|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
46B |
| 1 |
57B |
| 1. Analyzing Vulnerabilities.mp4 |
29.40MB |
| 1. Analyzing Vulnerabilities.srt |
3.08KB |
| 1. Asymmetric Algorithms.mp4 |
47.89MB |
| 1. Asymmetric Algorithms.srt |
4.49KB |
| 1. Attacking Vulnerabilities.mp4 |
26.96MB |
| 1. Attacking Vulnerabilities.srt |
2.85KB |
| 1. Authentication and Authorization (OBJ 1.5).mp4 |
37.22MB |
| 1. Authentication and Authorization (OBJ 1.5).srt |
3.71KB |
| 1. Business Continuity (OBJ 4.4).mp4 |
25.23MB |
| 1. Business Continuity (OBJ 4.4).srt |
2.81KB |
| 1. Cloud and Virtualization (OBJ 1.6).mp4 |
23.57MB |
| 1. Cloud and Virtualization (OBJ 1.6).srt |
2.39KB |
| 1. Cloud Technologies.mp4 |
57.88MB |
| 1. Cloud Technologies.srt |
5.84KB |
| 1. Conclusion.mp4 |
225.79MB |
| 1. Conclusion.srt |
26.14KB |
| 1. Cryptography (OBJ 1.7).mp4 |
38.69MB |
| 1. Cryptography (OBJ 1.7).srt |
3.89KB |
| 1. Data Considerations (OBJ 4.3).mp4 |
20.27MB |
| 1. Data Considerations (OBJ 4.3).srt |
2.26KB |
| 1. Data Security (OBJ 1.4).mp4 |
78.28MB |
| 1. Data Security (OBJ 1.4).srt |
8.34KB |
| 1. Digital Forensics.mp4 |
22.52MB |
| 1. Digital Forensics.srt |
2.30KB |
| 1. Digital Forensic Tools.mp4 |
51.83MB |
| 1. Digital Forensic Tools.srt |
4.98KB |
| 1. Emerging Technology (OBJ 1.8).mp4 |
93.13MB |
| 1. Emerging Technology (OBJ 1.8).srt |
10.98KB |
| 1. Endpoint Security Controls.mp4 |
52.75MB |
| 1. Endpoint Security Controls.srt |
5.28KB |
| 1. Enterprise Mobility.mp4 |
57.24MB |
| 1. Enterprise Mobility.srt |
5.78KB |
| 1. Hashing and Symmetric Algorithms.mp4 |
25.91MB |
| 1. Hashing and Symmetric Algorithms.srt |
2.77KB |
| 1. Incident Response.mp4 |
31.23MB |
| 1. Incident Response.srt |
3.14KB |
| 1. Indicators of Compromise.mp4 |
39.36MB |
| 1. Indicators of Compromise.srt |
3.76KB |
| 1. Infrastructure Design (OBJ 1.2).mp4 |
24.79MB |
| 1. Infrastructure Design (OBJ 1.2).srt |
2.49KB |
| 1. Operational Technologies.mp4 |
45.13MB |
| 1. Operational Technologies.srt |
4.32KB |
| 1. Policies and Frameworks (OBJ. 4.1 & 4.3).mp4 |
30.24MB |
| 1. Policies and Frameworks (OBJ. 4.1 & 4.3).srt |
3.09KB |
| 1. Public Key Infrastructure.mp4 |
61.75MB |
| 1. Public Key Infrastructure.srt |
6.25KB |
| 1. Risk Management (OBJ 4.1).mp4 |
32.45MB |
| 1. Risk Management (OBJ 4.1).srt |
3.58KB |
| 1. Risk Reduction.mp4 |
33.41MB |
| 1. Risk Reduction.srt |
3.22KB |
| 1. Risk Strategies (OBJ 4.1).mp4 |
33.25MB |
| 1. Risk Strategies (OBJ 4.1).srt |
3.48KB |
| 1. Securing Architectures (OBJ 1.1).mp4 |
26.71MB |
| 1. Securing Architectures (OBJ 1.1).srt |
2.80KB |
| 1. Securing Networks (OBJ 1.1).mp4 |
149.57MB |
| 1. Securing Networks (OBJ 1.1).srt |
16.43KB |
| 1. Software Applications (OBJ 1.3).mp4 |
58.29MB |
| 1. Software Applications (OBJ 1.3).srt |
6.50KB |
| 1. Threat and Vulnerability Management.mp4 |
41.91MB |
| 1. Threat and Vulnerability Management.srt |
4.38KB |
| 1. Vendor Risk (OBJ 4.2).mp4 |
88.25MB |
| 1. Vendor Risk (OBJ 4.2).srt |
9.81KB |
| 1. Vulnerability Assessments.mp4 |
33.78MB |
| 1. Vulnerability Assessments.srt |
3.51KB |
| 1. Welcome.mp4 |
184.93MB |
| 1. Welcome.srt |
21.29KB |
| 10 |
449.09KB |
| 10. Analysis Utilities (OBJ. 2.4).mp4 |
110.13MB |
| 10. Analysis Utilities (OBJ. 2.4).srt |
12.73KB |
| 10. Auditing Files (OBJ 1.4).mp4 |
46.96MB |
| 10. Auditing Files (OBJ 1.4).srt |
8.39KB |
| 10. Checkpoint Analyzing Vulnerabilities.html |
160B |
| 10. Checkpoint Cloud and Virtualization.html |
160B |
| 10. Checkpoint Enterprise Mobility.html |
160B |
| 10. Checkpoint Indicators of Compromise.html |
160B |
| 10. Checkpoint Vendor Risk.html |
160B |
| 10. Collection Tools (OBJ. 2.9).mp4 |
133.14MB |
| 10. Collection Tools (OBJ. 2.9).srt |
13.45KB |
| 10. Key Stretching (OBJ. 3.6).mp4 |
94.89MB |
| 10. Key Stretching (OBJ. 3.6).srt |
10.76KB |
| 10. Logging and Monitoring (OBJ. 3.2).mp4 |
133.20MB |
| 10. Logging and Monitoring (OBJ. 3.2).srt |
14.98KB |
| 10. Merging Networks (OBJ 1.1).mp4 |
118.16MB |
| 10. Merging Networks (OBJ 1.1).srt |
13.69KB |
| 10. Network Access Control (NAC) (OBJ 1.1).mp4 |
61.91MB |
| 10. Network Access Control (NAC) (OBJ 1.1).srt |
6.72KB |
| 10. Quantum Computing (OBJ 1.8).mp4 |
121.07MB |
| 10. Quantum Computing (OBJ 1.8).srt |
12.89KB |
| 10. Root of Trust (OBJ 1.5).mp4 |
93.57MB |
| 10. Root of Trust (OBJ 1.5).srt |
9.94KB |
| 10. Troubleshooting Certificates (OBJ. 3.7).mp4 |
115.07MB |
| 10. Troubleshooting Certificates (OBJ. 3.7).srt |
13.32KB |
