security-plus-sy0-701

File Type Create Time File Size Seeders Leechers Updated
Movie 2024-02-27 16.53GB 0 1 2 months ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
security  plus  sy0  701  
Related Torrents
  1. [ DevCourseWeb.com ] Udemy - Security + Comptia Security Plus Sy0-701 Certification Prep 3.99GB
  2. CBT Nuggets CompTIA Security Plus SY0 201 With SY0 301 JK0 018 Updates ACADEMY - Downloader.exe 782.95KB
  3. Pluralsight - CompTIA Security Plus SY0-401 Compliance And Operational Security 786.22MB
  4. Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security 365.27MB
  5. [ DevCourseWeb.com ] Udemy - CompTIA Security + Security Plus (SY0-601) Certification 3.60GB
  6. [FreeCoursesOnline.Us] CBT Nuggets - comptia-security-plus-sy0-501 4.37GB
  7. [CourseClub.NET] CBT Nuggets - Comptia Security Plus sy0-501 4.37GB
  8. FreeCoursesOnline.Us-CBT-Nuggets-comptia-security-plus-sy0-501-1.torrent 28.58KB
  9. CompTIA Security+ SY0-701 Practice Tests & PBQs_ Exam SY0-701 by Nikolaos Gorgotsias PDF 12.24MB
  10. [ CourseWikia.com ] Linkedin - CompTIA Security + (SY0-701) Cert Prep - 3 Security Architecture 501.99MB
Files
  1. 003-Exam Tips-5ixb.mp4 112.22MB
  2. 005-Fundamentals of Security-SAfU.mp4 138.11MB
  3. 006-Threats and Vulnerabilities-gC37.mp4 52.59MB
  4. 007-Confidentiality OBJ 1 2-vvSD.mp4 42.45MB
  5. 008-Integrity OBJ 1 2-rLHu.mp4 52.40MB
  6. 009-Availability OBJ 1 2-TlGj.mp4 51.72MB
  7. 010-Non repudiation OBJ 1 2-ODLu.mp4 54.76MB
  8. 011-Authentication OBJ 1 2-fLYy.mp4 60.52MB
  9. 012-Authorization OBJ 1 2-HsV5.mp4 28.56MB
  10. 013-Accounting OBJ 1 2-DkUQ.mp4 30.72MB
  11. 014-Security Control Categories OBJ 1 1-cPdj.mp4 46.66MB
  12. 015-Security Control Types OBJ 1 1-9TEA.mp4 43.59MB
  13. 016-Gap Analysis OBJ 1 1-WvYF.mp4 48.69MB
  14. 017-Zero Trust OBJ 1 2-KgFk.mp4 68.64MB
  15. 019-Threat Actors OBJ 1 2 2 1 2 2-0M5f.mp4 86.65MB
  16. 020-Threat Actor Motivations OBJ 2 1-IM3t.mp4 53.98MB
  17. 021-Threat Actor Attributes OBJ 2 1-QZO4.mp4 32.95MB
  18. 022-Unskilled Attackers OBJ 2 1-AkOn.mp4 25.91MB
  19. 023-Hacktivists OBJ 2 1-fH4Q.mp4 32.31MB
  20. 024-Organized Crime OBJ 2 1-q3vd.mp4 57.14MB
  21. 025-Nation state Actor OBJ 2 1-RjC4.mp4 85.80MB
  22. 026-Insider Threats OBJ 2 1-rLxg.mp4 77.01MB
  23. 027-Shadow IT OBJ 2 1-ngwC.mp4 66.36MB
  24. 028-Threat Vectors and Attack Surfaces OBJ 2 2-aZdl.mp4 100.13MB
