17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
CompTIA Security+ SY0-701
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
CompTIA Security+ (SY0-701) is designed to prepare you for the SY0-701 version of the Security+ exam. It is an engaging self-paced video training solution that provides learners with more than 27.5 hours of personal training from security expert Sari Greene.
With topic-focused instructional videos, you will gain an in-depth understanding of each exam objective in the CompTIA Security+ (SY0-701) exam, as well as a deeper understanding of security foundations and principles to ensure exam success. This self-paced video course maps to the CompTIA Security+ Certification Exam Objectives for the SY0-701 exam, which has been updated to reflect current and emerging cybersecurity trends and techniques. At the end of every sub lesson youll find a three-second challenge, a Security-in-Action case study, and a word cloud that displays key concepts and terminology.
At the end of every lesson, you’ll find a Deep Dive quiz to help you assess your knowledge and progress.
At the end of every module, you’ll find practical application Closer Look labs.
Skill Level
Intermediary to Advanced
Learn How To
Confidently understand every objective on the CompTIA Security+ examthis course covers every objective and topic in depth.
Prepare for exam successSari shares her best practices for studying for and taking the Security+ exam.
Enhance your real-world cybersecurity skills and knowledge.
Course Requirement
CompTIA recommends but does not require at least two years of experience in IT administration with a focus on security prior to taking the certification exam.
Who Should Take This Course
Anyone preparing for the CompTIA Security+ examination. Secondary audience: IT professionals
Anyone interested in learning security fundamentals
Released 9/2023
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
15 B
.pad/1
93 B
TutsNode.org.txt
63 B
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 1 Compare and Contrast Various Types of Security Controls/001. Learning objectives en.srt
718 B
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 1 Compare and Contrast Various Types of Security Controls/002. 1.1 Control Objectives en.srt
32.1 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 1 Compare and Contrast Various Types of Security Controls/003. 1.2 Control Categories and Classifications en.srt
19.7 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/002. 10.1 Computing Architecture Models en.srt
17.9 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/003. 10.2 Cloud Services en.srt
33.8 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/004. 10.3 Cloud Infrastructure en.srt
20.1 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/005. 10.4 Data Center Solution Elements en.srt
20.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/006. 10.5 Virtualization en.srt
18.1 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/007. 10.6 Embedded Systems en.srt
21.1 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/009. 10.8 Deep Dive Quiz en.srt
25.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/002. 11.1 Network Devices en.srt
17.7 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/003. 11.2 Network Access Control en.srt
26.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/004. 11.3 Firewalls en.srt
29.1 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/005. 11.4 Secure Communications en.srt
22.1 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/002. 12.1 Data Types en.srt
34 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/002. 12.1 Data Types.mp4
85.8 MB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/003. 12.2 Data Classification en.srt
20.2 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/004. 12.3 Data Protection en.srt
19.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/002. 13.1 Backup and Recovery en.srt
20.8 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/003. 13.2 Resiliency Concepts en.srt
26.7 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/004. 13.3 Continuity of Operations en.srt
21.9 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/002. 14.1 Secure Baselines and Hardening Targets en.srt
21 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/003. 14.2 Wireless Configuration en.srt
19.8 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/004. 14.3 Wireless Design en.srt
23.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/006. 14.5 Mobile Device Management en.srt
19.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/007. 14.6 Application Security en.srt
22.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/009. 14.8 Deep Dive Quiz en.srt
17.9 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/002. 15.1 Asset Management en.srt
18.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/003. 15.2 Deletion, Disposal, and Destruction en.srt
21.7 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 16 Explain Various Activities Associated with Vulnerability Management/002. 16.1 Vulnerability Identification en.srt
20.9 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 16 Explain Various Activities Associated with Vulnerability Management/003. 16.2 Vulnerability Response and Remediation en.srt
27.7 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/002. 17.1 Logging and Analysis en.srt
