filePluralsight - CompTIA Security Plus SY0-401 Compliance And Operational Security

Pluralsight CompTIA Security Plus SY0 Compliance And Operational Security
  • MP401. Risk and Related Concepts\\/01_01-Module Overview.mp48.50MB
  • MP401. Risk and Related Concepts\\/01_02-The Security Cycle.mp45.90MB
  • MP401. Risk and Related Concepts\\/01_03-Control Types.mp419.83MB
  • MP401. Risk and Related Concepts\\/01_04-Incident Response.mp411.78MB
  • MP401. Risk and Related Concepts\\/01_05-False Positives False Negatives and Security Policies.mp421.53MB
  • MP401. Risk and Related Concepts\\/01_06-Risk Calculation.mp419.56MB
  • MP401. Risk and Related Concepts\\/01_07-MTTF MTTR and MTBF.mp47.27MB
  • MP401. Risk and Related Concepts\\/01_08-Threat Vectors Vulnerabilities and naging Risk.mp411.80MB
  • MP401. Risk and Related Concepts\\/01_09-Risk oidance and Risks Associated With Cloud Computing.mp49.47MB
  • MP401. Risk and Related Concepts\\/01_10-RPO and RTO.mp411.65MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_01-Course Overview and Onboarding Process.mp46.74MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_02-3rd Party Integration.mp44.26MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_03-OffBoarding Process.mp42.31MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_04-Social Media Networks and Applications.mp44.04MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_05-SLA.mp43.92MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_06-BPA.mp41.09MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_07-MOU and ISA.mp46.39MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_08-Privacy Considerations and Data Ownership.mp47.24MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_09-Data Backups.mp42.27MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_10-Security Policies and Procedures.mp43.40MB
  • MP402. Risks Associated With 3rd Party Integration\\/02_11-Review Agreements and Verify Compliance.mp44.42MB
  • MP403. Risk Mitigation Strategies\\/03_01-Module Overview.mp41.92MB
  • MP403. Risk Mitigation Strategies\\/03_02-Change nagement.mp418.40MB
  • MP403. Risk Mitigation Strategies\\/03_03-Incident nagement.mp44.87MB
  • MP403. Risk Mitigation Strategies\\/03_04-User Rights and Permissions Review.mp46.72MB
  • MP403. Risk Mitigation Strategies\\/03_05-Perform Routine Audits.mp42.14MB
  • MP403. Risk Mitigation Strategies\\/03_06-Preventing Data Loss or Theft.mp43.43MB
  • MP403. Risk Mitigation Strategies\\/03_07-Attack Vectors.mp42.77MB
  • MP403. Risk Mitigation Strategies\\/03_08-Enforce Technology Controls.mp46.07MB
  • MP403. Risk Mitigation Strategies\\/03_09-Module Review.mp41.42MB
  • MP404. Implementing Basic Forensic Procedures\\/04_01-Module Overview.mp42.67MB
  • MP404. Implementing Basic Forensic Procedures\\/04_02-What Is Computer Forensics.mp45.45MB
  • MP404. Implementing Basic Forensic Procedures\\/04_03-Order of Volatility.mp411.85MB
  • MP404. Implementing Basic Forensic Procedures\\/04_04-First Responder Best Practices.mp410.93MB
  • MP404. Implementing Basic Forensic Procedures\\/04_05-Capture a System Ige.mp49.13MB
  • MP404. Implementing Basic Forensic Procedures\\/04_06-Network Traffic and Logs.mp49.62MB
  • MP404. Implementing Basic Forensic Procedures\\/04_07-Capture Video.mp41.99MB
  • MP404. Implementing Basic Forensic Procedures\\/04_08-Record Time Offset.mp46.01MB
  • MP404. Implementing Basic Forensic Procedures\\/04_09-Take Hashes.mp412.97MB
  • MP404. Implementing Basic Forensic Procedures\\/04_10-Screenshots.mp42.84MB
  • MP404. Implementing Basic Forensic Procedures\\/04_11-Witnesses.mp44.50MB
  • MP404. Implementing Basic Forensic Procedures\\/04_12-Track n Hours and Expense.mp46.58MB
  • MP404. Implementing Basic Forensic Procedures\\/04_13-Chain of Custody.mp47.47MB
  • MP404. Implementing Basic Forensic Procedures\\/04_14-Big Data Analysis.mp48.25MB
  • MP404. Implementing Basic Forensic Procedures\\/04_15-Module Review.mp42.57MB
