CompTIA Security+ (SY0-701) Complete Course & Exam

种子特征码 :
0d44873d10f5e092854f06d2e75446b23c5d63e3
发布日期 :
2025-10-24
文件大小 :
16.65GB
文件数量 :
569
在线播放
🧲 磁力网盘 🅿️ PikPak网盘
APP推荐
👺 91Porn   🧝‍♀️ 海角乱伦   🧜‍♀️ 91暗网  
文件列表
28 - Conclusion/001 Conclusion.mp4 280.69MB
01 - Introduction/001 CompTIA-Security-SY0-701-Study-Guide.pdf 1.43MB
01 - Introduction/001 Download the Study Guide.html 222B
01 - Introduction/001 Security-701-Study-Plan.pdf 132.41KB
01 - Introduction/002 Exam Tips.mp4 157.64MB
01 - Introduction/002 Exam Tips_en.srt 17.04KB
01 - Introduction/004 Checkpoint Introduction.html 33.94KB
02 - Fundamentals of Security/001 Fundamentals of Security.mp4 194.63MB
02 - Fundamentals of Security/001 Fundamentals of Security_en.srt 19.58KB
02 - Fundamentals of Security/002 Threats and Vulnerabilities.mp4 52.59MB
02 - Fundamentals of Security/002 Threats and Vulnerabilities_en.srt 12.4KB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2).mp4 42.45MB
02 - Fundamentals of Security/003 Confidentiality (OBJ 1.2)_en.srt 12.83KB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2).mp4 52.4MB
02 - Fundamentals of Security/004 Integrity (OBJ 1.2)_en.srt 13.01KB
02 - Fundamentals of Security/005 Availability (OBJ 1.2).mp4 51.72MB
02 - Fundamentals of Security/005 Availability (OBJ 1.2)_en.srt 13.84KB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2).mp4 54.76MB
02 - Fundamentals of Security/006 Non-repudiation (OBJ 1.2)_en.srt 11.25KB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2).mp4 60.52MB
02 - Fundamentals of Security/007 Authentication (OBJ 1.2)_en.srt 15KB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2).mp4 28.56MB
02 - Fundamentals of Security/008 Authorization (OBJ 1.2)_en.srt 7.88KB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2).mp4 30.72MB
02 - Fundamentals of Security/009 Accounting (OBJ 1.2)_en.srt 8.88KB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1).mp4 46.66MB
02 - Fundamentals of Security/010 Security Control Categories (OBJ 1.1)_en.srt 10.82KB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1).mp4 43.59MB
02 - Fundamentals of Security/011 Security Control Types (OBJ 1.1)_en.srt 12.04KB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1).mp4 48.69MB
02 - Fundamentals of Security/012 Gap Analysis (OBJ 1.1)_en.srt 11.82KB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2).mp4 68.64MB
02 - Fundamentals of Security/013 Zero Trust (OBJ 1.2)_en.srt 16.63KB
02 - Fundamentals of Security/014 Checkpoint Fundamentals of Security.html 52.69KB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4 86.65MB
03 - Threat Actors/001 Threat Actors (OBJ 1.2, 2.1, & 2.2)_en.srt 9.11KB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1).mp4 53.98MB
03 - Threat Actors/002 Threat Actor Motivations (OBJ 2.1)_en.srt 16.01KB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1).mp4 32.95MB
03 - Threat Actors/003 Threat Actor Attributes (OBJ 2.1)_en.srt 8.97KB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1).mp4 25.91MB
03 - Threat Actors/004 Unskilled Attackers (OBJ 2.1)_en.srt 6.33KB
03 - Threat Actors/005 Hacktivists (OBJ 2.1).mp4 32.31MB
03 - Threat Actors/005 Hacktivists (OBJ 2.1)_en.srt 8.01KB
03 - Threat Actors/006 Organized Crime (OBJ 2.1).mp4 57.14MB
03 - Threat Actors/006 Organized Crime (OBJ 2.1)_en.srt 8.5KB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1).mp4 85.8MB
03 - Threat Actors/007 Nation-state Actor (OBJ 2.1)_en.srt 13.5KB
03 - Threat Actors/008 Insider Threats (OBJ 2.1).mp4 77.01MB
03 - Threat Actors/008 Insider Threats (OBJ 2.1)_en.srt 11.78KB
03 - Threat Actors/009 Shadow IT (OBJ 2.1).mp4 66.36MB
03 - Threat Actors/009 Shadow IT (OBJ 2.1)_en.srt 9.98KB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4 100.13MB
03 - Threat Actors/010 Threat Vectors and Attack Surfaces (OBJ 2.2)_en.srt 17.76KB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2).mp4 79.58MB
03 - Threat Actors/011 Outsmarting Threat Actors (OBJ 1.2)_en.srt 19.86KB
03 - Threat Actors/012 Checkpoint Threat Actors.html 43.34KB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4).mp4 79MB
04 - Physical Security/001 Physical Security (OBJ 1.2 & 2.4)_en.srt 8.6KB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2).mp4 63.14MB
04 - Physical Security/002 Fencing and Bollards (OBJ 1.2)_en.srt 14.29KB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4).mp4 60.82MB
04 - Physical Security/003 Attacking with Brute Force (OBJ 2.4)_en.srt 12.67KB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2).mp4 52.33MB
04 - Physical Security/004 Surveillance Systems (OBJ 1.2)_en.srt 16.07KB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4).mp4 47.67MB
04 - Physical Security/005 Bypassing Surveillance Systems (OBJ 2.4)_en.srt 10.36KB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2).mp4 66.37MB
04 - Physical Security/006 Access Control Vestibules (OBJ 1.2)_en.srt 17.73KB
04 - Physical Security/007 Door Locks (OBJ 1.2).mp4 135.19MB
04 - Physical Security/007 Door Locks (OBJ 1.2)_en.srt 29.99KB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4).mp4 72.51MB
04 - Physical Security/008 Access Badge Cloning (OBJ 2.4)_en.srt 19.11KB
