zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
CompTIA Security Plus
magnet:?xt=urn:btih:83dc794b4025cf62dbd838ef988c210ecfe83c61&dn=CompTIA Security Plus
磁力链接详情
文件列表详情
83dc794b4025cf62dbd838ef988c210ecfe83c61
infohash:
63
文件数量
4.91 GB
文件大小
2019-12-8 05:28
创建日期
2024-11-9 16:54
最后访问
相关分词
CompTIA
Security
Plus
Module 1/1.1 Firewalls.mp4 155.01 MB
Module 1/1.10 TCP IP Internet Protocol.mp4 147.88 MB
Module 1/1.11 Common Protocols and their Port Numbers.mp4 129.28 MB
Module 1/1.12 Security Related Issues Wireless Part 1.mp4 140.81 MB
Module 1/1.13 Security Related Issues Wireless Part 2.mp4 55.22 MB
Module 1/1.2 Proxies.mp4 81.86 MB
Module 1/1.3 Reverse Proxies.mp4 16.18 MB
Module 1/1.4 Network Address Translation.mp4 23.47 MB
Module 1/1.5 VPN Concentrators.mp4 18.32 MB
Module 1/1.6 Network Administration Principles.mp4 129.45 MB
Module 1/1.7 Subnetting.mp4 152.51 MB
Module 1/1.8 Subnet Mask.mp4 28.32 MB
Module 1/1.9 Network Design and Elements.mp4 194.09 MB
Module 2/2.1 Risk Related Concepts (Part 1).mp4 83.35 MB
Module 2/2.10 Importance Of Security Awareness And Training.mp4 130.43 MB
Module 2/2.11 Physical Security And Environmental Controls.mp4 136.4 MB
Module 2/2.12 Risk Management Best Practices.mp4 177.36 MB
Module 2/2.13 Goals Of Security.mp4 115.04 MB
Module 2/2.2 Risk Related Concepts (Part 2).mp4 167.72 MB
Module 2/2.3 Control Types.mp4 25.84 MB
Module 2/2.4 The Principle of Least Priviledge.mp4 16.28 MB
Module 2/2.5 Security Implications of Integrating Systems (Part 1).mp4 65.94 MB
Module 2/2.6 Security Implications of Integrating Systems (Part 2).mp4 56.13 MB
Module 2/2.7 Basic Forensic Procedures.mp4 79.74 MB
Module 2/2.8 Incident Response Procedures.mp4 60.38 MB
Module 2/2.9 Importance Of Security.mp4 97.8 MB
Module 3/3.1 Types Of Malware (Part 1).mp4 132.63 MB
Module 3/3.10 Mitigation and Deterrent Techniques.mp4 76.29 MB
Module 3/3.11 Security Traits and Vulnerabilities.mp4 72.46 MB
Module 3/3.12 Assesment Techniques.mp4 39 MB
Module 3/3.13 Penetration Testing vs Vulnerability Scanning (Part 1).mp4 45.15 MB
Module 3/3.14 Penetration Testing vs Vulnerability Scanning (Part 2).mp4 40.16 MB
Module 3/3.2 Types Of Malware (Part 2).mp4 80.44 MB
Module 3/3.3 Phishing.mp4 151.79 MB
Module 3/3.4 Various Types of Attacks.mp4 73.46 MB
Module 3/3.5 Social Engineering.mp4 85.39 MB
Module 3/3.6 Types Of Wireless Attacks.mp4 61.33 MB
Module 3/3.7 Application Attacks.mp4 36.41 MB
Module 3/3.8 Attacks (LDAP, XML) Injection.mp4 39.74 MB
Module 3/3.9 Zero Day Exploits, Cookies and Attachments.mp4 45.12 MB
Module 4/4.1 Applications, Security Controls and Techniques.mp4 96.86 MB
Module 4/4.2 Host Security.mp4 118.7 MB
Module 4/4.3 Hardware Security.mp4 72.38 MB
Module 4/4.4 Virtualization.mp4 62.05 MB
Module 4/4.5 Importance of Data Security.mp4 89.7 MB
Module 4/4.6 Data Security.mp4 24.94 MB
Module 4/4.7 Data Encryption.mp4 68.98 MB
Module 4/4.8 Data Policies.mp4 35.31 MB
Module 5/5.1 Authentication Services.mp4 40.89 MB
Module 5/5.2 Access Controls.mp4 64.91 MB
Module 5/5.3 Authentication Authorization and Access Control (Part 1).mp4 88.84 MB
Module 5/5.4 Authentication Authorization and Access Control (Part 2).mp4 121.68 MB
Module 5/5.5 Authentication Factors.mp4 50.21 MB
Module 5/5.6 Implementing Appropriate Security Controls When Performing Account Management.mp4 106.58 MB
Module 5/5.7 Best Practices For Account Management.mp4 123.94 MB
Module 6/6.1 General Cryptography Concepts.mp4 49.52 MB
Module 6/6.2 Block Cyphers & Stream Cyphers.mp4 18.11 MB
Module 6/6.3 Transport Encryption.mp4 20.56 MB
Module 6/6.4 Hashing & Steganography.mp4 100.73 MB
Module 6/6.5 WEP, WPA and WPA2.mp4 29.06 MB
Module 6/6.6 MD5, SHA and AES.mp4 35.03 MB
Module 6/6.7 DES, HMAC and CHAP.mp4 72.92 MB
Module 6/6.8 Public Key Infrastructure.mp4 71.37 MB
其他位置