Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
46B |
1 |
57B |
1. Analyzing Vulnerabilities.mp4 |
29.40MB |
1. Analyzing Vulnerabilities.srt |
3.08KB |
1. Asymmetric Algorithms.mp4 |
47.89MB |
1. Asymmetric Algorithms.srt |
4.49KB |
1. Attacking Vulnerabilities.mp4 |
26.96MB |
1. Attacking Vulnerabilities.srt |
2.85KB |
1. Authentication and Authorization (OBJ 1.5).mp4 |
37.22MB |
1. Authentication and Authorization (OBJ 1.5).srt |
3.71KB |
1. Business Continuity (OBJ 4.4).mp4 |
25.23MB |
1. Business Continuity (OBJ 4.4).srt |
2.81KB |
1. Cloud and Virtualization (OBJ 1.6).mp4 |
23.57MB |
1. Cloud and Virtualization (OBJ 1.6).srt |
2.39KB |
1. Cloud Technologies.mp4 |
57.88MB |
1. Cloud Technologies.srt |
5.84KB |
1. Conclusion.mp4 |
225.79MB |
1. Conclusion.srt |
26.14KB |
1. Cryptography (OBJ 1.7).mp4 |
38.69MB |
1. Cryptography (OBJ 1.7).srt |
3.89KB |
1. Data Considerations (OBJ 4.3).mp4 |
20.27MB |
1. Data Considerations (OBJ 4.3).srt |
2.26KB |
1. Data Security (OBJ 1.4).mp4 |
78.28MB |
1. Data Security (OBJ 1.4).srt |
8.34KB |
1. Digital Forensics.mp4 |
22.52MB |
1. Digital Forensics.srt |
2.30KB |
1. Digital Forensic Tools.mp4 |
51.83MB |
1. Digital Forensic Tools.srt |
4.98KB |
1. Emerging Technology (OBJ 1.8).mp4 |
93.13MB |
1. Emerging Technology (OBJ 1.8).srt |
10.98KB |
1. Endpoint Security Controls.mp4 |
52.75MB |
1. Endpoint Security Controls.srt |
5.28KB |
1. Enterprise Mobility.mp4 |
57.24MB |
1. Enterprise Mobility.srt |
5.78KB |
1. Hashing and Symmetric Algorithms.mp4 |
25.91MB |
1. Hashing and Symmetric Algorithms.srt |
2.77KB |
1. Incident Response.mp4 |
31.23MB |
1. Incident Response.srt |
3.14KB |
1. Indicators of Compromise.mp4 |
39.36MB |
1. Indicators of Compromise.srt |
3.76KB |
1. Infrastructure Design (OBJ 1.2).mp4 |
24.79MB |
1. Infrastructure Design (OBJ 1.2).srt |
2.49KB |
1. Operational Technologies.mp4 |
45.13MB |
1. Operational Technologies.srt |
4.32KB |
1. Policies and Frameworks (OBJ. 4.1 & 4.3).mp4 |
30.24MB |
1. Policies and Frameworks (OBJ. 4.1 & 4.3).srt |
3.09KB |
1. Public Key Infrastructure.mp4 |
61.75MB |
1. Public Key Infrastructure.srt |
6.25KB |
1. Risk Management (OBJ 4.1).mp4 |
32.45MB |
1. Risk Management (OBJ 4.1).srt |
3.58KB |
1. Risk Reduction.mp4 |
33.41MB |
1. Risk Reduction.srt |
3.22KB |
1. Risk Strategies (OBJ 4.1).mp4 |
33.25MB |
1. Risk Strategies (OBJ 4.1).srt |
3.48KB |
1. Securing Architectures (OBJ 1.1).mp4 |
26.71MB |
1. Securing Architectures (OBJ 1.1).srt |
2.80KB |
1. Securing Networks (OBJ 1.1).mp4 |
149.57MB |
1. Securing Networks (OBJ 1.1).srt |
16.43KB |
1. Software Applications (OBJ 1.3).mp4 |
58.29MB |
1. Software Applications (OBJ 1.3).srt |
6.50KB |
1. Threat and Vulnerability Management.mp4 |
41.91MB |
1. Threat and Vulnerability Management.srt |
4.38KB |
1. Vendor Risk (OBJ 4.2).mp4 |
88.25MB |
1. Vendor Risk (OBJ 4.2).srt |
9.81KB |
1. Vulnerability Assessments.mp4 |
33.78MB |
1. Vulnerability Assessments.srt |
3.51KB |
1. Welcome.mp4 |
184.93MB |
1. Welcome.srt |
21.29KB |
10 |
449.09KB |
10. Analysis Utilities (OBJ. 2.4).mp4 |
110.13MB |
10. Analysis Utilities (OBJ. 2.4).srt |
12.73KB |
10. Auditing Files (OBJ 1.4).mp4 |
46.96MB |
10. Auditing Files (OBJ 1.4).srt |
8.39KB |
10. Checkpoint Analyzing Vulnerabilities.html |
160B |
10. Checkpoint Cloud and Virtualization.html |
160B |
10. Checkpoint Enterprise Mobility.html |
160B |
10. Checkpoint Indicators of Compromise.html |
160B |
10. Checkpoint Vendor Risk.html |
160B |
10. Collection Tools (OBJ. 2.9).mp4 |
133.14MB |
10. Collection Tools (OBJ. 2.9).srt |
13.45KB |
10. Key Stretching (OBJ. 3.6).mp4 |
94.89MB |
10. Key Stretching (OBJ. 3.6).srt |
10.76KB |
10. Logging and Monitoring (OBJ. 3.2).mp4 |
133.20MB |
10. Logging and Monitoring (OBJ. 3.2).srt |
14.98KB |
10. Merging Networks (OBJ 1.1).mp4 |
118.16MB |
10. Merging Networks (OBJ 1.1).srt |
13.69KB |
10. Network Access Control (NAC) (OBJ 1.1).mp4 |
61.91MB |
10. Network Access Control (NAC) (OBJ 1.1).srt |
6.72KB |
10. Quantum Computing (OBJ 1.8).mp4 |
121.07MB |
10. Quantum Computing (OBJ 1.8).srt |
12.89KB |
10. Root of Trust (OBJ 1.5).mp4 |
