CompTIA Security+ SY0-701 Certification
File List
- Chapter 01 General Security Concepts/004. 1.2 - Summarize fundamental security concepts.mp4 53.8 MB
- Chapter 01 General Security Concepts/006. 1.4 - Explain the importance of using appropriate cryptographic solutions.mp4 46.3 MB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/003. 2.3 - Explain various types of vulnerabilities.mp4 37.2 MB
- Chapter 04 Security Operations/005. 4.5 - Given a scenario, modify enterprise capabilities to enhance security.mp4 34.3 MB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/005. 2.4 - Given a scenario, analyze indicators of malicious activity. Part 2.mp4 31.9 MB
- Chapter 03 Security Architecture/001. 3.1 - Compare and contrast security implications of different architecture models.mp4 29.3 MB
- Chapter 04 Security Operations/003. 4.3 - Explain various activities associated with vulnerability management.mp4 28.7 MB
- Chapter 04 Security Operations/001. 4.1 - Given a scenario, apply common security techniques to computing resources.mp4 27.5 MB
- Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.mp4 24.0 MB
- Chapter 03 Security Architecture/002. 3.2 - Given a scenario, apply security principles to secure enterprise infrastructure.mp4 24.0 MB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/006. 2.5-Explain the purpose of mitigation techniques used to secure the enterprise.mp4 23.9 MB
- Chapter 03 Security Architecture/004. 3.4 - Explain the importance of resilience and recovery in security architecture.mp4 23.5 MB
- Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.mp4 23.4 MB
- Chapter 04 Security Operations/009. 4.8 - Explain appropriate incident response activities.mp4 22.4 MB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/002. 2.2- Explain common threat vectors and attack surfaces.mp4 22.1 MB
- Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.mp4 22.0 MB
- Chapter 01 General Security Concepts/005. 1.3 - Explain the importance of change management processes and the impact to security.mp4 21.4 MB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/004. 2.4 - Given a scenario, analyze indicators of malicious activity Part 1.mp4 21.3 MB
- Chapter 04 Security Operations/006. 4.6 - Given a scenario, implement and maintain identity and access management - Part 1.mp4 20.0 MB
- Chapter 04 Security Operations/007. 4.6 - Given a scenario, implement and maintain identity and access management - Part 2.mp4 19.6 MB
- Chapter 03 Security Architecture/003. 3.3 - Compare and contrast concepts and strategies to protect data.mp4 17.3 MB
- Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.mp4 17.0 MB
- Chapter 04 Security Operations/002. 4.2 - Explain the security implications of proper hardware, software, and data asset management.mp4 16.4 MB
- Chapter 04 Security Operations/004. 4.4 - Explain security alerting and monitoring concepts and tools.mp4 14.0 MB
- Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.mp4 12.9 MB
- Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.mp4 12.9 MB
- Chapter 04 Security Operations/008. 4.7 - Explain the importance of automation and orchestration related to secure operations.mp4 12.2 MB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/001. 2.1 - Compare and contrast common threat actors and motivations.mp4 12.1 MB
- Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.mp4 11.3 MB
- Chapter 01 General Security Concepts/003. 1.1 - Compare and contrast various types of security controls.mp4 10.3 MB
- Chapter 01 General Security Concepts/002. Introduction to CompTIA Security Plus+ Certification Exam Objectives EXAM NUMBER SY0-701 video course.mp4 5.2 MB
- Chapter 01 General Security Concepts/001. How to Use the Video Course.mp4 2.0 MB
- Chapter 01 General Security Concepts/006. 1.4 - Explain the importance of using appropriate cryptographic solutions.en.srt 33.3 KB
- Chapter 01 General Security Concepts/004. 1.2 - Summarize fundamental security concepts.en.srt 32.3 KB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/003. 2.3 - Explain various types of vulnerabilities.en.srt 23.3 KB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/005. 2.4 - Given a scenario, analyze indicators of malicious activity. Part 2.en.srt 18.6 KB
- Chapter 04 Security Operations/005. 4.5 - Given a scenario, modify enterprise capabilities to enhance security.en.srt 17.2 KB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/002. 2.2- Explain common threat vectors and attack surfaces.en.srt 16.4 KB
- Chapter 04 Security Operations/003. 4.3 - Explain various activities associated with vulnerability management.en.srt 14.9 KB
- Chapter 01 General Security Concepts/005. 1.3 - Explain the importance of change management processes and the impact to security.en.srt 13.8 KB
- Chapter 03 Security Architecture/001. 3.1 - Compare and contrast security implications of different architecture models.en.srt 13.7 KB
- Chapter 04 Security Operations/001. 4.1 - Given a scenario, apply common security techniques to computing resources.en.srt 13.6 KB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/006. 2.5-Explain the purpose of mitigation techniques used to secure the enterprise.en.srt 12.5 KB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/004. 2.4 - Given a scenario, analyze indicators of malicious activity Part 1.en.srt 12.2 KB
- Chapter 04 Security Operations/009. 4.8 - Explain appropriate incident response activities.en.srt 11.9 KB
- Chapter 05 Security Program Management and Oversight/001. 5.1 - Summarize elements of effective security governance.en.srt 11.9 KB
- Chapter 05 Security Program Management and Oversight/006. 5.6 - Given a scenario, implement security awareness practices.en.srt 11.8 KB
- Chapter 05 Security Program Management and Oversight/002. 5.2 - Explain elements of the risk management process.en.srt 11.5 KB
- Chapter 03 Security Architecture/002. 3.2 - Given a scenario, apply security principles to secure enterprise infrastructure.en.srt 11.4 KB
- Chapter 03 Security Architecture/004. 3.4 - Explain the importance of resilience and recovery in security architecture.en.srt 11.0 KB
- Chapter 04 Security Operations/006. 4.6 - Given a scenario, implement and maintain identity and access management - Part 1.en.srt 10.1 KB
- Chapter 04 Security Operations/007. 4.6 - Given a scenario, implement and maintain identity and access management - Part 2.en.srt 9.8 KB
- Chapter 03 Security Architecture/003. 3.3 - Compare and contrast concepts and strategies to protect data.en.srt 9.0 KB
- Chapter 04 Security Operations/002. 4.2 - Explain the security implications of proper hardware, software, and data asset management.en.srt 8.8 KB
- Chapter 04 Security Operations/010. 4.9 - Given a scenario, use data sources to support an investigation.en.srt 8.3 KB
- Chapter 02 Threats, Vulnerabilities, and Mitigations/001. 2.1 - Compare and contrast common threat actors and motivations.en.srt 8.0 KB
- Chapter 05 Security Program Management and Oversight/004. 5.4 - Summarize elements of effective security compliance.en.srt 6.7 KB
- Chapter 04 Security Operations/004. 4.4 - Explain security alerting and monitoring concepts and tools.en.srt 6.5 KB
- Chapter 05 Security Program Management and Oversight/003. 5.3 - Explain the processes associated with third-party risk assessment and management.en.srt 6.1 KB
- Chapter 01 General Security Concepts/003. 1.1 - Compare and contrast various types of security controls.en.srt 6.0 KB
- Chapter 05 Security Program Management and Oversight/005. 5.5 - Explain types and purposes of audits and assessments.en.srt 5.6 KB
- Chapter 04 Security Operations/008. 4.7 - Explain the importance of automation and orchestration related to secure operations.en.srt 5.5 KB
- Chapter 01 General Security Concepts/002. Introduction to CompTIA Security Plus+ Certification Exam Objectives EXAM NUMBER SY0-701 video course.en.srt 2.9 KB
- Chapter 01 General Security Concepts/001. How to Use the Video Course.en.srt 1.1 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.