|  

CompTIA Security+ SY0-701



Size :6.2 GB
Peers : Seeders : 0      Leechers : 0
Added : 11 months ago » by tutsnode » in Other
Language : English
Last Updated :5 months ago
Info_Hash :2E2281B5A17A4640F91E48984A5ED5D9842EB133

Torrent File Contents

CompTIA Security+ SY0-701
  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/002. 12.1 Data Types.mp4
  -  85.82 MB

  TutsNode.org.txt
  -  63 Bytes

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/004. 6.3 Social Engineering en.srt
  -  35.38 KB

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/002. 12.1 Data Types en.srt
  -  33.95 KB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/001. Learning objectives en.srt
  -  718 Bytes

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/003. 10.2 Cloud Services en.srt
  -  33.82 KB

  [TutsNode.org] - Lesson 28 Given a Scenario, Implement Security Awareness Practices/002. 28.1 Education, Training, and Awareness en.srt
  -  33.56 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/003. 4.2 Encryption en.srt
  -  33.05 KB

  [TutsNode.org] - Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/003. 20.2 Deep Dive Quiz en.srt
  -  10.45 KB

  .pad/0
  -  15 Bytes

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/004. 6.3 Social Engineering.mp4
  -  81.46 MB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/002. 1.1 Control Objectives en.srt
  -  32.13 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/001. Learning objectives en.srt
  -  754 Bytes

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/003. 18.2 TCPIP and Secure Protocols en.srt
  -  31.58 KB

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/003. 23.2 Governance Documents en.srt
  -  29.12 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/004. 11.3 Firewalls en.srt
  -  29.08 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/004. 2.3 Physical Security en.srt
  -  28.06 KB

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/003. 16.2 Vulnerability Response and Remediation en.srt
  -  27.67 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/007. 2.6 Deep Dive Quiz en.srt
  -  27.65 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/006. 19.5 Access Control and Authorization en.srt
  -  27.55 KB

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/003. 26.2 Privacy Principles en.srt
  -  27.47 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/002. 17.1 Logging and Analysis en.srt
  -  26.92 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/002. 19.1 Identity and Access Management (IAM) en.srt
  -  26.85 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/003. 13.2 Resiliency Concepts en.srt
  -  26.72 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/003. 11.2 Network Access Control en.srt
  -  26.56 KB

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/002. 23.1 Governance Structure en.srt
  -  26.4 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/001. Learning objectives en.srt
  -  667 Bytes

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/008. 19.7 Deep Dive Quiz en.srt
  -  26.25 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/003. 24.2 Risk Assessment and Analysis en.srt
  -  25.53 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/002. 5.1 Threat Actors and Attributes en.srt
  -  25.5 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/004. 4.3 Hashing and Digital Signatures en.srt
  -  25.38 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/009. 10.8 Deep Dive Quiz en.srt
  -  25.27 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/002. 4.1 Cryptography Primer en.srt
  -  24.9 KB

  [TutsNode.org] - Module 1 General Security Concepts/001. Module introduction en.srt
  -  2.01 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/001. Learning objectives en.srt
  -  1.28 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/003. 6.2 Third-Party and Supply Chain Threat Vectors en.srt
  -  24.56 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/005. 24.4 Business Impact Analysis en.srt
  -  24.38 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/004. 19.3 Authentication en.srt
  -  24.33 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/008. 8.7 Cryptographic Attacks en.srt
  -  24.1 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/008. 4.7 Deep Dive Quiz en.srt
  -  23.93 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/006. 24.5 Deep Dive Quiz en.srt
  -  23.81 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/007. 21.6 Deep Dive Quiz en.srt
  -  23.73 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/004. 21.3 Evidence Handling en.srt
  -  23.32 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/002. 6.1 Operational Threat Vectors en.srt
  -  23.3 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/004. 14.3 Wireless Design en.srt
  -  23.25 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/009. 8.8 Deep Dive Quiz en.srt
  -  22.84 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/007. 14.6 Application Security en.srt
  -  22.64 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/003. 2.2 Zero Trust en.srt
  -  22.63 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/006. 18.5 Deep Dive Quiz en.srt
  -  22.35 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/005. 11.4 Secure Communications en.srt
  -  22.09 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/001. Learning objectives en.srt
  -  671 Bytes

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/004. 13.3 Continuity of Operations en.srt
  -  21.9 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/003. 15.2 Deletion, Disposal, and Destruction en.srt
  -  21.72 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/003. 8.2 Malware Attacks en.srt
  -  21.66 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/005. 2.4 Environmental Impact en.srt
  -  21.48 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/002. 27.1 Audit and Assurance en.srt
  -  21.41 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/002. 21.1 Incident Management en.srt
  -  21.27 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/005. 21.4 Forensic Examination en.srt
  -  21.17 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/001. Learning objectives en.srt
  -  722 Bytes

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/007. 10.6 Embedded Systems en.srt
  -  21.13 KB

  [TutsNode.org] - Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/002. 20.1 Scripting, Automation, and Orchestration en.srt
  -  21.01 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/002. 14.1 Secure Baselines and Hardening Targets en.srt
  -  20.97 KB

