| - | 001 Welcome.en.srt | 12399 | srt | 2025-08-25 13:10:44 |
| - | 001 Welcome.mp4 | 95848510 | mp4 | 2025-08-25 13:30:47 |
| - | 002 CompTIA-Security-601-Study-Guide.pdf | 23999205 | pdf | 2025-08-25 14:19:42 |
| - | 002 CompTIA-Security-Study-Notes-501.pdf | 20216766 | pdf | 2025-08-25 14:20:09 |
| - | 002 Download the Study Guide.html | 1121 | html | 2025-08-25 13:10:40 |
| - | 003 Overview of Security.en.srt | 6965 | srt | 2025-08-25 13:11:46 |
| - | 003 Overview of Security.mp4 | 67570049 | mp4 | 2025-08-25 13:46:20 |
| - | 004 CIA Triad.en.srt | 8864 | srt | 2025-08-25 13:11:16 |
| - | 004 CIA Triad.mp4 | 78092518 | mp4 | 2025-08-25 13:39:48 |
| - | 005 AAA of Security (OBJ 2.4).en.srt | 7240 | srt | 2025-08-25 13:11:46 |
| - | 005 AAA of Security (OBJ 2.4).mp4 | 62758549 | mp4 | 2025-08-25 13:50:49 |
| - | 006 Security Threats (OBJ 1.1 & 1.2).en.srt | 6385 | srt | 2025-08-25 13:11:47 |
| - | 006 Security Threats (OBJ 1.1 & 1.2).mp4 | 67287293 | mp4 | 2025-08-25 13:46:37 |
| - | 007 Mitigating Threats (OBJ 5.1).en.srt | 6059 | srt | 2025-08-25 13:11:47 |
| - | 007 Mitigating Threats (OBJ 5.1).mp4 | 59060671 | mp4 | 2025-08-25 13:53:13 |
| - | 008 Hackers (OBJ 1.5).en.srt | 10675 | srt | 2025-08-25 13:11:14 |
| - | 008 Hackers (OBJ 1.5).mp4 | 109989731 | mp4 | 2025-08-25 13:26:25 |
| - | 009 Threat Actors (1.5).en.srt | 6968 | srt | 2025-08-25 13:11:46 |
| - | 009 Threat Actors (1.5).mp4 | 71590113 | mp4 | 2025-08-25 13:44:44 |
| - | 010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt | 21082 | srt | 2025-08-25 13:10:40 |
| - | 010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 | 60813148 | mp4 | 2025-08-25 13:51:43 |
| - | 011 __ Threat Hunting (OBJ 1.7).en.srt | 16419 | srt | 2025-08-25 13:10:42 |
| - | 011 __ Threat Hunting (OBJ 1.7).mp4 | 45071924 | mp4 | 2025-08-25 14:07:45 |
| - | 012 __ Attack Frameworks (OBJ 4.2).en.srt | 26639 | srt | 2025-08-25 13:10:40 |
| - | 012 __ Attack Frameworks (OBJ 4.2).mp4 | 91942072 | mp4 | 2025-08-25 13:31:58 |