Torrent Info
Title [Udemy] CompTIA Security+ (SY0-501 & SY0-601) Complete Course
Category
Size 20.23GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt 12.57KB
001 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4 42.60MB
001 __ Workflow Orchestration (OBJ 2.3).en.srt 9.13KB
001 __ Workflow Orchestration (OBJ 2.3).mp4 24.11MB
001 Access Control (OBJ 3.8).en.srt 2.11KB
001 Access Control (OBJ 3.8).mp4 18.60MB
001 Application Security.en.srt 3.51KB
001 Application Security.mp4 38.61MB
001 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt 14.03KB
001 Authentication (OBJ 2.4, 3.5, & 3.8).mp4 129.73MB
001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt 7.80KB
001 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4 76.42MB
001 Conclusion.en.srt 21.96KB
001 Conclusion.mp4 212.10MB
001 Cryptography (OBJ 2.1 & 2.8).en.srt 11.49KB
001 Cryptography (OBJ 2.1 & 2.8).mp4 107.94MB
001 Facilities Security (OBJ 2.7).en.srt 1.41KB
001 Facilities Security (OBJ 2.7).mp4 13.93MB
001 Hardening (OBJ 3.2).en.srt 3.51KB
001 Hardening (OBJ 3.2).mp4 39.72MB
001 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt 16.20KB
001 Hashing (OBJ 1.2, 2.8 & 3.2).mp4 166.15MB
001 Incident Response Procedures (OBJ 4.2).en.srt 10.67KB
001 Incident Response Procedures (OBJ 4.2).mp4 99.10MB
001 Malware (OBJ 1.2).en.srt 1.21KB
001 Malware (OBJ 1.2).mp4 15.01MB
001 Malware Infections.en.srt 8.50KB
001 Malware Infections.mp4 93.17MB
001 Mobile Device Security (OBJ 1.5).en.srt 2.62KB
001 Mobile Device Security (OBJ 1.5).mp4 28.44MB
001 Monitoring Types (OBJ 3.3).en.srt 6.17KB
001 Monitoring Types (OBJ 3.3).mp4 62.46MB
001 Network Attacks (OBJ 1.4).en.srt 1.35KB
001 Network Attacks (OBJ 1.4).mp4 14.53MB
001 Network Security.en.srt 1.65KB
001 Network Security.mp4 16.60MB
001 Perimeter Security.en.srt 1.74KB
001 Perimeter Security.mp4 17.79MB
001 Physical Security (OBJ 2.7).en.srt 3.62KB
001 Physical Security (OBJ 2.7).mp4 33.92MB
001 Planning for the Worst (OBJ 2.5 & 5.4).en.srt 4.87KB
001 Planning for the Worst (OBJ 2.5 & 5.4).mp4 47.74MB
001 Policies and Procedures (OBJ 5.2 & 5.3).en.srt 12.78KB
001 Policies and Procedures (OBJ 5.2 & 5.3).mp4 126.68MB
001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt 7.65KB
001 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4 51.15MB
001 Risk Assessments (OBJ 5.4).en.srt 19.21KB
001 Risk Assessments (OBJ 5.4).mp4 188.59MB
001 Securing Networks (OBJ 3.3).en.srt 1.97KB
001 Securing Networks (OBJ 3.3).mp4 18.57MB
001 Security Applications and Devices.en.srt 1.13KB
001 Security Applications and Devices.mp4 12.76MB
001 Security Protocols (OBJ 3.1).en.srt 779B
001 Security Protocols (OBJ 3.1).mp4 8.70MB
001 Social Engineering (OBJ 1.1).en.srt 1.91KB
001 Social Engineering (OBJ 1.1).mp4 19.74MB
001 Software Development (OBJ 2.1 & 2.3).en.srt 18.45KB
001 Software Development (OBJ 2.1 & 2.3).mp4 188.76MB
001 Virtualization (OBJ 2.2).en.srt 4.34KB
001 Virtualization (OBJ 2.2).mp4 46.65MB
001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt 17.63KB
001 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4 171.62MB
001 Welcome.en.srt 11.51KB
001 Welcome.mp4 91.41MB
002 __ CI_CD (OBJ 2.3).en.srt 16.18KB
002 __ CI_CD (OBJ 2.3).mp4 48.32MB
002 __ Incident Response Planning (OBJ 4.2).en.srt 41.74KB
002 __ Incident Response Planning (OBJ 4.2).mp4 113.29MB
002 __ Root of Trust (OBJ 3.2).en.srt 10.08KB
002 __ Root of Trust (OBJ 3.2).mp4 31.06MB
002 Access Control Models (OBJ 3.8).en.srt 19.76KB
