Torrent Info
Title CASP+ (CAS-004) Complete Course & Full-Length Practice Exam
Category
Size 37.16GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 46B
1 57B
1. Analyzing Vulnerabilities.mp4 29.40MB
1. Analyzing Vulnerabilities.srt 3.08KB
1. Asymmetric Algorithms.mp4 47.89MB
1. Asymmetric Algorithms.srt 4.49KB
1. Attacking Vulnerabilities.mp4 26.96MB
1. Attacking Vulnerabilities.srt 2.85KB
1. Authentication and Authorization (OBJ 1.5).mp4 37.22MB
1. Authentication and Authorization (OBJ 1.5).srt 3.71KB
1. Business Continuity (OBJ 4.4).mp4 25.23MB
1. Business Continuity (OBJ 4.4).srt 2.81KB
1. Cloud and Virtualization (OBJ 1.6).mp4 23.57MB
1. Cloud and Virtualization (OBJ 1.6).srt 2.39KB
1. Cloud Technologies.mp4 57.88MB
1. Cloud Technologies.srt 5.84KB
1. Conclusion.mp4 225.79MB
1. Conclusion.srt 26.14KB
1. Cryptography (OBJ 1.7).mp4 38.69MB
1. Cryptography (OBJ 1.7).srt 3.89KB
1. Data Considerations (OBJ 4.3).mp4 20.27MB
1. Data Considerations (OBJ 4.3).srt 2.26KB
1. Data Security (OBJ 1.4).mp4 78.28MB
1. Data Security (OBJ 1.4).srt 8.34KB
1. Digital Forensics.mp4 22.52MB
1. Digital Forensics.srt 2.30KB
1. Digital Forensic Tools.mp4 51.83MB
1. Digital Forensic Tools.srt 4.98KB
1. Emerging Technology (OBJ 1.8).mp4 93.13MB
1. Emerging Technology (OBJ 1.8).srt 10.98KB
1. Endpoint Security Controls.mp4 52.75MB
1. Endpoint Security Controls.srt 5.28KB
1. Enterprise Mobility.mp4 57.24MB
1. Enterprise Mobility.srt 5.78KB
1. Hashing and Symmetric Algorithms.mp4 25.91MB
1. Hashing and Symmetric Algorithms.srt 2.77KB
1. Incident Response.mp4 31.23MB
1. Incident Response.srt 3.14KB
1. Indicators of Compromise.mp4 39.36MB
1. Indicators of Compromise.srt 3.76KB
1. Infrastructure Design (OBJ 1.2).mp4 24.79MB
1. Infrastructure Design (OBJ 1.2).srt 2.49KB
1. Operational Technologies.mp4 45.13MB
1. Operational Technologies.srt 4.32KB
1. Policies and Frameworks (OBJ. 4.1 & 4.3).mp4 30.24MB
1. Policies and Frameworks (OBJ. 4.1 & 4.3).srt 3.09KB
1. Public Key Infrastructure.mp4 61.75MB
1. Public Key Infrastructure.srt 6.25KB
1. Risk Management (OBJ 4.1).mp4 32.45MB
1. Risk Management (OBJ 4.1).srt 3.58KB
1. Risk Reduction.mp4 33.41MB
1. Risk Reduction.srt 3.22KB
1. Risk Strategies (OBJ 4.1).mp4 33.25MB
1. Risk Strategies (OBJ 4.1).srt 3.48KB
1. Securing Architectures (OBJ 1.1).mp4 26.71MB
1. Securing Architectures (OBJ 1.1).srt 2.80KB
1. Securing Networks (OBJ 1.1).mp4 149.57MB
1. Securing Networks (OBJ 1.1).srt 16.43KB
1. Software Applications (OBJ 1.3).mp4 58.29MB
1. Software Applications (OBJ 1.3).srt 6.50KB
1. Threat and Vulnerability Management.mp4 41.91MB
1. Threat and Vulnerability Management.srt 4.38KB
1. Vendor Risk (OBJ 4.2).mp4 88.25MB
1. Vendor Risk (OBJ 4.2).srt 9.81KB
1. Vulnerability Assessments.mp4 33.78MB
1. Vulnerability Assessments.srt 3.51KB
1. Welcome.mp4 184.93MB
1. Welcome.srt 21.29KB
10 449.09KB
10. Analysis Utilities (OBJ. 2.4).mp4 110.13MB
10. Analysis Utilities (OBJ. 2.4).srt 12.73KB
10. Auditing Files (OBJ 1.4).mp4 46.96MB
10. Auditing Files (OBJ 1.4).srt 8.39KB
10. Checkpoint Analyzing Vulnerabilities.html 160B
10. Checkpoint Cloud and Virtualization.html 160B
10. Checkpoint Enterprise Mobility.html 160B
10. Checkpoint Indicators of Compromise.html 160B
10. Checkpoint Vendor Risk.html 160B
10. Collection Tools (OBJ. 2.9).mp4 133.14MB
10. Collection Tools (OBJ. 2.9).srt 13.45KB
10. Key Stretching (OBJ. 3.6).mp4 94.89MB
10. Key Stretching (OBJ. 3.6).srt 10.76KB
10. Logging and Monitoring (OBJ. 3.2).mp4 133.20MB
10. Logging and Monitoring (OBJ. 3.2).srt 14.98KB
10. Merging Networks (OBJ 1.1).mp4 118.16MB
10. Merging Networks (OBJ 1.1).srt 13.69KB
10. Network Access Control (NAC) (OBJ 1.1).mp4 61.91MB
10. Network Access Control (NAC) (OBJ 1.1).srt 6.72KB
10. Quantum Computing (OBJ 1.8).mp4 121.07MB
10. Quantum Computing (OBJ 1.8).srt 12.89KB
10. Root of Trust (OBJ 1.5).mp4 93.57MB