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/002. 16.1 Vulnerability Identification en.srt
  -  20.94 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/002. 13.1 Backup and Recovery en.srt
  -  20.75 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/003. 19.2 Federated Identity en.srt
  -  20.56 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/003. 3.2 Change Management en.srt
  -  20.44 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/005. 10.4 Data Center Solution Elements en.srt
  -  20.3 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/006. 8.5 Application Attacks en.srt
  -  20.19 KB

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/001. Learning objectives en.srt
  -  644 Bytes

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/003. 12.2 Data Classification en.srt
  -  20.16 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/004. 10.3 Cloud Infrastructure en.srt
  -  20.12 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/002. 9.1 Secure Design Principles en.srt
  -  19.98 KB

  [TutsNode.org] - Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/002. 22.1 Data Sources en.srt
  -  19.86 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/002. 3.1 Configuration Management en.srt
  -  19.83 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/003. 14.2 Wireless Configuration en.srt
  -  19.82 KB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/003. 1.2 Control Categories and Classifications en.srt
  -  19.66 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/001. Learning objectives en.srt
  -  802 Bytes

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/003. 21.2 Incident Response en.srt
  -  19.59 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/006. 14.5 Mobile Device Management en.srt
  -  19.58 KB

  [TutsNode.org] - Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/002. 25.1 Third-party Risk Management en.srt
  -  19.53 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/005. 4.4 Digital Certificates en.srt
  -  19.48 KB

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/004. 12.3 Data Protection en.srt
  -  19.36 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/005. 8.4 Digital Infrastructure Attacks en.srt
  -  19.31 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/004. 24.3 Risk Response and Treatment en.srt
  -  19.19 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/002. 18.1 Enhancing Security with Network Devices en.srt
  -  19.17 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/006. 21.5 Disclosure and Notification en.srt
  -  19.14 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/006. 10.5 Virtualization en.srt
  -  18.07 KB

  .pad/1
  -  93 Bytes

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/003. 4.2 Encryption.mp4
  -  80.54 MB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/003. 27.2 Penetration Testing Concepts en.srt
  -  19.01 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/004. 27.3 Penetration Testing Tools and Techiques en.srt
  -  18.49 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/002. 15.1 Asset Management en.srt
  -  18.43 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/002. 2.1 Security and Privacy Principles en.srt
  -  18.28 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/002. 10.1 Computing Architecture Models en.srt
  -  17.92 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/001. Learning objectives en.srt
  -  1.26 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/009. 14.8 Deep Dive Quiz en.srt
  -  17.85 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/003. 9.2 Segmentation en.srt
  -  17.85 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/002. 11.1 Network Devices en.srt
  -  17.71 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/003. 17.2 SNMP, NetFlow, and SCAP en.srt
  -  17.71 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/005. 14.4 Mobile Connectivity en.srt
  -  17.21 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/007. 19.6 Privileged Access Management en.srt
  -  16.97 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/007. 8.6 Wireless Attacks en.srt
  -  16.69 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/001. Learning objectives en.srt
  -  843 Bytes

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/003. 7.2 Network, OS, and Cloud Vulnerabilities en.srt
  -  16.56 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/008. 10.7 Internet of Things (IoT) en.srt
  -  16.47 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/004. 18.3 Email Security en.srt
  -  16.45 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/004. 8.3 Brute Force Attacks en.srt
  -  16.35 KB

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/002. 7.1 Vulnerability Primer en.srt
  -  16.27 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/005. 19.4 Biometrics en.srt
  -  16.04 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/003. 5.2 Threat Modeling and Intelligence en.srt
  -  15.9 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/005. 27.4 Deep Dive Quiz en.srt
  -  15.88 KB

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/002. 26.1 Compliance Monitoring en.srt
  -  15.71 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/004. 15.3 Deep Dive Quiz en.srt
  -  15.68 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/002. 24.1 Risk Concepts en.srt
  -  15.64 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/004. 3.3 Deep Dive Quiz en.srt
  -  15.31 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/004. 9.3 Deep Dive Quiz en.srt
  -  15.1 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/006. 11.5 Deep Dive Quiz en.srt
  -  15.09 KB

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/004. 7.3 Deep Dive Quiz en.srt
  -  15.06 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/006. 4.5 Emerging Cryptography en.srt
  -  12.27 KB

  .pad/2
  -  43 Bytes

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/003. 18.2 TCPIP and Secure Protocols.mp4
  -  75.33 MB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/006. 2.5 Deception and Disruption en.srt
  -  14.67 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/005. 6.4 Deep Dive Quiz en.srt
  -  14.65 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/005. 13.4 Deep Dive Quiz en.srt
  -  14.22 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/008. 14.7 Secure Coding en.srt
  -  14.01 KB

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/004. 23.3 Deep Dive Quiz en.srt
  -  13.75 KB

  [TutsNode.org] - Module 5 Closer Look Labs/002. Policies and standards en.srt
  -  13.75 KB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/004. 1.3 Deep Dive Quiz en.srt
  -  13.6 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/002. 8.1 Indicators of Malicious Activity en.srt
  -  13.32 KB

  [TutsNode.org] - Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/003. 25.2 Deep Dive Quiz en.srt
  -  13.31 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/005. 18.4 Group Policy and SELinux en.srt
  -  13.05 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/004. 17.3 Deep Dive Quiz en.srt
  -  13.04 KB