| 10. VM Attacks (OBJ. 2.5).mp4 |
100.86MB |
| 10. VM Attacks (OBJ. 2.5).srt |
11.82KB |
| 100 |
714.24KB |
| 101 |
721.70KB |
| 102 |
848.46KB |
| 103 |
1.21MB |
| 104 |
438.66KB |
| 105 |
1.20MB |
| 106 |
86.83KB |
| 107 |
95.75KB |
| 108 |
174.20KB |
| 109 |
364.59KB |
| 11 |
96.76KB |
| 11. Attestation (OBJ 1.5).mp4 |
48.93MB |
| 11. Attestation (OBJ 1.5).srt |
5.38KB |
| 11. Checkpoint Asymmetric Algorithms.html |
160B |
| 11. Checkpoint Data Security.html |
160B |
| 11. Checkpoint Emerging Technology.html |
160B |
| 11. Configuring SIEM Agents (OBJ. 3.2).mp4 |
141.36MB |
| 11. Configuring SIEM Agents (OBJ. 3.2).srt |
41.05KB |
| 11. Network Attacks (OBJ. 2.5).mp4 |
239.52MB |
| 11. Network Attacks (OBJ. 2.5).srt |
26.60KB |
| 11. Remote Access (OBJ 1.1).mp4 |
195.45MB |
| 11. Remote Access (OBJ 1.1).srt |
20.51KB |
| 11. Software-Defined Networking (SDN) (OBJ 1.1).mp4 |
117.52MB |
| 11. Software-Defined Networking (SDN) (OBJ 1.1).srt |
13.16KB |
| 11. Troubleshooting Keys (OBJ. 3.7).mp4 |
75.27MB |
| 11. Troubleshooting Keys (OBJ. 3.7).srt |
8.76KB |
| 11. Using Collection Tools (OBJ. 2.10).mp4 |
45.35MB |
| 11. Using Collection Tools (OBJ. 2.10).srt |
10.27KB |
| 11. Vulnerability Scanning (OBJ. 2.4).mp4 |
81.97MB |
| 11. Vulnerability Scanning (OBJ. 2.4).srt |
20.84KB |
| 110 |
806.29KB |
| 111 |
1.20MB |
| 112 |
33.82KB |
| 113 |
521.96KB |
| 114 |
581.33KB |
| 115 |
708.60KB |
| 116 |
1.38MB |
| 117 |
1.45MB |
| 118 |
1.95MB |
| 119 |
4.80KB |
| 12 |
105.46KB |
| 12. Analyzing Scan Outputs (OBJ. 2.4).mp4 |
80.55MB |
| 12. Analyzing Scan Outputs (OBJ. 2.4).srt |
31.19KB |
| 12. Analyzing Web Applications (OBJ. 2.5).mp4 |
136.72MB |
| 12. Analyzing Web Applications (OBJ. 2.5).srt |
34.38KB |
| 12. Checkpoint Digital Forensic Tools.html |
160B |
| 12. Checkpoint Public Key Infrastructure.html |
160B |
| 12. Checkpoint Securing Architectures.html |
160B |
| 12. Identity Proofing (OBJ 1.5).mp4 |
77.97MB |
| 12. Identity Proofing (OBJ 1.5).srt |
8.71KB |
| 12. Resiliency (OBJ. 3.2).mp4 |
132.80MB |
| 12. Resiliency (OBJ. 3.2).srt |
15.02KB |
| 12. Unified Communications (OBJ 1.1).mp4 |
417.06MB |
| 12. Unified Communications (OBJ 1.1).srt |
45.35KB |
| 120 |
656.52KB |
| 121 |
292.22KB |
| 122 |
729.47KB |
| 123 |
1.32MB |
| 124 |
1.61MB |
| 125 |
1.67MB |
| 126 |
1.28MB |
| 127 |
1.30MB |
| 128 |
410.43KB |
| 129 |
514.33KB |
| 13 |
520.65KB |
| 13. Checkpoint Authentication and Authorization.html |
160B |
| 13. Checkpoint Endpoint Security Controls.html |
160B |
| 13. Checkpoint Vulnerability Assessments.html |
160B |
| 13. Cloud vs On-premise (OBJ 1.1).mp4 |
105.64MB |
| 13. Cloud vs On-premise (OBJ 1.1).srt |
11.95KB |
| 13. Social Engineering (OBJ. 2.5).mp4 |
157.40MB |
| 13. Social Engineering (OBJ. 2.5).srt |
17.48KB |
| 130 |
1.39MB |
| 131 |
1.98MB |
| 132 |
820.99KB |
| 133 |
876.33KB |
| 134 |
1.20MB |
| 135 |
1.49MB |
| 136 |
1.61MB |
| 137 |
309.62KB |
| 138 |
424.60KB |
| 139 |
1.11MB |
| 14 |
1.22MB |
| 14. DNSSEC (OBJ 1.1).mp4 |
92.83MB |
| 14. DNSSEC (OBJ 1.1).srt |
8.79KB |
| 14. Phishing Campaigns (OBJ. 2.5).mp4 |
46.06MB |
| 14. Phishing Campaigns (OBJ. 2.5).srt |
12.26KB |
| 140 |
1.27MB |
| 141 |
1.28MB |
| 142 |
746.90KB |
| 143 |
998.03KB |
| 144 |
480.65KB |
| 145 |
1.12MB |
| 146 |
1.16MB |
| 147 |
416.23KB |
| 148 |
744.45KB |
| 149 |
951.67KB |
| 15 |
514.08KB |
| 15. Checkpoint Attacking Vulnerabilities.html |
160B |
| 15. Load Balancer (OBJ 1.1).mp4 |
147.21MB |
| 15. Load Balancer (OBJ 1.1).srt |
15.84KB |
| 150 |
1.07MB |
| 151 |
1.52MB |
| 152 |
1.93MB |
| 153 |
1.84MB |
| 154 |
209.18KB |
| 155 |
470.52KB |
| 156 |
490.33KB |
| 157 |
950.73KB |
| 158 |
1.38MB |
| 159 |
1.81MB |
| 16 |
126.23KB |
| 16. Checkpoint Securing Networks.html |
160B |
| 160 |
1.09MB |
| 161 |
1.72MB |
| 162 |
494.47KB |
| 163 |
1.57MB |
| 164 |
1.87MB |
| 165 |
71.12KB |
| 166 |
85.60KB |
| 167 |
571.78KB |
| 168 |
1.84MB |
| 169 |
1.91MB |
| 17 |
652.71KB |
| 170 |
333.30KB |
| 171 |
232.51KB |
| 172 |
372.05KB |
| 173 |
908.65KB |
| 174 |
1.62MB |
| 175 |
621.89KB |
| 176 |
777.57KB |
| 177 |
785.54KB |
| 178 |
1.54MB |
| 179 |
1.69MB |
| 18 |
287.28KB |
| 180 |
194.97KB |
| 181 |
1.14MB |
| 182 |
1.62MB |
| 183 |
1.78MB |
| 184 |
86.27KB |
| 185 |
157.30KB |
| 186 |
211.61KB |
| 187 |
966.83KB |
| 188 |
1.45MB |
| 189 |
1.33MB |
| 19 |
488.13KB |
| 190 |
1.54MB |
| 191 |
1.75MB |
| 192 |
1.78MB |
| 193 |
1.98MB |
| 194 |
788.88KB |
| 195 |
1.11MB |
| 196 |
1.93MB |
| 197 |
442.99KB |
| 198 |
