SEC401 Security Essentials Bootcamp Style
Focused View
37:24:56
169 View
- 1.1 Introduction Network Security Essentials
- 1.mp428:21
- 2.mp400:36
- 3.mp409:08
- 1.2 Defensible Network Architecture
- 1.mp404:04
- 2.mp400:13
- 3.mp402:15
- 4.mp402:16
- 5.mp402:15
- 6.mp400:30
- 7.mp402:00
- 8.mp405:50
- 9.mp401:29
- 10.mp400:10
- 11.mp401:35
- 12.mp401:43
- 13.mp400:33
- 14.mp405:07
- 15.mp400:48
- 16.mp400:01
- 17.mp401:46
- 18.mp402:54
- 19.mp400:14
- 20.mp403:10
- 21.mp400:40
- 22.mp406:28
- 23.mp401:00
- 24.mp400:16
- 25.mp404:53
- 26.mp402:37
- 1.3 Virtualization and Cloud Security
- 1.mp404:35
- 2.mp401:16
- 3.mp400:01
- 4.mp405:10
- 5.mp401:27
- 6.mp400:41
- 7.mp403:45
- 8.mp400:01
- 9.mp405:17
- 10.mp402:11
- 11.mp402:38
- 12.mp401:36
- 13.mp400:01
- 14.mp401:33
- 15.mp401:11
- 16.mp400:59
- 17.mp403:41
- 18.mp401:15
- 19.mp401:28
- 20.mp401:13
- 21.mp401:25
- 22.mp400:01
- 23.mp402:16
- 24.mp402:11
- 25.mp402:49
- 26.mp401:01
- 27.mp402:21
- 28.mp403:52
- 29.mp400:01
- 30.mp400:11
- 31.mp402:09
- 32.mp403:06
- 33.mp417:03
- 34.mp400:01
- 1.4 Network Device Security
- 1.mp401:21
- 2.mp401:27
- 3.mp400:01
- 4.mp400:16
- 5.mp405:51
- 6.mp402:41
- 7.mp403:26
- 8.mp402:33
- 9.mp410:20
- 10.mp400:35
- 11.mp401:01
- 12.mp400:29
- 13.mp403:05
- 14.mp400:59
- 15.mp400:58
- 16.mp400:35
- 17.mp400:20
- 18.mp400:30
- 19.mp400:28
- 20.mp400:11
- 21.mp400:29
- 22.mp400:35
- 23.mp400:01
- 24.mp402:11
- 25.mp402:42
- 26.mp405:33
- 27.mp402:57
- 28.mp400:36
- 29.mp402:42
- 30.mp403:26
- 31.mp403:45
- 32.mp408:31
- 33.mp400:05
- 34.mp401:01
- 35.mp401:38
- 1.5 Networking and Protocols
- 1.mp401:45
- 2.mp405:03
- 3.mp400:01
- 4.mp401:24
- 5.mp401:48
- 6.mp400:16
- 7.mp407:22
- 8.mp403:10
- 9.mp404:27
- 10.mp400:01
- 11.mp401:00
- 12.mp403:52
- 13.mp400:54
- 14.mp401:21
- 15.mp402:13
- 16.mp400:55
- 17.mp401:40
- 18.mp400:52
- 19.mp400:01
- 20.mp402:11
- 21.mp400:27
- 22.mp401:51
- 23.mp400:32
- 24.mp400:39
- 25.mp404:20
- 26.mp402:31
- 27.mp401:15
- 28.mp401:20
- 29.mp400:01
- 30.mp400:24
- 31.mp400:29
- 32.mp402:09
- 33.mp405:49
- 34.mp402:30
- 35.mp401:03
- 36.mp402:11
- 37.mp400:47
- 38.mp400:35
- 39.mp402:53
- 40.mp401:16
- 41.mp401:29
- 42.mp400:01
- 1.6 Securing Wireless Networks
- 1.mp402:11
- 2.mp400:52
- 3.mp400:01
- 4.mp405:32
- 5.mp403:34
- 6.mp401:11
- 7.mp400:01
