Download Free Download : CompTIA Security SY0601 Complete Course Exam RETIRED
mp4 | Video: h264,1920X1080 | Audio: AAC, 44.1 KHz
Genre:eLearning | Language: English | Size:15.64 GB
Files Included :
1 - Welcome.mp4 (106.53 MB)
MP4
10 - Threat Intelligence and Sources OBJ 15.mp4 (59.6 MB)
MP4
11 - Threat Hunting OBJ 17.mp4 (28.62 MB)
MP4
12 - Attack Frameworks OBJ 42.mp4 (94.26 MB)
MP4
3 - Overview of Security.mp4 (33.31 MB)
MP4
4 - CIA Triad.mp4 (108.48 MB)
MP4
5 - AAA of Security OBJ 24.mp4 (57.78 MB)
MP4
6 - Security Threats OBJ 11 12.mp4 (25.03 MB)
MP4
7 - Mitigating Threats OBJ 51.mp4 (29.61 MB)
MP4
8 - Hackers OBJ 15.mp4 (99.36 MB)
MP4
9 - Threat Actors 15.mp4 (17.52 MB)
MP4
78 - Software Development OBJ 21 23.mp4 (99.75 MB)
MP4
79 - SDLC Principles OBJ 16 23 32 53.mp4 (136.83 MB)
MP4
80 - Testing Methods OBJ 23 32.mp4 (154.52 MB)
MP4
81 - Software Vulnerabilities and Exploits OBJ 12 13 16.mp4 (41.76 MB)
MP4
82 - Buffer Overflows OBJ 13.mp4 (139.78 MB)
MP4
83 - Demo Buffer Overflow Attack OBJ 13.mp4 (36.97 MB)
MP4
84 - XSS and XSRF OBJ 13.mp4 (26.61 MB)
MP4
85 - SQL Injection OBJ 13.mp4 (146.54 MB)
MP4
86 - Demo SQL Injection OBJ 12 13.mp4 (98.1 MB)
MP4
87 - XML Vulnerabilities OBJ 13.mp4 (54.17 MB)
MP4
88 - Race Conditions OBJ 13.mp4 (27.18 MB)
MP4
89 - Design Vulnerabilities OBJ 13.mp4 (13.59 MB)
MP4
100 - Telephony OBJ 31.mp4 (123.93 MB)
MP4
90 - Network Security.mp4 (8.51 MB)
MP4
91 - The OSI Model OBJ 33 36.mp4 (132.78 MB)
MP4
92 - Switches OBJ 14 27.mp4 (38.74 MB)
MP4
93 - Routers OBJ 33.mp4 (13.26 MB)
MP4
94 - Network Zones OBJ 33.mp4 (34.87 MB)
MP4
95 - Jumpbox OBJ 35.mp4 (23.22 MB)
MP4
96 - Network Access Control OBJ 33 44.mp4 (57.6 MB)
MP4
97 - VLANs OBJ 33.mp4 (12.11 MB)
MP4
98 - Subnetting OBJ 36.mp4 (42.33 MB)
MP4
99 - Network Address Translation OBJ 33.mp4 (54.99 MB)
MP4
101 - Perimeter Security.mp4 (6.75 MB)
MP4
102 - Firewalls OBJ 33 44.mp4 (88.64 MB)
MP4
103 - Demo SOHO Firewall OBJ 33 44.mp4 (16.38 MB)
MP4
104 - Proxy Servers OBJ 33 44.mp4 (93.28 MB)
MP4
105 - Honeypots and Honeynets OBJ 21.mp4 (11.39 MB)
MP4
106 - Data Loss Prevention OBJ 21 32 44.mp4 (9.11 MB)
MP4
107 - NIDS and NIPS OBJ 33.mp4 (47.13 MB)
MP4
108 - Unified Threat Management OBJ 32 33.mp4 (20.96 MB)
MP4
109 - Cloud Computing OBJ 15 22 35 36.mp4 (77.2 MB)
MP4
110 - Cloud Types OBJ 22 36.mp4 (24.37 MB)
