Magnetic link has been copied to the cutting board

Name [ITProTV] CompTIA CASP+ (CAS-004)

File Type video

Size 8.86GB

UpdateDate 2024-6-27

hash *****4F07FE28179C744CCF730B487C571989C0

Hot 31

Files 1 - Security Architecture/1 - 1 - Overview.mp4 | 32.34MB 1 - Security Architecture/1 - 10 - Baselines & Templates & Software Assurance.mp4 | 127.13MB 1 - Security Architecture/1 - 11 - Integrating Enterprise Applications.mp4 | 55.14MB 1 - Security Architecture/1 - 12 - Security in the Development Lifecycle.mp4 | 125.55MB 1 - Security Architecture/1 - 13 - Securing Enterprise Architecture.mp4 | 133.77MB 1 - Security Architecture/1 - 14 - Authentication & Authorization - Discussion.mp4 | 125.70MB 1 - Security Architecture/1 - 15 - Authentication & Authorization - Scenarios.mp4 | 104.99MB 1 - Security Architecture/1 - 16 - Secure Cloud & Virtualization.mp4 | 125.17MB 1 - Security Architecture/1 - 17 - Cryptography & PKI.mp4 | 125.53MB 1 - Security Architecture/1 - 18 - Impact of Emerging Technologies.mp4 | 146.52MB 1 - Security Architecture/1 - 19 - Security Architecture - Key Points.mp4 | 72.96MB 1 - Security Architecture/1 - 2 - Services - Discussion.mp4 | 133.99MB 1 - Security Architecture/1 - 3 - Segmentation - Discussion.mp4 | 111.62MB 1 - Security Architecture/1 - 4 - Services & Segmentation - Scenarios.mp4 | 135.86MB 1 - Security Architecture/1 - 5 - Deperimeterization_Zero Trust.mp4 | 110.79MB 1 - Security Architecture/1 - 6 - Merging of Networks.mp4 | 112.74MB 1 - Security Architecture/1 - 7 - Software-defined Networking (SDN).mp4 | 101.03MB 1 - Security Architecture/1 - 8 - Infrastructure Design - Discussion.mp4 | 132.86MB 1 - Security Architecture/1 - 9 - Infrastructure Design - Scenarios.mp4 | 111.65MB 2 - Security Operations/2 - 1 - Perform Threat Management.mp4 | 131.76MB 2 - Security Operations/2 - 10 - Forensic Concepts.mp4 | 114.35MB 2 - Security Operations/2 - 11 - File Carving & Binary Analysis.mp4 | 146.89MB 2 - Security Operations/2 - 12 - Analysis Tools.mp4 | 151.76MB 2 - Security Operations/2 - 13 - Live Collection Tools.mp4 | 133.16MB 2 - Security Operations/2 - 14 - Security Operations - Key Points.mp4 | 77.92MB 2 - Security Operations/2 - 2 - Indicators of Compromise & Response.mp4 | 147.80MB 2 - Security Operations/2 - 3 - Vulnerability Management Activities.mp4 | 125.24MB 2 - Security Operations/2 - 4 - Vulnerability Assessment - Methods & Tools.mp4 | 146.09MB 2 - Security Operations/2 - 5 - Analyze Vulnerabilities - Vulnerabilities.mp4 | 145.08MB 2 - Security Operations/2 - 6 - Analyze Vulnerabilities - Vulnerable Systems.mp4 | 131.71MB 2 - Security Operations/2 - 7 - Analyze Vulnerabilities - Attacks.mp4 | 145.77MB 2 - Security Operations/2 - 8 - Use Processes to Reduce Risk.mp4 | 135.91MB 2 - Security Operations/2 - 9 - Triage & Incident Response.mp4 | 127.71MB 3 - Security Engineering and Cryptography/3 - 1 - Managed Configurations.mp4 | 156.51MB 3 - Security Engineering and Cryptography/3 - 10 - Security Considerations - ICS-SCADA.mp4 | 165.69MB 3 - Security Engineering and Cryptography/3 - 11 - Security Considerations - Protocols.mp4 | 173.22MB 3 - Security Engineering and Cryptography/3 - 12 - Security Considerations - Sectors.mp4 | 59.89MB 3 - Security Engineering and Cryptography/3 - 13 - Cloud Technology - Basics.mp4 | 180.28MB 3 - Security Engineering and Cryptography/3 - 14 - Cloud Technology - Advanced.mp4 | 168.48MB 3 - Security Engineering and Cryptography/3 - 15 - PKI - Basics.mp4 | 164.58MB 3 - Security Engineering and Cryptography/3 - 16 - PKI - Advanced.mp4 | 162.47MB 3 - Security Engineering and