  25. 029-Outsmarting Threat Actors OBJ 1 2-uc37.mp4 79.58MB
  26. 031-Physical Security OBJ 1 2 2 4-VC9N.mp4 79.00MB
  27. 032-Fencing and Bollards OBJ 1 2-0Zq3.mp4 63.14MB
  28. 033-Attacking with Brute Force OBJ 2 4-5ZF8.mp4 60.82MB
  29. 034-Surveillance Systems OBJ 1 2-laaj.mp4 52.33MB
  30. 035-Bypassing Surveillance Systems OBJ 2 4-iPoY.mp4 47.67MB
  31. 036-Access Control Vestibules OBJ 1 2-6o82.mp4 66.37MB
  32. 037-Door Locks OBJ 1 2-s8x2.mp4 135.19MB
  33. 038-Access Badge Cloning OBJ 2 4-12mq.mp4 72.51MB
  34. 040-Social Engineering OBJ 2 2 5 6-ElCd.mp4 90.03MB
  35. 041-Motivational Triggers OBJ 5 6-GZX1.mp4 120.29MB
  36. 042-Impersonation OBJ 2 2-KWqR.mp4 61.99MB
  37. 043-Pretexting OBJ 2 2-v7Sh.mp4 72.87MB
  38. 044-Phishing Attacks OBJ 2 2-BeUy.mp4 75.09MB
  39. 045-Preventing Phishing Attacks OBJ 5 6-nRbI.mp4 66.67MB
  40. 046-Conducting an Anti Phishing Campaign OBJ 5 6-C9uo.mp4 44.53MB
  41. 047-Frauds and Scams OBJ 2 2-5MPx.mp4 63.07MB
  42. 048-Influence Campaigns OBJ 2 2-ryMJ.mp4 48.54MB
  43. 049-Other Social Engineering Attacks OBJ 2 2-Ri5g.mp4 78.42MB
  44. 051-Malware OBJ 2 4-uUuP.mp4 186.24MB
  45. 052-Viruses OBJ 2 4-2TWY.mp4 59.87MB
  46. 053-Worms OBJ 2 4-OhOA.mp4 26.08MB
  47. 054-Trojans OBJ 2 4-sJxO.mp4 29.76MB
  48. 055-Viruses and Trojans OBJ 2 4-mL1E.mp4 87.03MB
  49. 056-Ransomware OBJ 2 4-dxwT.mp4 97.19MB
  50. 057-Zombies and Botnets OBJ 2 4-cYu3.mp4 53.18MB
  51. 058-Rootkits OBJ 2 4-VaZb.mp4 46.88MB
  52. 059-Backdoors and Logic Bombs OBJ 2 4-L4Ok.mp4 59.77MB
  53. 060-Keylogger OBJ 2 4-2JJE.mp4 56.53MB
  54. 061-Spyware and Bloatware OBJ 2 4-97IL.mp4 39.32MB
  55. 062-Malware Attack Techniques OBJ 2 4-M8OJ.mp4 41.69MB
  56. 063-Indications of Malware Attacks OBJ 2 4-tAUq.mp4 70.50MB
  57. 065-Data Protection OBJ 1 4 3 3 4 2 4 4 5 1-NccZ.mp4 70.49MB
  58. 066-Data Classifications OBJ 3 3-Zatv.mp4 56.71MB
  59. 067-Data Ownership OBJ 4 2 5 1-Vqyv.mp4 47.57MB
  60. 068-Data States OBJ 3 3-wnAi.mp4 32.55MB
  61. 069-Data Types OBJ 3 3 1 4-h0kk.mp4 36.05MB
  62. 070-Data Sovereignty OBJ 3 3-SXy5.mp4 22.06MB
  63. 071-Securing Data OBJ 3 3-lrL5.mp4 22.29MB
  64. 072-Data Loss Prevention DLP OBJ 4 4-Lp3q.mp4 47.25MB
  65. 073-Configuring a DLP OBJ 4 5-ExcD.mp4 78.47MB
  66. 075-Cryptographic Solutions OBJ 1 4 2 3 2 4-WTgN.mp4 257.17MB
  67. 076-Symmetric vs Asymmetric OBJ 1 4-9mfI.mp4 73.87MB
