本站已收录 番号和无损神作磁力链接/BT种子 

security-plus-sy0-701

种子简介

种子名称: security-plus-sy0-701
文件类型: 视频
文件数目: 262个文件
文件大小: 16.52 GB
收录时间: 2025-3-30 18:40
已经下载: 3
资源热度: 22
最近下载: 2025-4-30 03:41

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:b74a9a559457529c4db6d5961ad9e8f5996c76db&dn=security-plus-sy0-701 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

security-plus-sy0-701.torrent
  • 003-Exam Tips-5ixb.mp4112.22MB
  • 005-Fundamentals of Security-SAfU.mp4138.11MB
  • 006-Threats and Vulnerabilities-gC37.mp452.59MB
  • 007-Confidentiality OBJ 1 2-vvSD.mp442.45MB
  • 008-Integrity OBJ 1 2-rLHu.mp452.4MB
  • 009-Availability OBJ 1 2-TlGj.mp451.72MB
  • 010-Non repudiation OBJ 1 2-ODLu.mp454.76MB
  • 011-Authentication OBJ 1 2-fLYy.mp460.52MB
  • 012-Authorization OBJ 1 2-HsV5.mp428.56MB
  • 013-Accounting OBJ 1 2-DkUQ.mp430.72MB
  • 014-Security Control Categories OBJ 1 1-cPdj.mp446.66MB
  • 015-Security Control Types OBJ 1 1-9TEA.mp443.59MB
  • 016-Gap Analysis OBJ 1 1-WvYF.mp448.69MB
  • 017-Zero Trust OBJ 1 2-KgFk.mp468.64MB
  • 019-Threat Actors OBJ 1 2 2 1 2 2-0M5f.mp486.65MB
  • 020-Threat Actor Motivations OBJ 2 1-IM3t.mp453.98MB
  • 021-Threat Actor Attributes OBJ 2 1-QZO4.mp432.95MB
  • 022-Unskilled Attackers OBJ 2 1-AkOn.mp425.91MB
  • 023-Hacktivists OBJ 2 1-fH4Q.mp432.31MB
  • 024-Organized Crime OBJ 2 1-q3vd.mp457.14MB
  • 025-Nation state Actor OBJ 2 1-RjC4.mp485.8MB
  • 026-Insider Threats OBJ 2 1-rLxg.mp477.01MB
  • 027-Shadow IT OBJ 2 1-ngwC.mp466.36MB
  • 028-Threat Vectors and Attack Surfaces OBJ 2 2-aZdl.mp4100.13MB
  • 029-Outsmarting Threat Actors OBJ 1 2-uc37.mp479.58MB
  • 031-Physical Security OBJ 1 2 2 4-VC9N.mp479MB
  • 032-Fencing and Bollards OBJ 1 2-0Zq3.mp463.14MB
  • 033-Attacking with Brute Force OBJ 2 4-5ZF8.mp460.82MB
  • 034-Surveillance Systems OBJ 1 2-laaj.mp452.33MB
  • 035-Bypassing Surveillance Systems OBJ 2 4-iPoY.mp447.67MB
  • 036-Access Control Vestibules OBJ 1 2-6o82.mp466.37MB
  • 037-Door Locks OBJ 1 2-s8x2.mp4135.19MB
  • 038-Access Badge Cloning OBJ 2 4-12mq.mp472.51MB
  • 040-Social Engineering OBJ 2 2 5 6-ElCd.mp490.03MB
  • 041-Motivational Triggers OBJ 5 6-GZX1.mp4120.29MB
  • 042-Impersonation OBJ 2 2-KWqR.mp461.99MB
  • 043-Pretexting OBJ 2 2-v7Sh.mp472.87MB
  • 044-Phishing Attacks OBJ 2 2-BeUy.mp475.09MB
  • 045-Preventing Phishing Attacks OBJ 5 6-nRbI.mp466.67MB
  • 046-Conducting an Anti Phishing Campaign OBJ 5 6-C9uo.mp444.53MB
  • 047-Frauds and Scams OBJ 2 2-5MPx.mp463.07MB