93.57MB |
10. Root of Trust (OBJ 1.5).srt |
9.94KB |
10. Troubleshooting Certificates (OBJ. 3.7).mp4 |
115.07MB |
10. Troubleshooting Certificates (OBJ. 3.7).srt |
13.32KB |
10. VM Attacks (OBJ. 2.5).mp4 |
100.86MB |
10. VM Attacks (OBJ. 2.5).srt |
11.82KB |
100 |
714.24KB |
101 |
721.70KB |
102 |
848.46KB |
103 |
1.21MB |
104 |
438.66KB |
105 |
1.20MB |
106 |
86.83KB |
107 |
95.75KB |
108 |
174.20KB |
109 |
364.59KB |
11 |
96.76KB |
11. Attestation (OBJ 1.5).mp4 |
48.93MB |
11. Attestation (OBJ 1.5).srt |
5.38KB |
11. Checkpoint Asymmetric Algorithms.html |
160B |
11. Checkpoint Data Security.html |
160B |
11. Checkpoint Emerging Technology.html |
160B |
11. Configuring SIEM Agents (OBJ. 3.2).mp4 |
141.36MB |
11. Configuring SIEM Agents (OBJ. 3.2).srt |
41.05KB |
11. Network Attacks (OBJ. 2.5).mp4 |
239.52MB |
11. Network Attacks (OBJ. 2.5).srt |
26.60KB |
11. Remote Access (OBJ 1.1).mp4 |
195.45MB |
11. Remote Access (OBJ 1.1).srt |
20.51KB |
11. Software-Defined Networking (SDN) (OBJ 1.1).mp4 |
117.52MB |
11. Software-Defined Networking (SDN) (OBJ 1.1).srt |
13.16KB |
11. Troubleshooting Keys (OBJ. 3.7).mp4 |
75.27MB |
11. Troubleshooting Keys (OBJ. 3.7).srt |
8.76KB |
11. Using Collection Tools (OBJ. 2.10).mp4 |
45.35MB |
11. Using Collection Tools (OBJ. 2.10).srt |
10.27KB |
11. Vulnerability Scanning (OBJ. 2.4).mp4 |
81.97MB |
11. Vulnerability Scanning (OBJ. 2.4).srt |
20.84KB |
110 |
806.29KB |
111 |
1.20MB |
112 |
33.82KB |
113 |
521.96KB |
114 |
581.33KB |
115 |
708.60KB |
116 |
1.38MB |
117 |
1.45MB |
118 |
1.95MB |
119 |
4.80KB |
12 |
105.46KB |
12. Analyzing Scan Outputs (OBJ. 2.4).mp4 |
80.55MB |
12. Analyzing Scan Outputs (OBJ. 2.4).srt |
31.19KB |
12. Analyzing Web Applications (OBJ. 2.5).mp4 |
136.72MB |
12. Analyzing Web Applications (OBJ. 2.5).srt |
34.38KB |
12. Checkpoint Digital Forensic Tools.html |
160B |
12. Checkpoint Public Key Infrastructure.html |
160B |
12. Checkpoint Securing Architectures.html |
160B |
12. Identity Proofing (OBJ 1.5).mp4 |
77.97MB |
12. Identity Proofing (OBJ 1.5).srt |
8.71KB |
12. Resiliency (OBJ. 3.2).mp4 |
132.80MB |
12. Resiliency (OBJ. 3.2).srt |
15.02KB |
12. Unified Communications (OBJ 1.1).mp4 |
417.06MB |
12. Unified Communications (OBJ 1.1).srt |
45.35KB |
120 |
656.52KB |
121 |
292.22KB |
122 |
729.47KB |
123 |
1.32MB |
124 |
1.61MB |
125 |
1.67MB |
126 |
1.28MB |
127 |
1.30MB |
128 |
410.43KB |
129 |
514.33KB |
13 |
520.65KB |
13. Checkpoint Authentication and Authorization.html |
160B |
13. Checkpoint Endpoint Security Controls.html |
160B |
13. Checkpoint Vulnerability Assessments.html |
160B |
13. Cloud vs On-premise (OBJ 1.1).mp4 |
105.64MB |
13. Cloud vs On-premise (OBJ 1.1).srt |
11.95KB |
13. Social Engineering (OBJ. 2.5).mp4 |
157.40MB |
13. Social Engineering (OBJ. 2.5).srt |
17.48KB |
130 |
1.39MB |
131 |
1.98MB |
132 |
820.99KB |
133 |
876.33KB |
134 |
1.20MB |
135 |
1.49MB |
136 |
1.61MB |
137 |
309.62KB |
138 |
424.60KB |
139 |
1.11MB |
14 |
1.22MB |
14. DNSSEC (OBJ 1.1).mp4 |
92.83MB |
14. DNSSEC (OBJ 1.1).srt |
8.79KB |
14. Phishing Campaigns (OBJ. 2.5).mp4 |
46.06MB |
14. Phishing Campaigns (OBJ. 2.5).srt |
12.26KB |
140 |
1.27MB |
141 |
1.28MB |
142 |
746.90KB |
143 |
998.03KB |
144 |
480.65KB |
145 |
1.12MB |
146 |
1.16MB |
147 |
416.23KB |
148 |
744.45KB |
149 |
951.67KB |
15 |
514.08KB |
15. Checkpoint Attacking Vulnerabilities.html |
160B |
15. Load Balancer (OBJ 1.1).mp4 |
147.21MB |
15. Load Balancer (OBJ 1.1).srt |
15.84KB |
150 |
1.07MB |
151 |
1.52MB |
152 |
1.93MB |
153 |
1.84MB |
154 |
209.18KB |
155 |
470.52KB |
156 |
490.33KB |
157 |
950.73KB |
158 |
1.38MB |
159 |
1.81MB |
16 |
126.23KB |
16. Checkpoint Securing Networks.html |
160B |
160 |
1.09MB |
161 |
1.72MB |
162 |
494.47KB |
163 |
1.57MB |
164 |
1.87MB |
165 |
71.12KB |
166 |
85.60KB |
167 |
571.78KB |
168 |
1.84MB |
169 |
1.91MB |
17 |
652.71KB |
170 |
333.30KB |
171 |
232.51KB |
172 |
372.05KB |
173 |
908.65KB |
174 |
1.62MB |
175 |
621.89KB |
176 |
777.57KB |
177 |
785.54KB |
178 |
1.54MB |
179 |
1.69MB |
18 |
287.28KB |
180 |
194.97KB |
181 |
1.14MB |
182 |