  68. 077-Symmetric Algorithms OBJ 1 4-JMlV.mp4 43.26MB
  69. 078-Asymmetric Algorithms OBJ 1 4-FxAo.mp4 41.47MB
  70. 079-Hashing OBJ 1 4-rzQp.mp4 88.46MB
  71. 080-Increasing Hash Security OBJ 1 4-hkkz.mp4 57.24MB
  72. 081-Public Key Infrastructure PKI OBJ 1 4-GnxL.mp4 39.39MB
  73. 082-Digital Certificates OBJ 1 4-ZgWq.mp4 108.40MB
  74. 083-Exploring Digital Certificates OBJ 1 4-0qZJ.mp4 23.78MB
  75. 084-Blockchain OBJ 1 4-O3HU.mp4 39.40MB
  76. 085-Encryption Tools OBJ 1 4-JBjh.mp4 47.46MB
  77. 086-Obfuscation OBJ 1 4-SktR.mp4 80.74MB
  78. 087-Cryptographic Attacks OBJ 2 3 2 4-cU9N.mp4 101.52MB
  79. 089-Risk Management OBJ 5 2-tNJT.mp4 100.84MB
  80. 090-Risk Assessment Frequency OBJ 5 2-H4Z8.mp4 21.29MB
  81. 091-Risk Identification OBJ 5 2-PrUc.mp4 42.73MB
  82. 092-Risk Register OBJ 5 2-lS7L.mp4 61.82MB
  83. 093-Qualitative Risk Analysis OBJ 5 2-pKyD.mp4 36.89MB
  84. 094-Quantitative Risk Analysis OBJ 5 2-HOm9.mp4 21.24MB
  85. 095-Risk Management Strategies OBJ 5 2-oR6O.mp4 46.72MB
  86. 096-Risk Monitoring and Reporting OBJ 5 2-8sXH.mp4 28.85MB
  87. 098-Third party Vendor Risks OBJ 2 2 2 3 5 3-6MfF.mp4 67.14MB
  88. 099-Supply Chain Risks OBJ 2 3 5 3-fKIP.mp4 44.43MB
  89. 100-Supply Chain Attacks OBJ 2 2 5 3-ldfD.mp4 76.66MB
  90. 101-Vendor Assessment OBJ 5 3-KUyy.mp4 50.83MB
  91. 102-Vendor Selection and Monitoring OBJ 5 3-13an.mp4 52.17MB
  92. 103-Contracts and Agreements OBJ 5 3-H3MC.mp4 54.44MB
  93. 105-Governance and Compliance OBJ 5 1 5 4-vIVb.mp4 104.65MB
  94. 106-Governance OBJ 5 1-1HRd.mp4 38.77MB
  95. 107-Governance Structures OBJ 5 1-slRz.mp4 26.96MB
  96. 108-Policies OBJ 5 1-QaRQ.mp4 31.90MB
  97. 109-Standards OBJ 5 1-LF0D.mp4 33.80MB
  98. 110-Procedures OBJ 5 1-haDx.mp4 30.73MB
  99. 111-Governance Considerations OBJ 5 1-161T.mp4 45.32MB
  100. 112-Compliance OBJ 5 4-DMHl.mp4 47.04MB
  101. 113-Non compliance Consequences OBJ 5 4-lwdb.mp4 54.02MB
  102. 115-Asset and Change Management OBJ 1 3 4 1 4 2-nxfk.mp4 101.36MB
  103. 116-Acquisition and Procurement OBJ 4 2-eb8J.mp4 56.54MB
  104. 117-Mobile Asset Deployments OBJ 4 1-xU1A.mp4 46.25MB
  105. 118-Asset Management OBJ 4 2-HV6k.mp4 57.29MB
  106. 119-Asset Disposal and Decommissioning OBJ 4 2-ZHB6.mp4 65.41MB
  107. 120-Change Management OBJ 1 3-Z8sa.mp4 70.45MB
  108. 121-Change Management Processes OBJ 1 3-16y7.mp4 39.58MB
  109. 122-Technical Implications of Changes OBJ 1 3-orO8.mp4 32.39MB
