TorBT - Torrents and Magnet Links Search Engine
Udemy - TOTAL CompTIA Security+ Certification (SY0-501)
- Date: 2025-11-29
- Size: 21 GB
- Files: 261
File Name
Size
2. Cryptography/13. Cryptographic Attacks.mp4
417 MB
1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.srt
5.3 kB
1. Risk Management/1.1 CompTIA Security (SY0-501).pdf.pdf
541 kB
1. Risk Management/2. The CIA of Security.mp4
44 MB
1. Risk Management/2. The CIA of Security.srt
5.0 kB
1. Risk Management/3. What is Risk.mp4
214 MB
1. Risk Management/3. What is Risk.srt
15 kB
1. Risk Management/4. Threat Actors.mp4
142 MB
1. Risk Management/4. Threat Actors.srt
10 kB
1. Risk Management/5. Managing Risk.mp4
256 MB
1. Risk Management/5. Managing Risk.srt
18 kB
1. Risk Management/6. Using Guides for Risk Assessment.mp4
114 MB
1. Risk Management/6. Using Guides for Risk Assessment.srt
9.4 kB
1. Risk Management/7. Security Controls.mp4
97 MB
1. Risk Management/7. Security Controls.srt
11 kB
1. Risk Management/8. Interesting Security Controls.mp4
31 MB
1. Risk Management/8. Interesting Security Controls.srt
4.7 kB
1. Risk Management/9. Defense in Depth.mp4
98 MB
1. Risk Management/9. Defense in Depth.srt
7.3 kB
1. Risk Management/10. IT Security Governance.mp4
139 MB
1. Risk Management/10. IT Security Governance.srt
12 kB
1. Risk Management/11. Security Policies.mp4
174 MB
1. Risk Management/11. Security Policies.srt
12 kB
1. Risk Management/12. Frameworks.mp4
171 MB
1. Risk Management/12. Frameworks.srt
13 kB
1. Risk Management/13. Quantitative Risk Calculations.mp4
95 MB
1. Risk Management/13. Quantitative Risk Calculations.srt
12 kB
1. Risk Management/14. Business Impact Analysis.mp4
220 MB
1. Risk Management/14. Business Impact Analysis.srt
17 kB
1. Risk Management/15. Organizing Data.mp4
218 MB
1. Risk Management/15. Organizing Data.srt
14 kB
1. Risk Management/16. Security Training.mp4
116 MB
1. Risk Management/16. Security Training.srt
14 kB
1. Risk Management/17. Third Party Agreements.mp4
104 MB
1. Risk Management/17. Third Party Agreements.srt
12 kB
1. Risk Management/18. Risk Management Quiz.html
166 B
2. Cryptography/1. Cryptography Basics.mp4
260 MB
2. Cryptography/1. Cryptography Basics.srt
24 kB
2. Cryptography/2. Cryptographic Methods.mp4
161 MB
2. Cryptography/2. Cryptographic Methods.srt
10 kB
2. Cryptography/3. Symmetric Cryptosystems.mp4
193 MB
2. Cryptography/3. Symmetric Cryptosystems.srt
193 MB
2. Cryptography/3. You Can Boost Brain Power.html
114 B
2. Cryptography/4. Symmetric Block Modes.mp4
114 MB
2. Cryptography/4. Symmetric Block Modes.srt
11 kB
2. Cryptography/5. RSA Cryptosystems.mp4
194 MB
2. Cryptography/5. RSA Cryptosystems.srt
14 kB
2. Cryptography/6. Diffie-Hellman.mp4
97 MB
2. Cryptography/6. Diffie-Hellman.srt
9.0 kB
2. Cryptography/7. PGPGPG.mp4
188 MB
2. Cryptography/7. PGPGPG.srt
14 kB
2. Cryptography/8. Hashing.mp4
106 MB
2. Cryptography/8. Hashing.srt
10 kB
2. Cryptography/9. HMAC.mp4
66 MB
2. Cryptography/9. HMAC.srt
4.9 kB
2. Cryptography/10. Steganography.mp4
79 MB
2. Cryptography/10. Steganography.srt
8.3 kB
2. Cryptography/11. Certificates and Trust.mp4
279 MB
2. Cryptography/11. Certificates and Trust.srt
21 kB
2. Cryptography/12. Public Key Infrastructure.mp4
320 MB
2. Cryptography/12. Public Key Infrastructure.srt
33 kB
1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.mp4
75 MB
2. Cryptography/13. Cryptographic Attacks.srt
36 kB
2. Cryptography/14. Cryptography Quiz.html
166 B
3. Identity and Access Management/1. Identification.mp4
261 MB
3. Identity and Access Management/1. Identification.srt
20 kB
3. Identity and Access Management/2. Authorization Concepts.mp4
116 MB
3. Identity and Access Management/2. Authorization Concepts.srt
8.4 kB
3. Identity and Access Management/3. Access Control List.mp4
68 MB
