EC-Council - COMPTIA SECURITY PLUS EXAM PREP
Focused View
10:01:57
67 View
00001 Course Overview.mp4
04:05
00002 Introduction.mp4
12:33
00003 Safety and Professionalism.mp4
06:37
00004 Essentials of Computing.mp4
07:38
00005 Types of RAM.mp4
06:11
00006 Fundamentals of Motherboards.mp4
06:46
00007 Power Supply Unit.mp4
05:23
00008 Mass Storage Devices.mp4
04:17
00009 Introduction.mp4
01:41
00010 Identifying Indicators of Compromise IoC.mp4
15:46
00011 Comparing Different Types of Attacks Social Engineering.mp4
13:10
00012 Comparing Different Types of Attacks Application Attacks.mp4
14:04
00013 Comparing Different Types of Attacks Wireless Attacks.mp4
09:15
00014 Comparing Different Types of Attacks Cryptographic Attacks.mp4
06:17
00015 Understanding Threat Actors.mp4
04:56
00016 Understanding the Need for Penetration Testing.mp4
07:15
00017 Learning About the Concepts of Vulnerability Scanning.mp4
02:17
00018 Types of Vulnerabilities.mp4
10:24
00019 Introduction.mp4
01:18
00020 Network Security Components Firewalls and VPN.mp4
18:35
00021 Network Security Components Network Devices.mp4
16:25
00022 Network Security Components Proxies and Load Balancers.mp4
07:46
00023 Network Security Components Wireless Devices.mp4
09:13
00024 Network Security Components Other Security Devices.mp4
14:10
00025 Using Security Tools to Assess Security Posture Software Tools.mp4
14:03
00026 Using Security Tools to Assess Security Posture CLI Tools.mp4
13:01
00027 Understanding Common Security Issues.mp4
10:07
00028 Understanding Security Technologies.mp4
06:58
00029 Securing Mobile Devices - Connection.mp4
05:11
00030 Securing Mobile Devices - Management.mp4
06:33
00031 Securing Mobile Devices - Enforcement.mp4
11:55
00032 Securing Mobile Devices - Deployment.mp4
03:32
00033 Implementing Secure Protocols.mp4
11:37
00034 Introduction.mp4
01:41
00035 Understanding Frameworks and Best Practices.mp4
05:00
00036 Secure Configuration.mp4
05:24
00037 Secure Network Architecture Zones Topologies.mp4
06:45
00038 Secure Network Architecture Network Segmentation.mp4
04:50
00039 Secure Network Architecture VPN.mp4
04:29
00040 Secure Network Architecture Device Placement.mp4
08:35
00041 Implementing Secure Systems Hardware Firmware Security.mp4
05:34
00042 Implementing Secure Systems Operating System Security.mp4
06:35
00043 Implementing Secure Systems Peripherals.mp4
03:37
00044 Understanding the Importance of Secure Staging Concepts.mp4
02:48
00045 Understanding Security Issues with Embedded Systems.mp4
07:17
00046 Secure Application Development Life Cycle Models.mp4
04:48
00047 Secure Application Development Version Control Change Management and Provisioning.mp4
03:53
00048 Secure Application Development Secure Coding Concepts.mp4
05:56
00049 Secure Application Development Code Quality and Testing.mp4
03:53
00050 Security in Cloud and Virtualization Concepts.mp4
12:08
00051 Understanding Resiliency and Automation Strategies to Reduce Risk.mp4
04:38
00052 Implementing Physical Security Controls.mp4
08:10
00053 Introduction.mp4
01:19
00054 Understanding Identity and Access Management.mp4
10:14
00055 Configuring Identity and Access Services Part 1.mp4
14:26
00056 Configuring Identity and Access Services Part 2.mp4
06:51
00057 Implementing Identity and Access Management Controls.mp4
13:40
00058 Account Management Practices Part 1.mp4
08:33
00059 Account Management Practices Part 2.mp4
05:02
00060 Introduction.mp4
01:39
00061 Understanding the Importance of Policies Plans and Procedures Part 1.mp4
04:46
00062 Understanding the Importance of Policies Plans and Procedures Part 2.mp4
05:45
00063 Understanding the Importance of Policies Plans and Procedures Part 3.mp4
04:43
00064 Business Impact Analysis Concepts.mp4
05:49
00065 Risk Management Processes.mp4
07:52
00066 Incident Response Procedures Part 1.mp4
05:21
00067 Incident Response Procedures Part 2.mp4
03:50
00068 Building and Planning Effective Business Continuity Plans.mp4
03:38
00069 Computer Forensics Concepts Part 1.mp4
03:30
00070 Computer Forensics Concepts Part 2.mp4
06:46
00071 Understanding Disaster Recovery and Continuity of Operations Part 1.mp4
03:47
00072 Understanding Disaster Recovery and Continuity of Operations Part 2.mp4
05:03
00073 Understanding Types of Controls.mp4
02:52
00074 Data Security and Privacy Practices.mp4
04:57
00075 Introduction.mp4
01:10
00076 Understanding the Concepts of Cryptography Part 1.mp4
16:53
00077 Understanding the Concepts of Cryptography Part 2.mp4
05:58
00078 Understanding the Concepts of Cryptography Part 3.mp4
06:11
00079 Describing the Characteristics of Cryptography Algorithms Part 1.mp4
07:19
00080 Describing the Characteristics of Cryptography Algorithms Part 2.mp4
07:45
00081 Implementing Wireless Security.mp4
07:58
00082 Understanding Public Key Infrastructure PKI Part 1.mp4
15:30
00083 Understanding Public Key Infrastructure PKI Part 2.mp4
07:50
More details
User Reviews
Rating
average 0
Focused display
Category

O'Reilly
View courses O'ReillyO'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
- language english
- Training sessions 83
- duration 10:01:57
- Release Date 2023/11/06