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/001. Learning objectives en.srt
  -  645 Bytes

  [TutsNode.org] - Module 4 Closer Look Labs/003. IPv6 Addressing en.srt
  -  12.91 KB

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/004. 16.3 Deep Dive Quiz en.srt
  -  12.75 KB

  [TGx]Downloaded from torrentgalaxy.buzz .txt
  -  585 Bytes

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/005. 12.4 Deep Dive Quiz en.srt
  -  12.41 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/004. 5.3 Deep Dive Quiz en.srt
  -  10.84 KB

  [TutsNode.org] - Lesson 28 Given a Scenario, Implement Security Awareness Practices/003. 28.2 Deep Dive Quiz en.srt
  -  10.76 KB

  [TutsNode.org] - Introduction/001. CompTIA Security+ SY0-701 Introduction en.srt
  -  10.7 KB

  [TutsNode.org] - Module 3 Closer Look Labs/002. SSL and TLS Packet Capture en.srt
  -  10.39 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/007. 4.6 Steganography en.srt
  -  10.28 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/001. Learning objectives en.srt
  -  963 Bytes

  [TutsNode.org] - Module 4 Closer Look Labs/006. Log files en.srt
  -  9.75 KB

  [TutsNode.org] - Module 2 Closer Look Labs/002. Malware Analysis en.srt
  -  9.56 KB

  [TutsNode.org] - Module 5 Closer Look Labs/003. Quantitative Risk Analysis en.srt
  -  9.29 KB

  [TutsNode.org] - Module 4 Closer Look Labs/001. PowerShell en.srt
  -  9.12 KB

  [TutsNode.org] - Module 1 Closer Look Labs/003. Digital Certificates en.srt
  -  9.1 KB

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/004. 26.3 Deep Dive Quiz en.srt
  -  8.89 KB

  [TutsNode.org] - Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/003. 22.2 Deep Dive Quiz en.srt
  -  8.86 KB

  [TutsNode.org] - Module 4 Closer Look Labs/002. Pwned Passwords en.srt
  -  8.86 KB

  [TutsNode.org] - Module 2 Closer Look Labs/003. Constructing Error Messages en.srt
  -  8.78 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/001. Learning objectives en.srt
  -  989 Bytes

  [TutsNode.org] - Module 4 Closer Look Labs/005. ZenMap en.srt
  -  8.6 KB

  [TutsNode.org] - Module 4 Closer Look Labs/004. Wireless Heat Maps en.srt
  -  7.99 KB

  [TutsNode.org] - Module 5 Closer Look Labs/004. Privacy Walkthrough en.srt
  -  7.39 KB

  [TutsNode.org] - Module 3 Closer Look Labs/003. Cloud Controls en.srt
  -  7.34 KB

  [TutsNode.org] - Module 1 Closer Look Labs/002. Hashing and HMACS en.srt
  -  7.29 KB

  [TutsNode.org] - Module 5 Closer Look Labs/001. Passive Reconnaissance en.srt
  -  6.71 KB

  [TutsNode.org] - Module 2 Closer Look Labs/005. Zero-day Vulnerabilities en.srt
  -  6.54 KB

  [TutsNode.org] - Module 1 Closer Look Labs/001. Honeypots en.srt
  -  5.61 KB

  [TutsNode.org] - Module 3 Closer Look Labs/001. RAID en.srt
  -  5.58 KB

  [TutsNode.org] - Module 4 Closer Look Labs/007. Ram Capture en.srt
  -  5.14 KB

  [TutsNode.org] - Module 2 Closer Look Labs/004. Threat Intelligence Workflow en.srt
  -  4.48 KB

  [TutsNode.org] - Module 2 Closer Look Labs/001. Phone and Text Spoofing en.srt
  -  4.41 KB

  [TutsNode.org] - Module 4 Security Operations/001. Module introduction en.srt
  -  2.38 KB

  [TutsNode.org] - Module 2 Threats, Vulnerabilities and Mitigations/001. Module introduction en.srt
  -  2.35 KB

  [TutsNode.org] - Module 5 Security Program Management and Oversight/001. Module introduction en.srt
  -  2.19 KB

  [TutsNode.org] - Module 3 Security Architecture/001. Module introduction en.srt
  -  1.64 KB

  [TutsNode.org] - Lesson 28 Given a Scenario, Implement Security Awareness Practices/001. Learning objectives en.srt
  -  1.36 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/001. Learning objectives en.srt
  -  808 Bytes

  [TutsNode.org] - Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/001. Learning objectives en.srt
  -  1.23 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/001. Learning objectives en.srt
  -  1.06 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/001. Learning objectives en.srt
  -  1.04 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/001. Learning objectives en.srt
  -  917 Bytes

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/001. Learning objectives en.srt
  -  912 Bytes

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/001. Learning objectives en.srt
  -  862 Bytes

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/001. Learning objectives en.srt
  -  820 Bytes

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/001. Learning objectives en.srt
  -  652 Bytes

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/001. Learning objectives en.srt
  -  776 Bytes

  [TutsNode.org] - Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/001. Learning objectives en.srt
  -  755 Bytes

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/001. Learning objectives en.srt
  -  748 Bytes

  [TutsNode.org] - Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/001. Learning objectives en.srt
  -  739 Bytes