1.62MB |
183 |
1.78MB |
184 |
86.27KB |
185 |
157.30KB |
186 |
211.61KB |
187 |
966.83KB |
188 |
1.45MB |
189 |
1.33MB |
19 |
488.13KB |
190 |
1.54MB |
191 |
1.75MB |
192 |
1.78MB |
193 |
1.98MB |
194 |
788.88KB |
195 |
1.11MB |
196 |
1.93MB |
197 |
442.99KB |
198 |
893.26KB |
199 |
1.17MB |
2 |
111B |
2.1 CASP (CAS-004) Objectives.pdf |
1.50MB |
2.2 CompTIA CASP+ (CAS-004) Study Notes.pdf |
4.09MB |
2. Access Control (OBJ 1.5).mp4 |
101.81MB |
2. Access Control (OBJ 1.5).srt |
11.66KB |
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).mp4 |
192.36MB |
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).srt |
22.53KB |
2. Asset Value (OBJ 4.1).mp4 |
88.19MB |
2. Asset Value (OBJ 4.1).srt |
9.44KB |
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).mp4 |
171.08MB |
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).srt |
19.23KB |
2. Business Continuity Plan (OBJ 4.4).mp4 |
299.78MB |
2. Business Continuity Plan (OBJ 4.4).srt |
35.58KB |
2. Business Models (OBJ 4.2).mp4 |
239.34MB |
2. Business Models (OBJ 4.2).srt |
28.45KB |
2. CASP+ (CAS-004) Practice Exam.html |
160B |
2. Cloud Deployment Models (OBJ 1.6).mp4 |
96.25MB |
2. Cloud Deployment Models (OBJ 1.6).srt |
11.04KB |
2. Data Life Cycle (OBJ 1.4).mp4 |
229.21MB |
2. Data Life Cycle (OBJ 1.4).srt |
24.98KB |
2. Data Security (OBJ. 4.3).mp4 |
79.97MB |
2. Data Security (OBJ. 4.3).srt |
8.78KB |
2. Deceptive Technologies (OBJ. 2.6).mp4 |
105.11MB |
2. Deceptive Technologies (OBJ. 2.6).srt |
11.87KB |
2. Device Hardening (OBJ. 3.2).mp4 |
182.84MB |
2. Device Hardening (OBJ. 3.2).srt |
19.89KB |
2. Directory Traversals (OBJ. 2.5).mp4 |
211.66MB |
2. Directory Traversals (OBJ. 2.5).srt |
20.90KB |
2. Download Your Free Study Guide.html |
76B |
2. Embedded Systems (OBJ. 3.3).mp4 |
226.52MB |
2. Embedded Systems (OBJ. 3.3).srt |
24.87KB |
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).mp4 |
211.05MB |
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).srt |
23.03KB |
2. Forensic Process (OBJ. 2.8).mp4 |
100.38MB |
2. Forensic Process (OBJ. 2.8).srt |
11.86KB |
2. Forensic Workstations (OBJ. 2.9).mp4 |
107.67MB |
2. Forensic Workstations (OBJ. 2.9).srt |
12.50KB |
2. Hashing (OBJ. 3.6).mp4 |
147.64MB |
2. Hashing (OBJ. 3.6).srt |
16.17KB |
2. Penetration Test (OBJ. 2.4).mp4 |
103.39MB |
2. Penetration Test (OBJ. 2.4).srt |
11.66KB |
2. PKI Components (OBJ. 3.5).mp4 |
223.24MB |
2. PKI Components (OBJ. 3.5).srt |
24.53KB |
2. Policies (OBJ. 4.1).mp4 |
261.96MB |
2. Policies (OBJ. 4.1).srt |
32.80KB |
2. Privacy and Confidentiality (OBJ 1.7).mp4 |
143.97MB |
2. Privacy and Confidentiality (OBJ 1.7).srt |
14.67KB |
2. Race Conditions (OBJ. 2.5).mp4 |
104.38MB |
2. Race Conditions (OBJ. 2.5).srt |
11.54KB |
2. Risk Strategies (OBJ. 4.1).mp4 |
96.67MB |
2. Risk Strategies (OBJ. 4.1).srt |
11.76KB |
2. Scalability (OBJ 1.2).mp4 |
121.27MB |
2. Scalability (OBJ 1.2).srt |
12.67KB |
2. Switches (OBJ 1.1).mp4 |
153.59MB |
2. Switches (OBJ 1.1).srt |
17.36KB |
2. Systems Development Life Cycle (OBJ 1.3).mp4 |
143.31MB |
2. Systems Development Life Cycle (OBJ 1.3).srt |
16.63KB |
2. Threat Intelligence (OBJ. 2.1).mp4 |
135.60MB |
2. Threat Intelligence (OBJ. 2.1).srt |
15.86KB |
2. Traffic Mirroring (OBJ 1.1).mp4 |
94.07MB |
2. Traffic Mirroring (OBJ 1.1).srt |
10.28KB |
2. Triage (OBJ. 2.7).mp4 |
174.75MB |
2. Triage (OBJ. 2.7).srt |
19.19KB |
2. Types of IoCs (OBJ. 2.2).mp4 |
61.96MB |
2. Types of IoCs (OBJ. 2.2).srt |
9.15KB |
2. Using Asymmetric Algortihms.mp4 |
200.81MB |
2. Using Asymmetric Algortihms.srt |
22.14KB |
20 |
671.26KB |
200 |
322.42KB |
201 |
389.94KB |
202 |
1.97MB |
203 |
1.59MB |
204 |
1.75MB |
205 |
1.81MB |
206 |
1.44MB |
207 |
1.55MB |
208 |
26.58KB |
209 |
1.47MB |
21 |
1.87MB |
210 |
34.73KB |
211 |
134.37KB |
212 |
1.43MB |
213 |
1.45MB |
214 |
31.64KB |
215 |
1.72MB |
216 |
33.90KB |
217 |
1.37MB |
218 |
1.69MB |
219 |
263.59KB |
22 |
1.99MB |
220 |
272.83KB |
221 |
747.88KB |
222 |
1.26MB |
223 |
1.45MB |
224 |
1.67MB |
225 |
1.67MB |
226 |
51.30KB |
227 |
1.00MB |
228 |
897.18KB |
229 |
1.03MB |
23 |
1.44MB |
230 |
1.24MB |
