[FreeCoursesOnline.Us] CBT Nuggets - comptia-security-plus-sy0-501

Size
4.37 GB
Files
90
Seeders
10
Leechers
2
AddTime
1 year
Source
DHT
Updated
2 days | Update Tracker
Info Hash
b5ec4e00cbc19b79693ab12c812bddfbcc2c59a6
Keywords
Magnet
magnet:?xt=urn:btih:b5ec4e00cbc19b79693ab12c812bddfbcc2c59a6
.Torrent
Mirror 1 | Mirror 2 | Mirror 3
Warning! Use a VPN When Downloading Torrents!
Your Country is . IP Address is
Your Internet Provider can see when you download torrents! Hide your IP ADDRESS with a VPN!
We strongly recommend Trust.Zone VPN to hide your torrenting. It's FREE!
HIDE ME NOW

File List

25.5 MB 001 Welcome to Security+.mp4
89 MB 002 Infrastructure Security Devices.mp4
38.7 MB 003 Application and Traffic Analysis .mp4
51.9 MB 004 Network Segmentation and Separation with VLANs.mp4
59.9 MB 005 ACL Case Study.mp4
75.3 MB 006 Design Considerations.mp4
45.7 MB 007 NAT and PAT Case Study.mp4
58 MB 008 Firewall and Switch Protection Mechanisms.mp4
52.7 MB 009 Virtualization Overview.mp4
68.3 MB 010 IPsec_ Protocols_ and Well-known Ports.mp4
60.4 MB 011 ICMP and a Few More Protocols.mp4
95 MB 012 Security for WiFi.mp4
92.5 MB 013 Risk Overview.mp4
68.9 MB 014 Risk Calculation.mp4
42 MB 015 Attack Vectors_ Risk Management_ and Recovery.mp4
39.9 MB 016 Third-Party Risk from Integration.mp4
59 MB 017 Change Management and Account Auditing.mp4
40.9 MB 018 Data Loss Prevention (DLP).mp4
73.1 MB 019 Forensics.mp4
43.5 MB 020 Incident Response Concepts.mp4
54.4 MB 021 Security Awareness_ RBAC_ and Data Labeling .mp4
54.3 MB 022 Passwords_ Best Practices_ and Standards.mp4
39.8 MB 023 Environmental Controls.mp4
48 MB 024 Physical Security.mp4
65.1 MB 025 Business Continuity.mp4
67.2 MB 026 Fault Tolerance.mp4
50 MB 027 Controls for Confidentiality .mp4
68.8 MB 028 Tools and Controls for Data Integrity.mp4
20.9 MB 029 Availability and Safety.mp4
43.3 MB 030 Malware_ Adware - Spyware.mp4
68.8 MB 031 Trojans_ Backdoors_ and More Malware.mp4
72.2 MB 032 Attack Types MITM - Spear Fishing.mp4
55.1 MB 033 Attack Types_ Xmas - Client Side.mp4
51 MB 034 Password Attacks and Watering Holes.mp4
48.9 MB 035 Social Engineering Threats.mp4
43.1 MB 036 Vishing and Why Social Engineering Works.mp4
55.8 MB 037 Wireless Attacks.mp4
64.6 MB 038 Cross-site and Injection Attacks.mp4
46.8 MB 039 Application Attacks.mp4
70.6 MB 040 Monitoring and Device Hardening.mp4
38.7 MB 041 Baselines_ Detection_ and Reporting.mp4
75.2 MB 042 Analyzers and Scanners.mp4
58.1 MB 043 Discovering and Assessing Threats.mp4
48.8 MB 044 Penetration Testing.mp4
39.7 MB 045 Techniques for Securing Apps.mp4
56.1 MB 046 Application Security Controls.mp4
70.6 MB 047 Mobile Device Security Overview.mp4
43 MB 048 Host Security.mp4
46.4 MB 049 Hardware and Virtualization Security.mp4
40.1 MB 050 Data Security.mp4
39.5 MB 051 Securing Data with H_.null._ Controls_ and Policy.mp4
54.4 MB 052 Security in Static Environments.mp4
36.9 MB 053 AAA Concepts.mp4
68.7 MB 054 Authentication Protocols and Services.mp4
51.2 MB 055 Multifactor Authentication.mp4
71.7 MB 056 Authentication Controls.mp4
68.9 MB 057 Controlling Access via Authorization.mp4
76.8 MB 058 Account Management.mp4
69.6 MB 059 Symmetric and Asymmetric Encryption.mp4
81.8 MB 060 Crypto Key Management.mp4
72.2 MB 061 Hashing and Encryption Protocols.mp4
63 MB 062 Comparing Cryptography Algorithms.mp4
55.2 MB 063 PKI Overview.mp4
37.7 MB 064 Certificate Warnings and Trust Models.mp4
39.2 MB 065 Layered Security Case Study.mp4
15.7 MB 066 Attack Types and Vectors.mp4
20.2 MB 067 Threat Actor Types and Ethics.mp4
36.6 MB 068 Reconnaissance Information Gathering Concepts.mp4
22.4 MB 069 Hacking Vocabulary and Terms.mp4
34 MB 070 Malware Concepts.mp4
13.7 MB 071 Network Scanning Overview.mp4
37.3 MB 072 Trojans.mp4
38.8 MB 073 Port Security.mp4
32.7 MB 074 Scanning Methodologies.mp4
43.5 MB 075 Sniffing Overview.mp4
29.5 MB 076 Vulnerability Scanning.mp4
50.9 MB 077 Social Engineering Overview.mp4
34.2 MB 078 System Hacking Stages and Goals.mp4
48.4 MB 079 Buffer Overflow.mp4
36.2 MB 080 OWASP BWAP.mp4
41.3 MB 081 Honeypots and Honeynets.mp4
49.8 MB 082 Centralized Identity Management.mp4
63.8 MB 083 SSO_ Kerberos_ and Security Threats.mp4
44.2 MB 084 Incident Response.mp4
37.5 MB 085 Penetration Testing Legally.mp4
75.9 MB 086 Case Study #1.mp4
138 B [FreeCoursesOnline.Us].txt
123 B [FreeCoursesOnline.Us].url
75 B [FreeTutorials.Us].txt
119 B [FreeTutorials.Us].url