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/001. Learning objectives en.srt
  -  698 Bytes

  .pad/3
  -  260.86 KB

  [TutsNode.org] - Lesson 28 Given a Scenario, Implement Security Awareness Practices/002. 28.1 Education, Training, and Awareness.mp4
  -  74.56 MB

  .pad/4
  -  453.84 KB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/002. 1.1 Control Objectives.mp4
  -  71.05 MB

  .pad/5
  -  977.68 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/003. 10.2 Cloud Services.mp4
  -  70.43 MB

  .pad/6
  -  586.1 KB

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/003. 16.2 Vulnerability Response and Remediation.mp4
  -  70.05 MB

  .pad/7
  -  971.62 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/004. 11.3 Firewalls.mp4
  -  68.72 MB

  .pad/8
  -  288.38 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/006. 19.5 Access Control and Authorization.mp4
  -  68.47 MB

  .pad/9
  -  547.42 KB

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/003. 26.2 Privacy Principles.mp4
  -  68.26 MB

  .pad/10
  -  754.59 KB

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/003. 23.2 Governance Documents.mp4
  -  65.93 MB

  .pad/11
  -  70.16 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/003. 24.2 Risk Assessment and Analysis.mp4
  -  65.91 MB

  .pad/12
  -  89.6 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/002. 19.1 Identity and Access Management (IAM).mp4
  -  65.8 MB

  .pad/13
  -  208.08 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/003. 11.2 Network Access Control.mp4
  -  64.93 MB

  .pad/14
  -  70.44 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/002. 17.1 Logging and Analysis.mp4
  -  64.84 MB

  .pad/15
  -  162.26 KB

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/002. 23.1 Governance Structure.mp4
  -  64.59 MB

  .pad/16
  -  417.47 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/004. 2.3 Physical Security.mp4
  -  64.42 MB

  .pad/17
  -  595.71 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/003. 13.2 Resiliency Concepts.mp4
  -  63.64 MB

  .pad/18
  -  370.89 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/002. 4.1 Cryptography Primer.mp4
  -  60.87 MB

  .pad/19
  -  135.83 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/004. 21.3 Evidence Handling.mp4
  -  58.92 MB

  .pad/20
  -  85.86 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/007. 2.6 Deep Dive Quiz.mp4
  -  58.05 MB

  .pad/21
  -  974.52 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/004. 4.3 Hashing and Digital Signatures.mp4
  -  57.92 MB

  .pad/22
  -  84.77 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/004. 19.3 Authentication.mp4
  -  57.31 MB

  .pad/23
  -  704.94 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/007. 14.6 Application Security.mp4
  -  56.74 MB

  .pad/24
  -  262.24 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/002. 5.1 Threat Actors and Attributes.mp4
  -  56.54 MB

  .pad/25
  -  471.05 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/003. 6.2 Third-Party and Supply Chain Threat Vectors.mp4
  -  56.31 MB

  .pad/26
  -  711.6 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/004. 14.3 Wireless Design.mp4
  -  56.13 MB

  .pad/27
  -  895.5 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/008. 8.7 Cryptographic Attacks.mp4
  -  56.11 MB

  .pad/28
  -  915.77 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/005. 11.4 Secure Communications.mp4
  -  55.67 MB

  .pad/29
  -  334.05 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/009. 10.8 Deep Dive Quiz.mp4
  -  54.68 MB

  .pad/30
  -  325.73 KB

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/002. 16.1 Vulnerability Identification.mp4
  -  54.17 MB

  .pad/31
  -  854.32 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/007. 10.6 Embedded Systems.mp4
  -  53.94 MB

  .pad/32
  -  61 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/006. 24.5 Deep Dive Quiz.mp4
  -  53.77 MB

  .pad/33
  -  235.07 KB

  [TutsNode.org] - Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/002. 20.1 Scripting, Automation, and Orchestration.mp4
  -  53.33 MB

  .pad/34
  -  682.82 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/005. 24.4 Business Impact Analysis.mp4
  -  52.27 MB

  .pad/35
  -  749.36 KB

  [TutsNode.org] - Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/002. 22.1 Data Sources.mp4
  -  51.64 MB

  .pad/36
  -  368.48 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/003. 15.2 Deletion, Disposal, and Destruction.mp4
  -  51.54 MB

  .pad/37
  -  473.34 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/008. 19.7 Deep Dive Quiz.mp4
  -  51.47 MB

  .pad/38
  -  545.11 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/003. 2.2 Zero Trust.mp4
  -  51.37 MB

  .pad/39
  -  648.45 KB

  [TutsNode.org] - Introduction/001. CompTIA Security+ SY0-701 Introduction.mp4
  -  51.16 MB

  .pad/40
  -  860.58 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/002. 6.1 Operational Threat Vectors.mp4
  -  51.1 MB

  .pad/41
  -  919.95 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/002. 21.1 Incident Management.mp4
  -  50.97 MB

  .pad/42
  -  27.64 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/002. 27.1 Audit and Assurance.mp4
  -  50.86 MB

  .pad/43
  -  145.89 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/002. 18.1 Enhancing Security with Network Devices.mp4
  -  50.33 MB

  .pad/44
  -  685.24 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/005. 10.4 Data Center Solution Elements.mp4
  -  50.19 MB