  110. 123-Documenting Changes OBJ 1 3-cEdr.mp4 35.76MB
  111. 125-Audits and Assessments OBJ 5 5-2XRk.mp4 103.15MB
  112. 126-Internal Audits and Assessments OBJ 5 5-2vQo.mp4 58.03MB
  113. 127-Performing an Internal Assessment OBJ 5 5-Ss1H.mp4 36.59MB
  114. 128-External Audits and Assessments OBJ 5 5-kvFM.mp4 52.34MB
  115. 129-Performing an External Assessment OBJ 5 5-TTcP.mp4 34.07MB
  116. 130-Penetration Testing OBJ 5 5-xVil.mp4 50.89MB
  117. 131-Reconnaissance in Pentesting OBJ 5 5-KpsH.mp4 51.14MB
  118. 132-Performing a Basic PenTest OBJ 5 5-XC9z.mp4 154.02MB
  119. 133-Attestation of Findings OBJ 5 5-taef.mp4 70.66MB
  120. 135-Cyber Resilience and Redundancy OBJ 3 4-lDTn.mp4 69.94MB
  121. 136-High Availability OBJ 3 4-rP1f.mp4 60.80MB
  122. 137-Data Redundancy OBJ 3 4-R3Ss.mp4 42.86MB
  123. 138-Configuring a RAID OBJ 3 4-cgV8.mp4 25.65MB
  124. 139-Capacity Planning OBJ 3 4-hhtL.mp4 86.80MB
  125. 140-Powering Data Centers OBJ 3 4-G3NZ.mp4 81.33MB
  126. 141-Data Backups OBJ 3 4-uz7I.mp4 65.07MB
  127. 142-Continuity of Operations Plan OBJ 3 4-SOdi.mp4 76.02MB
  128. 143-Redundant Site Considerations OBJ 3 4-nHBW.mp4 108.93MB
  129. 144-Resilience and Recovery Testing OBJ 3 4-jqd2.mp4 66.13MB
  130. 146-Security Architecture OBJ 3 1 4 1-9tTg.mp4 86.47MB
  131. 147-On premise versus the Cloud OBJ 3 1-dAwA.mp4 102.32MB
  132. 148-Cloud Security OBJ 3 1 4 1-taKD.mp4 48.30MB
  133. 149-Virtualization and Containerization OBJ 2 3 3 1-ref5.mp4 82.03MB
  134. 150-Serverless OBJ 3 1-H2mX.mp4 36.82MB
  135. 151-Microservices OBJ 3 1-KKcJ.mp4 40.35MB
  136. 152-Network Infrastructure OBJ 3 1-P0xA.mp4 38.48MB
  137. 153-Software Defined Network SDN OBJ 3 1-U92C.mp4 32.75MB
  138. 154-Infrastructure as Code IaC OBJ 3 1-Ow87.mp4 33.97MB
  139. 155-Centralized vs Decentralized Architectures OBJ 3 1-Kspl.mp4 33.77MB
  140. 156-Internet of Things IoT OBJ 3 1 4 1-MVie.mp4 57.27MB
  141. 157-ICS and SCADA OBJ 3 1 4 1-e4Cl.mp4 32.50MB
  142. 158-Embedded Systems OBJ 3 1 4 1-AcXO.mp4 41.99MB
  143. 160-Security Infrastructure OBJ 3 2 4 5-zuj1.mp4 90.69MB
  144. 161-Ports and Protocols OBJ 4 5-v6IE.mp4 83.73MB
  145. 162-Firewalls OBJ 3 2-pVXq.mp4 75.13MB
  146. 163-Configuring Firewalls OBJ 4 5-gR2E.mp4 105.65MB
  147. 164-IDS and IPS OBJ 3 2-X1yp.mp4 37.22MB
  148. 165-Network Appliances OBJ 3 2-iu2H.mp4 88.94MB