10. Root of Trust (OBJ 1.5).srt 9.94KB
10. Troubleshooting Certificates (OBJ. 3.7).mp4 115.07MB
10. Troubleshooting Certificates (OBJ. 3.7).srt 13.32KB
10. VM Attacks (OBJ. 2.5).mp4 100.86MB
10. VM Attacks (OBJ. 2.5).srt 11.82KB
100 714.24KB
101 721.70KB
102 848.46KB
103 1.21MB
104 438.66KB
105 1.20MB
106 86.83KB
107 95.75KB
108 174.20KB
109 364.59KB
11 96.76KB
11. Attestation (OBJ 1.5).mp4 48.93MB
11. Attestation (OBJ 1.5).srt 5.38KB
11. Checkpoint Asymmetric Algorithms.html 160B
11. Checkpoint Data Security.html 160B
11. Checkpoint Emerging Technology.html 160B
11. Configuring SIEM Agents (OBJ. 3.2).mp4 141.36MB
11. Configuring SIEM Agents (OBJ. 3.2).srt 41.05KB
11. Network Attacks (OBJ. 2.5).mp4 239.52MB
11. Network Attacks (OBJ. 2.5).srt 26.60KB
11. Remote Access (OBJ 1.1).mp4 195.45MB
11. Remote Access (OBJ 1.1).srt 20.51KB
11. Software-Defined Networking (SDN) (OBJ 1.1).mp4 117.52MB
11. Software-Defined Networking (SDN) (OBJ 1.1).srt 13.16KB
11. Troubleshooting Keys (OBJ. 3.7).mp4 75.27MB
11. Troubleshooting Keys (OBJ. 3.7).srt 8.76KB
11. Using Collection Tools (OBJ. 2.10).mp4 45.35MB
11. Using Collection Tools (OBJ. 2.10).srt 10.27KB
11. Vulnerability Scanning (OBJ. 2.4).mp4 81.97MB
11. Vulnerability Scanning (OBJ. 2.4).srt 20.84KB
110 806.29KB
111 1.20MB
112 33.82KB
113 521.96KB
114 581.33KB
115 708.60KB
116 1.38MB
117 1.45MB
118 1.95MB
119 4.80KB
12 105.46KB
12. Analyzing Scan Outputs (OBJ. 2.4).mp4 80.55MB
12. Analyzing Scan Outputs (OBJ. 2.4).srt 31.19KB
12. Analyzing Web Applications (OBJ. 2.5).mp4 136.72MB
12. Analyzing Web Applications (OBJ. 2.5).srt 34.38KB
12. Checkpoint Digital Forensic Tools.html 160B
12. Checkpoint Public Key Infrastructure.html 160B
12. Checkpoint Securing Architectures.html 160B
12. Identity Proofing (OBJ 1.5).mp4 77.97MB
12. Identity Proofing (OBJ 1.5).srt 8.71KB
12. Resiliency (OBJ. 3.2).mp4 132.80MB
12. Resiliency (OBJ. 3.2).srt 15.02KB
12. Unified Communications (OBJ 1.1).mp4 417.06MB
12. Unified Communications (OBJ 1.1).srt 45.35KB
120 656.52KB
121 292.22KB
122 729.47KB
123 1.32MB
124 1.61MB
125 1.67MB
126 1.28MB
127 1.30MB
128 410.43KB
129 514.33KB
13 520.65KB
13. Checkpoint Authentication and Authorization.html 160B
13. Checkpoint Endpoint Security Controls.html 160B
13. Checkpoint Vulnerability Assessments.html 160B
13. Cloud vs On-premise (OBJ 1.1).mp4 105.64MB
13. Cloud vs On-premise (OBJ 1.1).srt 11.95KB
13. Social Engineering (OBJ. 2.5).mp4 157.40MB
13. Social Engineering (OBJ. 2.5).srt 17.48KB
130 1.39MB
131 1.98MB
132 820.99KB
133 876.33KB
134 1.20MB
135 1.49MB
136 1.61MB
137 309.62KB
138 424.60KB
139 1.11MB
14 1.22MB
14. DNSSEC (OBJ 1.1).mp4 92.83MB
14. DNSSEC (OBJ 1.1).srt 8.79KB
14. Phishing Campaigns (OBJ. 2.5).mp4 46.06MB
14. Phishing Campaigns (OBJ. 2.5).srt 12.26KB
140 1.27MB
141 1.28MB
142 746.90KB
143 998.03KB
144 480.65KB
145 1.12MB
146 1.16MB
147 416.23KB
148 744.45KB
149 951.67KB
15 514.08KB
15. Checkpoint Attacking Vulnerabilities.html 160B
15. Load Balancer (OBJ 1.1).mp4 147.21MB
15. Load Balancer (OBJ 1.1).srt 15.84KB
150 1.07MB
151 1.52MB
152 1.93MB
153 1.84MB
154 209.18KB
155 470.52KB
156 490.33KB
157 950.73KB
158 1.38MB
159 1.81MB
16 126.23KB
16. Checkpoint Securing Networks.html 160B
160 1.09MB
161 1.72MB
162 494.47KB
163 1.57MB
164 1.87MB
165 71.12KB
166 85.60KB
167 571.78KB
168 1.84MB
169 1.91MB
17 652.71KB
170 333.30KB
171 232.51KB
172 372.05KB
173 908.65KB
174 1.62MB
175 621.89KB
176 777.57KB
177 785.54KB
178 1.54MB
179 1.69MB
18 287.28KB
180 194.97KB
181 1.14MB
182 1.62MB
183 1.78MB
184 86.27KB
185 157.30KB
186 211.61KB
187 966.83KB
188 1.45MB
189 1.33MB
19 488.13KB
190 1.54MB
191 1.75MB
192 1.78MB
193 1.98MB
194 788.88KB
195 1.11MB
196 1.93MB
197 442.99KB
198 893.26KB
199 1.17MB
2 111B
2.1 CASP (CAS-004) Objectives.pdf 1.50MB
2.2 CompTIA CASP+ (CAS-004) Study Notes.pdf 4.09MB
