6.69 GB | 00:25:38 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
1 Course Introduction - Introducing to Security+ Certification (29.85 MB)
2 How to get the most out of this course (34.12 MB)
3 Know your Instructor (11.68 MB)
1 EPP Overview (87.7 MB)
2 Endpoint Security Best Practices (92.43 MB)
3 DLP & DRM (55.27 MB)
1 The IAM Function (44.55 MB)
2 IAAA - Identification, Authentication, Authorization, Accounting (58.14 MB)
3 Biometric and MFA (41.57 MB)
4 SSO & RSO (36.73 MB)
5 Authorization (102.49 MB)
6 Access Control Models (102.57 MB)
7 Accounting (40.25 MB)
8 User Account Provisioning and Access Policies (49.16 MB)
1 Data & Assets Lifecycle (36.03 MB)
2 Asset Management (54.29 MB)
3 Intellectual Property (21.37 MB)
4 Data Classification (76.15 MB)
5 Data Protection and Classification Policies (55.15 MB)
6 Data Privacy and Privacy Protection Measures (64.76 MB)
7 Data Obfuscation Techniques (24.39 MB)
8 Data Protection Policies (55.12 MB)
1 The IT Function and Management of IT and ITIL Framework (55.57 MB)
2 Shadow IT (22.71 MB)
3 Configuration Management and Configuration Baseline (54.82 MB)
4 Change Management Process (68.67 MB)
5 Capacity Planning and Financial Planning (61.2 MB)
6 CapexOpex and Understand ROI & ROSI (64.34 MB)
1 The Role of HR & Personnel Security Measures (68.71 MB)
2 Social Engineering Attacks (169.88 MB)
3 Security Awareness Training Program (55.76 MB)
4 Vendor Management and Outsourcing (116.27 MB)
5 Supply Chain Attacks and Third Party Assessment (29.75 MB)
6 Digital Risk Protection and Social Media Monitoring and Dark Web (31.92 MB)
7 Physical Security and Physical Access Control (38.12 MB)
8 Securing Power Sources and Environmental Security and Fire Suppression Systems (139.53 MB)
1 Incident Response and Management (88.05 MB)
10 File Integrity Monitoring - FIM (40.99 MB)
13 Penetration Testing (29.07 MB)
14 Application Security Testing (57.44 MB)
15 Bug Bounty Programs (26.62 MB)
16 Auditing and Objectives of Audit (39.71 MB)
17 Internal and External Auditing (10.57 MB)
2 Forensic Evidence Acquisition and Lifecycle (48.22 MB)
4 Incident Response Training (21.51 MB)
5 Log Management and Operational Logs (50.14 MB)
6 Security Operation Center - SOC (43.12 MB)
7 SIEM Solution (58.21 MB)
8 Threat Intelligence and Working with CERT (29.48 MB)
9 EDR & NDR, XDR & SOAR (48.27 MB)
1 Disaster Recovery Planning and BIA (26.63 MB)
2 Business Continuity Planning (47.49 MB)
3 BCP Policy (60.33 MB)
4 Recovery Sites (58.78 MB)
5 Network Redundancy (42.26 MB)
1 1-Navigating the Cybersecurity Landscape (90.29 MB)
2 2-Mastering Cybersecurity Interviews A Comprehensive Guide for Preparation (84.38 MB)
3 3-Building Resume for Cybersecurity Career (88.51 MB)
4 4-Mastering Technical & HR Interviews in Cybersecurity (130.26 MB)
5 5-Post-Interview, What's Next (112.92 MB)
6 6-Building a Strong Personal Brand in Cybersecurity (98.32 MB)
7 7-Mastering Networking for Career Success (138.49 MB)
1 CIA Triad and Security Objective and DAD Triad (47.41 MB)
2 Information Security vs Cybersecurity (22.78 MB)
3 Key Security Terminologies - Threat, Risk, Vulnerability, Exploit (55.19 MB)
4 Security Vulnerabilities (38.37 MB)
5 Vulnerabilities Key Concepts (26.18 MB)
6 Threat Actors and Adversaries (23.39 MB)
7 MITRA ATT&CK Framework (27.89 MB)
8 Cyber Kill Chain (36.66 MB)
1 Security Threats and Malware (80.97 MB)
2 Malware Countermeasures (70.01 MB)
3 Cyber Attacks - DOS & DDOS (43.8 MB)
4 Cyber Attacks - MiTM Onpath Attack (50.43 MB)
6 Web Application Attacks (45.05 MB)