  149. 166-Port Security OBJ 3 2-xUuq.mp4 91.46MB
  150. 167-Securing Network Communications OBJ 3 2-JyDH.mp4 183.37MB
  151. 168-SD WAN and SASE OBJ 3 2-yhq2.mp4 65.55MB
  152. 169-Infrastructure Considerations OBJ 3 2-AJ5t.mp4 96.37MB
  153. 170-Selecting Infrastructure Controls OBJ 3 2-UiM1.mp4 63.18MB
  154. 172-Identity and Access Management IAM Solutions OBJ 2 4 4 6-q4U1.mp4 97.94MB
  155. 173-Identity and Access Management IAM OBJ 4 6-CvHT.mp4 46.09MB
  156. 174-Multifactor Authentication OBJ 4 6-vah9.mp4 110.82MB
  157. 175-Password Security OBJ 4 6-7kKY.mp4 123.30MB
  158. 176-Password Attacks OBJ 2 4-RLRz.mp4 56.55MB
  159. 177-Single Sign On SSO OBJ 4 6-GeBE.mp4 73.27MB
  160. 178-Federation OBJ 4 6-WDlM.mp4 35.21MB
  161. 179-Privileged Access Management PAM OBJ 4 6-2CYK.mp4 23.68MB
  162. 180-Access Control Models OBJ 4 6-NJBH.mp4 76.20MB
  163. 181-Assigning Permissions OBJ 4 6-zQGF.mp4 63.79MB
  164. 183-Vulnerabilities and Attacks OBJ 2 2 2 3 2 4 2 5 4 1-fJIb.mp4 139.48MB
  165. 184-Hardware Vulnerabilities OBJ 2 2 2 3 2 5-Chsx.mp4 51.12MB
  166. 185-Bluetooth Vulnerabilities and Attacks OBJ 2 3 2 5 4 1-eH4x.mp4 53.40MB
  167. 186-Mobile Vulnerabilities and Attacks OBJ 2 3 2 5 4 1-pCDl.mp4 44.89MB
  168. 187-Zero day Vulnerabilities OBJ 2 3-M4aK.mp4 37.91MB
  169. 188-Operating System Vulnerabilities OBJ 2 3 2 5-LoA6.mp4 48.51MB
  170. 189-SQL and XML Injections OBJ 2 3 2 4-cHjP.mp4 100.65MB
  171. 190-Conducting an SQL Injection OBJ 2 3 2 4-nnYM.mp4 76.46MB
  172. 191-XSS and XSRF OBJ 2 3 2 4-8JrX.mp4 132.25MB
  173. 192-Buffer Overflow OBJ 2 3 2 4-EVeM.mp4 43.50MB
  174. 193-Race Conditions OBJ 2 3-y06R.mp4 57.73MB
  175. 195-Malicious Activity OBJ 2 4-Dmho.mp4 74.15MB
  176. 196-Distributed Denial of Service OBJ 2 4-EpS7.mp4 64.93MB
  177. 197-Domain Name System DNS Attacks OBJ 2 4-6I5t.mp4 33.85MB
  178. 198-Directory Traversal Attack OBJ 2 4-ysxj.mp4 45.77MB
  179. 199-Execution and Escalation Attack OBJ 2 4-N5En.mp4 43.11MB
  180. 200-Replay Attacks OBJ 2 4-UiDP.mp4 28.46MB
  181. 201-Session Hijacking OBJ 2 4-j9NW.mp4 33.79MB
  182. 202-On Path Attacks-fqHm.mp4 31.91MB
  183. 203-Injection Attacks-ujyC.mp4 23.68MB
  184. 204-Indicators of Compromise IoC-YBdU.mp4 52.53MB
  185. 206-Hardening OBJ 2 5 4 1 4 5-SiAX.mp4 87.49MB
  186. 207-Changing Default Configurations OBJ 2 5-qL78.mp4 46.62MB
  187. 208-Restricting Applications OBJ 2 5-tTZy.mp4 70.04MB
