zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
security-plus-sy0-701
magnet:?xt=urn:btih:b74a9a559457529c4db6d5961ad9e8f5996c76db&dn=security-plus-sy0-701
磁力链接详情
Hash值:
b74a9a559457529c4db6d5961ad9e8f5996c76db
点击数:
5
文件大小:
16.52 GB
文件数量:
262
创建日期:
2025-3-30 18:40
最后访问:
2025-4-7 18:25
访问标签:
security-plus-sy0-701
文件列表详情
003-Exam Tips-5ixb.mp4 112.22 MB
005-Fundamentals of Security-SAfU.mp4 138.11 MB
006-Threats and Vulnerabilities-gC37.mp4 52.59 MB
007-Confidentiality OBJ 1 2-vvSD.mp4 42.45 MB
008-Integrity OBJ 1 2-rLHu.mp4 52.4 MB
009-Availability OBJ 1 2-TlGj.mp4 51.72 MB
010-Non repudiation OBJ 1 2-ODLu.mp4 54.76 MB
011-Authentication OBJ 1 2-fLYy.mp4 60.52 MB
012-Authorization OBJ 1 2-HsV5.mp4 28.56 MB
013-Accounting OBJ 1 2-DkUQ.mp4 30.72 MB
014-Security Control Categories OBJ 1 1-cPdj.mp4 46.66 MB
015-Security Control Types OBJ 1 1-9TEA.mp4 43.59 MB
016-Gap Analysis OBJ 1 1-WvYF.mp4 48.69 MB
017-Zero Trust OBJ 1 2-KgFk.mp4 68.64 MB
019-Threat Actors OBJ 1 2 2 1 2 2-0M5f.mp4 86.65 MB
020-Threat Actor Motivations OBJ 2 1-IM3t.mp4 53.98 MB
021-Threat Actor Attributes OBJ 2 1-QZO4.mp4 32.95 MB
022-Unskilled Attackers OBJ 2 1-AkOn.mp4 25.91 MB
023-Hacktivists OBJ 2 1-fH4Q.mp4 32.31 MB
024-Organized Crime OBJ 2 1-q3vd.mp4 57.14 MB
025-Nation state Actor OBJ 2 1-RjC4.mp4 85.8 MB
026-Insider Threats OBJ 2 1-rLxg.mp4 77.01 MB
027-Shadow IT OBJ 2 1-ngwC.mp4 66.36 MB
028-Threat Vectors and Attack Surfaces OBJ 2 2-aZdl.mp4 100.13 MB
029-Outsmarting Threat Actors OBJ 1 2-uc37.mp4 79.58 MB
031-Physical Security OBJ 1 2 2 4-VC9N.mp4 79 MB
032-Fencing and Bollards OBJ 1 2-0Zq3.mp4 63.14 MB
033-Attacking with Brute Force OBJ 2 4-5ZF8.mp4 60.82 MB
034-Surveillance Systems OBJ 1 2-laaj.mp4 52.33 MB
035-Bypassing Surveillance Systems OBJ 2 4-iPoY.mp4 47.67 MB
036-Access Control Vestibules OBJ 1 2-6o82.mp4 66.37 MB
037-Door Locks OBJ 1 2-s8x2.mp4 135.19 MB
038-Access Badge Cloning OBJ 2 4-12mq.mp4 72.51 MB
040-Social Engineering OBJ 2 2 5 6-ElCd.mp4 90.03 MB
041-Motivational Triggers OBJ 5 6-GZX1.mp4 120.29 MB
042-Impersonation OBJ 2 2-KWqR.mp4 61.99 MB
043-Pretexting OBJ 2 2-v7Sh.mp4 72.87 MB
044-Phishing Attacks OBJ 2 2-BeUy.mp4 75.09 MB
045-Preventing Phishing Attacks OBJ 5 6-nRbI.mp4 66.67 MB
046-Conducting an Anti Phishing Campaign OBJ 5 6-C9uo.mp4 44.53 MB
047-Frauds and Scams OBJ 2 2-5MPx.mp4 63.07 MB
048-Influence Campaigns OBJ 2 2-ryMJ.mp4 48.54 MB
