Certified: The CompTIA Security+ V8 / SY0-801 Audio Course

Durata totale:9 h 27 min
Episode 1 — SY0-801 at a Glance: What Changed from Security+ 701
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:52
Episode 2 — How to Study with an Audio-First Security+ Plan
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:10
Episode 3 — Defense in Depth: Layering Controls So One Failure Doesn’t Sink You (1.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:03
Episode 4 — CIA and AAA: The Core Security Models (1.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:15
Episode 5 — Non-Repudiation, Least Privilege, and Trust Decisions (1.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:51
Episode 6 — Zero Trust Principles: Never Trust, Always Verify (1.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:09
Episode 7 — Control Categories and Control Types (1.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:41
Episode 8 — Change Management: Why Security Breaks During Normal Updates (1.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:51
Episode 9 — CABs, Approvals, Ownership, and Stakeholders (1.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
11:53
Episode 10 — Impact Analysis, Test Results, and Maintenance Windows (1.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:25
Episode 11 — Backout Plans vs. Fail Forward: Recovering from Bad Changes (1.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:35
Episode 12 — Technical and Documentation Impacts of Change (1.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:40
Episode 13 — PKI Foundations: Public Keys, Private Keys, and Trust (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:24
Episode 14 — Certificates and Certificate Authorities (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
12:59
Episode 15 — Revocation and Validation: CRLs, OCSP, and Trust Problems (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:08
Episode 16 — CSRs, Wildcards, Root of Trust, and Key Escrow (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:05
Episode 17 — Symmetric vs. Asymmetric Encryption (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:31
Episode 18 — Encryption Levels: Disk, File, Volume, Database, and Record (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:10
Episode 19 — Key Exchange, Algorithms, Key Length, and Protocol Selection (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:31
Episode 20 — Hashing, Salting, Digital Signatures, Obfuscation, and Crypto Tools (1.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
14:34
Episode 21 — Threats vs. Vulnerabilities: Likelihood, Impact, and Life Cycle (2.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
14:57
Episode 22 — Threat Feeds and Intelligence Sources (2.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:43
Episode 23 — Vulnerability Scoring: CVSS, CVEs, and Prioritization (2.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
13:47
Episode 24 — Vulnerability Types and Risk-Based Decisions (2.1)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:21
Episode 25 — Threat Actors: Organized Crime, Terrorists, Hacktivists, and Insiders (2.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
14:20
Episode 26 — State-Sponsored, Competitors, Accidental, and Unskilled Attackers (2.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
14:40
Episode 27 — Motivations and Capabilities: Money, Espionage, Ideology, and Extortion (2.2)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:12
Episode 28 — APTs and the Modern Threat Vector Map (2.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:24
Episode 29 — Message-Based Attacks: Email, SMS, RCS, IM, and Collaboration Tools (2.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
14:27
Episode 30 — Image and Attachment Attacks: QR Codes, CAPTCHA Abuse, Macros, PDFs, and RTF (2.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
14:23
Episode 31 — Browser-Based Attacks: Extensions, JavaScript, Cookies, Password Managers, and Session Tokens (2.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:04
Episode 32 — Network, Remote Access, and Endpoint Threat Sources (2.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:43
Episode 33 — Supply Chain, SaaS, USB, Human, IoT, OT, Physical, Bluetooth, RF, and NFC Threats (2.3)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
17:03
Episode 34 — Unsupported, Unpatched, Obsolete, and Unmanaged Systems (2.4)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:57
Episode 35 — Ports, Services, Applications, Race Conditions, and Malicious Updates (2.4)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:17
Episode 36 — Code Weaknesses: Hardcoded Secrets and Unsafe Exception Handling (2.4)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:04
Episode 37 — Stale Credentials, Rogue Devices, Shadow IT, Wireless, Mobile, and Identity Provider Risks (2.4)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
16:49
Episode 38 — LLMs, Misconfigurations, Public Repositories, and Public Object Storage (2.4)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
15:18
Episode 39 — Malware Indicators: Ransomware, Trojans, Worms, Spyware, and Fileless Malware (2.5)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
17:11
Episode 40 — Physical and Network Attack Indicators (2.5)
Certified: The CompTIA Security+ V8 / SY0-801 Audio Course
16:57