893.26KB |
| 199 |
1.17MB |
| 2 |
111B |
| 2.1 CASP (CAS-004) Objectives.pdf |
1.50MB |
| 2.2 CompTIA CASP+ (CAS-004) Study Notes.pdf |
4.09MB |
| 2. Access Control (OBJ 1.5).mp4 |
101.81MB |
| 2. Access Control (OBJ 1.5).srt |
11.66KB |
| 2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).mp4 |
192.36MB |
| 2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).srt |
22.53KB |
| 2. Asset Value (OBJ 4.1).mp4 |
88.19MB |
| 2. Asset Value (OBJ 4.1).srt |
9.44KB |
| 2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).mp4 |
171.08MB |
| 2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).srt |
19.23KB |
| 2. Business Continuity Plan (OBJ 4.4).mp4 |
299.78MB |
| 2. Business Continuity Plan (OBJ 4.4).srt |
35.58KB |
| 2. Business Models (OBJ 4.2).mp4 |
239.34MB |
| 2. Business Models (OBJ 4.2).srt |
28.45KB |
| 2. CASP+ (CAS-004) Practice Exam.html |
160B |
| 2. Cloud Deployment Models (OBJ 1.6).mp4 |
96.25MB |
| 2. Cloud Deployment Models (OBJ 1.6).srt |
11.04KB |
| 2. Data Life Cycle (OBJ 1.4).mp4 |
229.21MB |
| 2. Data Life Cycle (OBJ 1.4).srt |
24.98KB |
| 2. Data Security (OBJ. 4.3).mp4 |
79.97MB |
| 2. Data Security (OBJ. 4.3).srt |
8.78KB |
| 2. Deceptive Technologies (OBJ. 2.6).mp4 |
105.11MB |
| 2. Deceptive Technologies (OBJ. 2.6).srt |
11.87KB |
| 2. Device Hardening (OBJ. 3.2).mp4 |
182.84MB |
| 2. Device Hardening (OBJ. 3.2).srt |
19.89KB |
| 2. Directory Traversals (OBJ. 2.5).mp4 |
211.66MB |
| 2. Directory Traversals (OBJ. 2.5).srt |
20.90KB |
| 2. Download Your Free Study Guide.html |
76B |
| 2. Embedded Systems (OBJ. 3.3).mp4 |
226.52MB |
| 2. Embedded Systems (OBJ. 3.3).srt |
24.87KB |
| 2. Enterprise Mobility Management (EMM) (OBJ. 3.1).mp4 |
211.05MB |
| 2. Enterprise Mobility Management (EMM) (OBJ. 3.1).srt |
23.03KB |
| 2. Forensic Process (OBJ. 2.8).mp4 |
100.38MB |
| 2. Forensic Process (OBJ. 2.8).srt |
11.86KB |
| 2. Forensic Workstations (OBJ. 2.9).mp4 |
107.67MB |
| 2. Forensic Workstations (OBJ. 2.9).srt |
12.50KB |
| 2. Hashing (OBJ. 3.6).mp4 |
147.64MB |
| 2. Hashing (OBJ. 3.6).srt |
16.17KB |
| 2. Penetration Test (OBJ. 2.4).mp4 |
103.39MB |
| 2. Penetration Test (OBJ. 2.4).srt |
11.66KB |
| 2. PKI Components (OBJ. 3.5).mp4 |
223.24MB |
| 2. PKI Components (OBJ. 3.5).srt |
24.53KB |
| 2. Policies (OBJ. 4.1).mp4 |
261.96MB |
| 2. Policies (OBJ. 4.1).srt |
32.80KB |
| 2. Privacy and Confidentiality (OBJ 1.7).mp4 |
143.97MB |
| 2. Privacy and Confidentiality (OBJ 1.7).srt |
14.67KB |
| 2. Race Conditions (OBJ. 2.5).mp4 |
104.38MB |
| 2. Race Conditions (OBJ. 2.5).srt |
11.54KB |
| 2. Risk Strategies (OBJ. 4.1).mp4 |
96.67MB |
| 2. Risk Strategies (OBJ. 4.1).srt |
11.76KB |
| 2. Scalability (OBJ 1.2).mp4 |
121.27MB |
| 2. Scalability (OBJ 1.2).srt |
12.67KB |
| 2. Switches (OBJ 1.1).mp4 |
153.59MB |
| 2. Switches (OBJ 1.1).srt |
17.36KB |
| 2. Systems Development Life Cycle (OBJ 1.3).mp4 |
143.31MB |
| 2. Systems Development Life Cycle (OBJ 1.3).srt |
16.63KB |
| 2. Threat Intelligence (OBJ. 2.1).mp4 |
135.60MB |
| 2. Threat Intelligence (OBJ. 2.1).srt |
15.86KB |
| 2. Traffic Mirroring (OBJ 1.1).mp4 |
94.07MB |
| 2. Traffic Mirroring (OBJ 1.1).srt |
10.28KB |
| 2. Triage (OBJ. 2.7).mp4 |
174.75MB |
| 2. Triage (OBJ. 2.7).srt |
19.19KB |
| 2. Types of IoCs (OBJ. 2.2).mp4 |
61.96MB |
| 2. Types of IoCs (OBJ. 2.2).srt |
9.15KB |
| 2. Using Asymmetric Algortihms.mp4 |
200.81MB |
| 2. Using Asymmetric Algortihms.srt |
22.14KB |
| 20 |
671.26KB |
| 200 |
322.42KB |
| 201 |
389.94KB |
| 202 |
1.97MB |
| 203 |
1.59MB |
| 204 |
1.75MB |
| 205 |
1.81MB |
| 206 |
1.44MB |
| 207 |
1.55MB |
| 208 |
26.58KB |
| 209 |
1.47MB |
| 21 |
1.87MB |
| 210 |
34.73KB |
| 211 |
134.37KB |
| 212 |
1.43MB |
| 213 |
1.45MB |
| 214 |
31.64KB |
| 215 |
1.72MB |
| 216 |
33.90KB |
| 217 |
1.37MB |
| 218 |
1.69MB |
| 219 |
263.59KB |
| 22 |
1.99MB |
| 220 |
272.83KB |
| 221 |
747.88KB |
| 222 |
1.26MB |
| 223 |
1.45MB |
| 224 |
1.67MB |
| 225 |
1.67MB |
| 226 |
51.30KB |
| 227 |
1.00MB |
| 228 |
897.18KB |
| 229 |
1.03MB |
| 23 |
1.44MB |
| 230 |
1.24MB |
| 231 |
1.47MB |
| 232 |
1.07MB |
| 233 |
1.27MB |
| 234 |
1.45MB |
| 235 |
1.50MB |
| 236 |
43.04KB |
| 237 |
97.23KB |
| 238 |
256.92KB |
| 239 |
590.63KB |
| 24 |
33.58KB |
| 240 |
1.58MB |
| 241 |
1.71MB |
| 242 |
1.77MB |
| 243 |
120.17KB |
| 244 |
777.54KB |
| 245 |
1.54MB |
| 246 |
1.91MB |
| 247 |
415.97KB |
| 248 |
576.50KB |
| 249 |
1.25MB |
| 25 |
358.61KB |
| 250 |
178.90KB |
| 251 |
1.07MB |
| 252 |
112.59KB |
| 253 |
1.04MB |