- 8.mp402:03
- 9.mp401:56
- 10.mp403:14
- 11.mp401:07
- 12.mp401:58
- 13.mp400:55
- 14.mp403:51
- 15.mp400:11
- 16.mp400:54
- 17.mp402:32
- 18.mp400:51
- 19.mp402:35
- 20.mp401:38
- 21.mp400:10
- 22.mp405:03
- 23.mp405:25
- 24.mp403:29
- 25.mp400:16
- 26.mp402:02
- 27.mp400:59
- 28.mp400:59
- 29.mp401:31
- 30.mp403:02
- 31.mp400:25
- 32.mp401:30
- 33.mp400:09
- 34.mp402:43
- 35.mp400:11
- 36.mp400:01
- 37.mp400:45
- 38.mp400:01
- 1.7 Securing Web Communications
- 1.mp401:30
- 2.mp400:45
- 3.mp400:17
- 4.mp410:35
- 5.mp402:50
- 6.mp405:06
- 7.mp405:29
- 8.mp400:35
- 9.mp403:09
- 10.mp401:24
- 11.mp404:51
- 12.mp405:13
- 13.mp400:09
- 14.mp400:08
- 15.mp404:17
- 16.mp402:38
- 17.mp402:50
- 18.mp406:14
- 19.mp406:11
- 20.mp401:19
- 21.mp402:39
- 22.mp400:01
- 23.mp400:01
- 24.mp400:01
- 25.mp400:01
- 26.mp400:01
- 27.mp400:13
- 2.1 Introduction Defense-in-Depth and Attacks
- 1.mp400:19
- 2.mp401:53
- 3.mp407:14
- 2.2 Defense-in-Depth
- 1.mp401:04
- 2.mp402:30
- 3.mp400:01
- 4.mp416:10
- 5.mp408:23
- 6.mp401:15
- 7.mp407:10
- 8.mp400:01
- 9.mp400:44
- 10.mp401:36
- 11.mp403:13
- 12.mp402:23
- 13.mp401:35
- 14.mp400:12
- 15.mp405:11
- 16.mp401:57
- 17.mp405:13
- 2.3 Access Control and Password Management
- 1.mp401:07
- 2.mp401:38
- 3.mp400:01
- 4.mp413:59
- 5.mp402:14
- 6.mp412:07
- 7.mp405:32
- 8.mp411:56
- 9.mp403:44
- 10.mp400:16
- 11.mp403:46
- 12.mp400:56
- 13.mp400:46
- 14.mp405:58
- 15.mp403:54
- 16.mp404:57
- 17.mp403:17
- 18.mp400:22
- 19.mp400:27
- 20.mp401:04
- 21.mp400:31
- 22.mp401:18
- 23.mp400:10
- 24.mp400:30
- 25.mp400:53
- 26.mp400:01
- 27.mp400:01
- 28.mp400:01
- 2.4 Security Policies
- 1.mp400:55
- 2.mp400:54
- 3.mp404:53
- 4.mp401:32
- 5.mp403:15
- 6.mp403:29
- 7.mp401:48
- 8.mp401:36
- 9.mp402:17
- 10.mp400:27
- 11.mp400:39
- 12.mp400:25
- 13.mp404:20
- 14.mp402:09
- 15.mp407:28
- 16.mp407:09
- 17.mp402:38
- 18.mp401:44
- 19.mp402:05
- 20.mp400:01
- 21.mp403:18
- 22.mp402:03
- 23.mp401:40
- 24.mp400:29
- 25.mp400:35
- 26.mp400:01
- 27.mp400:01
- 28.mp400:01
- 29.mp400:01
- 2.5 Critical Security Controls
- 1.mp401:27
- 2.mp401:09
- 3.mp400:01
- 4.mp406:23
- 5.mp403:09
- 6.mp401:57
- 7.mp400:01
- 8.mp402:40
- 9.mp401:20
- 10.mp400:44
- 11.mp415:35
- 12.mp400:33
- 13.mp400:33
- 14.mp400:44
- 15.mp400:25
- 16.mp400:39
- 17.mp400:28
- 18.mp400:15