002 Access Control Models (OBJ 3.8).mp4 176.15MB
002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt 10.89KB
002 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4 112.74MB
002 BONUS_ What's Next_.en.srt 8.62KB
002 BONUS_ What's Next_.mp4 76.89MB
002 Cloud Types (OBJ 2.2 & 3.6).en.srt 5.66KB
002 Cloud Types (OBJ 2.2 & 3.6).mp4 63.19MB
002 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt 9.25KB
002 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 96.88MB
002 CompTIA Security+ 601 Study Guide.pdf 22.89MB
002 CompTIA-Security-Study-Notes 501.pdf 19.28MB
002 Data Classifications (OBJ 5.3 & 5.5).en.srt 15.55KB
002 Data Classifications (OBJ 5.3 & 5.5).mp4 145.37MB
002 Demo_ Hashing (OBJ 2.8).en.srt 5.59KB
002 Demo_ Hashing (OBJ 2.8).mp4 38.54MB
002 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt 11.25KB
002 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4 94.00MB
002 Digital Certificates (OBJ 3.9).en.srt 15.01KB
002 Digital Certificates (OBJ 3.9).mp4 144.50MB
002 Download the Study Guide.html 1.09KB
002 Fire Suppression (OBJ 2.7).en.srt 13.33KB
002 Fire Suppression (OBJ 2.7).mp4 138.65MB
002 Firewalls (OBJ 3.3 & 4.4).en.srt 17.02KB
002 Firewalls (OBJ 3.3 & 4.4).mp4 175.29MB
002 Hypervisors (OBJ 2.2).en.srt 5.01KB
002 Hypervisors (OBJ 2.2).mp4 57.45MB
002 Penetration Testing (OBJ 1.8).en.srt 10.11KB
002 Penetration Testing (OBJ 1.8).mp4 98.42MB
002 Performance Baselining (OBJ 2.1).en.srt 10.43KB
002 Performance Baselining (OBJ 2.1).mp4 102.38MB
002 Ports and Protocols (OBJ 3.1).en.srt 8.89KB
002 Ports and Protocols (OBJ 3.1).mp4 95.70MB
002 Qualitative Risk (OBJ 5.4).en.srt 9.57KB
002 Qualitative Risk (OBJ 5.4).mp4 91.50MB
002 Redundant Power (OBJ 2.5).en.srt 7.01KB
002 Redundant Power (OBJ 2.5).mp4 68.69MB
002 S_MIME (OBJ 3.1).en.srt 3.12KB
002 S_MIME (OBJ 3.1).mp4 33.00MB
002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt 13.11KB
002 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4 136.96MB
002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt 15.20KB
002 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4 146.75MB
002 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt 2.74KB
002 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4 33.55MB
002 Software Firewalls (OBJ 3.2).en.srt 8.16KB
002 Software Firewalls (OBJ 3.2).mp4 91.43MB
002 Surveillance (OBJ 2.7).en.srt 6.37KB
002 Surveillance (OBJ 2.7).mp4 60.79MB
002 Symmetric vs Asymmetric (OBJ 2.8).en.srt 12.70KB
002 Symmetric vs Asymmetric (OBJ 2.8).mp4 134.00MB
002 The OSI Model (OBJ 3.3 & 3.6).en.srt 12.37KB
002 The OSI Model (OBJ 3.3 & 3.6).mp4 128.51MB
002 Unnecessary Applications (OBJ 1.6).en.srt 6.21KB
002 Unnecessary Applications (OBJ 1.6).mp4 69.15MB
002 Viruses (OBJ 1.2).en.srt 12.72KB
002 Viruses (OBJ 1.2).mp4 134.66MB
002 Web Browser Security (OBJ 3.2 & 3.3).en.srt 14.76KB
002 Web Browser Security (OBJ 3.2 & 3.3).mp4 145.13MB
003 __ Data Ownership.en.srt 8.79KB
003 __ Data Ownership.mp4 24.59MB
003 __ DevSecOps (OBJ 2.3).en.srt 11.37KB
003 __ DevSecOps (OBJ 2.3).mp4 31.38MB
003 __ Investigative Data (OBJ 4.3).en.srt 28.26KB
003 __ Investigative Data (OBJ 4.3).mp4 74.72MB
003 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt 11.20KB
003 __ Training and Exercises (OBJ 1.8 & 4.2).mp4 32.48MB
003 __ Trusted Firmware (OBJ 3.2).en.srt 11.03KB
003 __ Trusted Firmware (OBJ 3.2).mp4 33.00MB
003 802.1x (OBJ 3.4 & 3.8).en.srt 7.39KB
003 802.1x (OBJ 3.4 & 3.8).mp4 79.81MB