04 - Physical Security/009 Checkpoint Physical Security.html 46.27KB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6).mp4 90.03MB
05 - Social Engineering/001 Social Engineering (OBJ 2.2 & 5.6)_en.srt 8.62KB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4 120.29MB
05 - Social Engineering/002 Motivational Triggers (OBJ 5.6)_en.srt 22.18KB
05 - Social Engineering/003 Impersonation (OBJ 2.2).mp4 61.99MB
05 - Social Engineering/003 Impersonation (OBJ 2.2)_en.srt 15.01KB
05 - Social Engineering/004 Pretexting (OBJ 2.2).mp4 72.87MB
05 - Social Engineering/004 Pretexting (OBJ 2.2)_en.srt 10.27KB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2).mp4 75.09MB
05 - Social Engineering/005 Phishing Attacks (OBJ 2.2)_en.srt 16.4KB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6).mp4 66.67MB
05 - Social Engineering/006 Preventing Phishing Attacks (OBJ 5.6)_en.srt 17.32KB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4 44.53MB
05 - Social Engineering/007 Conducting an Anti-Phishing Campaign (OBJ 5.6)_en.srt 11.22KB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2).mp4 63.07MB
05 - Social Engineering/008 Frauds and Scams (OBJ 2.2)_en.srt 11.81KB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2).mp4 48.54MB
05 - Social Engineering/009 Influence Campaigns (OBJ 2.2)_en.srt 10.82KB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2).mp4 78.42MB
05 - Social Engineering/010 Other Social Engineering Attacks (OBJ 2.2)_en.srt 19.13KB
05 - Social Engineering/011 Checkpoint Social Engineering.html 42.72KB
06 - Malware/001 Malware (OBJ 2.4).mp4 186.24MB
06 - Malware/001 Malware (OBJ 2.4)_en.srt 19.28KB
06 - Malware/002 Viruses (OBJ 2.4).mp4 59.87MB
06 - Malware/002 Viruses (OBJ 2.4)_en.srt 17.42KB
06 - Malware/003 Worms (OBJ 2.4).mp4 26.08MB
06 - Malware/003 Worms (OBJ 2.4)_en.srt 7.44KB
06 - Malware/004 Trojans (OBJ 2.4).mp4 29.76MB
06 - Malware/004 Trojans (OBJ 2.4)_en.srt 8.62KB
06 - Malware/005 Viruses and Trojans (OBJ 2.4).mp4 87.03MB
06 - Malware/005 Viruses and Trojans (OBJ 2.4)_en.srt 16.52KB
06 - Malware/006 Ransomware (OBJ 2.4).mp4 97.19MB
06 - Malware/006 Ransomware (OBJ 2.4)_en.srt 18.23KB
06 - Malware/007 Zombies and Botnets (OBJ 2.4).mp4 53.18MB
06 - Malware/007 Zombies and Botnets (OBJ 2.4)_en.srt 11.4KB
06 - Malware/008 Rootkits (OBJ 2.4).mp4 46.88MB
06 - Malware/008 Rootkits (OBJ 2.4)_en.srt 12.04KB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4).mp4 59.77MB
06 - Malware/009 Backdoors and Logic Bombs (OBJ 2.4)_en.srt 13.13KB
06 - Malware/010 Keylogger (OBJ 2.4).mp4 56.53MB
06 - Malware/010 Keylogger (OBJ 2.4)_en.srt 11.89KB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4).mp4 39.32MB
06 - Malware/011 Spyware and Bloatware (OBJ 2.4)_en.srt 11.32KB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4).mp4 41.69MB
06 - Malware/012 Malware Attack Techniques (OBJ 2.4)_en.srt 11.21KB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4).mp4 70.5MB
06 - Malware/013 Indications of Malware Attacks (OBJ 2.4)_en.srt 12.4KB
06 - Malware/014 Checkpoint Malware.html 43.12KB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4 70.49MB
07 - Data Protection/001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)_en.srt 7.15KB
07 - Data Protection/002 Data Classifications (OBJ 3.3).mp4 56.71MB
07 - Data Protection/002 Data Classifications (OBJ 3.3)_en.srt 15.68KB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1).mp4 47.57MB
07 - Data Protection/003 Data Ownership (OBJ 4.2 & 5.1)_en.srt 10.11KB
07 - Data Protection/004 Data States (OBJ 3.3).mp4 32.55MB
07 - Data Protection/004 Data States (OBJ 3.3)_en.srt 9.45KB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4).mp4 36.05MB
07 - Data Protection/005 Data Types (OBJ 3.3 & 1.4)_en.srt 8.24KB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3).mp4 22.06MB
07 - Data Protection/006 Data Sovereignty (OBJ 3.3)_en.srt 5.53KB
07 - Data Protection/007 Securing Data (OBJ 3.3).mp4 22.29MB
07 - Data Protection/007 Securing Data (OBJ 3.3)_en.srt 7.07KB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4).mp4 47.25MB
07 - Data Protection/008 Data Loss Prevention (DLP) (OBJ 4.4)_en.srt 7.81KB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5).mp4 78.47MB
07 - Data Protection/009 Configuring a DLP (OBJ 4.5)_en.srt 36.66KB
07 - Data Protection/010 Checkpoint Data Protection.html 49.18KB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 257.17MB
08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)_en.srt 26.12KB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4).mp4 73.87MB
08 - Cryptographic Solutions/002 Symmetric vs Asymmetric (OBJ 1.4)_en.srt 17.75KB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4).mp4 43.26MB
08 - Cryptographic Solutions/003 Symmetric Algorithms (OBJ 1.4)_en.srt 12.02KB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4).mp4 41.47MB
08 - Cryptographic Solutions/004 Asymmetric Algorithms (OBJ 1.4)_en.srt 16.03KB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4).mp4 88.46MB
08 - Cryptographic Solutions/005 Hashing (OBJ 1.4)_en.srt 20.64KB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4).mp4 57.24MB
08 - Cryptographic Solutions/006 Increasing Hash Security (OBJ 1.4)_en.srt 17.54KB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4 39.39MB
