{"id":372,"date":"2011-11-23T12:24:18","date_gmt":"2011-11-23T10:24:18","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=372"},"modified":"2011-11-23T12:28:16","modified_gmt":"2011-11-23T10:28:16","slug":"security-training-videos-aiming-for-comptia-security-certification","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=372","title":{"rendered":"Security Training videos, aiming for CompTIA Security+ Certification"},"content":{"rendered":"<p>Great set of videos are offered at <a href=\"http:\/\/www.professormesser.com\/free-comptia-security-training\/security-plus-videos\/\">Professor Messer\u2019s CompTIA SY0-301 Security+ Training<\/a> .<\/p>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2011\/11\/securityvideos.png\"><\/a><\/p>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2011\/11\/securityvideos1.png\"><img loading=\"lazy\" height=\"552\" alt=\"Securityvideos1\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2011\/11\/securityvideos1-small.png\" width=\"640\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Videos are efficient and short! Worth to have a look for learning security (no matter if aiming for <a title=\"CompTIA Security+ Certification\" href=\"http:\/\/certification.comptia.org\/getCertified\/certifications\/security.aspx\">Security+<\/a> or not)!<\/p>\n<ul>\n<li>\n<div>Section 1: Network Security<\/div>\n<\/li>\n<li>\n<div>Section 2: Compliance and Operational Security<\/div>\n<\/li>\n<li>\n<div>Section 3: Threats and Vulnerabilities<\/div>\n<\/li>\n<li>\n<div>Section 4: Application, Data, and Host Security<\/div>\n<\/li>\n<li>\n<div>Section 5: Access Control and Identity Management<\/div>\n<\/li>\n<li>\n<div>Section 6: Cryptography<\/div>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Great set of videos are offered at Professor Messer\u2019s CompTIA SY0-301 Security+ Training . &nbsp; Videos are efficient and short! Worth to have a look for learning security (no matter if aiming for Security+ or not)! Section 1: Network Security &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=372\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[44],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/372"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=372"}],"version-history":[{"count":2,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/372\/revisions"}],"predecessor-version":[{"id":376,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/372\/revisions\/376"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}