| 254 |
1.94MB |
| 255 |
664.35KB |
| 256 |
888.45KB |
| 257 |
90.50KB |
| 258 |
1.80MB |
| 259 |
658.88KB |
| 26 |
1.37MB |
| 260 |
1.31MB |
| 261 |
1.61MB |
| 262 |
794.18KB |
| 263 |
1.33MB |
| 264 |
1.34MB |
| 265 |
1.72MB |
| 266 |
224.52KB |
| 267 |
602.22KB |
| 268 |
765.58KB |
| 269 |
1.55MB |
| 27 |
645.38KB |
| 270 |
785.65KB |
| 271 |
1.76MB |
| 272 |
612.92KB |
| 273 |
1.28MB |
| 274 |
1.04MB |
| 275 |
1.29MB |
| 276 |
92.68KB |
| 277 |
785.93KB |
| 278 |
1.21MB |
| 279 |
1.28MB |
| 28 |
1.49MB |
| 280 |
1.87MB |
| 281 |
437.05KB |
| 282 |
1.48MB |
| 283 |
1.73MB |
| 29 |
1.95MB |
| 3 |
78B |
| 3. Access Control (OBJ 4.1).mp4 |
136.70MB |
| 3. Access Control (OBJ 4.1).srt |
14.94KB |
| 3. Buffer Overflows (OBJ. 2.5).mp4 |
271.11MB |
| 3. Buffer Overflows (OBJ. 2.5).srt |
29.78KB |
| 3. Business Impact Analysis (OBJ 4.4).mp4 |
299.72MB |
| 3. Business Impact Analysis (OBJ 4.4).srt |
33.08KB |
| 3. Calculating Hash Digests (OBJ. 3.6).mp4 |
34.28MB |
| 3. Calculating Hash Digests (OBJ. 3.6).srt |
6.16KB |
| 3. Chain of Custody (OBJ. 2.8).mp4 |
154.37MB |
| 3. Chain of Custody (OBJ. 2.8).srt |
17.48KB |
| 3. Checkpoint Introduction.html |
160B |
| 3. Cloud Encryption (OBJ. 3.4).mp4 |
114.19MB |
| 3. Cloud Encryption (OBJ. 3.4).srt |
12.83KB |
| 3. Cloud Service Models (OBJ 1.6).mp4 |
109.93MB |
| 3. Cloud Service Models (OBJ 1.6).srt |
12.50KB |
| 3. Communication Plan (OBJ. 2.7).mp4 |
219.69MB |
| 3. Communication Plan (OBJ. 2.7).srt |
25.04KB |
| 3. Credential Management (OBJ 1.5).mp4 |
95.23MB |
| 3. Credential Management (OBJ 1.5).srt |
10.52KB |
| 3. Cross-Site Scripting (XSS) (OBJ. 2.5).mp4 |
194.46MB |
| 3. Cross-Site Scripting (XSS) (OBJ. 2.5).srt |
21.18KB |
| 3. Data Classification (OBJ. 4.3).mp4 |
58.42MB |
| 3. Data Classification (OBJ. 4.3).srt |
6.49KB |
| 3. Data Classification (OBJ 1.4).mp4 |
151.30MB |
| 3. Data Classification (OBJ 1.4).srt |
17.11KB |
| 3. Deep Learning (OBJ 1.8).mp4 |
194.60MB |
| 3. Deep Learning (OBJ 1.8).srt |
21.99KB |
| 3. Digital Certificates (OBJ. 3.5).mp4 |
163.00MB |
| 3. Digital Certificates (OBJ. 3.5).srt |
18.85KB |
| 3. File Carving Tools (OBJ. 2.9).mp4 |
76.31MB |
| 3. File Carving Tools (OBJ. 2.9).srt |
7.80KB |
| 3. Frameworks (OBJ. 4.1).mp4 |
109.92MB |
| 3. Frameworks (OBJ. 4.1).srt |
12.63KB |
| 3. ICS and SCADA (OBJ. 3.3).mp4 |
198.18MB |
| 3. ICS and SCADA (OBJ. 3.3).srt |
23.53KB |
| 3. Influences (OBJ 4.2).mp4 |
162.91MB |
| 3. Influences (OBJ 4.2).srt |
18.54KB |
| 3. Integrity and Non-repudiation (OBJ 1.7).mp4 |
142.00MB |
| 3. Integrity and Non-repudiation (OBJ 1.7).srt |
14.72KB |
| 3. Network Sensors (OBJ 1.1).mp4 |
253.49MB |
| 3. Network Sensors (OBJ 1.1).srt |
28.35KB |
| 3. PCAP Files (OBJ. 2.2).mp4 |
90.03MB |
| 3. PCAP Files (OBJ. 2.2).srt |
9.66KB |
| 3. PenTest Steps (OBJ. 2.4).mp4 |
152.69MB |
| 3. PenTest Steps (OBJ. 2.4).srt |
18.07KB |
| 3. Resiliency Issues (OBJ 1.2).mp4 |
279.45MB |
| 3. Resiliency Issues (OBJ 1.2).srt |
30.16KB |
| 3. Risk Management Lifecycle (OBJ. 4.1).mp4 |
256.65MB |
| 3. Risk Management Lifecycle (OBJ. 4.1).srt |
30.99KB |
| 3. Routers (OBJ 1.1).mp4 |
179.48MB |
| 3. Routers (OBJ 1.1).srt |
18.76KB |
| 3. Security Data Analytics (OBJ. 2.6).mp4 |
172.34MB |
| 3. Security Data Analytics (OBJ. 2.6).srt |
26.60KB |
| 3. Software Development Life Cycle (OBJ 1.3).mp4 |
127.03MB |
| 3. Software Development Life Cycle (OBJ 1.3).srt |
14.29KB |
| 3. SSLTLS and Cipher Suites (OBJ. 3.6).mp4 |
183.22MB |
| 3. SSLTLS and Cipher Suites (OBJ. 3.6).srt |
18.93KB |
| 3. Threat Hunting (OBJ. 2.1).mp4 |
143.43MB |
| 3. Threat Hunting (OBJ. 2.1).srt |
17.57KB |
| 3. Unnecessary Services (OBJ. 3.2).mp4 |
58.23MB |
| 3. Unnecessary Services (OBJ. 3.2).srt |
11.84KB |
| 3. WPA3 (OBJ. 3.1).mp4 |
156.70MB |
| 3. WPA3 (OBJ. 3.1).srt |
15.37KB |
| 30 |
185.39KB |
| 31 |
809.19KB |
| 32 |
1.48MB |
| 33 |
218.70KB |
| 34 |
397.13KB |
| 35 |
780.73KB |
| 36 |
315.33KB |
| 37 |
1.79MB |
| 38 |
639.23KB |
| 39 |
346.99KB |
| 4 |
3B |
| 4. Aggregating Risk (OBJ 4.1).mp4 |
66.53MB |
| 4. Aggregating Risk (OBJ 4.1).srt |
7.92KB |
| 4. Automation (OBJ 1.2).mp4 |
138.39MB |
| 4. Automation (OBJ 1.2).srt |
15.40KB |
| 4. Big Data (OBJ 1.8).mp4 |
99.92MB |
| 4. Big Data (OBJ 1.8).srt |
10.37KB |
| 4. Binary Analysis Tools (OBJ. 2.9).mp4 |
151.17MB |
| 4. Binary Analysis Tools (OBJ. 2.9).srt |
16.56KB |
| 4. Buffer Overflow Attack (OBJ. 2.6).mp4 |
91.62MB |
| 4. Buffer Overflow Attack (OBJ. 2.6).srt |
13.16KB |
| 4. Compliance and Policy (OBJ 1.7).mp4 |
