только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » CompTIA Security+ SY0–701 Full Course and Labs

CompTIA Security+ SY0–701 Full Course and Labs

CompTIA Security+ SY0–701 Full Course and Labs
Free Download CompTIA Security+ SY0–701 Full Course and Labs
Published 1/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 47.83 GB | Duration: 25h 42m
Pass your Security+ SY0-701 exam on the first try with a lab base approach to learning. Tons of labs.


What you'll learn
CompTIA Security+ exam objectives
Attacks against networks
Methods to protect a network
Full length Mock Exam
Requirements
Basics Networking and skills.
Description
This course will prepare you to pass the CompTIA Security+ SY0-701 exam on the first try. In this course, I will be using my 20+ years of experience teaching IT courses to give you a practical, hands-on approach to all of the CompTIA Security+ Certification exams. I will cover all of the exam objectives in detail. I am a best-selling udemy instructor with over 300,000 students. I have helped thousands of students to pass their certification exams over the last 20 years. My method of teaching is engaging and fun.I will review how to build your own lab to follow along with me in this journey so you can gain the practical knowledge needed not only to pass your Security+ exam but also how to apply it in the real world of being an IT technician.This course will cover the following domains:Attacks, Threats, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceThis course will include:Over 200 lectures.Over 25 Hours of training.We will only be covering the topics on your exam, no-nonsense and personal stories.PDF of the exam objectives from CompTIA for the Security+ exam. Certificate of completion. Lifetime access. 30-day money-back guarantee.
Overview
Section 1: Introduction
Lecture 1 Exam Information
Lecture 2 Exam Domains
Lecture 3 Course Note Download
Section 2: Lesson 1: IT Security Fundamentals
Lecture 4 Introduction IT Security Fundamentals
Lecture 5 CIA Triad OB 1.2
Lecture 6 Confidentiality OB 1.2
Lecture 7 Integrity OB 1.2
Lecture 8 Availability OB 1.2
Lecture 9 DAD Triade OB 1.2
Lecture 10 Non-Repudiation OB 1.2
Lecture 11 Authentication OB 1.2
Lecture 12 Authorization OB 1.2
Lecture 13 Accounting OB 1.2
Lecture 14 Accountability OB 1.2
Lecture 15 Gap analysis OB 1.2
Lecture 16 Zero Trust OB 1.2
Section 3: Security Controls Categories and Types
Lecture 17 Control Categories OB 1.1
Lecture 18 Control Types OB 1.1
Lecture 19 Defense in Depth OB 1.1
Section 4: Threats
Lecture 20 Threats OB 2.1
Lecture 21 Attributes of Actors OB 2.1
Lecture 22 Threats Motivation OB 2.1
Lecture 23 Nation-state OB 2.1
Lecture 24 Unskilled Attacker OB 2.1
Lecture 25 Hacktivist OB 2.1
Lecture 26 Organized Crime OB 2.1
Lecture 27 Shadow IT OB 2.1
Lecture 28 Threat Vectors and Attack Surfaces OB 2.2
Section 5: Vulnerabilities
Lecture 29 Vulnerabilities OB 2.3
Lecture 30 Memory injection and buffer overflows OB 2.3
Lecture 31 Race Conditions OB 2.3
Lecture 32 Malicious Updates OB 2.3
Lecture 33 OS-Based Vulnerabilities OB 2.3
Lecture 34 SQL Injections OB 2.3
Lecture 35 XSS OB 2.3
Lecture 36 Hardware Vulnerabilities OB 2.3
Lecture 37 VM Vulnerabilities OB 2.3
Lecture 38 Cloud-specific Vulnerabilities OB 2.3
Lecture 39 Supply Chain Vulnerabilities OB 2.3
Lecture 40 Cryptographic Vulnerabilities OB 2.3
Lecture 41 Misconfiguration OB 2.3
Lecture 42 Mobile Device Vulnerabilities OB 2.3
Lecture 43 Zero-day Vulnerabilities OB 2.3
Section 6: Signs of Attacks
Lecture 44 Malware OB 2.4
Lecture 45 Viruses OB 2.4
Lecture 46 Worms OB 2.4
Lecture 47 Trojans OB 2.4
Lecture 48 Ransomware OB 2.4
Lecture 49 Spyware OB 2.4
Lecture 50 Rootkit OB 2.4
