[ WebToolTip.com ] Udemy - Master CompTIA Security + (SY0-701) with Real-World Practice
File List
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/3 - The DAD Triad Thinking Like a Hacker (Security+ SYO-701).mp4 60.2 MB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/1 - The CIA Triad Mastering Confidentiality, Integrity, and Availability.mp4 60.1 MB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/6 - The NIST Cybersecurity Framework A Strategic Blueprint for Risk Management.mp4 56.4 MB
- ~Get Your Files Here !/6 - Who Goes There/1 - Securing Digital Identity Account Attributes and Profiles.html 132.0 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cellular IoT Security.html 101.9 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Blockchain & Distributed Ledgers.html 95.2 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Time-Based Access Controls.html 92.8 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Remote Authentication Securing Access.html 91.1 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The Command Line Guardian An Introduction to Secure Shell (SSH).html 90.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Order of Restoration.html 89.3 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Incident Response Lifecycle.html 89.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Vulnerability Management Lifecycle.html 88.5 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Privileged Access Management (PAM).html 88.2 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The C-Suite Guardian Understanding the CISO.html 88.2 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - The Cryptographic Key Lifecycle.html 87.7 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Third-Party Data Risks.html 87.6 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Just-in-Time Access Temporary Elevation.html 86.3 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The First Responders A Deep Dive into the Cyber Incident Response Team (CIRT).html 86.0 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Baiting and Credential Harvesting.html 85.5 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Anatomy of a Digital Certificate X.509 Deep Dive.html 85.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Cataloging a World of Flaws CVE and the CVSS Scoring System.html 85.3 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Linux Local Authentication Mastering passwd, shadow, and PAM.html 84.5 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Building a Secure Software Development Lifecycle (SSDLC).html 84.3 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - The Hacker's Playbook Tactics, Techniques, & Procedures (TTPs).html 84.2 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Microservices and Serverless Architectures.html 83.8 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Designing a Secure Cloud Environment.html 82.2 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Advanced Password Protection Key Stretching.html 82.1 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Advanced Cloud Networking VPC Endpoints.html 82.0 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Identity & Access Management (IAM).html 82.0 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Security Device Attributes.html 80.9 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Watching for Trouble Account and Usage Auditing.html 80.4 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Air Gaps & Protected Distribution Systems (PDS).html 79.9 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Layer 3 Protocols A Deep Dive into Internet Protocol (IP).html 79.8 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Seamless Access Single Sign-On (SSO) and Kerberos.html 79.5 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Building a Threat Model.html 79.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Data Recovery and Carving.html 79.3 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Phishing Epidemic Exploiting Trust via Email.html 79.0 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Hands-On with Firewalls Understanding iptables in Linux.html 78.9 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Multi-Factor Authentication (MFA) Raising the Bar for Attackers.html 78.5 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Attack Vector Analysis.html 77.9 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - The Wireless Attack Vector Dangers in the Air.html 77.7 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Advanced Email Security DomainKeys Identified Mail (DKIM).html 77.6 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Forensic Investigation Process From Acquisition to Reporting.html 76.9 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - A Deep Dive into Kerberos.html 76.9 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Certificate Renewal vs. Rekeying.html 76.7 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Understanding Injection Attacks.html 76.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Patch Management Process.html 76.0 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Digital Gatekeeper Network Access Control (NAC).html 75.9 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Cloud Security Gatekeeper Cloud Access Security Brokers (CASB).html 75.8 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Data Exposure & Error Handling.html 75.8 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Rise of DevSecOps Shifting Security to the Left.html 75.8 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Real-World Patch Management.html 75.6 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Decoding the Cipher Suite.html 75.6 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Securing Operational Technology (OT) and Industrial Control Systems (ICS).html 75.5 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Physical Biometric Recognition.html 75.2 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Stateful Inspection Firewalls.html 75.0 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Static Code Analysis.html 74.9 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Enterprise Directory Services.html 74.8 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Ephemeral System Non-Persistence.html 74.8 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Advanced Deception DNS Sinkholes.html 74.8 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Dead & Unreachable Code.html 74.6 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Network Access Control Agent vs. Agentless.html 74.4 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Legal & Risk Landscape.html 74.2 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Defense-in-Depth Layering Security.html 74.0 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Address Resolution Protocol (ARP).html 74.0 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Advanced Certificate Concepts Stapling and Pinning.html 73.9 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Building a Resilient & Secure Facility.html 73.8 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - The Science of You An Introduction to Biometric Authentication.html 73.6 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Securing the Domain Name System.html 73.6 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Zero Trust Data and Control Planes.html 73.6 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Geolocation Access Controls.html 73.3 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Enterprise Wi-Fi Security.html 73.2 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Endpoint Protection Evolution.html 73.0 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Enterprise Password Management.html 72.9 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - The Incident Response Process.html 72.7 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Buffer & Integer Overflows.html 72.6 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Identity and Access Management (IAM).html 72.6 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Server-Side vs. Client-Side Validation.html 72.5 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - The Power of Asymmetric Keys Authentication and Key Exchange.html 72.2 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Cryptography for Confidentiality.html 72.1 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Modern Authentication OAuth and REST APIs.html 71.7 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The IPsec Handshake Understanding Internet Key Exchange (IKE).html 71.7 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Layer 2 Attacks Deception and Interception.html 71.6 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Endpoint Security Program Design.html 71.6 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - The Risk Equation A Practical Application.html 71.5 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Active Blocker Network-Based Intrusion Prevention Systems (IPS).html 71.5 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Normalization & Output Encoding.html 71.4 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Vulnerability, Threat, and Risk.html 71.3 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The IaC Principle of Idempotence.html 71.1 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - The High-Security Model Mandatory Access Control (MAC).html 71.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Art of Hardening From Defaults to Defenses.html 70.9 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - The PKI Workflow RAs and CSRs.html 70.8 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Spectrum of Hackers Motivations & Methodologies.html 70.8 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Malware Analysis Viruses & Worms.html 70.6 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Hardware Fundamentals.html 70.6 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Hardening Endpoints Least Functionality.html 70.4 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Just-in-Time (JIT) & Zero Standing Privileges (ZSP).html 70.3 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Immutable Systems.html 70.0 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Threat Intelligence & Risk Management.html 69.6 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - The Fortress Workstation Secure Administrative Workstations (SAWs).html 69.6 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Strategic Cybersecurity Synthesis.html 69.5 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Ephemeral Credentials.html 69.4 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Homomorphic Encryption The Holy Grail of Data Privacy.html 69.4 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - A Deep Dive into RAID Disk Redundancy for Data Protection.html 69.3 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Securing Data Flows Across Trust Boundaries.html 69.3 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Security Cornerstones Firewalls, Load Balancers, & DNS.html 69.3 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Password Salting Deep Dive.html 69.3 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Unsupported Systems & Perpetual Risk.html 69.2 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Data Center Traffic North-South vs. East-West.html 69.1 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Windows Authentication Local vs. Network.html 69.0 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Access Control Models DAC & RBAC.html 68.9 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - State Actors & Advanced Persistent Threats (APTs).html 68.8 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Data Replication Synchronous vs. Asynchronous.html 68.7 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Physical Intrusion Detection Systems.html 68.7 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Endpoint Segmentation & Isolation.html 68.6 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Hijacking the Path Routing Protocol Exploitation.html 68.6 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Public Key Infrastructure (PKI).html 68.6 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Vishing & Smishing Attacks.html 68.6 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Supply Chain Attacks.html 68.4 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Core Principles of Zero Trust.html 68.2 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Virtual Private Clouds (VPCs).html 68.1 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing Directory Services with LDAPS.html 68.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Advanced Memory Exploits Null Pointer Dereferencing & Race Conditions.html 68.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Hijacking Legitimate Processes.html 67.9 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Vendor Management Vetting Your Third-Party Risks.html 67.9 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Beyond the Perimeter Federated Identity and Trust.html 67.5 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Hardening the Switch Port Security.html 67.5 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Using HTTP Headers for Security.html 67.5 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Digital Forensics The Order of Volatility.html 67.4 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Linux File Permissions.html 67.4 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Digital Certificate Validation & Types.html 67.2 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - IPsec Network Layer Security.html 67.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Data Destruction Software-Based Sanitization.html 67.1 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Trojan Horse Malicious Payloads.html 67.0 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Advanced Switch Security DHCP Snooping.html 67.0 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - DNS Sinkholing & Deception Tactics.html 67.0 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Dynamic VLAN Assignment with NAC.html 66.9 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Building Fault Tolerance The Principle of Redundancy.html 66.9 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - DMARC Advanced Email Security.html 66.8 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Strategic Control Placement Defense-in-Depth.html 66.8 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Anatomy of an Attacker.html 66.6 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Indicators of Compromise (IOCs).html 66.3 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Asymmetric Encryption Public & Private Keys.html 66.3 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Influence Campaigns & Hybrid Warfare.html 66.2 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Securing Embedded Systems.html 66.2 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Cryptography for Data Integrity.html 66.1 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Securing Cloud Traffic.html 66.1 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Threat Intelligence Proactive Defense.html 66.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Active Defense Honeypots, Honeynets, and Honeyfiles.html 66.