kingers Posted April 30 Report Share Posted April 30 8.09 GB | 00:08:51 | mp4 | 1920X1080 | 16:9Genre:eLearning |Language:EnglishFiles Included :1 DoS Protection, Load Balancers and Proxies (107.24 MB)2 Intrusion PreventionDetection Systems (75.81 MB)3 Application Security (36.68 MB)4 NACs and VPNs (57.64 MB)5 Securing DNS and Email (78.63 MB)6 Routers and NAT Gateways (52.69 MB)7 Firewalls, UTMs and NGFWs (81.19 MB)1 Threat Intelligence (98.34 MB)2 Threat Intel Collection Methods (47.96 MB)3 Types of Threat Actors (42.88 MB)4 Threat Management Frameworks (58.69 MB)5 Using MITRE ATT&CK (126.23 MB)6 IOCs and Responses (40.43 MB)1 Vulnerability Scans (75.3 MB)2 Security Content Automation Protocol (SCAP) (77.22 MB)3 Assessments (80.69 MB)4 Patch Management (44.71 MB)5 Information Sources (27.5 MB)1 Vulnerability Assessment vs Pentesting (53.68 MB)2 Testing Methods (61 MB)3 Pentesting Post Exploit (51.4 MB)4 Vulnerability Assessment Tools (49.21 MB)5 Some Pentesting Tools (66.28 MB)6 Vulnerability Assessments and Pentesting Requirements (40.86 MB)1 Common Software Vulnerabilities (77.33 MB)2 Race Conditions (43.92 MB)3 Cryptographic Vulnerabilities (32.39 MB)4 Software Development Vulnerabilities (49.86 MB)5 Web Application Attacks (39.88 MB)6 VM and Network-Based Attacks (68.96 MB)1 Being Proactive (85.17 MB)2 Using Data Analysis (70.1 MB)3 Preventative Measures (57.1 MB)4 Application Control (39.73 MB)5 Security Automation (25.47 MB)6 Physical Security (52.78 MB)1 Intro (16.55 MB)2 Event Classification (48.29 MB)3 Event Triage (50.99 MB)4 Incident Response Process (46.63 MB)5 Incident Response Playbooks (80.76 MB)6 Automated Response (32.69 MB)7 Communications Plans & Stakeholder Management (26.4 MB)1 Intro (30.99 MB)2 Forensic Process Identification (60.45 MB)3 Digital Forensics (33.68 MB)4 Forensic Process Evidence Collection (68.55 MB)5 Forensic Process Evidence Preservation (30.51 MB)6 Forensic Process Analysis (33.79 MB)7 Forensic Process Verification and Presentation (19.03 MB)1 Intro (11.47 MB)2 Enterprise Mobility Management (30.22 MB)3 Windows Information Protection (86.75 MB)4 Configuring Endpoint Security Controls (60.2 MB)5 Hardening Techniques (96.81 MB)6 Compensation Controls (34.68 MB)1 Intro (8.64 MB)2 Cloud Deployment Models (40.88 MB)3 Impacts of Cloud Technology Adoption (71.82 MB)4 Securing Specialized Technologies (49.37 MB)5 Cloud Threats And Vulnerabilities (22.9 MB)6 Monitoring Logs Using Azure AD Audit (35.24 MB)7 Emerging Technologies (88.84 MB)1 Introduction To Public Key Infrastructure (6.91 MB)2 The Role Of Public Key Infrastructure (51.63 MB)3 Private And Public Key Encryption (36.49 MB)4 Certificate Lifecycle (57.52 MB)5 Certificate Types And Usage (44.74 MB)6 Understanding Trust Concepts (72.27 MB)1 Traffic Monitoring (44.58 MB)2 Security Sensors (106.37 MB)3 Network Segmentation (105.45 MB)4 Deperimeterization Zero Trust (33.78 MB)5 Merging Networks (56.36 MB)6 Defense In Depth (25.92 MB)1 Hashing (73.1 MB)2 SSLTLS (51.85 MB)3 Symmetric And Asymmetric Algorithm (25.49 MB)4 SMIME and SSH (96.1 MB)5 Internet Protocol Security (IPSec) (69.95 MB)1 Risk Analysis Methods (44.7 MB)2 Responding To Risk (52.18 MB)3 Types of Risk (37.34 MB)4 Risk Management Lifecycle and Frameworks (62.06 MB)5 Tracking Risk (29.02 MB)6 Risk Appetite, Tolerance, and Capacity (55.65 MB)7 Policies and Security Practices (51.9 MB)1 Third Party Risk Management (107.7 MB)2 Vendor Lock-InOut and Viability (45.88 MB)3 Meeting Obligations (46.87 MB)4 Third Party Dependencies (56.74 MB)5 Technical Considerations (47.35 MB)6 Additional Vendor Considerations (47.13 MB)1 Data Considerations (72.05 MB)2 Location, Location, Location (48.15 MB)3 Regulations, Accreditations and Standards (72.52 MB)4 Legal Considerations (51 MB)5 Contract and Agreement Types (51.07 MB)1 BC and DR Planning (33.95 MB)2 BCDR Planning Process (61.67 MB)3 Creating a BC Plan (37.41 MB)4 DR Planning (79.02 MB)5 Resiliency Technologies (59.06 MB)6 Testing BCDR Plans (35.2 MB)1 Software Defined Networking (SDN) (70.67 MB)2 Scalability and Automation (70.24 MB)3 Resiliency In Infrastructure Design (96.39 MB)4 Virtuailzation and Containerization (119.76 MB)5 CDNs and Caching (57.56 MB)1 Baselines and Templates (59.56 MB)2 APIs and Middleware (93.62 MB)3 Software Assurance (76.23 MB)4 Integrating Enterprise Applications (41.73 MB)5 Application Development Security (64.75 MB)6 Web Application Security (87.71 MB)1 Data Loss Prevention and Detection (50.05 MB)2 Data Classification, Labeling and Tagging (63.43 MB)3 Obfuscation and Anonymization of Data (62.85 MB)4 Data Lifecycle Management (66.94 MB)5 Data Inventory and Mapping (47.44 MB)6 Data Integrity Management (93.83 MB)1 Managing Credentials (81.93 MB)2 Password Policies (74.03 MB)3 Access Control (56.66 MB)4 AAA Protocols (73.89 MB)5 MFA, OTP and SSO (35.87 MB)6 Authenticating Hardware and People (36.19 MB)1 Virtualization Technologies (61.31 MB)2 Virtualization Strategies (54.64 MB)3 Cloud Deployment Models (67.61 MB)4 Cloud Computing Characteristics (62.47 MB)5 Cloud Provider Limitations (58.29 MB)6 Extending On-premise Security Controls (69.2 MB)1 The CIA Triad (41.76 MB)2 Non-repudiation and Compliance Requirements (59.1 MB)3 Cryptography and PKI (51.22 MB)4 Hashes and Digital Signatures (81.86 MB)5 Cryptography Use Cases (66.14 MB)1 AI and ML (47.63 MB)2 Quantum Computing and Nano Technology (49.91 MB)3 Homomorphic Encryption and SMC (64.93 MB)4 Blockchain and Distributed Consensus (61.98 MB)5 Big Data and Passwordless Authentication (65.55 MB)6 Virtual Reality and 3D Printing (58.09 MB)7 Deepfakes and Biometric Impersonation (47.28 MB)]Screenshothttps://ausfile.com/2hj394xnpbyi/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part01.rarhttps://ausfile.com/twcd6ckt2erw/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part02.rarhttps://ausfile.com/zw9u5si58bgd/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part03.rarhttps://ausfile.com/2jxl4dukt7qj/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part04.rarhttps://ausfile.com/trviqyh24psj/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part05.rarhttps://ausfile.com/ga2iz2hp97d1/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part06.rarhttps://ausfile.com/hjz6rjfvxdn0/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part07.rarhttps://ausfile.com/3odt1evwvwps/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part08.rarhttps://ausfile.com/wpdtznfhkgsy/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part09.rarhttps://rapidgator.net/file/547671b728ee51393b320fbabccd387f/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part01.rarhttps://rapidgator.net/file/b58e10675fee6f94864318984d26ba9c/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part02.rarhttps://rapidgator.net/file/24d88a710c1105eac58c098d380dd5a7/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part03.rarhttps://rapidgator.net/file/db9bc26191ed715ef1864de812d94347/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part04.rarhttps://rapidgator.net/file/091731dcf611c992efc723848659e872/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part05.rarhttps://rapidgator.net/file/a5e5cc409fca65e48cf833c136bb9db4/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part06.rarhttps://rapidgator.net/file/8c1ae34beb291c3fff9faf5ca9ae4f20/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part07.rarhttps://rapidgator.net/file/504b96fb5f11e6002d9526ec639dfb10/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part08.rarhttps://rapidgator.net/file/745014f46b825671c2e3811092560549/cbtnuggets..comptia.casp_.cas004..bob.salmans..john.munjoma.mar.2025.part09.rarhttps://ddownload.com/l7jl731vx433/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part01.rarhttps://ddownload.com/jrq8tfdl9xyb/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part02.rarhttps://ddownload.com/cz3j3sl4qz6l/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part03.rarhttps://ddownload.com/j7bg8hwd9sky/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part04.rarhttps://ddownload.com/xqpu0vqkapeb/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part05.rarhttps://ddownload.com/tbwiklzv181i/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part06.rarhttps://ddownload.com/o9kfhxk7ccgr/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part07.rarhttps://ddownload.com/t1mljijl0e9q/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part08.rarhttps://ddownload.com/zl5f5sda997x/cbtnuggets..comptia.casp%2B.cas004..bob.salmans..john.munjoma.mar.2025.part09.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now