Torrent details for "Security Comptia Security Plus Sy0 701 Certification Prep DevCou…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
4.0 GB
Info Hash:
9908439A4F45C2393E1C2BCDF1E1875CD7E70A78
Added By:
Added:
Dec. 14, 2023, 5:23 p.m.
Stats:
|
(Last updated: May 7, 2025, 2:48 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 182 bytes |
| 1 - Introduction to security.mp4 | 27.9 MB |
| 53 - Understanding IDSs and IPSs.mp4 | 36.2 MB |
| 54 - Detection Methods.mp4 | 17.2 MB |
| 55 - Honeypots.mp4 | 19.1 MB |
| 56 - Using VPNs for Remote Access.mp4 | 46.2 MB |
| 57 - VPN Tunnel Protocols.mp4 | 20.6 MB |
| 58 - SitetoSite VPNs.mp4 | 13.6 MB |
| 59 - Understanding Threat Actors.mp4 | 56.2 MB |
| 60 - Viruses.mp4 | 9.0 MB |
| 61 - Logic Bombs.mp4 | 9.5 MB |
| 62 - Trojans.mp4 | 16.0 MB |
| 63 - Ransomware.mp4 | 13.6 MB |
| 64 - Spyware.mp4 | 8.8 MB |
| 65 - Bots and Botnets.mp4 | 13.1 MB |
| 66 - Unified Threat ManagementUTM.mp4 | 23.7 MB |
| 67 - Disable SSID Broadcasting or Not.mp4 | 4.2 MB |
| 68 - Enable MAC Filtering.mp4 | 9.1 MB |
| 69 - Disassociation Attacks.mp4 | 8.5 MB |
| 70 - WPS and WPS Attacks.mp4 | 7.5 MB |
| 71 - Rogue AP.mp4 | 8.5 MB |
| 72 - Evil Twin.mp4 | 8.0 MB |
| 73 - Jamming Attacks.mp4 | 16.9 MB |
| 74 - Bluetooth Attacks.mp4 | 9.8 MB |
| 75 - RFID Attacks.mp4 | 8.7 MB |
| 76 - Wireless Replay Attacks.mp4 | 5.7 MB |
| 77 - Network Attacks.mp4 | 15.6 MB |
| 78 - SYN Flood Attack.mp4 | 12.2 MB |
| 79 - MAC Flood Attacks.mp4 | 11.7 MB |
| 80 - ManintheMiddle Attacks.mp4 | 6.7 MB |
| 81 - ARP Poisoning Attacks.mp4 | 19.3 MB |
| 82 - DNS Attacks.mp4 | 32.8 MB |
| 83 - Brute Force Attacks.mp4 | 18.8 MB |
| 84 - Password Hashes.mp4 | 22.7 MB |
| 85 - Birthday Attacks.mp4 | 27.0 MB |
| 86 - Replay Attacks.mp4 | 13.3 MB |
| 87 - Hijacking and Related Attacks.mp4 | 21.7 MB |
| 88 - Driver Manipulation.mp4 | 11.2 MB |
| 89 - ZeroDay Attacks.mp4 | 15.3 MB |
| 90 - Code Reuse and SDKs.mp4 | 16.8 MB |
| 91 - Code Quality and Testing.mp4 | 11.3 MB |
| 92 - Development LifeCycle Models.mp4 | 14.4 MB |
| 93 - Secure DevOps.mp4 | 12.5 MB |
| 94 - Version Control and Change Management.mp4 | 10.0 MB |
| 95 - Provisioning and Deprovisioning.mp4 | 7.3 MB |
| 100 - CrossSite Scripting.mp4 | 25.1 MB |
| 96 - Web Servers.mp4 | 5.4 MB |
| 97 - SQL Injection Attacks.mp4 | 19.6 MB |
| 98 - Protecting Against SQL Injection Attacks.mp4 | 11.1 MB |
| 99 - DLL Injection.mp4 | 11.8 MB |
| 10 - Introducing Basic Risk Concepts.mp4 | 11.1 MB |
| 2 - What is Security.mp4 | 8.5 MB |
| 3 - PrivacyIntegrityAvailability.mp4 | 15.1 MB |
| 4 - Encryption and Access Control.mp4 | 11.8 MB |
| 5 - 3 A Rule Authentication Authorization and Accounting.mp4 | 12.1 MB |
| 6 - Threat.mp4 | 12.6 MB |
| 7 - What is a Hacker.mp4 | 17.7 MB |
| 8 - What is Attack What are the Stages.mp4 | 12.0 MB |
| 9 - Single Point Of Failure SPOF.mp4 | 10.4 MB |
| 101 - Social Engineering.mp4 | 20.5 MB |
| 102 - Shoulder Surfing.mp4 | 4.4 MB |