  .pad/45
  -  832.92 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/006. 21.5 Disclosure and Notification.mp4
  -  50.07 MB

  .pad/46
  -  947.6 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/002. 9.1 Secure Design Principles.mp4
  -  50.06 MB

  .pad/47
  -  967.67 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/005. 21.4 Forensic Examination.mp4
  -  50.02 MB

  .pad/48
  -  1002.21 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/004. 10.3 Cloud Infrastructure.mp4
  -  49.91 MB

  .pad/49
  -  87.13 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/003. 3.2 Change Management.mp4
  -  49.84 MB

  .pad/50
  -  163.85 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/004. 24.3 Risk Response and Treatment.mp4
  -  49.54 MB

  .pad/51
  -  472.82 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/006. 18.5 Deep Dive Quiz.mp4
  -  49.5 MB

  .pad/52
  -  515.5 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/003. 14.2 Wireless Configuration.mp4
  -  49.48 MB

  .pad/53
  -  530.38 KB

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/003. 12.2 Data Classification.mp4
  -  49.47 MB

  .pad/54
  -  542.08 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/008. 4.7 Deep Dive Quiz.mp4
  -  48.73 MB

  .pad/55
  -  274.12 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/004. 13.3 Continuity of Operations.mp4
  -  48.68 MB

  .pad/56
  -  324.38 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/005. 2.4 Environmental Impact.mp4
  -  48.09 MB

  .pad/57
  -  932.36 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/009. 8.8 Deep Dive Quiz.mp4
  -  48.09 MB

  .pad/58
  -  933.59 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/005. 14.4 Mobile Connectivity.mp4
  -  47.61 MB

  .pad/59
  -  402.31 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/002. 13.1 Backup and Recovery.mp4
  -  47.58 MB

  .pad/60
  -  431.53 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/003. 19.2 Federated Identity.mp4
  -  47.49 MB

  .pad/61
  -  518.5 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/003. 21.2 Incident Response.mp4
  -  47.4 MB

  .pad/62
  -  618.94 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/003. 8.2 Malware Attacks.mp4
  -  47.29 MB

  .pad/63
  -  725.17 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/007. 21.6 Deep Dive Quiz.mp4
  -  47.21 MB

  .pad/64
  -  811.3 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/003. 27.2 Penetration Testing Concepts.mp4
  -  46.7 MB

  .pad/65
  -  311.18 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/002. 3.1 Configuration Management.mp4
  -  46.3 MB

  .pad/66
  -  714.83 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/005. 8.4 Digital Infrastructure Attacks.mp4
  -  46.08 MB

  .pad/67
  -  941.98 KB

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/004. 12.3 Data Protection.mp4
  -  46.02 MB

  .pad/68
  -  1002.84 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/003. 17.2 SNMP, NetFlow, and SCAP.mp4
  -  46 MB

  .pad/69
  -  284 Bytes

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/006. 14.5 Mobile Device Management.mp4
  -  45.73 MB

  .pad/70
  -  279.12 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/004. 27.3 Penetration Testing Tools and Techiques.mp4
  -  45.36 MB

  .pad/71
  -  654.42 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/002. 14.1 Secure Baselines and Hardening Targets.mp4
  -  45.11 MB

  .pad/72
  -  907.67 KB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/003. 1.2 Control Categories and Classifications.mp4
  -  44.48 MB

  .pad/73
  -  532.98 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/005. 4.4 Digital Certificates.mp4
  -  44.47 MB

  .pad/74
  -  537.83 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/006. 8.5 Application Attacks.mp4
  -  43.51 MB

  .pad/75
  -  505.49 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/003. 9.2 Segmentation.mp4
  -  43.49 MB

  .pad/76
  -  518.28 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/006. 10.5 Virtualization.mp4
  -  43.41 MB

  .pad/77
  -  608.47 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/002. 15.1 Asset Management.mp4
  -  43.31 MB

  .pad/78
  -  707.01 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/007. 19.6 Privileged Access Management.mp4
  -  42.91 MB

  .pad/79
  -  91.58 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/002. 2.1 Security and Privacy Principles.mp4
  -  42.88 MB

  .pad/80
  -  123.7 KB

  [TutsNode.org] - Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/002. 25.1 Third-party Risk Management.mp4
  -  42.46 MB

  .pad/81
  -  553.51 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/002. 10.1 Computing Architecture Models.mp4
  -  42.24 MB

  .pad/82
  -  782.89 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/004. 18.3 Email Security.mp4
  -  41.81 MB

  .pad/83
  -  194.52 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/009. 14.8 Deep Dive Quiz.mp4
  -  41.27 MB

  .pad/84
  -  750.4 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/008. 10.7 Internet of Things (IoT).mp4
  -  41.23 MB

  .pad/85
  -  790.61 KB

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/002. 26.1 Compliance Monitoring.mp4
  -  40.16 MB

  .pad/86
  -  858.82 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/002. 11.1 Network Devices.mp4
  -  39.58 MB

  .pad/87
  -  434.43 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/005. 19.4 Biometrics.mp4
  -  39.52 MB

  .pad/88
  -  490.42 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/003. 5.2 Threat Modeling and Intelligence.mp4
  -  37.95 MB

