TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - Master CompTIA Security + (SY0-701) with Real-World Practice
- Date: 2026-03-23
- Size: 196 MB
- Files: 305
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/1 - The CIA Triad Mastering Confidentiality, Integrity, and Availability.mp4
60 MB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/2 - The CIA Triad The Unbreakable Pillars of Information Security.html
24 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/3 - Non-Repudiation The Digital Fingerprint of Accountability.html
23 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/3 - The DAD Triad A Hacker's Strategic Objectives.html
23 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/3 - The DAD Triad Thinking Like a Hacker (Security+ SYO-701).mp4
60 MB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Defense-in-Depth Layering Security.html
74 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Deterrent & Physical Security.html
63 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Fine-Tuning Security Scoping, Tailoring, and Compensating Controls.html
48 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Mind the Gap The Art and Science of Gap Analysis.html
32 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Navigating the NIST Cybersecurity Framework An Introduction.html
26 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Preventive Security Controls.html
55 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Strategic Cybersecurity Synthesis.html
70 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Technical, Operational, and Managerial Controls.html
44 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The C-Suite Guardian Understanding the CISO.html
88 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Clean-Up Crew Understanding Corrective and Recovery Controls.html
51 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The First Responders A Deep Dive into the Cyber Incident Response Team (CIRT).html
86 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Five Functions of the NIST Cybersecurity Framework In-Depth A Practical.html
56 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Human Element Security Roles, Responsibilities, and Policies.html
42 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Rise of DevSecOps Shifting Security to the Left.html
76 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Security Operations Center (SOC).html
63 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - The Silent Watchers Mastering Detective Controls.html
55 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/4 - Understanding Security Control Objectives.html
42 kB
~Get Your Files Here !/1 - The Bedrock of Cybersecurity Fundamental Concepts/6 - The NIST Cybersecurity Framework A Strategic Blueprint for Risk Management.mp4
56 MB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - A Deep Dive into RAID Disk Redundancy for Data Protection.html
69 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Active Defense Honeypots, Honeynets, and Honeyfiles.html
66 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Advanced Deception DNS Sinkholes.html
75 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Advanced Drive Sanitization.html
62 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Advanced Memory Exploits Null Pointer Dereferencing & Race Conditions.html
68 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Air Gaps & Protected Distribution Systems (PDS).html
80 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Buffer & Integer Overflows.html
73 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Building Fault Tolerance The Principle of Redundancy.html
67 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Building a Resilient & Secure Facility.html
74 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Cataloging a World of Flaws CVE and the CVSS Scoring System.html
85 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Cloud Elasticity Dynamic System Scaling.html
66 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - DNS Sinkholing & Deception Tactics.html
67 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Data Center Environmental Controls.html
63 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Data Recovery and Carving.html
79 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Data Replication Synchronous vs. Asynchronous.html
69 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Digital Forensics Fundamentals.html
64 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Finding the Flaws Vulnerability Scanning.html
66 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Fire Detection & Suppression.html
66 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Hijacking Legitimate Processes.html
68 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Interpreting Vulnerability Scan Results.html
64 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Legal Concepts Due Process & Legal Holds.html
60 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Live System Snapshots VSS.html
63 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Locks and Gateways.html
54 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Mastering High Availability and Scalability.html
57 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Mobile Freedom & Risk Sideloading, Rooting, and Jailbreaking.html
64 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Modern Physical Threats Juice-Jacking & Malicious USBs.html
56 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Physical Access Attacks Card Cloning and Skimming.html
34 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Physical Intrusion Detection Systems.html
69 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Physical Security The Human Element.html
64 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Real-World Patch Management.html
76 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Redundancy in Practice Power and Network.html
54 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Resource Exhaustion & Memory Leaks.html
60 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - STIX and TAXII Threat Intelligence Sharing.html
57 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Configuration Guides.html