26.9 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/003. 17.2 SNMP, NetFlow, and SCAP en.srt
17.7 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/002. 18.1 Enhancing Security with Network Devices en.srt
19.2 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/003. 18.2 TCPIP and Secure Protocols en.srt
31.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/006. 18.5 Deep Dive Quiz en.srt
22.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/002. 19.1 Identity and Access Management (IAM) en.srt
26.8 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/003. 19.2 Federated Identity en.srt
20.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/004. 19.3 Authentication en.srt
24.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/006. 19.5 Access Control and Authorization en.srt
27.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/008. 19.7 Deep Dive Quiz en.srt
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 2 Summarize Fundamental Security Concepts/007. 2.6 Deep Dive Quiz en.srt
27.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/002. 20.1 Scripting, Automation, and Orchestration en.srt
21 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/003. 20.2 Deep Dive Quiz en.srt
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 24 Explain Elements of the Risk Management Process/003. 24.2 Risk Assessment and Analysis en.srt
25.5 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 24 Explain Elements of the Risk Management Process/004. 24.3 Risk Response and Treatment en.srt
19.2 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 24 Explain Elements of the Risk Management Process/005. 24.4 Business Impact Analysis en.srt
24.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 24 Explain Elements of the Risk Management Process/006. 24.5 Deep Dive Quiz en.srt
23.8 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/002. 25.1 Third-party Risk Management en.srt
19.5 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 26 Summarize Elements of Effective Security Compliance/003. 26.2 Privacy Principles en.srt
27.5 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 27 Explain Types and Purposes of Audits and Assessment/002. 27.1 Audit and Assurance en.srt
21.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 27 Explain Types and Purposes of Audits and Assessment/003. 27.2 Penetration Testing Concepts en.srt
19 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 27 Explain Types and Purposes of Audits and Assessment/004. 27.3 Penetration Testing Tools and Techiques en.srt
18.5 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 28 Given a Scenario, Implement Security Awareness Practices/002. 28.1 Education, Training, and Awareness en.srt
33.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/001. Learning objectives en.srt
667 B
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/002. 3.1 Configuration Management en.srt
19.8 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/003. 3.2 Change Management en.srt
20.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/001. Learning objectives en.srt
1.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/002. 4.1 Cryptography Primer en.srt
24.9 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/003. 4.2 Encryption en.srt
33 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/003. 4.2 Encryption.mp4
80.5 MB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/004. 4.3 Hashing and Digital Signatures en.srt
25.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/005. 4.4 Digital Certificates en.srt
19.5 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/008. 4.7 Deep Dive Quiz en.srt
23.9 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/001. Learning objectives en.srt
671 B
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 5 Compare and Contrast Common Threat Actors and Motivations/002. 5.1 Threat Actors and Attributes en.srt
25.5 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/001. Learning objectives en.srt
722 B
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/002. 6.1 Operational Threat Vectors en.srt
23.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/003. 6.2 Third-Party and Supply Chain Threat Vectors en.srt
24.6 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/004. 6.3 Social Engineering en.srt
35.4 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 6 Explain Common Threat Vectors and Attack Surfaces/004. 6.3 Social Engineering.mp4
81.5 MB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 7 Explain Various Types of Vulnerabilities/001. Learning objectives en.srt
644 B
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/001. Learning objectives en.srt
802 B
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/003. 8.2 Malware Attacks en.srt
21.7 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/005. 8.4 Digital Infrastructure Attacks en.srt
19.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/006. 8.5 Application Attacks en.srt
20.2 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/008. 8.7 Cryptographic Attacks en.srt
24.1 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/009. 8.8 Deep Dive Quiz en.srt
22.8 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/001. Learning objectives en.srt
1.3 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/002. 9.1 Secure Design Principles en.srt
20 KB
[TutsNode.org] - CompTIA Security+ SY0-701/Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/003. 9.2 Segmentation en.srt