  .pad/89
  -  50.82 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/007. 8.6 Wireless Attacks.mp4
  -  37.79 MB

  .pad/90
  -  210.37 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/004. 15.3 Deep Dive Quiz.mp4
  -  36.89 MB

  .pad/91
  -  111.01 KB

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/003. 7.2 Network, OS, and Cloud Vulnerabilities.mp4
  -  36.73 MB

  .pad/92
  -  276.23 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/006. 2.5 Deception and Disruption.mp4
  -  36.34 MB

  .pad/93
  -  679.28 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/002. 24.1 Risk Concepts.mp4
  -  36.08 MB

  .pad/94
  -  943.94 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/004. 8.3 Brute Force Attacks.mp4
  -  35.17 MB

  .pad/95
  -  851.48 KB

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/002. 7.1 Vulnerability Primer.mp4
  -  35.03 MB

  .pad/96
  -  996.93 KB

  [TutsNode.org] - Lesson 29 Attaining Your SY0-701 Security+ Certification/004. 29.3 SY0-701 Exam Testing Strategies.mp4
  -  34.53 MB

  .pad/97
  -  484.84 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/005. 18.4 Group Policy and SELinux.mp4
  -  33.85 MB

  .pad/98
  -  155.83 KB

  [TutsNode.org] - Module 3 Closer Look Labs/002. SSL and TLS Packet Capture.mp4
  -  33.55 MB

  .pad/99
  -  457.75 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/008. 14.7 Secure Coding.mp4
  -  32.03 MB

  .pad/100
  -  990.03 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/006. 11.5 Deep Dive Quiz.mp4
  -  31.99 MB

  .pad/101
  -  8.77 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/005. 27.4 Deep Dive Quiz.mp4
  -  31.79 MB

  .pad/102
  -  216.11 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/004. 3.3 Deep Dive Quiz.mp4
  -  31.49 MB

  .pad/103
  -  519.17 KB

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/004. 7.3 Deep Dive Quiz.mp4
  -  31.01 MB

  .pad/104
  -  1009.51 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/006. 4.5 Emerging Cryptography.mp4
  -  30.86 MB

  .pad/105
  -  139.87 KB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/004. 1.3 Deep Dive Quiz.mp4
  -  29.93 MB

  .pad/106
  -  68.22 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/004. 9.3 Deep Dive Quiz.mp4
  -  29.87 MB

  .pad/107
  -  136.27 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/002. 8.1 Indicators of Malicious Activity.mp4
  -  29.34 MB

  .pad/108
  -  678.58 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/005. 13.4 Deep Dive Quiz.mp4
  -  28.6 MB

  .pad/109
  -  412.1 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/005. 6.4 Deep Dive Quiz.mp4
  -  27.98 MB

  .pad/110
  -  19.7 KB

  [TutsNode.org] - Module 4 Closer Look Labs/001. PowerShell.mp4
  -  27.89 MB

  .pad/111
  -  110.75 KB

  [TutsNode.org] - Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/003. 25.2 Deep Dive Quiz.mp4
  -  27.73 MB

  .pad/112
  -  277.17 KB

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/004. 16.3 Deep Dive Quiz.mp4
  -  27.43 MB

  .pad/113
  -  579.49 KB

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/004. 23.3 Deep Dive Quiz.mp4
  -  26.72 MB

  .pad/114
  -  287.17 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/004. 17.3 Deep Dive Quiz.mp4
  -  26.04 MB

  .pad/115
  -  978.61 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/007. 4.6 Steganography.mp4
  -  25.59 MB

  .pad/116
  -  422.77 KB

  [TutsNode.org] - Module 4 Closer Look Labs/002. Pwned Passwords.mp4
  -  25.56 MB

  .pad/117
  -  446.39 KB

  [TutsNode.org] - Module 4 Closer Look Labs/004. Wireless Heat Maps.mp4
  -  25.36 MB

  .pad/118
  -  651.21 KB

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/005. 12.4 Deep Dive Quiz.mp4
  -  25 MB

  .pad/119
  -  3.26 KB

  [TutsNode.org] - Module 1 Closer Look Labs/003. Digital Certificates.mp4
  -  23.91 MB

  .pad/120
  -  91.83 KB

  [TutsNode.org] - Lesson 29 Attaining Your SY0-701 Security+ Certification/003. 29.2 SY0-701 Exam Testing Options.mp4
  -  23.49 MB

  .pad/121
  -  518.25 KB

  [TutsNode.org] - Module 4 Closer Look Labs/003. IPv6 Addressing.mp4
  -  22.83 MB

  .pad/122
  -  173 KB

  [TutsNode.org] - Lesson 28 Given a Scenario, Implement Security Awareness Practices/003. 28.2 Deep Dive Quiz.mp4
  -  21.99 MB

  .pad/123
  -  13.36 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/004. 5.3 Deep Dive Quiz.mp4
  -  21.85 MB

  .pad/124
  -  155.63 KB

  [TutsNode.org] - Module 4 Closer Look Labs/006. Log files.mp4
  -  20.87 MB

  .pad/125
  -  128.51 KB

  [TutsNode.org] - Module 5 Closer Look Labs/002. Policies and standards.mp4
  -  20.31 MB