MP4
111 - As a Service OBJ 22.mp4 (158.61 MB)
MP4
112 - Cloud Security OBJ 25 36.mp4 (20.86 MB)
MP4
113 - Defending Servers OBJ 17 31 and 32.mp4 (50.89 MB)
MP4
114 - Cloudbased Infrastructure OBJ 12 16 22 24 25 36.mp4 (57.82 MB)
MP4
115 - CASB OBJ 21.mp4 (19.59 MB)
MP4
116 - API OBJ 21.mp4 (25.77 MB)
MP4
117 - FAAS and Serverless OBJ 22.mp4 (29.57 MB)
MP4
118 - Cloud Threats OBJ 13 16 21 22.mp4 (29.69 MB)
MP4
119 - Workflow Orchestration OBJ 23.mp4 (13.83 MB)
MP4
120 - CICD OBJ 23.mp4 (32.09 MB)
MP4
121 - DevSecOps OBJ 23.mp4 (30.87 MB)
MP4
122 - IAC OBJ 22.mp4 (16.22 MB)
MP4
123 - Machine Learning OBJ 12.mp4 (78.33 MB)
MP4
124 - Network Attacks OBJ 14.mp4 (3.56 MB)
MP4
125 - Ports and Protocols OBJ 31.mp4 (35.49 MB)
MP4
126 - Memorization of Ports OBJ 31.mp4 (114.95 MB)
MP4
127 - Unnecessary Ports OBJ 16 32.mp4 (38.75 MB)
MP4
128 - Denial of Service OBJ 13 14.mp4 (63.68 MB)
MP4
129 - DDoS OBJ 12 13 14.mp4 (51.24 MB)
MP4
130 - Stopping a DDoS OBJ 21 23.mp4 (53.89 MB)
MP4
131 - Spoofing OBJ 14 33.mp4 (10.8 MB)
MP4
132 - Hijacking OBJ 13 14.mp4 (38.11 MB)
MP4
133 - Replay Attack OBJ 13.mp4 (16.54 MB)
MP4
134 - Demo Null Sessions OBJ 16.mp4 (10.9 MB)
MP4
135 - Transitive Attacks OBJ 24.mp4 (11.84 MB)
MP4
136 - DNS Attacks OBJ 11 14 31.mp4 (96.79 MB)
MP4
137 - ARP Poisoning OBJ 14.mp4 (12.35 MB)
MP4
138 - Securing Networks OBJ 33.mp4 (19.47 MB)
MP4
139 - Securing Network Devices OBJ 12 16 33 37.mp4 (152.14 MB)
MP4
140 - Securing Network Media OBJ 27.mp4 (195.91 MB)
MP4
141 - Securing WiFi Devices OBJ 14 34.mp4 (49.9 MB)
MP4
142 - Wireless Encryption OBJ 16 34.mp4 (61.31 MB)
MP4
143 - Wireless Access Points OBJ 14 34.mp4 (141.41 MB)
MP4
144 - Wireless Attacks OBJ 12 14 18.mp4 (47.28 MB)
MP4
145 - Demo Wireless Attack OBJ 14.mp4 (64.81 MB)
MP4
146 - WPA3 OBJ 34.mp4 (26.57 MB)
MP4
147 - Other Wireless Technologies OBJ 14 35.mp4 (136.32 MB)
MP4
148 - Physical Security OBJ 27.mp4 (34.26 MB)
MP4
149 - Surveillance OBJ 27.mp4 (95.83 MB)
MP4
150 - Door Locks OBJ 27.mp4 (21.78 MB)
MP4
151 - Demo Lock Picking OBJ 27.mp4 (37.97 MB)
MP4
152 - Biometric Readers OBJ 24.mp4 (46.79 MB)
MP4
153 - Facilities Security OBJ 27.mp4 (14.2 MB)
MP4
154 - Fire Suppression OBJ 27.mp4 (141.08 MB)
MP4
155 - HVAC OBJ 25 26 27.mp4 (54.71 MB)
MP4
156 - Shielding OBJ 27.mp4 (55.56 MB)
MP4
157 - Vehicular Vulnerabilities OBJ 26 27.mp4 (36.32 MB)