2. Access Control (OBJ 1.5).mp4 101.81MB
2. Access Control (OBJ 1.5).srt 11.66KB
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).mp4 192.36MB
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).srt 22.53KB
2. Asset Value (OBJ 4.1).mp4 88.19MB
2. Asset Value (OBJ 4.1).srt 9.44KB
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).mp4 171.08MB
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).srt 19.23KB
2. Business Continuity Plan (OBJ 4.4).mp4 299.78MB
2. Business Continuity Plan (OBJ 4.4).srt 35.58KB
2. Business Models (OBJ 4.2).mp4 239.34MB
2. Business Models (OBJ 4.2).srt 28.45KB
2. CASP+ (CAS-004) Practice Exam.html 160B
2. Cloud Deployment Models (OBJ 1.6).mp4 96.25MB
2. Cloud Deployment Models (OBJ 1.6).srt 11.04KB
2. Data Life Cycle (OBJ 1.4).mp4 229.21MB
2. Data Life Cycle (OBJ 1.4).srt 24.98KB
2. Data Security (OBJ. 4.3).mp4 79.97MB
2. Data Security (OBJ. 4.3).srt 8.78KB
2. Deceptive Technologies (OBJ. 2.6).mp4 105.11MB
2. Deceptive Technologies (OBJ. 2.6).srt 11.87KB
2. Device Hardening (OBJ. 3.2).mp4 182.84MB
2. Device Hardening (OBJ. 3.2).srt 19.89KB
2. Directory Traversals (OBJ. 2.5).mp4 211.66MB
2. Directory Traversals (OBJ. 2.5).srt 20.90KB
2. Download Your Free Study Guide.html 76B
2. Embedded Systems (OBJ. 3.3).mp4 226.52MB
2. Embedded Systems (OBJ. 3.3).srt 24.87KB
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).mp4 211.05MB
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).srt 23.03KB
2. Forensic Process (OBJ. 2.8).mp4 100.38MB
2. Forensic Process (OBJ. 2.8).srt 11.86KB
2. Forensic Workstations (OBJ. 2.9).mp4 107.67MB
2. Forensic Workstations (OBJ. 2.9).srt 12.50KB
2. Hashing (OBJ. 3.6).mp4 147.64MB
2. Hashing (OBJ. 3.6).srt 16.17KB
2. Penetration Test (OBJ. 2.4).mp4 103.39MB
2. Penetration Test (OBJ. 2.4).srt 11.66KB
2. PKI Components (OBJ. 3.5).mp4 223.24MB
2. PKI Components (OBJ. 3.5).srt 24.53KB
2. Policies (OBJ. 4.1).mp4 261.96MB
2. Policies (OBJ. 4.1).srt 32.80KB
2. Privacy and Confidentiality (OBJ 1.7).mp4 143.97MB
2. Privacy and Confidentiality (OBJ 1.7).srt 14.67KB
2. Race Conditions (OBJ. 2.5).mp4 104.38MB
2. Race Conditions (OBJ. 2.5).srt 11.54KB
2. Risk Strategies (OBJ. 4.1).mp4 96.67MB
2. Risk Strategies (OBJ. 4.1).srt 11.76KB
2. Scalability (OBJ 1.2).mp4 121.27MB
2. Scalability (OBJ 1.2).srt 12.67KB
2. Switches (OBJ 1.1).mp4 153.59MB
2. Switches (OBJ 1.1).srt 17.36KB
2. Systems Development Life Cycle (OBJ 1.3).mp4 143.31MB
2. Systems Development Life Cycle (OBJ 1.3).srt 16.63KB
2. Threat Intelligence (OBJ. 2.1).mp4 135.60MB
2. Threat Intelligence (OBJ. 2.1).srt 15.86KB
2. Traffic Mirroring (OBJ 1.1).mp4 94.07MB
2. Traffic Mirroring (OBJ 1.1).srt 10.28KB
2. Triage (OBJ. 2.7).mp4 174.75MB
2. Triage (OBJ. 2.7).srt 19.19KB
2. Types of IoCs (OBJ. 2.2).mp4 61.96MB
2. Types of IoCs (OBJ. 2.2).srt 9.15KB
2. Using Asymmetric Algortihms.mp4 200.81MB
2. Using Asymmetric Algortihms.srt 22.14KB
20 671.26KB
200 322.42KB
201 389.94KB
202 1.97MB
203 1.59MB
204 1.75MB
205 1.81MB
206 1.44MB
207 1.55MB
208 26.58KB
209 1.47MB
21 1.87MB
210 34.73KB
211 134.37KB
212 1.43MB
213 1.45MB
214 31.64KB
215 1.72MB
216 33.90KB
217 1.37MB
218 1.69MB
219 263.59KB
22 1.99MB
220 272.83KB
221 747.88KB
222 1.26MB
223 1.45MB
224 1.67MB
225 1.67MB
226 51.30KB
227 1.00MB
228 897.18KB
229 1.03MB
23 1.44MB
230 1.24MB
231 1.47MB
232 1.07MB
233 1.27MB
234 1.45MB
235 1.50MB
236 43.04KB
237 97.23KB
238 256.92KB
239 590.63KB
24 33.58KB
240 1.58MB
241 1.71MB
242 1.77MB
243 120.17KB
244 777.54KB
245 1.54MB
246 1.91MB
247 415.97KB
248 576.50KB
249 1.25MB
25 358.61KB
250 178.90KB
251 1.07MB
252 112.59KB
253 1.04MB
254 1.94MB
255 664.35KB
256 888.45KB
257 90.50KB
258 1.80MB
259 658.88KB
26 1.37MB
260 1.31MB
261 1.61MB
262 794.18KB
263 1.33MB
264 1.34MB
265 1.72MB
266 224.52KB
267 602.22KB
268 765.58KB
269 1.55MB
27 645.38KB
270 785.65KB
271 1.76MB
272 612.92KB
273 1.28MB
274 1.04MB