  188. 209-Unnecessary Services OBJ 2 5-NB8P.mp4 55.63MB
  189. 210-Trusted Operating Systems OBJ 2 5-Q8So.mp4 45.51MB
  190. 211-Updates and Patches OBJ 2 5-ObSF.mp4 47.43MB
  191. 212-Patch Management OBJ 2 5-ltoz.mp4 94.32MB
  192. 213-Group Policies OBJ 2 5 4 5-wILH.mp4 38.57MB
  193. 214-SELinux OBJ 2 5 4 5-QtUe.mp4 35.01MB
  194. 215-Data Encryption Levels 2 5-Bo1r.mp4 32.67MB
  195. 216-Secure Baselines OBJ 2 5 and 4 1-3exk.mp4 56.31MB
  196. 218-Security Techniques OBJ 4 1 4 5-gI7S.mp4 82.45MB
  197. 219-Wireless Infrastructure Security OBJ 4 1-tNsD.mp4 83.60MB
  198. 220-Wireless Security Settings OBJ 4 1-CAQP.mp4 97.10MB
  199. 221-Application Security OBJ 4 1-Judh.mp4 83.77MB
  200. 222-Network Access Control NAC OBJ 4 5-6fbW.mp4 43.37MB
  201. 223-Web and DNS Filtering OBJ 4 5-lL1h.mp4 62.07MB
  202. 224-Email Security OBJ 4 5-AfEO.mp4 54.34MB
  203. 225-Endpoint Detection and Response OBJ 4 5-mh8Z.mp4 61.55MB
  204. 226-User Behavior Analytics OBJ 4 5-xu0Q.mp4 60.31MB
  205. 227-Selecting Secure Protocols OBJ 4 5-kaly.mp4 115.69MB
  206. 229-Vulnerability Management OBJ 4 3-x3Ve.mp4 61.31MB
  207. 230-Identifying Vulnerabilities OBJ 4 3-ooT5.mp4 37.06MB
  208. 231-Threat Intelligence Feeds OBJ 4 3-OkeU.mp4 55.60MB
  209. 232-Responsible Disclosure Programs OBJ 4 3-vR3z.mp4 46.35MB
  210. 233-Analyzing Vulnerabilities OBJ 4 3-PBtm.mp4 82.68MB
  211. 234-Conducting Vulnerability Scans OBJ 4 3-5D9M.mp4 163.02MB
  212. 235-Assessing Vulnerability Scan Results OBJ 4 3-3RqD.mp4 89.55MB
  213. 236-Vulnerability Response and Remediation OBJ 4 3-mN3q.mp4 57.83MB
  214. 237-Validating Vulnerability Remediation OBJ 4 3-KeHv.mp4 34.13MB
  215. 238-Vulnerability Reporting OBJ 4 3-pRAw.mp4 78.81MB
  216. 240-Alerting and Monitoring OBJ 4 4-utCt.mp4 119.80MB
  217. 241-Monitoring Resources OBJ 4 4-35cu.mp4 43.31MB
  218. 242-Alerting and Monitoring Activities OBJ 4 4-snDE.mp4 105.86MB
  219. 243-Simple Network Management Protocol SNMP OBJ 4 4-4Rfz.mp4 34.53MB
  220. 244-Security Information and Event Management SIEM OBJ 4 4-u2uX.mp4 78.22MB
  221. 245-Data from Security Tools OBJ 4 4-fSMl.mp4 33.47MB
  222. 246-Security Content Automation and Protocol SCAP OBJ 4 4-S2Ar.mp4 66.49MB
  223. 247-NetFlow and Flow Analysis-jL6q.mp4 49.00MB
  224. 248-Single Pane of Glass OBJ 4 4-jPWM.mp4 41.18MB
  225. 250-Incident Response OBJ 4 8-Wfxg.mp4 65.63MB