08 - Cryptographic Solutions/007 Public Key Infrastructure (PKI) (OBJ 1.4)_en.srt 12.42KB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4 108.4MB
08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4)_en.srt 29.31KB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4).mp4 23.78MB
08 - Cryptographic Solutions/009 Exploring Digital Certificates (OBJ 1.4)_en.srt 6.74KB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4).mp4 39.4MB
08 - Cryptographic Solutions/010 Blockchain (OBJ 1.4)_en.srt 12.14KB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4).mp4 47.46MB
08 - Cryptographic Solutions/011 Encryption Tools (OBJ 1.4)_en.srt 12.09KB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4).mp4 80.74MB
08 - Cryptographic Solutions/012 Obfuscation (OBJ 1.4)_en.srt 19.48KB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4 101.52MB
08 - Cryptographic Solutions/013 Cryptographic Attacks (OBJ 2.3 & 2.4)_en.srt 33.61KB
08 - Cryptographic Solutions/014 Checkpoint Cryptographic Solutions.html 45.5KB
09 - Risk Management/001 Risk Management (OBJ 5.2).mp4 100.84MB
09 - Risk Management/001 Risk Management (OBJ 5.2)_en.srt 8.99KB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2).mp4 21.29MB
09 - Risk Management/002 Risk Assessment Frequency (OBJ 5.2)_en.srt 6.51KB
09 - Risk Management/003 Risk Identification (OBJ 5.2).mp4 42.73MB
09 - Risk Management/003 Risk Identification (OBJ 5.2)_en.srt 10.8KB
09 - Risk Management/004 Risk Register (OBJ 5.2).mp4 61.82MB
09 - Risk Management/004 Risk Register (OBJ 5.2)_en.srt 14.46KB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2).mp4 36.89MB
09 - Risk Management/005 Qualitative Risk Analysis (OBJ 5.2)_en.srt 6.74KB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2).mp4 21.24MB
09 - Risk Management/006 Quantitative Risk Analysis (OBJ 5.2)_en.srt 8.42KB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2).mp4 46.72MB
09 - Risk Management/007 Risk Management Strategies (OBJ 5.2)_en.srt 11.45KB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2).mp4 28.85MB
09 - Risk Management/008 Risk Monitoring and Reporting (OBJ 5.2)_en.srt 7.24KB
09 - Risk Management/009 Checkpoint Risk Management.html 47.63KB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4 67.14MB
10 - Third-party Vendor Risks/001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)_en.srt 6.88KB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4 44.43MB
10 - Third-party Vendor Risks/002 Supply Chain Risks (OBJ 2.3 & 5.3)_en.srt 9.73KB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4 76.66MB
10 - Third-party Vendor Risks/003 Supply Chain Attacks (OBJ 2.2 & 5.3)_en.srt 14.28KB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3).mp4 50.83MB
10 - Third-party Vendor Risks/004 Vendor Assessment (OBJ 5.3)_en.srt 11.43KB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3).mp4 52.17MB
10 - Third-party Vendor Risks/005 Vendor Selection and Monitoring (OBJ 5.3)_en.srt 12.3KB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3).mp4 54.44MB
10 - Third-party Vendor Risks/006 Contracts and Agreements (OBJ 5.3)_en.srt 11.65KB
10 - Third-party Vendor Risks/007 Checkpoint Third-party Vendor Risks.html 45.96KB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4).mp4 104.65MB
11 - Governance and Compliance/001 Governance and Compliance (OBJ 5.1 & 5.4)_en.srt 10.76KB
11 - Governance and Compliance/002 Governance (OBJ 5.1).mp4 38.77MB
11 - Governance and Compliance/002 Governance (OBJ 5.1)_en.srt 8.73KB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1).mp4 26.96MB
11 - Governance and Compliance/003 Governance Structures (OBJ 5.1)_en.srt 6.51KB
11 - Governance and Compliance/004 Policies (OBJ 5.1).mp4 31.9MB
11 - Governance and Compliance/004 Policies (OBJ 5.1)_en.srt 9.14KB
11 - Governance and Compliance/005 Standards (OBJ 5.1).mp4 33.8MB
11 - Governance and Compliance/005 Standards (OBJ 5.1)_en.srt 8.02KB
11 - Governance and Compliance/006 Procedures (OBJ 5.1).mp4 30.73MB
11 - Governance and Compliance/006 Procedures (OBJ 5.1)_en.srt 8.96KB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1).mp4 45.32MB
11 - Governance and Compliance/007 Governance Considerations (OBJ 5.1)_en.srt 12.17KB
11 - Governance and Compliance/008 Compliance (OBJ 5.4).mp4 47.04MB
11 - Governance and Compliance/008 Compliance (OBJ 5.4)_en.srt 10.24KB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4).mp4 54.02MB
11 - Governance and Compliance/009 Non-compliance Consequences (OBJ 5.4)_en.srt 6.95KB
11 - Governance and Compliance/010 Checkpoint Governance and Compliance.html 54.36KB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4 101.36MB
12 - Asset and Change Management/001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)_en.srt 10.7KB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2).mp4 56.54MB
12 - Asset and Change Management/002 Acquisition and Procurement (OBJ 4.2)_en.srt 15.29KB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1).mp4 46.25MB
12 - Asset and Change Management/003 Mobile Asset Deployments (OBJ 4.1)_en.srt 14.4KB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2).mp4 57.29MB
12 - Asset and Change Management/004 Asset Management (OBJ 4.2)_en.srt 15.07KB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2).mp4 65.41MB