| 103 - Tricking Users with Hoaxes.mp4 | 5.0 MB |
| 104 - Tailgating and Mantraps.mp4 | 5.7 MB |
| 105 - Dumpster Diving.mp4 | 7.6 MB |
| 106 - Watering Hole Attacks.mp4 | 5.6 MB |
| 107 - Spam.mp4 | 9.5 MB |
| 108 - Phishing.mp4 | 59.8 MB |
| 109 - Whaling.mp4 | 13.1 MB |
| 110 - Vishing.mp4 | 14.8 MB |
| 111 - Buffer Overflow Attacks.mp4 | 17.2 MB |
| 112 - Pointer Dereference.mp4 | 8.5 MB |
| 113 - Compiled Versus Runtime Code.mp4 | 5.4 MB |
| 114 - Proper Input Validation.mp4 | 16.6 MB |
| 115 - Side Input Validation.mp4 | 13.3 MB |
| 116 - Avoiding Race Conditions.mp4 | 9.8 MB |
| 117 - Proper Error Handling.mp4 | 9.1 MB |
| 118 - Cryptographic Techniques.mp4 | 7.0 MB |
| 119 - Protecting Systems from Malware.mp4 | 8.3 MB |
| 120 - Antivirus and AntiMalware Software.mp4 | 44.3 MB |
| 121 - Advanced Malware Tools.mp4 | 13.3 MB |
| 122 - Educating Users.mp4 | 7.5 MB |
| 123 - Implementing Secure Systems.mp4 | 17.9 MB |
| 124 - Operating systems.mp4 | 12.7 MB |
| 125 - Secure Operating System Configurations.mp4 | 36.4 MB |
| 126 - Resiliency and Automation Strategies.mp4 | 26.5 MB |
| 127 - Change Management Policy.mp4 | 64.8 MB |
| 128 - Secure Staging and Deployment.mp4 | 22.8 MB |
| 129 - Peripherals.mp4 | 20.7 MB |
| 130 - EMI and EMP.mp4 | 34.5 MB |
| 131 - Hardware Security Module.mp4 | 8.3 MB |
| 132 - Cloud Deployment Models.mp4 | 19.5 MB |
| 133 - Cloud Services.mp4 | 67.3 MB |
| 134 - Security Responsibilities with Cloud Models.mp4 | 11.6 MB |
| 135 - Advanced Cloud Services.mp4 | 16.6 MB |
| 136 - Deploying Mobile Devices Securely.mp4 | 7.1 MB |
| 137 - Deployment Models.mp4 | 44.3 MB |
| 138 - Mobile Device Management.mp4 | 39.2 MB |
| 139 - Unauthorized Connections.mp4 | 15.3 MB |
| 140 - Hardware Control.mp4 | 7.8 MB |
| 141 - Protecting Data.mp4 | 44.6 MB |
| 142 - Data Loss Prevention.mp4 | 17.1 MB |
| 143 - Database Concepts.mp4 | 9.0 MB |
| 144 - Normalization.mp4 | 13.7 MB |
| 145 - SQL Queries.mp4 | 7.8 MB |
| 146 - Database Security.mp4 | 3.0 MB |
| 147 - Understanding Risk Management.mp4 | 8.9 MB |
| 148 - Risk Management.mp4 | 8.1 MB |
| 149 - Threats and Threat Assessments.mp4 | 13.7 MB |
| 150 - Vulnerabilities.mp4 | 5.8 MB |
| 151 - Risk Assessment.mp4 | 40.1 MB |
| 152 - Risk Registers.mp4 | 19.0 MB |
| 153 - Finding and Evaluating Cloud Vendors.mp4 | 39.2 MB |
| 154 - Job Notification.mp4 | 10.8 MB |
| 155 - Conducting Evaluations.mp4 | 13.1 MB |
| 156 - Negotiating Contracts and Billing.mp4 | 31.6 MB |
| 157 - Professional Services.mp4 | 14.5 MB |
| 158 - Chargebacks.mp4 | 42.3 MB |
| 159 - Laws Regulations And Safety Standards.mp4 | 11.4 MB |
| 160 - Key Stakeholders.mp4 | 13.8 MB |
| 161 - Using Baselines.mp4 | 9.8 MB |
| 162 - Conducting Feasibility Study.mp4 | 9.3 MB |
| 163 - Making GAP Analysis.mp4 | 9.7 MB |
| 164 - Using Reporting.mp4 | 5.0 MB |
| 165 - Understanding Benchmarks.mp4 | 11.6 MB |
| 11 - What is Identity Management.mp4 | 8.4 MB |
| 12 - KERBEROS NTLMLDAP.mp4 | 21.2 MB |