  • MP405. Incident Response Concepts\\/05_01-Module Overview.mp43.56MB
  • MP405. Incident Response Concepts\\/05_02-Incident Preparation.mp417.36MB
  • MP405. Incident Response Concepts\\/05_03-Incident Identification.mp44.26MB
  • MP405. Incident Response Concepts\\/05_05-Incident Notification and Escalation.mp49.43MB
  • MP405. Incident Response Concepts\\/05_06-Incident Mitigation and Isolation.mp47.67MB
  • MP405. Incident Response Concepts\\/05_07-Lessons Learned.mp43.37MB
  • MP405. Incident Response Concepts\\/05_08-Incident Reporting.mp47.41MB
  • MP405. Incident Response Concepts\\/05_09-Recovery and Reconstitution Procedures.mp42.51MB
  • MP405. Incident Response Concepts\\/05_10-First Responder.mp43.21MB
  • MP405. Incident Response Concepts\\/05_11-Incident Isolation.mp47.34MB
  • MP405. Incident Response Concepts\\/05_12-Data Breach.mp49.01MB
  • MP405. Incident Response Concepts\\/05_13-Dage and Loss Control.mp45.02MB
  • MP405. Incident Response Concepts\\/05_14-Module Review.mp41.76MB
  • MP406. Security Related Awareness and Training\\/06_01-Module Overview.mp42.33MB
  • MP406. Security Related Awareness and Training\\/06_02-Security Policy Training and Procedures.mp46.22MB
  • MP406. Security Related Awareness and Training\\/06_03-Validate Compliance and Security Posture.mp42.08MB
  • MP406. Security Related Awareness and Training\\/06_04-Role ba<x>sed Training.mp42.54MB
  • MP406. Security Related Awareness and Training\\/06_05-Personally Identifiable Infortion.mp43.16MB
  • MP406. Security Related Awareness and Training\\/06_06-Infortion Classification.mp44.05MB
  • MP406. Security Related Awareness and Training\\/06_07-Data Labeling Handling and Disposal.mp47.78MB
  • MP406. Security Related Awareness and Training\\/06_08-Compliance.mp48.46MB
  • MP406. Security Related Awareness and Training\\/06_09-User Habits.mp417.18MB
  • MP406. Security Related Awareness and Training\\/06_10-New Threats Security Trends and Alerts.mp46.22MB
  • MP406. Security Related Awareness and Training\\/06_11-Use of Social Networking and P2P.mp46.12MB
  • MP406. Security Related Awareness and Training\\/06_12-Module Review.mp43.04MB
  • MP407. Physical and Environmental Controls\\/07_01-Module Overview.mp42.62MB
  • MP407. Physical and Environmental Controls\\/07_02-Environmental Factors.mp43.12MB
  • MP407. Physical and Environmental Controls\\/07_03-HVAC.mp45.45MB
  • MP407. Physical and Environmental Controls\\/07_04-Fire Suppression.mp48.37MB
  • MP407. Physical and Environmental Controls\\/07_05-EMI Shielding.mp45.83MB
  • MP407. Physical and Environmental Controls\\/07_06-Hot and Cold Aisles.mp46.74MB
  • MP407. Physical and Environmental Controls\\/07_07-Environmental Monitoring.mp43.97MB
  • MP407. Physical and Environmental Controls\\/07_08-Temperature and Humidity Controls.mp43.87MB
  • MP407. Physical and Environmental Controls\\/07_09-Physical Security Locks ntraps and Video Surveillance.mp48.55MB
  • MP407. Physical and Environmental Controls\\/07_10-Fencing.mp45.45MB
  • MP407. Physical and Environmental Controls\\/07_11-Proximity Readers and Access Lists.mp45.97MB
  • MP407. Physical and Environmental Controls\\/07_12-Proper Lighting and Signs.mp45.63MB
  • MP407. Physical and Environmental Controls\\/07_13-Barricades.mp42.18MB
  • MP407. Physical and Environmental Controls\\/07_14-Biometrics.mp41.98MB
  • MP407. Physical and Environmental Controls\\/07_15-Protected Distribution Systems.mp410.88MB
  • MP407. Physical and Environmental Controls\\/07_16-Alarms and Motion Detection.mp44.60MB
  • MP407. Physical and Environmental Controls\\/07_17-Control Types.mp49.46MB
  • MP408. Risk nagement Best Practices\\/08_01-Module Overview.mp42.87MB
  • MP408. Risk nagement Best Practices\\/08_02-Business Continuity Concepts.mp45.27MB
  • MP408. Risk nagement Best Practices\\/08_03-Business Impact Analysis.mp47.31MB
  • MP408. Risk nagement Best Practices\\/08_04-Identification of Critical Systems and Components.mp43.17MB
