File List
-
0 - Introduction to Security+.mp4 177.06 MB
1 - Network Design.mp4 957.36 MB
1.1 - Protocols and Services.mp4 1.19 GB
1.2 - Securing Network Devices.mp4 1.32 GB
1.3 - Network Administration Principles.mp4 1.32 GB
2 - Risk Concepts.mp4 538 MB
2.01 - Risk Concepts Part 2.mp4 521.6 MB
2.1 - Security Management Practices.mp4 1.12 GB
2.3 - Physical Security & Awareness.mp4 1.26 GB
2.4 - Risk Management Strategies.mp4 796.16 MB
2.5 - Risk Management Strategies Part 2.mp4 697.56 MB
2.6 - Basic Forensic Procedures.mp4 674.12 MB
2.7 - Security Goals.mp4 726.01 MB
3 - Analyze Mitigation and Deterrents.mp4 561.56 MB
3.1 - Summarizing Various Attacks.mp4 554.97 MB
3.11 - Summarizing Various Attacks Part 2.mp4 615.27 MB
3.2 - Social Engineering Attacks.mp4 855.36 MB
3.4 - Wireless Attacks.mp4 371.64 MB
3.5 - Wireless Attacks Part 2.mp4 318.91 MB
3.6 - Application Attacks.mp4 364.09 MB
3.7 - Application Attacks Part 2.mp4 398.96 MB
3.8 - Pentesting vs Vulnerability Scanning.mp4 690.26 MB
3.9 - Pentesting vs Vulnerability Scanning Part 2.mp4 664.48 MB
4 - Explain App Security Controls.mp4 695.27 MB
4.1 - Explain App Security Controls Part 2.mp4 567.65 MB
4.2 - Explain App Security Controls Part 3.mp4 662.21 MB
4.3 - Host Security.mp4 598.36 MB
4.4 - Host Security Part 2.mp4 528.33 MB
4.5 - Mobile Security.mp4 790.37 MB
4.6 - Mobile Security Part 2.mp4 760.39 MB
5 - Compare Authentication Services.mp4 736.09 MB
5.1 - Compare Authentication Services Part 2.mp4 593.7 MB
5.2 - Understand Access Control.mp4 381.97 MB
5.3 - Understand Access Control Part 2.mp4 498.56 MB
5.4 - Configure Account Management Controls.mp4 563.72 MB
6 - Cryptography.mp4 1.13 GB
80 - Additional Information.mp4 632.81 MB
Download Info
-
Tips
“ITPT290” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.