Pluralsight-Security-Arc-1kkKS
- 01.Course Overview.mp45.05MB
- 02.Setting the Stage\\/0201.Setting the Stage - Who Should Watch This Course.mp44.82MB
- 02.Setting Overview.mp46.05MB
- 02.Setting the Stage\\/0203.Security Teams.mp44.59MB
- 02.Setting the Stage\\/0204.Offensive and Defensive Teams.mp48.54MB
- 03.Installing and Configuring Network Components\\/0301.Module Intro.mp46.14MB
- 03.Installing and Configuring Network Components\\/0302.TCPIP and OSI Models.mp45.85MB
- 03.Installing and Configuring Network Components\\/0303.Firewalls.mp411.32MB
- 03.Installing and Configuring Network Components\\/0304.Web Application Firewalls.mp44.47MB
- 03.Installing and Configuring Network Components\\/0305.Virtual Private Networks ().mp47.98MB
- 03.Installing and Configuring Network Components\\/0306.Transport Encryption.mp42.59MB
- 03.Installing and Configuring Network Components\\/0307.NIDS and NIPS.mp410.74MB
- 03.Installing and Configuring Network Components\\/0308.IDSIPS Workflow.mp43.00MB
- 03.Installing and Configuring Network Components\\/0309.Four Approaches to IDS.mp43.15MB
- 03.Installing ba<x>sed IDS.mp44.43MB
- 03.Installing and Configuring Network Components\\/0311.Reacting to Alerts or Issues.mp45.16MB
- 03.Installing and Configuring Network Components\\/0312.Routers and Common Routing Protocols.mp43.90MB
- 03.Installing and Configuring Network Components\\/0313.Switches.mp43.91MB
- 03.Installing and Configuring Network Components\\/0314.la<x>yer 2 vs. la<x>yer 3.mp42.29MB
- 03.Installing and Configuring Network Components\\/0315.Load Balancers.mp43.14MB
- 03.Installing and Configuring Network Components\\/0316.Load Balancer Types.mp44.11MB
- 03.Installing and Configuring Network Components\\/0317.Web Security Gateways.mp43.02MB
- 03.Installing and Configuring Network Components\\/0318.Port Security and 802.1x.mp48.72MB
- 03.Installing and Configuring Network Components\\/0319.Loop Protection and Flood Guards.mp43.45MB
- 03.Installing and Configuring Network Components\\/0320.Spanning Tree Protocol (STP).mp46.13MB
- 03.Installing and Configuring Network Components\\/0321.Access Points and WiFi Security.mp47.02MB
- 03.Installing and Configuring Network Components\\/0322.Security Infortion and Event Management (SIEM).mp46.64MB
- 03.Installing and Configuring Network Components\\/0323.Data Loss Prevention (DLP).mp44.96MB
- 03.Installing Access Control (NAC).mp45.31MB
- 03.Installing and Configuring Network Components\\/0325.Hardware ba<x>sed Encryption.mp43.57MB
- 03.Installing and Configuring Network Components\\/0326.il Gateway.mp4938.19KB
- 03.Installing and Configuring Network Components\\/0327.Additional Things to Consider.mp44.10MB
- 04.Implementing Secure Protocols\\/0401.Module Intro.mp42.86MB
- 04.Implementing Protocols.mp47.39MB
- 04.Implementing Secure Protocols\\/0403.DNS SEC.mp49.03MB
- 04.Implementing Secure Protocols\\/0404.SSH.mp42.33MB
- 04.Implementing Secure Protocols\\/0405.IME.mp42.23MB
- 04.Implementing Secure Protocols\\/0406.SRTP.mp41.50MB
- 04.Implementing Secure Protocols\\/0407.LDAPS.mp42.03MB
- 04.Implementing Secure Protocols\\/0408.FTPS and SFTP.mp42.74MB
- 04.Implementing Secure Protocols\\/0409.SNMPv3.mp42.10MB
- 04.Implementing Secure Protocols\\/0410.SSLTLS.mp42.31MB
- 04.Implementing Secure Protocols\\/0411.HTTPS.mp43.04MB
- 04.Implementing Secure Protocols\\/0412.Secure POPIP.mp46.02MB
- 04.Implementing Cases.mp47.21MB
