Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    https://sophisticatedspectra.com/article/drosia-serenity-a-modern-oasis-in-the-heart-of-larnaca.2521391.html

    DROSIA SERENITY
    A Premium Residential Project in the Heart of Drosia, Larnaca

    ONLY TWO FLATS REMAIN!

    Modern and impressive architectural design with high-quality finishes Spacious 2-bedroom apartments with two verandas and smart layouts Penthouse units with private rooftop gardens of up to 63 m² Private covered parking for each apartment Exceptionally quiet location just 5–8 minutes from the marina, Finikoudes Beach, Metropolis Mall, and city center Quick access to all major routes and the highway Boutique-style building with only 8 apartments High-spec technical features including A/C provisions, solar water heater, and photovoltaic system setup.
    Whether for living or investment, this is a rare opportunity in a strategic and desirable location.

    Comptia Security+ Sy0-007 - 2025 (Labs Pending)

    Posted By: ELK1nG
    Comptia Security+ Sy0-007 - 2025 (Labs Pending)

    Comptia Security+ Sy0-007 - 2025 (Labs Pending)
    Published 6/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.06 GB | Duration: 13h 41m

    Over 380 bite-sized lectures to help YOU pass the Security+ exam!

    What you'll learn

    Prepare for the CompTIA Security+ Exam

    Learn cybersecurity theory

    (Pending) Learn common cybersecurity defensive techniques

    (Pending) Learn common cybersecurity hacking techniques

    Requirements

    CompTIA A+ and CompTIA Network+ recommended, but not required

    Description

    So you want a career in cybersecurity, and you've found yourself at the Security+ exam. Perhaps you're studying for a degree, a job requirement, or just out of curiosityRegardless, you've come to the right place!The CompTIA Security+ exam covers the fundamentals of cybersecurity - both defensive and offensive security skills - that start all the way at the Help Desk level and will stay with you your entire cybersecurity journeyThis course possesses over 380 lectures (almost 14 hours of content) and is constantly being updated with new cybersecurity labs to help YOU pass your Security+ exam!With the IT Cert Doctor you will learn all of the CompTIA Security+ SYO-701 objectives, including:Simple diagrams demonstrating essential cybersecurity conceptsFundamental cybersecurity conceptsThe differences between defensive and offensive cybersecurity skillsFundamental concepts in Risk Management security advisoryFundamental skills in cryptographyHow to identify threat actors, threat vectors, and vulnerabilitiesHow to mitigate common threatsHow to recognize common Indicators of CompromiseFundamental best practices for implementing cybersecurity architectureFundamental best practices for implementing networking security architectureFundamental concepts for security operationsFundamental skills in Linux administrationFundamental skills in Windows administrationFundamental skills in Virtualization softwareFundamental skills in networking administration

    Overview

    Section 1: Introduction & Prerequisites

    Lecture 1 LABS IN PROGRESS

    Lecture 2 [PPT] Knowledge Pre-Requisites

    Lecture 3 [PPT] About This Security+ Course

    Lecture 4 [PPT] [LAB] Security+ PBQ (Performance Based Questions) Tips

    Lecture 5 [PPT] COURSE WARNING!

    Lecture 6 [PPT] Security+ Exam Tips

    Lecture 7 [PPT] What is Heuristics?

    Section 2: Course Prerequisites: VirtualBox

    Lecture 8 VirtualBox labs in progress

    Section 3: Course Prerequisites: Misc. Software

    Lecture 9 [LAB] How to Install Putty

    Lecture 10 [LAB] How to Install Filezilla

    Lecture 11 [LAB] How to Install Wireshark on Windows

    Lecture 12 [LAB] How to Install Wireshark on Linux

    Lecture 13 [LAB] Using AI to Study for Free!!!

    Section 4: Course Prerequisites: SOHO Router

    Lecture 14 Purchasing a SOHO Router

    Lecture 15 [LAB] SOHO Router: Unboxing

    Lecture 16 [LAB] SOHO Router: Physical Setup

    Lecture 17 [LAB] SOHO Router: Initial Configuration

    Lecture 18 [LAB] SOHO Router: Factory Reset

    Section 5: Course Prerequisites: Cisco's Packet Tracer & Cisco IOS

    Lecture 19 Cisco Packet Tracer labs coming soon!