231 |
1.47MB |
232 |
1.07MB |
233 |
1.27MB |
234 |
1.45MB |
235 |
1.50MB |
236 |
43.04KB |
237 |
97.23KB |
238 |
256.92KB |
239 |
590.63KB |
24 |
33.58KB |
240 |
1.58MB |
241 |
1.71MB |
242 |
1.77MB |
243 |
120.17KB |
244 |
777.54KB |
245 |
1.54MB |
246 |
1.91MB |
247 |
415.97KB |
248 |
576.50KB |
249 |
1.25MB |
25 |
358.61KB |
250 |
178.90KB |
251 |
1.07MB |
252 |
112.59KB |
253 |
1.04MB |
254 |
1.94MB |
255 |
664.35KB |
256 |
888.45KB |
257 |
90.50KB |
258 |
1.80MB |
259 |
658.88KB |
26 |
1.37MB |
260 |
1.31MB |
261 |
1.61MB |
262 |
794.18KB |
263 |
1.33MB |
264 |
1.34MB |
265 |
1.72MB |
266 |
224.52KB |
267 |
602.22KB |
268 |
765.58KB |
269 |
1.55MB |
27 |
645.38KB |
270 |
785.65KB |
271 |
1.76MB |
272 |
612.92KB |
273 |
1.28MB |
274 |
1.04MB |
275 |
1.29MB |
276 |
92.68KB |
277 |
785.93KB |
278 |
1.21MB |
279 |
1.28MB |
28 |
1.49MB |
280 |
1.87MB |
281 |
437.05KB |
282 |
1.48MB |
283 |
1.73MB |
29 |
1.95MB |
3 |
78B |
3. Access Control (OBJ 4.1).mp4 |
136.70MB |
3. Access Control (OBJ 4.1).srt |
14.94KB |
3. Buffer Overflows (OBJ. 2.5).mp4 |
271.11MB |
3. Buffer Overflows (OBJ. 2.5).srt |
29.78KB |
3. Business Impact Analysis (OBJ 4.4).mp4 |
299.72MB |
3. Business Impact Analysis (OBJ 4.4).srt |
33.08KB |
3. Calculating Hash Digests (OBJ. 3.6).mp4 |
34.28MB |
3. Calculating Hash Digests (OBJ. 3.6).srt |
6.16KB |
3. Chain of Custody (OBJ. 2.8).mp4 |
154.37MB |
3. Chain of Custody (OBJ. 2.8).srt |
17.48KB |
3. Checkpoint Introduction.html |
160B |
3. Cloud Encryption (OBJ. 3.4).mp4 |
114.19MB |
3. Cloud Encryption (OBJ. 3.4).srt |
12.83KB |
3. Cloud Service Models (OBJ 1.6).mp4 |
109.93MB |
3. Cloud Service Models (OBJ 1.6).srt |
12.50KB |
3. Communication Plan (OBJ. 2.7).mp4 |
219.69MB |
3. Communication Plan (OBJ. 2.7).srt |
25.04KB |
3. Credential Management (OBJ 1.5).mp4 |
95.23MB |
3. Credential Management (OBJ 1.5).srt |
10.52KB |
3. Cross-Site Scripting (XSS) (OBJ. 2.5).mp4 |
194.46MB |
3. Cross-Site Scripting (XSS) (OBJ. 2.5).srt |
21.18KB |
3. Data Classification (OBJ. 4.3).mp4 |
58.42MB |
3. Data Classification (OBJ. 4.3).srt |
6.49KB |
3. Data Classification (OBJ 1.4).mp4 |
151.30MB |
3. Data Classification (OBJ 1.4).srt |
17.11KB |
3. Deep Learning (OBJ 1.8).mp4 |
194.60MB |
3. Deep Learning (OBJ 1.8).srt |
21.99KB |
3. Digital Certificates (OBJ. 3.5).mp4 |
163.00MB |
3. Digital Certificates (OBJ. 3.5).srt |
18.85KB |
3. File Carving Tools (OBJ. 2.9).mp4 |
76.31MB |
3. File Carving Tools (OBJ. 2.9).srt |
7.80KB |
3. Frameworks (OBJ. 4.1).mp4 |
109.92MB |
3. Frameworks (OBJ. 4.1).srt |
12.63KB |
3. ICS and SCADA (OBJ. 3.3).mp4 |
198.18MB |
3. ICS and SCADA (OBJ. 3.3).srt |
23.53KB |
3. Influences (OBJ 4.2).mp4 |
162.91MB |
3. Influences (OBJ 4.2).srt |
18.54KB |
3. Integrity and Non-repudiation (OBJ 1.7).mp4 |
142.00MB |
3. Integrity and Non-repudiation (OBJ 1.7).srt |
14.72KB |
3. Network Sensors (OBJ 1.1).mp4 |
253.49MB |
3. Network Sensors (OBJ 1.1).srt |
28.35KB |
3. PCAP Files (OBJ. 2.2).mp4 |
90.03MB |
3. PCAP Files (OBJ. 2.2).srt |
9.66KB |
3. PenTest Steps (OBJ. 2.4).mp4 |
152.69MB |
3. PenTest Steps (OBJ. 2.4).srt |
18.07KB |
3. Resiliency Issues (OBJ 1.2).mp4 |
279.45MB |
3. Resiliency Issues (OBJ 1.2).srt |
30.16KB |
3. Risk Management Lifecycle (OBJ. 4.1).mp4 |
256.65MB |
3. Risk Management Lifecycle (OBJ. 4.1).srt |
30.99KB |
3. Routers (OBJ 1.1).mp4 |
179.48MB |
3. Routers (OBJ 1.1).srt |
18.76KB |
3. Security Data Analytics (OBJ. 2.6).mp4 |
172.34MB |
3. Security Data Analytics (OBJ. 2.6).srt |
26.60KB |
3. Software Development Life Cycle (OBJ 1.3).mp4 |
127.03MB |
3. Software Development Life Cycle (OBJ 1.3).srt |
14.29KB |
3. SSLTLS and Cipher Suites (OBJ. 3.6).mp4 |
183.22MB |
3. SSLTLS and Cipher Suites (OBJ. 3.6).srt |
18.93KB |
3. Threat Hunting (OBJ. 2.1).mp4 |
143.43MB |
3. Threat Hunting (OBJ. 2.1).srt |
17.57KB |
3. Unnecessary Services (OBJ. 3.2).mp4 |
58.23MB |
3. Unnecessary Services (OBJ. 3.2).srt |
11.84KB |
3. WPA3 (OBJ. 3.1).mp4 |
156.70MB |
3. WPA3 (OBJ. 3.1).srt |
15.37KB |
30 |
185.39KB |
31 |
809.19KB |
32 |
1.48MB |
33 |
218.70KB |
34 |
397.13KB |
35 |
780.73KB |
36 |