3. Identity and Access Management/3. Access Control List.srt
9.0 kB
3. Identity and Access Management/4. Password Security.mp4
160 MB
3. Identity and Access Management/4. Password Security.srt
14 kB
3. Identity and Access Management/5. Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html
84 B
3. Identity and Access Management/5. Linux File Permissions.mp4
191 MB
3. Identity and Access Management/5. Linux File Permissions.srt
22 kB
3. Identity and Access Management/6. Windows File Permissions.mp4
221 MB
3. Identity and Access Management/6. Windows File Permissions.srt
20 kB
3. Identity and Access Management/7. User Account Management.mp4
143 MB
3. Identity and Access Management/7. User Account Management.srt
9.8 kB
3. Identity and Access Management/8. AAA.mp4
171 MB
3. Identity and Access Management/8. AAA.srt
12 kB
3. Identity and Access Management/9. Authentication Methods.mp4
206 MB
3. Identity and Access Management/9. Authentication Methods.srt
206 MB
3. Identity and Access Management/10. Single Sign-On.mp4
172 MB
3. Identity and Access Management/10. Single Sign-On.srt
15 kB
3. Identity and Access Management/11. Identity and Access Management Quiz.html
166 B
4. Tools of the Trade/1. OS Utilities, Part 1.mp4
248 MB
4. Tools of the Trade/1. OS Utilities, Part 1.srt
21 kB
4. Tools of the Trade/2. OS Utilities, Part 2.mp4
211 MB
4. Tools of the Trade/2. OS Utilities, Part 2.srt
20 kB
4. Tools of the Trade/3. Network Scanners.mp4
165 MB
4. Tools of the Trade/3. Network Scanners.srt
16 kB
4. Tools of the Trade/4. Protocol Analyzers.mp4
185 MB
4. Tools of the Trade/4. Protocol Analyzers.srt
15 kB
4. Tools of the Trade/5. SNMP.mp4
204 MB
4. Tools of the Trade/5. SNMP.srt
22 kB
4. Tools of the Trade/6. Logs.mp4
126 MB
4. Tools of the Trade/6. Logs.srt
16 kB
4. Tools of the Trade/7. Tools of the Trade Quiz.html
166 B
5. Securing Individual Systems/1. Denial of Service.mp4
116 MB
5. Securing Individual Systems/1. Denial of Service.srt
13 kB
5. Securing Individual Systems/2. Host Threats.mp4
187 MB
5. Securing Individual Systems/2. Host Threats.srt
13 kB
5. Securing Individual Systems/3. Man-in-the-Middle.mp4
410 MB
5. Securing Individual Systems/3. Man-in-the-Middle.srt
33 kB
5. Securing Individual Systems/4. System Resiliency.mp4
191 MB
5. Securing Individual Systems/4. System Resiliency.srt
17 kB
5. Securing Individual Systems/5. RAID.mp4
154 MB
5. Securing Individual Systems/5. RAID.srt
154 MB
5. Securing Individual Systems/6. NAS and SAN.mp4
266 MB
5. Securing Individual Systems/6. NAS and SAN.srt
22 kB
5. Securing Individual Systems/7. Physical Hardening.mp4
138 MB
5. Securing Individual Systems/7. Physical Hardening.srt
11 kB
5. Securing Individual Systems/8. RFI, EMI and ESD.mp4
33 MB
5. Securing Individual Systems/8. RFI, EMI and ESD.srt
4.2 kB
5. Securing Individual Systems/9. Host Hardening.mp4
335 MB
5. Securing Individual Systems/9. Host Hardening.srt
25 kB
5. Securing Individual Systems/10. Data and System Security.mp4
77 MB
5. Securing Individual Systems/10. Data and System Security.srt
77 MB
5. Securing Individual Systems/11. Disk Encryption.mp4
133 MB
5. Securing Individual Systems/11. Disk Encryption.srt
9.2 kB
5. Securing Individual Systems/12. HardwareFirmware Security.mp4
190 MB
5. Securing Individual Systems/12. HardwareFirmware Security.srt
14 kB
5. Securing Individual Systems/13. Secure OS Types.mp4
168 MB
5. Securing Individual Systems/13. Secure OS Types.srt
11 kB
5. Securing Individual Systems/14. Securing Peripherals.mp4
242 MB
5. Securing Individual Systems/14. Securing Peripherals.srt
17 kB
5. Securing Individual Systems/15. Malware.mp4
215 MB
5. Securing Individual Systems/15. Malware.srt
14 kB
5. Securing Individual Systems/16. Analyzing Output.mp4
298 MB
5. Securing Individual Systems/16. Analyzing Output.srt