12 - Asset and Change Management/005 Asset Disposal and Decommissioning (OBJ 4.2)_en.srt 20.4KB
12 - Asset and Change Management/006 Change Management (OBJ 1.3).mp4 70.45MB
12 - Asset and Change Management/006 Change Management (OBJ 1.3)_en.srt 16.5KB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3).mp4 39.58MB
12 - Asset and Change Management/007 Change Management Processes (OBJ 1.3)_en.srt 14.75KB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3).mp4 32.39MB
12 - Asset and Change Management/008 Technical Implications of Changes (OBJ 1.3)_en.srt 11.35KB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3).mp4 35.76MB
12 - Asset and Change Management/009 Documenting Changes (OBJ 1.3)_en.srt 10.69KB
12 - Asset and Change Management/010 Checkpoint Asset and Change Management.html 50.21KB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5).mp4 103.15MB
13 - Audits and Assessments/001 Audits and Assessments (OBJ 5.5)_en.srt 9.41KB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5).mp4 58.03MB
13 - Audits and Assessments/002 Internal Audits and Assessments (OBJ 5.5)_en.srt 15.02KB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5).mp4 36.59MB
13 - Audits and Assessments/003 Performing an Internal Assessment (OBJ 5.5)_en.srt 8.78KB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5).mp4 52.34MB
13 - Audits and Assessments/004 External Audits and Assessments (OBJ 5.5)_en.srt 14KB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5).mp4 34.07MB
13 - Audits and Assessments/005 Performing an External Assessment (OBJ 5.5)_en.srt 9.23KB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5).mp4 50.89MB
13 - Audits and Assessments/006 Penetration Testing (OBJ 5.5)_en.srt 11.87KB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5).mp4 51.14MB
13 - Audits and Assessments/007 Reconnaissance in Pentesting (OBJ 5.5)_en.srt 13.27KB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4 154.02MB
13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5)_en.srt 37.52KB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5).mp4 70.66MB
13 - Audits and Assessments/009 Attestation of Findings (OBJ 5.5)_en.srt 13.51KB
13 - Audits and Assessments/010 Checkpoint Audits and Assessments.html 45.91KB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4).mp4 69.94MB
14 - Cyber Resilience and Redundancy/001 Cyber Resilience and Redundancy (OBJ 3.4)_en.srt 7.32KB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4).mp4 60.8MB
14 - Cyber Resilience and Redundancy/002 High Availability (OBJ 3.4)_en.srt 20.1KB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4).mp4 42.86MB
14 - Cyber Resilience and Redundancy/003 Data Redundancy (OBJ 3.4)_en.srt 19.48KB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4).mp4 25.65MB
14 - Cyber Resilience and Redundancy/004 Configuring a RAID (OBJ 3.4)_en.srt 7.26KB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4).mp4 86.8MB
14 - Cyber Resilience and Redundancy/005 Capacity Planning (OBJ 3.4)_en.srt 19.03KB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4).mp4 81.33MB
14 - Cyber Resilience and Redundancy/006 Powering Data Centers (OBJ 3.4)_en.srt 24.37KB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4).mp4 65.07MB
14 - Cyber Resilience and Redundancy/007 Data Backups (OBJ 3.4)_en.srt 24.83KB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4).mp4 76.02MB
14 - Cyber Resilience and Redundancy/008 Continuity of Operations Plan (OBJ 3.4)_en.srt 22.28KB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4 108.93MB
14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4)_en.srt 28.88KB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4).mp4 66.13MB
14 - Cyber Resilience and Redundancy/010 Resilience and Recovery Testing (OBJ 3.4)_en.srt 15.76KB
14 - Cyber Resilience and Redundancy/011 Checkpoint Cyber Resilience and Redundancy.html 44.89KB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1).mp4 86.47MB
15 - Security Architecture/001 Security Architecture (OBJ 3.1 & 4.1)_en.srt 8.73KB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1).mp4 102.32MB
15 - Security Architecture/002 On-premise versus the Cloud (OBJ 3.1)_en.srt 19.39KB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1).mp4 48.3MB
15 - Security Architecture/003 Cloud Security (OBJ 3.1 & 4.1)_en.srt 10.98KB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4 82.03MB
15 - Security Architecture/004 Virtualization and Containerization (OBJ 2.3 & 3.1)_en.srt 19.38KB
15 - Security Architecture/005 Serverless (OBJ 3.1).mp4 36.82MB
15 - Security Architecture/005 Serverless (OBJ 3.1)_en.srt 6.83KB
15 - Security Architecture/006 Microservices (OBJ 3.1).mp4 40.35MB
15 - Security Architecture/006 Microservices (OBJ 3.1)_en.srt 7.45KB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1).mp4 38.48MB
15 - Security Architecture/007 Network Infrastructure (OBJ 3.1)_en.srt 6.19KB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1).mp4 32.75MB
15 - Security Architecture/008 Software-Defined Network (SDN) (OBJ 3.1)_en.srt 5.37KB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1).mp4 33.97MB
