Linux Academy CompTIA Security+ Certification Prep\01.Introduction\01.01.About the Author.mp4
[60b3ddeb52aac46]
|
6,109,248 |
7D06E03E |
Linux Academy CompTIA Security+ Certification Prep\01.Introduction\01.02.About the Course.mp4
[6ed125bf06736179]
|
22,433,852 |
5C66B529 |
Linux Academy CompTIA Security+ Certification Prep\01.Introduction\01.03.About the Exam.mp4
[14b94acffa448f0]
|
38,793,800 |
1678EBDE |
Linux Academy CompTIA Security+ Certification Prep\02.1.1. Indicators of Compromise and Malware\02.01.Understanding IOCs.mp4
[11119033f18fe353]
|
119,120,184 |
9614EA1A |
Linux Academy CompTIA Security+ Certification Prep\02.1.1. Indicators of Compromise and Malware\02.02.Types of Malware.mp4
[3937b730bf98677f]
|
120,579,816 |
DAC84B2C |
Linux Academy CompTIA Security+ Certification Prep\03.1.2 Compare and Contrast Types of Attacks\03.01.Social Engineering Attacks.mp4
[80058e303ca7a732]
|
54,961,048 |
5ECE917B |
Linux Academy CompTIA Security+ Certification Prep\03.1.2 Compare and Contrast Types of Attacks\03.02.Technical Attacks.mp4
[d1848a3d94056b2b]
|
105,708,264 |
7F3B41EC |
Linux Academy CompTIA Security+ Certification Prep\03.1.2 Compare and Contrast Types of Attacks\03.03.Wireless and Cryptographic Attacks.mp4
[815ece4a813bdf8b]
|
112,048,000 |
3A85B18B |
Linux Academy CompTIA Security+ Certification Prep\04.1.3 Threat Actors\04.01.Threat Actor Types and Attributes.mp4
[a620b5e1bca893a1]
|
108,030,816 |
26FFC784 |
Linux Academy CompTIA Security+ Certification Prep\05.1.4 Penetration Testing\05.01.Pentesting Concepts.mp4
[540be3aba7d86e55]
|
87,493,696 |
FA415491 |
Linux Academy CompTIA Security+ Certification Prep\06.1.5 Vulnerability Scanning\06.01.Explain concepts of vulnerability scanning.mp4
[ca7b75d9a83a15d9]
|
81,436,900 |
7C2F6540 |
Linux Academy CompTIA Security+ Certification Prep\07.1.6 Impact of Vulnerabilities\07.01.Discuss the Impact of Vulnerability Types.mp4
[596063cec1c29e8f]
|
170,256,184 |
CAED352C |
Linux Academy CompTIA Security+ Certification Prep\08.2.1 Installation and configuration of network security devices\08.01.Firewalls.mp4
[af56167eea2db9bf]
|
107,971,596 |
1C344DE5 |
Linux Academy CompTIA Security+ Certification Prep\08.2.1 Installation and configuration of network security devices\08.02.IDSIPS.mp4
[283e1ac100d62e4a]
|
126,922,560 |
88C73B16 |
Linux Academy CompTIA Security+ Certification Prep\08.2.1 Installation and configuration of network security devices\08.03.Router and Switch Security.mp4
[37df92324e7cd779]
|
58,916,568 |
6934E755 |
Linux Academy CompTIA Security+ Certification Prep\08.2.1 Installation and configuration of network security devices\08.04.Proxies and Load balancers.mp4
[6d3028d77056164b]
|
72,975,208 |
3B6C6388 |
Linux Academy CompTIA Security+ Certification Prep\08.2.1 Installation and configuration of network security devices\08.05.Other Network Components.mp4
[a7650cdb195948df]
|
160,205,140 |
513CCD21 |
Linux Academy CompTIA Security+ Certification Prep\09.2.2 Assessing Security Posture of an Organization\09.01.Tool Overview.mp4
[336c46993288a340]
|
153,652,588 |
B82BF779 |
Linux Academy CompTIA Security+ Certification Prep\09.2.2 Assessing Security Posture of an Organization\09.02.Command Line Tools.mp4
[dab447183f5feba5]
|
97,259,732 |
EB9185D6 |
Linux Academy CompTIA Security+ Certification Prep\10.2.3. Troubleshooting Common Security Issues\10.01.Common Security Issues and their Impact.mp4
[5a00bf34b3c899f3]
|
183,457,168 |
3153E532 |
Linux Academy CompTIA Security+ Certification Prep\11.2.4. Securely deploying mobile devices\11.01.Connection Methodologies Defined.mp4
[6c7636f61f8329ae]
|
121,538,240 |
A5B06475 |
Linux Academy CompTIA Security+ Certification Prep\11.2.4. Securely deploying mobile devices\11.02.Mobile Device Management Principles.mp4
[1cf55860e84840ab]
|
115,999,384 |
