zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
CompTIA Security+ (SY0-601) - ITProTV
magnet:?xt=urn:btih:9affc69e52df3e6f72fd10466c7a57b2a2b18bc7&dn=CompTIA Security+ (SY0-601) - ITProTV
磁力链接详情
文件列表详情
9affc69e52df3e6f72fd10466c7a57b2a2b18bc7
infohash:
97
文件数量
18.14 GB
文件大小
2023-2-21 04:38
创建日期
2024-11-18 21:48
最后访问
相关分词
CompTIA
Security
SY0-601
-
ITProTV
2 - Cryptography/5 - Secure Protocols.mp4 304.85 MB
1 - Threats, Attacks, and Vulnerabilities/10 - Network Attacks - DNS Attacks.mp4 243.29 MB
1 - Threats, Attacks, and Vulnerabilities/11 - Network Attacks - Layer 2 Attacks.mp4 214.11 MB
1 - Threats, Attacks, and Vulnerabilities/12 - Network Attacks - DoS and DDoS.mp4 142.59 MB
1 - Threats, Attacks, and Vulnerabilities/13 - Network Attacks - MiTM and MiTB.mp4 132.48 MB
1 - Threats, Attacks, and Vulnerabilities/14 - Network Attacks - Wireless.mp4 256.73 MB
1 - Threats, Attacks, and Vulnerabilities/15 - Vulnerabilities.mp4 243.11 MB
1 - Threats, Attacks, and Vulnerabilities/16 - Threat Intelligence - OSINT.mp4 133.81 MB
1 - Threats, Attacks, and Vulnerabilities/17 - Threat Intelligence - Threat Maps and Feeds.mp4 175.35 MB
1 - Threats, Attacks, and Vulnerabilities/18 - Threat Intelligence Vulnerability Databases Feed.mp4 246.95 MB
1 - Threats, Attacks, and Vulnerabilities/19 - Threat Actors and Vectors.mp4 292.8 MB
1 - Threats, Attacks, and Vulnerabilities/2 - Social Engineering Techniques.mp4 214.88 MB
1 - Threats, Attacks, and Vulnerabilities/3 - Malware.mp4 234.41 MB
1 - Threats, Attacks, and Vulnerabilities/4 - Password Attacks - Types.mp4 142.57 MB
1 - Threats, Attacks, and Vulnerabilities/5 - Password Attacks - Tools.mp4 150.63 MB
1 - Threats, Attacks, and Vulnerabilities/6 - Application Attacks - Injections.mp4 168.7 MB
1 - Threats, Attacks, and Vulnerabilities/7 - Application Attacks - System Resources.mp4 228.02 MB
1 - Threats, Attacks, and Vulnerabilities/8 - Application Attacks - XSS and XSRF.mp4 112.16 MB
1 - Threats, Attacks, and Vulnerabilities/9 - Application Attacks - Replay Attacks.mp4 141.25 MB
2 - Cryptography/1 - Cryptography Concepts.mp4 184.45 MB
2 - Cryptography/2 - Encryption and Steganography.mp4 176.68 MB
2 - Cryptography/3 - Hashing.mp4 207.61 MB
2 - Cryptography/4 - Symmetric vs. Asymmetric Encryption.mp4 271.87 MB
1 - Threats, Attacks, and Vulnerabilities/1 - Overview.mp4 76.58 MB
2 - Cryptography/6 - Keys.mp4 277.73 MB
2 - Cryptography/7 - PKI Concepts.mp4 237.67 MB
2 - Cryptography/8 - Certificates.mp4 244.27 MB
2 - Cryptography/9 - IPSec.mp4 247.8 MB
3 - Identity and Access management/1 - Authentication and Authorization.mp4 246.92 MB
3 - Identity and Access management/10 - Account Management - Account Types.mp4 204.74 MB
3 - Identity and Access management/11 - Account Management - Password Policies.mp4 155.87 MB
3 - Identity and Access management/12 - Account Management - Account Policies.mp4 139.18 MB
3 - Identity and Access management/2 - Authentication Methods.mp4 246.08 MB
3 - Identity and Access management/3 - Additional Authentication Methods.mp4 118.03 MB
3 - Identity and Access management/4 - Biometrics.mp4 181.48 MB
3 - Identity and Access management/5 - Authentication Protocols - PAP and CHAP.mp4 117.6 MB
3 - Identity and Access management/6 - Authentication Protocols - EAP and 802.1X.mp4 171.23 MB
3 - Identity and Access management/7 - Authentication Protocols - RADIUS and TACACS.mp4 122.84 MB
3 - Identity and Access management/8 - Authentication Protocols - Kerberos.mp4 128.71 MB
3 - Identity and Access management/9 - Access Control Schemes.mp4 232.71 MB
4 - Implementing Security/1 - Application Security.mp4 201.69 MB
4 - Implementing Security/10 - Specialized Systems.mp4 199.53 MB
4 - Implementing Security/11 - Network Security - Segmentation.mp4 234.67 MB
4 - Implementing Security/12 - Network Security - VPNs.mp4 200.68 MB
4 - Implementing Security/13 - Network Security - Proxies and Load Balancing.mp4 195.27 MB
4 - Implementing Security/14 - Network Security - Port Security.mp4 191.51 MB
4 - Implementing Security/15 - Network Security - Firewalls.mp4 164.79 MB