- 19.mp400:47
- 20.mp400:18
- 21.mp401:03
- 22.mp400:12
- 23.mp400:17
- 24.mp400:20
- 25.mp400:22
- 26.mp402:29
- 2.6 Malicious Code and Exploit Mitigations
- 1.mp400:48
- 2.mp403:38
- 3.mp403:55
- 4.mp400:41
- 5.mp401:57
- 6.mp400:21
- 7.mp404:16
- 8.mp402:32
- 9.mp401:42
- 10.mp400:12
- 11.mp401:05
- 12.mp400:11
- 13.mp403:26
- 14.mp401:16
- 15.mp400:51
- 16.mp400:42
- 17.mp400:51
- 18.mp400:37
- 19.mp400:29
- 20.mp401:59
- 21.mp400:10
- 22.mp400:27
- 23.mp403:32
- 24.mp401:02
- 25.mp403:52
- 26.mp402:58
- 27.mp403:29
- 28.mp400:35
- 29.mp400:34
- 30.mp401:37
- 31.mp400:09
- 32.mp400:35
- 33.mp400:01
- 34.mp400:01
- 35.mp400:01
- 36.mp400:01
- 2.7 Advanced Persistent Threat
- 1.mp401:53
- 2.mp401:12
- 3.mp400:29
- 4.mp401:10
- 5.mp400:01
- 6.mp402:52
- 7.mp401:40
- 8.mp403:14
- 9.mp406:11
- 10.mp402:34
- 11.mp400:12
- 12.mp400:37
- 13.mp402:16
- 14.mp401:47
- 15.mp401:12
- 16.mp400:43
- 17.mp400:46
- 18.mp400:57
- 19.mp401:16
- 20.mp400:54
- 21.mp400:01
- 22.mp402:58
- 23.mp403:32
- 24.mp401:00
- 25.mp400:01
- 26.mp400:19
- 27.mp400:36
- 28.mp400:47
- 29.mp401:04
- 30.mp406:01
- 3.1 Introduction Threat Management
- 1.mp400:24
- 2.mp400:59
- 3.mp406:01
- 3.2 Vulnerability Scanning and Penetration Testing
- 1.mp403:15
- 2.mp400:41
- 3.mp400:31
- 4.mp402:58
- 5.mp411:59
- 6.mp405:58
- 7.mp401:24
- 8.mp400:58
- 9.mp400:29
- 10.mp400:25
- 11.mp400:59
- 12.mp403:04
- 13.mp400:11
- 14.mp404:17
- 15.mp401:03
- 16.mp403:06
- 17.mp401:38
- 18.mp404:33
- 19.mp403:49
- 20.mp402:10
- 21.mp402:17
- 22.mp402:09
- 23.mp403:22
- 24.mp409:46
- 25.mp400:08
- 26.mp401:17
- 27.mp402:23
- 28.mp400:01
- 29.mp402:22
- 30.mp400:49
- 31.mp402:30
- 32.mp401:03
- 33.mp400:29
- 34.mp402:38
- 35.mp401:00
- 36.mp403:21
- 37.mp401:33
- 38.mp400:43
- 39.mp401:18
- 40.mp401:54
- 41.mp400:11
- 42.mp400:34
- 43.mp403:33
- 44.mp400:01
- 45.mp400:01
- 46.mp400:01
- 3.3 Network Security Devices
- 1.mp400:57
- 2.mp403:40
- 3.mp407:22
- 4.mp401:17
- 5.mp400:01
- 6.mp408:03
- 7.mp403:40
- 8.mp405:45
- 9.mp402:06
- 10.mp402:05
- 11.mp403:06
- 12.mp402:04
- 13.mp400:33
- 14.mp404:58
- 15.mp401:36
- 16.mp400:10
- 17.mp401:23
- 18.mp400:20
- 19.mp409:28
- 20.mp400:32
- 21.mp400:23
- 22.mp400:42
- 23.mp403:17
- 24.mp401:33
- 25.mp402:42
- 26.mp403:00
- 27.mp401:23
- 28.mp400:18
- 29.mp401:22