CEC5C2B7 |
Linux Academy CompTIA Security+ Certification Prep\11.2.4. Securely deploying mobile devices\11.03.Monitoring and Enforcing Mobile methodologies.mp4
[b2276886cbafa0ab]
|
188,901,648 |
75A04F6D |
Linux Academy CompTIA Security+ Certification Prep\12.2.5. Implementing Secure Protocols\12.01.Secure Protocols Overview Part 1.mp4
[c5919fb1a8a6448e]
|
59,023,164 |
2B09CFED |
Linux Academy CompTIA Security+ Certification Prep\12.2.5. Implementing Secure Protocols\12.02.Secure Protocols Overview Part 2.mp4
[44c26f409499165b]
|
64,847,216 |
E3C12328 |
Linux Academy CompTIA Security+ Certification Prep\13.3.1. Frameworks, Best Practices, and Secure Configuration Guides\13.01.Frameworks Overview.mp4
[e46092877c5b315e]
|
88,678,660 |
FFB7306D |
Linux Academy CompTIA Security+ Certification Prep\14.3.2. Secure Network Architecture Concepts\14.01.Discussing the Concepts That Will Help Secure Your Network.mp4
[9293d4aa3f867fe7]
|
67,845,628 |
676A704C |
Linux Academy CompTIA Security+ Certification Prep\15.3.3. Secure System Design\15.01.Hardware Security.mp4
[a3fb6457cf34b4fb]
|
96,254,120 |
46622B61 |
Linux Academy CompTIA Security+ Certification Prep\15.3.3. Secure System Design\15.02.Operating Systems.mp4
[1fcd365b32067258]
|
117,361,820 |
6BD364FF |
Linux Academy CompTIA Security+ Certification Prep\16.3.4. Secure Staging Deployment Concepts\16.01.Staging Environments and Security Implications.mp4
[2983dd34a1fb8c6]
|
59,511,212 |
47D69966 |
Linux Academy CompTIA Security+ Certification Prep\17.3.5. Embedded Systems\17.01.Security Implications of Embedded Systems.mp4
[18367385f6e4b446]
|
142,954,824 |
CD2AEEB9 |
Linux Academy CompTIA Security+ Certification Prep\18.3.6. Secure Application Development\18.01.Development Lifecycle Models.mp4
[1cb4382c57a3f1a6]
|
58,452,960 |
FA67BD66 |
Linux Academy CompTIA Security+ Certification Prep\18.3.6. Secure Application Development\18.02.Secure DevOps.mp4
[d2e534a5e399442]
|
97,227,208 |
58394F7F |
Linux Academy CompTIA Security+ Certification Prep\18.3.6. Secure Application Development\18.03.Secure Coding Techniques and Best Practices.mp4
[3fdf2602c166c59d]
|
144,721,836 |
47FFFF0F |
Linux Academy CompTIA Security+ Certification Prep\18.3.6. Secure Application Development\18.04.Code Quality and Testing.mp4
[50348cccdb771405]
|
54,877,012 |
E96CC143 |
Linux Academy CompTIA Security+ Certification Prep\19.3.7. Cloud and Virtualization Concepts\19.01.Virtualization Concepts.mp4
[f58221ca1ec6d21d]
|
67,742,604 |
4F837F9C |
Linux Academy CompTIA Security+ Certification Prep\19.3.7. Cloud and Virtualization Concepts\19.02.Cloud Concepts.mp4
[b1f8c407c6b37e9b]
|
85,163,436 |
A7A29CCC |
Linux Academy CompTIA Security+ Certification Prep\20.3.8. Reducing risks through resiliency and automation\20.01.Resiliency and Automation.mp4
[dcd26111b4d704ee]
|
98,753,392 |
9A51B01A |
Linux Academy CompTIA Security+ Certification Prep\20.3.8. Reducing risks through resiliency and automation\20.02.Redundancy and High Availability.mp4
[9d1ba503c981e2eb]
|
64,659,028 |
F1393F52 |
Linux Academy CompTIA Security+ Certification Prep\21.3.9. Physical Controls\21.01.Physical Controls.mp4
[960361159ea29e7a]
|
134,895,452 |
BBF03435 |
Linux Academy CompTIA Security+ Certification Prep\22.4.1. Identity and access management concepts\22.01.Identification, Authentication, Authorization, and Accounting (AAA).mp4
[c4db1cc05181bf90]
|
76,543,636 |
B9AFEDD6 |
Linux Academy CompTIA Security+ Certification Prep\23.4.4. Common Account Management Practices\23.01.Account Management.mp4
[669f339eb6425353]
|
138,515,956 |
21856F5A |
Linux Academy CompTIA Security+ Certification Prep\23.4.4. Common Account Management Practices\23.02.Account Policy Enforcement.mp4
[d5d2a75690c7e7ee]
|
95,542,728 |
F5BBB006 |
