Pluralsight - CompTIA Security Plus SY0-401 Compliance And Operational Security
File List
- Exercise Files/comptiasecurityplussy0401complianceoperationalsecurity.zip 29.1 MB
- 01. Risk and Related Concepts/01_05-False Positives, False Negatives, and Security Policies.mp4 21.5 MB
- 01. Risk and Related Concepts/01_03-Control Types.mp4 19.8 MB
- 01. Risk and Related Concepts/01_06-Risk Calculation.mp4 19.6 MB
- 03. Risk Mitigation Strategies/03_02-Change Management.mp4 18.4 MB
- 09. Appropriate Controls to Meet Security Goals/09_04-Steganography.mp4 18.2 MB
- 05. Incident Response Concepts/05_02-Incident Preparation.mp4 17.4 MB
- 06. Security Related Awareness and Training/06_09-User Habits.mp4 17.2 MB
- 04. Implementing Basic Forensic Procedures/04_09-Take Hashes.mp4 13.0 MB
- 08. Risk Management Best Practices/08_20-Hot, Warm, and Cold Sites.mp4 11.9 MB
- 04. Implementing Basic Forensic Procedures/04_03-Order of Volatility.mp4 11.8 MB
- 01. Risk and Related Concepts/01_08-Threat Vectors, Vulnerabilities, and Managing Risk.mp4 11.8 MB
- 01. Risk and Related Concepts/01_04-Incident Response.mp4 11.8 MB
- 01. Risk and Related Concepts/01_10-RPO and RTO.mp4 11.6 MB
- 08. Risk Management Best Practices/08_15-RAID.mp4 11.3 MB
- 04. Implementing Basic Forensic Procedures/04_04-First Responder Best Practices.mp4 10.9 MB
- 07. Physical and Environmental Controls/07_15-Protected Distribution Systems.mp4 10.9 MB
- 04. Implementing Basic Forensic Procedures/04_06-Network Traffic and Logs.mp4 9.6 MB
- 01. Risk and Related Concepts/01_09-Risk Avoidance and Risks Associated With Cloud Computing.mp4 9.5 MB
- 07. Physical and Environmental Controls/07_17-Control Types.mp4 9.5 MB
- 05. Incident Response Concepts/05_05-Incident Notification and Escalation.mp4 9.4 MB
- 04. Implementing Basic Forensic Procedures/04_05-Capture a System Image.mp4 9.1 MB
- 05. Incident Response Concepts/05_12-Data Breach.mp4 9.0 MB
- 07. Physical and Environmental Controls/07_09-Physical Security, Locks, Mantraps, and Video Surveillance.mp4 8.6 MB
- 01. Risk and Related Concepts/01_01-Module Overview.mp4 8.5 MB
- 08. Risk Management Best Practices/08_08-Disaster Recovery Planning.mp4 8.5 MB
- 06. Security Related Awareness and Training/06_08-Compliance.mp4 8.5 MB
- 08. Risk Management Best Practices/08_12-Redundancy.mp4 8.4 MB
- 07. Physical and Environmental Controls/07_04-Fire Suppression.mp4 8.4 MB
- 04. Implementing Basic Forensic Procedures/04_14-Big Data Analysis.mp4 8.3 MB
- 08. Risk Management Best Practices/08_11-High Availability.mp4 7.8 MB
- 08. Risk Management Best Practices/08_19-Backup Plans, Execution, and Frequency.mp4 7.8 MB
- 06. Security Related Awareness and Training/06_07-Data Labeling, Handling, and Disposal.mp4 7.8 MB
- 05. Incident Response Concepts/05_06-Incident Mitigation and Isolation.mp4 7.7 MB
- 04. Implementing Basic Forensic Procedures/04_13-Chain of Custody.mp4 7.5 MB
- 05. Incident Response Concepts/05_08-Incident Reporting.mp4 7.4 MB
- 09. Appropriate Controls to Meet Security Goals/09_07-Availability, Redundancy, Fault Tolerance, and Patching.mp4 7.4 MB
- 09. Appropriate Controls to Meet Security Goals/09_06-Certificates.mp4 7.3 MB
- 05. Incident Response Concepts/05_11-Incident Isolation.mp4 7.3 MB
- 08. Risk Management Best Practices/08_03-Business Impact Analysis.mp4 7.3 MB