74.74MB |
| 4. Compliance and Policy (OBJ 1.7).srt |
7.98KB |
| 4. Conduct Packet Analysis (OBJ. 2.2).mp4 |
80.57MB |
| 4. Conduct Packet Analysis (OBJ. 2.2).srt |
13.34KB |
| 4. Connectivity Options (OBJ. 3.1).mp4 |
189.66MB |
| 4. Connectivity Options (OBJ. 3.1).srt |
19.81KB |
| 4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).mp4 |
157.65MB |
| 4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).srt |
18.53KB |
| 4. Data Types (OBJ. 4.3).mp4 |
117.54MB |
| 4. Data Types (OBJ. 4.3).srt |
12.93KB |
| 4. Deployment Considerations (OBJ 1.6).mp4 |
108.09MB |
| 4. Deployment Considerations (OBJ 1.6).srt |
11.90KB |
| 4. Development Approaches (OBJ 1.3).mp4 |
236.56MB |
| 4. Development Approaches (OBJ 1.3).srt |
28.01KB |
| 4. Host Sensors (OBJ 1.1).mp4 |
130.73MB |
| 4. Host Sensors (OBJ 1.1).srt |
14.14KB |
| 4. ICS Protocols (OBJ. 3.3).mp4 |
233.37MB |
| 4. ICS Protocols (OBJ. 3.3).srt |
26.42KB |
| 4. Intelligence Collection (OBJ. 2.1).mp4 |
241.72MB |
| 4. Intelligence Collection (OBJ. 2.1).srt |
28.61KB |
| 4. Labeling and Tagging (OBJ 1.4).mp4 |
178.15MB |
| 4. Labeling and Tagging (OBJ 1.4).srt |
19.80KB |
| 4. Message Authentication (OBJ. 3.6).mp4 |
74.55MB |
| 4. Message Authentication (OBJ. 3.6).srt |
7.74KB |
| 4. Order of Volatility (OBJ. 2.8).mp4 |
138.68MB |
| 4. Order of Volatility (OBJ. 2.8).srt |
16.18KB |
| 4. Organizational Changes (OBJ 4.2).mp4 |
131.59MB |
| 4. Organizational Changes (OBJ 4.2).srt |
14.88KB |
| 4. Password Policies (OBJ 1.5).mp4 |
171.66MB |
| 4. Password Policies (OBJ 1.5).srt |
18.28KB |
| 4. Patching (OBJ. 3.2).mp4 |
99.79MB |
| 4. Patching (OBJ. 3.2).srt |
10.86KB |
| 4. PenTest Requirements (OBJ. 2.4).mp4 |
252.78MB |
| 4. PenTest Requirements (OBJ. 2.4).srt |
29.62KB |
| 4. Preventative Controls (OBJ. 2.6).mp4 |
110.43MB |
| 4. Preventative Controls (OBJ. 2.6).srt |
12.81KB |
| 4. Privacy Impact Assessment (OBJ 4.4).mp4 |
84.45MB |
| 4. Privacy Impact Assessment (OBJ 4.4).srt |
9.83KB |
| 4. Regulations (OBJ. 4.3).mp4 |
170.19MB |
| 4. Regulations (OBJ. 4.3).srt |
20.21KB |
| 4. Risk Types (OBJ. 4.1).mp4 |
64.93MB |
| 4. Risk Types (OBJ. 4.1).srt |
7.61KB |
| 4. Serverless Computing (OBJ. 3.4).mp4 |
195.59MB |
| 4. Serverless Computing (OBJ. 3.4).srt |
21.67KB |
| 4. SMIME and SSH (OBJ. 3.6).mp4 |
162.78MB |
| 4. SMIME and SSH (OBJ. 3.6).srt |
18.14KB |
| 4. Stakeholder Management (OBJ. 2.7).mp4 |
154.61MB |
| 4. Stakeholder Management (OBJ. 2.7).srt |
17.62KB |
| 4. Using Digital Certificates (OBJ. 3.5).mp4 |
120.93MB |
| 4. Using Digital Certificates (OBJ. 3.5).srt |
13.67KB |
| 4. Wireless and Mesh (OBJ 1.1).mp4 |
73.00MB |
| 4. Wireless and Mesh (OBJ 1.1).srt |
7.45KB |
| 40 |
681.12KB |
| 41 |
977.80KB |
| 42 |
1.19MB |
| 43 |
1.24MB |
| 44 |
38.67KB |
| 45 |
184.69KB |
| 46 |
1.00MB |
| 47 |
1.19MB |
| 48 |
1.93MB |
| 49 |
1.82MB |
| 5 |
618.84KB |
| 5. Application Controls (OBJ. 2.6).mp4 |
210.81MB |
| 5. Application Controls (OBJ. 2.6).srt |
24.22KB |
| 5. Authentication and References (OBJ. 2.5).mp4 |
54.09MB |
| 5. Authentication and References (OBJ. 2.5).srt |
14.06KB |
| 5. Blockchain & Distributed Consensus (OBJ 1.8).mp4 |
120.07MB |
| 5. Blockchain & Distributed Consensus (OBJ 1.8).srt |
13.28KB |
| 5. Code Analysis (OBJ. 2.4).mp4 |
182.06MB |
| 5. Code Analysis (OBJ. 2.4).srt |
21.09KB |
| 5. Data Retention (OBJ. 4.3).mp4 |
150.79MB |
| 5. Data Retention (OBJ. 4.3).srt |
17.75KB |
| 5. Data States (OBJ 1.7).mp4 |
151.30MB |
| 5. Data States (OBJ 1.7).srt |
15.75KB |
| 5. Deidentification (OBJ 1.4).mp4 |
243.36MB |
| 5. Deidentification (OBJ 1.4).srt |
26.28KB |
| 5. EAP (OBJ. 3.6).mp4 |
117.80MB |
| 5. EAP (OBJ. 3.6).srt |
12.60KB |
| 5. Exploring Server Certificates (OBJ. 3.5).mp4 |
24.72MB |
| 5. Exploring Server Certificates (OBJ. 3.5).srt |
7.37KB |
| 5. Firewalls (OBJ 1.1).mp4 |
245.88MB |
| 5. Firewalls (OBJ 1.1).srt |
26.29KB |
| 5. Forensic Analysis (OBJ. 2.8).mp4 |
143.49MB |
| 5. Forensic Analysis (OBJ. 2.8).srt |
15.15KB |
| 5. Implementing Password Policies (OBJ 1.5).mp4 |
28.72MB |
| 5. Implementing Password Policies (OBJ 1.5).srt |
10.96KB |
| 5. Incident Response Plan (OBJ 4.4).mp4 |
238.13MB |
| 5. Incident Response Plan (OBJ 4.4).srt |
28.15KB |
| 5. Incident Response Process (OBJ. 2.7).mp4 |
223.61MB |
| 5. Incident Response Process (OBJ. 2.7).srt |
25.36KB |
| 5. Industries and Sectors (OBJ. 3.3).mp4 |
102.46MB |
| 5. Industries and Sectors (OBJ. 3.3).srt |
11.74KB |
| 5. Layer 2 Segmentation (OBJ 1.1).mp4 |