003 As a Service (OBJ 2.2).en.srt 15.43KB
003 As a Service (OBJ 2.2).mp4 154.35MB
003 Backup Power (OBJ 2.5).en.srt 7.30KB
003 Backup Power (OBJ 2.5).mp4 68.99MB
003 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt 13.55KB
003 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4 126.18MB
003 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt 6.71KB
003 Demo_ Certificates (OBJ 2.8 & 3.9).mp4 27.99MB
003 Demo_ How to create a VM (OBJ 2.2).en.srt 7.96KB
003 Demo_ How to create a VM (OBJ 2.2).mp4 38.72MB
003 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt 11.12KB
003 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 49.92MB
003 Demo_ Software Firewalls (OBJ 3.2).en.srt 13.52KB
003 Demo_ Software Firewalls (OBJ 3.2).mp4 61.53MB
003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt 8.17KB
003 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4 28.93MB
003 Door Locks (OBJ 2.7).en.srt 9.04KB
003 Door Locks (OBJ 2.7).mp4 85.01MB
003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt 6.97KB
003 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4 70.64MB
003 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt 5.07KB
003 HVAC (OBJ 2.5, 2.6, & 2.7).mp4 53.25MB
003 Insider Threat (OBJ 1.5).en.srt 4.99KB
003 Insider Threat (OBJ 1.5).mp4 48.34MB
003 Memorization of Ports (OBJ 3.1).en.srt 22.38KB
003 Memorization of Ports (OBJ 3.1).mp4 238.39MB
003 Mobile Malware (OBJ 1.1 & 3.5).en.srt 13.34KB
003 Mobile Malware (OBJ 1.1 & 3.5).mp4 139.49MB
003 Overview of Security.en.srt 6.45KB
003 Overview of Security.mp4 64.44MB
003 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt 6.43KB
003 Protocol Analyzers (OBJ 3.3 & 4.1).mp4 64.92MB
003 Quantitative Risk (OBJ 5.4).en.srt 11.15KB
003 Quantitative Risk (OBJ 5.4).mp4 119.95MB
003 Restricting Applications (OBJ 3.2 & 4.4).en.srt 6.00KB
003 Restricting Applications (OBJ 3.2 & 4.4).mp4 61.92MB
003 Securing Network Media (OBJ 2.7).en.srt 18.98KB
003 Securing Network Media (OBJ 2.7).mp4 189.94MB
003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt 11.82KB
003 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4 121.66MB
003 Switches (OBJ 1.4 & 2.7).en.srt 7.38KB
003 Switches (OBJ 1.4 & 2.7).mp4 77.26MB
003 Symmetric Algorithms (OBJ 2.8).en.srt 9.58KB
003 Symmetric Algorithms (OBJ 2.8).mp4 103.40MB
003 Testing Methods (OBJ 2.3 & 3.2).en.srt 14.31KB
003 Testing Methods (OBJ 2.3 & 3.2).mp4 151.04MB
003 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt 7.03KB
003 Web Browser Concerns (OBJ 3.2 & 3.3).mp4 71.04MB
003 Worms (OBJ 1.2).en.srt 4.20KB
003 Worms (OBJ 1.2).mp4 47.86MB
004 __ Forensic Procedures (OBJ 4.5).en.srt 32.38KB
004 __ Forensic Procedures (OBJ 4.5).mp4 82.94MB
004 __ IAC (OBJ 2.2).en.srt 9.72KB
004 __ IAC (OBJ 2.2).mp4 29.60MB
004 __ Secure Processing (OBJ 3.2).en.srt 8.53KB
004 __ Secure Processing (OBJ 3.2).mp4 24.51MB
004 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt 7.13KB
004 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 62.46MB
004 Certificate Authorities (OBJ 3.2 & 3.9).en.srt 8.89KB
004 Certificate Authorities (OBJ 3.2 & 3.9).mp4 89.81MB
004 CIA Triad.en.srt 8.23KB
004 CIA Triad.mp4 74.47MB
004 Cloud Security (OBJ 2.5 & 3.6).en.srt 5.17KB
004 Cloud Security (OBJ 2.5 & 3.6).mp4 53.42MB
004 Data Redundancy (OBJ 2.5).en.srt 9.59KB
004 Data Redundancy (OBJ 2.5).mp4 100.31MB
004 Demo_ Lock Picking (OBJ 2.7).en.srt 3.40KB
004 Demo_ Lock Picking (OBJ 2.7).mp4 36.73MB