- 01. Risk and Related Concepts/01_07-MTTF, MTTR, and MTBF.mp4 7.3 MB
- 02. Risks Associated With 3rd Party Integration/02_08-Privacy Considerations and Data Ownership.mp4 7.2 MB
- 08. Risk Management Best Practices/08_13-Tabletop Exercises.mp4 6.8 MB
- 08. Risk Management Best Practices/08_06-Business Continuity Planning and Testing.mp4 6.8 MB
- 02. Risks Associated With 3rd Party Integration/02_01-Course Overview and Onboarding Process.mp4 6.7 MB
- 07. Physical and Environmental Controls/07_06-Hot and Cold Aisles.mp4 6.7 MB
- 09. Appropriate Controls to Meet Security Goals/09_02-Encryption.mp4 6.7 MB
- 03. Risk Mitigation Strategies/03_04-User Rights and Permissions Review.mp4 6.7 MB
- 04. Implementing Basic Forensic Procedures/04_12-Track Man Hours and Expense.mp4 6.6 MB
- 02. Risks Associated With 3rd Party Integration/02_07-MOU and ISA.mp4 6.4 MB
- 06. Security Related Awareness and Training/06_02-Security Policy Training and Procedures.mp4 6.2 MB
- 06. Security Related Awareness and Training/06_10-New Threats, Security Trends, and Alerts.mp4 6.2 MB
- 06. Security Related Awareness and Training/06_11-Use of Social Networking and P2P.mp4 6.1 MB
- 03. Risk Mitigation Strategies/03_08-Enforce Technology Controls.mp4 6.1 MB
- 08. Risk Management Best Practices/08_07-Risk Assessment and Continuity of Operations.mp4 6.0 MB
- 04. Implementing Basic Forensic Procedures/04_08-Record Time Offset.mp4 6.0 MB
- 07. Physical and Environmental Controls/07_11-Proximity Readers and Access Lists.mp4 6.0 MB
- 01. Risk and Related Concepts/01_02-The Security Cycle.mp4 5.9 MB
- 07. Physical and Environmental Controls/07_05-EMI Shielding.mp4 5.8 MB
- 07. Physical and Environmental Controls/07_12-Proper Lighting and Signs.mp4 5.6 MB
- 09. Appropriate Controls to Meet Security Goals/09_05-Digital Signatures.mp4 5.5 MB
- 08. Risk Management Best Practices/08_09-IT Contingency Planning.mp4 5.5 MB
- 07. Physical and Environmental Controls/07_10-Fencing.mp4 5.5 MB
- 07. Physical and Environmental Controls/07_03-HVAC.mp4 5.4 MB
- 04. Implementing Basic Forensic Procedures/04_02-What Is Computer Forensics.mp4 5.4 MB
- 08. Risk Management Best Practices/08_02-Business Continuity Concepts.mp4 5.3 MB
- 05. Incident Response Concepts/05_13-Damage and Loss Control.mp4 5.0 MB
- 03. Risk Mitigation Strategies/03_03-Incident Management.mp4 4.9 MB
- 07. Physical and Environmental Controls/07_16-Alarms and Motion Detection.mp4 4.6 MB
- 04. Implementing Basic Forensic Procedures/04_11-Witnesses.mp4 4.5 MB
- 02. Risks Associated With 3rd Party Integration/02_11-Review Agreements and Verify Compliance.mp4 4.4 MB
- 09. Appropriate Controls to Meet Security Goals/09_12-Escape Plans, Escape Routes, and Drills.mp4 4.4 MB
- 09. Appropriate Controls to Meet Security Goals/09_01-Module Overview.mp4 4.3 MB
- 02. Risks Associated With 3rd Party Integration/02_02-3rd Party Integration.mp4 4.3 MB
- 05. Incident Response Concepts/05_03-Incident Identification.mp4 4.3 MB
- 08. Risk Management Best Practices/08_14-Fault Tolerance.mp4 4.2 MB
- 06. Security Related Awareness and Training/06_06-Information Classification.mp4 4.0 MB
- 02. Risks Associated With 3rd Party Integration/02_04-Social Media Networks and Applications.mp4 4.0 MB
- 07. Physical and Environmental Controls/07_07-Environmental Monitoring.mp4 4.0 MB