  • 048-Influence Campaigns OBJ 2 2-ryMJ.mp448.54MB
  • 049-Other Social Engineering Attacks OBJ 2 2-Ri5g.mp478.42MB
  • 051-Malware OBJ 2 4-uUuP.mp4186.24MB
  • 052-Viruses OBJ 2 4-2TWY.mp459.87MB
  • 053-Worms OBJ 2 4-OhOA.mp426.08MB
  • 054-Trojans OBJ 2 4-sJxO.mp429.76MB
  • 055-Viruses and Trojans OBJ 2 4-mL1E.mp487.03MB
  • 056-Ransomware OBJ 2 4-dxwT.mp497.19MB
  • 057-Zombies and Botnets OBJ 2 4-cYu3.mp453.18MB
  • 058-Rootkits OBJ 2 4-VaZb.mp446.88MB
  • 059-Backdoors and Logic Bombs OBJ 2 4-L4Ok.mp459.77MB
  • 060-Keylogger OBJ 2 4-2JJE.mp456.53MB
  • 061-Spyware and Bloatware OBJ 2 4-97IL.mp439.32MB
  • 062-Malware Attack Techniques OBJ 2 4-M8OJ.mp441.69MB
  • 063-Indications of Malware Attacks OBJ 2 4-tAUq.mp470.5MB
  • 065-Data Protection OBJ 1 4 3 3 4 2 4 4 5 1-NccZ.mp470.49MB
  • 066-Data Classifications OBJ 3 3-Zatv.mp456.71MB
  • 067-Data Ownership OBJ 4 2 5 1-Vqyv.mp447.57MB
  • 068-Data States OBJ 3 3-wnAi.mp432.55MB
  • 069-Data Types OBJ 3 3 1 4-h0kk.mp436.05MB
  • 070-Data Sovereignty OBJ 3 3-SXy5.mp422.06MB
  • 071-Securing Data OBJ 3 3-lrL5.mp422.29MB
  • 072-Data Loss Prevention DLP OBJ 4 4-Lp3q.mp447.25MB
  • 073-Configuring a DLP OBJ 4 5-ExcD.mp478.47MB
  • 075-Cryptographic Solutions OBJ 1 4 2 3 2 4-WTgN.mp4257.17MB
  • 076-Symmetric vs Asymmetric OBJ 1 4-9mfI.mp473.87MB
  • 077-Symmetric Algorithms OBJ 1 4-JMlV.mp443.26MB
  • 078-Asymmetric Algorithms OBJ 1 4-FxAo.mp441.47MB
  • 079-Hashing OBJ 1 4-rzQp.mp488.46MB
  • 080-Increasing Hash Security OBJ 1 4-hkkz.mp457.24MB
  • 081-Public Key Infrastructure PKI OBJ 1 4-GnxL.mp439.39MB
  • 082-Digital Certificates OBJ 1 4-ZgWq.mp4108.4MB
  • 083-Exploring Digital Certificates OBJ 1 4-0qZJ.mp423.78MB
  • 084-Blockchain OBJ 1 4-O3HU.mp439.4MB
  • 085-Encryption Tools OBJ 1 4-JBjh.mp447.46MB
  • 086-Obfuscation OBJ 1 4-SktR.mp480.74MB
  • 087-Cryptographic Attacks OBJ 2 3 2 4-cU9N.mp4101.52MB
  • 089-Risk Management OBJ 5 2-tNJT.mp4100.84MB
  • 090-Risk Assessment Frequency OBJ 5 2-H4Z8.mp421.29MB
  • 091-Risk Identification OBJ 5 2-PrUc.mp442.73MB
  • 092-Risk Register OBJ 5 2-lS7L.mp461.82MB
  • 093-Qualitative Risk Analysis OBJ 5 2-pKyD.mp436.89MB
  • 094-Quantitative Risk Analysis OBJ 5 2-HOm9.mp421.24MB
  • 095-Risk Management Strategies OBJ 5 2-oR6O.mp446.72MB
  • 096-Risk Monitoring and Reporting OBJ 5 2-8sXH.mp428.85MB
  • 098-Third party Vendor Risks OBJ 2 2 2 3 5 3-6MfF.mp467.14MB
  • 099-Supply Chain Risks OBJ 2 3 5 3-fKIP.mp444.43MB
