| 28 - Conclusion/001 Conclusion.mp4 |
280.69MB |
| 01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf |
1.43MB |
| 01 - Introduction/001 Download the Study Guide.html |
222B |
| 01 - Introduction/001 Security-701-Study-Plan.pdf |
132.41KB |
| 01 - Introduction/002 Exam Tips.mp4 |
157.64MB |
| 01 - Introduction/002 Exam Tips_en.srt |
17.04KB |
| 01 - Introduction/004 Checkpoint Introduction.html |
33.94KB |
| 02 - Fundamentals of Security/001 Fundamentals of Security.mp4 |
194.63MB |
| 02 - Fundamentals of Security/001 Fundamentals of Security_en.srt |
19.58KB |
| 02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4 |
52.59MB |
| 02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt |
12.4KB |
| 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4 |
42.45MB |
| 02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt |
12.83KB |
| 02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4 |
52.4MB |
| 02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt |
13.01KB |
| 02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4 |
51.72MB |
| 02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt |
13.84KB |
| 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4 |
54.76MB |
| 02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt |
11.25KB |
| 02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4 |
60.52MB |
| 02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt |
15KB |
| 02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4 |
28.56MB |
| 02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt |
7.88KB |
| 02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4 |
30.72MB |
| 02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt |
8.88KB |
| 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4 |
46.66MB |
| 02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt |
10.82KB |
| 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4 |
43.59MB |
| 02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt |
12.04KB |
| 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4 |
48.69MB |
| 02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt |
11.82KB |
| 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4 |
68.64MB |
| 02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt |
16.63KB |
| 02 - Fundamentals of Security/014 Checkpoint Fundamentals of Security.html |
52.69KB |
| 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4 |
86.65MB |
| 03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt |
9.11KB |
| 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4 |
53.98MB |
| 03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt |
16.01KB |
| 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4 |
32.95MB |
| 03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt |
8.97KB |
| 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4 |
25.91MB |
| 03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt |
6.33KB |
| 03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4 |
32.31MB |
| 03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt |
8.01KB |
| 03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4 |
57.14MB |
| 03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt |
8.5KB |
| 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4 |
85.8MB |
| 03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt |
13.5KB |
| 03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4 |
77.01MB |
| 03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt |
11.78KB |
| 03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4 |
66.36MB |
| 03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt |
9.98KB |
| 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4 |
100.13MB |
| 03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt |
17.76KB |
| 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4 |
79.58MB |
| 03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt |
19.86KB |
| 03 - Threat Actors/012 Checkpoint Threat Actors.html |
43.34KB |
| 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4 |
79MB |
| 04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt |
8.6KB |
| 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4 |
63.14MB |
| 04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt |
14.29KB |
| 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4 |
60.82MB |
| 04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt |
12.67KB |
| 04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4 |
52.33MB |
| 04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt |
16.07KB |
| 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4 |
47.67MB |
| 04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt |
10.36KB |
| 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4 |
66.37MB |
| 04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt |
17.73KB |
| 04 - Physical Security/007 Door Locks (OBJ 1.2).mp4 |
135.19MB |
| 04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt |
29.99KB |
| 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4 |
72.51MB |
| 04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt |
19.11KB |
| 04 - Physical Security/009 Checkpoint Physical Security.html |
46.27KB |
| 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4 |
90.03MB |
| 05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt |
8.62KB |
| 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4 |
120.29MB |
| 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt |
22.18KB |
| 05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4 |
61.99MB |
| 05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt |
15.01KB |
| 05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4 |
72.87MB |
| 05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt |
10.27KB |
| 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4 |
75.09MB |
| 05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt |
16.4KB |
| 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4 |
66.67MB |
| 05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt |
17.32KB |
| 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4 |
44.53MB |
| 05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt |
11.22KB |
| 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4 |
63.07MB |
| 05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt |
11.81KB |
| 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4 |
48.54MB |
| 05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt |
10.82KB |
| 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4 |
78.42MB |
| 05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt |
19.13KB |
| 05 - Social Engineering/011 Checkpoint Social Engineering.html |
42.72KB |
| 06 - Malware/001 Malware (OBJ 2.4).mp4 |
186.24MB |
| 06 - Malware/001 Malware (OBJ 2.4)_en.srt |