    Section 6: Course Prerequisites: A+ Crash Course

    Lecture 20 [PPT] Computing Hardware

    Lecture 21 [PPT] Computing Devices

    Lecture 22 [PPT] Cable Types

    Lecture 23 [PPT] Virtualization & Cloud

    Lecture 24 [PPT] Operating Systems Overview

    Lecture 25 [PPT] Windows In-Depth

    Lecture 26 [PPT] Windows CLI

    Lecture 27 [PPT] Linux CLI

    Section 7: Course Prerequisites: Network+ Crash Course

    Lecture 28 [PPT] What is an Interface?

    Lecture 29 [PPT] OSI Model

    Lecture 30 [PPT] Common Networking Devices

    Lecture 31 [PPT] Common Ports and Protocols

    Lecture 32 [PPT] Common Cables & Connectors

    Lecture 33 [PPT] VLANs

    Lecture 34 [PPT] Subnetting

    Lecture 35 [PPT] Wireless

    Lecture 36 [PPT] DHCP

    Lecture 37 [PPT] DNS

    Lecture 38 [PPT] Remote Connection Methods

    Section 8: 1.1 Security Controls

    Lecture 39 [PPT] Controls Overview

    Lecture 40 [PPT] Categories: Technical Controls

    Lecture 41 [PPT] Categories: Managerial Controls

    Lecture 42 [PPT] Categories: Operational Controls

    Lecture 43 [PPT] Categories: Physical Controls

    Lecture 44 [PPT] Control Types: Preventive

    Lecture 45 [PPT] Control Types: Deterrent

    Lecture 46 [PPT] Control Types: Detective

    Lecture 47 [PPT] Control Types: Corrective

    Lecture 48 [PPT] Control Types: Compensating

    Lecture 49 [PPT] Control Types: Directive

    Lecture 50 [PPT] Control Categories + Control Types Matrix

    Section 9: 1.2 Fundamental Security Concepts

    Lecture 51 [PPT] CIA

    Lecture 52 [PPT] Non-Repudiation

    Lecture 53 [PPT] AAA

    Lecture 54 [PPT] Authenticating People vs Authenticating Systems

    Lecture 55 [PPT] Authorization Models

    Lecture 56 [PPT] Gap Analysis

    Lecture 57 [PPT] Zero Trust Introduction

    Lecture 58 [PPT] Zero Trust: Control Plane

    Lecture 59 [PPT] Zero Trust: Data Plane

    Lecture 60 [PPT] Physical Security: Bollards

    Lecture 61 [PPT] Physical Security: Access Control Vestibule (formerly Mantrap)

    Lecture 62 [PPT] Physical Security: Fencing

    Lecture 63 [PPT] Physical Security: Video Surveillance

    Lecture 64 [PPT] Physical Security: Security Guard

    Lecture 65 [PPT] Physical Security: Access Badge

    Lecture 66 [PPT] Physical Security: Lighting

    Lecture 67 [PPT] Physical Security: Sensors

    Lecture 68 [PPT] Honey *stuff

    Lecture 69 [PPT] What is a token?

    Section 10: 1.3 Change Management Processes

    Lecture 70 [PPT] Change Management

    Lecture 71 [PPT] Approval Process

    Lecture 72 [PPT] Ownership

    Lecture 73 [PPT] Stakeholders

    Lecture 74 [PPT] Impact Analysis

    Lecture 75 [PPT] Backout Plan

    Lecture 76 [PPT] Maintenance Window

    Lecture 77 [PPT] SOP (Standard Operating Procedure)

    Lecture 78 [PPT] Allow Lists/Deny Lists

    Lecture 79 [PPT] Restricted Activities

    Lecture 80 [PPT] Downtime

    Lecture 81 [PPT] Service & Application Restarts

    Lecture 82 [PPT] Legacy Applications

    Lecture 83 [PPT] Technical Implications: Dependencies

    Lecture 84 [PPT] Updating Documentation

    Lecture 85 [PPT & LAB] Version Control

    Section 11: 1.4 Cryptography

    Lecture 86 [PPT] What is Encryption?