  • 100-Supply Chain Attacks OBJ 2 2 5 3-ldfD.mp476.66MB
  • 101-Vendor Assessment OBJ 5 3-KUyy.mp450.83MB
  • 102-Vendor Selection and Monitoring OBJ 5 3-13an.mp452.17MB
  • 103-Contracts and Agreements OBJ 5 3-H3MC.mp454.44MB
  • 105-Governance and Compliance OBJ 5 1 5 4-vIVb.mp4104.65MB
  • 106-Governance OBJ 5 1-1HRd.mp438.77MB
  • 107-Governance Structures OBJ 5 1-slRz.mp426.96MB
  • 108-Policies OBJ 5 1-QaRQ.mp431.9MB
  • 109-Standards OBJ 5 1-LF0D.mp433.8MB
  • 110-Procedures OBJ 5 1-haDx.mp430.73MB
  • 111-Governance Considerations OBJ 5 1-161T.mp445.32MB
  • 112-Compliance OBJ 5 4-DMHl.mp447.04MB
  • 113-Non compliance Consequences OBJ 5 4-lwdb.mp454.02MB
  • 115-Asset and Change Management OBJ 1 3 4 1 4 2-nxfk.mp4101.36MB
  • 116-Acquisition and Procurement OBJ 4 2-eb8J.mp456.54MB
  • 117-Mobile Asset Deployments OBJ 4 1-xU1A.mp446.25MB
  • 118-Asset Management OBJ 4 2-HV6k.mp457.29MB
  • 119-Asset Disposal and Decommissioning OBJ 4 2-ZHB6.mp465.41MB
  • 120-Change Management OBJ 1 3-Z8sa.mp470.45MB
  • 121-Change Management Processes OBJ 1 3-16y7.mp439.58MB
  • 122-Technical Implications of Changes OBJ 1 3-orO8.mp432.39MB
  • 123-Documenting Changes OBJ 1 3-cEdr.mp435.76MB
  • 125-Audits and Assessments OBJ 5 5-2XRk.mp4103.15MB
  • 126-Internal Audits and Assessments OBJ 5 5-2vQo.mp458.03MB
  • 127-Performing an Internal Assessment OBJ 5 5-Ss1H.mp436.59MB
  • 128-External Audits and Assessments OBJ 5 5-kvFM.mp452.34MB
  • 129-Performing an External Assessment OBJ 5 5-TTcP.mp434.07MB
  • 130-Penetration Testing OBJ 5 5-xVil.mp450.89MB
  • 131-Reconnaissance in Pentesting OBJ 5 5-KpsH.mp451.14MB
  • 132-Performing a Basic PenTest OBJ 5 5-XC9z.mp4154.02MB
  • 133-Attestation of Findings OBJ 5 5-taef.mp470.66MB
  • 135-Cyber Resilience and Redundancy OBJ 3 4-lDTn.mp469.94MB
  • 136-High Availability OBJ 3 4-rP1f.mp460.8MB
  • 137-Data Redundancy OBJ 3 4-R3Ss.mp442.86MB
  • 138-Configuring a RAID OBJ 3 4-cgV8.mp425.65MB
  • 139-Capacity Planning OBJ 3 4-hhtL.mp486.8MB
  • 140-Powering Data Centers OBJ 3 4-G3NZ.mp481.33MB
  • 141-Data Backups OBJ 3 4-uz7I.mp465.07MB
  • 142-Continuity of Operations Plan OBJ 3 4-SOdi.mp476.02MB
  • 143-Redundant Site Considerations OBJ 3 4-nHBW.mp4108.93MB
  • 144-Resilience and Recovery Testing OBJ 3 4-jqd2.mp466.13MB
  • 146-Security Architecture OBJ 3 1 4 1-9tTg.mp486.47MB
  • 147-On premise versus the Cloud OBJ 3 1-dAwA.mp4102.32MB
  • 148-Cloud Security OBJ 3 1 4 1-taKD.mp448.3MB