15 - Security Architecture/009 Infrastructure as Code (IaC) (OBJ 3.1)_en.srt 7.83KB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4 33.77MB
15 - Security Architecture/010 Centralized vs Decentralized Architectures (OBJ 3.1)_en.srt 7.58KB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4 57.27MB
15 - Security Architecture/011 Internet of Things (IoT) (OBJ 3.1 & 4.1)_en.srt 9.24KB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1).mp4 32.5MB
15 - Security Architecture/012 ICS and SCADA (OBJ 3.1 & 4.1)_en.srt 7.54KB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1).mp4 41.99MB
15 - Security Architecture/013 Embedded Systems (OBJ 3.1 & 4.1)_en.srt 9.5KB
15 - Security Architecture/014 Checkpoint Security Architecture.html 70.48KB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5).mp4 90.69MB
16 - Security Infrastructure/001 Security Infrastructure (OBJ 3.2 & 4.5)_en.srt 9.78KB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5).mp4 83.73MB
16 - Security Infrastructure/002 Ports and Protocols (OBJ 4.5)_en.srt 32.67KB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2).mp4 75.13MB
16 - Security Infrastructure/003 Firewalls (OBJ 3.2)_en.srt 28.75KB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5).mp4 105.65MB
16 - Security Infrastructure/004 Configuring Firewalls (OBJ 4.5)_en.srt 28.15KB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2).mp4 37.22MB
16 - Security Infrastructure/005 IDS and IPS (OBJ 3.2)_en.srt 13.01KB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2).mp4 88.94MB
16 - Security Infrastructure/006 Network Appliances (OBJ 3.2)_en.srt 22.07KB
16 - Security Infrastructure/007 Port Security (OBJ 3.2).mp4 91.46MB
16 - Security Infrastructure/007 Port Security (OBJ 3.2)_en.srt 23.19KB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4 183.37MB
16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2)_en.srt 44.39KB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2).mp4 65.55MB
16 - Security Infrastructure/009 SD-WAN and SASE (OBJ 3.2)_en.srt 16.45KB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2).mp4 96.37MB
16 - Security Infrastructure/010 Infrastructure Considerations (OBJ 3.2)_en.srt 24.89KB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2).mp4 63.18MB
16 - Security Infrastructure/011 Selecting Infrastructure Controls (OBJ 3.2)_en.srt 19.45KB
16 - Security Infrastructure/012 Checkpoint Security Infrastructure.html 46.76KB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4 97.94MB
17 - Identity and Access Management (IAM) Solutions/001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)_en.srt 8.46KB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6).mp4 46.09MB
17 - Identity and Access Management (IAM) Solutions/002 Identity and Access Management (IAM) (OBJ 4.6)_en.srt 9.71KB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4 110.82MB
17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6)_en.srt 29.85KB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4 123.3MB
17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6)_en.srt 31.56KB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4).mp4 56.55MB
17 - Identity and Access Management (IAM) Solutions/005 Password Attacks (OBJ 2.4)_en.srt 19.91KB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6).mp4 73.27MB
17 - Identity and Access Management (IAM) Solutions/006 Single Sign-On (SSO) (OBJ 4.6)_en.srt 18.97KB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6).mp4 35.21MB
17 - Identity and Access Management (IAM) Solutions/007 Federation (OBJ 4.6)_en.srt 10.49KB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6).mp4 23.68MB
17 - Identity and Access Management (IAM) Solutions/008 Privileged Access Management (PAM) (OBJ 4.6)_en.srt 6.52KB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6).mp4 76.2MB
17 - Identity and Access Management (IAM) Solutions/009 Access Control Models (OBJ 4.6)_en.srt 18.44KB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6).mp4 63.79MB
17 - Identity and Access Management (IAM) Solutions/010 Assigning Permissions (OBJ 4.6)_en.srt 13.79KB
17 - Identity and Access Management (IAM) Solutions/011 Checkpoint Identity and Access Management (IAM) Solutions.html 44.99KB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 139.48MB
18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)_en.srt 14.35KB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4 51.12MB
18 - Vulnerabilities and Attacks/002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)_en.srt 14.62KB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 53.4MB
18 - Vulnerabilities and Attacks/003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 15.62KB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4 44.89MB
18 - Vulnerabilities and Attacks/004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)_en.srt 11.55KB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3).mp4 37.91MB
18 - Vulnerabilities and Attacks/005 Zero-day Vulnerabilities (OBJ 2.3)_en.srt 10.37KB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4 48.51MB
18 - Vulnerabilities and Attacks/006 Operating System Vulnerabilities (OBJ 2.3 & 2.5)_en.srt 10.92KB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4 100.65MB