Linux Academy CompTIA Security+ Certification Prep\24.4.2. Installation and Configuration of Identity and Access Services\24.01.Define Different Identity and Access Service Types.mp4
[767c7723feaef37f]
|
86,356,108 |
02A9B22C |
Linux Academy CompTIA Security+ Certification Prep\24.4.2. Installation and Configuration of Identity and Access Services\24.02.Identity and Access Services Part 2.mp4
[d34483d5a1a8b2e5]
|
53,227,500 |
39BA2EC3 |
Linux Academy CompTIA Security+ Certification Prep\25.4.3. Identity and Access Management Controls\25.01.Identity and Access Management Controls.mp4
[ea177dfc777e91d9]
|
81,555,904 |
F94BA0F9 |
Linux Academy CompTIA Security+ Certification Prep\26.5.1. Organizational Security Policies, Plans and Policies\26.01.Personnel Management.mp4
[c6ab57de0e12c69c]
|
95,140,220 |
030C6D74 |
Linux Academy CompTIA Security+ Certification Prep\26.5.1. Organizational Security Policies, Plans and Policies\26.02.Agreement Types.mp4
[117d8b25bcbaa4f2]
|
90,925,824 |
BABFCC06 |
Linux Academy CompTIA Security+ Certification Prep\27.5.2. Concepts from a Business Impact Analysis\27.01.Business Impact Analysis.mp4
[39fd5b0bd73e555d]
|
144,224,388 |
509F8093 |
Linux Academy CompTIA Security+ Certification Prep\28.5.3. Risk Management Processes and Concepts\28.01.Risk Management.mp4
[f7b688565846b001]
|
87,942,264 |
1CF24098 |
Linux Academy CompTIA Security+ Certification Prep\29.5.4. Incident Response\29.01.Incident Response Concepts.mp4
[2a12212e4747fb31]
|
120,612,904 |
9A75B6A7 |
Linux Academy CompTIA Security+ Certification Prep\30.5.5. Digital Forensics\30.01.Digital Forensics.mp4
[f42f4994203929b4]
|
58,684,388 |
FF313965 |
Linux Academy CompTIA Security+ Certification Prep\31.5.6. Disaster Recovery and Continuity of Operations\31.01.Disaster Recovery and Continuity of Operations.mp4
[57617c9c55bce52]
|
111,040,884 |
81CA5AE8 |
Linux Academy CompTIA Security+ Certification Prep\32.5.7. Control Types\32.01.Differentiating Between Control Types.mp4
[fa7916d899e7080d]
|
47,426,572 |
F80E2297 |
Linux Academy CompTIA Security+ Certification Prep\33.5.8. Data Security and Privacy Practices\33.01.Data Security and Privacy Practices.mp4
[b61ca25569b29da3]
|
97,210,664 |
616549A5 |
Linux Academy CompTIA Security+ Certification Prep\34.6.1. Basic Concepts of Cryptography\34.01.Basic Concepts of Cryptography (Part 1).mp4
[feddfdd58772955c]
|
107,548,408 |
D4FDAAA2 |
Linux Academy CompTIA Security+ Certification Prep\34.6.1. Basic Concepts of Cryptography\34.02.Basic Concepts of Cryptography (Part 2).mp4
[4d408bcf8d693e94]
|
65,673,288 |
27F7ECCA |
Linux Academy CompTIA Security+ Certification Prep\35.6.2. Basic Characteristics of Cryptographic Algorithms\35.01.Symmetric Algorithms.mp4
[22359c76edc802d]
|
68,451,740 |
6D1481A8 |
Linux Academy CompTIA Security+ Certification Prep\35.6.2. Basic Characteristics of Cryptographic Algorithms\35.02.Asymmetric Algorithms.mp4
[aeb4a3e87952ecab]
|
26,637,344 |
B0DD2ED7 |
Linux Academy CompTIA Security+ Certification Prep\35.6.2. Basic Characteristics of Cryptographic Algorithms\35.03.Hashing Algorithms.mp4
[a23f1886518fbd87]
|
34,395,352 |
4B5E8AFF |
Linux Academy CompTIA Security+ Certification Prep\36.6.3. Wireless Security Settings\36.01.Wireless Cryptography.mp4
[e806b0e5e28147f8]
|
92,542,060 |
C94749ED |
Linux Academy CompTIA Security+ Certification Prep\37.6.4. Public Key Infrastructure (PKI)\37.01.PKI Overview.mp4
[d624f3459907d92d]
|
61,665,128 |
8423FF86 |
Linux Academy CompTIA Security+ Certification Prep\37.6.4. Public Key Infrastructure (PKI)\37.02.Types of Certificates.mp4
[94e183133d8511ae]
|
79,756,368 |
0139EEF9 |
Linux Academy CompTIA Security+ Certification Prep\37.6.4. Public Key Infrastructure (PKI)\37.03.Concepts.mp4
[bebf82c76a6f634c]
|
45,959,420 |
4D2309AA |
Linux Academy CompTIA Security+ Certification Prep\Files\CompTIA Security_1571856623.pdf |