315.33KB |
37 |
1.79MB |
38 |
639.23KB |
39 |
346.99KB |
4 |
3B |
4. Aggregating Risk (OBJ 4.1).mp4 |
66.53MB |
4. Aggregating Risk (OBJ 4.1).srt |
7.92KB |
4. Automation (OBJ 1.2).mp4 |
138.39MB |
4. Automation (OBJ 1.2).srt |
15.40KB |
4. Big Data (OBJ 1.8).mp4 |
99.92MB |
4. Big Data (OBJ 1.8).srt |
10.37KB |
4. Binary Analysis Tools (OBJ. 2.9).mp4 |
151.17MB |
4. Binary Analysis Tools (OBJ. 2.9).srt |
16.56KB |
4. Buffer Overflow Attack (OBJ. 2.6).mp4 |
91.62MB |
4. Buffer Overflow Attack (OBJ. 2.6).srt |
13.16KB |
4. Compliance and Policy (OBJ 1.7).mp4 |
74.74MB |
4. Compliance and Policy (OBJ 1.7).srt |
7.98KB |
4. Conduct Packet Analysis (OBJ. 2.2).mp4 |
80.57MB |
4. Conduct Packet Analysis (OBJ. 2.2).srt |
13.34KB |
4. Connectivity Options (OBJ. 3.1).mp4 |
189.66MB |
4. Connectivity Options (OBJ. 3.1).srt |
19.81KB |
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).mp4 |
157.65MB |
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).srt |
18.53KB |
4. Data Types (OBJ. 4.3).mp4 |
117.54MB |
4. Data Types (OBJ. 4.3).srt |
12.93KB |
4. Deployment Considerations (OBJ 1.6).mp4 |
108.09MB |
4. Deployment Considerations (OBJ 1.6).srt |
11.90KB |
4. Development Approaches (OBJ 1.3).mp4 |
236.56MB |
4. Development Approaches (OBJ 1.3).srt |
28.01KB |
4. Host Sensors (OBJ 1.1).mp4 |
130.73MB |
4. Host Sensors (OBJ 1.1).srt |
14.14KB |
4. ICS Protocols (OBJ. 3.3).mp4 |
233.37MB |
4. ICS Protocols (OBJ. 3.3).srt |
26.42KB |
4. Intelligence Collection (OBJ. 2.1).mp4 |
241.72MB |
4. Intelligence Collection (OBJ. 2.1).srt |
28.61KB |
4. Labeling and Tagging (OBJ 1.4).mp4 |
178.15MB |
4. Labeling and Tagging (OBJ 1.4).srt |
19.80KB |
4. Message Authentication (OBJ. 3.6).mp4 |
74.55MB |
4. Message Authentication (OBJ. 3.6).srt |
7.74KB |
4. Order of Volatility (OBJ. 2.8).mp4 |
138.68MB |
4. Order of Volatility (OBJ. 2.8).srt |
16.18KB |
4. Organizational Changes (OBJ 4.2).mp4 |
131.59MB |
4. Organizational Changes (OBJ 4.2).srt |
14.88KB |
4. Password Policies (OBJ 1.5).mp4 |
171.66MB |
4. Password Policies (OBJ 1.5).srt |
18.28KB |
4. Patching (OBJ. 3.2).mp4 |
99.79MB |
4. Patching (OBJ. 3.2).srt |
10.86KB |
4. PenTest Requirements (OBJ. 2.4).mp4 |
252.78MB |
4. PenTest Requirements (OBJ. 2.4).srt |
29.62KB |
4. Preventative Controls (OBJ. 2.6).mp4 |
110.43MB |
4. Preventative Controls (OBJ. 2.6).srt |
12.81KB |
4. Privacy Impact Assessment (OBJ 4.4).mp4 |
84.45MB |
4. Privacy Impact Assessment (OBJ 4.4).srt |
9.83KB |
4. Regulations (OBJ. 4.3).mp4 |
170.19MB |
4. Regulations (OBJ. 4.3).srt |
20.21KB |
4. Risk Types (OBJ. 4.1).mp4 |
64.93MB |
4. Risk Types (OBJ. 4.1).srt |
7.61KB |
4. Serverless Computing (OBJ. 3.4).mp4 |
195.59MB |
4. Serverless Computing (OBJ. 3.4).srt |
21.67KB |
4. SMIME and SSH (OBJ. 3.6).mp4 |
162.78MB |
4. SMIME and SSH (OBJ. 3.6).srt |
18.14KB |
4. Stakeholder Management (OBJ. 2.7).mp4 |
154.61MB |
4. Stakeholder Management (OBJ. 2.7).srt |
17.62KB |
4. Using Digital Certificates (OBJ. 3.5).mp4 |
120.93MB |
4. Using Digital Certificates (OBJ. 3.5).srt |
13.67KB |
4. Wireless and Mesh (OBJ 1.1).mp4 |
73.00MB |
4. Wireless and Mesh (OBJ 1.1).srt |
7.45KB |
40 |
681.12KB |
41 |
977.80KB |
42 |
1.19MB |
43 |
1.24MB |
44 |
38.67KB |
45 |
184.69KB |
46 |
1.00MB |
47 |
1.19MB |
48 |
1.93MB |
49 |
1.82MB |
5 |
618.84KB |
5. Application Controls (OBJ. 2.6).mp4 |
210.81MB |
5. Application Controls (OBJ. 2.6).srt |
24.22KB |
5. Authentication and References (OBJ. 2.5).mp4 |
54.09MB |
5. Authentication and References (OBJ. 2.5).srt |
14.06KB |
5. Blockchain & Distributed Consensus (OBJ 1.8).mp4 |
120.07MB |
5. Blockchain & Distributed Consensus (OBJ 1.8).srt |
13.28KB |
5. Code Analysis (OBJ. 2.4).mp4 |
182.06MB |
5. Code Analysis (OBJ. 2.4).srt |
21.09KB |
5. Data Retention (OBJ. 4.3).mp4 |
150.79MB |
5. Data Retention (OBJ. 4.3).srt |
17.75KB |
5. Data States (OBJ 1.7).mp4 |
151.30MB |
5. Data States (OBJ 1.7).srt |
15.75KB |
5. Deidentification (OBJ 1.4).mp4 |
243.36MB |
5. Deidentification (OBJ 1.4).srt |
26.28KB |
5. EAP (OBJ. 3.6).mp4 |
117.80MB |
5. EAP (OBJ. 3.6).srt |
12.60KB |
5. Exploring Server Certificates (OBJ. 3.5).mp4 |