Lecture 51 Logic Bomb OB 2.4
Lecture 52 Keyloggers OB 2.4
Lecture 53 Bloatware OB 2.4
Lecture 54 DDOS OB 2.4
Lecture 55 DNS OB 2.4
Lecture 56 Onpath Attack OB 2.4
Lecture 57 Credential Replay OB 2.4
Lecture 58 Privilege Escalation OB 2.4
Lecture 59 Request Forgery OB 2.4
Lecture 60 Directory Traversal OB 2.4
Lecture 61 Indicators of Malicious Activity OB 2.4
Section 7: Cryptography
Lecture 62 Intro to cryptography OB 1.4
Lecture 63 Crypto Terms OB 1.4
Lecture 64 Goals Cryptography OB 1.4
Lecture 65 Algorithm vs Keys OB 1.4
Lecture 66 Ciphers OB 1.4
Lecture 67 Symmetric Encryption OB 1.4
Lecture 68 Symmetric Algorithms OB 1.4
Lecture 69 Asymmetric Encryption OB 1.4
Lecture 70 Asymmetric Algorithms OB 1.4
Lecture 71 Hybrid Cryptography OB 1.4
Lecture 72 Hashing OB 1.4
Lecture 73 Hashing Algorithms OB 1.4
Lecture 74 Digital Signatures OB 1.4
Lecture 75 Intro to PKI OB 1.4
Lecture 76 PKI Purpose OB 1.4
Lecture 77 SSL/TLS Handshake OB 1.4
Lecture 78 PKI Process OB 1.4
Lecture 79 Certificates OB 1.4
Lecture 80 PKI Root of Trust OB 1.4
Lecture 81 PKI Verification and Revocation OB 1.4
Lecture 82 Steganography OB 1.4
Lecture 83 Blockchain OB 1.4
Lecture 84 Salting OB 1.4
Lecture 85 TPM OB 1.4
Lecture 86 Secure Enclave OB 1.4
Lecture 87 Obfuscation OB 1.4
Lecture 88 Tokenization OB 1.4
Lecture 89 Key Escrow OB 1.4
Lecture 90 HSM OB 1.4
Section 8: Social Engineering
Lecture 91 Social Engineering OB 2.2
Lecture 92 Phishing OB 2.2
Lecture 93 Vishing OB 2.2
Lecture 94 Smishing OB 2.2
Lecture 95 Spear Phishing OB 2.2
Lecture 96 Misinformation and Disinformation OB 2.2
Lecture 97 Impersonation OB 2.2
Lecture 98 Business Email Compromise OB 2.2
Lecture 99 Pretexting OB 2.2
Lecture 100 Watering Hole OB 2.2
Lecture 101 Brand Impersonation OB 2.2
Lecture 102 Typosquatting OB 2.2
Section 9: Securing IT Assets
Lecture 103 Segmentation OB 2.5
Lecture 104 Isolation OB 2.5
Lecture 105 Access Control OB 2.5
Lecture 106 Principles of Least Privilege OB 2.5
Lecture 107 Access Control List OB 2.5
Lecture 108 Filesystem Permissions OB 2.5
Lecture 109 Application Allow List OB 2.5
Lecture 110 Patching OB 2.5
Lecture 111 Configuration Enforcement OB 2.5
Lecture 112 Decommissioning OB 2.5
Lecture 113 Monitoring OB 2.5
Lecture 114 Hardening Techniques OB 2.5
Section 10: Security Principles
Lecture 115 Infrastructure Considerations OB 3.2
Lecture 116 Device Placement OB 3.2
Lecture 117 Security Zones OB 3.2
Lecture 118 Attack Surface OB 3.2
Lecture 119 Failure Modes OB 3.2
Lecture 120 Device Attributes OB 3.2
Lecture 121 Network Appliances and Sensors OB 3.2
Lecture 122 Jump Server OB 3.2
Lecture 123 Proxy Servers OB 3.2
Lecture 124 IDS/IPS OB 3.2
Lecture 125 Load Balancer OB 3.2
Lecture 126 802.1x and EAP OB 3.2
Lecture 127 Firewalls OB 3.2
Lecture 128 VPN OB 3.2
Lecture 129 SD-WAN OB 3.2
Lecture 130 Selecting Effective Controls OB 3.2
Section 11: Security Architecture
Lecture 131 Cloud OB 3.1
Lecture 132 Infrastructure as Code OB 3.1
Lecture 133 Serverless Architecture OB 3.1
Lecture 134 Microservices OB 3.1
Lecture 135 Air Gapped OB 3.1
Lecture 136 Software-Defined Networking OB 3.1
Lecture 137 On-Premises OB 3.1
Lecture 138 Centralized vs. Decentralized OB 3.1
Lecture 139 Virtualization OB 3.1
Lecture 140 Containerization OB 3.1
Lecture 141 High Availability OB 3.1
Lecture 142 IoT OB 3.1
Lecture 143 ICS OB 3.1
Lecture 144 Security Architecture Considerations OB 3.1
Lecture 145 RTOS and Embedded Systems OB 3.1
Section 12: Data Protection
Lecture 146 Regulated Data OB 3.3
Lecture 147 Intellectual Property OB 3.3
Lecture 148 Legal and Financial Data OB 3.3
Lecture 149 Data Classification OB 3.3
Lecture 150 Geolocation and Sovereignty OB 3.3
Lecture 151 Methods to Secure Data OB 3.3