22 kB
5. Securing Individual Systems/17. IDS and IPS.mp4
95 MB
5. Securing Individual Systems/17. IDS and IPS.srt
6.0 kB
5. Securing Individual Systems/18. Automation Strategies.mp4
104 MB
5. Securing Individual Systems/18. Automation Strategies.srt
7.1 kB
5. Securing Individual Systems/19. Data Destruction.mp4
104 MB
5. Securing Individual Systems/19. Data Destruction.srt
6.6 kB
5. Securing Individual Systems/20. Securing Individual Systems Quiz.html
166 B
6. The Basic LAN/1. LAN Review.mp4
120 MB
6. The Basic LAN/1. LAN Review.srt
11 kB
6. The Basic LAN/2. Network Topologies Review.mp4
62 MB
6. The Basic LAN/2. Network Topologies Review.srt
6.8 kB
6. The Basic LAN/3. Network Zone Review.mp4
125 MB
6. The Basic LAN/3. Network Zone Review.srt
125 MB
6. The Basic LAN/4. Network Access Controls.mp4
159 MB
6. The Basic LAN/4. Network Access Controls.srt
15 kB
6. The Basic LAN/5. The Network Firewall.mp4
191 MB
6. The Basic LAN/5. The Network Firewall.srt
19 kB
6. The Basic LAN/6. Proxy Servers.mp4
212 MB
6. The Basic LAN/6. Proxy Servers.srt
18 kB
6. The Basic LAN/7. Honeypots.mp4
81 MB
6. The Basic LAN/7. Honeypots.srt
6.1 kB
6. The Basic LAN/8. Virtual Private Networks.mp4
180 MB
6. The Basic LAN/8. Virtual Private Networks.srt
20 kB
6. The Basic LAN/9. IPSec.mp4
210 MB
6. The Basic LAN/9. IPSec.srt
16 kB
6. The Basic LAN/10. NIDSNIPS.mp4
115 MB
6. The Basic LAN/10. NIDSNIPS.srt
8.2 kB
6. The Basic LAN/11. SIEM.mp4
139 MB
6. The Basic LAN/11. SIEM.srt
11 kB
6. The Basic LAN/12. The Basic LAN Quiz.html
166 B
6. The Basic LAN/Seagate Portable.html
84 B
7. Beyond the Basic LAN/1. Wireless Review.mp4
173 MB
7. Beyond the Basic LAN/1. Wireless Review.srt
13 kB
7. Beyond the Basic LAN/2. Living in Open Networks.mp4
175 MB
7. Beyond the Basic LAN/2. Living in Open Networks.srt
14 kB
7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.mp4
136 MB
7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.srt
10 kB
7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.mp4
217 MB
7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.srt
15 kB
7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.mp4
186 MB
7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.srt
11 kB
7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.mp4
196 MB
7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.srt
14 kB
7. Beyond the Basic LAN/7. Wireless Hardening.mp4
272 MB
7. Beyond the Basic LAN/7. Wireless Hardening.srt
272 MB
7. Beyond the Basic LAN/8. Wireless Access Points.mp4
277 MB
7. Beyond the Basic LAN/8. Wireless Access Points.srt
19 kB
7. Beyond the Basic LAN/9. Virtualization Basics.mp4
139 MB
7. Beyond the Basic LAN/9. Virtualization Basics.srt
11 kB
7. Beyond the Basic LAN/10. Virtual Security.mp4
255 MB
7. Beyond the Basic LAN/10. Virtual Security.srt
22 kB
7. Beyond the Basic LAN/11. Containers.mp4
176 MB
7. Beyond the Basic LAN/11. Containers.srt
17 kB
7. Beyond the Basic LAN/12. IaaS.mp4
149 MB
7. Beyond the Basic LAN/12. IaaS.srt
14 kB
7. Beyond the Basic LAN/13. PaaS.mp4
134 MB
7. Beyond the Basic LAN/13. PaaS.srt
132 MB
7. Beyond the Basic LAN/14. SaaS.mp4
54 MB
7. Beyond the Basic LAN/14. SaaS.srt
3.6 kB
7. Beyond the Basic LAN/15. Deployment Models.mp4
141 MB
7. Beyond the Basic LAN/15. Deployment Models.srt
20 MB
7. Beyond the Basic LAN/16. Static Hosts.mp4
142 MB
7. Beyond the Basic LAN/16. Static Hosts.srt
142 MB
7. Beyond the Basic LAN/17. Mobile Connectivity.mp4
256 MB
7. Beyond the Basic LAN/17. Mobile Connectivity.srt
16 kB
7. Beyond the Basic LAN/18. Deploying Mobile Devices.mp4
79 MB
7. Beyond the Basic LAN/18. Deploying Mobile Devices.srt
7.4 kB
7. Beyond the Basic LAN/19. Mobile Enforcement.mp4
266 MB
7. Beyond the Basic LAN/19. Mobile Enforcement.srt
18 kB
7. Beyond the Basic LAN/20. Mobile Device Management.mp4