19.28KB |
| 06 - Malware/002 Viruses (OBJ 2.4).mp4 |
59.87MB |
| 06 - Malware/002 Viruses (OBJ 2.4)_en.srt |
17.42KB |
| 06 - Malware/003 Worms (OBJ 2.4).mp4 |
26.08MB |
| 06 - Malware/003 Worms (OBJ 2.4)_en.srt |
7.44KB |
| 06 - Malware/004 Trojans (OBJ 2.4).mp4 |
29.76MB |
| 06 - Malware/004 Trojans (OBJ 2.4)_en.srt |
8.62KB |
| 06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4 |
87.03MB |
| 06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt |
16.52KB |
| 06 - Malware/006 Ransomware (OBJ 2.4).mp4 |
97.19MB |
| 06 - Malware/006 Ransomware (OBJ 2.4)_en.srt |
18.23KB |
| 06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4 |
53.18MB |
| 06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt |
11.4KB |
| 06 - Malware/008 Rootkits (OBJ 2.4).mp4 |
46.88MB |
| 06 - Malware/008 Rootkits (OBJ 2.4)_en.srt |
12.04KB |
| 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4 |
59.77MB |
| 06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt |
13.13KB |
| 06 - Malware/010 Keylogger (OBJ 2.4).mp4 |
56.53MB |
| 06 - Malware/010 Keylogger (OBJ 2.4)_en.srt |
11.89KB |
| 06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4 |
39.32MB |
| 06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt |
11.32KB |
| 06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4 |
41.69MB |
| 06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt |
11.21KB |
| 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4 |
70.5MB |
| 06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt |
12.4KB |
| 06 - Malware/014 Checkpoint Malware.html |
43.12KB |
| 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4 |
70.49MB |
| 07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt |
7.15KB |
| 07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4 |
56.71MB |
| 07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt |
15.68KB |
| 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4 |
47.57MB |
| 07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt |
10.11KB |
| 07 - Data Protection/004 Data States (OBJ 3.3).mp4 |
32.55MB |
| 07 - Data Protection/004 Data States (OBJ 3.3)_en.srt |
9.45KB |
| 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4 |
36.05MB |
| 07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt |
8.24KB |
| 07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4 |
22.06MB |
| 07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt |
5.53KB |
| 07 - Data Protection/007 Securing Data (OBJ 3.3).mp4 |
22.29MB |
| 07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt |
7.07KB |
| 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4 |
47.25MB |
| 07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt |
7.81KB |
| 07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4 |
78.47MB |
| 07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt |
36.66KB |
| 07 - Data Protection/010 Checkpoint Data Protection.html |
49.18KB |
| 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 |
257.17MB |
| 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt |
26.12KB |
| 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4 |
73.87MB |
| 08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt |
17.75KB |
| 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4 |
43.26MB |
| 08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt |
12.02KB |
| 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4 |
41.47MB |
| 08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt |
16.03KB |
| 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4 |
88.46MB |
| 08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt |
20.64KB |
| 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4 |
57.24MB |
| 08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt |
17.54KB |
| 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4 |
39.39MB |
| 08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt |
12.42KB |
| 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4 |
108.4MB |
| 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt |
29.31KB |
| 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4 |
23.78MB |
| 08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt |
6.74KB |
| 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4 |
39.4MB |
| 08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt |
12.14KB |
| 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4 |
47.46MB |
| 08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt |
12.09KB |
| 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4 |
80.74MB |
| 08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt |
19.48KB |
| 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4 |
101.52MB |
| 08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt |
33.61KB |
| 08 - Cryptographic Solutions/014 Checkpoint Cryptographic Solutions.html |
45.5KB |
| 09 - Risk Management/001 Risk Management (OBJ 5.2).mp4 |
100.84MB |
| 09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt |
8.99KB |
| 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4 |
21.29MB |
| 09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt |
6.51KB |
| 09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4 |
42.73MB |
| 09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt |
10.8KB |
| 09 - Risk Management/004 Risk Register (OBJ 5.2).mp4 |
61.82MB |
| 09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt |
14.46KB |
| 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4 |
36.89MB |
| 09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt |
6.74KB |
| 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4 |
21.24MB |
| 09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt |
8.42KB |
| 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4 |
46.72MB |
| 09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt |
11.45KB |
| 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4 |
28.85MB |
| 09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt |
7.24KB |
| 09 - Risk Management/009 Checkpoint Risk Management.html |
47.63KB |
| 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4 |
67.14MB |
| 10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt |
6.88KB |
| 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4 |
44.43MB |
| 10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt |
9.73KB |
| 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4 |
76.66MB |
| 10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt |
14.28KB |
| 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4 |
50.83MB |
| 10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt |
11.43KB |
| 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4 |
52.17MB |
| 10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt |
12.3KB |
| 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4 |
