Companies Home Search Profile

CompTIA Security+ Certification Prep

Focused View

9:28:20

9 View
  • 01.01.About the Author.mp4
    00:28
  • 01.02.About the Course.mp4
    02:15
  • 01.03.About the Exam.mp4
    03:42
  • 02.01.Understanding IOCs.mp4
    10:46
  • 02.02.Types of Malware.mp4
    12:59
  • 03.01.Social Engineering Attacks.mp4
    05:12
  • 03.02.Technical Attacks.mp4
    12:07
  • 03.03.Wireless and Cryptographic Attacks.mp4
    12:02
  • 04.01.Threat Actor Types and Attributes.mp4
    10:12
  • 05.01.Pentesting Concepts.mp4
    08:02
  • 06.01.Explain concepts of vulnerability scanning.mp4
    07:32
  • 07.01.Discuss the Impact of Vulnerability Types.mp4
    16:33
  • 08.01.Firewalls.mp4
    10:35
  • 08.02.IDSIPS.mp4
    14:12
  • 08.03.Router and Switch Security.mp4
    05:36
  • 08.04.Proxies and Load balancers.mp4
    06:57
  • 08.05.Other Network Components.mp4
    14:28
  • 09.01.Tool Overview.mp4
    15:51
  • 09.02.Command Line Tools.mp4
    10:09
  • 10.01.Common Security Issues and their Impact.mp4
    17:43
  • 11.01.Connection Methodologies Defined.mp4
    11:18
  • 11.02.Mobile Device Management Principles.mp4
    10:51
  • 11.03.Monitoring and Enforcing Mobile methodologies.mp4
    18:18
  • 12.01.Secure Protocols Overview Part 1.mp4
    09:27
  • 12.02.Secure Protocols Overview Part 2.mp4
    08:38
  • 13.01.Frameworks Overview.mp4
    08:10
  • 14.01.Discussing the Concepts That Will Help Secure Your Network.mp4
    09:47
  • 15.01.Hardware Security.mp4
    07:54
  • 15.02.Operating Systems.mp4
    09:46
  • 16.01.Staging Environments and Security Implications.mp4
    04:56
  • 17.01.Security Implications of Embedded Systems.mp4
    13:58
  • 18.01.Development Lifecycle Models.mp4
    07:14
  • 18.02.Secure DevOps.mp4
    08:25
  • 18.03.Secure Coding Techniques and Best Practices.mp4
    14:38
  • 18.04.Code Quality and Testing.mp4
    05:26
  • 19.01.Virtualization Concepts.mp4
    05:35
  • 19.02.Cloud Concepts.mp4
    07:02
  • 20.01.Resiliency and Automation.mp4
    08:00
  • 20.02.Redundancy and High Availability.mp4
    05:20
  • 21.01.Physical Controls.mp4
    12:27
  • 22.01.Identification, Authentication, Authorization, and Accounting (AAA).mp4
    07:37
  • 23.01.Account Management.mp4
    12:19
  • 23.02.Account Policy Enforcement.mp4
    08:57
  • 24.01.Define Different Identity and Access Service Types.mp4
    08:02
  • 24.02.Identity and Access Services Part 2.mp4
    05:23
  • 25.01.Identity and Access Management Controls.mp4
    08:16
  • 26.01.Personnel Management.mp4
    09:46
  • 26.02.Agreement Types.mp4
    07:32
  • 27.01.Business Impact Analysis.mp4
    12:25
  • 28.01.Risk Management.mp4
    07:24
  • 29.01.Incident Response Concepts.mp4
    09:48
  • 30.01.Digital Forensics.mp4
    04:56
  • 31.01.Disaster Recovery and Continuity of Operations.mp4
    09:15
  • 32.01.Differentiating Between Control Types.mp4
    04:58
  • 33.01.Data Security and Privacy Practices.mp4
    08:06
  • 34.01.Basic Concepts of Cryptography (Part 1).mp4
    10:34
  • 34.02.Basic Concepts of Cryptography (Part 2).mp4
    06:14
  • 35.01.Symmetric Algorithms.mp4
    08:00
  • 35.02.Asymmetric Algorithms.mp4
    02:37
  • 35.03.Hashing Algorithms.mp4
    04:59
  • 36.01.Wireless Cryptography.mp4
    08:33
  • 37.01.PKI Overview.mp4
    06:34
  • 37.02.Types of Certificates.mp4
    07:14
  • 37.03.Concepts.mp4
    04:20
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    A Cloud Guru is an online training platform for people interested in Information Technology. Most of the courses offered prepare students to take certification exams for the three major cloud providers.
    • language english
    • Training sessions 64
    • duration 9:28:20
    • Release Date 2024/04/28