049-Other Social Engineering Attacks OBJ 2 2-Ri5g.mp4 78.42 MB
051-Malware OBJ 2 4-uUuP.mp4 186.24 MB
052-Viruses OBJ 2 4-2TWY.mp4 59.87 MB
053-Worms OBJ 2 4-OhOA.mp4 26.08 MB
054-Trojans OBJ 2 4-sJxO.mp4 29.76 MB
055-Viruses and Trojans OBJ 2 4-mL1E.mp4 87.03 MB
056-Ransomware OBJ 2 4-dxwT.mp4 97.19 MB
057-Zombies and Botnets OBJ 2 4-cYu3.mp4 53.18 MB
058-Rootkits OBJ 2 4-VaZb.mp4 46.88 MB
059-Backdoors and Logic Bombs OBJ 2 4-L4Ok.mp4 59.77 MB
060-Keylogger OBJ 2 4-2JJE.mp4 56.53 MB
061-Spyware and Bloatware OBJ 2 4-97IL.mp4 39.32 MB
062-Malware Attack Techniques OBJ 2 4-M8OJ.mp4 41.69 MB
063-Indications of Malware Attacks OBJ 2 4-tAUq.mp4 70.5 MB
065-Data Protection OBJ 1 4 3 3 4 2 4 4 5 1-NccZ.mp4 70.49 MB
066-Data Classifications OBJ 3 3-Zatv.mp4 56.71 MB
067-Data Ownership OBJ 4 2 5 1-Vqyv.mp4 47.57 MB
068-Data States OBJ 3 3-wnAi.mp4 32.55 MB
069-Data Types OBJ 3 3 1 4-h0kk.mp4 36.05 MB
070-Data Sovereignty OBJ 3 3-SXy5.mp4 22.06 MB
071-Securing Data OBJ 3 3-lrL5.mp4 22.29 MB
072-Data Loss Prevention DLP OBJ 4 4-Lp3q.mp4 47.25 MB
073-Configuring a DLP OBJ 4 5-ExcD.mp4 78.47 MB
075-Cryptographic Solutions OBJ 1 4 2 3 2 4-WTgN.mp4 257.17 MB
076-Symmetric vs Asymmetric OBJ 1 4-9mfI.mp4 73.87 MB
077-Symmetric Algorithms OBJ 1 4-JMlV.mp4 43.26 MB
078-Asymmetric Algorithms OBJ 1 4-FxAo.mp4 41.47 MB
079-Hashing OBJ 1 4-rzQp.mp4 88.46 MB
080-Increasing Hash Security OBJ 1 4-hkkz.mp4 57.24 MB
081-Public Key Infrastructure PKI OBJ 1 4-GnxL.mp4 39.39 MB
082-Digital Certificates OBJ 1 4-ZgWq.mp4 108.4 MB
083-Exploring Digital Certificates OBJ 1 4-0qZJ.mp4 23.78 MB
084-Blockchain OBJ 1 4-O3HU.mp4 39.4 MB
085-Encryption Tools OBJ 1 4-JBjh.mp4 47.46 MB
086-Obfuscation OBJ 1 4-SktR.mp4 80.74 MB
087-Cryptographic Attacks OBJ 2 3 2 4-cU9N.mp4 101.52 MB
089-Risk Management OBJ 5 2-tNJT.mp4 100.84 MB
090-Risk Assessment Frequency OBJ 5 2-H4Z8.mp4 21.29 MB
091-Risk Identification OBJ 5 2-PrUc.mp4 42.73 MB
092-Risk Register OBJ 5 2-lS7L.mp4 61.82 MB
093-Qualitative Risk Analysis OBJ 5 2-pKyD.mp4 36.89 MB
094-Quantitative Risk Analysis OBJ 5 2-HOm9.mp4 21.24 MB
095-Risk Management Strategies OBJ 5 2-oR6O.mp4 46.72 MB
096-Risk Monitoring and Reporting OBJ 5 2-8sXH.mp4 28.85 MB
098-Third party Vendor Risks OBJ 2 2 2 3 5 3-6MfF.mp4 67.14 MB
099-Supply Chain Risks OBJ 2 3 5 3-fKIP.mp4 44.43 MB
100-Supply Chain Attacks OBJ 2 2 5 3-ldfD.mp4 76.66 MB