54.44MB |
| 10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt |
11.65KB |
| 10 - Third-party Vendor Risks/007 Checkpoint Third-party Vendor Risks.html |
45.96KB |
| 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4 |
104.65MB |
| 11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt |
10.76KB |
| 11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4 |
38.77MB |
| 11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt |
8.73KB |
| 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4 |
26.96MB |
| 11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt |
6.51KB |
| 11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4 |
31.9MB |
| 11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt |
9.14KB |
| 11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4 |
33.8MB |
| 11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt |
8.02KB |
| 11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4 |
30.73MB |
| 11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt |
8.96KB |
| 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4 |
45.32MB |
| 11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt |
12.17KB |
| 11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4 |
47.04MB |
| 11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt |
10.24KB |
| 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4 |
54.02MB |
| 11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt |
6.95KB |
| 11 - Governance and Compliance/010 Checkpoint Governance and Compliance.html |
54.36KB |
| 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4 |
101.36MB |
| 12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt |
10.7KB |
| 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4 |
56.54MB |
| 12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt |
15.29KB |
| 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4 |
46.25MB |
| 12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt |
14.4KB |
| 12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4 |
57.29MB |
| 12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt |
15.07KB |
| 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4 |
65.41MB |
| 12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt |
20.4KB |
| 12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4 |
70.45MB |
| 12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt |
16.5KB |
| 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4 |
39.58MB |
| 12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt |
14.75KB |
| 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4 |
32.39MB |
| 12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt |
11.35KB |
| 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4 |
35.76MB |
| 12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt |
10.69KB |
| 12 - Asset and Change Management/010 Checkpoint Asset and Change Management.html |
50.21KB |
| 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4 |
103.15MB |
| 13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt |
9.41KB |
| 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4 |
58.03MB |
| 13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt |
15.02KB |
| 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4 |
36.59MB |
| 13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt |
8.78KB |
| 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4 |
52.34MB |
| 13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt |
14KB |
| 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4 |
34.07MB |
| 13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt |
9.23KB |
| 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4 |
50.89MB |
| 13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt |
11.87KB |
| 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4 |
51.14MB |
| 13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt |
13.27KB |
| 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4 |
154.02MB |
| 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt |
37.52KB |
| 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4 |
70.66MB |
| 13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt |
13.51KB |
| 13 - Audits and Assessments/010 Checkpoint Audits and Assessments.html |
45.91KB |
| 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4 |
69.94MB |
| 14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt |
7.32KB |
| 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4 |
60.8MB |
| 14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt |
20.1KB |
| 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4 |
42.86MB |
| 14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt |
19.48KB |
| 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4 |
25.65MB |
| 14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt |
7.26KB |
| 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4 |
86.8MB |
| 14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt |
19.03KB |
| 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4 |
81.33MB |
| 14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt |
24.37KB |
| 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4 |
65.07MB |
| 14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt |
24.83KB |
| 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4 |
76.02MB |
| 14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt |
22.28KB |
| 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4 |
108.93MB |
| 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt |
28.88KB |
| 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4 |
66.13MB |
| 14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt |
15.76KB |
| 14 - Cyber Resilience and Redundancy/011 Checkpoint Cyber Resilience and Redundancy.html |
44.89KB |
| 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4 |
86.47MB |
| 15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt |
8.73KB |
| 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4 |
102.32MB |
| 15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt |
19.39KB |
| 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4 |
48.3MB |
| 15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt |
10.98KB |
| 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4 |
82.03MB |
| 15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt |
19.38KB |
| 15 - Security Architecture/005 Serverless (OBJ 3.1).mp4 |
36.82MB |
| 15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt |
6.83KB |
| 15 - Security Architecture/006 Microservices (OBJ 3.1).mp4 |
40.35MB |
| 15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt |
7.45KB |
| 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4 |
38.48MB |
| 15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt |
6.19KB |