  • 149-Virtualization and Containerization OBJ 2 3 3 1-ref5.mp482.03MB
  • 150-Serverless OBJ 3 1-H2mX.mp436.82MB
  • 151-Microservices OBJ 3 1-KKcJ.mp440.35MB
  • 152-Network Infrastructure OBJ 3 1-P0xA.mp438.48MB
  • 153-Software Defined Network SDN OBJ 3 1-U92C.mp432.75MB
  • 154-Infrastructure as Code IaC OBJ 3 1-Ow87.mp433.97MB
  • 155-Centralized vs Decentralized Architectures OBJ 3 1-Kspl.mp433.77MB
  • 156-Internet of Things IoT OBJ 3 1 4 1-MVie.mp457.27MB
  • 157-ICS and SCADA OBJ 3 1 4 1-e4Cl.mp432.5MB
  • 158-Embedded Systems OBJ 3 1 4 1-AcXO.mp441.99MB
  • 160-Security Infrastructure OBJ 3 2 4 5-zuj1.mp490.69MB
  • 161-Ports and Protocols OBJ 4 5-v6IE.mp483.73MB
  • 162-Firewalls OBJ 3 2-pVXq.mp475.13MB
  • 163-Configuring Firewalls OBJ 4 5-gR2E.mp4105.65MB
  • 164-IDS and IPS OBJ 3 2-X1yp.mp437.22MB
  • 165-Network Appliances OBJ 3 2-iu2H.mp488.94MB
  • 166-Port Security OBJ 3 2-xUuq.mp491.46MB
  • 167-Securing Network Communications OBJ 3 2-JyDH.mp4183.37MB
  • 168-SD WAN and SASE OBJ 3 2-yhq2.mp465.55MB
  • 169-Infrastructure Considerations OBJ 3 2-AJ5t.mp496.37MB
  • 170-Selecting Infrastructure Controls OBJ 3 2-UiM1.mp463.18MB
  • 172-Identity and Access Management IAM Solutions OBJ 2 4 4 6-q4U1.mp497.94MB
  • 173-Identity and Access Management IAM OBJ 4 6-CvHT.mp446.09MB
  • 174-Multifactor Authentication OBJ 4 6-vah9.mp4110.82MB
  • 175-Password Security OBJ 4 6-7kKY.mp4123.3MB
  • 176-Password Attacks OBJ 2 4-RLRz.mp456.55MB
  • 177-Single Sign On SSO OBJ 4 6-GeBE.mp473.27MB
  • 178-Federation OBJ 4 6-WDlM.mp435.21MB
  • 179-Privileged Access Management PAM OBJ 4 6-2CYK.mp423.68MB
  • 180-Access Control Models OBJ 4 6-NJBH.mp476.2MB
  • 181-Assigning Permissions OBJ 4 6-zQGF.mp463.79MB
  • 183-Vulnerabilities and Attacks OBJ 2 2 2 3 2 4 2 5 4 1-fJIb.mp4139.48MB
  • 184-Hardware Vulnerabilities OBJ 2 2 2 3 2 5-Chsx.mp451.12MB
  • 185-Bluetooth Vulnerabilities and Attacks OBJ 2 3 2 5 4 1-eH4x.mp453.4MB
  • 186-Mobile Vulnerabilities and Attacks OBJ 2 3 2 5 4 1-pCDl.mp444.89MB
  • 187-Zero day Vulnerabilities OBJ 2 3-M4aK.mp437.91MB
  • 188-Operating System Vulnerabilities OBJ 2 3 2 5-LoA6.mp448.51MB
  • 189-SQL and XML Injections OBJ 2 3 2 4-cHjP.mp4100.65MB
  • 190-Conducting an SQL Injection OBJ 2 3 2 4-nnYM.mp476.46MB
  • 191-XSS and XSRF OBJ 2 3 2 4-8JrX.mp4132.25MB
  • 192-Buffer Overflow OBJ 2 3 2 4-EVeM.mp443.5MB
  • 193-Race Conditions OBJ 2 3-y06R.mp457.73MB