MP4
158 - IoT Vulnerabilities OBJ 26.mp4 (23.22 MB)
MP4
159 - Embedded System Vulnerabilities OBJ 26.mp4 (26.25 MB)
MP4
160 - ICS and SCADA Vulnerabilities OBJ 26.mp4 (34.33 MB)
MP4
161 - Mitigating Vulnerabilities OBJ 26.mp4 (12.37 MB)
MP4
162 - Premise System Vulnerabilities OBJ 12 13 17 26.mp4 (30.23 MB)
MP4
163 - Authentication OBJ 24 35 38.mp4 (66.73 MB)
MP4
164 - Authentication Models OBJ 24 35 38 39.mp4 (57.04 MB)
MP4
165 - 8021x OBJ 34 38.mp4 (29.85 MB)
MP4
166 - LDAP and Kerberos OBJ 31 38.mp4 (20.4 MB)
MP4
167 - Remote Desktop Services OBJ 31.mp4 (15 MB)
MP4
168 - Remote Access Service OBJ 31 38.mp4 (22.35 MB)
MP4
169 - VPN OBJ 33.mp4 (32.49 MB)
MP4
170 - RADIUS vs TACACS OBJ 38.mp4 (18.94 MB)
MP4
171 - Authentication Summary OBJ 38.mp4 (16.27 MB)
MP4
172 - Authentication Attacks OBJ 12.mp4 (43.72 MB)
MP4
13 - Malware OBJ 12.mp4 (3.88 MB)
MP4
14 - Viruses OBJ 12.mp4 (127.51 MB)
MP4
15 - Worms OBJ 12.mp4 (17.97 MB)
MP4
16 - Trojans OBJ 12.mp4 (32.45 MB)
MP4
17 - Demo Viruses and Trojans OBJ 12.mp4 (50.77 MB)
MP4
18 - Ransomware OBJ 12.mp4 (77.36 MB)
MP4
19 - Spyware OBJ 12.mp4 (57.51 MB)
MP4
20 - Rootkits OBJ 12 13.mp4 (38.87 MB)
MP4
21 - Spam OBJ 11.mp4 (25.73 MB)
MP4
22 - Summary of Malware.mp4 (11.99 MB)
MP4
173 - Access Control OBJ 38.mp4 (9.46 MB)
MP4
174 - Access Control Models OBJ 38.mp4 (69.85 MB)
MP4
175 - Best Practices OBJ 27 38 53.mp4 (129.02 MB)
MP4
176 - Users and Groups OBJ 37 38.mp4 (103.76 MB)
MP4
177 - Permissions OBJ 38.mp4 (41.6 MB)
MP4
178 - Usernames and Passwords OBJ 16 37.mp4 (21.43 MB)
MP4
179 - Demo Policies OBJ 37.mp4 (22.96 MB)
MP4
180 - User Account Control OBJ 37 38.mp4 (41.49 MB)
MP4
181 - Risk Assessments OBJ 54.mp4 (194.04 MB)
MP4
182 - Qualitative Risk OBJ 54.mp4 (94.18 MB)
MP4
183 - Quantitative Risk OBJ 54.mp4 (60.83 MB)
MP4
184 - Methodologies OBJ 17 54.mp4 (30.2 MB)
MP4
185 - Security Controls OBJ 51.mp4 (37.51 MB)
MP4
186 - Types of Risk OBJ 16 54.mp4 (30.93 MB)
MP4
187 - Vulnerability Management OBJ 17 41 54.mp4 (266.12 MB)
MP4
188 - Penetration Testing OBJ 18.mp4 (50.65 MB)
MP4
189 - Training and Exercises OBJ 18 42.mp4 (27.27 MB)
MP4
190 - OVAL OBJ 17.mp4 (16.58 MB)
MP4
191 - Vulnerability Assessments OBJ 17 41.mp4 (206.54 MB)
MP4
192 - Demo Nmap Scanning OBJ 41.mp4 (97.71 MB)
MP4
193 - Demo Vulnerability Scanning OBJ 17 41 43.mp4 (52.92 MB)
