本站已收录 番号和无损神作磁力链接/BT种子 

[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501

种子简介

种子名称: [CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501
文件类型: 视频
文件数目: 86个文件
文件大小: 4.37 GB
收录时间: 2021-1-6 21:12
已经下载: 3
资源热度: 193
最近下载: 2024-5-15 10:09

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:c62b089215e5a6a85b1126bf48a12661305a458e&dn=[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501.torrent
  • 001 Welcome to Security+.mp425.54MB
  • 002 Infrastructure Security Devices.mp489MB
  • 003 Application and Traffic Analysis .mp438.66MB
  • 004 Network Segmentation and Separation with VLANs.mp451.92MB
  • 005 ACL Case Study.mp459.91MB
  • 006 Design Considerations.mp475.33MB
  • 007 NAT and PAT Case Study.mp445.73MB
  • 008 Firewall and Switch Protection Mechanisms.mp457.96MB
  • 009 Virtualization Overview.mp452.68MB
  • 010 IPsec_ Protocols_ and Well-known Ports.mp468.28MB
  • 011 ICMP and a Few More Protocols.mp460.39MB
  • 012 Security for WiFi.mp494.98MB
  • 013 Risk Overview.mp492.54MB
  • 014 Risk Calculation.mp468.94MB
  • 015 Attack Vectors_ Risk Management_ and Recovery.mp441.97MB
  • 016 Third-Party Risk from Integration.mp439.89MB
  • 017 Change Management and Account Auditing.mp459.04MB
  • 018 Data Loss Prevention (DLP).mp440.92MB
  • 019 Forensics.mp473.11MB
  • 020 Incident Response Concepts.mp443.5MB
  • 021 Security Awareness_ RBAC_ and Data Labeling .mp454.39MB
  • 022 Passwords_ Best Practices_ and Standards.mp454.34MB
  • 023 Environmental Controls.mp439.83MB
  • 024 Physical Security.mp448.01MB
  • 025 Business Continuity.mp465.06MB
  • 026 Fault Tolerance.mp467.18MB
  • 027 Controls for Confidentiality .mp450.04MB
  • 028 Tools and Controls for Data Integrity.mp468.77MB
  • 029 Availability and Safety.mp420.93MB
  • 030 Malware_ Adware - Spyware.mp443.25MB
  • 031 Trojans_ Backdoors_ and More Malware.mp468.76MB
  • 032 Attack Types MITM - Spear Fishing.mp472.17MB
  • 033 Attack Types_ Xmas - Client Side.mp455.05MB
  • 034 Password Attacks and Watering Holes.mp451MB
  • 035 Social Engineering Threats.mp448.85MB
  • 036 Vishing and Why Social Engineering Works.mp443.11MB
  • 037 Wireless Attacks.mp455.83MB
  • 038 Cross-site and Injection Attacks.mp464.64MB
  • 039 Application Attacks.mp446.84MB
  • 040 Monitoring and Device Hardening.mp470.63MB
  • 041 Baselines_ Detection_ and Reporting.mp438.7MB
  • 042 Analyzers and Scanners.mp475.25MB
  • 043 Discovering and Assessing Threats.mp458.08MB
  • 044 Penetration Testing.mp448.82MB
  • 045 Techniques for Securing Apps.mp439.67MB
  • 046 Application Security Controls.mp456.08MB
  • 047 Mobile Device Security Overview.mp470.63MB
  • 048 Host Security.mp443.03MB
  • 049 Hardware and Virtualization Security.mp446.43MB
  • 050 Data Security.mp440.12MB
  • 051 Securing Data with H_W_ Controls_ and Policy.mp439.53MB
  • 052 Security in Static Environments.mp454.43MB
  • 053 AAA Concepts.mp436.92MB
  • 054 Authentication Protocols and Services.mp468.67MB
  • 055 Multifactor Authentication.mp451.23MB
  • 056 Authentication Controls.mp471.7MB
  • 057 Controlling Access via Authorization.mp468.9MB
  • 058 Account Management.mp476.8MB
  • 059 Symmetric and Asymmetric Encryption.mp469.62MB
  • 060 Crypto Key Management.mp481.85MB
  • 061 Hashing and Encryption Protocols.mp472.19MB
  • 062 Comparing Cryptography Algorithms.mp463.03MB
  • 063 PKI Overview.mp455.21MB
  • 064 Certificate Warnings and Trust Models.mp437.73MB
  • 065 Layered Security Case Study.mp439.2MB
  • 066 Attack Types and Vectors.mp415.7MB
  • 067 Threat Actor Types and Ethics.mp420.18MB
  • 068 Reconnaissance Information Gathering Concepts.mp436.56MB
  • 069 Hacking Vocabulary and Terms.mp422.36MB
  • 070 Malware Concepts.mp433.96MB
  • 071 Network Scanning Overview.mp413.71MB
  • 072 Trojans.mp437.27MB
  • 073 Port Security.mp438.77MB
  • 074 Scanning Methodologies.mp432.68MB
  • 075 Sniffing Overview.mp443.48MB
  • 076 Vulnerability Scanning.mp429.48MB
  • 077 Social Engineering Overview.mp450.85MB
  • 078 System Hacking Stages and Goals.mp434.21MB
  • 079 Buffer Overflow.mp448.36MB
  • 080 OWASP BWAP.mp436.16MB
  • 081 Honeypots and Honeynets.mp441.26MB
  • 082 Centralized Identity Management.mp449.79MB
  • 083 SSO_ Kerberos_ and Security Threats.mp463.84MB
  • 084 Incident Response.mp444.24MB
  • 085 Penetration Testing Legally.mp437.51MB
  • 086 Case Study #1.mp475.92MB