275 1.29MB
276 92.68KB
277 785.93KB
278 1.21MB
279 1.28MB
28 1.49MB
280 1.87MB
281 437.05KB
282 1.48MB
283 1.73MB
29 1.95MB
3 78B
3. Access Control (OBJ 4.1).mp4 136.70MB
3. Access Control (OBJ 4.1).srt 14.94KB
3. Buffer Overflows (OBJ. 2.5).mp4 271.11MB
3. Buffer Overflows (OBJ. 2.5).srt 29.78KB
3. Business Impact Analysis (OBJ 4.4).mp4 299.72MB
3. Business Impact Analysis (OBJ 4.4).srt 33.08KB
3. Calculating Hash Digests (OBJ. 3.6).mp4 34.28MB
3. Calculating Hash Digests (OBJ. 3.6).srt 6.16KB
3. Chain of Custody (OBJ. 2.8).mp4 154.37MB
3. Chain of Custody (OBJ. 2.8).srt 17.48KB
3. Checkpoint Introduction.html 160B
3. Cloud Encryption (OBJ. 3.4).mp4 114.19MB
3. Cloud Encryption (OBJ. 3.4).srt 12.83KB
3. Cloud Service Models (OBJ 1.6).mp4 109.93MB
3. Cloud Service Models (OBJ 1.6).srt 12.50KB
3. Communication Plan (OBJ. 2.7).mp4 219.69MB
3. Communication Plan (OBJ. 2.7).srt 25.04KB
3. Credential Management (OBJ 1.5).mp4 95.23MB
3. Credential Management (OBJ 1.5).srt 10.52KB
3. Cross-Site Scripting (XSS) (OBJ. 2.5).mp4 194.46MB
3. Cross-Site Scripting (XSS) (OBJ. 2.5).srt 21.18KB
3. Data Classification (OBJ. 4.3).mp4 58.42MB
3. Data Classification (OBJ. 4.3).srt 6.49KB
3. Data Classification (OBJ 1.4).mp4 151.30MB
3. Data Classification (OBJ 1.4).srt 17.11KB
3. Deep Learning (OBJ 1.8).mp4 194.60MB
3. Deep Learning (OBJ 1.8).srt 21.99KB
3. Digital Certificates (OBJ. 3.5).mp4 163.00MB
3. Digital Certificates (OBJ. 3.5).srt 18.85KB
3. File Carving Tools (OBJ. 2.9).mp4 76.31MB
3. File Carving Tools (OBJ. 2.9).srt 7.80KB
3. Frameworks (OBJ. 4.1).mp4 109.92MB
3. Frameworks (OBJ. 4.1).srt 12.63KB
3. ICS and SCADA (OBJ. 3.3).mp4 198.18MB
3. ICS and SCADA (OBJ. 3.3).srt 23.53KB
3. Influences (OBJ 4.2).mp4 162.91MB
3. Influences (OBJ 4.2).srt 18.54KB
3. Integrity and Non-repudiation (OBJ 1.7).mp4 142.00MB
3. Integrity and Non-repudiation (OBJ 1.7).srt 14.72KB
3. Network Sensors (OBJ 1.1).mp4 253.49MB
3. Network Sensors (OBJ 1.1).srt 28.35KB
3. PCAP Files (OBJ. 2.2).mp4 90.03MB
3. PCAP Files (OBJ. 2.2).srt 9.66KB
3. PenTest Steps (OBJ. 2.4).mp4 152.69MB
3. PenTest Steps (OBJ. 2.4).srt 18.07KB
3. Resiliency Issues (OBJ 1.2).mp4 279.45MB
3. Resiliency Issues (OBJ 1.2).srt 30.16KB
3. Risk Management Lifecycle (OBJ. 4.1).mp4 256.65MB
3. Risk Management Lifecycle (OBJ. 4.1).srt 30.99KB
3. Routers (OBJ 1.1).mp4 179.48MB
3. Routers (OBJ 1.1).srt 18.76KB
3. Security Data Analytics (OBJ. 2.6).mp4 172.34MB
3. Security Data Analytics (OBJ. 2.6).srt 26.60KB
3. Software Development Life Cycle (OBJ 1.3).mp4 127.03MB
3. Software Development Life Cycle (OBJ 1.3).srt 14.29KB
3. SSLTLS and Cipher Suites (OBJ. 3.6).mp4 183.22MB
3. SSLTLS and Cipher Suites (OBJ. 3.6).srt 18.93KB
3. Threat Hunting (OBJ. 2.1).mp4 143.43MB
3. Threat Hunting (OBJ. 2.1).srt 17.57KB
3. Unnecessary Services (OBJ. 3.2).mp4 58.23MB
3. Unnecessary Services (OBJ. 3.2).srt 11.84KB
3. WPA3 (OBJ. 3.1).mp4 156.70MB
3. WPA3 (OBJ. 3.1).srt 15.37KB
30 185.39KB
31 809.19KB
32 1.48MB
33 218.70KB
34 397.13KB
35 780.73KB
36 315.33KB
37 1.79MB
38 639.23KB
39 346.99KB
4 3B
4. Aggregating Risk (OBJ 4.1).mp4 66.53MB
4. Aggregating Risk (OBJ 4.1).srt 7.92KB
4. Automation (OBJ 1.2).mp4 138.39MB
4. Automation (OBJ 1.2).srt 15.40KB
4. Big Data (OBJ 1.8).mp4 99.92MB
4. Big Data (OBJ 1.8).srt 10.37KB
4. Binary Analysis Tools (OBJ. 2.9).mp4 151.17MB
4. Binary Analysis Tools (OBJ. 2.9).srt 16.56KB
4. Buffer Overflow Attack (OBJ. 2.6).mp4 91.62MB
4. Buffer Overflow Attack (OBJ. 2.6).srt 13.16KB
4. Compliance and Policy (OBJ 1.7).mp4 74.74MB
4. Compliance and Policy (OBJ 1.7).srt 7.98KB
4. Conduct Packet Analysis (OBJ. 2.2).mp4 80.57MB
4. Conduct Packet Analysis (OBJ. 2.2).srt 13.34KB
4. Connectivity Options (OBJ. 3.1).mp4 189.66MB
4. Connectivity Options (OBJ. 3.1).srt 19.81KB
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).mp4 157.65MB