112.28MB |
| 5. Layer 2 Segmentation (OBJ 1.1).srt |
12.34KB |
| 5. NetFlow (OBJ. 2.2).mp4 |
147.92MB |
| 5. NetFlow (OBJ. 2.2).srt |
16.90KB |
| 5. Performance Design (OBJ 1.2).mp4 |
130.72MB |
| 5. Performance Design (OBJ 1.2).srt |
13.27KB |
| 5. Performing Malware Analysis (OBJ. 2.9).mp4 |
181.25MB |
| 5. Performing Malware Analysis (OBJ. 2.9).srt |
50.80KB |
| 5. Provider Limitations (OBJ 1.6).mp4 |
62.50MB |
| 5. Provider Limitations (OBJ 1.6).srt |
7.07KB |
| 5. Risk Handling (OBJ. 4.1).mp4 |
187.35MB |
| 5. Risk Handling (OBJ. 4.1).srt |
22.53KB |
| 5. Scenario Planning (OBJ 4.1).mp4 |
182.38MB |
| 5. Scenario Planning (OBJ 4.1).srt |
20.88KB |
| 5. Security Configurations (OBJ. 3.1).mp4 |
175.25MB |
| 5. Security Configurations (OBJ. 3.1).srt |
18.76KB |
| 5. Security Settings (OBJ. 3.2).mp4 |
121.59MB |
| 5. Security Settings (OBJ. 3.2).srt |
12.49KB |
| 5. Shared Responsibility Model (OBJ 4.2).mp4 |
105.77MB |
| 5. Shared Responsibility Model (OBJ 4.2).srt |
12.79KB |
| 5. Software Assurance (OBJ 1.3).mp4 |
187.40MB |
| 5. Software Assurance (OBJ 1.3).srt |
21.79KB |
| 5. Software-Defied Networking (SDN) (OBJ. 3.4).mp4 |
147.83MB |
| 5. Software-Defied Networking (SDN) (OBJ. 3.4).srt |
17.01KB |
| 5. SQL Injections (OBJ. 2.5).mp4 |
154.54MB |
| 5. SQL Injections (OBJ. 2.5).srt |
16.05KB |
| 5. Standards (OBJ. 4.3).mp4 |
131.70MB |
| 5. Standards (OBJ. 4.3).srt |
14.38KB |
| 5. Symmetric Algorithms (OBJ. 3.6).mp4 |
125.53MB |
| 5. Symmetric Algorithms (OBJ. 3.6).srt |
2.77KB |
| 5. Threat Actors (OBJ. 2.1).mp4 |
201.00MB |
| 5. Threat Actors (OBJ. 2.1).srt |
22.66KB |
| 50 |
419.99KB |
| 51 |
564.53KB |
| 52 |
1.40MB |
| 53 |
1.54MB |
| 54 |
331.96KB |
| 55 |
1.64MB |
| 56 |
350.95KB |
| 57 |
614.87KB |
| 58 |
668.31KB |
| 59 |
1.38MB |
| 6 |
565.86KB |
| 6. Baselins and Templates (OBJ 1.3).mp4 |
139.71MB |
| 6. Baselins and Templates (OBJ 1.3).srt |
16.52KB |
| 6. Checkpoint Operational Technologies.html |
160B |
| 6. Ciphers and Certificates (OBJ. 2.5).mp4 |
235.65MB |
| 6. Ciphers and Certificates (OBJ. 2.5).srt |
24.34KB |
| 6. Configuring Firewalls (OBJ 1.1).mp4 |
53.59MB |
| 6. Configuring Firewalls (OBJ 1.1).srt |
14.80KB |
| 6. Contracts and Agreements (OBJ. 4.3).mp4 |
201.82MB |
| 6. Contracts and Agreements (OBJ. 4.3).srt |
24.09KB |
| 6. Cracking Weak Passwords (OBJ 1.5).mp4 |
24.13MB |
| 6. Cracking Weak Passwords (OBJ 1.5).srt |
5.53KB |
| 6. Cryptographic Use Cases (OBJ 1.7).mp4 |
135.50MB |
| 6. Cryptographic Use Cases (OBJ 1.7).srt |
14.32KB |
| 6. Data Destruction (OBJ. 4.3).mp4 |
62.55MB |
| 6. Data Destruction (OBJ. 4.3).srt |
6.91KB |
| 6. Data Encryption (OBJ 1.4).mp4 |
162.02MB |
| 6. Data Encryption (OBJ 1.4).srt |
17.46KB |
| 6. DNS Protection (OBJ. 3.1).mp4 |
70.97MB |
| 6. DNS Protection (OBJ. 3.1).srt |
6.84KB |
| 6. Extending Controls (OBJ 1.6).mp4 |
108.16MB |
| 6. Extending Controls (OBJ 1.6).srt |
11.65KB |
| 6. Forensic Analysis Tools (OBJ. 2.9).mp4 |
172.71MB |
| 6. Forensic Analysis Tools (OBJ. 2.9).srt |
19.64KB |
| 6. IPSec (OBJ. 3.6).mp4 |
317.12MB |
| 6. IPSec (OBJ. 3.6).srt |
35.19KB |
| 6. Log Collection and Analysis (OBJ. 3.4).mp4 |
96.02MB |
| 6. Log Collection and Analysis (OBJ. 3.4).srt |
10.61KB |
| 6. Logs (OBJ. 2.2).mp4 |
148.80MB |
| 6. Logs (OBJ. 2.2).srt |
16.31KB |
| 6. Mandatory Access Controls (MAC) (OBJ. 3.2).mp4 |
142.55MB |
| 6. Mandatory Access Controls (MAC) (OBJ. 3.2).srt |
15.03KB |
| 6. Network Segmentation (OBJ 1.1).mp4 |
284.51MB |
| 6. Network Segmentation (OBJ 1.1).srt |
31.51KB |
| 6. Passwordless Authentication (OBJ 1.8).mp4 |
112.91MB |
| 6. Passwordless Authentication (OBJ 1.8).srt |
12.48KB |
| 6. Playbooks (OBJ. 2.7).mp4 |
179.71MB |
| 6. Playbooks (OBJ. 2.7).srt |
21.00KB |
| 6. Protocol Analysis (OBJ. 2.4).mp4 |
170.48MB |
| 6. Protocol Analysis (OBJ. 2.4).srt |
18.79KB |
| 6. Risk Tracking (OBJ. 4.1).mp4 |
109.44MB |
| 6. Risk Tracking (OBJ. 4.1).srt |
12.09KB |
| 6. Security Automation (OBJ. 2.6).mp4 |
230.05MB |
| 6. Security Automation (OBJ. 2.6).srt |
25.06KB |
| 6. Security Controls (OBJ 4.1).mp4 |
200.07MB |
| 6. Security Controls (OBJ 4.1).srt |
22.95KB |
| 6. Steganography.mp4 |
38.39MB |
| 6. Steganography.srt |
8.42KB |
| 6. Stream Ciphers (OBJ. 3.6).mp4 |
96.46MB |
| 6. Stream Ciphers (OBJ. 3.6).srt |
10.21KB |
| 6. Testing Plans (OBJ 4.4).mp4 |
155.59MB |
| 6. Testing Plans (OBJ 4.4).srt |
18.96KB |
| 6. Threat Management Frameworks (OBJ. 2.1).mp4 |
234.63MB |
| 6. Threat Management Frameworks (OBJ. 2.1).srt |