- 30.mp401:18
- 31.mp402:15
- 32.mp401:18
- 33.mp402:06
- 34.mp400:01
- 35.mp401:34
- 36.mp400:10
- 37.mp400:55
- 38.mp401:35
- 39.mp401:10
- 40.mp401:05
- 41.mp401:30
- 42.mp400:01
- 43.mp401:18
- 44.mp400:29
- 45.mp403:53
- 46.mp401:09
- 47.mp400:49
- 48.mp401:15
- 49.mp402:06
- 50.mp402:08
- 51.mp401:59
- 52.mp400:01
- 53.mp400:38
- 54.mp400:01
- 55.mp400:01
- 56.mp400:01
- 57.mp400:01
- 3.4 Endpoint Security
- 1.mp401:41
- 2.mp400:56
- 3.mp400:48
- 4.mp406:59
- 5.mp402:10
- 6.mp400:51
- 7.mp403:13
- 8.mp401:56
- 9.mp402:11
- 10.mp400:27
- 11.mp403:05
- 12.mp400:06
- 13.mp403:14
- 14.mp401:25
- 15.mp401:18
- 16.mp402:03
- 17.mp400:53
- 18.mp405:05
- 19.mp400:07
- 20.mp401:13
- 21.mp401:26
- 22.mp400:35
- 23.mp400:56
- 24.mp401:18
- 25.mp400:05
- 26.mp402:13
- 27.mp400:24
- 28.mp401:21
- 29.mp403:24
- 30.mp400:57
- 31.mp400:25
- 32.mp403:07
- 33.mp400:15
- 34.mp400:24
- 35.mp400:23
- 36.mp400:01
- 37.mp400:01
- 38.mp400:01
- 3.5 SIEM-Log Management
- 1.mp400:48
- 2.mp403:03
- 3.mp400:59
- 4.mp402:35
- 5.mp401:36
- 6.mp403:59
- 7.mp400:13
- 8.mp402:55
- 9.mp403:37
- 10.mp402:30
- 11.mp402:31
- 12.mp401:41
- 13.mp405:05
- 14.mp400:01
- 15.mp400:44
- 16.mp402:42
- 17.mp401:50
- 18.mp400:45
- 19.mp401:22
- 20.mp400:24
- 21.mp400:32
- 22.mp400:23
- 23.mp400:37
- 24.mp400:19
- 25.mp400:24
- 26.mp400:32
- 27.mp400:21
- 28.mp400:54
- 29.mp403:39
- 3.6 Active Defense
- 1.mp401:38
- 2.mp401:11
- 3.mp400:01
- 4.mp404:56
- 5.mp401:12
- 6.mp402:40
- 7.mp401:36
- 8.mp400:39
- 9.mp402:24
- 10.mp400:01
- 11.mp401:11
- 12.mp400:32
- 13.mp401:07
- 14.mp402:10
- 15.mp401:43
- 16.mp401:57
- 17.mp401:42
- 18.mp400:34
- 19.mp400:45
- 20.mp402:11
- 21.mp401:00
- 22.mp400:09
- 23.mp400:34
- 24.mp400:31
- 25.mp400:29
- 26.mp400:35
- 27.mp400:46
- 28.mp400:47
- 29.mp400:35
- 30.mp400:01
- 31.mp400:52
- 32.mp401:04
- 33.mp400:16
- 34.mp401:14
- 35.mp400:21
- 36.mp402:08
- 37.mp400:01
- 38.mp400:12
- 39.mp400:01
- 40.mp400:01
- 41.mp400:01
- 42.mp401:45
- 4.1 Introduction Cryptography and Risk Management
- 1.mp400:09
- 2.mp400:44
- 3.mp408:04
- 4.2 Cryptography
- 1.mp401:13
- 2.mp404:12
- 3.mp400:01
- 4.mp401:54
- 5.mp401:41
- 6.mp412:33
- 7.mp401:31
- 8.mp404:16
- 9.mp410:17
- 10.mp402:08
- 11.mp401:03
- 12.mp402:41
- 13.mp400:45
- 14.mp400:57
- 15.mp402:57
- 16.mp402:21
- 17.mp400:53