125 MB
7. Beyond the Basic LAN/20. Mobile Device Management.srt
15 kB
7. Beyond the Basic LAN/21. Physical Controls.mp4
176 MB
7. Beyond the Basic LAN/21. Physical Controls.srt
12 kB
7. Beyond the Basic LAN/22. HVAC.mp4
135 MB
7. Beyond the Basic LAN/22. HVAC.srt
10 kB
7. Beyond the Basic LAN/23. Fire Suppression.mp4
73 MB
7. Beyond the Basic LAN/23. Fire Suppression.srt
5.7 kB
7. Beyond the Basic LAN/24. Beyond the Basic LAN Quiz.html
166 B
8. Secure Protocols/1. Secure Applications and Protocols.mp4
192 MB
8. Secure Protocols/1. Secure Applications and Protocols.srt
192 MB
8. Secure Protocols/2. Network Models.mp4
148 MB
8. Secure Protocols/2. Network Models.srt
11 kB
8. Secure Protocols/3. Know Your Protocols - TCPIP.mp4
132 MB
8. Secure Protocols/3. Know Your Protocols - TCPIP.srt
8.4 kB
8. Secure Protocols/4. Know Your Protocols - Applications.mp4
49 MB
8. Secure Protocols/4. Know Your Protocols - Applications.srt
7.5 kB
8. Secure Protocols/5. Transport Layer Security (TLS).mp4
196 MB
8. Secure Protocols/5. Transport Layer Security (TLS).srt
196 MB
8. Secure Protocols/6. Internet Service Hardening.mp4
79 MB
8. Secure Protocols/6. Internet Service Hardening.srt
9.0 kB
8. Secure Protocols/7. Protecting Your Servers.mp4
87 MB
8. Secure Protocols/7. Protecting Your Servers.srt
8.6 kB
8. Secure Protocols/8. Secure Code Development.mp4
182 MB
8. Secure Protocols/8. Secure Code Development.srt
15 kB
8. Secure Protocols/9. Secure Deployment Concepts.mp4
223 MB
8. Secure Protocols/9. Secure Deployment Concepts.srt
17 kB
8. Secure Protocols/10. Code Quality and Testing.mp4
103 MB
8. Secure Protocols/10. Code Quality and Testing.srt
7.3 kB
8. Secure Protocols/11. Secure Protocols Quiz.html
166 B
9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.mp4
160 MB
9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.srt
14 kB
9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.mp4
100 MB
9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.srt
6.8 kB
9. Testing Your Infrastructure/3. Social Engineering Principles.mp4
40 MB
9. Testing Your Infrastructure/3. Social Engineering Principles.srt
2.8 kB
9. Testing Your Infrastructure/4. Social Engineering Attacks.mp4
132 MB
9. Testing Your Infrastructure/4. Social Engineering Attacks.srt
11 kB
9. Testing Your Infrastructure/5. Attacking Web Sites.mp4
91 MB
9. Testing Your Infrastructure/5. Attacking Web Sites.srt
12 kB
9. Testing Your Infrastructure/6. Attacking Applications.mp4
182 MB
9. Testing Your Infrastructure/6. Attacking Applications.srt
15 kB
9. Testing Your Infrastructure/7. Exploiting a Target.mp4
168 MB
9. Testing Your Infrastructure/7. Exploiting a Target.srt
15 kB
9. Testing Your Infrastructure/8. Vulnerability Impact.mp4
237 MB
9. Testing Your Infrastructure/8. Vulnerability Impact.srt
16 kB
9. Testing Your Infrastructure/9. Testing Your Infrastructure Quiz.html
166 B
9. Testing Your Infrastructure/Alfa AWUS036NHA 150Mbps Wireless USB Adaptor.html
84 B
9. Testing Your Infrastructure/Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter.html
84 B
9. Testing Your Infrastructure/Panda Wireless PAU06 300Mbps N USB Adapter.html
84 B
10. Dealing with Incidents/1. Incident Response.mp4
48 MB
10. Dealing with Incidents/1. Incident Response.srt
9.0 kB
10. Dealing with Incidents/2. Digital Forensics.mp4
168 MB
10. Dealing with Incidents/2. Digital Forensics.srt
17 kB
10. Dealing with Incidents/3. Contingency Planning.mp4
165 MB
10. Dealing with Incidents/3. Contingency Planning.srt
16 kB
10. Dealing with Incidents/4. Backups.mp4
91 MB
10. Dealing with Incidents/4. Backups.srt
12 kB
10. Dealing with Incidents/5. Dealing with Incidents Quiz.html
166 B
10. Dealing with Incidents/Defense against the Black Arts.html
84 B
10. Dealing with Incidents/hackers bags.html
84 B