101-Vendor Assessment OBJ 5 3-KUyy.mp4 50.83 MB
102-Vendor Selection and Monitoring OBJ 5 3-13an.mp4 52.17 MB
103-Contracts and Agreements OBJ 5 3-H3MC.mp4 54.44 MB
105-Governance and Compliance OBJ 5 1 5 4-vIVb.mp4 104.65 MB
106-Governance OBJ 5 1-1HRd.mp4 38.77 MB
107-Governance Structures OBJ 5 1-slRz.mp4 26.96 MB
108-Policies OBJ 5 1-QaRQ.mp4 31.9 MB
109-Standards OBJ 5 1-LF0D.mp4 33.8 MB
110-Procedures OBJ 5 1-haDx.mp4 30.73 MB
111-Governance Considerations OBJ 5 1-161T.mp4 45.32 MB
112-Compliance OBJ 5 4-DMHl.mp4 47.04 MB
113-Non compliance Consequences OBJ 5 4-lwdb.mp4 54.02 MB
115-Asset and Change Management OBJ 1 3 4 1 4 2-nxfk.mp4 101.36 MB
116-Acquisition and Procurement OBJ 4 2-eb8J.mp4 56.54 MB
117-Mobile Asset Deployments OBJ 4 1-xU1A.mp4 46.25 MB
118-Asset Management OBJ 4 2-HV6k.mp4 57.29 MB
119-Asset Disposal and Decommissioning OBJ 4 2-ZHB6.mp4 65.41 MB
120-Change Management OBJ 1 3-Z8sa.mp4 70.45 MB
121-Change Management Processes OBJ 1 3-16y7.mp4 39.58 MB
122-Technical Implications of Changes OBJ 1 3-orO8.mp4 32.39 MB
123-Documenting Changes OBJ 1 3-cEdr.mp4 35.76 MB
125-Audits and Assessments OBJ 5 5-2XRk.mp4 103.15 MB
126-Internal Audits and Assessments OBJ 5 5-2vQo.mp4 58.03 MB
127-Performing an Internal Assessment OBJ 5 5-Ss1H.mp4 36.59 MB
128-External Audits and Assessments OBJ 5 5-kvFM.mp4 52.34 MB
129-Performing an External Assessment OBJ 5 5-TTcP.mp4 34.07 MB
130-Penetration Testing OBJ 5 5-xVil.mp4 50.89 MB
131-Reconnaissance in Pentesting OBJ 5 5-KpsH.mp4 51.14 MB
132-Performing a Basic PenTest OBJ 5 5-XC9z.mp4 154.02 MB
133-Attestation of Findings OBJ 5 5-taef.mp4 70.66 MB
135-Cyber Resilience and Redundancy OBJ 3 4-lDTn.mp4 69.94 MB
136-High Availability OBJ 3 4-rP1f.mp4 60.8 MB
137-Data Redundancy OBJ 3 4-R3Ss.mp4 42.86 MB
138-Configuring a RAID OBJ 3 4-cgV8.mp4 25.65 MB
139-Capacity Planning OBJ 3 4-hhtL.mp4 86.8 MB
140-Powering Data Centers OBJ 3 4-G3NZ.mp4 81.33 MB
141-Data Backups OBJ 3 4-uz7I.mp4 65.07 MB
142-Continuity of Operations Plan OBJ 3 4-SOdi.mp4 76.02 MB
143-Redundant Site Considerations OBJ 3 4-nHBW.mp4 108.93 MB
144-Resilience and Recovery Testing OBJ 3 4-jqd2.mp4 66.13 MB
146-Security Architecture OBJ 3 1 4 1-9tTg.mp4 86.47 MB
147-On premise versus the Cloud OBJ 3 1-dAwA.mp4 102.32 MB
148-Cloud Security OBJ 3 1 4 1-taKD.mp4 48.3 MB