Cryptography/3 - 17 - Hashing & Symmetric Algorithms.mp4 | 177.08MB 3 - Security Engineering and Cryptography/3 - 18 - Asymmetric Algorithms & Protocols.mp4 | 180.27MB 3 - Security Engineering and Cryptography/3 - 19 - Troubleshoot Cryptography - Keys.mp4 | 86.88MB 3 - Security Engineering and Cryptography/3 - 2 - Deployment Scenarios.mp4 | 75.24MB 3 - Security Engineering and Cryptography/3 - 20 - Security Engineering & Cryptography - Key Points.mp4 | 63.13MB 3 - Security Engineering and Cryptography/3 - 21 - Troubleshoot Cryptography - Misconfigurations.mp4 | 127.01MB 3 - Security Engineering and Cryptography/3 - 3 - Security Considerations.mp4 | 155.56MB 3 - Security Engineering and Cryptography/3 - 4 - Hardening Techniques.mp4 | 145.69MB 3 - Security Engineering and Cryptography/3 - 5 - Processes.mp4 | 173.68MB 3 - Security Engineering and Cryptography/3 - 6 - Mandatory Access Control.mp4 | 122.12MB 3 - Security Engineering and Cryptography/3 - 7 - Trustworthy Computing.mp4 | 183.27MB 3 - Security Engineering and Cryptography/3 - 8 - Compensating Controls.mp4 | 58.44MB 3 - Security Engineering and Cryptography/3 - 9 - Security Considerations - Embedded.mp4 | 128.18MB 4 - Governance, Risk, and Compliance/4 - 1 - Risk Assessment.mp4 | 194.19MB 4 - Governance, Risk, and Compliance/4 - 10 - Data Considerations.mp4 | 139.71MB 4 - Governance, Risk, and Compliance/4 - 11 - Regulations Accreditations & Standards.mp4 | 144.08MB 4 - Governance, Risk, and Compliance/4 - 12 - Legal Considerations.mp4 | 88.59MB 4 - Governance, Risk, and Compliance/4 - 13 - Contract and Agreement Types.mp4 | 74.01MB 4 - Governance, Risk, and Compliance/4 - 14 - Business Impact Analysis (BIA).mp4 | 116.95MB 4 - Governance, Risk, and Compliance/4 - 15 - Privacy Impact Assessment.mp4 | 52.61MB 4 - Governance, Risk, and Compliance/4 - 16 - Disaster Recovery & Business Continuity Planning.mp4 | 78.05MB 4 - Governance, Risk, and Compliance/4 - 17 - Incident Response Plan.mp4 | 87.57MB 4 - Governance, Risk, and Compliance/4 - 18 - Testing Plans.mp4 | 138.37MB 4 - Governance, Risk, and Compliance/4 - 19 - Governance, Risk & Compliance - Key Points.mp4 | 82.29MB 4 - Governance, Risk, and Compliance/4 - 2 - Risk Handling Techniques.mp4 | 138.82MB 4 - Governance, Risk, and Compliance/4 - 3 - Risk Types.mp4 | 127.39MB 4 - Governance, Risk, and Compliance/4 - 4 - Risk Management Life Cycle.mp4 | 124.77MB 4 - Governance, Risk, and Compliance/4 - 5 - Risk Tracking.mp4 | 155.28MB 4 - Governance, Risk, and Compliance/4 - 6 - Policies and Security Practices.mp4 | 126.35MB 4 - Governance, Risk, and Compliance/4 - 7 - Shared Responsibility Model - Cloud.mp4 | 77.64MB 4 - Governance, Risk, and Compliance/4 - 8 - Performing Vendor Assessments.mp4 | 121.87MB 4 - Governance, Risk, and Compliance/4 - 9 - Technical Considerations.mp4 | 102.57MB CASP004 ADISH/Authentication & Authorization – Scenarios - 1-5-2.pptx | 1.09MB CASP004 ADISH/Cloud Shared Responsibility Model.jpg | 83.99KB CASP004 ADISH/CompTIA CASP+ 004 Glossary.txt | 47.00KB CASP004 ADISH/CompTIA CASP+ Acronym List.txt | 11.39KB CASP004 ADISH/CompTIA-SecurityPlus-Acronyms.pdf | 52.06KB CASP004 ADISH/Domain 3 - Crypto Definitions.docx | 74.22KB CASP004 ADISH/IPSEC Primer.txt | 11.56KB CASP004 ADISH/Infrastructure Design Scenarios – 1-2-2.pptx | 1.09MB CASP004 ADISH/PKI - Certificate Authorities.jpg | 110.05KB CASP004 ADISH/Risk Management Life Cycle – 4-1-4.pptx | 1.70MB CASP004 ADISH/Risk Register.xlsx | 12.95KB CASP004 ADISH/Services & Segmentation Scenarios – 1-1-3.pptx | 1.10MB

Recommend

Magnetic link has been copied to the cutting board