Pluralsight - CompTIA Security Plus SY0-401 Compliance And Operational Security
01. Risk and Related Concepts\\/01_01-Module Overview.mp48.50MB
01. Risk and Related Concepts\\/01_02-The Security Cycle.mp45.90MB
01. Risk and Related Concepts\\/01_03-Control Types.mp419.83MB
01. Risk and Related Concepts\\/01_04-Incident Response.mp411.78MB
01. Risk and Related Concepts\\/01_05-False Positives False Negatives and Security Policies.mp421.53MB
01. Risk and Related Concepts\\/01_06-Risk Calculation.mp419.56MB
01. Risk and Related Concepts\\/01_07-MTTF MTTR and MTBF.mp47.27MB
01. Risk and Related Concepts\\/01_08-Threat Vectors Vulnerabilities and naging Risk.mp411.80MB
01. Risk and Related Concepts\\/01_09-Risk oidance and Risks Associated With Cloud Computing.mp49.47MB
01. Risk and Related Concepts\\/01_10-RPO and RTO.mp411.65MB
02. Risks Associated With 3rd Party Integration\\/02_01-Course Overview and Onboarding Process.mp46.74MB
02. Risks Associated With 3rd Party Integration\\/02_02-3rd Party Integration.mp44.26MB
02. Risks Associated With 3rd Party Integration\\/02_03-OffBoarding Process.mp42.31MB
02. Risks Associated With 3rd Party Integration\\/02_04-Social Media Networks and Applications.mp44.04MB
02. Risks Associated With 3rd Party Integration\\/02_05-SLA.mp43.92MB
02. Risks Associated With 3rd Party Integration\\/02_06-BPA.mp41.09MB
02. Risks Associated With 3rd Party Integration\\/02_07-MOU and ISA.mp46.39MB
02. Risks Associated With 3rd Party Integration\\/02_08-Privacy Considerations and Data Ownership.mp47.24MB
02. Risks Associated With 3rd Party Integration\\/02_09-Data Backups.mp42.27MB
02. Risks Associated With 3rd Party Integration\\/02_10-Security Policies and Procedures.mp43.40MB
02. Risks Associated With 3rd Party Integration\\/02_11-Review Agreements and Verify Compliance.mp44.42MB
03. Risk Mitigation Strategies\\/03_01-Module Overview.mp41.92MB
03. Risk Mitigation Strategies\\/03_02-Change nagement.mp418.40MB
03. Risk Mitigation Strategies\\/03_03-Incident nagement.mp44.87MB
03. Risk Mitigation Strategies\\/03_04-User Rights and Permissions Review.mp46.72MB
03. Risk Mitigation Strategies\\/03_05-Perform Routine Audits.mp42.14MB
03. Risk Mitigation Strategies\\/03_06-Preventing Data Loss or Theft.mp43.43MB
03. Risk Mitigation Strategies\\/03_07-Attack Vectors.mp42.77MB
03. Risk Mitigation Strategies\\/03_08-Enforce Technology Controls.mp46.07MB
03. Risk Mitigation Strategies\\/03_09-Module Review.mp41.42MB
04. Implementing Basic Forensic Procedures\\/04_01-Module Overview.mp42.67MB
04. Implementing Basic Forensic Procedures\\/04_02-What Is Computer Forensics.mp45.45MB
04. Implementing Basic Forensic Procedures\\/04_03-Order of Volatility.mp411.85MB
04. Implementing Basic Forensic Procedures\\/04_04-First Responder Best Practices.mp410.93MB
04. Implementing Basic Forensic Procedures\\/04_05-Capture a System Ige.mp49.13MB
04. Implementing Basic Forensic Procedures\\/04_06-Network Traffic and Logs.mp49.62MB
04. Implementing Basic Forensic Procedures\\/04_07-Capture Video.mp41.99MB
04. Implementing Basic Forensic Procedures\\/04_08-Record Time Offset.mp46.01MB
04. Implementing Basic Forensic Procedures\\/04_09-Take Hashes.mp412.97MB
04. Implementing Basic Forensic Procedures\\/04_10-Screenshots.mp42.84MB
04. Implementing Basic Forensic Procedures\\/04_11-Witnesses.mp44.50MB
04. Implementing Basic Forensic Procedures\\/04_12-Track n Hours and Expense.mp46.58MB
04. Implementing Basic Forensic Procedures\\/04_13-Chain of Custody.mp47.47MB
04. Implementing Basic Forensic Procedures\\/04_14-Big Data Analysis.mp48.25MB
04. Implementing Basic Forensic Procedures\\/04_15-Module Review.mp42.57MB
05. Incident Response Concepts\\/05_01-Module Overview.mp43.56MB