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Cloud Elasticity Dynamic System Scaling.html 65.9 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Account Control Lockout vs. Disablement Policies.html 65.9 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - CASB Deployment Models.html 65.8 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Finding the Flaws Vulnerability Scanning.html 65.8 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Web Application Firewalls (WAFs).html 65.8 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - The Zero Trust Revolution Principles and Microsegmentation.html 65.8 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - The Risk Management Process From Identification to Mitigation.html 65.7 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Fire Detection & Suppression.html 65.7 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Firewall Implementations and Architectures.html 65.5 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Advanced Endpoint Sandboxing.html 65.3 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - The Web of Trust Decentralized Identity Verification.html 65.2 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Behavioral Biometrics How You Act is Who You Are.html 65.2 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Segmentation & Segregation.html 65.1 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Password Vaulting and Brokering.html 65.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Inner Sanctum Securing Server Rooms and Data Centers.html 65.1 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Integration Challenge Security Risks in System Integration.html 64.9 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Zero Trust Challenges & Disadvantages.html 64.9 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Connectivity Security.html 64.8 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Pushing Compute to the Network's Edge.html 64.6 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Certificate Revocation Mechanisms.html 64.6 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - The Three Pillars of Authentication.html 64.6 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Out-of-Band Management The Secure Backdoor.html 64.5 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Designing for Failure Fail-Open vs. Fail-Closed.html 64.5 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing Remote Access An Introduction to VPNs.html 64.5 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Key Escrow The Break Glass Procedure.html 64.4 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Interpreting Vulnerability Scan Results.html 64.4 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Practical IAM Threats Spoofing & Escalation.html 64.3 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Deployment Models.html 64.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Digital Forensics Fundamentals.html 64.3 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Input Validation.html 64.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Mobile Freedom & Risk Sideloading, Rooting, and Jailbreaking.html 64.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Physical Security The Human Element.html 63.9 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Automation and Orchestration.html 63.8 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - RADIUS Federation Extending Trust.html 63.8 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - SCADA Systems Security.html 63.7 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - The Art of Obscurity Substitution and Transposition Ciphers.html 63.7 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Zero-Click Exploits.html 63.6 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Cloud Security Posture Management (CSPM).html 63.5 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Live System Snapshots VSS.html 63.4 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Security Operations Center (SOC).html 63.4 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Securing the Keys to the Kingdom Online vs. Offline Root CAs.html 63.3 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Digital Certificates Common Name (CN) vs. Subject Alternative Name (SAN).html 63.3 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Beyond the Pillars Advanced Authentication Attributes.html 63.3 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Silent Sentry Network-Based Intrusion Detection Systems (NIDS).html 63.2 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Data Center Environmental Controls.html 63.2 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Understanding Network Zones.html 63.1 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - The Birthday Attack Exploiting Hash Collisions.html 63.1 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Outsourcing Security MSSPs & SECaaS.html 62.9 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Deterrent & Physical Security.html 62.8 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Critical Hand-Off The Shared Responsibility Model.html 62.6 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Rule-Based Access Control.html 62.6 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Host-Based Intrusion Protection.html 62.4 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Advanced Drive Sanitization.html 62.0 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Security Governance Regulations, Standards, and Legislation.html 62.0 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Storage Resiliency.html 61.7 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Configuration Guides.html 61.6 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Evolution of the Firewall Next-Generation Firewalls (NGFW).html 61.4 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Enterprise Wi-Fi Authentication A Deep Dive into PEAP.html 61.3 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Wi-Fi Denial-of-Service Attacks.html 61.3 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Device Deployment Models.html 61.3 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Overwhelming the Switch MAC Flooding Attacks.html 61.2 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Zero Trust Architecture (ZTA).html 61.1 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - The Password Policy Paradox From Complexity to Clarity.html 61.1 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Stream Ciphers vs. Block Ciphers.html 61.0 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Removable Media Drop Attacks.html 60.9 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Vulnerability Disclosure Models.html 60.9 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - MDM vs. MAM Securing Mobile Endpoints.html 60.8 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - The Direct Access Vector.html 60.7 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - The Buffer Zone A Deep Dive into the Demilitarized Zone (DMZ).html 60.7 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Course Capstone A Day in the Life.html 60.6 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Data Protection.html 60.5 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Deconstructing the Insider Threat.html 60.4 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Resource Exhaustion & Memory Leaks.html 60.4 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Cloud Responsibility Matrix.html 60.3 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Biometric Accuracy Metrics.html 60.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Zero-Days & Bug Bounties.html 60.2 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing Email Protocols.html 60.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Weak Host & Network Configurations.html 60.0 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Cryptography Fundamentals Plaintext, Ciphertext and Ciphers.html 59.9 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Advanced Web Deception.html 59.9 KB