62 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Data Destruction Physical Methods.html
57 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Data Destruction Software-Based Sanitization.html
67 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Secure Site Architecture.html
59 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Security Architecture Diversity.html
50 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Site Resiliency Alternate Processing Sites.html
34 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Art of Hardening From Defaults to Defenses.html
71 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Chain of Custody Preserving Evidence Integrity.html
58 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Ephemeral System Non-Persistence.html
75 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Forensic Investigation Process From Acquisition to Reporting.html
77 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Inner Sanctum Securing Server Rooms and Data Centers.html
65 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Order of Restoration.html
89 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Patch Management Process.html
76 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - The Threat Intelligence Lifecycle.html
60 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Title Backup Strategy & Resiliency The 3-2-1 Rule.html
55 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Vulnerability Disclosure Models.html
61 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Vulnerability Management Lifecycle.html
88 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Weak Host & Network Configurations.html
60 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Wi-Fi Security WPA2 vs. WPA3.html
59 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Zero Trust Architecture (ZTA).html
61 kB
~Get Your Files Here !/10 - Building for Failure Resiliency and Site Security/1 - Zero-Days & Bug Bounties.html
60 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Building a Layered Network Defense.html
53 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Controlling User Behavior Content and URL Filtering.html
56 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Dynamic VLAN Assignment with NAC.html
67 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Enterprise Wi-Fi Authentication A Deep Dive into PEAP.html
61 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Enterprise Wi-Fi Security.html
73 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Hardening Endpoints Least Functionality.html
70 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Host-Based Intrusion Protection.html
62 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Network Access Control Agent vs. Agentless.html
74 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - RADIUS Federation Extending Trust.html
64 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Active Blocker Network-Based Intrusion Prevention Systems (IPS).html
72 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Digital Gatekeeper Network Access Control (NAC).html
76 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Evolution of the Firewall Next-Generation Firewalls (NGFW).html
61 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - The Silent Sentry Network-Based Intrusion Detection Systems (NIDS).html
63 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Unified Threat Management (UTM).html
59 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Web Application Firewalls (WAFs).html
66 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Wi-Fi Attacks Rogue APs & Evil Twins.html
47 kB
~Get Your Files Here !/11 - The Network Guardian Evaluating Network Security Capabilities/1 - Wi-Fi Denial-of-Service Attacks.html
61 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Advanced Endpoint Sandboxing.html
65 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Endpoint Protection Evolution.html
73 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Endpoint Security Program Design.html
72 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Endpoint Segmentation & Isolation.html
69 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - MDM vs. MAM Securing Mobile Endpoints.html
61 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Access Security.html
56 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Connectivity Security.html
65 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Data Protection.html
60 kB
~Get Your Files Here !/12 - The Last Line of Defense Assessing Endpoint Security Capabilities Article 271/1 - Mobile Device Deployment Models.html
61 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Building a Secure Software Development Lifecycle (SSDLC).html
84 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Dead & Unreachable Code.html
75 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Component Vulnerabilities.html
57 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Data Exposure & Error Handling.html
76 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Input Validation.html
64 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Normalization & Output Encoding.html
71 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Secure Coding Server-Side vs. Client-Side Validation.html
72 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Securing the Domain Name System.html
74 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Static Code Analysis.html
75 kB
~Get Your Files Here !/13 - The Application Layer Enhancing Application Security Capabilities Applications/1 - Using HTTP Headers for Security.html
68 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Course Capstone A Day in the Life.html
61 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Digital Forensics The Order of Volatility.html
67 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Incident Response Lifecycle.html
89 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Indicators of Compromise (IOCs).html
66 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Malware Analysis Viruses & Worms.html
71 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Modern Evasive Malware.html