149-Virtualization and Containerization OBJ 2 3 3 1-ref5.mp4 82.03 MB
150-Serverless OBJ 3 1-H2mX.mp4 36.82 MB
151-Microservices OBJ 3 1-KKcJ.mp4 40.35 MB
152-Network Infrastructure OBJ 3 1-P0xA.mp4 38.48 MB
153-Software Defined Network SDN OBJ 3 1-U92C.mp4 32.75 MB
154-Infrastructure as Code IaC OBJ 3 1-Ow87.mp4 33.97 MB
155-Centralized vs Decentralized Architectures OBJ 3 1-Kspl.mp4 33.77 MB
156-Internet of Things IoT OBJ 3 1 4 1-MVie.mp4 57.27 MB
157-ICS and SCADA OBJ 3 1 4 1-e4Cl.mp4 32.5 MB
158-Embedded Systems OBJ 3 1 4 1-AcXO.mp4 41.99 MB
160-Security Infrastructure OBJ 3 2 4 5-zuj1.mp4 90.69 MB
161-Ports and Protocols OBJ 4 5-v6IE.mp4 83.73 MB
162-Firewalls OBJ 3 2-pVXq.mp4 75.13 MB
163-Configuring Firewalls OBJ 4 5-gR2E.mp4 105.65 MB
164-IDS and IPS OBJ 3 2-X1yp.mp4 37.22 MB
165-Network Appliances OBJ 3 2-iu2H.mp4 88.94 MB
166-Port Security OBJ 3 2-xUuq.mp4 91.46 MB
167-Securing Network Communications OBJ 3 2-JyDH.mp4 183.37 MB
168-SD WAN and SASE OBJ 3 2-yhq2.mp4 65.55 MB
169-Infrastructure Considerations OBJ 3 2-AJ5t.mp4 96.37 MB
170-Selecting Infrastructure Controls OBJ 3 2-UiM1.mp4 63.18 MB
172-Identity and Access Management IAM Solutions OBJ 2 4 4 6-q4U1.mp4 97.94 MB
173-Identity and Access Management IAM OBJ 4 6-CvHT.mp4 46.09 MB
174-Multifactor Authentication OBJ 4 6-vah9.mp4 110.82 MB
175-Password Security OBJ 4 6-7kKY.mp4 123.3 MB
176-Password Attacks OBJ 2 4-RLRz.mp4 56.55 MB
177-Single Sign On SSO OBJ 4 6-GeBE.mp4 73.27 MB
178-Federation OBJ 4 6-WDlM.mp4 35.21 MB
179-Privileged Access Management PAM OBJ 4 6-2CYK.mp4 23.68 MB
180-Access Control Models OBJ 4 6-NJBH.mp4 76.2 MB
181-Assigning Permissions OBJ 4 6-zQGF.mp4 63.79 MB
183-Vulnerabilities and Attacks OBJ 2 2 2 3 2 4 2 5 4 1-fJIb.mp4 139.48 MB
184-Hardware Vulnerabilities OBJ 2 2 2 3 2 5-Chsx.mp4 51.12 MB
185-Bluetooth Vulnerabilities and Attacks OBJ 2 3 2 5 4 1-eH4x.mp4 53.4 MB
186-Mobile Vulnerabilities and Attacks OBJ 2 3 2 5 4 1-pCDl.mp4 44.89 MB
187-Zero day Vulnerabilities OBJ 2 3-M4aK.mp4 37.91 MB
188-Operating System Vulnerabilities OBJ 2 3 2 5-LoA6.mp4 48.51 MB
189-SQL and XML Injections OBJ 2 3 2 4-cHjP.mp4 100.65 MB
190-Conducting an SQL Injection OBJ 2 3 2 4-nnYM.mp4 76.46 MB
191-XSS and XSRF OBJ 2 3 2 4-8JrX.mp4 132.25 MB
192-Buffer Overflow OBJ 2 3 2 4-EVeM.mp4 43.5 MB
193-Race Conditions OBJ 2 3-y06R.mp4 57.73 MB
195-Malicious Activity OBJ 2 4-Dmho.mp4 74.15 MB