    Lecture 87 [PPT] Symmetric Encryption

    Lecture 88 [PPT] Asymmetric Encryption: Public & Private Keys

    Lecture 89 [PPT] Hashing

    Lecture 90 [PPT] PKI (Public Key Infrastructure)

    Lecture 91 [PPT] Escrow

    Lecture 92 [PPT] Different Encryption Levels

    Lecture 93 [PPT] Encryption: Transport/Communication

    Lecture 94 [PPT] Key Exchange Overview

    Lecture 95 [PPT] Key Exchange: RSA and the Digital Envelope

    Lecture 96 [PPT] Key Exchange: Diffie-Hellman

    Lecture 97 [PPT] Encryption: Key Length

    Lecture 98 [PPT] Encryption Tools: TPM

    Lecture 99 [PPT] Encryption Tools: HSM

    Lecture 100 [PPT] Encryption Tools: Key Management System

    Lecture 101 [PPT] Encryption Tools: Secure Enclave

    Lecture 102 [PPT] Obfuscation: Steganography

    Lecture 103 [PPT] Obfuscation: Data Masking & Tokenization

    Lecture 104 [PPT] Salting & Rainbow Tables

    Lecture 105 [PPT] Digital Signatures

    Lecture 106 [PPT] Key Stretching

    Lecture 107 [PPT] Blockchain

    Lecture 108 [PPT] Open Public Ledger

    Lecture 109 [PPT] Digital Certificate Overview

    Lecture 110 [PPT] Certificate Authorities

    Lecture 111 [PPT] Certificates: CRL

    Lecture 112 [PPT] Certificates: OSCP

    Lecture 113 [PPT] Certificates: Self-Signed

    Lecture 114 [PPT] Certificates: Third Party

    Lecture 115 [PPT] Certificates: Root of Trust

    Lecture 116 [PPT] Certificates: CSR

    Lecture 117 [PPT] Certificates: Wildcard

    Section 12: 2.1 Threat Actors and Motivations

    Lecture 118 [PPT] Threat Actor Types

    Lecture 119 [PPT] Attributes of Threat Actors

    Lecture 120 [PPT] Threat Actor Motivations

    Section 13: 2.2 Threat Vectors and Attack Surfaces

    Lecture 121 [PPT] Threat Vectors: Email

    Lecture 122 [PPT] Threat Vectors: SMS

    Lecture 123 [PPT] Threat Vectors: IM (Instant Messaging)