24.72MB |
5. Exploring Server Certificates (OBJ. 3.5).srt |
7.37KB |
5. Firewalls (OBJ 1.1).mp4 |
245.88MB |
5. Firewalls (OBJ 1.1).srt |
26.29KB |
5. Forensic Analysis (OBJ. 2.8).mp4 |
143.49MB |
5. Forensic Analysis (OBJ. 2.8).srt |
15.15KB |
5. Implementing Password Policies (OBJ 1.5).mp4 |
28.72MB |
5. Implementing Password Policies (OBJ 1.5).srt |
10.96KB |
5. Incident Response Plan (OBJ 4.4).mp4 |
238.13MB |
5. Incident Response Plan (OBJ 4.4).srt |
28.15KB |
5. Incident Response Process (OBJ. 2.7).mp4 |
223.61MB |
5. Incident Response Process (OBJ. 2.7).srt |
25.36KB |
5. Industries and Sectors (OBJ. 3.3).mp4 |
102.46MB |
5. Industries and Sectors (OBJ. 3.3).srt |
11.74KB |
5. Layer 2 Segmentation (OBJ 1.1).mp4 |
112.28MB |
5. Layer 2 Segmentation (OBJ 1.1).srt |
12.34KB |
5. NetFlow (OBJ. 2.2).mp4 |
147.92MB |
5. NetFlow (OBJ. 2.2).srt |
16.90KB |
5. Performance Design (OBJ 1.2).mp4 |
130.72MB |
5. Performance Design (OBJ 1.2).srt |
13.27KB |
5. Performing Malware Analysis (OBJ. 2.9).mp4 |
181.25MB |
5. Performing Malware Analysis (OBJ. 2.9).srt |
50.80KB |
5. Provider Limitations (OBJ 1.6).mp4 |
62.50MB |
5. Provider Limitations (OBJ 1.6).srt |
7.07KB |
5. Risk Handling (OBJ. 4.1).mp4 |
187.35MB |
5. Risk Handling (OBJ. 4.1).srt |
22.53KB |
5. Scenario Planning (OBJ 4.1).mp4 |
182.38MB |
5. Scenario Planning (OBJ 4.1).srt |
20.88KB |
5. Security Configurations (OBJ. 3.1).mp4 |
175.25MB |
5. Security Configurations (OBJ. 3.1).srt |
18.76KB |
5. Security Settings (OBJ. 3.2).mp4 |
121.59MB |
5. Security Settings (OBJ. 3.2).srt |
12.49KB |
5. Shared Responsibility Model (OBJ 4.2).mp4 |
105.77MB |
5. Shared Responsibility Model (OBJ 4.2).srt |
12.79KB |
5. Software Assurance (OBJ 1.3).mp4 |
187.40MB |
5. Software Assurance (OBJ 1.3).srt |
21.79KB |
5. Software-Defied Networking (SDN) (OBJ. 3.4).mp4 |
147.83MB |
5. Software-Defied Networking (SDN) (OBJ. 3.4).srt |
17.01KB |
5. SQL Injections (OBJ. 2.5).mp4 |
154.54MB |
5. SQL Injections (OBJ. 2.5).srt |
16.05KB |
5. Standards (OBJ. 4.3).mp4 |
131.70MB |
5. Standards (OBJ. 4.3).srt |
14.38KB |
5. Symmetric Algorithms (OBJ. 3.6).mp4 |
125.53MB |
5. Symmetric Algorithms (OBJ. 3.6).srt |
2.77KB |
5. Threat Actors (OBJ. 2.1).mp4 |
201.00MB |
5. Threat Actors (OBJ. 2.1).srt |
22.66KB |
50 |
419.99KB |
51 |
564.53KB |
52 |
1.40MB |
53 |
1.54MB |
54 |
331.96KB |
55 |
1.64MB |
56 |
350.95KB |
57 |
614.87KB |
58 |
668.31KB |
59 |
1.38MB |
6 |
565.86KB |
6. Baselins and Templates (OBJ 1.3).mp4 |
139.71MB |
6. Baselins and Templates (OBJ 1.3).srt |
16.52KB |
6. Checkpoint Operational Technologies.html |
160B |
6. Ciphers and Certificates (OBJ. 2.5).mp4 |
235.65MB |
6. Ciphers and Certificates (OBJ. 2.5).srt |
24.34KB |
6. Configuring Firewalls (OBJ 1.1).mp4 |
53.59MB |
6. Configuring Firewalls (OBJ 1.1).srt |
14.80KB |
6. Contracts and Agreements (OBJ. 4.3).mp4 |
201.82MB |
6. Contracts and Agreements (OBJ. 4.3).srt |
24.09KB |
6. Cracking Weak Passwords (OBJ 1.5).mp4 |
24.13MB |
6. Cracking Weak Passwords (OBJ 1.5).srt |
5.53KB |
6. Cryptographic Use Cases (OBJ 1.7).mp4 |
135.50MB |
6. Cryptographic Use Cases (OBJ 1.7).srt |
14.32KB |
6. Data Destruction (OBJ. 4.3).mp4 |
62.55MB |
6. Data Destruction (OBJ. 4.3).srt |
6.91KB |
6. Data Encryption (OBJ 1.4).mp4 |
162.02MB |
6. Data Encryption (OBJ 1.4).srt |
17.46KB |
6. DNS Protection (OBJ. 3.1).mp4 |
70.97MB |
6. DNS Protection (OBJ. 3.1).srt |
6.84KB |
6. Extending Controls (OBJ 1.6).mp4 |
108.16MB |
6. Extending Controls (OBJ 1.6).srt |
11.65KB |
6. Forensic Analysis Tools (OBJ. 2.9).mp4 |
172.71MB |
6. Forensic Analysis Tools (OBJ. 2.9).srt |
19.64KB |
6. IPSec (OBJ. 3.6).mp4 |
317.12MB |
6. IPSec (OBJ. 3.6).srt |
35.19KB |
6. Log Collection and Analysis (OBJ. 3.4).mp4 |
96.02MB |
6. Log Collection and Analysis (OBJ. 3.4).srt |
10.61KB |
6. Logs (OBJ. 2.2).mp4 |
148.80MB |
6. Logs (OBJ. 2.2).srt |
16.31KB |
6. Mandatory Access Controls (MAC) (OBJ. 3.2).mp4 |
142.55MB |
6. Mandatory Access Controls (MAC) (OBJ. 3.2).srt |
15.03KB |
6. Network Segmentation (OBJ 1.1).mp4 |
284.51MB |
6. Network Segmentation (OBJ 1.1).srt |