  • 195-Malicious Activity OBJ 2 4-Dmho.mp474.15MB
  • 196-Distributed Denial of Service OBJ 2 4-EpS7.mp464.93MB
  • 197-Domain Name System DNS Attacks OBJ 2 4-6I5t.mp433.85MB
  • 198-Directory Traversal Attack OBJ 2 4-ysxj.mp445.77MB
  • 199-Execution and Escalation Attack OBJ 2 4-N5En.mp443.11MB
  • 200-Replay Attacks OBJ 2 4-UiDP.mp428.46MB
  • 201-Session Hijacking OBJ 2 4-j9NW.mp433.79MB
  • 202-On Path Attacks-fqHm.mp431.91MB
  • 203-Injection Attacks-ujyC.mp423.68MB
  • 204-Indicators of Compromise IoC-YBdU.mp452.53MB
  • 206-Hardening OBJ 2 5 4 1 4 5-SiAX.mp487.49MB
  • 207-Changing Default Configurations OBJ 2 5-qL78.mp446.62MB
  • 208-Restricting Applications OBJ 2 5-tTZy.mp470.04MB
  • 209-Unnecessary Services OBJ 2 5-NB8P.mp455.63MB
  • 210-Trusted Operating Systems OBJ 2 5-Q8So.mp445.51MB
  • 211-Updates and Patches OBJ 2 5-ObSF.mp447.43MB
  • 212-Patch Management OBJ 2 5-ltoz.mp494.32MB
  • 213-Group Policies OBJ 2 5 4 5-wILH.mp438.57MB
  • 214-SELinux OBJ 2 5 4 5-QtUe.mp435.01MB
  • 215-Data Encryption Levels 2 5-Bo1r.mp432.67MB
  • 216-Secure Baselines OBJ 2 5 and 4 1-3exk.mp456.31MB
  • 218-Security Techniques OBJ 4 1 4 5-gI7S.mp482.45MB
  • 219-Wireless Infrastructure Security OBJ 4 1-tNsD.mp483.6MB
  • 220-Wireless Security Settings OBJ 4 1-CAQP.mp497.1MB
  • 221-Application Security OBJ 4 1-Judh.mp483.77MB
  • 222-Network Access Control NAC OBJ 4 5-6fbW.mp443.37MB
  • 223-Web and DNS Filtering OBJ 4 5-lL1h.mp462.07MB
  • 224-Email Security OBJ 4 5-AfEO.mp454.34MB
  • 225-Endpoint Detection and Response OBJ 4 5-mh8Z.mp461.55MB
  • 226-User Behavior Analytics OBJ 4 5-xu0Q.mp460.31MB
  • 227-Selecting Secure Protocols OBJ 4 5-kaly.mp4115.69MB
  • 229-Vulnerability Management OBJ 4 3-x3Ve.mp461.31MB
  • 230-Identifying Vulnerabilities OBJ 4 3-ooT5.mp437.06MB
  • 231-Threat Intelligence Feeds OBJ 4 3-OkeU.mp455.6MB
  • 232-Responsible Disclosure Programs OBJ 4 3-vR3z.mp446.35MB
  • 233-Analyzing Vulnerabilities OBJ 4 3-PBtm.mp482.68MB
  • 234-Conducting Vulnerability Scans OBJ 4 3-5D9M.mp4163.02MB
  • 235-Assessing Vulnerability Scan Results OBJ 4 3-3RqD.mp489.55MB
  • 236-Vulnerability Response and Remediation OBJ 4 3-mN3q.mp457.83MB
  • 237-Validating Vulnerability Remediation OBJ 4 3-KeHv.mp434.13MB
  • 238-Vulnerability Reporting OBJ 4 3-pRAw.mp478.81MB
  • 240-Alerting and Monitoring OBJ 4 4-utCt.mp4119.8MB
  • 241-Monitoring Resources OBJ 4 4-35cu.mp443.31MB
  • 242-Alerting and Monitoring Activities OBJ 4 4-snDE.mp4105.86MB
