17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Security + Comptia Security Plus Sy0-701 Certification Prep
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Language: English | Size: 3.99 GB | Duration: 17h 54m
CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job
What you'll learn
Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand.
What is CompTIA Security+ exam?
Oak Academy offers top-rated CompTIA Security+ exam prep courses to help you prepare for the job market.
Why is the CompTIA Security + course important?
All information on CompTIA Security + exam topics.
What are Attacks, Threats and Vulnerabilities in comtia?
What should the architecture and design covered under CompTIA Security + be?
What are network topologies and network attacks?
What is threat, what are threat types, how is threat analysis done?
What are Social Engineering Attacks?
What is a database, how is Database Security provided?
What is Cryptography and PKI? What type of Cryptography is used?
comptia security
CompTIA Security+(SYO-701)
comptia server
comptia security plus
CompTIA Security+certification
comptia sec+
comptia
CompTIA Security+(SYo-701)
Requirements
Desire to get CompTIA Security + certification
Watching the lecture videos completely, to the end and in order.
Internet Connection
Any device you can watch the course, such as a mobile phone, computer or tablet
Determination and patience to learn
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Introduction to Security CompTIA Security Plus SY0701 Certification Prep/1 - Introduction to security.mp4
27.9 MB
~Get Your Files Here !/10 - Intrusion Detection Systems/53 - Understanding IDSs and IPSs.mp4
36.2 MB
~Get Your Files Here !/10 - Intrusion Detection Systems/54 - Detection Methods.mp4
17.2 MB
~Get Your Files Here !/10 - Intrusion Detection Systems/55 - Honeypots.mp4
19.1 MB
~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/56 - Using VPNs for Remote Access.mp4
46.2 MB
~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/57 - VPN Tunnel Protocols.mp4
20.6 MB
~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/58 - SitetoSite VPNs.mp4
13.6 MB
~Get Your Files Here !/12 - Security Threats/59 - Understanding Threat Actors.mp4
56.2 MB
~Get Your Files Here !/12 - Security Threats/60 - Viruses.mp4
9 MB
~Get Your Files Here !/12 - Security Threats/61 - Logic Bombs.mp4
9.5 MB
~Get Your Files Here !/12 - Security Threats/62 - Trojans.mp4
16 MB
~Get Your Files Here !/12 - Security Threats/63 - Ransomware.mp4
13.6 MB
~Get Your Files Here !/12 - Security Threats/64 - Spyware.mp4
8.8 MB
~Get Your Files Here !/12 - Security Threats/65 - Bots and Botnets.mp4
13.1 MB
~Get Your Files Here !/12 - Security Threats/66 - Unified Threat ManagementUTM.mp4
23.7 MB
~Get Your Files Here !/13 - Securing Wireless Networks/67 - Disable SSID Broadcasting or Not.mp4
4.2 MB
~Get Your Files Here !/13 - Securing Wireless Networks/68 - Enable MAC Filtering.mp4
9.1 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/69 - Disassociation Attacks.mp4
8.5 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/70 - WPS and WPS Attacks.mp4
7.5 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/71 - Rogue AP.mp4
8.5 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/72 - Evil Twin.mp4
8 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/73 - Jamming Attacks.mp4
16.9 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/74 - Bluetooth Attacks.mp4
9.8 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/75 - RFID Attacks.mp4
8.7 MB
~Get Your Files Here !/14 - Understanding Wireless Attacks/76 - Wireless Replay Attacks.mp4
5.7 MB
~Get Your Files Here !/15 - Network Attacks/77 - Network Attacks.mp4
15.6 MB
~Get Your Files Here !/15 - Network Attacks/78 - SYN Flood Attack.mp4
12.2 MB
~Get Your Files Here !/15 - Network Attacks/79 - MAC Flood Attacks.mp4
11.7 MB
~Get Your Files Here !/15 - Network Attacks/80 - ManintheMiddle Attacks.mp4
6.7 MB
~Get Your Files Here !/15 - Network Attacks/81 - ARP Poisoning Attacks.mp4
19.3 MB
~Get Your Files Here !/15 - Network Attacks/82 - DNS Attacks.mp4
32.8 MB
~Get Your Files Here !/16 - Password Attacks/83 - Brute Force Attacks.mp4
18.8 MB
~Get Your Files Here !/16 - Password Attacks/84 - Password Hashes.mp4
22.7 MB
~Get Your Files Here !/16 - Password Attacks/85 - Birthday Attacks.mp4
27 MB
~Get Your Files Here !/16 - Password Attacks/86 - Replay Attacks.mp4
13.3 MB
~Get Your Files Here !/16 - Password Attacks/87 - Hijacking and Related Attacks.mp4
21.7 MB
~Get Your Files Here !/16 - Password Attacks/88 - Driver Manipulation.mp4
11.2 MB
~Get Your Files Here !/17 - ZeroDay Attacks/89 - ZeroDay Attacks.mp4
15.3 MB
~Get Your Files Here !/18 - Code Attacks/90 - Code Reuse and SDKs.mp4
16.8 MB
~Get Your Files Here !/18 - Code Attacks/91 - Code Quality and Testing.mp4
11.3 MB
~Get Your Files Here !/18 - Code Attacks/92 - Development LifeCycle Models.mp4
14.4 MB
~Get Your Files Here !/18 - Code Attacks/93 - Secure DevOps.mp4
12.5 MB
