◂Parent directory |
Introduction/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 1 Compare and Contrast Various Types of Security Controls/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 2 Summarize Fundamental Security Concepts/ | | 2026-03-07 07:39:14 +13:00 a week ago |
Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security/ | | 2026-03-07 07:39:17 +13:00 a week ago |
Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions/ | | 2026-03-07 07:39:18 +13:00 a week ago |
Lesson 5 Compare and Contrast Common Threat Actors and Motivations/ | | 2026-03-07 07:39:18 +13:00 a week ago |
Lesson 6 Explain Common Threat Vectors and Attack Surfaces/ | | 2026-03-07 07:39:19 +13:00 a week ago |
Lesson 7 Explain Various Types of Vulnerabilities/ | | 2026-03-07 07:39:19 +13:00 a week ago |
Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Lesson 10 Compare and Contrast Security Implications of Different Architecture Models/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 16 Explain Various Activities Associated with Vulnerability Management/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools/ | | 2026-03-07 07:39:12 +13:00 a week ago |
Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security/ | | 2026-03-07 07:39:13 +13:00 a week ago |
Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management/ | | 2026-03-07 07:39:13 +13:00 a week ago |
Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations/ | | 2026-03-07 07:39:14 +13:00 a week ago |
Lesson 21 Explain Appropriate Incident Response Activities/ | | 2026-03-07 07:39:15 +13:00 a week ago |
Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation/ | | 2026-03-07 07:39:15 +13:00 a week ago |
Lesson 23 Summarize Effective Security Governance/ | | 2026-03-07 07:39:15 +13:00 a week ago |
Lesson 24 Explain Elements of the Risk Management Process/ | | 2026-03-07 07:39:16 +13:00 a week ago |
Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management/ | | 2026-03-07 07:39:16 +13:00 a week ago |
Lesson 26 Summarize Elements of Effective Security Compliance/ | | 2026-03-07 07:39:16 +13:00 a week ago |
Lesson 27 Explain Types and Purposes of Audits and Assessment/ | | 2026-03-07 07:39:17 +13:00 a week ago |
Lesson 28 Given a Scenario, Implement Security Awareness Practices/ | | 2026-03-07 07:39:17 +13:00 a week ago |
Lesson 29 Attaining Your SY0-701 Security+ Certification/ | | 2026-03-07 07:39:17 +13:00 a week ago |
Module 1 Closer Look Labs/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Module 1 General Security Concepts/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Module 2 Closer Look Labs/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Module 2 Threats, Vulnerabilities and Mitigations/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Module 3 Closer Look Labs/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Module 3 Security Architecture/ | | 2026-03-07 07:39:20 +13:00 a week ago |
Module 4 Closer Look Labs/ | | 2026-03-07 07:39:21 +13:00 a week ago |
Module 4 Security Operations/ | | 2026-03-07 07:39:21 +13:00 a week ago |
Module 5 Closer Look Labs/ | | 2026-03-07 07:39:21 +13:00 a week ago |
Module 5 Security Program Management and Oversight/ | | 2026-03-07 07:39:21 +13:00 a week ago |
Module 6 Preparing for the Exam/ | | 2026-03-07 07:39:21 +13:00 a week ago |
Summary/ | | 2026-03-07 07:39:21 +13:00 a week ago |