    Lecture 124 [PPT] Threat Vectors: Images

    Lecture 125 [PPT] Threat Vectors: Files

    Lecture 126 [PPT] Threat Vectors: Removable Devices

    Lecture 127 [PPT] Threat Vectors: Vulnerable Software

    Lecture 128 [PPT] Threat Vectors: Unsupported Systems and Applications

    Lecture 129 [PPT] Insecure Networks Overview: Wireless, Wired, & Bluetooth

    Lecture 130 [PPT] Threat Vectors: Open Service Ports

    Lecture 131 [PPT] Threat Vectors: Default Credentials

    Lecture 132 [PPT] Threat Vectors: Supply Chain

    Lecture 133 [PPT] Threat Vectors: Social Engineering Techniques

    Section 14: 2.3 Vulnerabilities

    Lecture 134 [PPT] Application: Memory Injection

    Lecture 135 [PPT] Race Conditions & TOCTOU

    Lecture 136 [PPT] Malicious Updates

    Lecture 137 [PPT] Common OS-based Vulnerabilities

    Lecture 138 [PPT] Web-based: SQLi

    Lecture 139 [PPT] Web-based: XSS

    Lecture 140 [PPT] Common Hardware Vulnerabilities

    Lecture 141 [PPT] Virtualization: VM Escaping

    Lecture 142 [PPT] Virtualization: Resource Reuse

    Lecture 143 [PPT] Common Cloud-specific Vulnerabilities

    Lecture 144 [PPT] Common Supply Chain Vulnerabilities

    Lecture 145 [PPT] Common Cryptographic Vulnerabilities

    Lecture 146 [PPT] Vulnerabilities due to Misconfiguration

    Lecture 147 [PPT] Common Mobile Device Vulnerabilities

    Lecture 148 [PPT] Zero Day Attack

    Section 15: 2.4 Common Attacks & Indicators of Compromise

    Lecture 149 [PPT] Introduction to Malware

    Lecture 150 [PPT] Ransomware

    Lecture 151 [PPT] Trojan

    Lecture 152 [PPT] Worm

    Lecture 153 [PPT] Spyware

    Lecture 154 [PPT] Bloatware

    Lecture 155 [PPT] Virus

    Lecture 156 [PPT] Keylogger

    Lecture 157 [PPT] Logic Bomb

    Lecture 158 [PPT] Rootkit

    Lecture 159 [PPT] Physical Attack Types

    Lecture 160 [PPT] DDoS

    Lecture 161 [PPT] DNS Spoofing

    Lecture 162 [PPT] Common Wireless Attacks

    Lecture 163 [PPT] On-Path Attack (MitM)

    Lecture 164 [PPT] Credential Replay

    Lecture 165 [PPT] Malicious Code

    Lecture 166 [PPT] Injection attack

    Lecture 167 [PPT] Buffer Overflow

    Lecture 168 [PPT] Privilege Escalation

    Lecture 169 [PPT] CSRF (Cross Site Request Forgery)

    Lecture 170 [PPT] SSRF (Server Side Request Forgery)

