Pluralsight - Security for CompTIA A Plus (220-902)

mp4   Hot:167   Size:626.91 MB   Created:2017-09-04 22:56:10   Update:2021-12-13 16:48:14  

File List

  • 01. Common Security Threats and Vulnerabilities/01_01-Overview.mp4 9.52 MB
    01. Common Security Threats and Vulnerabilities/01_02-Meanwhile, in the Real World.mp4 1.23 MB
    01. Common Security Threats and Vulnerabilities/01_03-Preliminary Definitions.mp4 6.29 MB
    01. Common Security Threats and Vulnerabilities/01_04-Malware Trends.mp4 7.54 MB
    01. Common Security Threats and Vulnerabilities/01_05-Spyware.mp4 9.78 MB
    01. Common Security Threats and Vulnerabilities/01_06-Ransomware.mp4 5.4 MB
    01. Common Security Threats and Vulnerabilities/01_07-Worms.mp4 2.23 MB
    01. Common Security Threats and Vulnerabilities/01_08-Viruses.mp4 8.44 MB
    01. Common Security Threats and Vulnerabilities/01_09-Trojans and Rootkits.mp4 11.03 MB
    01. Common Security Threats and Vulnerabilities/01_10-Zeroday Exploits.mp4 2.13 MB
    01. Common Security Threats and Vulnerabilities/01_11-Phishing and Spear Phishing.mp4 11.43 MB
    01. Common Security Threats and Vulnerabilities/01_12-Man in the Middle Attacks.mp4 3.27 MB
    01. Common Security Threats and Vulnerabilities/01_13-Botnets.mp4 3.98 MB
    01. Common Security Threats and Vulnerabilities/01_14-Password Attacks.mp4 3.93 MB
    01. Common Security Threats and Vulnerabilities/01_15-Social Engineering, Tailgating, and Shoulder Surfing.mp4 7.5 MB
    01. Common Security Threats and Vulnerabilities/01_16-Security Best Practices.mp4 1.86 MB
    01. Common Security Threats and Vulnerabilities/01_17-Demo Cleaning Malware in Windows 8.1.mp4 14.55 MB
    01. Common Security Threats and Vulnerabilities/01_18-Back to the Real World.mp4 450.99 KB
    01. Common Security Threats and Vulnerabilities/01_19-Homework.mp4 466.42 KB
    01. Common Security Threats and Vulnerabilities/01_20-For Further Learning.mp4 2.2 MB
    01. Common Security Threats and Vulnerabilities/01_21-Summary.mp4 1.74 MB
    02. Common Prevention Methods/02_01-Overview.mp4 3.73 MB
    02. Common Prevention Methods/02_02-Meanwhile, in the Real World.mp4 1.4 MB
    02. Common Prevention Methods/02_03-Secure Doors.mp4 8.16 MB
    02. Common Prevention Methods/02_04-Access Controls.mp4 5.99 MB
    02. Common Prevention Methods/02_05-Elements of a Secure Office.mp4 9.03 MB
    02. Common Prevention Methods/02_06-AAA.mp4 4.91 MB
    02. Common Prevention Methods/02_07-Digital Loss Prevention DLP.mp4 10.02 MB
    02. Common Prevention Methods/02_08-User Education.mp4 5.48 MB
    02. Common Prevention Methods/02_09-Demo 1 Applying Authentication and Authorization.mp4 17.31 MB
    02. Common Prevention Methods/02_10-Demo 2 Applying Accounting.mp4 13.63 MB
    02. Common Prevention Methods/02_11-Back to the Real World.mp4 4.18 MB
    02. Common Prevention Methods/02_12-Homework.mp4 1.54 MB
    02. Common Prevention Methods/02_13-For Further Learning.mp4 1.83 MB
    02. Common Prevention Methods/02_14-Summary.mp4 1.69 MB
    03. Windows OS Security Settings/03_01-Overview.mp4 5.7 MB
    03. Windows OS Security Settings/03_02-Meanwhile, in the Real World.mp4 722.68 KB
    03. Windows OS Security Settings/03_03-Demo 1 Managing Users and Groups.mp4 14.37 MB
    03. Windows OS Security Settings/03_04-Demo 2 Managing Users and Groups, Continued.mp4 6.54 MB
    03. Windows OS Security Settings/03_05-File System Security Concepts.mp4 13.37 MB
    03. Windows OS Security Settings/03_06-BitLocker vs. EFS.mp4 6.9 MB
    03. Windows OS Security Settings/03_07-Demo 3 Using BitLocker.mp4 7.04 MB
    03. Windows OS Security Settings/03_08-Demo 4 Using Encrypting File System.mp4 6.77 MB
    03. Windows OS Security Settings/03_09-Demo 5 Using NTFS and Shared Folder Permissions.mp4 18.63 MB
    03. Windows OS Security Settings/03_10-Back to the Real World.mp4 993.28 KB
    03. Windows OS Security Settings/03_11-Homework.mp4 1.99 MB
    03. Windows OS Security Settings/03_12-For Further Learning.mp4 2.19 MB
    03. Windows OS Security Settings/03_13-Summary.mp4 2.24 MB
    04. Securing Workstations/04_01-Overview.mp4 5.12 MB
    04. Securing Workstations/04_02-Meanwhile, in the Real World.mp4 1.19 MB
    04. Securing Workstations/04_03-Defining Best Practice.mp4 1.71 MB
    04. Securing Workstations/04_04-Password Principles.mp4 11.44 MB
    04. Securing Workstations/04_05-Elements of a Strong Password.mp4 8.03 MB
    04. Securing Workstations/04_06-The Password Security Balancing Act.mp4 10.73 MB
    04. Securing Workstations/04_07-User Account Management.mp4 9.62 MB