- 05.Implementing Secure Network Architecture\\/0501.Module Intro and ology Overview.mp49.80MB
- 05.Implementing Secure Network Architecture\\/0502.Additional ology Concepts.mp43.57MB
- 05.Implementing Secure Network Architecture\\/0503.Security Segmentation and Isolation.mp45.17MB
- 05.Implementing Secure Network Architecture\\/0504.Virtualization.mp42.89MB
- 05.Implementing Secure Network Architecture\\/0505.Air Gaps.mp44.40MB
- 05.Implementing Secure Network Architecture\\/0506..mp42.56MB
- 05.Implementing Secure Network Architecture\\/0507.Security Device Placement.mp45.33MB
- 05.Implementing Defined Networking (SDN).mp45.81MB
- 06.Troubleshooting Common Security Issues\\/0601.Module Intro.mp45.40MB
- 06.Troubleshooting Common Security Issues\\/0602.Unencrypted Credentials.mp43.21MB
- 06.Troubleshooting Common Security Issues\\/0603.Logs and Event Anolies.mp44.20MB
- 06.Troubleshooting Common Security Issues\\/0604.Access Violations.mp44.29MB
- 06.Troubleshooting Common Security Issues\\/0605.Certificate Issues and Hierarchy.mp45.33MB
- 06.Troubleshooting Common Security Issues\\/0606.Misconfigured Devices.mp42.29MB
- 06.Troubleshooting Common Security Issues\\/0607.Weak Security Configuration.mp42.69MB
- 06.Troubleshooting Common Security Issues\\/0608.Personnel Issues.mp48.25MB
- 06.Troubleshooting Common Security Issues\\/0609.Unauthorized Software.mp43.72MB
- 06.Troubleshooting Common Security Issues\\/0610.ba<x>seline Deviation and License Compliance.mp410.91MB
- 06.Troubleshooting Common Security Issues\\/0611.Asset nagement.mp41.81MB
- 06.Troubleshooting Common Security Issues\\/0612.Authentication Issues.mp43.90MB
- 07.Implementing Secure Systems Design\\/0701.Module intro and Secure Boot.mp46.91MB
- 07.Implementing Launch.mp41.38MB
- 07.Implementing Measurement Architecture (I).mp4897.09KB
- 07.Implementing Secure Systems Design\\/0704.BIOSUEFI.mp41.11MB
- 07.Implementing Secure Systems Design\\/0705.Data Encryption Hardware ba<x>sed Encryption.mp417.01MB
- 07.Implementing Secure Systems Design\\/0706.Types of Data to Secure.mp42.91MB
- 07.Implementing Secure Systems Design\\/0707.Supply Chain Security.mp43.81MB
- 07.Implementing Secure Systems Design\\/0708.Hardware Root of Trust.mp42.93MB
- 07.Implementing Secure Systems Design\\/0709.EMIEMP.mp43.04MB
- 07.Implementing Secure Systems Design\\/0710.Trusted OS.mp48.71MB
- 07.Implementing Secure Systems Design\\/0711.Secure Systems Design.mp46.30MB
- 07.Implementing Secure Systems Design\\/0712.Mobile Device nagement.mp420.24MB
- 07.Implementing Secure Systems Design\\/0713.Peripherals Security.mp44.92MB
- 08.Secure Application Development and Deployment\\/0801.Module Intro.mp42.99MB
- 08.Secure Application Development and Deployment\\/0802.Development Life-cycle Models.mp43.10MB
- 08.Secure Application Development and Deployment\\/0803.Waterfall Development Model.mp44.99MB
- 08.Secure Application Development and Deployment\\/0804.Secure DevOps.mp42.22MB
- 08.Secure Application Development and Deployment\\/0805.Security Autotion.mp45.13MB
- 08.Secure Integration.mp43.41MB
- 08.Secure Application Development and Deployment\\/0807.ba<x>selining and CICD.mp41.61MB
- 08.Secure Application Development and Deployment\\/0808.Immutable Systems.mp41.41MB
- 08.Secure as Code.mp42.40MB
- 08.Secure Application Development and Deployment\\/0810.General Change nagement.mp44.80MB