Section 13: Common Security Techniques
Lecture 152 Secure Baselines OB 4.1
Lecture 153 Hardening Devices OB 4.1
Lecture 154 Installations of Mobile Devices OB 4.1
Lecture 155 Mobile Solutions and MDM OB 4.1
Lecture 156 Mobile Connection Methods OB 4.1
Lecture 157 Wireless Security OB 4.1
Lecture 158 Application Security Methods OB 4.1
Lecture 159 Security Monitoring OB 4.1
Section 14: Hardware, software and Data Asset Management
Lecture 160 Acquisition Procurement OB 4.2
Lecture 161 Assignment and Accounting OB 4.2
Lecture 162 Monitoring and Tracking OB 4.2
Lecture 163 Disposal and Decommission OB 4.2
Section 15: Vulnerability Management
Lecture 164 Vulnerability Scan OB 4.3
Lecture 165 Application Security Testing OB 4.3
Lecture 166 Threat Feeds OB 4.3
Lecture 167 Penetration Testing OB 4.3
Lecture 168 Bug Bounty Program OB 4.3
Lecture 169 False Positive vs. False Negative OB 4.3
Lecture 170 CVE and CVSS OB 4.3
Lecture 171 Vulnerability Responses OB 4.3
Section 16: Alerting and Monitoring IT
Lecture 172 Monitoring Resources OB 4.4
Lecture 173 Monitoring Activities OB 4.4
Lecture 174 Alerting and Monitoring Tools SIEM and DLP's OB 4.4
Section 17: Enhance Security
Lecture 175 Firewall Configuration OB 4.5
Lecture 176 Web Filters OB 4.5
Lecture 177 Operating System Security OB 4.5
Lecture 178 Secure Protocols OB 4.5
Lecture 179 DNS Filter OB 4.5
Lecture 180 Email security OB 4.5
Lecture 181 File Integrity Monitoring OB 4.5
Lecture 182 Network Access Control OB 4.5
Lecture 183 EDR OB 4.5
Lecture 184 User Behavior Analytics OB 4.5
Section 18: Identity and Access Management (IAM)
Lecture 185 Provisioning Users OB 4.6
Lecture 186 Single Sign-on OB 4.6
Lecture 187 Federation and SAML OB 4.6
Lecture 188 Access Control Models OB 4.6
Lecture 189 Multifactor Authentication OB 4.6
Lecture 190 Authentication tokens OB 4.6
Lecture 191 Biometric OB 4.6
Lecture 192 Password Management OB 4.6
Section 19: Automation and Orchestration
Lecture 193 Automation and Orchestration OB 4.7
Section 20: Incident Response
Lecture 194 Incident Response Steps OB 4.8
Lecture 195 Incident Response Training OB 4.8
Lecture 196 Digital Forensics OB 4.8
Section 21: Supporting an investigation
Lecture 197 Types of logs OB 4.9
Section 22: Security Governance
Lecture 198 Security Polices, Standards, Guidelines and Procedures OB 5.1
Lecture 199 Security Governance Considerations and Revisions OB 5.1
Lecture 200 Security Governance Structures OB 5.1
Lecture 201 Security Governance Roles OB 5.1
Section 23: Risk Management
Lecture 202 Risk Terms OB 5.2
Lecture 203 Risk Identification and Assessment Times OB 5.2
Lecture 204 Quantitative and Qualitive Risk Assessment OB 5.2
Lecture 205 Risk Register OB 5.2
Lecture 206 Risk Appetite OB 5.2
Lecture 207 Risk Response OB 5.2
Lecture 208 Business Impact Assessment OB 5.2
Section 24: Vendor Management
Lecture 209 Vendor Assessment and Selection OB 5.3
Lecture 210 Vendor Agreements OB 5.3
Section 25: Security Compliance
Lecture 211 Compliance Reporting OB 5.4
Lecture 212 Privacy OB 5.4
Section 26: Audits and Assessments
Lecture 213 Internal and External Assessments OB 5.5
Lecture 214 Penetration Test OB 5.5
Section 27: Security Awareness Training
Lecture 215 Training against Phishing OB 5.6
Lecture 216 Security Awareness Program OB 5.6
Section 28: Physical Security
Lecture 217 Physical Security
Lecture 218 Deception and Disruption Technology
Section 29: Changement Management
Lecture 219 Change management OB 1.3
Lecture 220 Technical Implications OB 1.3
Section 30: Resilience and Recovery
Lecture 221 High Availability OB 3.4
Lecture 222 Site Selection OB 3.4
Lecture 223 Capacity Planning OB 3.4
Lecture 224 Testing OB 3.4