| 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4 |
32.75MB |
| 15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt |
5.37KB |
| 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4 |
33.97MB |
| 15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt |
7.83KB |
| 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4 |
33.77MB |
| 15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt |
7.58KB |
| 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4 |
57.27MB |
| 15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt |
9.24KB |
| 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4 |
32.5MB |
| 15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt |
7.54KB |
| 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4 |
41.99MB |
| 15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt |
9.5KB |
| 15 - Security Architecture/014 Checkpoint Security Architecture.html |
70.48KB |
| 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4 |
90.69MB |
| 16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt |
9.78KB |
| 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4 |
83.73MB |
| 16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt |
32.67KB |
| 16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4 |
75.13MB |
| 16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt |
28.75KB |
| 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4 |
105.65MB |
| 16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt |
28.15KB |
| 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4 |
37.22MB |
| 16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt |
13.01KB |
| 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4 |
88.94MB |
| 16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt |
22.07KB |
| 16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4 |
91.46MB |
| 16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt |
23.19KB |
| 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4 |
183.37MB |
| 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt |
44.39KB |
| 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4 |
65.55MB |
| 16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt |
16.45KB |
| 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4 |
96.37MB |
| 16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt |
24.89KB |
| 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4 |
63.18MB |
| 16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt |
19.45KB |
| 16 - Security Infrastructure/012 Checkpoint Security Infrastructure.html |
46.76KB |
| 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4 |
97.94MB |
| 17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt |
8.46KB |
| 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4 |
46.09MB |
| 17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt |
9.71KB |
| 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4 |
110.82MB |
| 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt |
29.85KB |
| 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4 |
123.3MB |
| 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt |
31.56KB |
| 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4 |
56.55MB |
| 17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt |
19.91KB |
| 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4 |
73.27MB |
| 17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt |
18.97KB |
| 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4 |
35.21MB |
| 17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt |
10.49KB |
| 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4 |
23.68MB |
| 17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt |
6.52KB |
| 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4 |
76.2MB |
| 17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt |
18.44KB |
| 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4 |
63.79MB |
| 17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt |
13.79KB |
| 17 - Identity and Access Management (IAM) Solutions/011 Checkpoint Identity and Access Management (IAM) Solutions.html |
44.99KB |
| 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 |
139.48MB |
| 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt |
14.35KB |
| 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4 |
51.12MB |
| 18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt |
14.62KB |
| 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 |
53.4MB |
| 18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt |
15.62KB |
| 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 |
44.89MB |
| 18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt |
11.55KB |
| 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4 |
37.91MB |
| 18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt |
10.37KB |
| 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4 |
48.51MB |
| 18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt |
10.92KB |
| 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4 |
100.65MB |
| 18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt |
29.51KB |
| 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4 |
76.46MB |
| 18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt |
14.83KB |
| 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 |
132.25MB |
| 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt |
35.2KB |
| 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4 |
43.5MB |
| 18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt |
14.71KB |
| 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4 |
57.73MB |
| 18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt |
14.12KB |
| 18 - Vulnerabilities and Attacks/012 Checkpoint Vulnerabilities and Attacks.html |
51.81KB |
| 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4 |
74.15MB |
| 19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt |
7.35KB |
| 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4 |
64.93MB |
| 19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt |
17.45KB |
| 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4 |
33.85MB |
| 19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt |
9.62KB |
| 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4 |
45.77MB |
| 19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt |
15.73KB |
| 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4 |
43.11MB |
| 19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt |
14KB |
| 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4 |
28.46MB |
| 19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt |
5.48KB |
| 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4 |
33.79MB |
| 19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt |
11.42KB |
| 19 - Malicious Activity/008 On-Path Attacks.mp4 |
31.91MB |