- 18.mp402:14
- 19.mp400:28
- 20.mp400:55
- 21.mp409:57
- 22.mp404:21
- 23.mp402:26
- 25.mp401:42
- 26.mp402:34
- 27.mp402:00
- 28.mp401:00
- 29.mp401:36
- 30.mp400:17
- 31.mp401:30
- 32.mp400:09
- 33.mp401:14
- 34.mp402:55
- 35.mp401:00
- 36.mp402:15
- 37.mp400:33
- 38.mp400:14
- 39.mp403:16
- 40.mp402:10
- 41.mp401:34
- 42.mp401:12
- 43.mp402:11
- 44.mp400:28
- 45.mp400:59
- 46.mp400:19
- 47.mp400:01
- 48.mp400:01
- 49.mp400:01
- 4.3 Cryptography Algorithms and Deployment
- 1.mp400:28
- 2.mp401:12
- 3.mp400:01
- 4.mp402:21
- 5.mp401:16
- 6.mp402:57
- 7.mp401:21
- 8.mp405:31
- 9.mp400:21
- 10.mp402:45
- 11.mp405:22
- 12.mp403:14
- 13.mp404:01
- 14.mp401:52
- 15.mp403:46
- 16.mp401:38
- 17.mp400:54
- 18.mp401:05
- 19.mp402:57
- 20.mp403:49
- 21.mp403:50
- 22.mp401:20
- 23.mp400:07
- 24.mp405:36
- 25.mp401:46
- 26.mp402:52
- 4.4 Applying Cryptography
- 1.mp400:43
- 2.mp402:08
- 3.mp400:07
- 4.mp401:39
- 5.mp401:57
- 6.mp403:22
- 7.mp405:28
- 8.mp402:20
- 9.mp400:56
- 10.mp405:43
- 11.mp406:00
- 12.mp405:07
- 13.mp401:38
- 14.mp400:12
- 15.mp402:54
- 16.mp401:02
- 17.mp401:28
- 18.mp401:40
- 19.mp402:13
- 20.mp400:01
- 21.mp400:58
- 22.mp402:32
- 23.mp400:28
- 24.mp401:18
- 25.mp401:32
- 26.mp400:59
- 27.mp400:49
- 28.mp400:53
- 29.mp404:34
- 30.mp400:31
- 31.mp401:33
- 32.mp401:55
- 33.mp400:14
- 34.mp400:51
- 35.mp400:15
- 36.mp400:01
- 37.mp400:01
- 38.mp400:01
- 4.5 Incident Handling Foundations
- 1.mp401:41
- 2.mp403:46
- 3.mp400:12
- 4.mp407:58
- 5.mp405:43
- 6.mp403:41
- 7.mp407:14
- 8.mp407:43
- 9.mp412:45
- 10.mp402:05
- 11.mp402:52
- 12.mp402:50
- 13.mp402:34
- 14.mp402:03
- 15.mp401:29
- 16.mp400:24
- 17.mp400:14
- 18.mp404:10
- 19.mp400:41
- 20.mp403:00
- 21.mp401:56
- 22.mp400:46
- 23.mp401:16
- 24.mp400:53
- 25.mp402:31
- 26.mp400:17
- 27.mp400:22
- 28.mp400:18
- 29.mp400:01
- 30.mp400:01
- 31.mp400:01
- 4.6 Contingency Planning - BCP- DRP
- 1.mp400:28
- 2.mp403:35
- 3.mp401:31
- 4.mp402:02
- 5.mp403:20
- 6.mp402:15
- 7.mp401:34
- 8.mp403:44
- 9.mp401:12
- 10.mp402:56
- 11.mp403:52
- 12.mp401:35
- 13.mp401:19
- 14.mp401:58
- 15.mp402:25
- 16.mp401:24
- 17.mp400:59
- 18.mp401:08
- 19.mp401:33
- 20.mp400:48
- 21.mp400:49
- 22.mp402:23
- 23.mp400:51
- 24.mp401:07
- 25.mp401:24
- 26.mp401:24
- 27.mp400:52
- 28.mp400:38
- 29.mp400:50
- 30.mp402:06