273,736,528 |
1E91A914 |
Linux Academy CompTIA Security+ Certification Prep\01.Introduction |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\02.1.1. Indicators of Compromise and Malware |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\03.1.2 Compare and Contrast Types of Attacks |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\04.1.3 Threat Actors |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\05.1.4 Penetration Testing |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\06.1.5 Vulnerability Scanning |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\07.1.6 Impact of Vulnerabilities |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\08.2.1 Installation and configuration of network security devices |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\09.2.2 Assessing Security Posture of an Organization |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\10.2.3. Troubleshooting Common Security Issues |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\11.2.4. Securely deploying mobile devices |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\12.2.5. Implementing Secure Protocols |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\13.3.1. Frameworks, Best Practices, and Secure Configuration Guides |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\14.3.2. Secure Network Architecture Concepts |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\15.3.3. Secure System Design |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\16.3.4. Secure Staging Deployment Concepts |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\17.3.5. Embedded Systems |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\18.3.6. Secure Application Development |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\19.3.7. Cloud and Virtualization Concepts |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\20.3.8. Reducing risks through resiliency and automation |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\21.3.9. Physical Controls |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\22.4.1. Identity and access management concepts |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\23.4.4. Common Account Management Practices |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\24.4.2. Installation and Configuration of Identity and Access Services |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\25.4.3. Identity and Access Management Controls |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\26.5.1. Organizational Security Policies, Plans and Policies |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\27.5.2. Concepts from a Business Impact Analysis |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\28.5.3. Risk Management Processes and Concepts |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\29.5.4. Incident Response |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\30.5.5. Digital Forensics |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\31.5.6. Disaster Recovery and Continuity of Operations |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\32.5.7. Control Types |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\33.5.8. Data Security and Privacy Practices |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\34.6.1. Basic Concepts of Cryptography |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\35.6.2. Basic Characteristics of Cryptographic Algorithms |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\36.6.3. Wireless Security Settings |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\37.6.4. Public Key Infrastructure (PKI) |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep\Files |
0 |
00000000 |
Linux Academy CompTIA Security+ Certification Prep |
0 |
00000000 |
|
Total size: |
6,159,056,788 |
|