004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt 10.73KB
004 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4 62.36MB
004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt 10.92KB
004 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4 46.06MB
004 IDS (OBJ 3.2 & 3.3).en.srt 10.26KB
004 IDS (OBJ 3.2 & 3.3).mp4 105.77MB
004 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt 3.18KB
004 Increasing Hash Security (OBJ 2.8 & 3.7).mp4 31.97MB
004 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt 4.92KB
004 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4 53.68MB
004 Methodologies (OBJ 1.7 & 5.4).en.srt 6.22KB
004 Methodologies (OBJ 1.7 & 5.4).mp4 59.43MB
004 OVAL (OBJ 1.7).en.srt 3.43KB
004 OVAL (OBJ 1.7).mp4 32.66MB
004 Phishing (OBJ 1.1 & 5.3).en.srt 14.13KB
004 Phishing (OBJ 1.1 & 5.3).mp4 135.84MB
004 PII and PHI (OBJ 5.2 & 5.5).en.srt 13.14KB
004 PII and PHI (OBJ 5.2 & 5.5).mp4 134.04MB
004 Proxy Servers (OBJ 3.3 & 4.4).en.srt 9.04KB
004 Proxy Servers (OBJ 3.3 & 4.4).mp4 91.68MB
004 Public Key Cryptography (OBJ 2.8).en.srt 6.75KB
004 Public Key Cryptography (OBJ 2.8).mp4 52.38MB
004 Routers (OBJ 3.3).en.srt 5.13KB
004 Routers (OBJ 3.3).mp4 54.31MB
004 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt 9.95KB
004 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4 97.01MB
004 Shielding (OBJ 2.7).en.srt 5.40KB
004 Shielding (OBJ 2.7).mp4 55.21MB
004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt 8.27KB
004 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4 86.69MB
004 SNMP (OBJ 3.1).en.srt 7.68KB
004 SNMP (OBJ 3.1).mp4 79.36MB
004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt 7.67KB
004 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4 80.73MB
004 SSH (OBJ 3.1 & 4.1).en.srt 5.40KB
004 SSH (OBJ 3.1 & 4.1).mp4 54.40MB
004 Threats to VMs (OBJ 2.2).en.srt 7.46KB
004 Threats to VMs (OBJ 2.2).mp4 80.93MB
004 Trojans (OBJ 1.2).en.srt 5.36KB
004 Trojans (OBJ 1.2).mp4 62.50MB
004 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt 7.33KB
004 Unnecessary Ports (OBJ 1.6 & 3.2).mp4 75.22MB
004 Users and Groups (OBJ 3.7 & 3.8).en.srt 20.99KB
004 Users and Groups (OBJ 3.7 & 3.8).mp4 201.38MB
005 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt 12.89KB
005 __ Legal Requirements (OBJ 5.2 & 5.5).mp4 41.27MB
005 __ Machine Learning (OBJ 1.2).en.srt 19.34KB
005 __ Machine Learning (OBJ 1.2).mp4 68.01MB
005 __ Motivation Factors (OBJ 1.1).en.srt 16.57KB
005 __ Motivation Factors (OBJ 1.1).mp4 159.04MB
005 AAA of Security (OBJ 2.4).en.srt 6.72KB
005 AAA of Security (OBJ 2.4).mp4 59.85MB
005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt 5.25KB
005 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 40.59MB
005 Asymmetric Algorithms (OBJ 2.8).en.srt 7.44KB
005 Asymmetric Algorithms (OBJ 2.8).mp4 81.35MB
005 Biometric Readers (OBJ 2.4).en.srt 9.12KB
005 Biometric Readers (OBJ 2.4).mp4 92.13MB
005 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt 4.15KB
005 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4 47.75MB
005 Buffer Overflows (OBJ 1.3).en.srt 12.93KB
005 Buffer Overflows (OBJ 1.3).mp4 135.64MB
005 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt 18.76KB
005 Data Collection Procedures (OBJ 4.1 & 4.5).mp4 101.16MB
005 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt 9.86KB
005 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4 99.54MB
005 Demo_ Analytical Tools (OBJ 4.1).en.srt 9.32KB
005 Demo_ Analytical Tools (OBJ 4.1).mp4 48.58MB