196-Distributed Denial of Service OBJ 2 4-EpS7.mp4 64.93 MB
197-Domain Name System DNS Attacks OBJ 2 4-6I5t.mp4 33.85 MB
198-Directory Traversal Attack OBJ 2 4-ysxj.mp4 45.77 MB
199-Execution and Escalation Attack OBJ 2 4-N5En.mp4 43.11 MB
200-Replay Attacks OBJ 2 4-UiDP.mp4 28.46 MB
201-Session Hijacking OBJ 2 4-j9NW.mp4 33.79 MB
202-On Path Attacks-fqHm.mp4 31.91 MB
203-Injection Attacks-ujyC.mp4 23.68 MB
204-Indicators of Compromise IoC-YBdU.mp4 52.53 MB
206-Hardening OBJ 2 5 4 1 4 5-SiAX.mp4 87.49 MB
207-Changing Default Configurations OBJ 2 5-qL78.mp4 46.62 MB
208-Restricting Applications OBJ 2 5-tTZy.mp4 70.04 MB
209-Unnecessary Services OBJ 2 5-NB8P.mp4 55.63 MB
210-Trusted Operating Systems OBJ 2 5-Q8So.mp4 45.51 MB
211-Updates and Patches OBJ 2 5-ObSF.mp4 47.43 MB
212-Patch Management OBJ 2 5-ltoz.mp4 94.32 MB
213-Group Policies OBJ 2 5 4 5-wILH.mp4 38.57 MB
214-SELinux OBJ 2 5 4 5-QtUe.mp4 35.01 MB
215-Data Encryption Levels 2 5-Bo1r.mp4 32.67 MB
216-Secure Baselines OBJ 2 5 and 4 1-3exk.mp4 56.31 MB
218-Security Techniques OBJ 4 1 4 5-gI7S.mp4 82.45 MB
219-Wireless Infrastructure Security OBJ 4 1-tNsD.mp4 83.6 MB
220-Wireless Security Settings OBJ 4 1-CAQP.mp4 97.1 MB
221-Application Security OBJ 4 1-Judh.mp4 83.77 MB
222-Network Access Control NAC OBJ 4 5-6fbW.mp4 43.37 MB
223-Web and DNS Filtering OBJ 4 5-lL1h.mp4 62.07 MB
224-Email Security OBJ 4 5-AfEO.mp4 54.34 MB
225-Endpoint Detection and Response OBJ 4 5-mh8Z.mp4 61.55 MB
226-User Behavior Analytics OBJ 4 5-xu0Q.mp4 60.31 MB
227-Selecting Secure Protocols OBJ 4 5-kaly.mp4 115.69 MB
229-Vulnerability Management OBJ 4 3-x3Ve.mp4 61.31 MB
230-Identifying Vulnerabilities OBJ 4 3-ooT5.mp4 37.06 MB
231-Threat Intelligence Feeds OBJ 4 3-OkeU.mp4 55.6 MB
232-Responsible Disclosure Programs OBJ 4 3-vR3z.mp4 46.35 MB
233-Analyzing Vulnerabilities OBJ 4 3-PBtm.mp4 82.68 MB
234-Conducting Vulnerability Scans OBJ 4 3-5D9M.mp4 163.02 MB
235-Assessing Vulnerability Scan Results OBJ 4 3-3RqD.mp4 89.55 MB
236-Vulnerability Response and Remediation OBJ 4 3-mN3q.mp4 57.83 MB
237-Validating Vulnerability Remediation OBJ 4 3-KeHv.mp4 34.13 MB
238-Vulnerability Reporting OBJ 4 3-pRAw.mp4 78.81 MB
240-Alerting and Monitoring OBJ 4 4-utCt.mp4 119.8 MB
241-Monitoring Resources OBJ 4 4-35cu.mp4 43.31 MB
242-Alerting and Monitoring Activities OBJ 4 4-snDE.mp4 105.86 MB