    Lecture 171 [PPT] Directory Traversal

    Lecture 172 [PPT] Downgrade Attack

    Lecture 173 [PPT] Birthday & Collision Attacks

    Lecture 174 [PPT] Password Spraying

    Lecture 175 [PPT] [Hacking! LAB] Password Brute Force

    Lecture 176 [PPT] Indicators of Compromise

    Section 16: 2.5 Enterprise Mitigation Techniques

    Lecture 177 [PPT] Segmentation

    Lecture 178 [PPT] Access Control Lists

    Lecture 179 [PPT] Application Allow List

    Lecture 180 [PPT] Isolation

    Lecture 181 [PPT] Patching

    Lecture 182 [PPT] Monitoring

    Lecture 183 [PPT] Principle of Least Privilege

    Lecture 184 [PPT] Configuration Enforcement

    Lecture 185 [PPT] Endpoint Protection

    Lecture 186 [PPT] Host-based Firewall

    Lecture 187 [PPT] HIPS

    Lecture 188 [PPT] Disabling ports/protocols

    Lecture 189 [PPT] Removal of Unnecessary Software

    Section 17: 3.1 Architecture Models

    Lecture 190 [PPT] Cloud: Responsibility Matrix

    Lecture 191 [PPT] Cloud: Hybrid Considerations

    Lecture 192 [PPT] Cloud: Third-party Vendors

    Lecture 193 [PPT] IaC

    Lecture 194 [PPT] Serverless

    Lecture 195 [PPT] Microservices

    Lecture 196 [PPT] Air Gap

    Lecture 197 [PPT] Logical Segmentation

    Lecture 198 [PPT] On-Premises

    Lecture 199 [PPT] Centralized vs Decentralized

    Lecture 200 [PPT] Virtualization & Containerization

    Lecture 201 [PPT] IoT

    Lecture 202 [PPT] ICS/SCADA

    Lecture 203 [PPT] RTOS

    Lecture 204 [PPT] Embedded Systems

    Lecture 205 [PPT] Architecture Considerations

    Section 18: 3.2 Security Principles to Secure Enterprise Architecture

    Lecture 206 [PPT] Device Placement

    Lecture 207 [PPT] Security Zones

    Lecture 208 [PPT] Attack Surface

    Lecture 209 [PPT] Failure Modes: Fail-open & Fail-closed

    Lecture 210 [PPT] Inline vs TAP

    Lecture 211 [PPT] Jump Server

    Lecture 212 [PPT] Proxy Server

    Lecture 213 [PPT] Load Balancer

    Lecture 214 [PPT] Sensors

    Lecture 215 [PPT] Port Security: 802.1X & EAP

    Lecture 216 [PPT] WAF

    Lecture 217 [PPT] UTM vs NGFW

    Lecture 218 [PPT] Layer 4 Firewalls

    Lecture 219 [PPT] VPN

    Lecture 220 [PPT] Remote Access

    Lecture 221 [PPT] IPSec Tunneling

    Lecture 222 [PPT] SDN vs SD-WAN

    Lecture 223 [PPT] SASE

    Section 19: 3.3 Data Protection Strategies

    Lecture 224 [PPT] Data Types

    Lecture 225 [PPT] Data Classifications

    Lecture 226 [PPT] General Data Considerations

    Lecture 227 [PPT] Methods to Secure Data

    Section 20: 3.4 Resilience and Recovery in Security Architecture

    Lecture 228 [PPT] High Availability

    Lecture 229 [PPT] Site Considerations: Hot, Cold, Warm, & Geographic Dispersion

    Lecture 230 [PPT] Platform Diversity

    Lecture 231 [PPT] Multi-Cloud Systems

    Lecture 232 [PPT] Continuity of Operations

    Lecture 233 [PPT] Capacity Planning: People, Technology, & Infrastructure

    Lecture 234 [PPT] Testing

    Lecture 235 [PPT] Backups

    Lecture 236 [PPT] [LAB] Power: Generators & UPS

    Section 21: 4.1 Common Security Techniques

    Lecture 237 [PPT] Secure Baselines

    Lecture 238 [PPT] Hardening Targets: Mobile Devices

    Lecture 239 [PPT] Hardening Targets: Workstations

    Lecture 240 [PPT] Hardening Targets: Switches

    Lecture 241 [PPT] Hardening Targets: Routers

    Lecture 242 [PPT] Hardening Targets: Cloud Infrastructure

    Lecture 243 [PPT] Hardening Targets: Servers

    Lecture 244 [PPT] Hardening Specialized Targets: IoT, Embedded, etc

    Lecture 245 [PPT] Wireless: Site Surveys & Heat Maps

    Lecture 246 [PPT] MDM (Mobile Device Management)

    Lecture 247 [PPT] Mobile Deployment Models: BYOD, COPE, & CYOD

    Lecture 248 [PPT] Wireless Connection Methods

    Lecture 249 [PPT] Wireless Security Settings

    Lecture 250 [PPT] RADIUS & TACACS+

    Lecture 251 [PPT] App Security: Input Validation

    Lecture 252 [PPT] App Security: Secure Cookies

    Lecture 253 [PPT] App Security: Static Code Analysis

    Lecture 254 [PPT] App Security: Code Signing

    Lecture 255 [PPT] Sandboxing

    Section 22: 4.2 Hardware, Software, and Data Asset Management

    Lecture 256 [PPT] Procurement/Acquisition Process

    Lecture 257 [PPT] Assignment/Accounting

    Lecture 258 [PPT] Monitoring/Asset Tracking

    Lecture 259 [PPT] Disposal/Decommissioning

    Section 23: 4.3 Vulnerability Management

    Lecture 260 [PPT] Common Vulnerability Identification Methods

    Lecture 261 [PPT] Common Vulnerability Analysis Methods

    Lecture 262 [PPT] Common Vulnerability Response and Remediation Methods

    Lecture 263 [PPT] Common Vulnerability Validation of Remediation Methods

    Lecture 264 [PPT] Vulnerability Reporting

    Section 24: 4.4 Security Alerting and Monitoring

    Lecture 265 [PPT] Monitoring Computing Resources

    Lecture 266 [PPT[ Security Alerting & Monitoring: Activities

    Lecture 267 [PPT] SCAP (Security Content Automation Protocol)

    Lecture 268 [PPT] Benchmarks

    Lecture 269 [PPT] Agent & Agentless Tools

    Lecture 270 [PPT] SIEM (Security Information and Event Management)