005 Demo_ RAIDs (OBJ 2.5).en.srt 7.61KB
005 Demo_ RAIDs (OBJ 2.5).mp4 39.33MB
005 Demo_ Viruses and Trojans (OBJ 1.2).en.srt 12.74KB
005 Demo_ Viruses and Trojans (OBJ 1.2).mp4 91.56MB
005 Denial of Service (OBJ 1.3 & 1.4).en.srt 17.59KB
005 Denial of Service (OBJ 1.3 & 1.4).mp4 170.22MB
005 Honeypots and Honeynets (OBJ 2.1).en.srt 2.97KB
005 Honeypots and Honeynets (OBJ 2.1).mp4 30.69MB
005 Network Zones (OBJ 3.3).en.srt 7.07KB
005 Network Zones (OBJ 3.3).mp4 69.46MB
005 Permissions (OBJ 3.8).en.srt 8.52KB
005 Permissions (OBJ 3.8).mp4 81.02MB
005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt 6.62KB
005 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4 66.62MB
005 Remote Desktop Services (OBJ 3.1).en.srt 3.69KB
005 Remote Desktop Services (OBJ 3.1).mp4 40.36MB
005 Securing Applications (OBJ 1.4 & 3.2).en.srt 9.60KB
005 Securing Applications (OBJ 1.4 & 3.2).mp4 101.49MB
005 Securing VMs (OBJ 2.2).en.srt 7.77KB
005 Securing VMs (OBJ 2.2).mp4 82.44MB
005 Security Controls (OBJ 5.1).en.srt 14.95KB
005 Security Controls (OBJ 5.1).mp4 149.03MB
005 Trusted Operating System (OBJ 3.2).en.srt 3.75KB
005 Trusted Operating System (OBJ 3.2).mp4 42.64MB
005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt 4.54KB
005 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4 43.89MB
005 VPN Protocols (OBJ 3.1 & 3..3).en.srt 13.76KB
005 VPN Protocols (OBJ 3.1 & 3..3).mp4 141.32MB
005 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt 15.21KB
005 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4 139.57MB
005 Web of Trust (OBJ 3.9).en.srt 5.98KB
005 Web of Trust (OBJ 3.9).mp4 57.34MB
005 Wireless Encryption (OBJ 1.6 & 3.4).en.srt 11.62KB
005 Wireless Encryption (OBJ 1.6 & 3.4).mp4 120.29MB
006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt 16.21KB
006 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4 50.91MB
006 __ IoT Vulnerabilities (OBJ 2.6).en.srt 8.25KB
006 __ IoT Vulnerabilities (OBJ 2.6).mp4 29.61MB
006 __ Jumpbox (OBJ 3.5).en.srt 12.88KB
006 __ Jumpbox (OBJ 3.5).mp4 35.05MB
006 __ Privacy Technologies (OBJ 5.5).en.srt 14.75KB
006 __ Privacy Technologies (OBJ 5.5).mp4 38.15MB
006 __ Types of Risk (OBJ 1.6 & 5.4).en.srt 16.01KB
006 __ Types of Risk (OBJ 1.6 & 5.4).mp4 54.76MB
006 Auditing (OBJ 1.7).en.srt 4.21KB
006 Auditing (OBJ 1.7).mp4 42.70MB
006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt 7.75KB
006 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4 81.64MB
006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt 3.22KB
006 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4 35.35MB
006 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt 3.34KB
006 DDoS (OBJ 1.2, 1.3, & 1.4).mp4 33.73MB
006 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt 12.00KB
006 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4 101.76MB
006 Demo_ Disk Imaging (OBJ 4.1).en.srt 13.62KB
006 Demo_ Disk Imaging (OBJ 4.1).mp4 63.03MB
006 Demo_ Nmap Scanning (OBJ 4.1).en.srt 15.31KB
006 Demo_ Nmap Scanning (OBJ 4.1).mp4 97.26MB
006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt 11.30KB
006 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 75.49MB
006 Demo_ Securing VMs.en.srt 8.79KB
006 Demo_ Securing VMs.mp4 43.11MB
006 Demo_ Setting up a VPN (OBJ 3.3).en.srt 3.21KB
006 Demo_ Setting up a VPN (OBJ 3.3).mp4 24.77MB
006 Mobile Device Theft (OBJ 3.5).en.srt 6.53KB
006 Mobile Device Theft (OBJ 3.5).mp4 69.78MB