31.51KB |
6. Passwordless Authentication (OBJ 1.8).mp4 |
112.91MB |
6. Passwordless Authentication (OBJ 1.8).srt |
12.48KB |
6. Playbooks (OBJ. 2.7).mp4 |
179.71MB |
6. Playbooks (OBJ. 2.7).srt |
21.00KB |
6. Protocol Analysis (OBJ. 2.4).mp4 |
170.48MB |
6. Protocol Analysis (OBJ. 2.4).srt |
18.79KB |
6. Risk Tracking (OBJ. 4.1).mp4 |
109.44MB |
6. Risk Tracking (OBJ. 4.1).srt |
12.09KB |
6. Security Automation (OBJ. 2.6).mp4 |
230.05MB |
6. Security Automation (OBJ. 2.6).srt |
25.06KB |
6. Security Controls (OBJ 4.1).mp4 |
200.07MB |
6. Security Controls (OBJ 4.1).srt |
22.95KB |
6. Steganography.mp4 |
38.39MB |
6. Steganography.srt |
8.42KB |
6. Stream Ciphers (OBJ. 3.6).mp4 |
96.46MB |
6. Stream Ciphers (OBJ. 3.6).srt |
10.21KB |
6. Testing Plans (OBJ 4.4).mp4 |
155.59MB |
6. Testing Plans (OBJ 4.4).srt |
18.96KB |
6. Threat Management Frameworks (OBJ. 2.1).mp4 |
234.63MB |
6. Threat Management Frameworks (OBJ. 2.1).srt |
32.04KB |
6. Trust Models (OBJ. 3.5).mp4 |
96.22MB |
6. Trust Models (OBJ. 3.5).srt |
11.53KB |
6. Viability and Support (OBJ 4.2).mp4 |
235.97MB |
6. Viability and Support (OBJ 4.2).srt |
26.22KB |
6. Virtualization (OBJ 1.2).mp4 |
179.99MB |
6. Virtualization (OBJ 1.2).srt |
19.13KB |
6. XML Injections (OBJ. 2.5).mp4 |
138.33MB |
6. XML Injections (OBJ. 2.5).srt |
14.87KB |
60 |
1.07MB |
61 |
799.32KB |
62 |
1.16MB |
63 |
1.62MB |
64 |
1.94MB |
65 |
229.31KB |
66 |
767.25KB |
67 |
5.50KB |
68 |
295.45KB |
69 |
530.99KB |
7 |
908.68KB |
7. Best Practices (OBJ 1.3).mp4 |
132.39MB |
7. Best Practices (OBJ 1.3).srt |
14.67KB |
7. Block Ciphers (OBJ. 3.6).mp4 |
211.33MB |
7. Block Ciphers (OBJ. 3.6).srt |
23.78KB |
7. Certificate Management (OBJ. 3.5).mp4 |
59.42MB |
7. Certificate Management (OBJ. 3.5).srt |
6.81KB |
7. Checkpoint Business Continuity.html |
160B |
7. Checkpoint Digital Forensics.html |
160B |
7. Checkpoint Incident Response.html |
160B |
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).mp4 |
134.02MB |
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).srt |
15.05KB |
7. Data Loss Prevention (DLP) (OBJ 1.4).mp4 |
218.21MB |
7. Data Loss Prevention (DLP) (OBJ 1.4).srt |
23.16KB |
7. Data Ownership (OBJ. 4.3).mp4 |
120.48MB |
7. Data Ownership (OBJ. 4.3).srt |
13.60KB |
7. Dependencies (OBJ 4.2).mp4 |
102.31MB |
7. Dependencies (OBJ 4.2).srt |
11.43KB |
7. Deployment Options (OBJ. 3.1).mp4 |
100.22MB |
7. Deployment Options (OBJ. 3.1).srt |
9.99KB |
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).mp4 |
76.63MB |
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).srt |
7.18KB |
7. Homomorphic Encryption (OBJ 1.8).mp4 |
75.73MB |
7. Homomorphic Encryption (OBJ 1.8).srt |
8.13KB |
7. Implement Network Segmentation (OBJ 1.1).mp4 |
54.46MB |
7. Implement Network Segmentation (OBJ 1.1).srt |
21.71KB |
7. Improper Headers (OBJ. 2.5).mp4 |
127.27MB |
7. Improper Headers (OBJ. 2.5).srt |
13.84KB |
7. IoC Notifications (OBJ. 2.2).mp4 |
162.59MB |
7. IoC Notifications (OBJ. 2.2).srt |
19.53KB |
7. Legal Considerations (OBJ. 4.3).mp4 |
152.16MB |
7. Legal Considerations (OBJ. 4.3).srt |
17.63KB |
7. Multifactor Authentication (OBJ 1.5).mp4 |
181.78MB |
7. Multifactor Authentication (OBJ 1.5).srt |
19.63KB |
7. Other Injection Attacks (OBJ. 2.5).mp4 |
91.69MB |
7. Other Injection Attacks (OBJ. 2.5).srt |
10.07KB |
7. Physical Security (OBJ. 2.6).mp4 |
253.90MB |
7. Physical Security (OBJ. 2.6).srt |
25.06KB |
7. PKI Use Cases (OBJ 1.7).mp4 |
186.62MB |
7. PKI Use Cases (OBJ 1.7).srt |
19.08KB |
7. Provision and Deprovision (OBJ 1.6).mp4 |
64.73MB |
7. Provision and Deprovision (OBJ 1.6).srt |
7.07KB |
7. Proxies (OBJ 1.1).mp4 |
156.32MB |
7. Proxies (OBJ 1.1).srt |
16.22KB |
7. Risk Assessment (OBJ. 4.1).mp4 |
390.82MB |
7. Risk Assessment (OBJ. 4.1).srt |
45.12KB |
7. Secure Boot (OBJ. 3.2).mp4 |
124.88MB |
7. Secure Boot (OBJ. 3.2).srt |
12.69KB |
7. Securing VMs (OBJ 1.2).mp4 |
36.66MB |
7. Securing VMs (OBJ 1.2).srt |
9.69KB |
7. Security Solutions (OBJ 4.1).mp4 |
193.68MB |
7. Security Solutions (OBJ 4.1).srt |
21.90KB |
7. TCPDump (OBJ. 2.4).mp4 |
75.74MB |