    Lecture 271 [PPT] AntiVirus

    Lecture 272 [PPT] [LAB] SNMP

    Lecture 273 [PPT] [LAB] NetFlow

    Lecture 274 [PPT] Vulnerability Scanners

    Section 25: 4.5 Modify Enterprise Capabilities to Enhance Security

    Lecture 275 [PPT] Firewall Rules

    Lecture 276 [PPT] Firewall: Screened Subnets (formerly DMZ)

    Lecture 277 [PPT] IDS & IPS

    Lecture 278 [PPT] Web Filtering

    Lecture 279 [PPT] Windows Security: Group Policy

    Lecture 280 [PPT] Linux Security: SELinux

    Lecture 281 [PPT] Implementation of Secure Protocols

    Lecture 282 [PPT] DNS Filtering

    Lecture 283 [PPT] Email Security: SPF, DKIM, & DMARC

    Lecture 284 [PPT] FIM (File Integrity Monitoring)

    Lecture 285 [PPT] DLP (Data Loss Prevention)

    Lecture 286 [PPT] NAC (Network Access Control)

    Lecture 287 [PPT] EDR/XDR

    Lecture 288 [PPT] UBA & UEBA

    Section 26: 4.6 IAM (Identity and Access Management)

    Lecture 289 [PPT] IAM Overview

    Lecture 290 [PPT] Provisioning/De-Provisioning User Accounts

    Lecture 291 [PPT] Permission Assignments and Implications

    Lecture 292 [PPT] Identity Proofing

    Lecture 293 [PPT] SSO & Federation

    Lecture 294 [PPT] SSO: LDAP (Lightweight Directory Access Protocol)

    Lecture 295 [PPT] SSO: OAuth (Open Authorization)

    Lecture 296 [PPT] SSO: SAML (Security Assertions Markup Language)

    Lecture 297 [PPT] Interoperability

    Lecture 298 [PPT] Access Control Types: Mandatory

    Lecture 299 [PPT] Access Control Types: Discretionary

    Lecture 300 [PPT] Access Control Types: Role-based

    Lecture 301 [PPT] Access Control Types: Rule-based

    Lecture 302 [PPT] Access Control Types: Attribute-based

    Lecture 303 [PPT] MFA: Factors

    Lecture 304 [PPT] MFA: Implementations

    Lecture 305 [PPT] Password Best Practices

    Lecture 306 [PPT] Password Managers

    Lecture 307 [PPT] Passwordless

    Lecture 308 [PPT] PAM Overview

    Lecture 309 [PPT] PAM Tools: Just-in-time Permissions

    Lecture 310 [PPT] PAM Tools: Password Vaulting

    Lecture 311 [PPT] PAM Tools: Ephemeral Credentials

    Section 27: 4.7 Securing Operations through Automation and Orchestration

    Lecture 312 [PPT] Automation vs Orchestration

    Lecture 313 [PPT] Use Cases of Automation and Scripting

    Lecture 314 [PPT] Benefits of Automation

    Lecture 315 [PPT] Other Considerations of Automation

    Section 28: 4.8 Incident Response Activities

    Lecture 316 [PPT] IR Process

    Lecture 317 [PPT] IR Training

    Lecture 318 [PPT] IR Testing: Tabletop vs Simulation

    Lecture 319 [PPT] Root Cause Analysis

    Lecture 320 [PPT] Threat Hunting

    Lecture 321 [PPT] Digital Forensics

    Section 29: 4.9 Use Data Sources to Support an Investigation

    Lecture 322 [PPT] Log Data

    Lecture 323 [PPT] Data Sources

    Section 30: 5.1 Security Governance

    Lecture 324 [PPT] What is Governance?