1 Introduction to Cryptography (100.28 MB)
11 Digital Signature (30.93 MB)
2 Cryptography Key Concepts (68.15 MB)
3 Symmetric Encryption (87.45 MB)
4 Asymmetric Encryption (71.37 MB)
6 Hashing and Salting (104.46 MB)
8 Public Key Infrastructure (84.86 MB)
9 Digital Certificates (38.53 MB)
1 Cloud Computing (75.39 MB)
10 Air Gapping, In Band & Out of Band Networks (61.4 MB)
2 Cloud Deployment Models (47.73 MB)
3 Shared Responsibility Matrix (58.16 MB)
4 Serverless Computing (47.4 MB)
5 Virtualization (27.66 MB)
6 Containerization (62.8 MB)
7 SDN (118.77 MB)
8 Infrastructure as Code & DevOps (47.22 MB)
9 OT & ICS (134.34 MB)
1 What is Governance (38.69 MB)
10 Risk Analysis (54.09 MB)
11 Risk Evaluation and Response (75.1 MB)
12 Risk Monitoring, Reporting, Documentation (52.38 MB)
2 What is the Security Governance (34.46 MB)
3 Security Roles (41.76 MB)
4 The Business Integration with Security (37.01 MB)
5 Security Standards and Regulations (55.57 MB)
6 The Gap Analysis (35.99 MB)
7 Risk Management Introduction (49.04 MB)
8 Risk Terminologies (37.59 MB)
9 Risk Identification (33.49 MB)
1 Security Controls (53.27 MB)
10 IDS & IPS (39.27 MB)
11 Proxy and Content Filters and Web Filtering (60.11 MB)
12 Dot1x Authentication and NAC (12.23 MB)
15 VPN (58.98 MB)
16 Internet, Email, Remote Access Policies (46.04 MB)
17 Securing Wireless Networks (30.66 MB)
18 Network Security Guidelines (51.03 MB)
19 Backup and Recovery (59.95 MB)
2 Example of Controls (34.56 MB)
20 Server, Software Security and Backup Policies (48.49 MB)
3 Control Objective (33.38 MB)
4 Layered Defenses (40.94 MB)
5 Acquisition of New Controls (37.05 MB)
6 Evaluation of Controls (30.19 MB)
7 KPI, KCI, KGI - Metrics and Monitoring (26.13 MB)
8 Network Segmentation (34.59 MB)
9 Firewalls, DMZ, Honeypots and Honeynets (55.07 MB)
2 How to get the most out of this course (34.12 MB)
3 Know your Instructor (11.68 MB)
1 EPP Overview (87.7 MB)
2 Endpoint Security Best Practices (92.43 MB)
3 DLP & DRM (55.27 MB)
1 The IAM Function (44.55 MB)
2 IAAA - Identification, Authentication, Authorization, Accounting (58.14 MB)
3 Biometric and MFA (41.57 MB)
4 SSO & RSO (36.73 MB)
5 Authorization (102.49 MB)
6 Access Control Models (102.57 MB)
7 Accounting (40.25 MB)
8 User Account Provisioning and Access Policies (49.16 MB)
1 Data & Assets Lifecycle (36.03 MB)
2 Asset Management (54.29 MB)
3 Intellectual Property (21.37 MB)
4 Data Classification (76.15 MB)
5 Data Protection and Classification Policies (55.15 MB)
6 Data Privacy and Privacy Protection Measures (64.76 MB)
7 Data Obfuscation Techniques (24.39 MB)
8 Data Protection Policies (55.12 MB)
1 The IT Function and Management of IT and ITIL Framework (55.57 MB)
2 Shadow IT (22.71 MB)
3 Configuration Management and Configuration Baseline (54.82 MB)
4 Change Management Process (68.67 MB)
5 Capacity Planning and Financial Planning (61.2 MB)
6 CapexOpex and Understand ROI & ROSI (64.34 MB)
1 The Role of HR & Personnel Security Measures (68.71 MB)
2 Social Engineering Attacks (169.88 MB)
3 Security Awareness Training Program (55.76 MB)
4 Vendor Management and Outsourcing (116.27 MB)
5 Supply Chain Attacks and Third Party Assessment (29.75 MB)
6 Digital Risk Protection and Social Media Monitoring and Dark Web (31.92 MB)
7 Physical Security and Physical Access Control (38.12 MB)
8 Securing Power Sources and Environmental Security and Fire Suppression Systems (139.53 MB)
1 Incident Response and Management (88.05 MB)
10 File Integrity Monitoring - FIM (40.99 MB)
13 Penetration Testing (29.07 MB)