| 19 - Malicious Activity/008 On-Path Attacks_en.srt |
7.75KB |
| 19 - Malicious Activity/009 Injection Attacks.mp4 |
23.68MB |
| 19 - Malicious Activity/009 Injection Attacks_en.srt |
8.68KB |
| 19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4 |
52.53MB |
| 19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt |
14.45KB |
| 19 - Malicious Activity/011 Checkpoint Malicious Activity.html |
46.5KB |
| 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4 |
87.49MB |
| 20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt |
8.93KB |
| 20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4 |
46.62MB |
| 20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt |
10.97KB |
| 20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4 |
70.04MB |
| 20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt |
16.68KB |
| 20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4 |
55.63MB |
| 20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt |
10.81KB |
| 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4 |
45.51MB |
| 20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt |
11.56KB |
| 20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4 |
47.43MB |
| 20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt |
11.54KB |
| 20 - Hardening/007 Patch Management (OBJ 2.5).mp4 |
94.32MB |
| 20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt |
20.11KB |
| 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4 |
38.57MB |
| 20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt |
20.42KB |
| 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4 |
35.01MB |
| 20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt |
13.18KB |
| 20 - Hardening/010 Data Encryption Levels (2.5).mp4 |
32.67MB |
| 20 - Hardening/010 Data Encryption Levels (2.5)_en.srt |
10.53KB |
| 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4 |
56.31MB |
| 20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt |
11.39KB |
| 20 - Hardening/012 Checkpoint Hardening.html |
45.87KB |
| 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4 |
82.45MB |
| 21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt |
7.27KB |
| 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4 |
83.6MB |
| 21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt |
17.85KB |
| 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4 |
97.1MB |
| 21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt |
27.11KB |
| 21 - Security Techniques/004 Application Security (OBJ 4.1).mp4 |
83.77MB |
| 21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt |
24.88KB |
| 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4 |
43.37MB |
| 21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt |
12.46KB |
| 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4 |
62.07MB |
| 21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt |
13.97KB |
| 21 - Security Techniques/007 Email Security (OBJ 4.5).mp4 |
54.34MB |
| 21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt |
14.37KB |
| 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4 |
61.55MB |
| 21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt |
14.65KB |
| 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4 |
60.31MB |
| 21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt |
12.1KB |
| 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4 |
115.69MB |
| 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt |
27.67KB |
| 21 - Security Techniques/011 Checkpoint Security Techniques.html |
46.03KB |
| 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4 |
61.31MB |
| 22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt |
6.64KB |
| 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4 |
37.06MB |
| 22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt |
12.83KB |
| 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4 |
55.6MB |
| 22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt |
16.9KB |
| 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4 |
46.35MB |
| 22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt |
14.38KB |
| 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4 |
82.68MB |
| 22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt |
25.49KB |
| 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4 |
163.02MB |
| 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt |
71.07KB |
| 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4 |
89.55MB |
| 22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt |
27.65KB |
| 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4 |
57.83MB |
| 22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt |
14.09KB |
| 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4 |
34.13MB |
| 22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt |
13.86KB |
| 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4 |
78.81MB |
| 22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt |
22.77KB |
| 22 - Vulnerability Management/011 Checkpoint Vulnerability Management.html |
53.56KB |
| 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4 |
119.8MB |
| 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt |
12.82KB |
| 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4 |
43.31MB |
| 23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt |
10.93KB |
| 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4 |
105.86MB |
| 23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt |
28.19KB |
| 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4 |
34.53MB |
| 23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt |
14.44KB |
| 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4 |
78.22MB |
| 23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt |
26.13KB |
| 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4 |
33.47MB |
| 23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt |
12.15KB |
| 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4 |
66.49MB |
| 23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt |
21.64KB |
| 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4 |
49MB |
| 23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt |
15.65KB |
| 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4 |
41.18MB |
| 23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt |
13.42KB |
| 23 - Alerting and Monitoring/010 Checkpoint Alerting and Monitoring.html |
47.87KB |
| 24 - Incident Response/001 Incident Response (OBJ 4.8).mp4 |
65.63MB |
| 24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt |
5.97KB |
| 24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4 |
93.48MB |
| 24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt |
23.08KB |
| 24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4 |
51.63MB |
| 24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt |
15.28KB |
| 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4 |
65.22MB |
| 24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt |
16.03KB |
| 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4 |
52.58MB |
| 24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt |
19.51KB |
| 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4 |
134.1MB |
| 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt |
27.02KB |
| 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4 |
54.22MB |
| 24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt |
19.04KB |
| 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4 |
101.84MB |
| 24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt |
17.23KB |
| 24 - Incident Response/009 Checkpoint Incident Response.html |
44.72KB |
| 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4 |
72.12MB |
| 25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt |
7.72KB |
| 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4 |
100.51MB |
| 25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt |
27.87KB |
| 25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4 |
34.38MB |
| 25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt |
9.21KB |
| 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4 |
48.49MB |
| 25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt |
15.1KB |
| 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4 |
78.49MB |
| 25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt |
25.09KB |
| 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4 |
85.47MB |
| 25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt |
19.24KB |
| 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4 |
35.45MB |
| 25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt |
12.14KB |
| 25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4 |
27.53MB |
| 25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt |
8.04KB |
| 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4 |
28.61MB |
| 25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt |
8.27KB |
| 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4 |
25.74MB |
| 25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt |
8.26KB |
| 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4 |
52.02MB |
| 25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt |
12.65KB |
| 25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4 |
40.71MB |
| 25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt |
11.04KB |
| 25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4 |
29.83MB |
| 25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt |
10.37KB |
| 25 - Investigating an Incident/014 Checkpoint Investigating an Incident.html |
65.61KB |
| 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4 |
140.75MB |
| 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt |
14.38KB |
| 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4 |
79.48MB |
| 26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt |
20.59KB |
| 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4 |
59.67MB |
| 26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt |
16.14KB |
| 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4 |
54.08MB |
| 26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt |
13.8KB |
| 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4 |
61.14MB |
| 26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt |
15.14KB |
| 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4 |
32.41MB |
| 26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt |
9.76KB |
| 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4 |
75.49MB |
| 26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt |
19.19KB |
| 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4 |
102.31MB |
| 26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt |
26.6KB |
| 26 - Automation and Orchestration/009 Checkpoint Automation and Orchestration.html |
50.94KB |
| 27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4 |
79.83MB |
| 27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt |
8.97KB |
| 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4 |
79.48MB |
| 27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt |
17.65KB |
| 27 - Security Awareness/003 Password Management (OBJ 5.6).mp4 |
79.81MB |
| 27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt |
22.47KB |
| 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4 |
73.84MB |
| 27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt |
18.54KB |
| 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4 |
72.47MB |
| 27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt |
17.52KB |
| 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4 |
61.02MB |
| 27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt |
16.75KB |
| 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4 |
34.88MB |
| 27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt |
11.75KB |
| 27 - Security Awareness/008 Checkpoint Security Awareness.html |
50.81KB |
| 01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf |
186.6KB |
| 28 - Conclusion/001 Conclusion_en.srt |
30.04KB |
| 28 - Conclusion/002 BONUS Where do I go from here.mp4 |
62.59MB |
| 28 - Conclusion/002 BONUS Where do I go from here_en.srt |
7.69KB |
| 29 - Practice Exam/Exams/Messer J. Professor Messer's SY0-701 CompTIA Security + Practice Exams 2024.pdf |
3.07MB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/000 CompTIA Security+ (SY0-701) #0.html |
462.34KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/001 CompTIA Security+ (SYO-701) #1.html |
510.68KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/002 CompTIA Security+ (SYO-701) #2.html |
503.12KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/003 CompTIA Security+ (SYO-701) #3.html |
494.77KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/004 CompTIA Security+ (SYO-701) #4.html |
495.87KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/005 CompTIA Security+ (SYO-701) #5.html |
501.31KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/006 CompTIA Security+ (SYO-701) #6.html |
510.03KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/001 CompTIA Security+ (SYO-701) #1.html |
539.02KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/002 CompTIA Security+ (SYO-701) #2.html |
486.67KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/003 CompTIA Security+ (SYO-701) #3.html |
514.1KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/004 CompTIA Security+ (SYO-701) #4.html |
521.61KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/005 CompTIA Security+ (SYO-701) #5.html |
506.06KB |
| 29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/006 CompTIA Security+ (SYO-701) #6.html |
500.18KB |