    Lecture 325 [PPT] Guidelines

    Lecture 326 [PPT] AUP (Acceptable Use Policy)

    Lecture 327 [PPT] Information Security Policies

    Lecture 328 [PPT] BCDR (Business Continuity/Disaster Recovery) Policies

    Lecture 329 [PPT] SDLC (Software Development LifeCycle) Policies

    Lecture 330 [PPT] Common Password Standards

    Lecture 331 [PPT] Common Access Control Standards

    Lecture 332 [PPT] Common Encryption Standards

    Lecture 333 [PPT] Onboarding/Offboarding procedures

    Lecture 334 [PPT] Playbooks

    Lecture 335 [PPT] External Considerations for Security Governance

    Lecture 336 [PPT] Monitoring and Revising Security Governance

    Lecture 337 [PPT] Types of Governance Structures

    Lecture 338 [PPT] Security Governance Roles and Responsibilities

    Section 31: 5.2 Risk Management

    Lecture 339 [PPT] Risk Identification

    Lecture 340 [PPT] Risk Assessment

    Lecture 341 [PPT] Risk Analysis: Qualitative & Quantitative

    Lecture 342 [PPT] Risk Analysis Formula: AV (Asset Value)

    Lecture 343 [PPT] Risk Analysis Formula: EF (Exposure Factor)

    Lecture 344 [PPT] Risk Analysis Formula: SLE (Single Loss Expectancy)

    Lecture 345 [PPT] Risk Analysis Formula: ARO (Annualized Rate of Occurrence)

    Lecture 346 [PPT] Risk Analysis Formula: ALE (Annualized Loss Expectancy)

    Lecture 347 [PPT] Risk Analysis: Probability & Likelihood

    Lecture 348 [PPT] Risk Analysis: Impact

    Lecture 349 [PPT] Risk Register

    Lecture 350 [PPT] Risk Tolerance & Risk Appetite

    Lecture 351 [PPT] Risk Transfer Strategy

    Lecture 352 [PPT] Risk Acceptance Strategy

    Lecture 353 [PPT] Risk Exception & Exemption Strategies

    Lecture 354 [PPT] Risk Avoidance Strategy

    Lecture 355 [PPT] Risk Mitigation Strategy

    Lecture 356 [PPT] Risk Reporting

    Lecture 357 [PPT] Business Impact Analysis

    Lecture 358 [PPT] RPO (Recovery Point Objective) & RTO (Recovery Time Objective)

    Lecture 359 [PPT] MTTR (Mean Time to Repair) & MTBF (Mean Time Between Failures)

    Section 32: 5.3 3rd Party Risk Assessment and Management

    Lecture 360 [PPT] Vendor Assessment & Vendor Selection

    Lecture 361 [PPT] SLA (Service-Level Agreement)

    Lecture 362 [PPT] MOA/MOU (Memorandum of Agreement/Understanding)

    Lecture 363 [PPT] MSA (Master Service Agreement)

    Lecture 364 [PPT] WO (Work Order)

    Lecture 365 [PPT] SOW (Statement of Work)

    Lecture 366 [PPT] NDA (Non-Disclosure Agreement)

    Lecture 367 [PPT] BPA (Business Partners Agreement)

    Lecture 368 [PPT] Vendor Monitoring

    Lecture 369 [PPT] Questionnaires

    Lecture 370 [PPT] Rules of Engagement

    Section 33: 5.4 Security Compliance

    Lecture 371 [PPT] Compliance Reporting

    Lecture 372 [PPT] Consequences of Non-Compliance

    Lecture 373 [PPT] Due Diligence & Due Care

    Lecture 374 [PPT] Compliance Monitoring

    Lecture 375 [PPT] Privacy

    Section 34: 5.5 Types of Audits and Assessments

    Lecture 376 [PPT] Attestation

    Lecture 377 [PPT] Internal Assessments

    Lecture 378 [PPT] External Assessments

    Lecture 379 [PPT] Penetration Testing

    Section 35: 5.6 Security Awareness Practice

    Lecture 380 [PPT] Phishing Campaign

    Lecture 381 [PPT] Recognizing a Phishing Attempt

    Lecture 382 [PPT] Phishing: Responding to Reported Suspicious Messages

    Lecture 383 [PPT] Anomalous Behavior Recognition

    Lecture 384 [PPT] User Guidance and Training

    Lecture 385 [PPT] Reporting and Monitoring

    Lecture 386 [PPT] Development & Execution

    Learners who want to pass the CompTIA Security+ exam and learn a few skills along the way