Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
491.25KB |
1 |
614.44KB |
1. Overview.mp4 |
74.63MB |
10 |
564.32KB |
10. Baselines & Templates & Software Assurance.mp4 |
281.69MB |
11 |
716.78KB |
11. Integrating Enterprise Applications.mp4 |
123.60MB |
12 |
1.27MB |
12. Security in the Development Lifecycle.mp4 |
275.78MB |
13 |
1.47MB |
13. Securing Enterprise Architecture.mp4 |
295.66MB |
14 |
1.13MB |
14. Authentication & Authorization - Discussion.mp4 |
274.17MB |
15 |
610.73KB |
15. Authentication & Authorization - Scenarios.mp4 |
232.25MB |
16 |
502.42KB |
16. Secure Cloud & Virtualization.mp4 |
272.33MB |
17 |
1.53MB |
17. Cryptography & PKI.mp4 |
270.62MB |
18 |
1.77MB |
18. Impact of Emerging Technologies.mp4 |
317.74MB |
19 |
268.83KB |
19. Security Architecture - Key Points.mp4 |
161.82MB |
2 |
255.87KB |
2. Services - Discussion.mp4 |
291.03MB |
20 |
353.35KB |
20. Perform Threat Management.mp4 |
288.52MB |
21 |
1.79MB |
21. Indicators of Compromise & Response.mp4 |
325.51MB |
22 |
670.83KB |
22. Vulnerability Management Activities.mp4 |
277.97MB |
23 |
1.48MB |
23. Vulnerability Assessment - Methods & Tools.mp4 |
320.23MB |
24 |
133.38KB |
24. Analyze Vulnerabilities - Vulnerabilities.mp4 |
317.65MB |
25 |
1.37MB |
25. Analyze Vulnerabilities - Vulnerable Systems.mp4 |
288.18MB |
26 |
1.49MB |
26. Analyze Vulnerabilities - Attacks.mp4 |
316.21MB |
27 |
785.47KB |
27. Use Processes to Reduce Risk.mp4 |
304.51MB |
28 |
191.53KB |
28. Triage & Incident Response.mp4 |
285.39MB |
29 |
1.71MB |
29. Forensic Concepts.mp4 |
253.80MB |
3 |
1.95MB |
3. Segmentation - Discussion.mp4 |
254.87MB |
30 |
346.82KB |
30. File Carving & Binary Analysis.mp4 |
322.47MB |
31 |
989.71KB |
31. Analysis Tools.mp4 |
335.40MB |
32 |
1.88MB |
32. Live Collection Tools.mp4 |
296.29MB |
33 |
1.48MB |
33. Security Operations - Key Points.mp4 |
171.79MB |
34 |
1.82MB |
34. Managed Configurations.mp4 |
379.72MB |
35 |
11.32KB |
35. Deployment Scenarios.mp4 |
180.24MB |
36 |
1.46MB |
36. Security Considerations.mp4 |
356.73MB |
37 |
620.42KB |
37. Hardening Techniques.mp4 |
336.87MB |
38 |
965.86KB |
38. Processes.mp4 |
431.52MB |
39 |
312.46KB |
39. Mandatory Access Control.mp4 |
286.54MB |
4 |
765.06KB |
4. Services & Segmentation - Scenarios.mp4 |
303.23MB |
40 |
1.13MB |
40. Trustworthy Computing.mp4 |
416.82MB |
41 |
1.93MB |
41. Compensating Controls.mp4 |
136.84MB |
42 |
28.68KB |
42. Security Considerations - Embedded.mp4 |
309.87MB |
43 |
225.31KB |
43. Security Considerations - ICS-SCADA.mp4 |
380.37MB |
44 |
1.83MB |
44. Security Considerations - Protocols.mp4 |
369.45MB |
45 |
251.95KB |
45. Security Considerations - Sectors.mp4 |
134.40MB |
46 |
1.67MB |
46. Cloud Technology - Basics.mp4 |
431.40MB |
47 |
1.38MB |
47. Cloud Technology - Advanced.mp4 |
388.48MB |
48 |
315.43KB |
48. PKI - Basics.mp4 |
427.75MB |
49 |
1.13MB |
49. PKI - Advanced.mp4 |
361.30MB |
5 |
1.18MB |
5. DeperimeterizationZero Trust.mp4 |
261.69MB |
50 |
202.74KB |
50. Hashing & Symmetric Algorithms.mp4 |
416.76MB |
51 |
1.14MB |
51. Asymmetric Algorithms & Protocols.mp4 |
418.05MB |
52 |
1.65MB |
52. Troubleshoot Cryptography - Keys.mp4 |
196.78MB |
53 |
343.58KB |
53. Security Engineering & Cryptography - Key Points.mp4 |
140.16MB |
54 |
1.42MB |
54. Troubleshoot Cryptography - Misconfigurations.mp4 |
280.87MB |
55 |
1.75MB |
55. Risk Assessment.mp4 |
417.25MB |
56 |
1.08MB |
56. Risk Handling Techniques.mp4 |
297.81MB |
57 |
783.64KB |
57. Risk Types.mp4 |
273.75MB |
58 |
1.22MB |
58. Risk Management Life Cycle.mp4 |
278.07MB |
59 |
879.32KB |
59. Risk Tracking.mp4 |
346.53MB |
6 |
1.24MB |
6. Merging of Networks.mp4 |
251.66MB |
60 |
1.81MB |
60. Policies and Security Practices.mp4 |
287.99MB |
61 |
1.76MB |
61. Shared Responsibility Model - Cloud.mp4 |
174.82MB |
62 |
1.05MB |
62. Performing Vendor Assessments.mp4 |
285.06MB |
63 |
1.18MB |
63. Technical Considerations.mp4 |
244.58MB |
64 |
210.63KB |
64. Data Considerations.mp4 |
306.63MB |
65 |
184.39KB |
65. Regulations Accreditations & Standards.mp4 |
310.52MB |
66 |
673.25KB |
66. Legal Considerations.mp4 |
195.14MB |
67 |
1.84MB |
67. Contract and Agreement Types.mp4 |
161.34MB |
68 |
1.16MB |
68. Business Impact Analysis (BIA).mp4 |
252.86MB |
69 |
1.60MB |
69. Privacy Impact Assessment.mp4 |
115.76MB |
7 |
1.52MB |
7. Software-defined Networking (SDN).mp4 |
222.92MB |
70 |
407.99KB |
70. Disaster Recovery & Business Continuity Planning.mp4 |
174.95MB |
71 |
243.88KB |
71. Incident Response Plan.mp4 |
197.23MB |
72 |
1.37MB |
72. Testing Plans.mp4 |
311.34MB |
73. Governance, Risk & Compliance - Key Points.mp4 |
184.19MB |
8 |
1.63MB |
8. Infrastructure Design - Discussion.mp4 |
290.12MB |
9 |
285.55KB |
9. Infrastructure Design - Scenarios.mp4 |
252.35MB |
CASP004-ADISH.zip |
4.98MB |
TutsNode.com.txt |
63B |