14 Application Security Testing (57.44 MB)
15 Bug Bounty Programs (26.62 MB)
16 Auditing and Objectives of Audit (39.71 MB)
17 Internal and External Auditing (10.57 MB)
2 Forensic Evidence Acquisition and Lifecycle (48.22 MB)
4 Incident Response Training (21.51 MB)
5 Log Management and Operational Logs (50.14 MB)
6 Security Operation Center - SOC (43.12 MB)
7 SIEM Solution (58.21 MB)
8 Threat Intelligence and Working with CERT (29.48 MB)
9 EDR & NDR, XDR & SOAR (48.27 MB)
1 Disaster Recovery Planning and BIA (26.63 MB)
2 Business Continuity Planning (47.49 MB)
3 BCP Policy (60.33 MB)
4 Recovery Sites (58.78 MB)
5 Network Redundancy (42.26 MB)
1 1-Navigating the Cybersecurity Landscape (90.29 MB)
2 2-Mastering Cybersecurity Interviews A Comprehensive Guide for Preparation (84.38 MB)
3 3-Building Resume for Cybersecurity Career (88.51 MB)
4 4-Mastering Technical & HR Interviews in Cybersecurity (130.26 MB)
5 5-Post-Interview, What's Next (112.92 MB)
6 6-Building a Strong Personal Brand in Cybersecurity (98.32 MB)
7 7-Mastering Networking for Career Success (138.49 MB)
1 CIA Triad and Security Objective and DAD Triad (47.41 MB)
2 Information Security vs Cybersecurity (22.78 MB)
3 Key Security Terminologies - Threat, Risk, Vulnerability, Exploit (55.19 MB)
4 Security Vulnerabilities (38.37 MB)
5 Vulnerabilities Key Concepts (26.18 MB)
6 Threat Actors and Adversaries (23.39 MB)
7 MITRA ATT&CK Framework (27.89 MB)
8 Cyber Kill Chain (36.66 MB)
1 Security Threats and Malware (80.97 MB)
2 Malware Countermeasures (70.01 MB)
3 Cyber Attacks - DOS & DDOS (43.8 MB)
4 Cyber Attacks - MiTM Onpath Attack (50.43 MB)
6 Web Application Attacks (45.05 MB)
1 Introduction to Cryptography (100.28 MB)
11 Digital Signature (30.93 MB)
2 Cryptography Key Concepts (68.15 MB)
3 Symmetric Encryption (87.45 MB)
4 Asymmetric Encryption (71.37 MB)
6 Hashing and Salting (104.46 MB)
8 Public Key Infrastructure (84.86 MB)
9 Digital Certificates (38.53 MB)
1 Cloud Computing (75.39 MB)
10 Air Gapping, In Band & Out of Band Networks (61.4 MB)
2 Cloud Deployment Models (47.73 MB)
3 Shared Responsibility Matrix (58.16 MB)
4 Serverless Computing (47.4 MB)
5 Virtualization (27.66 MB)
6 Containerization (62.8 MB)
7 SDN (118.77 MB)
8 Infrastructure as Code & DevOps (47.22 MB)
9 OT & ICS (134.34 MB)
1 What is Governance (38.69 MB)
10 Risk Analysis (54.09 MB)
11 Risk Evaluation and Response (75.1 MB)
12 Risk Monitoring, Reporting, Documentation (52.38 MB)
2 What is the Security Governance (34.46 MB)
3 Security Roles (41.76 MB)
4 The Business Integration with Security (37.01 MB)
5 Security Standards and Regulations (55.57 MB)
6 The Gap Analysis (35.99 MB)
7 Risk Management Introduction (49.04 MB)
8 Risk Terminologies (37.59 MB)
9 Risk Identification (33.49 MB)
1 Security Controls (53.27 MB)
10 IDS & IPS (39.27 MB)
11 Proxy and Content Filters and Web Filtering (60.11 MB)
12 Dot1x Authentication and NAC (12.23 MB)
15 VPN (58.98 MB)
16 Internet, Email, Remote Access Policies (46.04 MB)
17 Securing Wireless Networks (30.66 MB)
18 Network Security Guidelines (51.03 MB)
19 Backup and Recovery (59.95 MB)
2 Example of Controls (34.56 MB)
20 Server, Software Security and Backup Policies (48.49 MB)
3 Control Objective (33.38 MB)
4 Layered Defenses (40.94 MB)
5 Acquisition of New Controls (37.05 MB)
6 Evaluation of Controls (30.19 MB)
7 KPI, KCI, KGI - Metrics and Monitoring (26.13 MB)
8 Network Segmentation (34.59 MB)
9 Firewalls, DMZ, Honeypots and Honeynets (55.07 MB)
Screenshot
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!