- 4.7 Risk Management
- 1.mp401:11
- 2.mp401:56
- 3.mp400:01
- 4.mp405:13
- 5.mp406:38
- 6.mp401:00
- 7.mp401:15
- 8.mp405:19
- 9.mp400:35
- 10.mp403:01
- 11.mp404:49
- 12.mp405:15
- 13.mp400:18
- 14.mp402:53
- 15.mp403:16
- 16.mp401:55
- 17.mp400:22
- 18.mp400:23
- 19.mp402:21
- 20.mp400:19
- 21.mp400:28
- 22.mp401:45
- 23.mp401:31
- 24.mp400:23
- 25.mp404:44
- 5.1 Introduction Windows Security
- 1.mp400:24
- 3.mp419:01
- 5.2 The Windows Security Infrastructure
- 1.mp401:58
- 2.mp400:01
- 3.mp404:27
- 4.mp406:31
- 5.mp409:20
- 6.mp404:49
- 7.mp401:43
- 8.mp401:18
- 9.mp400:46
- 10.mp401:31
- 11.mp401:43
- 12.mp401:01
- 13.mp400:20
- 14.mp402:07
- 15.mp401:45
- 16.mp403:07
- 17.mp401:20
- 18.mp401:08
- 19.mp400:01
- 20.mp402:38
- 21.mp400:44
- 22.mp401:33
- 23.mp401:03
- 24.mp401:45
- 25.mp400:19
- 26.mp402:14
- 27.mp402:01
- 28.mp400:40
- 29.mp402:12
- 30.mp400:27
- 31.mp401:01
- 32.mp401:44
- 33.mp400:11
- 34.mp400:42
- 35.mp400:33
- 36.mp400:01
- 37.mp400:01
- 38.mp400:01
- 5.3 Service Packs, Hotfixes, and Backups
- 1.mp402:03
- 2.mp402:12
- 3.mp403:15
- 4.mp404:47
- 5.mp402:11
- 6.mp402:07
- 7.mp401:50
- 8.mp400:20
- 9.mp400:51
- 10.mp401:11
- 11.mp400:48
- 12.mp400:34
- 13.mp401:55
- 14.mp401:52
- 15.mp403:18
- 16.mp401:01
- 17.mp400:22
- 18.mp402:47
- 19.mp400:52
- 20.mp401:04
- 21.mp402:03
- 5.4 Windows Access Controls
- 1.mp401:43
- 2.mp402:50
- 3.mp402:19
- 4.mp402:35
- 5.mp400:19
- 6.mp403:44
- 7.mp404:11
- 8.mp401:04
- 9.mp400:26
- 10.mp401:04
- 11.mp400:49
- 12.mp402:02
- 13.mp405:20
- 14.mp401:26
- 15.mp404:06
- 16.mp401:49
- 17.mp400:21
- 18.mp402:36
- 19.mp400:23
- 20.mp400:36
- 21.mp401:55
- 22.mp402:05
- 23.mp403:04
- 24.mp401:23
- 25.mp400:45
- 26.mp401:06
- 27.mp401:15
- 28.mp403:11
- 29.mp402:24
- 30.mp400:07
- 31.mp401:20
- 32.mp400:23
- 33.mp400:01
- 34.mp400:01
- 35.mp400:01
- 5.5 Enforcing Security Policy
- 1.mp401:36
- 2.mp402:47
- 3.mp401:41
- 4.mp400:33
- 5.mp402:54
- 6.mp401:58
- 7.mp400:15
- 8.mp402:09
- 9.mp403:02
- 10.mp401:37
- 11.mp401:15
- 12.mp401:07
- 13.mp404:28
- 14.mp401:12
- 15.mp400:14
- 16.mp407:20
- 17.mp401:21
- 18.mp401:36
- 19.mp402:40
- 20.mp401:02
- 21.mp400:19
- 22.mp400:44
- 23.mp402:02
- 24.mp403:59
- 25.mp400:36
- 26.mp400:34
- 27.mp400:59
- 28.mp400:52
- 29.mp400:31
- 30.mp401:27
- 31.mp400:51
- 32.mp401:06