18 - Vulnerabilities and Attacks/007 SQL and XML Injections (OBJ 2.3 & 2.4)_en.srt 29.51KB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4 76.46MB
18 - Vulnerabilities and Attacks/008 Conducting an SQL Injection (OBJ 2.3 & 2.4)_en.srt 14.83KB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 132.25MB
18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4)_en.srt 35.2KB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4).mp4 43.5MB
18 - Vulnerabilities and Attacks/010 Buffer Overflow (OBJ 2.3 & 2.4)_en.srt 14.71KB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3).mp4 57.73MB
18 - Vulnerabilities and Attacks/011 Race Conditions (OBJ 2.3)_en.srt 14.12KB
18 - Vulnerabilities and Attacks/012 Checkpoint Vulnerabilities and Attacks.html 51.81KB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4).mp4 74.15MB
19 - Malicious Activity/001 Malicious Activity (OBJ 2.4)_en.srt 7.35KB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4).mp4 64.93MB
19 - Malicious Activity/002 Distributed Denial of Service (OBJ 2.4)_en.srt 17.45KB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4 33.85MB
19 - Malicious Activity/003 Domain Name System (DNS) Attacks (OBJ 2.4)_en.srt 9.62KB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4).mp4 45.77MB
19 - Malicious Activity/004 Directory Traversal Attack (OBJ 2.4)_en.srt 15.73KB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4).mp4 43.11MB
19 - Malicious Activity/005 Execution and Escalation Attack (OBJ 2.4)_en.srt 14KB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4).mp4 28.46MB
19 - Malicious Activity/006 Replay Attacks (OBJ 2.4)_en.srt 5.48KB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4).mp4 33.79MB
19 - Malicious Activity/007 Session Hijacking (OBJ 2.4)_en.srt 11.42KB
19 - Malicious Activity/008 On-Path Attacks.mp4 31.91MB
19 - Malicious Activity/008 On-Path Attacks_en.srt 7.75KB
19 - Malicious Activity/009 Injection Attacks.mp4 23.68MB
19 - Malicious Activity/009 Injection Attacks_en.srt 8.68KB
19 - Malicious Activity/010 Indicators of Compromise (IoC).mp4 52.53MB
19 - Malicious Activity/010 Indicators of Compromise (IoC)_en.srt 14.45KB
19 - Malicious Activity/011 Checkpoint Malicious Activity.html 46.5KB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4 87.49MB
20 - Hardening/001 Hardening (OBJ 2.5, 4.1, & 4.5)_en.srt 8.93KB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5).mp4 46.62MB
20 - Hardening/002 Changing Default Configurations (OBJ 2.5)_en.srt 10.97KB
20 - Hardening/003 Restricting Applications (OBJ 2.5).mp4 70.04MB
20 - Hardening/003 Restricting Applications (OBJ 2.5)_en.srt 16.68KB
20 - Hardening/004 Unnecessary Services (OBJ 2.5).mp4 55.63MB
20 - Hardening/004 Unnecessary Services (OBJ 2.5)_en.srt 10.81KB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5).mp4 45.51MB
20 - Hardening/005 Trusted Operating Systems (OBJ 2.5)_en.srt 11.56KB
20 - Hardening/006 Updates and Patches (OBJ 2.5).mp4 47.43MB
20 - Hardening/006 Updates and Patches (OBJ 2.5)_en.srt 11.54KB
20 - Hardening/007 Patch Management (OBJ 2.5).mp4 94.32MB
20 - Hardening/007 Patch Management (OBJ 2.5)_en.srt 20.11KB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5).mp4 38.57MB
20 - Hardening/008 Group Policies (OBJ 2.5 & 4.5)_en.srt 20.42KB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5).mp4 35.01MB
20 - Hardening/009 SELinux (OBJ 2.5 & 4.5)_en.srt 13.18KB
20 - Hardening/010 Data Encryption Levels (2.5).mp4 32.67MB
20 - Hardening/010 Data Encryption Levels (2.5)_en.srt 10.53KB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1).mp4 56.31MB
20 - Hardening/011 Secure Baselines (OBJ 2.5 and 4.1)_en.srt 11.39KB
20 - Hardening/012 Checkpoint Hardening.html 45.87KB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5).mp4 82.45MB
21 - Security Techniques/001 Security Techniques (OBJ 4.1 & 4.5)_en.srt 7.27KB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1).mp4 83.6MB
21 - Security Techniques/002 Wireless Infrastructure Security (OBJ 4.1)_en.srt 17.85KB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1).mp4 97.1MB
21 - Security Techniques/003 Wireless Security Settings (OBJ 4.1)_en.srt 27.11KB
21 - Security Techniques/004 Application Security (OBJ 4.1).mp4 83.77MB
21 - Security Techniques/004 Application Security (OBJ 4.1)_en.srt 24.88KB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5).mp4 43.37MB
21 - Security Techniques/005 Network Access Control (NAC) (OBJ 4.5)_en.srt 12.46KB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5).mp4 62.07MB
21 - Security Techniques/006 Web and DNS Filtering (OBJ 4.5)_en.srt 13.97KB
21 - Security Techniques/007 Email Security (OBJ 4.5).mp4 54.34MB
21 - Security Techniques/007 Email Security (OBJ 4.5)_en.srt 14.37KB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5).mp4 61.55MB
21 - Security Techniques/008 Endpoint Detection and Response (OBJ 4.5)_en.srt 14.65KB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5).mp4 60.31MB
21 - Security Techniques/009 User Behavior Analytics (OBJ 4.5)_en.srt 12.1KB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4 115.69MB
21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5)_en.srt 27.67KB
21 - Security Techniques/011 Checkpoint Security Techniques.html 46.03KB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3).mp4 61.31MB