32.04KB |
| 6. Trust Models (OBJ. 3.5).mp4 |
96.22MB |
| 6. Trust Models (OBJ. 3.5).srt |
11.53KB |
| 6. Viability and Support (OBJ 4.2).mp4 |
235.97MB |
| 6. Viability and Support (OBJ 4.2).srt |
26.22KB |
| 6. Virtualization (OBJ 1.2).mp4 |
179.99MB |
| 6. Virtualization (OBJ 1.2).srt |
19.13KB |
| 6. XML Injections (OBJ. 2.5).mp4 |
138.33MB |
| 6. XML Injections (OBJ. 2.5).srt |
14.87KB |
| 60 |
1.07MB |
| 61 |
799.32KB |
| 62 |
1.16MB |
| 63 |
1.62MB |
| 64 |
1.94MB |
| 65 |
229.31KB |
| 66 |
767.25KB |
| 67 |
5.50KB |
| 68 |
295.45KB |
| 69 |
530.99KB |
| 7 |
908.68KB |
| 7. Best Practices (OBJ 1.3).mp4 |
132.39MB |
| 7. Best Practices (OBJ 1.3).srt |
14.67KB |
| 7. Block Ciphers (OBJ. 3.6).mp4 |
211.33MB |
| 7. Block Ciphers (OBJ. 3.6).srt |
23.78KB |
| 7. Certificate Management (OBJ. 3.5).mp4 |
59.42MB |
| 7. Certificate Management (OBJ. 3.5).srt |
6.81KB |
| 7. Checkpoint Business Continuity.html |
160B |
| 7. Checkpoint Digital Forensics.html |
160B |
| 7. Checkpoint Incident Response.html |
160B |
| 7. Cloud Access Security Broker (CASB) (OBJ. 3.4).mp4 |
134.02MB |
| 7. Cloud Access Security Broker (CASB) (OBJ. 3.4).srt |
15.05KB |
| 7. Data Loss Prevention (DLP) (OBJ 1.4).mp4 |
218.21MB |
| 7. Data Loss Prevention (DLP) (OBJ 1.4).srt |
23.16KB |
| 7. Data Ownership (OBJ. 4.3).mp4 |
120.48MB |
| 7. Data Ownership (OBJ. 4.3).srt |
13.60KB |
| 7. Dependencies (OBJ 4.2).mp4 |
102.31MB |
| 7. Dependencies (OBJ 4.2).srt |
11.43KB |
| 7. Deployment Options (OBJ. 3.1).mp4 |
100.22MB |
| 7. Deployment Options (OBJ. 3.1).srt |
9.99KB |
| 7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).mp4 |
76.63MB |
| 7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).srt |
7.18KB |
| 7. Homomorphic Encryption (OBJ 1.8).mp4 |
75.73MB |
| 7. Homomorphic Encryption (OBJ 1.8).srt |
8.13KB |
| 7. Implement Network Segmentation (OBJ 1.1).mp4 |
54.46MB |
| 7. Implement Network Segmentation (OBJ 1.1).srt |
21.71KB |
| 7. Improper Headers (OBJ. 2.5).mp4 |
127.27MB |
| 7. Improper Headers (OBJ. 2.5).srt |
13.84KB |
| 7. IoC Notifications (OBJ. 2.2).mp4 |
162.59MB |
| 7. IoC Notifications (OBJ. 2.2).srt |
19.53KB |
| 7. Legal Considerations (OBJ. 4.3).mp4 |
152.16MB |
| 7. Legal Considerations (OBJ. 4.3).srt |
17.63KB |
| 7. Multifactor Authentication (OBJ 1.5).mp4 |
181.78MB |
| 7. Multifactor Authentication (OBJ 1.5).srt |
19.63KB |
| 7. Other Injection Attacks (OBJ. 2.5).mp4 |
91.69MB |
| 7. Other Injection Attacks (OBJ. 2.5).srt |
10.07KB |
| 7. Physical Security (OBJ. 2.6).mp4 |
253.90MB |
| 7. Physical Security (OBJ. 2.6).srt |
25.06KB |
| 7. PKI Use Cases (OBJ 1.7).mp4 |
186.62MB |
| 7. PKI Use Cases (OBJ 1.7).srt |
19.08KB |
| 7. Provision and Deprovision (OBJ 1.6).mp4 |
64.73MB |
| 7. Provision and Deprovision (OBJ 1.6).srt |
7.07KB |
| 7. Proxies (OBJ 1.1).mp4 |
156.32MB |
| 7. Proxies (OBJ 1.1).srt |
16.22KB |
| 7. Risk Assessment (OBJ. 4.1).mp4 |
390.82MB |
| 7. Risk Assessment (OBJ. 4.1).srt |
45.12KB |
| 7. Secure Boot (OBJ. 3.2).mp4 |
124.88MB |
| 7. Secure Boot (OBJ. 3.2).srt |
12.69KB |
| 7. Securing VMs (OBJ 1.2).mp4 |
36.66MB |
| 7. Securing VMs (OBJ 1.2).srt |
9.69KB |
| 7. Security Solutions (OBJ 4.1).mp4 |
193.68MB |
| 7. Security Solutions (OBJ 4.1).srt |
21.90KB |
| 7. TCPDump (OBJ. 2.4).mp4 |
75.74MB |
| 7. TCPDump (OBJ. 2.4).srt |
17.42KB |
| 7. Using Aircrack-ng (OBJ. 2.9).mp4 |
84.56MB |
| 7. Using Aircrack-ng (OBJ. 2.9).srt |
16.59KB |
| 7. Vulnerability Management Activities (OBJ. 2.3).mp4 |
254.06MB |
| 7. Vulnerability Management Activities (OBJ. 2.3).srt |
29.45KB |
| 70 |
1.85MB |
| 71 |
68.39KB |
| 72 |
770.74KB |
| 73 |
1.25MB |
| 74 |
1.29MB |
| 75 |
1.66MB |
| 76 |
1.93MB |
| 77 |
346.75KB |
| 78 |
937.87KB |
| 79 |
1.52MB |
| 8 |
40.13KB |
| 8. Authentication Bypass (OBJ. 2.5).mp4 |
142.05MB |
| 8. Authentication Bypass (OBJ. 2.5).srt |
16.35KB |
| 8. Authentication Protocols (OBJ 1.5).mp4 |
210.76MB |
| 8. Authentication Protocols (OBJ 1.5).srt |
22.47KB |
| 8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).mp4 |
82.53MB |
| 8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).srt |
9.39KB |
| 8. Checkpoint Cryptography.html |
160B |
| 8. Checkpoint Hashing and Symmetric Algorithms.html |
160B |
| 8. Cloud Misconfigurations (OBJ. 3.4).mp4 |
238.01MB |
| 8. Cloud Misconfigurations (OBJ. 3.4).srt |
27.43KB |
| 8. Considerations (OBJ 4.2).mp4 |
232.51MB |
| 8. Considerations (OBJ 4.2).srt |
26.57KB |
| 8. Containerization (OBJ 1.2).mp4 |
124.84MB |