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).srt 18.53KB
4. Data Types (OBJ. 4.3).mp4 117.54MB
4. Data Types (OBJ. 4.3).srt 12.93KB
4. Deployment Considerations (OBJ 1.6).mp4 108.09MB
4. Deployment Considerations (OBJ 1.6).srt 11.90KB
4. Development Approaches (OBJ 1.3).mp4 236.56MB
4. Development Approaches (OBJ 1.3).srt 28.01KB
4. Host Sensors (OBJ 1.1).mp4 130.73MB
4. Host Sensors (OBJ 1.1).srt 14.14KB
4. ICS Protocols (OBJ. 3.3).mp4 233.37MB
4. ICS Protocols (OBJ. 3.3).srt 26.42KB
4. Intelligence Collection (OBJ. 2.1).mp4 241.72MB
4. Intelligence Collection (OBJ. 2.1).srt 28.61KB
4. Labeling and Tagging (OBJ 1.4).mp4 178.15MB
4. Labeling and Tagging (OBJ 1.4).srt 19.80KB
4. Message Authentication (OBJ. 3.6).mp4 74.55MB
4. Message Authentication (OBJ. 3.6).srt 7.74KB
4. Order of Volatility (OBJ. 2.8).mp4 138.68MB
4. Order of Volatility (OBJ. 2.8).srt 16.18KB
4. Organizational Changes (OBJ 4.2).mp4 131.59MB
4. Organizational Changes (OBJ 4.2).srt 14.88KB
4. Password Policies (OBJ 1.5).mp4 171.66MB
4. Password Policies (OBJ 1.5).srt 18.28KB
4. Patching (OBJ. 3.2).mp4 99.79MB
4. Patching (OBJ. 3.2).srt 10.86KB
4. PenTest Requirements (OBJ. 2.4).mp4 252.78MB
4. PenTest Requirements (OBJ. 2.4).srt 29.62KB
4. Preventative Controls (OBJ. 2.6).mp4 110.43MB
4. Preventative Controls (OBJ. 2.6).srt 12.81KB
4. Privacy Impact Assessment (OBJ 4.4).mp4 84.45MB
4. Privacy Impact Assessment (OBJ 4.4).srt 9.83KB
4. Regulations (OBJ. 4.3).mp4 170.19MB
4. Regulations (OBJ. 4.3).srt 20.21KB
4. Risk Types (OBJ. 4.1).mp4 64.93MB
4. Risk Types (OBJ. 4.1).srt 7.61KB
4. Serverless Computing (OBJ. 3.4).mp4 195.59MB
4. Serverless Computing (OBJ. 3.4).srt 21.67KB
4. SMIME and SSH (OBJ. 3.6).mp4 162.78MB
4. SMIME and SSH (OBJ. 3.6).srt 18.14KB
4. Stakeholder Management (OBJ. 2.7).mp4 154.61MB
4. Stakeholder Management (OBJ. 2.7).srt 17.62KB
4. Using Digital Certificates (OBJ. 3.5).mp4 120.93MB
4. Using Digital Certificates (OBJ. 3.5).srt 13.67KB
4. Wireless and Mesh (OBJ 1.1).mp4 73.00MB
4. Wireless and Mesh (OBJ 1.1).srt 7.45KB
40 681.12KB
41 977.80KB
42 1.19MB
43 1.24MB
44 38.67KB
45 184.69KB
46 1.00MB
47 1.19MB
48 1.93MB
49 1.82MB
5 618.84KB
5. Application Controls (OBJ. 2.6).mp4 210.81MB
5. Application Controls (OBJ. 2.6).srt 24.22KB
5. Authentication and References (OBJ. 2.5).mp4 54.09MB
5. Authentication and References (OBJ. 2.5).srt 14.06KB
5. Blockchain & Distributed Consensus (OBJ 1.8).mp4 120.07MB
5. Blockchain & Distributed Consensus (OBJ 1.8).srt 13.28KB
5. Code Analysis (OBJ. 2.4).mp4 182.06MB
5. Code Analysis (OBJ. 2.4).srt 21.09KB
5. Data Retention (OBJ. 4.3).mp4 150.79MB
5. Data Retention (OBJ. 4.3).srt 17.75KB
5. Data States (OBJ 1.7).mp4 151.30MB
5. Data States (OBJ 1.7).srt 15.75KB
5. Deidentification (OBJ 1.4).mp4 243.36MB
5. Deidentification (OBJ 1.4).srt 26.28KB
5. EAP (OBJ. 3.6).mp4 117.80MB
5. EAP (OBJ. 3.6).srt 12.60KB
5. Exploring Server Certificates (OBJ. 3.5).mp4 24.72MB
5. Exploring Server Certificates (OBJ. 3.5).srt 7.37KB
5. Firewalls (OBJ 1.1).mp4 245.88MB
5. Firewalls (OBJ 1.1).srt 26.29KB
5. Forensic Analysis (OBJ. 2.8).mp4 143.49MB
5. Forensic Analysis (OBJ. 2.8).srt 15.15KB
5. Implementing Password Policies (OBJ 1.5).mp4 28.72MB
5. Implementing Password Policies (OBJ 1.5).srt 10.96KB
5. Incident Response Plan (OBJ 4.4).mp4 238.13MB
5. Incident Response Plan (OBJ 4.4).srt 28.15KB
5. Incident Response Process (OBJ. 2.7).mp4 223.61MB
5. Incident Response Process (OBJ. 2.7).srt 25.36KB
5. Industries and Sectors (OBJ. 3.3).mp4 102.46MB
5. Industries and Sectors (OBJ. 3.3).srt 11.74KB
5. Layer 2 Segmentation (OBJ 1.1).mp4 112.28MB
5. Layer 2 Segmentation (OBJ 1.1).srt 12.34KB
5. NetFlow (OBJ. 2.2).mp4 147.92MB
5. NetFlow (OBJ. 2.2).srt 16.90KB
5. Performance Design (OBJ 1.2).mp4 130.72MB
5. Performance Design (OBJ 1.2).srt 13.27KB
5. Performing Malware Analysis (OBJ. 2.9).mp4 181.25MB