243-Simple Network Management Protocol SNMP OBJ 4 4-4Rfz.mp4 34.53 MB
244-Security Information and Event Management SIEM OBJ 4 4-u2uX.mp4 78.22 MB
245-Data from Security Tools OBJ 4 4-fSMl.mp4 33.47 MB
246-Security Content Automation and Protocol SCAP OBJ 4 4-S2Ar.mp4 66.49 MB
247-NetFlow and Flow Analysis-jL6q.mp4 49 MB
248-Single Pane of Glass OBJ 4 4-jPWM.mp4 41.18 MB
250-Incident Response OBJ 4 8-Wfxg.mp4 65.63 MB
251-Incident Response Process OBJ 4 8-Slpx.mp4 93.48 MB
252-Threat Hunting OBJ 4 8-ijHw.mp4 51.63 MB
253-Root Cause Analysis OBJ 4 8-0bos.mp4 65.22 MB
254-Incident Response Training and Testing OBJ 4 8-ZNUj.mp4 52.58 MB
255-Digital Forensic Procedures OBJ 4 8-nhGO.mp4 134.1 MB
256-Data Collection Procedures OBJ 4 8-wXT0.mp4 54.22 MB
257-Disk Imaging and Analysis OBJ 4 8-7Msv.mp4 101.84 MB
259-Investigating an Incident OBJ 4 9-Kfxt.mp4 72.12 MB
260-Investigating with Data OBJ 4 9-2Ejk.mp4 100.51 MB
261-Dashboards OBJ 4 9-Cisd.mp4 34.38 MB
262-Automated Reports OBJ 4 9-KN5Y.mp4 48.49 MB
263-Vulnerability Scans OBJ 4 9-D1La.mp4 78.49 MB
264-Packet Captures OBJ 4 9-o6sI.mp4 85.47 MB
265-Firewall Logs OBJ 4 9-tSmt.mp4 35.45 MB
266-Application Logs OBJ 4 9-9U8h.mp4 27.53 MB
267-Endpoint Logs OBJ 4 9-aMlr.mp4 28.61 MB
268-OS specific Security Logs OBJ 4 9-VjrR.mp4 25.74 MB
269-IPS IDS Logs OBJ 4 9-s6Et.mp4 52.02 MB
270-Network Logs OBJ 4 9-zExo.mp4 40.71 MB
271-Metadata OBJ 4 9-DBxZ.mp4 29.83 MB
273-Automation and Orchestration OBJ 4 7-m6oc.mp4 140.75 MB
274-When to Automate and Orchestrate OBJ 4 7-mrb8.mp4 79.48 MB
275-Benefits of Automation and Orchestratation OBJ 4 7-VnIe.mp4 59.67 MB
276-Automating Support Tickets OBJ 4 7-4HFR.mp4 54.08 MB
277-Automating Onboarding OBJ 4 7-q39X.mp4 61.14 MB
278-Automating Security OBJ 4 7-NvKY.mp4 32.41 MB
279-Automating Application Development OBJ 4 7-YZ2n.mp4 75.49 MB
280-Integrations and APIs OBJ 4 7-dknQ.mp4 102.31 MB
282-Security Awareness OBJ 5 6-tHpr.mp4 79.83 MB
283-Recognizing Insider Threats OBJ 5 6-Se7V.mp4 79.48 MB
284-Password Management OBJ 5 6-hbrD.mp4 79.81 MB
285-Avoiding Social Engineering OBJ 5 6-6qr6.mp4 73.84 MB
286-Policy and Handbooks OBJ 5 6-ZhZm.mp4 72.47 MB
287-Remote and Hybrid Work Environments OBJ 5 6-A8nJ.mp4 61.02 MB
288-Creating a Culture of Security OBJ 5 6-juNe.mp4 34.88 MB
290-Conclusion-S4ln.mp4 280.69 MB
291-BONUS Where do I go from here-32HS.mp4 54.49 MB
其他位置