riversongs Posted January 7, 2024 Report Share Posted January 7, 2024 Free Download CompTIA Security+ SY0-701 Full Course and LabsPublished 1/2024MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 47.83 GB | Duration: 25h 42mPass your Security+ SY0-701 exam on the first try with a lab base approach to learning. Tons of labs.What you'll learnCompTIA Security+ exam objectivesAttacks against networksMethods to protect a networkFull length Mock ExamRequirementsBasics Networking and skills.DescriptionThis course will prepare you to pass the CompTIA Security+ SY0-701 exam on the first try. In this course, I will be using my 20+ years of experience teaching IT courses to give you a practical, hands-on approach to all of the CompTIA Security+ Certification exams. I will cover all of the exam objectives in detail. I am a best-selling udemy instructor with over 300,000 students. I have helped thousands of students to pass their certification exams over the last 20 years. My method of teaching is engaging and fun.I will review how to build your own lab to follow along with me in this journey so you can gain the practical knowledge needed not only to pass your Security+ exam but also how to apply it in the real world of being an IT technician.This course will cover the following domains:Attacks, Threats, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceThis course will include:Over 200 lectures.Over 25 Hours of training.We will only be covering the topics on your exam, no-nonsense and personal stories.PDF of the exam objectives from CompTIA for the Security+ exam. Certificate of completion. Lifetime access. 30-day money-back guarantee.OverviewSection 1: IntroductionLecture 1 Exam InformationLecture 2 Exam DomainsLecture 3 Course Note DownloadSection 2: Lesson 1: IT Security FundamentalsLecture 4 Introduction IT Security FundamentalsLecture 5 CIA Triad OB 1.2Lecture 6 Confidentiality OB 1.2Lecture 7 Integrity OB 1.2Lecture 8 Availability OB 1.2Lecture 9 DAD Triade OB 1.2Lecture 10 Non-Repudiation OB 1.2Lecture 11 Authentication OB 1.2Lecture 12 Authorization OB 1.2Lecture 13 Accounting OB 1.2Lecture 14 Accountability OB 1.2Lecture 15 Gap analysis OB 1.2Lecture 16 Zero Trust OB 1.2Section 3: Security Controls Categories and TypesLecture 17 Control Categories OB 1.1Lecture 18 Control Types OB 1.1Lecture 19 Defense in Depth OB 1.1Section 4: ThreatsLecture 20 Threats OB 2.1Lecture 21 Attributes of Actors OB 2.1Lecture 22 Threats Motivation OB 2.1Lecture 23 Nation-state OB 2.1Lecture 24 Unskilled Attacker OB 2.1Lecture 25 Hacktivist OB 2.1Lecture 26 Organized Crime OB 2.1Lecture 27 Shadow IT OB 2.1Lecture 28 Threat Vectors and Attack Surfaces OB 2.2Section 5: VulnerabilitiesLecture 29 Vulnerabilities OB 2.3Lecture 30 Memory injection and buffer overflows OB 2.3Lecture 31 Race Conditions OB 2.3Lecture 32 Malicious Updates OB 2.3Lecture 33 OS-Based Vulnerabilities OB 2.3Lecture 34 SQL Injections OB 2.3Lecture 35 XSS OB 2.3Lecture 36 Hardware Vulnerabilities OB 2.3Lecture 37 VM Vulnerabilities OB 2.3Lecture 38 Cloud-specific Vulnerabilities OB 2.3Lecture 39 Supply Chain Vulnerabilities OB 2.3Lecture 40 Cryptographic Vulnerabilities OB 2.3Lecture 41 Misconfiguration OB 2.3Lecture 42 Mobile Device Vulnerabilities OB 2.3Lecture 43 Zero-day Vulnerabilities OB 2.3Section 6: Signs of AttacksLecture 44 Malware OB 2.4Lecture 45 Viruses OB 2.4Lecture 46 Worms OB 2.4Lecture 47 Trojans OB 2.4Lecture 48 Ransomware OB 2.4Lecture 49 Spyware OB 2.4Lecture 50 Rootkit OB 2.4Lecture 51 Logic Bomb OB 2.4Lecture 52 Keyloggers OB 2.4Lecture 53 Bloatware OB 2.4Lecture 54 DDOS OB 2.4Lecture 55 DNS OB 2.4Lecture 56 Onpath Attack OB 2.4Lecture 57 Credential Replay OB 2.4Lecture 58 Privilege Escalation OB 2.4Lecture 59 Request Forgery OB 2.4Lecture 60 Directory Traversal OB 2.4Lecture 61 Indicators of Malicious Activity OB 2.4Section 7: CryptographyLecture 62 Intro to cryptography OB 1.4Lecture 63 Crypto Terms OB 1.4Lecture 64 Goals Cryptography OB 1.4Lecture 