60 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Security Governance Regulations, Standards, and Legislation.html
62 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - The Hacker's Playbook Tactics, Techniques, & Procedures (TTPs).html
84 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - The Risk Management Process From Identification to Mitigation.html
66 kB
~Get Your Files Here !/14 - Beyond The Complete Picture/1 - Understanding Injection Attacks.html
76 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Anatomy of an Attacker.html
67 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Attack Vectors.html
58 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Cybercrime Syndicates.html
48 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Deconstructing the Insider Threat.html
60 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Hacking with a Cause The World of Hacktivism.html
59 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Network-Based Vectors Unsecure Protocols and Open Ports.html
57 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Phishing Epidemic Exploiting Trust via Email.html
79 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Remote vs. Local Exploits Understanding the Proximity of Attack.html
48 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Removable Media Drop Attacks.html
61 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - State Actors & Advanced Persistent Threats (APTs).html
69 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Digital Battlefield Defining and Reducing the Attack Surface.html
53 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Integration Challenge Security Risks in System Integration.html
65 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Spectrum of Hackers Motivations & Methodologies.html
71 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Supply Chain Attack When Trust Becomes a Weapon.html
59 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Threat Landscape Structured vs. Unstructured.html
60 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - The Trojan Horse Malicious Payloads.html
67 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Third-Party Data Risks.html
88 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Threat Intelligence Proactive Defense.html
66 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Unmasking Insider Threats Specific Profiles and Mitigation.html
47 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Unsupported Systems & Perpetual Risk.html
69 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Vendor Management Vetting Your Third-Party Risks.html
68 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Vulnerability, Threat, and Risk Decoding the Terminology.html
58 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Vulnerability, Threat, and Risk.html
71 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Weaponized Documents Malware Hidden in Plain Sight.html
52 kB
~Get Your Files Here !/2 - Know Your Enemy Threat Actors, Vectors, and Intelligence/1 - Zero-Click Exploits.html
64 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Advanced Web Deception.html
60 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Attack Vector Analysis.html
78 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Baiting and Credential Harvesting.html
86 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Building a Threat Model.html
79 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Influence Campaigns & Hybrid Warfare.html
66 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Physical Intrusion Tactics.html
52 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Precision Social Engineering.html
55 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Securing Data Flows Across Trust Boundaries.html
69 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - The Direct Access Vector.html
61 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - The Incident Response Process.html
73 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - The Risk Equation A Practical Application.html
72 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - The Wireless Attack Vector Dangers in the Air.html
78 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Threat Intelligence & Risk Management.html
70 kB
~Get Your Files Here !/3 - Know Your Enemy/1 - Vishing & Smishing Attacks.html
69 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Asymmetric Encryption Public & Private Keys.html
66 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Cryptography Fundamentals Plaintext, Ciphertext and Ciphers.html
60 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Decoding the Cipher Suite.html
76 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Digital Signatures Verifying Trust.html
55 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Hashing Algorithms The Foundation of Data Integrity.html
60 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Public Key Infrastructure (PKI).html
69 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Stream Ciphers vs. Block Ciphers.html
61 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Supply Chain Attacks.html
68 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - Symmetric Encryption The Workhorse of Bulk Data Protection.html
56 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - The Art of Obscurity Substitution and Transposition Ciphers.html
64 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - The Birthday Attack Exploiting Hash Collisions.html
63 kB
~Get Your Files Here !/4 - The Language of Secrecy Cryptographic Solutions/1 - The Power of Asymmetric Keys Authentication and Key Exchange.html
72 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Advanced Certificate Concepts Stapling and Pinning.html
74 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Advanced Password Protection Key Stretching.html
82 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Anatomy of a Digital Certificate X.509 Deep Dive.html
85 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Behavioral Biometrics How You Act is Who You Are.html
65 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Beyond the Pillars Advanced Authentication Attributes.html