5. Performing Malware Analysis (OBJ. 2.9).srt 50.80KB
5. Provider Limitations (OBJ 1.6).mp4 62.50MB
5. Provider Limitations (OBJ 1.6).srt 7.07KB
5. Risk Handling (OBJ. 4.1).mp4 187.35MB
5. Risk Handling (OBJ. 4.1).srt 22.53KB
5. Scenario Planning (OBJ 4.1).mp4 182.38MB
5. Scenario Planning (OBJ 4.1).srt 20.88KB
5. Security Configurations (OBJ. 3.1).mp4 175.25MB
5. Security Configurations (OBJ. 3.1).srt 18.76KB
5. Security Settings (OBJ. 3.2).mp4 121.59MB
5. Security Settings (OBJ. 3.2).srt 12.49KB
5. Shared Responsibility Model (OBJ 4.2).mp4 105.77MB
5. Shared Responsibility Model (OBJ 4.2).srt 12.79KB
5. Software Assurance (OBJ 1.3).mp4 187.40MB
5. Software Assurance (OBJ 1.3).srt 21.79KB
5. Software-Defied Networking (SDN) (OBJ. 3.4).mp4 147.83MB
5. Software-Defied Networking (SDN) (OBJ. 3.4).srt 17.01KB
5. SQL Injections (OBJ. 2.5).mp4 154.54MB
5. SQL Injections (OBJ. 2.5).srt 16.05KB
5. Standards (OBJ. 4.3).mp4 131.70MB
5. Standards (OBJ. 4.3).srt 14.38KB
5. Symmetric Algorithms (OBJ. 3.6).mp4 125.53MB
5. Symmetric Algorithms (OBJ. 3.6).srt 2.77KB
5. Threat Actors (OBJ. 2.1).mp4 201.00MB
5. Threat Actors (OBJ. 2.1).srt 22.66KB
50 419.99KB
51 564.53KB
52 1.40MB
53 1.54MB
54 331.96KB
55 1.64MB
56 350.95KB
57 614.87KB
58 668.31KB
59 1.38MB
6 565.86KB
6. Baselins and Templates (OBJ 1.3).mp4 139.71MB
6. Baselins and Templates (OBJ 1.3).srt 16.52KB
6. Checkpoint Operational Technologies.html 160B
6. Ciphers and Certificates (OBJ. 2.5).mp4 235.65MB
6. Ciphers and Certificates (OBJ. 2.5).srt 24.34KB
6. Configuring Firewalls (OBJ 1.1).mp4 53.59MB
6. Configuring Firewalls (OBJ 1.1).srt 14.80KB
6. Contracts and Agreements (OBJ. 4.3).mp4 201.82MB
6. Contracts and Agreements (OBJ. 4.3).srt 24.09KB
6. Cracking Weak Passwords (OBJ 1.5).mp4 24.13MB
6. Cracking Weak Passwords (OBJ 1.5).srt 5.53KB
6. Cryptographic Use Cases (OBJ 1.7).mp4 135.50MB
6. Cryptographic Use Cases (OBJ 1.7).srt 14.32KB
6. Data Destruction (OBJ. 4.3).mp4 62.55MB
6. Data Destruction (OBJ. 4.3).srt 6.91KB
6. Data Encryption (OBJ 1.4).mp4 162.02MB
6. Data Encryption (OBJ 1.4).srt 17.46KB
6. DNS Protection (OBJ. 3.1).mp4 70.97MB
6. DNS Protection (OBJ. 3.1).srt 6.84KB
6. Extending Controls (OBJ 1.6).mp4 108.16MB
6. Extending Controls (OBJ 1.6).srt 11.65KB
6. Forensic Analysis Tools (OBJ. 2.9).mp4 172.71MB
6. Forensic Analysis Tools (OBJ. 2.9).srt 19.64KB
6. IPSec (OBJ. 3.6).mp4 317.12MB
6. IPSec (OBJ. 3.6).srt 35.19KB
6. Log Collection and Analysis (OBJ. 3.4).mp4 96.02MB
6. Log Collection and Analysis (OBJ. 3.4).srt 10.61KB
6. Logs (OBJ. 2.2).mp4 148.80MB
6. Logs (OBJ. 2.2).srt 16.31KB
6. Mandatory Access Controls (MAC) (OBJ. 3.2).mp4 142.55MB
6. Mandatory Access Controls (MAC) (OBJ. 3.2).srt 15.03KB
6. Network Segmentation (OBJ 1.1).mp4 284.51MB
6. Network Segmentation (OBJ 1.1).srt 31.51KB
6. Passwordless Authentication (OBJ 1.8).mp4 112.91MB
6. Passwordless Authentication (OBJ 1.8).srt 12.48KB
6. Playbooks (OBJ. 2.7).mp4 179.71MB
6. Playbooks (OBJ. 2.7).srt 21.00KB
6. Protocol Analysis (OBJ. 2.4).mp4 170.48MB
6. Protocol Analysis (OBJ. 2.4).srt 18.79KB
6. Risk Tracking (OBJ. 4.1).mp4 109.44MB
6. Risk Tracking (OBJ. 4.1).srt 12.09KB
6. Security Automation (OBJ. 2.6).mp4 230.05MB
6. Security Automation (OBJ. 2.6).srt 25.06KB
6. Security Controls (OBJ 4.1).mp4 200.07MB
6. Security Controls (OBJ 4.1).srt 22.95KB
6. Steganography.mp4 38.39MB
6. Steganography.srt 8.42KB
6. Stream Ciphers (OBJ. 3.6).mp4 96.46MB
6. Stream Ciphers (OBJ. 3.6).srt 10.21KB
6. Testing Plans (OBJ 4.4).mp4 155.59MB
6. Testing Plans (OBJ 4.4).srt 18.96KB
6. Threat Management Frameworks (OBJ. 2.1).mp4 234.63MB
6. Threat Management Frameworks (OBJ. 2.1).srt 32.04KB
6. Trust Models (OBJ. 3.5).mp4 96.22MB
6. Trust Models (OBJ. 3.5).srt 11.53KB
6. Viability and Support (OBJ 4.2).mp4 235.97MB
6. Viability and Support (OBJ 4.2).srt 26.22KB
6. Virtualization (OBJ 1.2).mp4 179.99MB
