Companies Home Search Profile

EC-Council - COMPTIA SECURITY PLUS EXAM PREP

Focused View

10:01:57

67 View
  • 00001 Course Overview.mp4
    04:05
  • 00002 Introduction.mp4
    12:33
  • 00003 Safety and Professionalism.mp4
    06:37
  • 00004 Essentials of Computing.mp4
    07:38
  • 00005 Types of RAM.mp4
    06:11
  • 00006 Fundamentals of Motherboards.mp4
    06:46
  • 00007 Power Supply Unit.mp4
    05:23
  • 00008 Mass Storage Devices.mp4
    04:17
  • 00009 Introduction.mp4
    01:41
  • 00010 Identifying Indicators of Compromise IoC.mp4
    15:46
  • 00011 Comparing Different Types of Attacks Social Engineering.mp4
    13:10
  • 00012 Comparing Different Types of Attacks Application Attacks.mp4
    14:04
  • 00013 Comparing Different Types of Attacks Wireless Attacks.mp4
    09:15
  • 00014 Comparing Different Types of Attacks Cryptographic Attacks.mp4
    06:17
  • 00015 Understanding Threat Actors.mp4
    04:56
  • 00016 Understanding the Need for Penetration Testing.mp4
    07:15
  • 00017 Learning About the Concepts of Vulnerability Scanning.mp4
    02:17
  • 00018 Types of Vulnerabilities.mp4
    10:24
  • 00019 Introduction.mp4
    01:18
  • 00020 Network Security Components Firewalls and VPN.mp4
    18:35
  • 00021 Network Security Components Network Devices.mp4
    16:25
  • 00022 Network Security Components Proxies and Load Balancers.mp4
    07:46
  • 00023 Network Security Components Wireless Devices.mp4
    09:13
  • 00024 Network Security Components Other Security Devices.mp4
    14:10
  • 00025 Using Security Tools to Assess Security Posture Software Tools.mp4
    14:03
  • 00026 Using Security Tools to Assess Security Posture CLI Tools.mp4
    13:01
  • 00027 Understanding Common Security Issues.mp4
    10:07
  • 00028 Understanding Security Technologies.mp4
    06:58
  • 00029 Securing Mobile Devices - Connection.mp4
    05:11
  • 00030 Securing Mobile Devices - Management.mp4
    06:33
  • 00031 Securing Mobile Devices - Enforcement.mp4
    11:55
  • 00032 Securing Mobile Devices - Deployment.mp4
    03:32
  • 00033 Implementing Secure Protocols.mp4
    11:37
  • 00034 Introduction.mp4
    01:41
  • 00035 Understanding Frameworks and Best Practices.mp4
    05:00
  • 00036 Secure Configuration.mp4
    05:24
  • 00037 Secure Network Architecture Zones Topologies.mp4
    06:45
  • 00038 Secure Network Architecture Network Segmentation.mp4
    04:50
  • 00039 Secure Network Architecture VPN.mp4
    04:29
  • 00040 Secure Network Architecture Device Placement.mp4
    08:35
  • 00041 Implementing Secure Systems Hardware Firmware Security.mp4
    05:34
  • 00042 Implementing Secure Systems Operating System Security.mp4
    06:35
  • 00043 Implementing Secure Systems Peripherals.mp4
    03:37
  • 00044 Understanding the Importance of Secure Staging Concepts.mp4
    02:48
  • 00045 Understanding Security Issues with Embedded Systems.mp4
    07:17
  • 00046 Secure Application Development Life Cycle Models.mp4
    04:48
  • 00047 Secure Application Development Version Control Change Management and Provisioning.mp4
    03:53
  • 00048 Secure Application Development Secure Coding Concepts.mp4
    05:56
  • 00049 Secure Application Development Code Quality and Testing.mp4
    03:53
  • 00050 Security in Cloud and Virtualization Concepts.mp4
    12:08
  • 00051 Understanding Resiliency and Automation Strategies to Reduce Risk.mp4
    04:38
  • 00052 Implementing Physical Security Controls.mp4
    08:10
  • 00053 Introduction.mp4
    01:19
  • 00054 Understanding Identity and Access Management.mp4
    10:14
  • 00055 Configuring Identity and Access Services Part 1.mp4
    14:26
  • 00056 Configuring Identity and Access Services Part 2.mp4
    06:51
  • 00057 Implementing Identity and Access Management Controls.mp4
    13:40
  • 00058 Account Management Practices Part 1.mp4
    08:33
  • 00059 Account Management Practices Part 2.mp4
    05:02
  • 00060 Introduction.mp4
    01:39
  • 00061 Understanding the Importance of Policies Plans and Procedures Part 1.mp4
    04:46
  • 00062 Understanding the Importance of Policies Plans and Procedures Part 2.mp4
    05:45
  • 00063 Understanding the Importance of Policies Plans and Procedures Part 3.mp4
    04:43
  • 00064 Business Impact Analysis Concepts.mp4
    05:49
  • 00065 Risk Management Processes.mp4
    07:52
  • 00066 Incident Response Procedures Part 1.mp4
    05:21
  • 00067 Incident Response Procedures Part 2.mp4
    03:50
  • 00068 Building and Planning Effective Business Continuity Plans.mp4
    03:38
  • 00069 Computer Forensics Concepts Part 1.mp4
    03:30
  • 00070 Computer Forensics Concepts Part 2.mp4
    06:46
  • 00071 Understanding Disaster Recovery and Continuity of Operations Part 1.mp4
    03:47
  • 00072 Understanding Disaster Recovery and Continuity of Operations Part 2.mp4
    05:03
  • 00073 Understanding Types of Controls.mp4
    02:52
  • 00074 Data Security and Privacy Practices.mp4
    04:57
  • 00075 Introduction.mp4
    01:10
  • 00076 Understanding the Concepts of Cryptography Part 1.mp4
    16:53
  • 00077 Understanding the Concepts of Cryptography Part 2.mp4
    05:58
  • 00078 Understanding the Concepts of Cryptography Part 3.mp4
    06:11
  • 00079 Describing the Characteristics of Cryptography Algorithms Part 1.mp4
    07:19
  • 00080 Describing the Characteristics of Cryptography Algorithms Part 2.mp4
    07:45
  • 00081 Implementing Wireless Security.mp4
    07:58
  • 00082 Understanding Public Key Infrastructure PKI Part 1.mp4
    15:30
  • 00083 Understanding Public Key Infrastructure PKI Part 2.mp4
    07:50
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    O'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
    • language english
    • Training sessions 83
    • duration 10:01:57
    • Release Date 2023/11/06