Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай CompTIA Security+ Certification Bootcamp, а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:03:01
    CompTIA Security+ Certification Bootcamp
  • Урок 2. 00:02:04
    Introduction
  • Урок 3. 00:05:15
    What Is Security+?
  • Урок 4. 00:04:21
    How To Succeed
  • Урок 5. 00:08:39
    Security Basics and CIA Triangle
  • Урок 6. 00:13:27
    The Power of Control, Different Types of Control
  • Урок 7. 00:03:46
    Different Types of Identity / Identification
  • Урок 8. 00:07:28
    Account Access Control and Privilege Management
  • Урок 9. 00:06:23
    File Access Control (Windows, Linux)
  • Урок 10. 00:07:19
    AAA Servers
  • Урок 11. 00:11:33
    Different Types of Authentication and Authentication Management
  • Урок 12. 00:12:57
    Different Existing Authentication and Authorization Mechanisms
  • Урок 13. 00:10:17
    Account Control Practices and Policies
  • Урок 14. 00:03:57
    OSI Model
  • Урок 15. 00:10:19
    Honeypots, Proxy Servers, Jump Servers, Load Balancers
  • Урок 16. 00:05:10
    Routers, Switches, ACL, Loop Protection
  • Урок 17. 00:05:49
    Firewalls
  • Урок 18. 00:06:29
    Network Segmentation
  • Урок 19. 00:07:57
    IDS, IPS, NAC
  • Урок 20. 00:06:32
    DNS, DNS Security
  • Урок 21. 00:05:33
    IP Addresses
  • Урок 22. 00:03:31
    Dynamic Host Configuration Protocol (DHCP)
  • Урок 23. 00:09:05
    Virtual Private Network (VPN)
  • Урок 24. 00:22:13
    Networking Tools / Commands
  • Урок 25. 00:08:53
    File Manipulation Tools / Commands
  • Урок 26. 00:05:14
    Forensic Tools - Commands
  • Урок 27. 00:03:29
    Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
  • Урок 28. 00:07:16
    Unsecure Protocols
  • Урок 29. 00:05:08
    Secure Protocols
  • Урок 30. 00:09:29
    Wireless Infrastructure
  • Урок 31. 00:08:19
    Wireless Encryption and Threats
  • Урок 32. 00:02:19
    Wireless Authentication Protocols
  • Урок 33. 00:03:44
    Mobile Device Connection and Communication Methods
  • Урок 34. 00:07:25
    Mobile Device Management
  • Урок 35. 00:07:29
    Mobile Device Monitoring and Protection
  • Урок 36. 00:06:59
    Virtualization Theory
  • Урок 37. 00:04:46
    Virtual Box Demonstration
  • Урок 38. 00:06:02
    Cloud Technology
  • Урок 39. 00:07:07
    Cloud Services
  • Урок 40. 00:07:56
    Storing Data in Cloud and Cloud Security
  • Урок 41. 00:06:41
    Physical Security
  • Урок 42. 00:05:18
    What is Penetration Testing?
  • Урок 43. 00:07:13
    Different Phases of a Penetration Test
  • Урок 44. 00:02:39
    Different Teams in Cyber Security
  • Урок 45. 00:05:44
    Vulnerabilities
  • Урок 46. 00:05:18
    Monitoring
  • Урок 47. 00:02:57
    Exercise: Imposter Syndrome
  • Урок 48. 00:05:15
    Different Types of Attackers
  • Урок 49. 00:08:09
    Different Types of Malware
  • Урок 50. 00:08:26
    Social Engineering, Phishing
  • Урок 51. 00:07:25
    Network Attacks
  • Урок 52. 00:04:02
    Physical Attacks
  • Урок 53. 00:07:09
    Password Attacks
  • Урок 54. 00:06:49
    Overflow Attacks, Pointer Dereference, Error Handling
  • Урок 55. 00:08:43
    Application Attacks, Injection Attacks
  • Урок 56. 00:04:19
    Zero Days and Weak Configurations
  • Урок 57. 00:02:59
    Hijacking Attacks
  • Урок 58. 00:02:45
    Cryptographic Attacks
  • Урок 59. 00:04:11
    Third Party Attacks
  • Урок 60. 00:03:03
    Host Security Boot
  • Урок 61. 00:08:14
    Endpoint Protection Strategy
  • Урок 62. 00:02:44
    System Hardening
  • Урок 63. 00:09:28
    Inbuilt Devices and Specialized Devices
  • Урок 64. 00:10:49
    Secure Application Development and Secure Coding
  • Урок 65. 00:06:15
    Concept of Risk and Risk Types
  • Урок 66. 00:08:04
    Risk Control and Analysis
  • Урок 67. 00:06:38
    Business Impact Analysis
  • Урок 68. 00:05:40
    Security Information Groups and Sources
  • Урок 69. 00:06:18
    Facility Policies and Rules
  • Урок 70. 00:05:25
    Laws and Standards
  • Урок 71. 00:07:32
    Data Handling
  • Урок 72. 00:11:32
    Incident Response and Recovery Practices
  • Урок 73. 00:08:03
    Information Gathering for Incident Response
  • Урок 74. 00:05:42
    Controls and Techniques for Lowering Risk
  • Урок 75. 00:10:07
    Redundancy and Tolerance
  • Урок 76. 00:07:29
    Symmetric and Asymmetric Encryption
  • Урок 77. 00:08:47
    Concept of Public Key Infrastructure
  • Урок 78. 00:09:01
    Important Cryptographic Terms and Concepts
  • Урок 79. 00:01:18
    Thank You!