  .pad/126
  -  706.76 KB

  [TutsNode.org] - Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/003. 20.2 Deep Dive Quiz.mp4
  -  19.96 MB

  .pad/127
  -  42.6 KB

  [TutsNode.org] - Module 5 Closer Look Labs/001. Passive Reconnaissance.mp4
  -  18.59 MB

  .pad/128
  -  419.7 KB

  [TutsNode.org] - Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/003. 22.2 Deep Dive Quiz.mp4
  -  18.19 MB

  .pad/129
  -  830.48 KB

  [TutsNode.org] - Lesson 29 Attaining Your SY0-701 Security+ Certification/002. 29.1 Understanding the SY0-701 Security+ Exam Structure.mp4
  -  17.93 MB

  .pad/130
  -  76.19 KB

  [TutsNode.org] - Module 4 Closer Look Labs/005. ZenMap.mp4
  -  17.55 MB

  .pad/131
  -  459.55 KB

  [TutsNode.org] - Module 1 Closer Look Labs/001. Honeypots.mp4
  -  17.24 MB

  .pad/132
  -  776.12 KB

  [TutsNode.org] - Module 2 Closer Look Labs/002. Malware Analysis.mp4
  -  17.01 MB

  .pad/133
  -  1013.56 KB

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/004. 26.3 Deep Dive Quiz.mp4
  -  16.97 MB

  .pad/134
  -  28.37 KB

  [TutsNode.org] - Module 3 Closer Look Labs/003. Cloud Controls.mp4
  -  16.7 MB

  .pad/135
  -  303.05 KB

  [TutsNode.org] - Module 5 Closer Look Labs/003. Quantitative Risk Analysis.mp4
  -  13.64 MB

  .pad/136
  -  371.39 KB

  [TutsNode.org] - Module 2 Closer Look Labs/003. Constructing Error Messages.mp4
  -  13.3 MB

  .pad/137
  -  720.53 KB

  [TutsNode.org] - Module 3 Closer Look Labs/001. RAID.mp4
  -  11.29 MB

  .pad/138
  -  724.2 KB

  [TutsNode.org] - Module 2 Closer Look Labs/005. Zero-day Vulnerabilities.mp4
  -  10.83 MB

  .pad/139
  -  177.03 KB

  [TutsNode.org] - Module 4 Security Operations/001. Module introduction.mp4
  -  10.27 MB

  .pad/140
  -  750.81 KB

  [TutsNode.org] - Module 4 Closer Look Labs/007. Ram Capture.mp4
  -  10.19 MB

  .pad/141
  -  830.65 KB

  [TutsNode.org] - Module 1 Closer Look Labs/002. Hashing and HMACS.mp4
  -  10.12 MB

  .pad/142
  -  904.05 KB

  [TutsNode.org] - Module 2 Threats, Vulnerabilities and Mitigations/001. Module introduction.mp4
  -  9.37 MB

  .pad/143
  -  647.04 KB

  [TutsNode.org] - Module 2 Closer Look Labs/004. Threat Intelligence Workflow.mp4
  -  9.36 MB

  .pad/144
  -  659.13 KB

  [TutsNode.org] - Lesson 29 Attaining Your SY0-701 Security+ Certification/005. 29.4 Congratulations! What's Next.mp4
  -  9.34 MB

  .pad/145
  -  672.24 KB

  [TutsNode.org] - Module 5 Security Program Management and Oversight/001. Module introduction.mp4
  -  9.09 MB

  .pad/146
  -  927.75 KB

  [TutsNode.org] - Module 1 General Security Concepts/001. Module introduction.mp4
  -  8.5 MB

  .pad/147
  -  508.33 KB

  [TutsNode.org] - Module 2 Closer Look Labs/001. Phone and Text Spoofing.mp4
  -  8.15 MB

  .pad/148
  -  867.37 KB

  [TutsNode.org] - Module 5 Closer Look Labs/004. Privacy Walkthrough.mp4
  -  7.57 MB

  .pad/149
  -  437.49 KB

  [TutsNode.org] - Module 3 Security Architecture/001. Module introduction.mp4
  -  7.04 MB

  .pad/150
  -  985.82 KB

  [TutsNode.org] - Summary/001. CompTIA Security+ SY0-701 Summary.mp4
  -  5.56 MB

  .pad/151
  -  450.92 KB

  [TutsNode.org] - Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/001. Learning objectives.mp4
  -  5.53 MB

  .pad/152
  -  479.45 KB

  [TutsNode.org] - Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/001. Learning objectives.mp4
  -  5.31 MB

  .pad/153
  -  706.2 KB

  [TutsNode.org] - Lesson 28 Given a Scenario, Implement Security Awareness Practices/001. Learning objectives.mp4
  -  5.19 MB

  .pad/154
  -  825.84 KB

  [TutsNode.org] - Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/001. Learning objectives.mp4
  -  4.99 MB

  .pad/155
  -  8.74 KB

  [TutsNode.org] - Lesson 21 Explain Appropriate Incident Response Activities/001. Learning objectives.mp4
  -  4.36 MB

  .pad/156
  -  653.79 KB

  [TutsNode.org] - Lesson 27 Explain Types and Purposes of Audits and Assessment/001. Learning objectives.mp4
  -  4.35 MB