6. Virtualization (OBJ 1.2).srt 19.13KB
6. XML Injections (OBJ. 2.5).mp4 138.33MB
6. XML Injections (OBJ. 2.5).srt 14.87KB
60 1.07MB
61 799.32KB
62 1.16MB
63 1.62MB
64 1.94MB
65 229.31KB
66 767.25KB
67 5.50KB
68 295.45KB
69 530.99KB
7 908.68KB
7. Best Practices (OBJ 1.3).mp4 132.39MB
7. Best Practices (OBJ 1.3).srt 14.67KB
7. Block Ciphers (OBJ. 3.6).mp4 211.33MB
7. Block Ciphers (OBJ. 3.6).srt 23.78KB
7. Certificate Management (OBJ. 3.5).mp4 59.42MB
7. Certificate Management (OBJ. 3.5).srt 6.81KB
7. Checkpoint Business Continuity.html 160B
7. Checkpoint Digital Forensics.html 160B
7. Checkpoint Incident Response.html 160B
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).mp4 134.02MB
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).srt 15.05KB
7. Data Loss Prevention (DLP) (OBJ 1.4).mp4 218.21MB
7. Data Loss Prevention (DLP) (OBJ 1.4).srt 23.16KB
7. Data Ownership (OBJ. 4.3).mp4 120.48MB
7. Data Ownership (OBJ. 4.3).srt 13.60KB
7. Dependencies (OBJ 4.2).mp4 102.31MB
7. Dependencies (OBJ 4.2).srt 11.43KB
7. Deployment Options (OBJ. 3.1).mp4 100.22MB
7. Deployment Options (OBJ. 3.1).srt 9.99KB
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).mp4 76.63MB
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).srt 7.18KB
7. Homomorphic Encryption (OBJ 1.8).mp4 75.73MB
7. Homomorphic Encryption (OBJ 1.8).srt 8.13KB
7. Implement Network Segmentation (OBJ 1.1).mp4 54.46MB
7. Implement Network Segmentation (OBJ 1.1).srt 21.71KB
7. Improper Headers (OBJ. 2.5).mp4 127.27MB
7. Improper Headers (OBJ. 2.5).srt 13.84KB
7. IoC Notifications (OBJ. 2.2).mp4 162.59MB
7. IoC Notifications (OBJ. 2.2).srt 19.53KB
7. Legal Considerations (OBJ. 4.3).mp4 152.16MB
7. Legal Considerations (OBJ. 4.3).srt 17.63KB
7. Multifactor Authentication (OBJ 1.5).mp4 181.78MB
7. Multifactor Authentication (OBJ 1.5).srt 19.63KB
7. Other Injection Attacks (OBJ. 2.5).mp4 91.69MB
7. Other Injection Attacks (OBJ. 2.5).srt 10.07KB
7. Physical Security (OBJ. 2.6).mp4 253.90MB
7. Physical Security (OBJ. 2.6).srt 25.06KB
7. PKI Use Cases (OBJ 1.7).mp4 186.62MB
7. PKI Use Cases (OBJ 1.7).srt 19.08KB
7. Provision and Deprovision (OBJ 1.6).mp4 64.73MB
7. Provision and Deprovision (OBJ 1.6).srt 7.07KB
7. Proxies (OBJ 1.1).mp4 156.32MB
7. Proxies (OBJ 1.1).srt 16.22KB
7. Risk Assessment (OBJ. 4.1).mp4 390.82MB
7. Risk Assessment (OBJ. 4.1).srt 45.12KB
7. Secure Boot (OBJ. 3.2).mp4 124.88MB
7. Secure Boot (OBJ. 3.2).srt 12.69KB
7. Securing VMs (OBJ 1.2).mp4 36.66MB
7. Securing VMs (OBJ 1.2).srt 9.69KB
7. Security Solutions (OBJ 4.1).mp4 193.68MB
7. Security Solutions (OBJ 4.1).srt 21.90KB
7. TCPDump (OBJ. 2.4).mp4 75.74MB
7. TCPDump (OBJ. 2.4).srt 17.42KB
7. Using Aircrack-ng (OBJ. 2.9).mp4 84.56MB
7. Using Aircrack-ng (OBJ. 2.9).srt 16.59KB
7. Vulnerability Management Activities (OBJ. 2.3).mp4 254.06MB
7. Vulnerability Management Activities (OBJ. 2.3).srt 29.45KB
70 1.85MB
71 68.39KB
72 770.74KB
73 1.25MB
74 1.29MB
75 1.66MB
76 1.93MB
77 346.75KB
78 937.87KB
79 1.52MB
8 40.13KB
8. Authentication Bypass (OBJ. 2.5).mp4 142.05MB
8. Authentication Bypass (OBJ. 2.5).srt 16.35KB
8. Authentication Protocols (OBJ 1.5).mp4 210.76MB
8. Authentication Protocols (OBJ 1.5).srt 22.47KB
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).mp4 82.53MB
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).srt 9.39KB
8. Checkpoint Cryptography.html 160B
8. Checkpoint Hashing and Symmetric Algorithms.html 160B
8. Cloud Misconfigurations (OBJ. 3.4).mp4 238.01MB
8. Cloud Misconfigurations (OBJ. 3.4).srt 27.43KB
8. Considerations (OBJ 4.2).mp4 232.51MB
8. Considerations (OBJ 4.2).srt 26.57KB
8. Containerization (OBJ 1.2).mp4 124.84MB
8. Containerization (OBJ 1.2).srt 14.30KB
8. Cost of a Data Breach (OBJ 4.1).mp4 132.51MB
8. Cost of a Data Breach (OBJ 4.1).srt 13.54KB
8. Data Sovereignty (OBJ. 4.3).mp4 71.12MB