~Get Your Files Here !/18 - Code Attacks/94 - Version Control and Change Management.mp4
10 MB
~Get Your Files Here !/18 - Code Attacks/95 - Provisioning and Deprovisioning.mp4
7.3 MB
~Get Your Files Here !/19 - Web Server Attacks/100 - CrossSite Scripting.mp4
25.1 MB
~Get Your Files Here !/19 - Web Server Attacks/96 - Web Servers.mp4
5.4 MB
~Get Your Files Here !/19 - Web Server Attacks/97 - SQL Injection Attacks.mp4
19.6 MB
~Get Your Files Here !/19 - Web Server Attacks/98 - Protecting Against SQL Injection Attacks.mp4
11.1 MB
~Get Your Files Here !/19 - Web Server Attacks/99 - DLL Injection.mp4
11.8 MB
~Get Your Files Here !/2 - Basic Security Concepts/10 - Introducing Basic Risk Concepts.mp4
11.1 MB
~Get Your Files Here !/2 - Basic Security Concepts/2 - What is Security.mp4
8.5 MB
~Get Your Files Here !/2 - Basic Security Concepts/3 - PrivacyIntegrityAvailability.mp4
15.1 MB
~Get Your Files Here !/2 - Basic Security Concepts/4 - Encryption and Access Control.mp4
11.8 MB
~Get Your Files Here !/2 - Basic Security Concepts/5 - 3 A Rule Authentication Authorization and Accounting.mp4
12.1 MB
~Get Your Files Here !/2 - Basic Security Concepts/6 - Threat.mp4
12.6 MB
~Get Your Files Here !/2 - Basic Security Concepts/7 - What is a Hacker.mp4
17.7 MB
~Get Your Files Here !/2 - Basic Security Concepts/8 - What is Attack What are the Stages.mp4
12 MB
~Get Your Files Here !/2 - Basic Security Concepts/9 - Single Point Of Failure SPOF.mp4
10.4 MB
~Get Your Files Here !/20 - Social Engineering Attacks/101 - Social Engineering.mp4
20.5 MB
~Get Your Files Here !/20 - Social Engineering Attacks/102 - Shoulder Surfing.mp4
4.4 MB
~Get Your Files Here !/20 - Social Engineering Attacks/103 - Tricking Users with Hoaxes.mp4
5 MB
~Get Your Files Here !/20 - Social Engineering Attacks/104 - Tailgating and Mantraps.mp4
5.7 MB
~Get Your Files Here !/20 - Social Engineering Attacks/105 - Dumpster Diving.mp4
7.6 MB
~Get Your Files Here !/20 - Social Engineering Attacks/106 - Watering Hole Attacks.mp4
5.6 MB
~Get Your Files Here !/20 - Social Engineering Attacks/107 - Spam.mp4
9.5 MB
~Get Your Files Here !/20 - Social Engineering Attacks/108 - Phishing.mp4
59.8 MB
~Get Your Files Here !/20 - Social Engineering Attacks/109 - Whaling.mp4
13.1 MB
~Get Your Files Here !/20 - Social Engineering Attacks/110 - Vishing.mp4
14.8 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/111 - Buffer Overflow Attacks.mp4
17.2 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/112 - Pointer Dereference.mp4
8.5 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/113 - Compiled Versus Runtime Code.mp4
5.4 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/114 - Proper Input Validation.mp4
16.6 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/115 - Side Input Validation.mp4
13.3 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/116 - Avoiding Race Conditions.mp4
9.8 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/117 - Proper Error Handling.mp4
9.1 MB
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/118 - Cryptographic Techniques.mp4
7 MB
~Get Your Files Here !/22 - Preventing Attacks/119 - Protecting Systems from Malware.mp4
8.3 MB
~Get Your Files Here !/22 - Preventing Attacks/120 - Antivirus and AntiMalware Software.mp4
44.3 MB
~Get Your Files Here !/22 - Preventing Attacks/121 - Advanced Malware Tools.mp4
13.3 MB
~Get Your Files Here !/22 - Preventing Attacks/122 - Educating Users.mp4
7.5 MB
~Get Your Files Here !/23 - Server Security/123 - Implementing Secure Systems.mp4
17.9 MB
~Get Your Files Here !/23 - Server Security/124 - Operating systems.mp4
12.7 MB
~Get Your Files Here !/23 - Server Security/125 - Secure Operating System Configurations.mp4
36.4 MB
~Get Your Files Here !/23 - Server Security/126 - Resiliency and Automation Strategies.mp4
26.5 MB
~Get Your Files Here !/23 - Server Security/127 - Change Management Policy.mp4
64.8 MB
~Get Your Files Here !/23 - Server Security/128 - Secure Staging and Deployment.mp4
22.8 MB
~Get Your Files Here !/23 - Server Security/129 - Peripherals.mp4
20.7 MB
~Get Your Files Here !/23 - Server Security/130 - EMI and EMP.mp4
34.5 MB
~Get Your Files Here !/23 - Server Security/131 - Hardware Security Module.mp4
8.3 MB
~Get Your Files Here !/23 - Server Security/132 - Cloud Deployment Models.mp4
19.5 MB
~Get Your Files Here !/23 - Server Security/133 - Cloud Services.mp4
67.3 MB
~Get Your Files Here !/23 - Server Security/134 - Security Responsibilities with Cloud Models.mp4
11.6 MB
~Get Your Files Here !/23 - Server Security/135 - Advanced Cloud Services.mp4
16.6 MB
~Get Your Files Here !/24 - Mobile Devices/136 - Deploying Mobile Devices Securely.mp4
7.1 MB
~Get Your Files Here !/24 - Mobile Devices/137 - Deployment Models.mp4
44.3 MB
~Get Your Files Here !/24 - Mobile Devices/138 - Mobile Device Management.mp4
39.2 MB
~Get Your Files Here !/24 - Mobile Devices/139 - Unauthorized Connections.mp4
15.3 MB
~Get Your Files Here !/24 - Mobile Devices/140 - Hardware Control.mp4