https://img87.pixhost.to/images/599/359020115_tuto.jpg
6.94 GB | 00:23:43 | mp4 | 1920X1080 | 16:9
Genre: eLearning | Language : English
Files Included :
1 - How to get the most out of this Course (26.47 MB)
2 - About the Course Trainer (12.99 MB)
84 - What is the Software (29.52 MB)
85 - Coding Examples Understand what Programs are (37.46 MB)
86 - Software Development Lifecycle (114.14 MB)
87 - OWASP Top 10 (52.94 MB)
88 - CWE (21.95 MB)
89 - DevOPS (50.59 MB)
90 - DevSECOPS (37.31 MB)
91 - Secure Coding Practices (122.48 MB)
92 - Protecting the Source Code (58.12 MB)
93 - Application Testing (45.69 MB)
94 - Penetration Testing (46.06 MB)
95 - Bug Hunting (19.11 MB)
100 - HR Security (48.43 MB)
101 - HR Policy (39.76 MB)
102 - Understand Social Engineering Attacks (167.41 MB)
103 - Security Awareness Training (35.62 MB)
104 - Auditing and Reviewing Systems (102.49 MB)
105 - Outsourcing Security Requirements (89.98 MB)
96 - Understand the Policy Document (17.21 MB)
97 - Policy Document Attributes and Review of Policy Document (63.54 MB)
98 - Standards and Baseline (18.94 MB)
99 - Procedures and Guidelines (20.55 MB)
106 - Introduction to Cryptography (70.54 MB)
107 - Symmetric Encryption (59.4 MB)
108 - ASymmetric Encryption (47.36 MB)
109 - Cryptography Key Concepts (37.75 MB)
110 - PKI (121.14 MB)
111 - Certificates (33.87 MB)
112 - Digital Signature (17.79 MB)
113 - Hashing and Integrity (75.02 MB)
114 - Cryptographic Applications (11.05 MB)
115 - Data Lifecycle (51.19 MB)
116 - Data Disposal (27.66 MB)
117 - Data Classification (39.35 MB)
118 - Data Governance (29.11 MB)
119 - Privacy and Data Protection (69.76 MB)
120 - Privacy Controls and Documentation (83.55 MB)
121 - Measures for Data Protection (21.18 MB)
122 - Data Classification and Protection Policies (71.37 MB)
123 - Incident Management (27.03 MB)
124 - Building Incident Response Plan (41.99 MB)
125 - Digital Forsensics (66.51 MB)
126 - Business Continuity Planning (56.08 MB)
127 - RTO RPO (42.19 MB)
128 - BCP Policy (91.96 MB)
10 - Threat Intel CERT (30.85 MB)
11 - Understand Malware (84.25 MB)
12 - DOS DDOS (47.61 MB)
13 - InPath Attacks (52.6 MB)
3 - Understand the CIA Triad (50.95 MB)
4 - Security Terminologies (83.19 MB)
5 - Security Vulnerabilities (48.67 MB)
6 - Vulnerability Key Terms (27.36 MB)
7 - Cyber Attack Process (104.38 MB)
8 - Adversaries (16.89 MB)
9 - APTs (43.16 MB)
14 - Security Controls Overview (56.81 MB)
15 - Example for Controls (24.78 MB)
16 - Compensating Controls and Control Objective (27 MB)
17 - Layered Defenses Control References (32.79 MB)
18 - Control Review and Assessment (17.84 MB)
19 - SMART Metrics (27.79 MB)
20 - Understand the Enterprise Architecture (53.4 MB)
21 - The Process of Acquiring New Controls (28.11 MB)
22 - Business Case and Feasibility Analaysis (30.15 MB)
23 - Management Buy In to support the Security Investment (14.84 MB)
24 - Understand the Capex Opex ROI ROSI (32.26 MB)
25 - Risk Management Overview (35.38 MB)
26 - Risk Appetite Tolerance and Capacity (40.34 MB)
27 - Risk Identification (29.31 MB)
28 - Digital Risk Protection Solutions (23.05 MB)
29 - Threat Modeling (128.31 MB)
30 - Use case Abuse Case (105.05 MB)
31 - Risk Analysis (67.9 MB)
32 - Risk Evaluation and Risk Response (98.56 MB)
33 - Risk Reporting and Monitoring (37.85 MB)
34 - OSI Model TCPIP Model (195.59 MB)
35 - Layer 47 Deep Dive (59.45 MB)
36 - Layer 3 Deep Dive (179.24 MB)
37 - Layer 2 Deep Dive (70.76 MB)
38 - Layer 1 Deep Dive (179.65 MB)
39 - Network Design and Understand Architecture of Network Security (203.75 MB)
40 - Understand Segmentation VLANs (33.85 MB)
41 - Understand NAC Dot1X (8.33 MB)
42 - Firewalls DMZ Honeypot HoneyNet (101.32 MB)
43 - IDS IPS (20.7 MB)
44 - Network Access Policies and BYOD (48.71 MB)
45 - Content Filtering (66.22 MB)
46 - VPN SSL vpn IPSEC Split Tunnel (35.77 MB)
47 - Internet Email Security Policies (51.22 MB)
48 - Securing Network Management Best Practices and Policies (57.43 MB)
49 - Wireless Security (21.71 MB)
50 - Wired Security (132.36 MB)
51 - Securing VOIP QOS (18.84 MB)
52 - ICS OT Design and Security (145.78 MB)
53 - DNS (97.07 MB)
54 - Understand the Role of IAM (60.68 MB)
55 - AAA (41.97 MB)
56 - Biometric Authentication (26.26 MB)
57 - SSO RSO (7.21 MB)
58 - Authorization (105.23 MB)
59 - Accounting (44.08 MB)
60 - Log Management (38.09 MB)
61 - Password Authentication Attacks (11.8 MB)
62 - LDAP (76.81 MB)
63 - Cloud Overview (47.31 MB)
64 - Cloud deployment Models (35.11 MB)
65 - CSAR (39.85 MB)
66 - Cloud Security (30.2 MB)
67 - Virtualization (19.16 MB)
68 - Containers (43.02 MB)
69 - SDN (151.36 MB)
70 - Storage Solutions (57.73 MB)
71 - Storage Redundancy Solutions (29.25 MB)
72 - Backup and Restore (36.56 MB)
73 - Data Backup Types (62.07 MB)
74 - Server Application Security Policies (63.32 MB)
75 - Endpoint Security Software (41.63 MB)
76 - Endpoint Security EPP (49.18 MB)
77 - Endpoint Best Practices (49.22 MB)
78 - Antimalware Measures (47.04 MB)
79 - DRM DLP (35.22 MB)
80 - DLP Advanced (34.96 MB)
81 - Asset Management (40.72 MB)
82 - Patch Management Program (17.58 MB)
83 - Configuration Management and Baselines (58.48 MB)
Screenshot
https://images2.imgbox.com/a7/3e/lPN2M1bJ_o.jpg
https://ddownload.com/tie2n2r0vm1o/Udemy_CompTIA_Advanced_Security_Practionier_CASP_plus_Exam_CAS-004.part1.rar
https://ddownload.com/2vze3f85kmzr/Udemy_CompTIA_Advanced_Security_Practionier_CASP_plus_Exam_CAS-004.part2.rar
https://ddownload.com/d0knhdqpkk45/Udemy_CompTIA_Advanced_Security_Practionier_CASP_plus_Exam_CAS-004.part3.rar
https://ddownload.com/r0mkkmyd7lz5/Udemy_CompTIA_Advanced_Security_Practionier_CASP_plus_Exam_CAS-004.part4.rar