MP4
194 - Password Analysis OBJ 12.mp4 (131.05 MB)
MP4
195 - Demo Password Cracking OBJ 41.mp4 (20.16 MB)
MP4
196 - Monitoring Types OBJ 33.mp4 (24.03 MB)
MP4
197 - Performance Baselining OBJ 21.mp4 (105.17 MB)
MP4
198 - Protocol Analyzers OBJ 33 41.mp4 (24.63 MB)
MP4
199 - SNMP OBJ 31.mp4 (81.14 MB)
MP4
200 - Demo Analytical Tools OBJ 41.mp4 (51.79 MB)
MP4
201 - Auditing OBJ 17.mp4 (22.24 MB)
MP4
202 - Demo Auditing Files OBJ 17.mp4 (18.63 MB)
MP4
203 - Logging OBJ 17 43 45.mp4 (121.14 MB)
MP4
204 - Log Files OBJ 43.mp4 (58.92 MB)
MP4
205 - SIEM OBJ 17 43.mp4 (46.01 MB)
MP4
206 - Syslog OBJ 17 43.mp4 (30.82 MB)
MP4
207 - SOAR OBJ 17 44.mp4 (13.64 MB)
MP4
208 - Cryptography OBJ 21 28.mp4 (41.32 MB)
MP4
209 - Symmetric vs Asymmetric OBJ 28.mp4 (136.85 MB)
MP4
210 - Symmetric Algorithms OBJ 28.mp4 (158.69 MB)
MP4
211 - Public Key Cryptography OBJ 28.mp4 (21.75 MB)
MP4
212 - Asymmetric Algorithms OBJ 28.mp4 (30.07 MB)
MP4
213 - Pretty Good Privacy OBJ 28.mp4 (19.78 MB)
MP4
214 - Key Management OBJ 28.mp4 (24.41 MB)
MP4
215 - OneTime Pad OBJ 28.mp4 (48.54 MB)
MP4
216 - Demo Steganography OBJ 28.mp4 (41.71 MB)
MP4
217 - Cryptography Considerations OBJ 28.mp4 (106.48 MB)
MP4
218 - Hashing OBJ 12 28 32.mp4 (171.95 MB)
MP4
219 - Demo Hashing OBJ 28.mp4 (38.91 MB)
MP4
220 - Hashing Attacks OBJ 1213 28.mp4 (72.28 MB)
MP4
221 - Increasing Hash Security OBJ 28 37.mp4 (12.2 MB)
MP4
222 - Public Key Infrastructure OBJ 31 33 39.mp4 (29.1 MB)
MP4
223 - Digital Certificates OBJ 39.mp4 (146.26 MB)
MP4
224 - Demo Certificates OBJ 28 39.mp4 (16.76 MB)
MP4
225 - Certificate Authorities OBJ 32 39.mp4 (33.28 MB)
MP4
226 - Web of Trust OBJ 39.mp4 (14.37 MB)
MP4
227 - Security Protocols OBJ 31.mp4 (3.28 MB)
MP4
228 - SMIME OBJ 31.mp4 (8.21 MB)
MP4
229 - SSL and TLS OBJ 12 21 31 33.mp4 (127.48 MB)
MP4
230 - SSH OBJ 31 41.mp4 (28.37 MB)
MP4
231 - VPN Protocols OBJ 31 33.mp4 (72.79 MB)
MP4
232 - Demo Setting up a VPN OBJ 33.mp4 (8.65 MB)
MP4
233 - Planning for the Worst OBJ 25 54.mp4 (48.6 MB)
MP4
234 - Redundant Power OBJ 25.mp4 (34.57 MB)
MP4
235 - Backup Power OBJ 25.mp4 (70.47 MB)
MP4
236 - Data Redundancy OBJ 25.mp4 (50.71 MB)
MP4
237 - Demo RAIDs OBJ 25.mp4 (20.49 MB)
MP4
238 - Network Redundancy OBJ 25.mp4 (24.32 MB)
MP4
239 - Server Redundancy OBJ 25 33.mp4 (13.92 MB)
MP4
240 - Redundant Sites OBJ 21.mp4 (51.29 MB)