- 02. Risks Associated With 3rd Party Integration/02_05-SLA.mp4 3.9 MB
- 09. Appropriate Controls to Meet Security Goals/09_08-Safety.mp4 3.9 MB
- 07. Physical and Environmental Controls/07_08-Temperature and Humidity Controls.mp4 3.9 MB
- 08. Risk Management Best Practices/08_16-Clustering.mp4 3.8 MB
- 08. Risk Management Best Practices/08_17-Load Balancing.mp4 3.6 MB
- 08. Risk Management Best Practices/08_05-Removing Single Points of Failure.mp4 3.6 MB
- 05. Incident Response Concepts/05_01-Module Overview.mp4 3.6 MB
- 03. Risk Mitigation Strategies/03_06-Preventing Data Loss or Theft.mp4 3.4 MB
- 02. Risks Associated With 3rd Party Integration/02_10-Security Policies and Procedures.mp4 3.4 MB
- 05. Incident Response Concepts/05_07-Lessons Learned.mp4 3.4 MB
- 05. Incident Response Concepts/05_10-First Responder.mp4 3.2 MB
- 08. Risk Management Best Practices/08_04-Identification of Critical Systems and Components.mp4 3.2 MB
- 06. Security Related Awareness and Training/06_05-Personally Identifiable Information.mp4 3.2 MB
- 09. Appropriate Controls to Meet Security Goals/09_13-Testing Controls.mp4 3.1 MB
- 07. Physical and Environmental Controls/07_02-Environmental Factors.mp4 3.1 MB
- 06. Security Related Awareness and Training/06_12-Module Review.mp4 3.0 MB
- 08. Risk Management Best Practices/08_10-Succession Planning.mp4 2.9 MB
- 08. Risk Management Best Practices/08_01-Module Overview.mp4 2.9 MB
- 04. Implementing Basic Forensic Procedures/04_10-Screenshots.mp4 2.8 MB
- 03. Risk Mitigation Strategies/03_07-Attack Vectors.mp4 2.8 MB
- 04. Implementing Basic Forensic Procedures/04_01-Module Overview.mp4 2.7 MB
- 07. Physical and Environmental Controls/07_01-Module Overview.mp4 2.6 MB
- 04. Implementing Basic Forensic Procedures/04_15-Module Review.mp4 2.6 MB
- 06. Security Related Awareness and Training/06_04-Role Based Training.mp4 2.5 MB
- 05. Incident Response Concepts/05_09-Recovery and Reconstitution Procedures.mp4 2.5 MB
- 09. Appropriate Controls to Meet Security Goals/09_09-Lighting.mp4 2.3 MB
- 06. Security Related Awareness and Training/06_01-Module Overview.mp4 2.3 MB
- 02. Risks Associated With 3rd Party Integration/02_03-OffBoarding Process.mp4 2.3 MB
- 02. Risks Associated With 3rd Party Integration/02_09-Data Backups.mp4 2.3 MB
- 07. Physical and Environmental Controls/07_13-Barricades.mp4 2.2 MB
- 03. Risk Mitigation Strategies/03_05-Perform Routine Audits.mp4 2.1 MB
- 06. Security Related Awareness and Training/06_03-Validate Compliance and Security Posture.mp4 2.1 MB
- 04. Implementing Basic Forensic Procedures/04_07-Capture Video.mp4 2.0 MB
- 07. Physical and Environmental Controls/07_14-Biometrics.mp4 2.0 MB
- 03. Risk Mitigation Strategies/03_01-Module Overview.mp4 1.9 MB
- 09. Appropriate Controls to Meet Security Goals/09_11-CCTV.mp4 1.9 MB
- 05. Incident Response Concepts/05_14-Module Review.mp4 1.8 MB
- 09. Appropriate Controls to Meet Security Goals/09_03-Access Controls.mp4 1.7 MB
- 08. Risk Management Best Practices/08_18-Servers.mp4 1.7 MB
- 03. Risk Mitigation Strategies/03_09-Module Review.mp4 1.4 MB
- 09. Appropriate Controls to Meet Security Goals/09_10-Locks.mp4 1.3 MB
- 02. Risks Associated With 3rd Party Integration/02_06-BPA.mp4 1.1 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.