    04. Securing Workstations/04_08-System Security Principles.mp4 6.23 MB
    04. Securing Workstations/04_09-Demo 1 Implementing Account and Password Policies.mp4 20.26 MB
    04. Securing Workstations/04_10-Demo 2 Security Policies and the User Experience.mp4 6.67 MB
    04. Securing Workstations/04_11-Back to the Real World.mp4 2.63 MB
    04. Securing Workstations/04_12-Homework.mp4 1.32 MB
    04. Securing Workstations/04_13-For Further Learning.mp4 1.81 MB
    04. Securing Workstations/04_14-Summary.mp4 1.92 MB
    05. Securing Mobile Devices/05_01-Overview.mp4 5.15 MB
    05. Securing Mobile Devices/05_02-Meanwhile, in the Real World.mp4 2.28 MB
    05. Securing Mobile Devices/05_03-Defining BYOD and MDM.mp4 3.42 MB
    05. Securing Mobile Devices/05_04-BYODMDM Security Concerns.mp4 13.66 MB
    05. Securing Mobile Devices/05_05-Policies and Procedures.mp4 8.48 MB
    05. Securing Mobile Devices/05_06-Popular MDM Solutions.mp4 6.39 MB
    05. Securing Mobile Devices/05_07-Screen Locks.mp4 6.93 MB
    05. Securing Mobile Devices/05_08-MDM Common Features.mp4 6.05 MB
    05. Securing Mobile Devices/05_09-Authenticator Apps.mp4 1.82 MB
    05. Securing Mobile Devices/05_10-Demo 1 Introducing the Cisco Meraki MDM Solution.mp4 13.71 MB
    05. Securing Mobile Devices/05_11-Demo 2 Introducing Microsoft Intune.mp4 6.56 MB
    05. Securing Mobile Devices/05_12-Back to the Real World.mp4 787.24 KB
    05. Securing Mobile Devices/05_13-Homework.mp4 1017.17 KB
    05. Securing Mobile Devices/05_14-For Further Learning.mp4 2.21 MB
    05. Securing Mobile Devices/05_15-Summary.mp4 2.33 MB
    06. Data Destruction and Disposal Methods/06_01-Overview.mp4 5.38 MB
    06. Data Destruction and Disposal Methods/06_02-Meanwhile, in the Real World.mp4 1020.99 KB
    06. Data Destruction and Disposal Methods/06_03-Use Cases for Data Destruction.mp4 4.81 MB
    06. Data Destruction and Disposal Methods/06_04-Physical Data Destruction Methods.mp4 9.14 MB
    06. Data Destruction and Disposal Methods/06_05-Certificate of Destruction.mp4 6.83 MB
    06. Data Destruction and Disposal Methods/06_06-Ewaste.mp4 5.44 MB
    06. Data Destruction and Disposal Methods/06_07-Hard Drive Formatting Methods.mp4 5.99 MB
    06. Data Destruction and Disposal Methods/06_08-Securely Deleting Hard Drive Data.mp4 5.07 MB
    06. Data Destruction and Disposal Methods/06_09-Demo 1 Data Deletion and Recovery.mp4 12.63 MB
    06. Data Destruction and Disposal Methods/06_10-Demo 2 Performing Secure Data Erasure.mp4 10.55 MB
    06. Data Destruction and Disposal Methods/06_11-Back to the Real World.mp4 1.45 MB
    06. Data Destruction and Disposal Methods/06_12-Homework.mp4 2.07 MB
    06. Data Destruction and Disposal Methods/06_13-For Further Learning.mp4 1.19 MB
    06. Data Destruction and Disposal Methods/06_14-Summary.mp4 1.7 MB
    07. Securing SOHO Wireless and Wired Networks/07_01-Overview.mp4 4.11 MB
    07. Securing SOHO Wireless and Wired Networks/07_02-Meanwhile, in the Real World.mp4 994.42 KB
    07. Securing SOHO Wireless and Wired Networks/07_03-Understanding the SOHO Environment.mp4 4.98 MB
    07. Securing SOHO Wireless and Wired Networks/07_04-SOHO Networking Challenges.mp4 3.55 MB
    07. Securing SOHO Wireless and Wired Networks/07_05-The Myth of Perfect Security.mp4 7.53 MB
    07. Securing SOHO Wireless and Wired Networks/07_06-Common WLAN Protection Mechanisms.mp4 11.25 MB
    07. Securing SOHO Wireless and Wired Networks/07_07-WiFi Security Protocols.mp4 6.57 MB
    07. Securing SOHO Wireless and Wired Networks/07_08-Radio and Antenna.mp4 3.16 MB
    07. Securing SOHO Wireless and Wired Networks/07_09-Switch Port Security.mp4 4.05 MB
    07. Securing SOHO Wireless and Wired Networks/07_10-Web Content Filtering.mp4 3.24 MB
    07. Securing SOHO Wireless and Wired Networks/07_11-Firewalls.mp4 4.47 MB
    07. Securing SOHO Wireless and Wired Networks/07_12-Converged SOHO Network Appliances.mp4 2.9 MB
    07. Securing SOHO Wireless and Wired Networks/07_13-Demo SOHO Router Basic Configuration.mp4 18.6 MB
    07. Securing SOHO Wireless and Wired Networks/07_14-Back to the Real World.mp4 2.37 MB
    07. Securing SOHO Wireless and Wired Networks/07_15-Homework.mp4 858.43 KB
    07. Securing SOHO Wireless and Wired Networks/07_16-For Further Learning.mp4 1.67 MB
    07. Securing SOHO Wireless and Wired Networks/07_17-Summary.mp4 2.77 MB
    Exercise files/securitycomptiaaplus220902.zip 9.97 MB

Download Info

  • Tips

    “Pluralsight - Security for CompTIA A Plus (220-902)” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.