MP4
241 - Data Backup OBJ 25.mp4 (23.59 MB)
MP4
242 - Tape Rotation OBJ 25.mp4 (31.9 MB)
MP4
243 - Disaster Recovery Plan OBJ 21 25 42 54.mp4 (247.95 MB)
MP4
244 - Business Impact Analysis OBJ 54.mp4 (158.31 MB)
MP4
245 - Social Engineering OBJ 11.mp4 (5.11 MB)
MP4
246 - Demo Pretexting OBJ 11 53.mp4 (96.91 MB)
MP4
247 - Insider Threat OBJ 15.mp4 (24.61 MB)
MP4
248 - Phishing OBJ 11 53.mp4 (141.4 MB)
MP4
249 - Motivation Factors OBJ 11.mp4 (166.34 MB)
MP4
250 - More Social Engineering OBJ 11 12.mp4 (90.51 MB)
MP4
251 - Fraud and Scams OBJ 11.mp4 (45.93 MB)
MP4
252 - Influence Campaigns OBJ 11.mp4 (42.86 MB)
MP4
253 - User Education OBJ 53.mp4 (54.38 MB)
MP4
23 - Malware Infections.mp4 (48.1 MB)
MP4
24 - Common Delivery Methods OBJ 11 15.mp4 (98.24 MB)
MP4
25 - Demo Phishing OBJ 11 53.mp4 (68.41 MB)
MP4
26 - Botnets and Zombies OBJ 12 14.mp4 (32.82 MB)
MP4
27 - Active Interception and Privilege Escalation OBJ 13 14.mp4 (38.98 MB)
MP4
28 - Demo Privilege Escalation OBJ 13 18.mp4 (82.57 MB)
MP4
29 - Backdoors and Logic Bombs OBJ 12.mp4 (43.14 MB)
MP4
30 - Symptoms of Infection OBJ 12.mp4 (45.97 MB)
MP4
31 - Removing Malware OBJ 42.mp4 (56.09 MB)
MP4
32 - Preventing Malware OBJ 16 32.mp4 (66.47 MB)
MP4
33 - Malware Exploitation OBJ 12 14.mp4 (48.88 MB)
MP4
254 - Policies and Procedures OBJ 52 53.mp4 (63.36 MB)
MP4
255 - Data Classifications OBJ 53 55.mp4 (73.48 MB)
MP4
256 - Data Ownership.mp4 (13.8 MB)
MP4
257 - PII and PHI OBJ 52 55.mp4 (135.01 MB)
MP4
258 - Legal Requirements OBJ 52 55.mp4 (33.57 MB)
MP4
259 - Privacy Technologies OBJ 55.mp4 (22.41 MB)
MP4
260 - Security Policies OBJ 53 55.mp4 (229.49 MB)
MP4
261 - User Education OBJ 53.mp4 (33.72 MB)
MP4
262 - Vendor Relationships OBJ 53.mp4 (173.8 MB)
MP4
263 - Disposal Policies OBJ 27 41.mp4 (111.42 MB)
MP4
264 - IT Security Frameworks OBJ 52.mp4 (35.88 MB)
MP4
265 - Key Frameworks OBJ 52.mp4 (76.91 MB)
MP4
266 - Incident Response Procedures OBJ 42.mp4 (102.98 MB)
MP4
267 - Incident Response Planning OBJ 42.mp4 (93.17 MB)
MP4
268 - Investigative Data OBJ 43.mp4 (65.27 MB)
MP4
269 - Forensic Procedures OBJ 45.mp4 (91.15 MB)
MP4
270 - Data Collection Procedures OBJ 41 45.mp4 (48.51 MB)
MP4
271 - Demo Disk Imaging OBJ 41.mp4 (100.67 MB)
MP4
272 - Security Tools OBJ 41.mp4 (99.38 MB)
MP4
273 - Conclusion.mp4 (107.6 MB)
MP4