65 Algorithm vs Keys OB 1.4Lecture 66 Ciphers OB 1.4Lecture 67 Symmetric Encryption OB 1.4Lecture 68 Symmetric Algorithms OB 1.4Lecture 69 Asymmetric Encryption OB 1.4Lecture 70 Asymmetric Algorithms OB 1.4Lecture 71 Hybrid Cryptography OB 1.4Lecture 72 Hashing OB 1.4Lecture 73 Hashing Algorithms OB 1.4Lecture 74 Digital Signatures OB 1.4Lecture 75 Intro to PKI OB 1.4Lecture 76 PKI Purpose OB 1.4Lecture 77 SSL/TLS Handshake OB 1.4Lecture 78 PKI Process OB 1.4Lecture 79 Certificates OB 1.4Lecture 80 PKI Root of Trust OB 1.4Lecture 81 PKI Verification and Revocation OB 1.4Lecture 82 Steganography OB 1.4Lecture 83 Blockchain OB 1.4Lecture 84 Salting OB 1.4Lecture 85 TPM OB 1.4Lecture 86 Secure Enclave OB 1.4Lecture 87 Obfuscation OB 1.4Lecture 88 Tokenization OB 1.4Lecture 89 Key Escrow OB 1.4Lecture 90 HSM OB 1.4Section 8: Social EngineeringLecture 91 Social Engineering OB 2.2Lecture 92 Phishing OB 2.2Lecture 93 Vishing OB 2.2Lecture 94 Smishing OB 2.2Lecture 95 Spear Phishing OB 2.2Lecture 96 Misinformation and Disinformation OB 2.2Lecture 97 Impersonation OB 2.2Lecture 98 Business Email Compromise OB 2.2Lecture 99 Pretexting OB 2.2Lecture 100 Watering Hole OB 2.2Lecture 101 Brand Impersonation OB 2.2Lecture 102 Typosquatting OB 2.2Section 9: Securing IT AssetsLecture 103 Segmentation OB 2.5Lecture 104 Isolation OB 2.5Lecture 105 Access Control OB 2.5Lecture 106 Principles of Least Privilege OB 2.5Lecture 107 Access Control List OB 2.5Lecture 108 Filesystem Permissions OB 2.5Lecture 109 Application Allow List OB 2.5Lecture 110 Patching OB 2.5Lecture 111 Configuration Enforcement OB 2.5Lecture 112 Decommissioning OB 2.5Lecture 113 Monitoring OB 2.5Lecture 114 Hardening Techniques OB 2.5Section 10: Security PrinciplesLecture 115 Infrastructure Considerations OB 3.2Lecture 116 Device Placement OB 3.2Lecture 117 Security Zones OB 3.2Lecture 118 Attack Surface OB 3.2Lecture 119 Failure Modes OB 3.2Lecture 120 Device Attributes OB 3.2Lecture 121 Network Appliances and Sensors OB 3.2Lecture 122 Jump Server OB 3.2Lecture 123 Proxy Servers OB 3.2Lecture 124 IDS/IPS OB 3.2Lecture 125 Load Balancer OB 3.2Lecture 126 802.1x and EAP OB 3.2Lecture 127 Firewalls OB 3.2Lecture 128 VPN OB 3.2Lecture 129 SD-WAN OB 3.2Lecture 130 Selecting Effective Controls OB 3.2Section 11: Security ArchitectureLecture 131 Cloud OB 3.1Lecture 132 Infrastructure as Code OB 3.1Lecture 133 Serverless Architecture OB 3.1Lecture 134 Microservices OB 3.1Lecture 135 Air Gapped OB 3.1Lecture 136 Software-Defined Networking OB 3.1Lecture 137 On-Premises OB 3.1Lecture 138 Centralized vs. Decentralized OB 3.1Lecture 139 Virtualization OB 3.1Lecture 140 Containerization OB 3.1Lecture 141 High Availability OB 3.1Lecture 142 IoT OB 3.1Lecture 143 ICS OB 3.1Lecture 144 Security Architecture Considerations OB 3.1Lecture 145 RTOS and Embedded Systems OB 3.1Section 12: Data ProtectionLecture 146 Regulated Data OB 3.3Lecture 147 Intellectual Property OB 3.3Lecture 148 Legal and Financial Data OB 3.3Lecture 149 Data Classification OB 3.3Lecture 150 Geolocation and Sovereignty OB 3.3Lecture 151 Methods to Secure Data OB 3.3Section 13: Common Security TechniquesLecture 152 Secure Baselines OB 4.1Lecture 153 Hardening Devices OB 4.1Lecture 154 Installations of Mobile Devices OB 4.1Lecture 155 Mobile Solutions and MDM OB 4.1Lecture 156 Mobile Connection Methods OB 4.1Lecture 157 Wireless Security OB 4.1Lecture 158 Application Security Methods OB 4.1Lecture 159 Security Monitoring OB 4.1Section 14: Hardware, software and Data Asset ManagementLecture 160 Acquisition Procurement OB 4.2Lecture 161 Assignment and Accounting OB 4.2Lecture 162 Monitoring and Tracking OB 4.2Lecture 163 Disposal and Decommission OB 4.2Section 15: Vulnerability ManagementLecture 164 Vulnerability Scan OB 4.3Lecture 165 Application Security Testing OB 4.3Lecture 166 Threat Feeds OB 4.3Lecture 167 Penetration Testing OB 4.3Lecture 168 Bug Bounty Program OB 4.3Lecture 169 False Positive vs. False Negative OB 