  • MP408. Risk nagement Best Practices\\/08_05-Removing Single Points of Failure.mp43.59MB
  • MP408. Risk nagement Best Practices\\/08_06-Business Continuity Planning and Testing.mp46.79MB
  • MP408. Risk nagement Best Practices\\/08_07-Risk Assesent and Continuity of Operations.mp46.03MB
  • MP408. Risk nagement Best Practices\\/08_08-Disaster Recovery Planning.mp48.49MB
  • MP408. Risk nagement Best Practices\\/08_09-IT Contingency Planning.mp45.48MB
  • MP408. Risk nagement Best Practices\\/08_10-Succession Planning.mp42.92MB
  • MP408. Risk nagement Best Practices\\/08_11-High ailability.mp47.80MB
  • MP408. Risk nagement Best Practices\\/08_12-Redundancy.mp48.42MB
  • MP408. Risk nagement Best Practices\\/08_13-Table Exercises.mp46.81MB
  • MP408. Risk nagement Best Practices\\/08_14-Fault Tolerance.mp44.18MB
  • MP408. Risk nagement Best Practices\\/08_15-RAID.mp411.29MB
  • MP408. Risk nagement Best Practices\\/08_16-Clustering.mp43.82MB
  • MP408. Risk nagement Best Practices\\/08_17-Load Balancing.mp43.61MB
  • MP408. Risk nagement Best Practices\\/08_18-Servers.mp41.66MB
  • MP408. Risk nagement Best Practices\\/08_19-Backup Plans Execution and Frequency.mp47.79MB
  • MP408. Risk nagement Best Practices\\/08_20-Hot Warm and Cold Sites.mp411.94MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_01-Module Overview.mp44.31MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_02-Encryption.mp46.74MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_03-Access Controls.mp41.72MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_04-Steganography.mp418.24MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_05-Digital Signatures.mp45.51MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_06-Certificates.mp47.35MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_07-ailability Redundancy Fault Tolerance and Patching.mp47.36MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_08-Safety.mp43.90MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_09-Lighting.mp42.33MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_10-Locks.mp41.30MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_11-CCTV.mp41.87MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_12-Escape Plans Escape Routes and Drills.mp44.41MB
  • MP409. Appropriate Controls to Meet Security Goals\\/09_13-Testing Controls.mp43.12MB
  • ZIPExercise Files\\/comptiasecurityplussy0401complianceoperationalsecurity.zip29.13MB
Latest Search: 1.DDB-181   2.DDT-269   3.KISD-052   4.BBI-091   5.EMBM-002   6.ISSD-025   7.HITMA-113   8.BID-011   9.KDO-02   10.PDV-066   11.BKD-23   12.PAFL-004   13.KIBD-076   14.IESP-448   15.GUR-003   16.ONSD-463   17.WIX-02   18.QXL-92   19.HMJM-006   20.UPSM-152   21.MIBD-548   22.RKI-219   23.ONSD-458   24.SOE-625   25.ONSD-549   26.ONSD-080   27.PBD-154   28.GG-106   29.COSQ-026   30.WANZ-062   31.CBD-020   32.CRZ-306   33.TZD-003   34.DAD-045   35.ADZ-204   36.HAPT-106   37.ATAD-072   38.MMT-009   39.PBD-152   40.ONSD-732   41.SMA-599   42.IBW-059   43.TIA-206   44.OPBD-070   45.ID-19035   46.TMRD-461   47.DV-1458   48.SCF-041   49.XV-671   50.NAMA-006   51.ERDV-136   52.GAS-149   53.ARMG-240   54.SBB-057   55.AOFR-008   56.TMEM-043   57.HTDR-006   58.ONSD-101   59.SD-609   60.GODR-174   61.TOSP-005   62.VNDS-2490   63.HUNT-578   64.MDL-297   65.EMAC-013   66.TDMJ-100   67.BWSD-056   68.IBW-214   69.JUMP-2180   70.D-795   71.154   72.751   73.071   74.03   75.17   76.376   77.036   78.571   79.388   80.037   81.593   82.915   83.002   84.184   85.007   86.23   87.448   88.51   89.06   90.906   91.014   92.23   93.85   94.017   95.463   96.146   97.367   98.061   99.493   100.613   101.135   102.445   103.055   104.411   105.091   106.084   107.109   108.001   109.010   110.56   111.014   112.582   113.0   114.001   115.524   116.401   117.003   118.008   119.051   120.52   121.040   122.005   123.22   124.002   125.003   126.002   127.046   128.82   129.280   130.005   131.160   132.116   133.250   134.074   135.801   136.037   137.005   138.059   139.009   140.752