274 - BONUS Whats Next.mp4 (117.46 MB)
MP4
34 - Security Applications and Devices.mp4 (3.21 MB)
MP4
35 - Software Firewalls OBJ 32.mp4 (94.34 MB)
MP4
36 - Demo Software Firewalls OBJ 32.mp4 (42.67 MB)
MP4
37 - IDS OBJ 32 33.mp4 (108.61 MB)
MP4
38 - Popup Blockers OBJ 11 33 44.mp4 (33.86 MB)
MP4
39 - Data Loss Prevention DLP OBJ 21 32 44.mp4 (82.53 MB)
MP4
40 - Securing the BIOS OBJ 32.mp4 (43.63 MB)
MP4
41 - Securing Storage Devices OBJ 21 25 33.mp4 (74.75 MB)
MP4
42 - Disk Encryption OBJ 21 28 32.mp4 (53.95 MB)
MP4
43 - Endpoint Analysis OBJ 31 33.mp4 (39.28 MB)
MP4
44 - Mobile Device Security OBJ 15.mp4 (7.34 MB)
MP4
45 - Securing Wireless Devices OBJ 34 35.mp4 (16.73 MB)
MP4
46 - Mobile Malware OBJ 11 35.mp4 (72.74 MB)
MP4
47 - SIM Cloning ID Theft OBJ 11 24 26.mp4 (43.66 MB)
MP4
48 - Bluetooth Attacks OBJ 14 34.mp4 (49.19 MB)
MP4
49 - Mobile Device Theft OBJ 35.mp4 (139.99 MB)
MP4
50 - Security of Apps OBJ 31 35.mp4 (111.24 MB)
MP4
51 - BYOD OBJ 35.mp4 (111.4 MB)
MP4
52 - Hardening Mobile Devices OBJ 35.mp4 (84.13 MB)
MP4
53 - Hardening OBJ 32.mp4 (40.58 MB)
MP4
54 - Unnecessary Applications OBJ 16.mp4 (70.42 MB)
MP4
55 - Restricting Applications OBJ 32 44.mp4 (31.73 MB)
MP4
56 - Demo Unnecessary Services OBJ 32 33.mp4 (64.09 MB)
MP4
57 - Trusted Operating System OBJ 32.mp4 (43.47 MB)
MP4
58 - Updates and Patches OBJ 16 32.mp4 (27.59 MB)
MP4
59 - Patch Management OBJ 16 32.mp4 (41.72 MB)
MP4
60 - Group Policies OBJ 21.mp4 (21.67 MB)
MP4
61 - Demo Group Policies OBJ 32.mp4 (17.65 MB)
MP4
62 - File Systems and Hard Drives OBJ 21 32.mp4 (71.21 MB)
MP4
63 - Supply Chain Assessment OBJ 12 15 16.mp4 (31.31 MB)
MP4
64 - Root of Trust OBJ 32.mp4 (21.07 MB)
MP4
65 - Trusted Firmware OBJ 32.mp4 (18.38 MB)
MP4
66 - Secure Processing OBJ 32.mp4 (13.16 MB)
MP4
67 - Virtualization OBJ 22.mp4 (47.47 MB)
MP4
68 - Hypervisors OBJ 22.mp4 (29.54 MB)
MP4
69 - Demo How to create a VM OBJ 22.mp4 (37.13 MB)
MP4
70 - Threats to VMs OBJ 22.mp4 (30.86 MB)
MP4
71 - Securing VMs OBJ 22.mp4 (84.63 MB)
MP4
72 - Demo Securing VMs.mp4 (27.65 MB)
MP4
73 - Application Security.mp4 (39.95 MB)
MP4
74 - Web Browser Security OBJ 32 33.mp4 (74.4 MB)
MP4
75 - Web Browser Concerns OBJ 32 33.mp4 (71.23 MB)
MP4
76 - Demo Web Browser Configuration OBJ 32 33.mp4 (46.7 MB)
MP4
77 - Securing Applications OBJ 14 32.mp4 (105.38 MB)
MP4