Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай CompTIA Security+ Certification Bootcamp, а также все другие курсы, прямо сейчас!
Премиум
  1. Урок 1. 00:03:01
    CompTIA Security+ Certification Bootcamp
  2. Урок 2. 00:02:04
    Introduction
  3. Урок 3. 00:05:15
    What Is Security+?
  4. Урок 4. 00:04:21
    How To Succeed
  5. Урок 5. 00:08:39
    Security Basics and CIA Triangle
  6. Урок 6. 00:13:27
    The Power of Control, Different Types of Control
  7. Урок 7. 00:03:46
    Different Types of Identity / Identification
  8. Урок 8. 00:07:28
    Account Access Control and Privilege Management
  9. Урок 9. 00:06:23
    File Access Control (Windows, Linux)
  10. Урок 10. 00:07:19
    AAA Servers
  11. Урок 11. 00:11:33
    Different Types of Authentication and Authentication Management
  12. Урок 12. 00:12:57
    Different Existing Authentication and Authorization Mechanisms
  13. Урок 13. 00:10:17
    Account Control Practices and Policies
  14. Урок 14. 00:03:57
    OSI Model
  15. Урок 15. 00:10:19
    Honeypots, Proxy Servers, Jump Servers, Load Balancers
  16. Урок 16. 00:05:10
    Routers, Switches, ACL, Loop Protection
  17. Урок 17. 00:05:49
    Firewalls
  18. Урок 18. 00:06:29
    Network Segmentation
  19. Урок 19. 00:07:57
    IDS, IPS, NAC
  20. Урок 20. 00:06:32
    DNS, DNS Security
  21. Урок 21. 00:05:33
    IP Addresses
  22. Урок 22. 00:03:31
    Dynamic Host Configuration Protocol (DHCP)
  23. Урок 23. 00:09:05
    Virtual Private Network (VPN)
  24. Урок 24. 00:22:13
    Networking Tools / Commands
  25. Урок 25. 00:08:53
    File Manipulation Tools / Commands
  26. Урок 26. 00:05:14
    Forensic Tools - Commands
  27. Урок 27. 00:03:29
    Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
  28. Урок 28. 00:07:16
    Unsecure Protocols
  29. Урок 29. 00:05:08
    Secure Protocols
  30. Урок 30. 00:09:29
    Wireless Infrastructure
  31. Урок 31. 00:08:19
    Wireless Encryption and Threats
  32. Урок 32. 00:02:19
    Wireless Authentication Protocols
  33. Урок 33. 00:03:44
    Mobile Device Connection and Communication Methods
  34. Урок 34. 00:07:25
    Mobile Device Management
  35. Урок 35. 00:07:29
    Mobile Device Monitoring and Protection
  36. Урок 36. 00:06:59
    Virtualization Theory
  37. Урок 37. 00:04:46
    Virtual Box Demonstration
  38. Урок 38. 00:06:02
    Cloud Technology
  39. Урок 39. 00:07:07
    Cloud Services
  40. Урок 40. 00:07:56
    Storing Data in Cloud and Cloud Security
  41. Урок 41. 00:06:41
    Physical Security
  42. Урок 42. 00:05:18
    What is Penetration Testing?
  43. Урок 43. 00:07:13
    Different Phases of a Penetration Test
  44. Урок 44. 00:02:39
    Different Teams in Cyber Security
  45. Урок 45. 00:05:44
    Vulnerabilities
  46. Урок 46. 00:05:18
    Monitoring
  47. Урок 47. 00:02:57
    Exercise: Imposter Syndrome
  48. Урок 48. 00:05:15
    Different Types of Attackers
  49. Урок 49. 00:08:09
    Different Types of Malware
  50. Урок 50. 00:08:26
    Social Engineering, Phishing
  51. Урок 51. 00:07:25
    Network Attacks
  52. Урок 52. 00:04:02
    Physical Attacks
  53. Урок 53. 00:07:09
    Password Attacks
  54. Урок 54. 00:06:49
    Overflow Attacks, Pointer Dereference, Error Handling
  55. Урок 55. 00:08:43
    Application Attacks, Injection Attacks
  56. Урок 56. 00:04:19
    Zero Days and Weak Configurations
  57. Урок 57. 00:02:59
    Hijacking Attacks
  58. Урок 58. 00:02:45
    Cryptographic Attacks
  59. Урок 59. 00:04:11
    Third Party Attacks
  60. Урок 60. 00:03:03
    Host Security Boot
  61. Урок 61. 00:08:14
    Endpoint Protection Strategy
  62. Урок 62. 00:02:44
    System Hardening
  63. Урок 63. 00:09:28
    Inbuilt Devices and Specialized Devices
  64. Урок 64. 00:10:49
    Secure Application Development and Secure Coding
  65. Урок 65. 00:06:15
    Concept of Risk and Risk Types
  66. Урок 66. 00:08:04
    Risk Control and Analysis
  67. Урок 67. 00:06:38
    Business Impact Analysis
  68. Урок 68. 00:05:40
    Security Information Groups and Sources
  69. Урок 69. 00:06:18
    Facility Policies and Rules
  70. Урок 70. 00:05:25
    Laws and Standards
  71. Урок 71. 00:07:32
    Data Handling
  72. Урок 72. 00:11:32
    Incident Response and Recovery Practices
  73. Урок 73. 00:08:03
    Information Gathering for Incident Response
  74. Урок 74. 00:05:42
    Controls and Techniques for Lowering Risk
  75. Урок 75. 00:10:07
    Redundancy and Tolerance
  76. Урок 76. 00:07:29
    Symmetric and Asymmetric Encryption
  77. Урок 77. 00:08:47
    Concept of Public Key Infrastructure
  78. Урок 78. 00:09:01
    Important Cryptographic Terms and Concepts
  79. Урок 79. 00:01:18
    Thank You!