- ~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Modern Evasive Malware.html 59.9 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Legal Concepts Due Process & Legal Holds.html 59.9 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Threat Intelligence Lifecycle.html 59.9 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Threat Landscape Structured vs. Unstructured.html 59.9 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Hashing Algorithms The Foundation of Data Integrity.html 59.8 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The Role of Proxies and Gateways in Network Security.html 59.5 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Internet of Things (IoT) Security.html 59.4 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Hiding in Plain Sight The Art of Steganography.html 59.3 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Unified Threat Management (UTM).html 59.1 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Hacking with a Cause The World of Hacktivism.html 59.1 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Supply Chain Attack When Trust Becomes a Weapon.html 59.0 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Wi-Fi Security WPA2 vs. WPA3.html 58.8 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - API Architectures SOAP vs. REST.html 58.7 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Site Architecture.html 58.6 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Attack Vectors.html 58.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Chain of Custody Preserving Evidence Integrity.html 58.0 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - Certificate Revocation.html 57.9 KB
- ~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Visibility SPAN vs. TAP.html 57.8 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Vulnerability, Threat, and Risk Decoding the Terminology.html 57.6 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Mastering High Availability and Scalability.html 57.3 KB
- ~Get Your Files Here !/5 - The Language of Secrecy/1 - PKI Trust Models.html 57.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Data Destruction Physical Methods.html 57.1 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Firewall 101 Stateless Packet Filtering.html 57.1 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Network-Based Vectors Unsecure Protocols and Open Ports.html 56.9 KB
- ~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Component Vulnerabilities.html 56.9 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - STIX and TAXII Threat Intelligence Sharing.html 56.8 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Advanced Email Security Sender Policy Framework (SPF).html 56.7 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Access Control Models Discretionary Access Control (DAC).html 56.6 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Traditional Password Policies.html 56.4 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Five Functions of the NIST Cybersecurity Framework In-Depth A Practical.html 56.2 KB
- ~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Access Security.html 56.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Modern Physical Threats Juice-Jacking & Malicious USBs.html 56.1 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Controlling User Behavior Content and URL Filtering.html 55.8 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Symmetric Encryption The Workhorse of Bulk Data Protection.html 55.7 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The Secure Email Gateway A Centralized Defense.html 55.3 KB
- ~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Digital Signatures Verifying Trust.html 55.3 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Silent Watchers Mastering Detective Controls.html 55.1 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Title Backup Strategy & Resiliency The 3-2-1 Rule.html 55.1 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Precision Social Engineering.html 55.0 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Preventive Security Controls.html 55.0 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Redundancy in Practice Power and Network.html 54.4 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - VPN Client Configuration Always-On, Split Tunnel, and Full Tunnel.html 54.3 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Locks and Gateways.html 53.9 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - IPSec Modes of Operation Transport vs. Tunnel Mode.html 53.4 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - Directory Schema & Distinguished Names.html 53.3 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Building a Layered Network Defense.html 53.2 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Digital Battlefield Defining and Reducing the Attack Surface.html 52.6 KB
- ~Get Your Files Here !/3 - Know Your Enemy/1 - Physical Intrusion Tactics.html 52.4 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Weaponized Documents Malware Hidden in Plain Sight.html 52.2 KB
- ~Get Your Files Here !/6 - Who Goes There/1 - The Future of Access Control Attribute-Based Access Control (ABAC).html 51.9 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Architecting a Secure Network from Scratch.html 51.7 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Clean-Up Crew Understanding Corrective and Recovery Controls.html 51.1 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing File Transfers SFTP vs. FTPS.html 50.7 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Security Architecture Diversity.html 49.7 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing the Network Map.html 49.1 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Service Models IaaS, PaaS, and SaaS.html 48.7 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Remote vs. Local Exploits Understanding the Proximity of Attack.html 48.1 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Cybercrime Syndicates.html 47.9 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Fine-Tuning Security Scoping, Tailoring, and Compensating Controls.html 47.9 KB
- ~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Unmasking Insider Threats Specific Profiles and Mitigation.html 47.3 KB
- ~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Wi-Fi Attacks Rogue APs & Evil Twins.html 46.9 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - IaC Security.html 45.1 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Technical, Operational, and Managerial Controls.html 44.4 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Human Element Security Roles, Responsibilities, and Policies.html 42.3 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Understanding Security Control Objectives.html 42.3 KB
- ~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Network Time Security.html 41.3 KB
- ~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Zero Trust Architecture.html 34.8 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Site Resiliency Alternate Processing Sites.html 33.7 KB
- ~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Physical Access Attacks Card Cloning and Skimming.html 33.6 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Mind the Gap The Art and Science of Gap Analysis.html 31.6 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Navigating the NIST Cybersecurity Framework An Introduction.html 25.8 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/2 - The CIA Triad The Unbreakable Pillars of Information Security.html 24.1 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/3 - The DAD Triad A Hacker's Strategic Objectives.html 23.3 KB
- ~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/3 - Non-Repudiation The Digital Fingerprint of Accountability.html 23.3 KB
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.