63 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Biometric Accuracy Metrics.html
60 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Blockchain & Distributed Ledgers.html
95 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Certificate Renewal vs. Rekeying.html
77 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Certificate Revocation Mechanisms.html
65 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Certificate Revocation.html
58 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Cryptography for Confidentiality.html
72 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Cryptography for Data Integrity.html
66 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Digital Certificate Validation & Types.html
67 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Digital Certificates Common Name (CN) vs. Subject Alternative Name (SAN).html
63 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Hiding in Plain Sight The Art of Steganography.html
59 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Homomorphic Encryption The Holy Grail of Data Privacy.html
69 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Identity & Access Management (IAM).html
82 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Identity and Access Management (IAM).html
73 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Key Escrow The Break Glass Procedure.html
64 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Multi-Factor Authentication (MFA) Raising the Bar for Attackers.html
78 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - PKI Trust Models.html
57 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Password Salting Deep Dive.html
69 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Physical Biometric Recognition.html
75 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - Securing the Keys to the Kingdom Online vs. Offline Root CAs.html
63 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - The Cryptographic Key Lifecycle.html
88 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - The PKI Workflow RAs and CSRs.html
71 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - The Science of You An Introduction to Biometric Authentication.html
74 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - The Three Pillars of Authentication.html
65 kB
~Get Your Files Here !/5 - The Language of Secrecy/1 - The Web of Trust Decentralized Identity Verification.html
65 kB
~Get Your Files Here !/6 - Who Goes There/1 - A Deep Dive into Kerberos.html
77 kB
~Get Your Files Here !/6 - Who Goes There/1 - Access Control Models DAC & RBAC.html
69 kB
~Get Your Files Here !/6 - Who Goes There/1 - Access Control Models Discretionary Access Control (DAC).html
57 kB
~Get Your Files Here !/6 - Who Goes There/1 - Account Control Lockout vs. Disablement Policies.html
66 kB
~Get Your Files Here !/6 - Who Goes There/1 - Beyond the Perimeter Federated Identity and Trust.html
68 kB
~Get Your Files Here !/6 - Who Goes There/1 - Directory Schema & Distinguished Names.html
53 kB
~Get Your Files Here !/6 - Who Goes There/1 - Enterprise Directory Services.html
75 kB
~Get Your Files Here !/6 - Who Goes There/1 - Enterprise Password Management.html
73 kB
~Get Your Files Here !/6 - Who Goes There/1 - Ephemeral Credentials.html
69 kB
~Get Your Files Here !/6 - Who Goes There/1 - Geolocation Access Controls.html
73 kB
~Get Your Files Here !/6 - Who Goes There/1 - Just-in-Time (JIT) & Zero Standing Privileges (ZSP).html
70 kB
~Get Your Files Here !/6 - Who Goes There/1 - Just-in-Time Access Temporary Elevation.html
86 kB
~Get Your Files Here !/6 - Who Goes There/1 - Linux File Permissions.html
67 kB
~Get Your Files Here !/6 - Who Goes There/1 - Linux Local Authentication Mastering passwd, shadow, and PAM.html
84 kB
~Get Your Files Here !/6 - Who Goes There/1 - Modern Authentication OAuth and REST APIs.html
72 kB
~Get Your Files Here !/6 - Who Goes There/1 - Password Vaulting and Brokering.html
65 kB
~Get Your Files Here !/6 - Who Goes There/1 - Practical IAM Threats Spoofing & Escalation.html
64 kB
~Get Your Files Here !/6 - Who Goes There/1 - Privileged Access Management (PAM).html
88 kB
~Get Your Files Here !/6 - Who Goes There/1 - Remote Authentication Securing Access.html
91 kB
~Get Your Files Here !/6 - Who Goes There/1 - Rule-Based Access Control.html
63 kB
~Get Your Files Here !/6 - Who Goes There/1 - Seamless Access Single Sign-On (SSO) and Kerberos.html
80 kB
~Get Your Files Here !/6 - Who Goes There/1 - Securing Digital Identity Account Attributes and Profiles.html
132 kB
~Get Your Files Here !/6 - Who Goes There/1 - The Fortress Workstation Secure Administrative Workstations (SAWs).html
70 kB
~Get Your Files Here !/6 - Who Goes There/1 - The Future of Access Control Attribute-Based Access Control (ABAC).html
52 kB
~Get Your Files Here !/6 - Who Goes There/1 - The High-Security Model Mandatory Access Control (MAC).html
71 kB
~Get Your Files Here !/6 - Who Goes There/1 - The Password Policy Paradox From Complexity to Clarity.html
61 kB
~Get Your Files Here !/6 - Who Goes There/1 - Time-Based Access Controls.html
93 kB
~Get Your Files Here !/6 - Who Goes There/1 - Traditional Password Policies.html
56 kB
~Get Your Files Here !/6 - Who Goes There/1 - Watching for Trouble Account and Usage Auditing.html
80 kB
~Get Your Files Here !/6 - Who Goes There/1 - Windows Authentication Local vs. Network.html
69 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Advanced Switch Security DHCP Snooping.html
67 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Cloud Security Posture Management (CSPM).html
64 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Data Center Traffic North-South vs. East-West.html
69 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Designing for Failure Fail-Open vs. Fail-Closed.html
64 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Hardening the Switch Port Security.html
68 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Layer 2 Attacks Deception and Interception.html
72 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Hardware Fundamentals.html
71 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Security Cornerstones Firewalls, Load Balancers, & DNS.html
69 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Segmentation & Segregation.html