4.3Lecture 170 CVE and CVSS OB 4.3Lecture 171 Vulnerability Responses OB 4.3Section 16: Alerting and Monitoring ITLecture 172 Monitoring Resources OB 4.4Lecture 173 Monitoring Activities OB 4.4Lecture 174 Alerting and Monitoring Tools SIEM and DLP's OB 4.4Section 17: Enhance SecurityLecture 175 Firewall Configuration OB 4.5Lecture 176 Web Filters OB 4.5Lecture 177 Operating System Security OB 4.5Lecture 178 Secure Protocols OB 4.5Lecture 179 DNS Filter OB 4.5Lecture 180 Email security OB 4.5Lecture 181 File Integrity Monitoring OB 4.5Lecture 182 Network Access Control OB 4.5Lecture 183 EDR OB 4.5Lecture 184 User Behavior Analytics OB 4.5Section 18: Identity and Access Management (IAM)Lecture 185 Provisioning Users OB 4.6Lecture 186 Single Sign-on OB 4.6Lecture 187 Federation and SAML OB 4.6Lecture 188 Access Control Models OB 4.6Lecture 189 Multifactor Authentication OB 4.6Lecture 190 Authentication tokens OB 4.6Lecture 191 Biometric OB 4.6Lecture 192 Password Management OB 4.6Section 19: Automation and OrchestrationLecture 193 Automation and Orchestration OB 4.7Section 20: Incident ResponseLecture 194 Incident Response Steps OB 4.8Lecture 195 Incident Response Training OB 4.8Lecture 196 Digital Forensics OB 4.8Section 21: Supporting an investigationLecture 197 Types of logs OB 4.9Section 22: Security GovernanceLecture 198 Security Polices, Standards, Guidelines and Procedures OB 5.1Lecture 199 Security Governance Considerations and Revisions OB 5.1Lecture 200 Security Governance Structures OB 5.1Lecture 201 Security Governance Roles OB 5.1Section 23: Risk ManagementLecture 202 Risk Terms OB 5.2Lecture 203 Risk Identification and Assessment Times OB 5.2Lecture 204 Quantitative and Qualitive Risk Assessment OB 5.2Lecture 205 Risk Register OB 5.2Lecture 206 Risk Appetite OB 5.2Lecture 207 Risk Response OB 5.2Lecture 208 Business Impact Assessment OB 5.2Section 24: Vendor ManagementLecture 209 Vendor Assessment and Selection OB 5.3Lecture 210 Vendor Agreements OB 5.3Section 25: Security ComplianceLecture 211 Compliance Reporting OB 5.4Lecture 212 Privacy OB 5.4Section 26: Audits and AssessmentsLecture 213 Internal and External Assessments OB 5.5Lecture 214 Penetration Test OB 5.5Section 27: Security Awareness TrainingLecture 215 Training against Phishing OB 5.6Lecture 216 Security Awareness Program OB 5.6Section 28: Physical SecurityLecture 217 Physical SecurityLecture 218 Deception and Disruption TechnologySection 29: Changement ManagementLecture 219 Change management OB 1.3Lecture 220 Technical Implications OB 1.3Section 30: Resilience and RecoveryLecture 221 High Availability OB 3.4Lecture 222 Site Selection OB 3.4Lecture 223 Capacity Planning OB 3.4Lecture 224 Testing OB 3.4Lecture 225 Backups OB 3.4Lecture 226 Power OB 3.4Section 31: LabsLecture 227 Lab introLecture 228 Installing Windows on VirtualBoxLecture 229 Installing Kali LinuxLecture 230 Using SnapshotsLecture 231 Using an IP ScannerLecture 232 Using the Nessus Vulnerability scannerLecture 233 Cracking a Password with KaliLecture 234 Cracking a password with a lookup tableLecture 235 Scanner a website for vulnerabilitiesLecture 236 Using Wireshark to capture network trafficLecture 237 Installing and Using SSHLecture 238 Securing Windows with Password ComplexityLecture 239 Using Steganography to hide messagesLecture 240 Encrypting a hard driveLecture 241 Implementing Role Based Access Control in WindowsLecture 242 Assigning Permissions to foldersLecture 243 Configure Firewall rulesLecture 244 Updating a ComputerLecture 245 Hardening a Desktop using group policyLecture 246 Securing a wireless networkLecture 247 Using Encrypting File SystemLecture 248 Backing up router configurationLecture 249 Updating firmware on a routerLecture 250 Configuring a DMZLecture 251 Using tor networkLecture 252 Configuring VLAN'sLecture 253 Setting up an IPSLecture 254 Configuring web filtersAnyone looking to get CompTIA Security+ CertifiedHomepagehttps://www.udemy.com/course/comptia_security_plus/Download ( Rapidgator )http://peeplink.in/51ed5f6e9f50Uploadgighttps://uploadgig.com/file/download/1453eB858b028432/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part01.rarhttps://uploadgig.com/file/download/f10667f5167e3976/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part02.rarhttps://uploadgig.com/file/download/854ae289c8ee7Da4/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part03.rarhttps://uploadgig.com/file/download/1823b12c5b253653/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part04.rarhttps://uploadgig.com/file/download/E180ae07193c5e37/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part05.rarhttps://uploadgig.com/file/download/8aadd5f2433d6Ca9/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part06.rarhttps://uploadgig.com/file/download/98d6A6CA76d7c309/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part07.rarhttps://uploadgig.com/file/download/8c536248C94f7a9b/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part08.rarhttps://uploadgig.com/file/download/0f88b542f27E550e/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part09.rarhttps://uploadgig.com/file/download/bcB6479bff0e62dE/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part10.rarhttps://uploadgig.com/file/download/2215cbBaa7a803ff/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part11.rarhttps://uploadgig.com/file/download/3fc75900d2a2a45c/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part12.rarDownload ( NitroFlare )https://nitroflare.com/view/4F3AF6974060EFE/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part01.rarhttps://nitroflare.com/view/14BBDA895393BB8/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part02.rarhttps://nitroflare.com/view/3688E6EB5E0E605/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part03.rarhttps://nitroflare.com/view/967DE74E6DE9C3A/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part04.rarhttps://nitroflare.com/view/E453BE9631B8090/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part05.rarhttps://nitroflare.com/view/64459D9BF8F9E28/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part06.rarhttps://nitroflare.com/view/E63EF35685053EA/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part07.rarhttps://nitroflare.com/view/70A9096425C23B8/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part08.rarhttps://nitroflare.com/view/E22B6628CF53622/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part09.rarhttps://nitroflare.com/view/3CDA302A91B3966/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part10.rarhttps://nitroflare.com/view/1855FF6E2550965/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part11.rarhttps://nitroflare.com/view/75293681255FC42/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part12.rarFikperhttps://fikper.com/DiONtml8wd/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part01.rar.htmlhttps://fikper.com/R6PqGGxWDH/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part02.rar.htmlhttps://fikper.com/0IFgGqiTrf/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part03.rar.htmlhttps://fikper.com/z3yyl4rOWy/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part04.rar.htmlhttps://fikper.com/yDPVTokIZ9/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part05.rar.htmlhttps://fikper.com/9TGpfnrXNs/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part06.rar.htmlhttps://fikper.com/eLrxsZ2GGW/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part07.rar.htmlhttps://fikper.com/KYZGQwiEiQ/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part08.rar.htmlhttps://fikper.com/4OQZsNxHeG/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part09.rar.htmlhttps://fikper.com/xHTrjmZBKT/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part10.rar.htmlhttps://fikper.com/jgIV9rnqG8/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part11.rar.htmlhttps://fikper.com/B9KRSN69xQ/oqsfa.CompTIA.Security.SY0701.Full.Course.and.Labs.part12.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now