05. Incident Response Concepts\\/05_02-Incident Preparation.mp417.36MB
05. Incident Response Concepts\\/05_03-Incident Identification.mp44.26MB
05. Incident Response Concepts\\/05_05-Incident Notification and Escalation.mp49.43MB
05. Incident Response Concepts\\/05_06-Incident Mitigation and Isolation.mp47.67MB
05. Incident Response Concepts\\/05_07-Lessons Learned.mp43.37MB
05. Incident Response Concepts\\/05_08-Incident Reporting.mp47.41MB
05. Incident Response Concepts\\/05_09-Recovery and Reconstitution Procedures.mp42.51MB
05. Incident Response Concepts\\/05_10-First Responder.mp43.21MB
05. Incident Response Concepts\\/05_11-Incident Isolation.mp47.34MB
05. Incident Response Concepts\\/05_12-Data Breach.mp49.01MB
05. Incident Response Concepts\\/05_13-Dage and Loss Control.mp45.02MB
05. Incident Response Concepts\\/05_14-Module Review.mp41.76MB
06. Security Related Awareness and Training\\/06_01-Module Overview.mp42.33MB
06. Security Related Awareness and Training\\/06_02-Security Policy Training and Procedures.mp46.22MB
06. Security Related Awareness and Training\\/06_03-Validate Compliance and Security Posture.mp42.08MB
06. Security Related Awareness and Training\\/06_04-Role ba<x>sed Training.mp42.54MB
06. Security Related Awareness and Training\\/06_05-Personally Identifiable Infortion.mp43.16MB
06. Security Related Awareness and Training\\/06_06-Infortion Classification.mp44.05MB
06. Security Related Awareness and Training\\/06_07-Data Labeling Handling and Disposal.mp47.78MB
06. Security Related Awareness and Training\\/06_08-Compliance.mp48.46MB
06. Security Related Awareness and Training\\/06_09-User Habits.mp417.18MB
06. Security Related Awareness and Training\\/06_10-New Threats Security Trends and Alerts.mp46.22MB
06. Security Related Awareness and Training\\/06_11-Use of Social Networking and P2P.mp46.12MB
06. Security Related Awareness and Training\\/06_12-Module Review.mp43.04MB
07. Physical and Environmental Controls\\/07_01-Module Overview.mp42.62MB
07. Physical and Environmental Controls\\/07_02-Environmental Factors.mp43.12MB
07. Physical and Environmental Controls\\/07_03-HVAC.mp45.45MB
07. Physical and Environmental Controls\\/07_04-Fire Suppression.mp48.37MB
07. Physical and Environmental Controls\\/07_05-EMI Shielding.mp45.83MB
07. Physical and Environmental Controls\\/07_06-Hot and Cold Aisles.mp46.74MB
07. Physical and Environmental Controls\\/07_07-Environmental Monitoring.mp43.97MB
07. Physical and Environmental Controls\\/07_08-Temperature and Humidity Controls.mp43.87MB
07. Physical and Environmental Controls\\/07_09-Physical Security Locks ntraps and Video Surveillance.mp48.55MB
07. Physical and Environmental Controls\\/07_10-Fencing.mp45.45MB
07. Physical and Environmental Controls\\/07_11-Proximity Readers and Access Lists.mp45.97MB
07. Physical and Environmental Controls\\/07_12-Proper Lighting and Signs.mp45.63MB
07. Physical and Environmental Controls\\/07_13-Barricades.mp42.18MB
07. Physical and Environmental Controls\\/07_14-Biometrics.mp41.98MB
07. Physical and Environmental Controls\\/07_15-Protected Distribution Systems.mp410.88MB
07. Physical and Environmental Controls\\/07_16-Alarms and Motion Detection.mp44.60MB
07. Physical and Environmental Controls\\/07_17-Control Types.mp49.46MB
08. Risk nagement Best Practices\\/08_01-Module Overview.mp42.87MB
08. Risk nagement Best Practices\\/08_02-Business Continuity Concepts.mp45.27MB
08. Risk nagement Best Practices\\/08_03-Business Impact Analysis.mp47.31MB
08. Risk nagement Best Practices\\/08_04-Identification of Critical Systems and Components.mp43.17MB
08. Risk nagement Best Practices\\/08_05-Removing Single Points of Failure.mp43.59MB