8. Data Sovereignty (OBJ. 4.3).srt 8.18KB
8. DLP Detection (OBJ 1.4).mp4 142.62MB
8. DLP Detection (OBJ 1.4).srt 15.55KB
8. Forward Secrecy (OBJ. 3.6).mp4 73.95MB
8. Forward Secrecy (OBJ. 3.6).srt 8.53KB
8. Gateways (OBJ 1.1).mp4 99.85MB
8. Gateways (OBJ 1.1).srt 10.58KB
8. Hardware Encryption (OBJ. 3.2).mp4 103.23MB
8. Hardware Encryption (OBJ. 3.2).srt 10.77KB
8. Imaging Tools (OBJ. 2.9).mp4 168.60MB
8. Imaging Tools (OBJ. 2.9).srt 16.82KB
8. Integrating Applications (OBJ 1.3).mp4 99.06MB
8. Integrating Applications (OBJ 1.3).srt 9.85KB
8. Integrating Industries (OBJ. 4.3).mp4 74.33MB
8. Integrating Industries (OBJ. 4.3).srt 8.54KB
8. Lock Picking (OBJ. 2.6).mp4 36.67MB
8. Lock Picking (OBJ. 2.6).srt 3.74KB
8. Reconnaissance Concerns (OBJ. 3.1).mp4 175.93MB
8. Reconnaissance Concerns (OBJ. 3.1).srt 18.84KB
8. Response to IoCs (OBJ. 2.2).mp4 111.52MB
8. Response to IoCs (OBJ. 2.2).srt 12.45KB
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).mp4 154.93MB
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).srt 16.21KB
8. Server Segmentation (OBJ 1.1).mp4 229.82MB
8. Server Segmentation (OBJ 1.1).srt 25.23KB
8. Software Composition (OBJ. 2.5).mp4 207.96MB
8. Software Composition (OBJ. 2.5).srt 23.47KB
8. Storage Models (OBJ 1.6).mp4 114.62MB
8. Storage Models (OBJ 1.6).srt 11.91KB
8. VirtualAugmented Reality (OBJ 1.8).mp4 98.55MB
8. VirtualAugmented Reality (OBJ 1.8).srt 11.15KB
8. When Risk Management Fails (OBJ. 4.1).mp4 81.87MB
8. When Risk Management Fails (OBJ. 4.1).srt 8.62KB
8. Wireshark (OBJ. 2.4).mp4 88.41MB
8. Wireshark (OBJ. 2.4).srt 20.41KB
80 1.81MB
81 1.40MB
82 148.95KB
83 1.00MB
84 1.09MB
85 1.22MB
86 1.41MB
87 1.98MB
88 353.68KB
89 615.09KB
9 1.35MB
9. 3D Printing (OBJ 1.8).mp4 66.76MB
9. 3D Printing (OBJ 1.8).srt 7.30KB
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).mp4 40.20MB
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).srt 4.29KB
9. Checkpoint Cloud Technologies.html 160B
9. Checkpoint Data Considerations.html 160B
9. Checkpoint Infrastructure Design.html 160B
9. Checkpoint Policies and Frameworks.html 160B
9. Checkpoint Risk Management.html 160B
9. Checkpoint Risk Reduction.html 160B
9. Checkpoint Risk Strategies.html 160B
9. Checkpoint Software Applications.html 160B
9. Checkpoint Threat and Vulnerability Management.html 160B
9. Collecting and Validating Evidence (OBJ. 2.9).mp4 103.24MB
9. Collecting and Validating Evidence (OBJ. 2.9).srt 19.01KB
9. Data Loss Detection (OBJ 1.4).mp4 247.50MB
9. Data Loss Detection (OBJ 1.4).srt 28.05KB
9. Endpoint Protections (OBJ. 3.2).mp4 213.38MB
9. Endpoint Protections (OBJ. 3.2).srt 26.17KB
9. Federation (OBJ 1.5).mp4 147.91MB
9. Federation (OBJ 1.5).srt 16.16KB
9. IDS and IPS (OBJ 1.1).mp4 139.29MB
9. IDS and IPS (OBJ 1.1).srt 14.62KB
9. Mobile Security (OBJ. 3.1).mp4 165.85MB
9. Mobile Security (OBJ. 3.1).srt 18.14KB
9. Nmap (OBJ. 2.4).mp4 83.97MB
9. Nmap (OBJ. 2.4).srt 21.17KB
9. Protecting Web Traffic (OBJ. 3.5).mp4 74.33MB
9. Protecting Web Traffic (OBJ. 3.5).srt 8.15KB
9. Security Appliances (OBJ. 2.2).mp4 134.61MB
9. Security Appliances (OBJ. 2.2).srt 34.57KB
9. Supply Chain (OBJ 4.2).mp4 130.89MB
9. Supply Chain (OBJ 4.2).srt 16.00KB
9. Virtualization (OBJ 1.6).mp4 172.07MB
9. Virtualization (OBJ 1.6).srt 18.65KB
9. Vulnerable Web Applications (OBJ. 2.5).mp4 253.91MB
9. Vulnerable Web Applications (OBJ. 2.5).srt 27.00KB
9. Web Application Vulnerabilities (OBJ. 2.5).mp4 53.44MB
9. Web Application Vulnerabilities (OBJ. 2.5).srt 20.29KB
9. Zero Trust (OBJ 1.1).mp4 144.80MB
9. Zero Trust (OBJ 1.1).srt 15.80KB
90 1.30MB
91 1.68MB
92 415.94KB
93 1.07MB
94 1.39MB
95 1.46MB
96 1.63MB
97 423.26KB
98 1.31MB
99 1.84MB
TutsNode.com.txt 63B
Distribution statistics by country
Israel (IL) 2
United States (US) 1
Turkey (TR) 1
Canada (CA) 1
Total 5
IP List List of IP addresses which were distributed this torrent