Security for CompTIA A + Core 2 (220-1202)

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 847.7 MB
  • Uploaded By freecoursewb
  • Downloads 268
  • Last checked 17 hours ago
  • Date uploaded 6 months ago
  • Seeders 5
  • Leechers 2

Infohash : D9B333DA8D3A2A32F388F5EBE08F0693FAF09708



Security for CompTIA A+ Core 2 (220-1202)

https://WebToolTip.com

Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 48 KHz
Language: English | Size: 831 MB | Duration: 3h 38m 47s

Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, Security for CompTIA A+ Core 2 (220-1202), you’ll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.

Files:

[ WebToolTip.com ] Security for CompTIA A + Core 2 (220-1202)
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01
    • security-measures-and-purposes-slides.pdf (23.9 MB)
    02
    • security-settings-in-windows-slides.pdf (22.3 MB)
    03
    • wireless-protocols-and-authentication-slides.pdf (9.7 MB)
    04
    • malware-prevention-slides.pdf (14.8 MB)
    05
    • social-engineering-threats-and-vulnerabilities-slides.pdf (15.6 MB)
    06
    • soho-malware-procedures-slides.pdf (6.7 MB)
    07
    • workstation-security-best-practices-slides.pdf (15.0 MB)
    08
    • mobile-device-security-slides.pdf (10.6 MB)
    09
    • data-destruction-and-disposal-methods-slides.pdf (12.5 MB)
    1-Security Measures and Purposes
    • 1 -Physical Security Principles.mp4 (29.1 MB)
    • 2 -Surveillance and Alarms.mp4 (12.5 MB)
    • 3 -Ingress and Egress Security.mp4 (27.6 MB)
    • 4 -Physical Access Security.mp4 (18.2 MB)
    • 5 -Authentication.mp4 (22.0 MB)
    • 6 -Authorization.mp4 (15.1 MB)
    • 7 -Communications Security.mp4 (12.9 MB)
    10-SOHO Network Security
    • 36 -Router and Firewall Settings.mp4 (23.3 MB)
    • 37 -Wi-Fi Settings.mp4 (10.6 MB)
    10
    • soho-network-security-slides.pdf (6.4 MB)
    11-Browser Security
    • 38 -Browser and Extension Installation.mp4 (11.6 MB)
    • 39 -Secure Connections.mp4 (19.9 MB)
    • 40 -Security Settings.mp4 (12.7 MB)
    11
    • browser-security-slides.pdf (13.3 MB)
    2-Security Settings in Windows
    • 10 -Passwordless Login.mp4 (20.8 MB)
    • 11 -Permissions.mp4 (27.1 MB)
    • 12 -Encryption Part 1.mp4 (9.5 MB)
    • 13 -Encryption Part 2.mp4 (16.4 MB)
    • 14 -Antivirus and Firewall.mp4 (19.2 MB)
    • 15 -Active Directory.mp4 (25.6 MB)
    • 8 -Users and Groups Part 1.mp4 (16.4 MB)
    • 9 -Users and Groups Part 2.mp4 (14.9 MB)
    3-Wireless Protocols and Authentication
    • 16 -Wireless Protocols.mp4 (19.0 MB)
    • 17 -Wireless Authentication.mp4 (13.4 MB)
    4-Malware Prevention
    • 18 -Types of Malware.mp4 (27.4 MB)
    • 19 -Malware Symptoms.mp4 (9.6 MB)
    • 20 -Antimalware Tools.mp4 (18.1 MB)
    • 21 -Antimalware Techniques.mp4 (19.3 MB)
    5-Social Engineering, Threats, and Vulnerabilities
    • 22 -Social Engineering Attacks Part 1.mp4 (20.0 MB)
    • 23 -Social Engineering Attacks Part 2.mp4 (16.6 MB)
    • 24 -Security Threats.mp4 (17.7 MB)
    • 25 -Security Vulnerabilities.mp4 (12.7 MB)
    6-SOHO Malware Procedures
    • 26 -First Aid.mp4 (14.9 MB)
    • 27 -Follow-up.mp4 (16.2 MB)
    7-Workstation Security Best Practices
    • 28 -Platform Hardening.mp4 (23.7 MB)
    • 29 -Account Management.mp4 (15.7 MB)
    • 30 -Password Management.mp4 (16.7 MB)
    8-Mobile Device Security
    • 31 -Physical Security.mp4 (9.5 MB)
    • 32 -Logical Security.mp4 (10.1 MB)
    • 33 -Special Considerations.mp4 (21.8 MB)
    9-Data Destruction and Disposal Methods
    • 34 -Recycling and Repurposing.mp4 (18.1 MB)
    • 35 -Physical Destruction.mp4 (11.0 MB)
    • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
R2-CACHE ☁️ R2 (hit) | CDN: HIT (0s) 📄 torrent 🕐 05 Jan 2026, 10:07:09 pm IST ⏰ 30 Jan 2026, 10:07:08 pm IST ✅ Valid for 13d 15h 🔄 Refresh Cache