- 33.mp402:44
- 34.mp400:15
- 35.mp400:28
- 36.mp400:24
- 37.mp400:01
- 38.mp400:01
- 39.mp400:01
- 5.6 Secure Windows Network Services
- 1.mp402:23
- 2.mp402:05
- 3.mp402:56
- 4.mp403:07
- 5.mp400:22
- 6.mp402:38
- 7.mp401:40
- 8.mp400:41
- 9.mp402:29
- 10.mp401:55
- 11.mp402:25
- 12.mp400:57
- 13.mp400:52
- 14.mp402:26
- 15.mp401:38
- 16.mp400:01
- 17.mp401:25
- 18.mp401:11
- 19.mp400:21
- 20.mp400:58
- 21.mp400:07
- 22.mp401:51
- 23.mp401:07
- 24.mp401:08
- 25.mp400:38
- 26.mp400:49
- 27.mp400:59
- 28.mp401:02
- 29.mp400:01
- 30.mp402:48
- 31.mp400:40
- 32.mp403:18
- 33.mp400:31
- 34.mp400:44
- 35.mp402:11
- 5.7 Automation, Auditing, and Forensics
- 1.mp403:14
- 2.mp403:19
- 3.mp401:07
- 4.mp401:01
- 5.mp401:05
- 6.mp403:30
- 7.mp402:42
- 8.mp405:13
- 9.mp402:00
- 10.mp400:18
- 11.mp400:30
- 12.mp401:00
- 13.mp404:04
- 14.mp404:08
- 15.mp401:09
- 16.mp400:23
- 17.mp400:14
- 18.mp400:22
- 19.mp400:52
- 20.mp400:26
- 21.mp400:44
- 22.mp401:25
- 23.mp400:37
- 24.mp400:37
- 25.mp400:31
- 26.mp402:13
- 27.mp400:23
- 28.mp400:41
- 29.mp401:47
- 30.mp400:26
- 31.mp400:22
- 32.mp400:01
- 33.mp400:01
- 34.mp400:01
- 35.mp402:56
- 6.1 Introduction Linux Security Essentials
- 1.mp400:08
- 2.mp403:28
- 3.mp404:21
- 6.2 Linux Security Structure Permission and Access
- 1.mp400:35
- 2.mp401:00
- 3.mp400:01
- 4.mp406:09
- 5.mp401:24
- 6.mp401:57
- 7.mp401:33
- 8.mp404:48
- 9.mp400:55
- 10.mp401:42
- 11.mp402:57
- 12.mp401:42
- 13.mp407:29
- 14.mp402:34
- 15.mp401:10
- 16.mp401:17
- 17.mp400:31
- 18.mp403:29
- 19.mp401:02
- 20.mp400:30
- 21.mp401:10
- 22.mp400:39
- 23.mp400:38
- 24.mp400:19
- 25.mp400:06
- 26.mp400:33
- 27.mp400:59
- 28.mp400:55
- 29.mp404:50
- 30.mp400:49
- 31.mp403:25
- 32.mp403:15
- 33.mp400:24
- 34.mp400:15
- 35.mp402:01
- 36.mp400:35
- 37.mp402:18
- 38.mp401:04
- 39.mp400:36
- 40.mp400:19
- 41.mp401:07
- 42.mp408:32
- 43.mp407:57
- 44.mp406:59
- 45.mp401:36
- 46.mp401:00
- 47.mp402:29
- 48.mp401:08
- 49.mp400:52
- 50.mp400:08
- 51.mp402:51
- 52.mp401:58
- 53.mp401:54
- 54.mp401:38
- 55.mp401:13
- 56.mp400:37
- 57.mp403:46
- 58.mp403:19
- 59.mp401:14
- 60.mp400:44
- 61.mp400:33
- 62.mp401:06
- 63.mp402:02
- 6.3 Hardening and Securing Linux Services
- 1.mp400:41
- 2.mp401:03
- 3.mp400:05
- 4.mp401:06
- 5.mp400:25
- 6.mp400:51
- 7.mp400:27
- 8.mp401:09