| 13 - Single SignOn SSO.mp4 | 27.6 MB |
| 14 - Smart Cards.mp4 | 8.5 MB |
| 15 - Tokens or Key Fobs.mp4 | 14.5 MB |
| 16 - Biometric Methods.mp4 | 69.4 MB |
| 17 - DualFactor and Multifactor Authentication.mp4 | 4.0 MB |
| 18 - PAP CHAP MSCHAP.mp4 | 8.3 MB |
| 19 - RADIUS.mp4 | 14.8 MB |
| 166 - Checking for Vulnerabilities.mp4 | 6.3 MB |
| 167 - Password Crackers.mp4 | 6.4 MB |
| 168 - Network Scanners.mp4 | 21.0 MB |
| 169 - Wireless Scanners Cracker.mp4 | 32.0 MB |
| 170 - Banner Grabbing.mp4 | 4.3 MB |
| 171 - Vulnerability Scanning.mp4 | 68.5 MB |
| 172 - Penetration Tests.mp4 | 8.9 MB |
| 173 - Passive Active Reconnaissance.mp4 | 6.0 MB |
| 174 - Initial Exploitation.mp4 | 11.6 MB |
| 175 - White Gray and Black Box Testing.mp4 | 9.0 MB |
| 176 - Intrusive and NonIntrusive Testing.mp4 | 3.9 MB |
| 177 - Passive Versus Active Tools.mp4 | 70.0 MB |
| 178 - Comparing Physical Security Controls.mp4 | 10.3 MB |
| 179 - Comparing Door Lock Types.mp4 | 16.9 MB |
| 180 - Preventing Tailgating with Mantraps.mp4 | 6.3 MB |
| 181 - Increasing Physical Security with Guards.mp4 | 27.0 MB |
| 182 - Using Hardware Locks.mp4 | 9.4 MB |
| 183 - Asset Management.mp4 | 7.6 MB |
| 184 - Implementing Environmental Controls.mp4 | 57.2 MB |
| 185 - Single Point of Failure.mp4 | 5.4 MB |
| 186 - Disk Redundancies.mp4 | 15.8 MB |
| 187 - Server Redundancy and High Availability.mp4 | 50.2 MB |
| 188 - Backup.mp4 | 60.6 MB |
| 189 - Comparing Business Continuity Elements.mp4 | 26.2 MB |
| 190 - Impact.mp4 | 10.5 MB |
| 191 - Recovery Time Objective.mp4 | 15.1 MB |
| 192 - Recovery Sites.mp4 | 17.1 MB |
| 193 - Disaster Recovery.mp4 | 29.3 MB |
| 194 - Monitoring Logs for Event Anomalies.mp4 | 52.5 MB |
| 195 - OtherLogsSIEM.mp4 | 21.2 MB |
| 196 - Continuous Monitoring.mp4 | 16.3 MB |
| 197 - Understanding Control Types.mp4 | 29.8 MB |
| 198 - Control Goals.mp4 | 42.5 MB |
| 199 - Introducing Cryptography Concepts.mp4 | 10.3 MB |
| 200 - Hashing.mp4 | 13.0 MB |
| 201 - MD5.mp4 | 2.6 MB |
| 202 - SHA.mp4 | 8.0 MB |
| 203 - HMAC.mp4 | 7.4 MB |
| 204 - Hashing Files.mp4 | 8.8 MB |
| 205 - Digital Signatures Certificates and Nonrepudiation.mp4 | 9.8 MB |
| 206 - Providing Confidentiality with Encryption.mp4 | 33.1 MB |
| 207 - Block Versus Stream Ciphers.mp4 | 14.8 MB |
| 208 - Symmetric Encryption.mp4 | 6.1 MB |
| 209 - Symmetric Encryption Methods.mp4 | 18.3 MB |
| 210 - Asymmetric Encryption.mp4 | 7.0 MB |
| 211 - Certificates.mp4 | 11.4 MB |
| 212 - Steganography And Obfuscation.mp4 | 10.1 MB |
| 213 - Using Cryptographic Protocols.mp4 | 5.6 MB |
| 214 - Cipher Suites.mp4 | 8.7 MB |
| 215 - Exploring PKI Components.mp4 | 53.9 MB |
| 216 - Comparing Certificate Types.mp4 | 14.5 MB |
| 217 - HTTPS Transport Encryption.mp4 | 14.7 MB |
| 218 - Exploring Security Policies.mp4 | 4.3 MB |
| 219 - Personnel Management Policies.mp4 | 35.7 MB |
| 220 - Background Check.mp4 | 14.9 MB |
| 221 - NDA.mp4 | 16.9 MB |
| 222 - Policy Violations and Adverse Actions.mp4 | 5.9 MB |