22 - Vulnerability Management/001 Vulnerability Management (OBJ 4.3)_en.srt 6.64KB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3).mp4 37.06MB
22 - Vulnerability Management/002 Identifying Vulnerabilities (OBJ 4.3)_en.srt 12.83KB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3).mp4 55.6MB
22 - Vulnerability Management/003 Threat Intelligence Feeds (OBJ 4.3)_en.srt 16.9KB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3).mp4 46.35MB
22 - Vulnerability Management/004 Responsible Disclosure Programs (OBJ 4.3)_en.srt 14.38KB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3).mp4 82.68MB
22 - Vulnerability Management/005 Analyzing Vulnerabilities (OBJ 4.3)_en.srt 25.49KB
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4 163.02MB
22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3)_en.srt 71.07KB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4 89.55MB
22 - Vulnerability Management/007 Assessing Vulnerability Scan Results (OBJ 4.3)_en.srt 27.65KB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3).mp4 57.83MB
22 - Vulnerability Management/008 Vulnerability Response and Remediation (OBJ 4.3)_en.srt 14.09KB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3).mp4 34.13MB
22 - Vulnerability Management/009 Validating Vulnerability Remediation (OBJ 4.3)_en.srt 13.86KB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3).mp4 78.81MB
22 - Vulnerability Management/010 Vulnerability Reporting (OBJ 4.3)_en.srt 22.77KB
22 - Vulnerability Management/011 Checkpoint Vulnerability Management.html 53.56KB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4 119.8MB
23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4)_en.srt 12.82KB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4).mp4 43.31MB
23 - Alerting and Monitoring/002 Monitoring Resources (OBJ 4.4)_en.srt 10.93KB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4).mp4 105.86MB
23 - Alerting and Monitoring/003 Alerting and Monitoring Activities (OBJ 4.4)_en.srt 28.19KB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4 34.53MB
23 - Alerting and Monitoring/004 Simple Network Management Protocol (SNMP) (OBJ 4.4)_en.srt 14.44KB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4 78.22MB
23 - Alerting and Monitoring/005 Security Information and Event Management (SIEM) (OBJ 4.4)_en.srt 26.13KB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4).mp4 33.47MB
23 - Alerting and Monitoring/006 Data from Security Tools (OBJ 4.4)_en.srt 12.15KB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4 66.49MB
23 - Alerting and Monitoring/007 Security Content Automation and Protocol (SCAP) (OBJ 4.4)_en.srt 21.64KB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis.mp4 49MB
23 - Alerting and Monitoring/008 NetFlow and Flow Analysis_en.srt 15.65KB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4).mp4 41.18MB
23 - Alerting and Monitoring/009 Single Pane of Glass (OBJ 4.4)_en.srt 13.42KB
23 - Alerting and Monitoring/010 Checkpoint Alerting and Monitoring.html 47.87KB
24 - Incident Response/001 Incident Response (OBJ 4.8).mp4 65.63MB
24 - Incident Response/001 Incident Response (OBJ 4.8)_en.srt 5.97KB
24 - Incident Response/002 Incident Response Process (OBJ 4.8).mp4 93.48MB
24 - Incident Response/002 Incident Response Process (OBJ 4.8)_en.srt 23.08KB
24 - Incident Response/003 Threat Hunting (OBJ 4.8).mp4 51.63MB
24 - Incident Response/003 Threat Hunting (OBJ 4.8)_en.srt 15.28KB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8).mp4 65.22MB
24 - Incident Response/004 Root Cause Analysis (OBJ 4.8)_en.srt 16.03KB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8).mp4 52.58MB
24 - Incident Response/005 Incident Response Training and Testing (OBJ 4.8)_en.srt 19.51KB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4 134.1MB
24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8)_en.srt 27.02KB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8).mp4 54.22MB
24 - Incident Response/007 Data Collection Procedures (OBJ 4.8)_en.srt 19.04KB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8).mp4 101.84MB
24 - Incident Response/008 Disk Imaging and Analysis (OBJ 4.8)_en.srt 17.23KB
24 - Incident Response/009 Checkpoint Incident Response.html 44.72KB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9).mp4 72.12MB
25 - Investigating an Incident/001 Investigating an Incident (OBJ 4.9)_en.srt 7.72KB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9).mp4 100.51MB
25 - Investigating an Incident/002 Investigating with Data (OBJ 4.9)_en.srt 27.87KB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9).mp4 34.38MB
25 - Investigating an Incident/003 Dashboards (OBJ 4.9)_en.srt 9.21KB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9).mp4 48.49MB
25 - Investigating an Incident/004 Automated Reports (OBJ 4.9)_en.srt 15.1KB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9).mp4 78.49MB
25 - Investigating an Incident/005 Vulnerability Scans (OBJ 4.9)_en.srt 25.09KB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9).mp4 85.47MB
25 - Investigating an Incident/006 Packet Captures (OBJ 4.9)_en.srt 19.24KB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9).mp4 35.45MB