Lecture 225 Backups OB 3.4
Lecture 226 Power OB 3.4
Section 31: Labs
Lecture 227 Lab intro
Lecture 228 Installing Windows on VirtualBox
Lecture 229 Installing Kali Linux
Lecture 230 Using Snapshots
Lecture 231 Using an IP Scanner
Lecture 232 Using the Nessus Vulnerability scanner
Lecture 233 Cracking a Password with Kali
Lecture 234 Cracking a password with a lookup table
Lecture 235 Scanner a website for vulnerabilities
Lecture 236 Using Wireshark to capture network traffic
Lecture 237 Installing and Using SSH
Lecture 238 Securing Windows with Password Complexity
Lecture 239 Using Steganography to hide messages
Lecture 240 Encrypting a hard drive
Lecture 241 Implementing Role Based Access Control in Windows
Lecture 242 Assigning Permissions to folders
Lecture 243 Configure Firewall rules
Lecture 244 Updating a Computer
Lecture 245 Hardening a Desktop using group policy
Lecture 246 Securing a wireless network
Lecture 247 Using Encrypting File System
Lecture 248 Backing up router configuration
Lecture 249 Updating firmware on a router
Lecture 250 Configuring a DMZ
Lecture 251 Using tor network
Lecture 252 Configuring VLAN's
Lecture 253 Setting up an IPS
Lecture 254 Configuring web filters
Anyone looking to get CompTIA Security+ Certified

Homepage
https://www.udemy.com/course/comptia_security_plus/






Rapidgator
http://peeplink.in/51ed5f6e9f50
Uploadgig Free Links
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part01.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part02.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part03.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part04.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part05.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part06.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part07.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part08.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part09.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part10.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part11.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part12.rar
NitroFlare
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part01.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part02.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part03.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part04.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part05.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part06.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part07.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part08.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part09.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part10.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part11.rar
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part12.rar
Fikper Free Links
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part01.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part02.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part03.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part04.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part05.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part06.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part07.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part08.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part09.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part10.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part11.rar.html
oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part12.rar.html

No Password - Links are Interchangeable
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.