006 More Social Engineering (OBJ 1.1 & 1.2).en.srt 8.95KB
006 More Social Engineering (OBJ 1.1 & 1.2).mp4 88.13MB
006 Network Redundancy (OBJ 2.5).en.srt 4.83KB
006 Network Redundancy (OBJ 2.5).mp4 46.67MB
006 Pretty Good Privacy (OBJ 2.8).en.srt 3.23KB
006 Pretty Good Privacy (OBJ 2.8).mp4 38.63MB
006 Ransomware (OBJ 1.2).en.srt 4.96KB
006 Ransomware (OBJ 1.2).mp4 53.37MB
006 Remote Access Service (OBJ 3.1 & 3.8).en.srt 4.25KB
006 Remote Access Service (OBJ 3.1 & 3.8).mp4 44.42MB
006 Security Threats (OBJ 1.1 & 1.2).en.srt 5.94KB
006 Security Threats (OBJ 1.1 & 1.2).mp4 64.17MB
006 Updates and Patches (OBJ 1.6 & 3.2).en.srt 6.61KB
006 Updates and Patches (OBJ 1.6 & 3.2).mp4 74.21MB
006 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt 5.74KB
006 Usernames and Passwords (OBJ 1.6 & 3.7).mp4 55.61MB
006 Wireless Access Points (OBJ 1.4 & 3.4).en.srt 16.04KB
006 Wireless Access Points (OBJ 1.4 & 3.4).mp4 136.64MB
007 __ CASB (OBJ 2.1).en.srt 9.84KB
007 __ CASB (OBJ 2.1).mp4 29.81MB
007 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt 15.62KB
007 __ Embedded System Vulnerabilities (OBJ 2.6).mp4 47.93MB
007 __ Fraud and Scams (OBJ 1.1).en.srt 11.87KB
007 __ Fraud and Scams (OBJ 1.1).mp4 42.61MB
007 __ Security Tools (OBJ 4.1).en.srt 37.04KB
007 __ Security Tools (OBJ 4.1).mp4 137.20MB
007 Backdoors and Logic Bombs (OBJ 1.2).en.srt 7.91KB
007 Backdoors and Logic Bombs (OBJ 1.2).mp4 84.09MB
007 Demo_ Auditing Files (OBJ 1.7).en.srt 7.66KB
007 Demo_ Auditing Files (OBJ 1.7).mp4 52.84MB
007 Demo_ Policies (OBJ 3.7).en.srt 9.92KB
007 Demo_ Policies (OBJ 3.7).mp4 32.95MB
007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt 19.40KB
007 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4 96.56MB
007 Key Management (OBJ 2.8).en.srt 5.11KB
007 Key Management (OBJ 2.8).mp4 47.95MB
007 Mitigating Threats (OBJ 5.1).en.srt 5.64KB
007 Mitigating Threats (OBJ 5.1).mp4 56.32MB
007 Network Access Control (OBJ 3.3 & 4.4).en.srt 5.80KB
007 Network Access Control (OBJ 3.3 & 4.4).mp4 56.67MB
007 NIDS and NIPS (OBJ 3.3).en.srt 9.22KB
007 NIDS and NIPS (OBJ 3.3).mp4 92.37MB
007 Patch Management (OBJ 1.6 & 3.2).en.srt 7.63KB
007 Patch Management (OBJ 1.6 & 3.2).mp4 83.43MB
007 Securing the BIOS (OBJ 3.2).en.srt 8.13KB
007 Securing the BIOS (OBJ 3.2).mp4 86.17MB
007 Security of Apps (OBJ 3.1 & 3.5).en.srt 10.48KB
007 Security of Apps (OBJ 3.1 & 3.5).mp4 109.42MB
007 Security Policies (OBJ 5.3 & 5.5).en.srt 24.25KB
007 Security Policies (OBJ 5.3 & 5.5).mp4 225.33MB
007 Server Redundancy (OBJ 2.5 &3.3).en.srt 3.69KB
007 Server Redundancy (OBJ 2.5 &3.3).mp4 38.34MB
007 Spyware (OBJ 1.2).en.srt 5.44KB
007 Spyware (OBJ 1.2).mp4 58.14MB
007 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt 5.31KB
007 Stopping a DDoS (OBJ 2.1 & 2.3).mp4 52.44MB
007 VPN (OBJ 3.3).en.srt 6.47KB
007 VPN (OBJ 3.3).mp4 63.56MB
007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt 9.78KB
007 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4 91.49MB
007 XSS and XSRF (OBJ 1.3).en.srt 6.44KB
007 XSS and XSRF (OBJ 1.3).mp4 68.72MB
008 __ API (OBJ 2.1).en.srt 13.38KB
008 __ API (OBJ 2.1).mp4 40.62MB
008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt 17.96KB
008 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4 49.63MB
008 __ Influence Campaigns (OBJ 1.1).en.srt 9.07KB
008 __ Influence Campaigns (OBJ 1.1).mp4 40.10MB
008 BYOD (OBJ 3.5).en.srt 10.19KB
008 BYOD (OBJ 3.5).mp4 107.63MB
008 Demo_ Wireless Attack (OBJ 1.4).en.srt 13.36KB