- 9.mp400:16
- 10.mp401:05
- 11.mp400:07
- 12.mp401:53
- 13.mp401:07
- 14.mp400:54
- 15.mp400:33
- 16.mp400:36
- 17.mp400:37
- 18.mp400:29
- 19.mp401:50
- 20.mp402:04
- 21.mp401:52
- 22.mp401:32
- 23.mp401:38
- 24.mp401:16
- 25.mp400:38
- 26.mp404:39
- 27.mp401:31
- 28.mp401:04
- 29.mp400:47
- 30.mp402:10
- 31.mp401:46
- 32.mp400:11
- 33.mp401:48
- 34.mp401:12
- 35.mp401:02
- 36.mp400:13
- 37.mp400:10
- 38.mp400:47
- 39.mp400:52
- 40.mp400:58
- 41.mp400:41
- 42.mp402:22
- 6.4 Monitoring and Attack Detection
- 1.mp400:48
- 2.mp401:16
- 3.mp400:06
- 4.mp401:00
- 5.mp401:07
- 6.mp401:24
- 7.mp400:44
- 8.mp400:58
- 9.mp400:51
- 10.mp400:50
- 11.mp400:38
- 12.mp400:52
- 13.mp400:06
- 14.mp402:16
- 15.mp400:24
- 16.mp401:32
- 17.mp400:49
- 18.mp401:26
- 19.mp401:13
- 20.mp400:55
- 21.mp400:46
- 22.mp402:49
- 23.mp400:20
- 24.mp403:34
- 25.mp401:26
- 26.mp400:33
- 27.mp402:45
- 28.mp402:02
- 29.mp400:06
- 30.mp402:52
- 31.mp401:43
- 32.mp400:37
- 33.mp400:34
- 34.mp400:46
- 35.mp400:24
- 36.mp400:32
- 37.mp400:41
- 38.mp401:53
- 39.mp400:33
- 40.mp400:51
- 41.mp400:29
- 42.mp400:56
- 43.mp400:30
- 44.mp400:23
- 45.mp401:43
- 6.5 Security Utilities
- 1.mp400:37
- 2.mp401:54
- 3.mp401:49
- 4.mp402:13
- 5.mp400:01
- 6.mp402:44
- 7.mp401:26
- 8.mp401:40
- 9.mp401:46
- 10.mp400:15
- 11.mp402:42
- 12.mp401:01
- 13.mp401:49
- 14.mp401:05
- 15.mp400:33
- 16.mp401:28
- 17.mp400:39
- 18.mp400:37
- 19.mp400:30
- 20.mp401:18
- 21.mp400:31
- 22.mp401:01
- 23.mp401:43
- 24.mp400:05
- 25.mp405:37
- 26.mp400:51
- 27.mp401:00
- 28.mp400:37
- 29.mp400:05
- 30.mp400:39
- 31.mp401:48
- 32.mp400:28
- 33.mp401:51
- 34.mp402:10
- 35.mp400:30
- 36.mp400:45
- 37.mp400:35
- 38.mp400:05
- 39.mp403:29
- 40.mp400:25
- 41.mp402:32
- 42.mp400:29
- 43.mp402:59
- 44.mp401:16
- 45.mp400:41
- 46.mp400:05
- 47.mp403:14
- 48.mp400:36
- 49.mp401:45
- 50.mp401:04
- 51.mp401:55
- 52.mp401:09
- 53.mp400:26
- 54.mp401:14
- 55.mp400:42
- 56.mp401:11
- 57.mp401:22
- 58.mp400:12
- 59.mp400:57
- 60.mp400:18
- 61.mp400:08
- 62.mp401:06
- 63.mp400:38
- 64.mp400:27
- 65.mp404:11
- 66.mp406:28
More details
User Reviews
Rating
average 0
Focused display

Sans
View courses SansThe SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
- language english
- Training sessions 1214
- duration 37:24:56
- Release Date 2023/07/05