  226. 251-Incident Response Process OBJ 4 8-Slpx.mp4 93.48MB
  227. 252-Threat Hunting OBJ 4 8-ijHw.mp4 51.63MB
  228. 253-Root Cause Analysis OBJ 4 8-0bos.mp4 65.22MB
  229. 254-Incident Response Training and Testing OBJ 4 8-ZNUj.mp4 52.58MB
  230. 255-Digital Forensic Procedures OBJ 4 8-nhGO.mp4 134.10MB
  231. 256-Data Collection Procedures OBJ 4 8-wXT0.mp4 54.22MB
  232. 257-Disk Imaging and Analysis OBJ 4 8-7Msv.mp4 101.84MB
  233. 259-Investigating an Incident OBJ 4 9-Kfxt.mp4 72.12MB
  234. 260-Investigating with Data OBJ 4 9-2Ejk.mp4 100.51MB
  235. 261-Dashboards OBJ 4 9-Cisd.mp4 34.38MB
  236. 262-Automated Reports OBJ 4 9-KN5Y.mp4 48.49MB
  237. 263-Vulnerability Scans OBJ 4 9-D1La.mp4 78.49MB
  238. 264-Packet Captures OBJ 4 9-o6sI.mp4 85.47MB
  239. 265-Firewall Logs OBJ 4 9-tSmt.mp4 35.45MB
  240. 266-Application Logs OBJ 4 9-9U8h.mp4 27.53MB
  241. 267-Endpoint Logs OBJ 4 9-aMlr.mp4 28.61MB
  242. 268-OS specific Security Logs OBJ 4 9-VjrR.mp4 25.74MB
  243. 269-IPS IDS Logs OBJ 4 9-s6Et.mp4 52.02MB
  244. 270-Network Logs OBJ 4 9-zExo.mp4 40.71MB
  245. 271-Metadata OBJ 4 9-DBxZ.mp4 29.83MB
  246. 273-Automation and Orchestration OBJ 4 7-m6oc.mp4 140.75MB
  247. 274-When to Automate and Orchestrate OBJ 4 7-mrb8.mp4 79.48MB
  248. 275-Benefits of Automation and Orchestratation OBJ 4 7-VnIe.mp4 59.67MB
  249. 276-Automating Support Tickets OBJ 4 7-4HFR.mp4 54.08MB
  250. 277-Automating Onboarding OBJ 4 7-q39X.mp4 61.14MB
  251. 278-Automating Security OBJ 4 7-NvKY.mp4 32.41MB
  252. 279-Automating Application Development OBJ 4 7-YZ2n.mp4 75.49MB
  253. 280-Integrations and APIs OBJ 4 7-dknQ.mp4 102.31MB
  254. 282-Security Awareness OBJ 5 6-tHpr.mp4 79.83MB
  255. 283-Recognizing Insider Threats OBJ 5 6-Se7V.mp4 79.48MB
  256. 284-Password Management OBJ 5 6-hbrD.mp4 79.81MB
  257. 285-Avoiding Social Engineering OBJ 5 6-6qr6.mp4 73.84MB
  258. 286-Policy and Handbooks OBJ 5 6-ZhZm.mp4 72.47MB
  259. 287-Remote and Hybrid Work Environments OBJ 5 6-A8nJ.mp4 61.02MB
  260. 288-Creating a Culture of Security OBJ 5 6-juNe.mp4 34.88MB
  261. 290-Conclusion-S4ln.mp4 280.69MB
  262. 291-BONUS Where do I go from here-32HS.mp4 54.49MB
  263. Exercise-Files.zip 1.52MB
  264. Subtitles.zip 1.10MB
  265. __ia_thumb.jpg 5.06KB
  266. security-plus-sy0-701_meta.sqlite 696.00KB
  267. security-plus-sy0-701_meta.xml 2.95KB