08. Risk nagement Best Practices\\/08_06-Business Continuity Planning and Testing.mp46.79MB
08. Risk nagement Best Practices\\/08_07-Risk Assesent and Continuity of Operations.mp46.03MB
08. Risk nagement Best Practices\\/08_08-Disaster Recovery Planning.mp48.49MB
08. Risk nagement Best Practices\\/08_09-IT Contingency Planning.mp45.48MB
08. Risk nagement Best Practices\\/08_10-Succession Planning.mp42.92MB
08. Risk nagement Best Practices\\/08_11-High ailability.mp47.80MB
08. Risk nagement Best Practices\\/08_12-Redundancy.mp48.42MB
08. Risk nagement Best Practices\\/08_13-Table Exercises.mp46.81MB
08. Risk nagement Best Practices\\/08_14-Fault Tolerance.mp44.18MB
08. Risk nagement Best Practices\\/08_15-RAID.mp411.29MB
08. Risk nagement Best Practices\\/08_16-Clustering.mp43.82MB
08. Risk nagement Best Practices\\/08_17-Load Balancing.mp43.61MB
08. Risk nagement Best Practices\\/08_18-Servers.mp41.66MB
08. Risk nagement Best Practices\\/08_19-Backup Plans Execution and Frequency.mp47.79MB
08. Risk nagement Best Practices\\/08_20-Hot Warm and Cold Sites.mp411.94MB
09. Appropriate Controls to Meet Security Goals\\/09_01-Module Overview.mp44.31MB
09. Appropriate Controls to Meet Security Goals\\/09_02-Encryption.mp46.74MB
09. Appropriate Controls to Meet Security Goals\\/09_03-Access Controls.mp41.72MB
09. Appropriate Controls to Meet Security Goals\\/09_04-Steganography.mp418.24MB
09. Appropriate Controls to Meet Security Goals\\/09_05-Digital Signatures.mp45.51MB
09. Appropriate Controls to Meet Security Goals\\/09_06-Certificates.mp47.35MB
09. Appropriate Controls to Meet Security Goals\\/09_07-ailability Redundancy Fault Tolerance and Patching.mp47.36MB
09. Appropriate Controls to Meet Security Goals\\/09_08-Safety.mp43.90MB
09. Appropriate Controls to Meet Security Goals\\/09_09-Lighting.mp42.33MB
09. Appropriate Controls to Meet Security Goals\\/09_10-Locks.mp41.30MB
09. Appropriate Controls to Meet Security Goals\\/09_11-CCTV.mp41.87MB
09. Appropriate Controls to Meet Security Goals\\/09_12-Escape Plans Escape Routes and Drills.mp44.41MB
09. Appropriate Controls to Meet Security Goals\\/09_13-Testing Controls.mp43.12MB
Exercise Files\\/comptiasecurityplussy0401complianceoperationalsecurity.zip29.13MB
- CreateTime2022-02-27
- UpdateTime2022-03-03
- FileTotalCount121
- TotalSize1.54GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.DDB-181 2.DDT-269 3.KISD-052 4.BBI-091 5.EMBM-002 6.ISSD-025 7.HITMA-113 8.BID-011 9.KDO-02 10.PDV-066 11.BKD-23 12.PAFL-004 13.KIBD-076 14.IESP-448 15.GUR-003 16.ONSD-463 17.WIX-02 18.QXL-92 19.HMJM-006 20.UPSM-152 21.MIBD-548 22.RKI-219 23.ONSD-458 24.SOE-625 25.ONSD-549 26.ONSD-080 27.PBD-154 28.GG-106 29.COSQ-026 30.WANZ-062 31.CBD-020 32.CRZ-306 33.TZD-003 34.DAD-045 35.ADZ-204 36.HAPT-106 37.ATAD-072 38.MMT-009 39.PBD-152 40.ONSD-732 41.SMA-599 42.IBW-059 43.TIA-206 44.OPBD-070 45.ID-19035 46.TMRD-461 47.DV-1458 48.SCF-041 49.XV-671 50.NAMA-006 51.ERDV-136 52.GAS-149 53.ARMG-240 54.SBB-057 55.AOFR-008 56.TMEM-043 57.HTDR-006 58.ONSD-101 59.SD-609 60.GODR-174 61.TOSP-005 62.VNDS-2490 63.HUNT-578 64.MDL-297 65.EMAC-013 66.TDMJ-100 67.BWSD-056 68.IBW-214 69.JUMP-2180 70.D-795 71.154 72.751 73.071 74.03 75.17 76.376 77.036 78.571 79.388 80.037 81.593 82.915 83.002 84.184 85.007 86.23 87.448 88.51 89.06 90.906 91.014 92.23 93.85 94.017 95.463 96.146 97.367 98.061 99.493 100.613 101.135 102.445 103.055 104.411 105.091 106.084 107.109 108.001 109.010 110.56 111.014 112.582 113.0 114.001 115.524 116.401 117.003 118.008 119.051 120.52 121.040 122.005 123.22 124.002 125.003 126.002 127.046 128.82 129.280 130.005 131.160 132.116 133.250 134.074 135.801 136.037 137.005 138.059 139.009 140.752