00001 Promo.mp4
00:42
00002 Introduction.mp4
02:35
00003 About the Security+ SY0-601 Exam.mp4
03:07
00004 Defining Risk.mp4
08:23
00005 Threats and Vulnerabilities.mp4
07:04
00006 Threat Intelligence.mp4
10:59
00007 Risk Management Concepts.mp4
07:24
00008 Security Controls.mp4
09:23
00009 Risk Assessments and Treatments.mp4
05:44
00010 Quantitative Risk Assessments.mp4
06:38
00011 Qualitative Risk Assessments.mp4
03:54
00012 Business Impact Analysis.mp4
09:18
00013 Data Types and Roles.mp4
11:29
00014 Security and the Information Life Cycle.mp4
09:03
00015 Data Destruction.mp4
06:04
00016 Personnel Risk and Policies.mp4
10:22
00017 Third-Party Risk Management.mp4
08:29
00018 Agreement Types.mp4
06:41
00019 Cryptography Basics.mp4
15:56
00020 Data Protection.mp4
08:37
00021 Cryptographic Methods.mp4
07:19
00022 Symmetric Cryptosystems.mp4
12:42
00023 Symmetric Block Modes.mp4
08:15
00024 Asymmetric Cryptosystems.mp4
12:48
00025 Diffie-Hellman.mp4
06:35
00026 Hashing.mp4
08:43
00027 Understanding Digital Certificates.mp4
07:40
00028 Trust Models.mp4
04:45
00029 Public Key Infrastructure.mp4
03:39
00030 Certificate Types.mp4
14:11
00031 Touring Certificates.mp4
08:48
00032 Cryptographic Attacks.mp4
05:23
00033 Password Cracking.mp4
10:13
00034 Password Cracking Demo.mp4
06:08
00035 Identification Authentication and Authorization.mp4
08:01
00036 Enabling Multifactor Authentication.mp4
04:46
00037 Authorization.mp4
04:50
00038 Accounting.mp4
05:24
00039 Authentication Methods.mp4
14:07
00040 Access Control Schemes.mp4
06:50
00041 Account Management.mp4
13:05
00042 Network Authentication.mp4
09:04
00043 Identity Management Systems.mp4
06:02
00044 Touring the CLI.mp4
16:28
00045 Shells.mp4
06:17
00046 The Windows Command Line.mp4
04:36
00047 Microsoft PowerShell.mp4
12:33
00048 Linux Shells.mp4
11:48
00049 Python Scripts.mp4
07:25
00050 Windows Command-Line Tools.mp4
16:22
00051 Linux Command-Line Tools.mp4
09:35
00052 Network Scanners.mp4
05:14
00053 Network Scanning with Nmap.mp4
08:58
00054 Network Protocol Analyzers.mp4
08:01
00055 Using Wireshark to Analyze Network Traffic.mp4
09:04
00056 Using tcpdump to Analyze Network Traffic.mp4
08:16
00057 Log Files.mp4
08:56
00058 Centralized Logging.mp4
09:03
00059 Configuring Linux Log Forwarding.mp4
08:28
00060 Malware.mp4
13:42
00061 Weak Configurations.mp4
11:36
00062 Common Attacks.mp4
09:05
00063 Driver and Overflow Attacks.mp4
07:54
00064 Password Attacks.mp4
08:04
00065 Bots and Botnets.mp4
06:14
00066 Disk RAID Levels.mp4
10:19
00067 Securing Hardware.mp4
11:04
00068 Securing Endpoints.mp4
09:13
00069 The OSI Model.mp4
12:30
00070 ARP Cache Poisoning.mp4
08:45
00071 Other Layer 2 Attacks.mp4
05:22
00072 Network Planning.mp4
07:05
00073 Load Balancing.mp4
05:39
00074 Securing Network Access.mp4
06:23
00075 Honeypots.mp4
06:02
00076 Firewalls.mp4
11:17
00077 Proxy Servers.mp4
06:16
00078 Network and Port Address Translation.mp4
06:50
00079 IP Security IPsec.mp4
08:59
00080 Virtual Private Networks VPNs.mp4
10:07
00081 Intrusion Detection and Prevention Systems IDS IPS.mp4
13:03
00082 Wi-Fi Encryption Standards.mp4
09:43
00083 RFID NFC and Bluetooth.mp4
06:51
00084 Wi-Fi Coverage and Performance.mp4
08:21
00085 Wi-Fi Discovery and Attacks.mp4
12:10
00086 Cracking WPA2.mp4
10:24
00087 Wi-Fi Hardening.mp4
10:40
00088 Defining a Public Server.mp4
00:45
00089 Common Attacks and Mitigations.mp4
09:47
00090 Containers and Software-Defined Networking.mp4
11:28
00091 Hypervisors and Virtual Machines.mp4
08:25
00092 Cloud Deployment Models.mp4
08:46
00093 Cloud Service Models.mp4
08:28
00094 Securing the Cloud.mp4
10:21
00095 Embedded Systems.mp4
13:19
00096 Industrial Control System ICS.mp4
06:44
00097 Internet of Things IoT Devices.mp4
10:04
00098 Connecting to Dedicated and Mobile Systems.mp4
10:53
00099 Security Constraints for Dedicated Systems.mp4
05:09
00100 Mobile Device Deployment and Hardening.mp4
11:13
00101 Physical Security Overview.mp4
00:58
00102 Physical Security.mp4
09:53
00103 Keylogger Demo.mp4
04:44
00104 Environmental Controls.mp4
05:24
00105 DNS Security.mp4
05:10
00106 FTP Packet Capture.mp4
03:29
00107 Secure Web and E-mail.mp4
11:58
00108 Request Forgery Attacks.mp4
04:56
00109 Cross-Site Scripting Attacks.mp4
07:16
00110 Web Application Security.mp4
08:02
00111 Web App Vulnerability Scanning.mp4
05:53
00112 Testing Infrastructure Overview.mp4
04:31
00113 Social Engineering.mp4
05:58
00114 Social Engineering Attacks.mp4
10:47
00115 Vulnerability Assessments.mp4
09:00
00116 Penetration Testing.mp4
09:47
00117 Security Assessment Tools.mp4
11:38
00118 The Metasploit Framework.mp4
08:09
00119 Incident Response Overview.mp4
02:58
00120 Incident Response Plans IRPs.mp4
06:01
00121 Threat Analysis and Mitigating Actions.mp4
07:40
00122 Digital Forensics.mp4
12:14
00123 Gathering Digital Evidence.mp4
09:44
00124 Business Continuity and Alternate Sites.mp4
06:11
00125 Data Backup.mp4
09:55