25 - Investigating an Incident/007 Firewall Logs (OBJ 4.9)_en.srt 12.14KB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9).mp4 27.53MB
25 - Investigating an Incident/008 Application Logs (OBJ 4.9)_en.srt 8.04KB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9).mp4 28.61MB
25 - Investigating an Incident/009 Endpoint Logs (OBJ 4.9)_en.srt 8.27KB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9).mp4 25.74MB
25 - Investigating an Incident/010 OS-specific Security Logs (OBJ 4.9)_en.srt 8.26KB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9).mp4 52.02MB
25 - Investigating an Incident/011 IPSIDS Logs (OBJ 4.9)_en.srt 12.65KB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9).mp4 40.71MB
25 - Investigating an Incident/012 Network Logs (OBJ 4.9)_en.srt 11.04KB
25 - Investigating an Incident/013 Metadata (OBJ 4.9).mp4 29.83MB
25 - Investigating an Incident/013 Metadata (OBJ 4.9)_en.srt 10.37KB
25 - Investigating an Incident/014 Checkpoint Investigating an Incident.html 65.61KB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4 140.75MB
26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7)_en.srt 14.38KB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7).mp4 79.48MB
26 - Automation and Orchestration/002 When to Automate and Orchestrate (OBJ 4.7)_en.srt 20.59KB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4 59.67MB
26 - Automation and Orchestration/003 Benefits of Automation and Orchestratation (OBJ 4.7)_en.srt 16.14KB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7).mp4 54.08MB
26 - Automation and Orchestration/004 Automating Support Tickets (OBJ 4.7)_en.srt 13.8KB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7).mp4 61.14MB
26 - Automation and Orchestration/005 Automating Onboarding (OBJ 4.7)_en.srt 15.14KB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7).mp4 32.41MB
26 - Automation and Orchestration/006 Automating Security (OBJ 4.7)_en.srt 9.76KB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7).mp4 75.49MB
26 - Automation and Orchestration/007 Automating Application Development (OBJ 4.7)_en.srt 19.19KB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7).mp4 102.31MB
26 - Automation and Orchestration/008 Integrations and APIs (OBJ 4.7)_en.srt 26.6KB
26 - Automation and Orchestration/009 Checkpoint Automation and Orchestration.html 50.94KB
27 - Security Awareness/001 Security Awareness (OBJ 5.6).mp4 79.83MB
27 - Security Awareness/001 Security Awareness (OBJ 5.6)_en.srt 8.97KB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6).mp4 79.48MB
27 - Security Awareness/002 Recognizing Insider Threats (OBJ 5.6)_en.srt 17.65KB
27 - Security Awareness/003 Password Management (OBJ 5.6).mp4 79.81MB
27 - Security Awareness/003 Password Management (OBJ 5.6)_en.srt 22.47KB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6).mp4 73.84MB
27 - Security Awareness/004 Avoiding Social Engineering (OBJ 5.6)_en.srt 18.54KB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6).mp4 72.47MB
27 - Security Awareness/005 Policy and Handbooks (OBJ 5.6)_en.srt 17.52KB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6).mp4 61.02MB
27 - Security Awareness/006 Remote and Hybrid Work Environments (OBJ 5.6)_en.srt 16.75KB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6).mp4 34.88MB
27 - Security Awareness/007 Creating a Culture of Security (OBJ 5.6)_en.srt 11.75KB
27 - Security Awareness/008 Checkpoint Security Awareness.html 50.81KB
01 - Introduction/001 comptia-security-sy0-701-exam-objectives-5-0.pdf 186.6KB
28 - Conclusion/001 Conclusion_en.srt 30.04KB
28 - Conclusion/002 BONUS Where do I go from here.mp4 62.59MB
28 - Conclusion/002 BONUS Where do I go from here_en.srt 7.69KB
29 - Practice Exam/Exams/Messer J. Professor Messer's SY0-701 CompTIA Security + Practice Exams 2024.pdf 3.07MB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/000 CompTIA Security+ (SY0-701) #0.html 462.34KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/001 CompTIA Security+ (SYO-701) #1.html 510.68KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/002 CompTIA Security+ (SYO-701) #2.html 503.12KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/003 CompTIA Security+ (SYO-701) #3.html 494.77KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/004 CompTIA Security+ (SYO-701) #4.html 495.87KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/005 CompTIA Security+ (SYO-701) #5.html 501.31KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams/01 - CompTIA Security+ (SYO-701) #1/006 CompTIA Security+ (SYO-701) #6.html 510.03KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/001 CompTIA Security+ (SYO-701) #1.html 539.02KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/002 CompTIA Security+ (SYO-701) #2.html 486.67KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/003 CompTIA Security+ (SYO-701) #3.html 514.1KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/004 CompTIA Security+ (SYO-701) #4.html 521.61KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/005 CompTIA Security+ (SYO-701) #5.html 506.06KB
29 - Practice Exam/Exams/comptia-security-sy0-701-practice-exams-2nd-edition/01 - CompTIA Security+ (SYO-701) #1/006 CompTIA Security+ (SYO-701) #6.html 500.18KB