| 8. Containerization (OBJ 1.2).srt |
14.30KB |
| 8. Cost of a Data Breach (OBJ 4.1).mp4 |
132.51MB |
| 8. Cost of a Data Breach (OBJ 4.1).srt |
13.54KB |
| 8. Data Sovereignty (OBJ. 4.3).mp4 |
71.12MB |
| 8. Data Sovereignty (OBJ. 4.3).srt |
8.18KB |
| 8. DLP Detection (OBJ 1.4).mp4 |
142.62MB |
| 8. DLP Detection (OBJ 1.4).srt |
15.55KB |
| 8. Forward Secrecy (OBJ. 3.6).mp4 |
73.95MB |
| 8. Forward Secrecy (OBJ. 3.6).srt |
8.53KB |
| 8. Gateways (OBJ 1.1).mp4 |
99.85MB |
| 8. Gateways (OBJ 1.1).srt |
10.58KB |
| 8. Hardware Encryption (OBJ. 3.2).mp4 |
103.23MB |
| 8. Hardware Encryption (OBJ. 3.2).srt |
10.77KB |
| 8. Imaging Tools (OBJ. 2.9).mp4 |
168.60MB |
| 8. Imaging Tools (OBJ. 2.9).srt |
16.82KB |
| 8. Integrating Applications (OBJ 1.3).mp4 |
99.06MB |
| 8. Integrating Applications (OBJ 1.3).srt |
9.85KB |
| 8. Integrating Industries (OBJ. 4.3).mp4 |
74.33MB |
| 8. Integrating Industries (OBJ. 4.3).srt |
8.54KB |
| 8. Lock Picking (OBJ. 2.6).mp4 |
36.67MB |
| 8. Lock Picking (OBJ. 2.6).srt |
3.74KB |
| 8. Reconnaissance Concerns (OBJ. 3.1).mp4 |
175.93MB |
| 8. Reconnaissance Concerns (OBJ. 3.1).srt |
18.84KB |
| 8. Response to IoCs (OBJ. 2.2).mp4 |
111.52MB |
| 8. Response to IoCs (OBJ. 2.2).srt |
12.45KB |
| 8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).mp4 |
154.93MB |
| 8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).srt |
16.21KB |
| 8. Server Segmentation (OBJ 1.1).mp4 |
229.82MB |
| 8. Server Segmentation (OBJ 1.1).srt |
25.23KB |
| 8. Software Composition (OBJ. 2.5).mp4 |
207.96MB |
| 8. Software Composition (OBJ. 2.5).srt |
23.47KB |
| 8. Storage Models (OBJ 1.6).mp4 |
114.62MB |
| 8. Storage Models (OBJ 1.6).srt |
11.91KB |
| 8. VirtualAugmented Reality (OBJ 1.8).mp4 |
98.55MB |
| 8. VirtualAugmented Reality (OBJ 1.8).srt |
11.15KB |
| 8. When Risk Management Fails (OBJ. 4.1).mp4 |
81.87MB |
| 8. When Risk Management Fails (OBJ. 4.1).srt |
8.62KB |
| 8. Wireshark (OBJ. 2.4).mp4 |
88.41MB |
| 8. Wireshark (OBJ. 2.4).srt |
20.41KB |
| 80 |
1.81MB |
| 81 |
1.40MB |
| 82 |
148.95KB |
| 83 |
1.00MB |
| 84 |
1.09MB |
| 85 |
1.22MB |
| 86 |
1.41MB |
| 87 |
1.98MB |
| 88 |
353.68KB |
| 89 |
615.09KB |
| 9 |
1.35MB |
| 9. 3D Printing (OBJ 1.8).mp4 |
66.76MB |
| 9. 3D Printing (OBJ 1.8).srt |
7.30KB |
| 9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).mp4 |
40.20MB |
| 9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).srt |
4.29KB |
| 9. Checkpoint Cloud Technologies.html |
160B |
| 9. Checkpoint Data Considerations.html |
160B |
| 9. Checkpoint Infrastructure Design.html |
160B |
| 9. Checkpoint Policies and Frameworks.html |
160B |
| 9. Checkpoint Risk Management.html |
160B |
| 9. Checkpoint Risk Reduction.html |
160B |
| 9. Checkpoint Risk Strategies.html |
160B |
| 9. Checkpoint Software Applications.html |
160B |
| 9. Checkpoint Threat and Vulnerability Management.html |
160B |
| 9. Collecting and Validating Evidence (OBJ. 2.9).mp4 |
103.24MB |
| 9. Collecting and Validating Evidence (OBJ. 2.9).srt |
19.01KB |
| 9. Data Loss Detection (OBJ 1.4).mp4 |
247.50MB |
| 9. Data Loss Detection (OBJ 1.4).srt |
28.05KB |
| 9. Endpoint Protections (OBJ. 3.2).mp4 |
213.38MB |
| 9. Endpoint Protections (OBJ. 3.2).srt |
26.17KB |
| 9. Federation (OBJ 1.5).mp4 |
147.91MB |
| 9. Federation (OBJ 1.5).srt |
16.16KB |
| 9. IDS and IPS (OBJ 1.1).mp4 |
139.29MB |
| 9. IDS and IPS (OBJ 1.1).srt |
14.62KB |
| 9. Mobile Security (OBJ. 3.1).mp4 |
165.85MB |
| 9. Mobile Security (OBJ. 3.1).srt |
18.14KB |
| 9. Nmap (OBJ. 2.4).mp4 |
83.97MB |
| 9. Nmap (OBJ. 2.4).srt |
21.17KB |
| 9. Protecting Web Traffic (OBJ. 3.5).mp4 |
74.33MB |
| 9. Protecting Web Traffic (OBJ. 3.5).srt |
8.15KB |
| 9. Security Appliances (OBJ. 2.2).mp4 |
134.61MB |
| 9. Security Appliances (OBJ. 2.2).srt |
34.57KB |
| 9. Supply Chain (OBJ 4.2).mp4 |
130.89MB |
| 9. Supply Chain (OBJ 4.2).srt |
16.00KB |
| 9. Virtualization (OBJ 1.6).mp4 |
172.07MB |
| 9. Virtualization (OBJ 1.6).srt |
18.65KB |
| 9. Vulnerable Web Applications (OBJ. 2.5).mp4 |
253.91MB |
| 9. Vulnerable Web Applications (OBJ. 2.5).srt |
27.00KB |
| 9. Web Application Vulnerabilities (OBJ. 2.5).mp4 |
53.44MB |
| 9. Web Application Vulnerabilities (OBJ. 2.5).srt |
20.29KB |
| 9. Zero Trust (OBJ 1.1).mp4 |
144.80MB |
| 9. Zero Trust (OBJ 1.1).srt |
15.80KB |
| 90 |
1.30MB |
| 91 |
1.68MB |
| 92 |
415.94KB |
| 93 |
1.07MB |
| 94 |
1.39MB |
| 95 |
1.46MB |
| 96 |
1.63MB |
| 97 |
423.26KB |
| 98 |
1.31MB |
| 99 |
1.84MB |
| TutsNode.com.txt |
63B |