- 08.Secure Application Development and Deployment\\/0811.Provisioning Deprovisioning and Asset Disposal.mp44.92MB
- 08.Secure Application Development and Deployment\\/0812.SDLC.mp44.51MB
- 08.Secure Application Development and Deployment\\/0813.Secure Coding Techniques.mp420.26MB
- 08.Secure Quality and Testing.mp45.27MB
- 08.Secure Application Development and Deployment\\/0815.Static Code Analysis.mp44.10MB
- 08.Secure Application Development and Deployment\\/0816.Fuzzing.mp410.83MB
- 08.Secure Application Development and Deployment\\/0817.Secure Coding Concepts.mp43.58MB
- 08.Secure vs. Runtime Code.mp42.81MB
- 09.Physical Security Controls\\/0901.Module Intro.mp42.94MB
- 09.Physical Security Controls\\/0902.Proper Lighting and Signage.mp45.40MB
- 09.Physical Security Controls\\/0903.Fencing.mp46.77MB
- 09.Physical Security Controls\\/0904.Guards.mp41.27MB
- 09.Physical Security Controls\\/0905.Alarms.mp42.70MB
- 09.Physical Security Controls\\/0906.Securing Physical Asssets.mp42.16MB
- 09.Physical Security Controls\\/0907.Protected Distribution Systems (PDS).mp49.43MB
- 09.Physical Security Controls\\/0908.Airgap Networks.mp43.52MB
- 09.Physical Security Controls\\/0909.Hardware Locks.mp41.21MB
- 09.Physical Security Controls\\/0910.ntraps.mp41.56MB
- 09.Physical Security Controls\\/0911.EMI Shielding.mp45.93MB
- 09.Physical Security Controls\\/0912.Proximity Readers.mp42.32MB
- 09.Physical Security Controls\\/0913.Biometrics.mp41.88MB
- 09.Physical Security Controls\\/0914.Barricades.mp45.65MB
- 09.Physical Security Controls\\/0915.HVAC.mp46.99MB
- 09.Physical Security Controls\\/0916.Hot and Cold Aisles.mp45.80MB
- 09.Physical Security Controls\\/0917.Fire Suppression.mp47.07MB
- 09.Physical Security Controls\\/0918.Screen Filters.mp41.63MB
- 09.Physical and Video Surveillance.mp43.57MB
- 09.Physical Security Controls\\/0920.Motion Detection and Infrared.mp41.88MB
- 09.Physical Security Controls\\/0921.Logs.mp41.50MB
- 09.Physical Security Controls\\/0922.Key nagement.mp43.00MB
- CreateTime2022-08-02
- UpdateTime2022-08-12
- FileTotalCount119
- TotalSize1.10GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.ONSD-414 2.ONSD-145 3.BNDV-00672 4.AAJ-028 5.MIRD-074 6.NASS-052 7.AAJB-018 8.KBKD-658 9.MIBD-704 10.HODV-20768 11.GBD-013 12.TMSA-005 13.SVOMN-052 14.KKK-012 15.CAGA-001 16.IPTD-422 17.TYWD-032 18.MIBD-572 19.MOBSP-010 20.YSN-204 21.ONSD-556 22.PDV-127 23.ONSD-167 24.ONSD-616 25.IDBD-377 26.RIFDVA-026 27.LIA-108 28.ONSD-610 29.NTD-043 30.INRD-18 31.CADV-234 32.JUKD-553 33.DJNJ-58 34.ATFB-173 35.RKI-275 36.JUC-686 37.SASS-04 38.URAB-012 39.TCD-111 40.IPZ-078 41.HUNT-665 42.PSSD-156 43.RBD-335 44.ALD-627 45.TOD-216 46.ESO-001 47.VNDS-2967 48.KD-058 49.WHY-016 50.RAM-041 51.RG-374 52.SWD-096 53.YSN-110 54.RJK-006 55.FBS-039 56.GCD-140 57.DVDPS-891 58.EAHV-001 59.ALX-399 60.GCD-123 61.DER-002 62.OYVD-105 63.MDE-007 64.KTMA-006 65.BF-087 66.ALX-264 67.NASS-001 68.BB-006 69.M-823 70.TXXD-074 71.414 72.145 73.00672 74.028 75.074 76.052 77.018 78.658 79.704 80.20768 81.013 82.005 83.052 84.012 85.001 86.422 87.032 88.572 89.010 90.204 91.556 92.127 93.167 94.616 95.377 96.026 97.108 98.610 99.043 100.18 101.234 102.553 103.58 104.173 105.275 106.686 107.04 108.012 109.111 110.078 111.665 112.156 113.335 114.627 115.216 116.001 117.2967 118.058 119.016 120.041 121.374 122.096 123.110 124.006 125.039 126.140 127.891 128.001 129.399 130.123 131.002 132.105 133.007 134.006 135.087 136.2 137.001 138.006 139.823 140.074