008 Demo_ Wireless Attack (OBJ 1.4).mp4 103.31MB
008 Group Policies (OBJ 2.1).en.srt 4.91KB
008 Group Policies (OBJ 2.1).mp4 56.44MB
008 Hackers (OBJ 1.5).en.srt 9.94KB
008 Hackers (OBJ 1.5).mp4 104.89MB
008 Logging (OBJ 1.7, 4.3, & 4.5).en.srt 7.90KB
008 Logging (OBJ 1.7, 4.3, & 4.5).mp4 79.54MB
008 One-Time Pad (OBJ 2.8).en.srt 9.27KB
008 One-Time Pad (OBJ 2.8).mp4 94.51MB
008 Password Analysis (OBJ 1.2).en.srt 13.06KB
008 Password Analysis (OBJ 1.2).mp4 127.42MB
008 RADIUS vs TACACS+ (OBJ 3.8).en.srt 4.48KB
008 RADIUS vs TACACS+ (OBJ 3.8).mp4 49.87MB
008 Redundant Sites (OBJ 2.1).en.srt 5.44KB
008 Redundant Sites (OBJ 2.1).mp4 50.70MB
008 Rootkits (OBJ 1.2 & 1.3).en.srt 6.86KB
008 Rootkits (OBJ 1.2 & 1.3).mp4 75.59MB
008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt 6.76KB
008 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4 73.04MB
008 Spoofing (OBJ 1.4 & 3.3).en.srt 2.82KB
008 Spoofing (OBJ 1.4 & 3.3).mp4 28.53MB
008 SQL Injection (OBJ 1.3).en.srt 12.60KB
008 SQL Injection (OBJ 1.3).mp4 141.47MB
008 Symptoms of Infection (OBJ 1.2).en.srt 8.74KB
008 Symptoms of Infection (OBJ 1.2).mp4 91.40MB
008 Unified Threat Management (OBJ 3.2 & 3.3).en.srt 3.73KB
008 Unified Threat Management (OBJ 3.2 & 3.3).mp4 41.62MB
008 User Account Control (OBJ 3.7 & 3.8).en.srt 4.34KB
008 User Account Control (OBJ 3.7 & 3.8).mp4 40.83MB
008 User Education (OBJ 5.3).en.srt 9.32KB
008 User Education (OBJ 5.3).mp4 88.88MB
008 VLANs (OBJ 3.3).en.srt 3.02KB
008 VLANs (OBJ 3.3).mp4 33.11MB
009 __ FAAS and Serverless (OBJ 2.2).en.srt 18.13KB
009 __ FAAS and Serverless (OBJ 2.2).mp4 51.28MB
009 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt 7.98KB
009 __ Mitigating Vulnerabilities (OBJ 2.6).mp4 22.23MB
009 __ WPA3 (OBJ 3.4).en.srt 12.15KB
009 __ WPA3 (OBJ 3.4).mp4 39.08MB
009 Authentication Summary (OBJ 3.8).en.srt 3.62KB
009 Authentication Summary (OBJ 3.8).mp4 43.71MB
009 Data Backup (OBJ 2.5).en.srt 6.22KB
009 Data Backup (OBJ 2.5).mp4 62.71MB
009 Demo_ Group Policies (OBJ 3.2).en.srt 7.87KB
009 Demo_ Group Policies (OBJ 3.2).mp4 30.89MB
009 Demo_ Password Cracking (OBJ 4.1).en.srt 4.83KB
009 Demo_ Password Cracking (OBJ 4.1).mp4 39.04MB
009 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt 13.44KB
009 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4 74.85MB
009 Demo_ Steganography (OBJ 2.8).en.srt 7.99KB
009 Demo_ Steganography (OBJ 2.8).mp4 42.15MB
009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt 9.13KB
009 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4 106.73MB
009 Hardening Mobile Devices (OBJ 3.5).en.srt 7.26KB
009 Hardening Mobile Devices (OBJ 3.5).mp4 81.84MB
009 Hijacking (OBJ 1.3 & 1.4).en.srt 8.50KB
009 Hijacking (OBJ 1.3 & 1.4).mp4 74.66MB
009 Log Files (OBJ 4.3).en.srt 11.21KB
009 Log Files (OBJ 4.3).mp4 114.82MB
009 Removing Malware (OBJ 4.2).en.srt 10.79KB
009 Removing Malware (OBJ 4.2).mp4 108.29MB
009 Spam (OBJ 1.1).en.srt 5.84KB
009 Spam (OBJ 1.1).mp4 65.14MB
009 Subnetting (OBJ 3.6).en.srt 4.17KB
009 Subnetting (OBJ 3.6).mp4 41.36MB
009 Threat Actors (1.5).en.srt 6.48KB
009 Threat Actors (1.5).mp4 68.27MB
009 User Education (OBJ 5.3).en.srt 11.07KB
009 User Education (OBJ 5.3).mp4 105.26MB
009 Vendor Relationships (OBJ 5.3).en.srt 17.68KB
009 Vendor Relationships (OBJ 5.3).mp4 167.16MB
010 __ Authentication Attacks (OBJ 1.2).en.srt 16.46KB
010 __ Authentication Attacks (OBJ 1.2).mp4 42.44MB
010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt 18.30KB
