Details for this torrent 

Cybrary CompTIA Security+ Course
Type:
Other > Other
Files:
63
Size:
4.91 GiB (5271666229 Bytes)
Tag(s):
cybrary comptia courses secplus security+
Uploaded:
2017-11-19 20:48:19 GMT
By:
Anonymous
Seeders:
0
Leechers:
3
Comments
0  

Info Hash:
83DC794B4025CF62DBD838EF988C210ECFE83C61




(Problems with magnets links are fixed by upgrading your torrent client!)
CompTIA’s Security+ certification has long been a top choice for those looking for their introduction into the cyber security industry—it provides the fundamental knowledge for securing a network and managing risk. It also is approved by the U.S Department of Defense to meet information assurance technical and management certification requirements, so it’s a pretty huge distinction and in great demand. The certification will help people enter into the cyber security field, and will validate a fundamental cyber security skill set. Previously, Security+ training classes were expensive, but now, at Cybrary, our online class is entirely free, forever!

About the Online CompTIA Security+ Training

The Security+ curriculum covers many areas of network security, including cloud security, encryption, security protocols, system security and network infrastructure. Our free online CompTIA Security+ training is ideal for network administrators, security consultants, security engineers, security analysts and people looking to enter into cyber security. Learn about general security concepts, basics of cryptography, communications security and operational and organizational security. With the increase of major security breaches that are occurring, security experts are needed now more than ever. 

CEU / CPE: 15
Total Clock Hours: 9 hrs, 35 mins
 
https://www.cybrary.it/course/comptia-security-plus/

Module 1/1.1 Firewalls.mp4155.01 MiB
Module 1/1.10 TCP IP Internet Protocol.mp4147.88 MiB
Module 1/1.11 Common Protocols and their Port Numbers.mp4129.28 MiB
Module 1/1.12 Security Related Issues Wireless Part 1.mp4140.81 MiB
Module 1/1.13 Security Related Issues Wireless Part 2.mp455.22 MiB
Module 1/1.2 Proxies.mp481.86 MiB
Module 1/1.3 Reverse Proxies.mp416.18 MiB
Module 1/1.4 Network Address Translation.mp423.47 MiB
Module 1/1.5 VPN Concentrators.mp418.32 MiB
Module 1/1.6 Network Administration Principles.mp4129.45 MiB
Module 1/1.7 Subnetting.mp4152.51 MiB
Module 1/1.8 Subnet Mask.mp428.32 MiB
Module 1/1.9 Network Design and Elements.mp4194.09 MiB
Module 2/2.1 Risk Related Concepts (Part 1).mp483.35 MiB
Module 2/2.10 Importance Of Security Awareness And Training.mp4130.43 MiB
Module 2/2.11 Physical Security And Environmental Controls.mp4136.4 MiB
Module 2/2.12 Risk Management Best Practices.mp4177.36 MiB
Module 2/2.13 Goals Of Security.mp4115.04 MiB
Module 2/2.2 Risk Related Concepts (Part 2).mp4167.72 MiB
Module 2/2.3 Control Types.mp425.84 MiB
Module 2/2.4 The Principle of Least Priviledge.mp416.28 MiB
Module 2/2.5 Security Implications of Integrating Systems (Part 1).mp465.94 MiB
Module 2/2.6 Security Implications of Integrating Systems (Part 2).mp456.13 MiB
Module 2/2.7 Basic Forensic Procedures.mp479.74 MiB
Module 2/2.8 Incident Response Procedures.mp460.38 MiB
Module 2/2.9 Importance Of Security.mp497.8 MiB
Module 3/3.1 Types Of Malware (Part 1).mp4132.63 MiB
Module 3/3.10 Mitigation and Deterrent Techniques.mp476.29 MiB
Module 3/3.11 Security Traits and Vulnerabilities.mp472.46 MiB
Module 3/3.12 Assesment Techniques.mp439 MiB
Module 3/3.13 Penetration Testing vs Vulnerability Scanning (Part 1).mp445.15 MiB
Module 3/3.14 Penetration Testing vs Vulnerability Scanning (Part 2).mp440.16 MiB
Module 3/3.2 Types Of Malware (Part 2).mp480.44 MiB
Module 3/3.3 Phishing.mp4151.79 MiB
Module 3/3.4 Various Types of Attacks.mp473.46 MiB
Module 3/3.5 Social Engineering.mp485.39 MiB
Module 3/3.6 Types Of Wireless Attacks.mp461.33 MiB
Module 3/3.7 Application Attacks.mp436.41 MiB
Module 3/3.8 Attacks (LDAP, XML) Injection.mp439.74 MiB
Module 3/3.9 Zero Day Exploits, Cookies and Attachments.mp445.12 MiB
Module 4/4.1 Applications, Security Controls and Techniques.mp496.86 MiB
Module 4/4.2 Host Security.mp4118.7 MiB
Module 4/4.3 Hardware Security.mp472.38 MiB
Module 4/4.4 Virtualization.mp462.05 MiB
Module 4/4.5 Importance of Data Security.mp489.7 MiB
Module 4/4.6 Data Security.mp424.94 MiB
Module 4/4.7 Data Encryption.mp468.98 MiB
Module 4/4.8 Data Policies.mp435.31 MiB
Module 5/5.1 Authentication Services.mp440.89 MiB
Module 5/5.2 Access Controls.mp464.91 MiB
Module 5/5.3 Authentication Authorization and Access Control (Part 1).mp488.84 MiB
Module 5/5.4 Authentication Authorization and Access Control (Part 2).mp4121.68 MiB
Module 5/5.5 Authentication Factors.mp450.21 MiB
Module 5/5.6 Implementing Appropriate Security Controls When Performing Account Management.mp4106.58 MiB
Module 5/5.7 Best Practices For Account Management.mp4123.94 MiB
Module 6/6.1 General Cryptography Concepts.mp449.52 MiB
Module 6/6.2 Block Cyphers & Stream Cyphers.mp418.11 MiB
Module 6/6.3 Transport Encryption.mp420.56 MiB
Module 6/6.4 Hashing & Steganography.mp4100.73 MiB
Module 6/6.5 WEP, WPA and WPA2.mp429.06 MiB
Module 6/6.6 MD5, SHA and AES.mp435.03 MiB
Module 6/6.7 DES, HMAC and CHAP.mp472.92 MiB
Module 6/6.8 Public Key Infrastructure.mp471.37 MiB