  • 243-Simple Network Management Protocol SNMP OBJ 4 4-4Rfz.mp434.53MB
  • 244-Security Information and Event Management SIEM OBJ 4 4-u2uX.mp478.22MB
  • 245-Data from Security Tools OBJ 4 4-fSMl.mp433.47MB
  • 246-Security Content Automation and Protocol SCAP OBJ 4 4-S2Ar.mp466.49MB
  • 247-NetFlow and Flow Analysis-jL6q.mp449MB
  • 248-Single Pane of Glass OBJ 4 4-jPWM.mp441.18MB
  • 250-Incident Response OBJ 4 8-Wfxg.mp465.63MB
  • 251-Incident Response Process OBJ 4 8-Slpx.mp493.48MB
  • 252-Threat Hunting OBJ 4 8-ijHw.mp451.63MB
  • 253-Root Cause Analysis OBJ 4 8-0bos.mp465.22MB
  • 254-Incident Response Training and Testing OBJ 4 8-ZNUj.mp452.58MB
  • 255-Digital Forensic Procedures OBJ 4 8-nhGO.mp4134.1MB
  • 256-Data Collection Procedures OBJ 4 8-wXT0.mp454.22MB
  • 257-Disk Imaging and Analysis OBJ 4 8-7Msv.mp4101.84MB
  • 259-Investigating an Incident OBJ 4 9-Kfxt.mp472.12MB
  • 260-Investigating with Data OBJ 4 9-2Ejk.mp4100.51MB
  • 261-Dashboards OBJ 4 9-Cisd.mp434.38MB
  • 262-Automated Reports OBJ 4 9-KN5Y.mp448.49MB
  • 263-Vulnerability Scans OBJ 4 9-D1La.mp478.49MB
  • 264-Packet Captures OBJ 4 9-o6sI.mp485.47MB
  • 265-Firewall Logs OBJ 4 9-tSmt.mp435.45MB
  • 266-Application Logs OBJ 4 9-9U8h.mp427.53MB
  • 267-Endpoint Logs OBJ 4 9-aMlr.mp428.61MB
  • 268-OS specific Security Logs OBJ 4 9-VjrR.mp425.74MB
  • 269-IPS IDS Logs OBJ 4 9-s6Et.mp452.02MB
  • 270-Network Logs OBJ 4 9-zExo.mp440.71MB
  • 271-Metadata OBJ 4 9-DBxZ.mp429.83MB
  • 273-Automation and Orchestration OBJ 4 7-m6oc.mp4140.75MB
  • 274-When to Automate and Orchestrate OBJ 4 7-mrb8.mp479.48MB
  • 275-Benefits of Automation and Orchestratation OBJ 4 7-VnIe.mp459.67MB
  • 276-Automating Support Tickets OBJ 4 7-4HFR.mp454.08MB
  • 277-Automating Onboarding OBJ 4 7-q39X.mp461.14MB
  • 278-Automating Security OBJ 4 7-NvKY.mp432.41MB
  • 279-Automating Application Development OBJ 4 7-YZ2n.mp475.49MB
  • 280-Integrations and APIs OBJ 4 7-dknQ.mp4102.31MB
  • 282-Security Awareness OBJ 5 6-tHpr.mp479.83MB
  • 283-Recognizing Insider Threats OBJ 5 6-Se7V.mp479.48MB
  • 284-Password Management OBJ 5 6-hbrD.mp479.81MB
  • 285-Avoiding Social Engineering OBJ 5 6-6qr6.mp473.84MB
  • 286-Policy and Handbooks OBJ 5 6-ZhZm.mp472.47MB
  • 287-Remote and Hybrid Work Environments OBJ 5 6-A8nJ.mp461.02MB
  • 288-Creating a Culture of Security OBJ 5 6-juNe.mp434.88MB
  • 290-Conclusion-S4ln.mp4280.69MB
  • 291-BONUS Where do I go from here-32HS.mp454.49MB