4 - Implementing Security/16 - Network Security - NIDS and NIPS.mp4 85.78 MB
4 - Implementing Security/2 - Physical Security.mp4 259.38 MB
4 - Implementing Security/3 - Wireless Security.mp4 237.63 MB
4 - Implementing Security/4 - Secure Data Destruction.mp4 194.14 MB
4 - Implementing Security/5 - Host Security - Endpoint Protection.mp4 241.78 MB
4 - Implementing Security/6 - Host Security - Hardening.mp4 248.16 MB
4 - Implementing Security/7 - Mobile Device Deployment.mp4 237.47 MB
4 - Implementing Security/8 - Mobile Device Management and Enforcement.mp4 245.14 MB
4 - Implementing Security/9 - Mobile Device Connections.mp4 162.78 MB
5 - Cloud and Virtialization/1 - Virtualization.mp4 189.68 MB
5 - Cloud and Virtialization/2 - Cloud Concepts.mp4 229.7 MB
5 - Cloud and Virtialization/3 - Cloud Services.mp4 168.38 MB
5 - Cloud and Virtialization/4 - Cloud Models.mp4 144.71 MB
5 - Cloud and Virtialization/5 - Computing Types.mp4 221.02 MB
5 - Cloud and Virtialization/6 - Cloud Security Controls.mp4 186.56 MB
6 - Operational Resiliency/1 - Hardware Redundancy.mp4 264.57 MB
6 - Operational Resiliency/2 - Site Redundancy.mp4 161.79 MB
6 - Operational Resiliency/3 - Non-persistence Concepts.mp4 199.68 MB
6 - Operational Resiliency/4 - Backup and Recovery.mp4 223.91 MB
7 - Operational Security and Incident Response/1 - Network Reconnaissance and Discovery.mp4 191.3 MB
7 - Operational Security and Incident Response/10 - Incident Response Plans.mp4 160.03 MB
7 - Operational Security and Incident Response/11 - Attack Frameworks.mp4 164.37 MB
7 - Operational Security and Incident Response/2 - Packet Capture and Replay.mp4 272 MB
7 - Operational Security and Incident Response/3 - Vulnerability Scans.mp4 194.29 MB
7 - Operational Security and Incident Response/4 - SIEM and SOAR Systems.mp4 149.13 MB
7 - Operational Security and Incident Response/5 - Pentesting Techniques.mp4 236.61 MB
7 - Operational Security and Incident Response/6 - Pentesting Exercise Types.mp4 197.21 MB
7 - Operational Security and Incident Response/7 - Digital Forensics Concepts.mp4 265.9 MB
7 - Operational Security and Incident Response/8 - Investigational Data Sources.mp4 275.7 MB
7 - Operational Security and Incident Response/9 - Incident Response Process.mp4 170.21 MB
8 - Governance, Risk and Compliance/1 - Security Controls.mp4 217.11 MB
8 - Governance, Risk and Compliance/10 - Risk Management Concepts - Risk Analysis.mp4 196.93 MB
8 - Governance, Risk and Compliance/11 - Risk Management Concepts Business Impact Analysis.mp4 263.92 MB
8 - Governance, Risk and Compliance/12 - Privacy and Data Sensitivity Breaches & Data Types.mp4 191.49 MB
8 - Governance, Risk and Compliance/13 - Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 214.21 MB
8 - Governance, Risk and Compliance/14 - Privacy, Data Sensitivity, Roles, Responsibilities.mp4 161.97 MB
8 - Governance, Risk and Compliance/15 - Privacy and Data Sensitivity - Other Areas.mp4 214.52 MB
8 - Governance, Risk and Compliance/2 - Regulations, Standards and Frameworks.mp4 271.34 MB
8 - Governance, Risk and Compliance/3 - Spotlight on General Data Protection Regulation.mp4 259.89 MB
8 - Governance, Risk and Compliance/4 -Organizational Security Policies - Personnel.mp4 253.93 MB
8 - Governance, Risk and Compliance/5 - Organizational Security Policies - 3rd Party Risk.mp4 240.51 MB
8 - Governance, Risk and Compliance/6 - Organizational Security Policies - Data.mp4 182.66 MB
8 - Governance, Risk and Compliance/7 - Organizational Security Policies - Other Areas.mp4 145.98 MB
8 - Governance, Risk and Compliance/8 - Risk Management Concepts - Vocabulary.mp4 177.84 MB
8 - Governance, Risk and Compliance/9 - Risk Management Concepts - Types & Strategies.mp4 248.21 MB
comptia-secplussy0601-2-1-1-cryptography_concepts.md 625 字节
comptia-secplussy0601-2-5-pki_concepts.md 1.77 KB
comptia-secplussy0601-5-2-1-cloud-concepts.md 617 字节
comptia-secplussy0601-8-3-1-non-persistence-concepts.md 658 字节
comptia-secplussy0601-9-6-1-digital-forensics-concepts.md 1.01 KB
其他位置