| 223 - Agreement Types.mp4 | 11.1 MB |
| 224 - PII and PHI.mp4 | 14.7 MB |
| 225 - Responding to Incidents.mp4 | 7.7 MB |
| 226 - Providing Training.mp4 | 18.3 MB |
| 227 - Troubleshooting Personnel Issues.mp4 | 7.6 MB |
| 228 - Incident ResponseEducation.mp4 | 17.5 MB |
| 20 - Create a User in comptia.mp4 | 6.1 MB |
| 21 - Managing Accounts 1.mp4 | 45.0 MB |
| 22 - Managing Accounts 2.mp4 | 41.6 MB |
| 23 - Passwords.mp4 | 22.8 MB |
| 24 - Password Policy.mp4 | 27.2 MB |
| 229 - Security CompTIA Security Plus SY0701 Certification Prep.html | 266 bytes |
| 25 - Comparing Access Control Models.mp4 | 7.9 MB |
| 26 - RoleBased Access Control.mp4 | 10.8 MB |
| 27 - Establishing Access with GroupBased Privileges.mp4 | 14.5 MB |
| 28 - Rule Based and Discretionary Access Control.mp4 | 17.5 MB |
| 29 - Mandatory Access Control.mp4 | 8.5 MB |
| 30 - What is Virtualization.mp4 | 15.6 MB |
| 31 - Virtualization Technologies.mp4 | 28.1 MB |
| 32 - Benefits of Virtualization.mp4 | 9.1 MB |
| 33 - Security Issues of Virtualization.mp4 | 17.8 MB |
| 34 - Basic Network Concepts.mp4 | 11.1 MB |
| 35 - Domain Name ServicesDNS.mp4 | 40.7 MB |
| 36 - What is the port How does it work.mp4 | 25.8 MB |
| 37 - What is the Network Address.mp4 | 12.7 MB |
| 38 - Combining the IP Address and the Port.mp4 | 16.7 MB |
| 39 - Switches.mp4 | 13.3 MB |
| 40 - Bridge.mp4 | 15.3 MB |
| 41 - Understanding NAT and PAT.mp4 | 11.3 MB |
| 42 - Network Separation.mp4 | 24.4 MB |
| 43 - Proxy Servers.mp4 | 7.3 MB |
| 44 - Types of Using Network Technologies 1.mp4 | 11.0 MB |
| 45 - Routers.mp4 | 20.0 MB |
| 46 - Types of Using Network Technologies 2.mp4 | 25.5 MB |
| 47 - Reviewing Basic Wireless Network Information.mp4 | 22.6 MB |
| 48 - Wireless Cryptographic Protocols.mp4 | 17.1 MB |
| 49 - Authentication Protocols for Wireless Networks.mp4 | 20.8 MB |
| 50 - Firewalls.mp4 | 18.3 MB |
| 51 - Network Access Control.mp4 | 8.2 MB |
| 52 - Implementing a Secure Network.mp4 | 35.6 MB |
| Bonus Resources.txt | 386 bytes |
Name
DL
Uploader
Size
S/L
Added
-
4.0 GB
[13
/
16]
2023-12-14
| Uploaded by FreeCourseWeb | Size 4.0 GB | Health [ 13 /16 ] | Added 2023-12-14 |
-
40.0 MB
[18
/
2]
2023-08-25
| Uploaded by indexFroggy | Size 40.0 MB | Health [ 18 /2 ] | Added 2023-08-25 |
-
291.7 MB
[5
/
1]
2023-10-25
| Uploaded by freecoursewb | Size 291.7 MB | Health [ 5 /1 ] | Added 2023-10-25 |
-
260.1 MB
[3
/
1]
2023-10-25
| Uploaded by freecoursewb | Size 260.1 MB | Health [ 3 /1 ] | Added 2023-10-25 |
-
614.6 MB
[2
/
0]
2023-10-23
| Uploaded by freecoursewb | Size 614.6 MB | Health [ 2 /0 ] | Added 2023-10-23 |
-
14.8 MB
[14
/
1]
2024-04-15
| Uploaded by indexFroggy | Size 14.8 MB | Health [ 14 /1 ] | Added 2024-04-15 |
-
140.7 MB
[13
/
5]
2023-06-02
| Uploaded by freecoursewb | Size 140.7 MB | Health [ 13 /5 ] | Added 2023-06-02 |
NOTE
SOURCE: Security Comptia Security Plus Sy0 701 Certification Prep DevCourseWeb
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