  .pad/157
  -  669.65 KB

  [TutsNode.org] - Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/001. Learning objectives.mp4
  -  4.29 MB

  .pad/158
  -  725.66 KB

  [TutsNode.org] - Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/001. Learning objectives.mp4
  -  4.09 MB

  .pad/159
  -  931.37 KB

  [TutsNode.org] - Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/001. Learning objectives.mp4
  -  3.96 MB

  .pad/160
  -  43.32 KB

  [TutsNode.org] - Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/001. Learning objectives.mp4
  -  3.7 MB

  .pad/161
  -  302.34 KB

  [TutsNode.org] - Lesson 24 Explain Elements of the Risk Management Process/001. Learning objectives.mp4
  -  3.7 MB

  .pad/162
  -  304.17 KB

  [TutsNode.org] - Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/001. Learning objectives.mp4
  -  3.7 MB

  .pad/163
  -  310.51 KB

  [TutsNode.org] - Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/001. Learning objectives.mp4
  -  3.63 MB

  .pad/164
  -  377.02 KB

  [TutsNode.org] - Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/001. Learning objectives.mp4
  -  3.62 MB

  .pad/165
  -  393.53 KB

  [TutsNode.org] - Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/001. Learning objectives.mp4
  -  3.45 MB

  .pad/166
  -  559.7 KB

  [TutsNode.org] - Lesson 26 Summarize Elements of Effective Security Compliance/001. Learning objectives.mp4
  -  3.42 MB

  .pad/167
  -  588.96 KB

  [TutsNode.org] - Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/001. Learning objectives.mp4
  -  3.39 MB

  .pad/168
  -  626.4 KB

  [TutsNode.org] - Lesson 2 Summarize Fundamental Security Concepts/001. Learning objectives.mp4
  -  3.23 MB

  .pad/169
  -  788.37 KB

  [TutsNode.org] - Lesson 6 Explain Common Threat Vectors and Attack Surfaces/001. Learning objectives.mp4
  -  3.17 MB

  .pad/170
  -  855.02 KB

  [TutsNode.org] - Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/001. Learning objectives.mp4
  -  3.14 MB

  .pad/171
  -  877.94 KB

  [TutsNode.org] - Lesson 23 Summarize Effective Security Governance/001. Learning objectives.mp4
  -  3.09 MB

  .pad/172
  -  932.58 KB

  [TutsNode.org] - Lesson 16 Explain Various Activities Associated with Vulnerability Management/001. Learning objectives.mp4
  -  2.97 MB

  .pad/173
  -  34.57 KB

  [TutsNode.org] - Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/001. Learning objectives.mp4
  -  2.92 MB

  .pad/174
  -  78.1 KB

  [TutsNode.org] - Lesson 5 Compare and Contrast Common Threat Actors and Motivations/001. Learning objectives.mp4
  -  2.89 MB

  .pad/175
  -  109.67 KB

  [TutsNode.org] - Lesson 1 Compare and Contrast Various Types of Security Controls/001. Learning objectives.mp4
  -  2.88 MB

  .pad/176
  -  125.89 KB

  [TutsNode.org] - Lesson 7 Explain Various Types of Vulnerabilities/001. Learning objectives.mp4
  -  2.81 MB

  .pad/177
  -  193.8 KB

  [TutsNode.org] - Lesson 29 Attaining Your SY0-701 Security+ Certification/001. Learning objectives.mp4
  -  2.73 MB

  .pad/178
  -  274.41 KB

  [TutsNode.org] - Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/001. Learning objectives.mp4
  -  2.73 MB

  .pad/179
  -  274.87 KB

  [TutsNode.org] - Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/001. Learning objectives.mp4
  -  2.71 MB

  .pad/180
  -  297.62 KB

  [TutsNode.org] - Module 6 Preparing for the Exam/001. Module introduction.mp4
  -  1.78 MB



Torrent Description


Description

CompTIA Security+ (SY0-701) is designed to prepare you for the SY0-701 version of the Security+ exam. It is an engaging self-paced video training solution that provides learners with more than 27.5 hours of personal training from security expert Sari Greene.

With topic-focused instructional videos, you will gain an in-depth understanding of each exam objective in the CompTIA Security+ (SY0-701) exam, as well as a deeper understanding of security foundations and principles to ensure exam success. This self-paced video course maps to the CompTIA Security+ Certification Exam Objectives for the SY0-701 exam, which has been updated to reflect current and emerging cybersecurity trends and techniques. At the end of every sub lesson youll find a three-second challenge, a Security-in-Action case study, and a word cloud that displays key concepts and terminology.

At the end of every lesson, you’ll find a Deep Dive quiz to help you assess your knowledge and progress.
At the end of every module, you’ll find practical application Closer Look labs.

Skill Level

Intermediary to Advanced

Learn How To

Confidently understand every objective on the CompTIA Security+ examthis course covers every objective and topic in depth.
Prepare for exam successSari shares her best practices for studying for and taking the Security+ exam.
Enhance your real-world cybersecurity skills and knowledge.

Course Requirement

CompTIA recommends but does not require at least two years of experience in IT administration with a focus on security prior to taking the certification exam.

Who Should Take This Course

Anyone preparing for the CompTIA Security+ examination. Secondary audience: IT professionals
Anyone interested in learning security fundamentals

Released 9/2023