010 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4 40.96MB
010 __ Cryptography Considerations (OBJ 2.8).en.srt 27.49KB
010 __ Cryptography Considerations (OBJ 2.8).mp4 76.61MB
010 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt 12.06KB
010 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4 52.40MB
010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt 14.21KB
010 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4 47.82MB
010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt 19.60KB
010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 58.00MB
010 __ XML Vulnerabilities (OBJ 1.3).en.srt 10.97KB
010 __ XML Vulnerabilities (OBJ 1.3).mp4 49.28MB
010 Disposal Policies (OBJ 2.7 & 4.1).en.srt 12.29KB
010 Disposal Policies (OBJ 2.7 & 4.1).mp4 110.05MB
010 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt 6.26KB
010 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4 69.02MB
010 Network Address Translation (OBJ 3.3).en.srt 4.84KB
010 Network Address Translation (OBJ 3.3).mp4 52.66MB
010 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt 13.80KB
010 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4 132.20MB
010 Preventing Malware (OBJ 1.6 & 3.2).en.srt 12.21KB
010 Preventing Malware (OBJ 1.6 & 3.2).mp4 128.84MB
010 Replay Attack (OBJ 1.3).en.srt 3.22KB
010 Replay Attack (OBJ 1.3).mp4 32.02MB
010 SIEM (OBJ 1.7 & 4.3).en.srt 19.00KB
010 SIEM (OBJ 1.7 & 4.3).mp4 65.87MB
010 Summary of Malware.en.srt 4.17KB
010 Summary of Malware.mp4 44.67MB
010 Tape Rotation (OBJ 2.5).en.srt 8.49KB
010 Tape Rotation (OBJ 2.5).mp4 85.12MB
011 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt 17.37KB
011 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 39.54MB
011 __ Race Conditions (OBJ 1.3).en.srt 12.92KB
011 __ Race Conditions (OBJ 1.3).mp4 34.59MB
011 __ Syslog (OBJ 1.7 & 4.3).en.srt 12.30KB
011 __ Syslog (OBJ 1.7 & 4.3).mp4 42.49MB
011 __ Threat Hunting (OBJ 1.7).en.srt 15.26KB
011 __ Threat Hunting (OBJ 1.7).mp4 42.98MB
011 Demo_ Null Sessions (OBJ 1.6).en.srt 4.85KB
011 Demo_ Null Sessions (OBJ 1.6).mp4 38.61MB
011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt 13.52KB
011 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4 123.19MB
011 IT Security Frameworks (OBJ 5.2).en.srt 7.13KB
011 IT Security Frameworks (OBJ 5.2).mp4 71.12MB
011 Telephony (OBJ 3.1).en.srt 13.10KB
011 Telephony (OBJ 3.1).mp4 130.69MB
012 __ Attack Frameworks (OBJ 4.2).en.srt 24.75KB
012 __ Attack Frameworks (OBJ 4.2).mp4 87.68MB
012 __ Business Impact Analysis (OBJ 5.4).en.srt 35.13KB
012 __ Business Impact Analysis (OBJ 5.4).mp4 118.33MB
012 __ Design Vulnerabilities (OBJ 1.3).en.srt 9.49KB
012 __ Design Vulnerabilities (OBJ 1.3).mp4 26.86MB
012 __ Key Frameworks (OBJ 5.2).en.srt 17.99KB
012 __ Key Frameworks (OBJ 5.2).mp4 77.23MB
012 __ SOAR (OBJ 1.7 & 4.4).en.srt 7.50KB
012 __ SOAR (OBJ 1.7 & 4.4).mp4 21.26MB
012 Transitive Attacks (OBJ 2.4).en.srt 3.20KB
012 Transitive Attacks (OBJ 2.4).mp4 31.63MB
013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt 9.83KB
013 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4 96.23MB
014 ARP Poisoning (OBJ 1.4).en.srt 3.25KB
014 ARP Poisoning (OBJ 1.4).mp4 32.57MB
external-assets-links.txt 151B
udemy-dl.log 0B
Distribution statistics by country
United States (US) 3
France (FR) 1
Italy (IT) 1
United Kingdom (GB) 1
Belgium (BE) 1
Republic of Korea (KR) 1
Total 8
IP List List of IP addresses which were distributed this torrent