus+ Certification Exam Objectives EXAM NUMBER SY0-701 video course.mp4 | 5.24MB Chapter 01 General Security Concepts/003. 1.1 - Compare and contrast various types of security controls.en.srt | 6.03KB Chapter 01 General Security Concepts/003. 1.1 - Compare and contrast various types of security controls.mp4 | 10.32MB Chapter 01 General Security Concepts/004. 1.2 - Summarize fundamental security concepts.en.srt | 32.30KB Chapter 01 General Security Concepts/001. How to Use the Video Course.en.srt | 1.06KB Chapter 01 General Security Concepts/005. 1.3 - Explain the importance of change management processes and the impact to security.en.srt | 13.84KB Chapter 01 General Security Concepts/005. 1.3 - Explain the importance of change management processes and the impact to security.mp4 | 21.43MB Chapter 01 General Security Concepts/006. 1.4 - Explain the importance of using appropriate cryptographic solutions.en.srt | 33.31KB Chapter 01 General Security Concepts/006. 1.4 - Explain the importance of using appropriate cryptographic solutions.mp4 | 46.31MB Chapter 02 Threats, Vulnerabilities, and Mitigations/001. 2.1 - Compare and contrast common threat actors and motivations.en.srt | 7.97KB Chapter 02 Threats, Vulnerabilities, and Mitigations/001. 2.1 - Compare and contrast common threat actors and motivations.mp4 | 12.15MB Chapter 02 Threats, Vulnerabilities, and Mitigations/002. 2.2- Explain common threat vectors and attack surfaces.en.srt | 16.39KB Chapter 02 Threats, Vulnerabilities, and Mitigations/002. 2.2- Explain common threat vectors and attack surfaces.mp4 | 22.14MB Chapter 02 Threats, Vulnerabilities, and Mitigations/003. 2.3 - Explain various types of vulnerabilities.en.srt | 23.25KB Chapter 02 Threats, Vulnerabilities, and Mitigations/003. 2.3 - Explain various types of vulnerabilities.mp4 | 37.21MB Chapter 02 Threats, Vulnerabilities, and Mitigations/004. 2.4 - Given a scenario, analyze indicators of malicious activity Part 1.en.srt | 12.19KB Chapter 02 Threats, Vulnerabilities, and Mitigations/004. 2.4 - Given a scenario, analyze indicators of malicious activity Part 1.mp4 | 21.30MB Chapter 02 Threats, Vulnerabilities, and Mitigations/005. 2.4 - Given a scenario, analyze indicators of malicious activity. Part 2.en.srt | 18.58KB Chapter 02 Threats, Vulnerabilities, and Mitigations/005. 2.4 - Given a scenario, analyze indicators of malicious activity. Part 2.mp4 | 31.86MB Chapter 02 Threats, Vulnerabilities, and Mitigations/006. 2.5-Explain the purpose of mitigation techniques used to secure the enterprise.en.srt | 12.46KB Chapter 02 Threats, Vulnerabilities, and Mitigations/006. 2.5-Explain the purpose of mitigation techniques used to secure the enterprise.mp4 | 23.93MB Chapter 03 Security Architecture/001. 3.1 - Compare and contrast security implications of different architecture models.en.srt | 13.69KB Chapter 03 Security Architecture/001. 3.1 - Compare and contrast security implications of different architecture models.mp4 | 29.32MB Chapter 03 Security Architecture/002. 3.2 - Given a scenario, apply security principles to secure enterprise infrastructure.en.srt | 11.40KB Chapter 03 Security Architecture/002. 3.2 - Given a scenario, apply security principles to secure enterprise infrastructure.mp4 | 23.95MB Chapter 03 Security Architecture/003. 3.3 - Compare and contrast concepts and strategies to protect data.en.srt | 8.99KB Chapter 03 Security Architecture/003. 3.3 - Compare and contrast concepts and strategies to protect data.mp4 | 17.26MB Chapter 03 Security Architecture/004. 3.4 - Explain the importance of resilience and recovery in security architecture.en.srt | 10.99KB Chapter 03 Security Architecture/004. 3.4 - Explain the importance of resilience and recovery in security architecture.mp4 | 23.55MB Chapter 04 Security Operations/001. 4.1 - Given a scenario, apply common security techniques to computing resources.en.srt | 13.57KB Chapter 04 Security Operations/001. 4.1 - Given a scenario, apply common security techniques to computing resources.mp4 | 27.52MB Chapter 04 Security Operations/002. 4.2 - Explain the security implications of proper hardware, software, and data asset management.en.srt | 8.83KB Chapter 04 Security Operations/002. 4.2 - Explain the security implications of proper hardware, software, and data asset management.mp4 | 16.38MB Chapter 04 Security Operations/003. 4.3 - Explain various activities associated with vulnerability management.en.srt | 14.86KB Chapter 04 Security Operations/003. 4.3 - Explain various activities associated with vulnerability management.mp4 | 28.75MB Chapter 04 Security Operations/004. 4.4 - Explain security alerting and monitoring concepts and tools.en.srt | 6.51KB Chapter 04 Security Operations/004. 4.4 - Explain security alerting and monitoring concepts and tools.mp4 | 14.02MB Chapter 04 Security Operations/005. 4.5 - Given a scenario, modify enterprise capabilities to enhance security.en.srt | 17.25KB Chapter 04 Security Operations/005. 4.5 - Given a scenario, modify enterprise capabilities to enhance security.mp4 | 34.29MB Chapter 04 Security Operations/006. 4.6 - Given a scenario, implement and maintain identity and access management - Part 1.en.srt | 10.11KB Chapter 04 Security Operations/006. 4.6 - Given a scenario, implement and maintain identity and access management - Part 1.mp4 | 19.97MB Chapter 04 Security Operations/007. 4.6 - Given a scenario, implement and maintain identity and access management - Part 2.en.srt | 9.82KB Chapter 04 Security Operations/007. 4.6 - Given a scenario, implement and maintain identity and access management - Part 2.mp4 | 19.60MB Chapter 04 Security Operations/008. 4.7 - Explain the importance of automation and orchestration related to secure operations.en.srt | 5.49KB Chapter 04 Security Operations/008. 4.7 - Explain the importance of automation and orchestration related to secure operations.mp4 | 12.22MB Chapter 04 Security Operations/009. 4.8 - Explain appropriate incident response activities.en.srt | 11.92KB Chapter 04 Security Operations/009. 4.8 - Explain appropriate incident response activities.mp4 | 22.40MB Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.en.srt | 8.35KB Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.mp4 | 16.97MB Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.en.srt | 11.88KB Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.mp4 | 23.44MB Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.en.srt | 11.53KB Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.mp4 | 24.04MB Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.en.srt | 6.09KB Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.mp4 | 12.86MB Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.en.srt | 6.71KB Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.mp4 | 12.91MB Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.en.srt | 5.57KB Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.mp4 | 11.25MB Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.en.srt | 11.78KB Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.mp4 | 21.97MB

Recommend

Magnetic link has been copied to the cutting board