65 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Network Visibility SPAN vs. TAP.html
58 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Overwhelming the Switch MAC Flooding Attacks.html
61 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Security Device Attributes.html
81 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Strategic Control Placement Defense-in-Depth.html
67 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - The Buffer Zone A Deep Dive into the Demilitarized Zone (DMZ).html
61 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - The Zero Trust Revolution Principles and Microsegmentation.html
66 kB
~Get Your Files Here !/7 - The Digital Fortress Secure Enterprise Network Architecture The Building Block/1 - Understanding Network Zones.html
63 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Address Resolution Protocol (ARP).html
74 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Advanced Email Security DomainKeys Identified Mail (DKIM).html
78 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Advanced Email Security Sender Policy Framework (SPF).html
57 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Architecting a Secure Network from Scratch.html
52 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - DMARC Advanced Email Security.html
67 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Firewall 101 Stateless Packet Filtering.html
57 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Firewall Implementations and Architectures.html
66 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Hands-On with Firewalls Understanding iptables in Linux.html
79 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Hijacking the Path Routing Protocol Exploitation.html
69 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - IPSec Modes of Operation Transport vs. Tunnel Mode.html
53 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - IPsec Network Layer Security.html
67 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Layer 3 Protocols A Deep Dive into Internet Protocol (IP).html
80 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Network Time Security.html
41 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Out-of-Band Management The Secure Backdoor.html
64 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing Directory Services with LDAPS.html
68 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing Email Protocols.html
60 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing File Transfers SFTP vs. FTPS.html
51 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing Remote Access An Introduction to VPNs.html
64 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Securing the Network Map.html
49 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - Stateful Inspection Firewalls.html
75 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The Command Line Guardian An Introduction to Secure Shell (SSH).html
90 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The IPsec Handshake Understanding Internet Key Exchange (IKE).html
72 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The Role of Proxies and Gateways in Network Security.html
60 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - The Secure Email Gateway A Centralized Defense.html
55 kB
~Get Your Files Here !/8 - The Digital Fortress (Continued)/1 - VPN Client Configuration Always-On, Split Tunnel, and Full Tunnel.html
54 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - API Architectures SOAP vs. REST.html
59 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Advanced Cloud Networking VPC Endpoints.html
82 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - CASB Deployment Models.html
66 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cellular IoT Security.html
102 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Automation and Orchestration.html
64 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Deployment Models.html
64 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Legal & Risk Landscape.html
74 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Service Models IaaS, PaaS, and SaaS.html
49 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Cloud Storage Resiliency.html
62 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Designing a Secure Cloud Environment.html
82 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - IaC Security.html
45 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Immutable Systems.html
70 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Microservices and Serverless Architectures.html
84 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Outsourcing Security MSSPs & SECaaS.html
63 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Pushing Compute to the Network's Edge.html
65 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - SCADA Systems Security.html
64 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Securing Cloud Traffic.html
66 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Securing Embedded Systems.html
66 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Securing Operational Technology (OT) and Industrial Control Systems (ICS).html
76 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Cloud Responsibility Matrix.html
60 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Cloud Security Gatekeeper Cloud Access Security Brokers (CASB).html
76 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Core Principles of Zero Trust.html
68 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Critical Hand-Off The Shared Responsibility Model.html
63 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The IaC Principle of Idempotence.html
71 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - The Internet of Things (IoT) Security.html
59 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Virtual Private Clouds (VPCs).html
68 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Zero Trust Architecture.html
35 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Zero Trust Challenges & Disadvantages.html
65 kB
~Get Your Files Here !/9 - The Modern Perimeter Secure Cloud Network Architecture/1 - Zero Trust Data and Control Planes.html
74 kB
~Get Your Files Here !/Bonus Resources.txt
70 B