7. TCPDump (OBJ. 2.4).srt |
17.42KB |
7. Using Aircrack-ng (OBJ. 2.9).mp4 |
84.56MB |
7. Using Aircrack-ng (OBJ. 2.9).srt |
16.59KB |
7. Vulnerability Management Activities (OBJ. 2.3).mp4 |
254.06MB |
7. Vulnerability Management Activities (OBJ. 2.3).srt |
29.45KB |
70 |
1.85MB |
71 |
68.39KB |
72 |
770.74KB |
73 |
1.25MB |
74 |
1.29MB |
75 |
1.66MB |
76 |
1.93MB |
77 |
346.75KB |
78 |
937.87KB |
79 |
1.52MB |
8 |
40.13KB |
8. Authentication Bypass (OBJ. 2.5).mp4 |
142.05MB |
8. Authentication Bypass (OBJ. 2.5).srt |
16.35KB |
8. Authentication Protocols (OBJ 1.5).mp4 |
210.76MB |
8. Authentication Protocols (OBJ 1.5).srt |
22.47KB |
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).mp4 |
82.53MB |
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).srt |
9.39KB |
8. Checkpoint Cryptography.html |
160B |
8. Checkpoint Hashing and Symmetric Algorithms.html |
160B |
8. Cloud Misconfigurations (OBJ. 3.4).mp4 |
238.01MB |
8. Cloud Misconfigurations (OBJ. 3.4).srt |
27.43KB |
8. Considerations (OBJ 4.2).mp4 |
232.51MB |
8. Considerations (OBJ 4.2).srt |
26.57KB |
8. Containerization (OBJ 1.2).mp4 |
124.84MB |
8. Containerization (OBJ 1.2).srt |
14.30KB |
8. Cost of a Data Breach (OBJ 4.1).mp4 |
132.51MB |
8. Cost of a Data Breach (OBJ 4.1).srt |
13.54KB |
8. Data Sovereignty (OBJ. 4.3).mp4 |
71.12MB |
8. Data Sovereignty (OBJ. 4.3).srt |
8.18KB |
8. DLP Detection (OBJ 1.4).mp4 |
142.62MB |
8. DLP Detection (OBJ 1.4).srt |
15.55KB |
8. Forward Secrecy (OBJ. 3.6).mp4 |
73.95MB |
8. Forward Secrecy (OBJ. 3.6).srt |
8.53KB |
8. Gateways (OBJ 1.1).mp4 |
99.85MB |
8. Gateways (OBJ 1.1).srt |
10.58KB |
8. Hardware Encryption (OBJ. 3.2).mp4 |
103.23MB |
8. Hardware Encryption (OBJ. 3.2).srt |
10.77KB |
8. Imaging Tools (OBJ. 2.9).mp4 |
168.60MB |
8. Imaging Tools (OBJ. 2.9).srt |
16.82KB |
8. Integrating Applications (OBJ 1.3).mp4 |
99.06MB |
8. Integrating Applications (OBJ 1.3).srt |
9.85KB |
8. Integrating Industries (OBJ. 4.3).mp4 |
74.33MB |
8. Integrating Industries (OBJ. 4.3).srt |
8.54KB |
8. Lock Picking (OBJ. 2.6).mp4 |
36.67MB |
8. Lock Picking (OBJ. 2.6).srt |
3.74KB |
8. Reconnaissance Concerns (OBJ. 3.1).mp4 |
175.93MB |
8. Reconnaissance Concerns (OBJ. 3.1).srt |
18.84KB |
8. Response to IoCs (OBJ. 2.2).mp4 |
111.52MB |
8. Response to IoCs (OBJ. 2.2).srt |
12.45KB |
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).mp4 |
154.93MB |
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).srt |
16.21KB |
8. Server Segmentation (OBJ 1.1).mp4 |
229.82MB |
8. Server Segmentation (OBJ 1.1).srt |
25.23KB |
8. Software Composition (OBJ. 2.5).mp4 |
207.96MB |
8. Software Composition (OBJ. 2.5).srt |
23.47KB |
8. Storage Models (OBJ 1.6).mp4 |
114.62MB |
8. Storage Models (OBJ 1.6).srt |
11.91KB |
8. VirtualAugmented Reality (OBJ 1.8).mp4 |
98.55MB |
8. VirtualAugmented Reality (OBJ 1.8).srt |
11.15KB |
8. When Risk Management Fails (OBJ. 4.1).mp4 |
81.87MB |
8. When Risk Management Fails (OBJ. 4.1).srt |
8.62KB |
8. Wireshark (OBJ. 2.4).mp4 |
88.41MB |
8. Wireshark (OBJ. 2.4).srt |
20.41KB |
80 |
1.81MB |
81 |
1.40MB |
82 |
148.95KB |
83 |
1.00MB |
84 |
1.09MB |
85 |
1.22MB |
86 |
1.41MB |
87 |
1.98MB |
88 |
353.68KB |
89 |
615.09KB |
9 |
1.35MB |
9. 3D Printing (OBJ 1.8).mp4 |
66.76MB |
9. 3D Printing (OBJ 1.8).srt |
7.30KB |
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).mp4 |
40.20MB |
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).srt |
4.29KB |
9. Checkpoint Cloud Technologies.html |
160B |
9. Checkpoint Data Considerations.html |
160B |
9. Checkpoint Infrastructure Design.html |
160B |
9. Checkpoint Policies and Frameworks.html |
160B |
9. Checkpoint Risk Management.html |
160B |
9. Checkpoint Risk Reduction.html |
160B |
9. Checkpoint Risk Strategies.html |
160B |
9. Checkpoint Software Applications.html |
160B |
9. Checkpoint Threat and Vulnerability Management.html |
160B |
9. Collecting and Validating Evidence (OBJ. 2.9).mp4 |
103.24MB |
9. Collecting and Validating Evidence (OBJ. 2.9).srt |
19.01KB |
9. Data Loss Detection (OBJ 1.4).mp4 |
247.50MB |
9. Data Loss Detection (OBJ 1.4).srt |
28.05KB |
9. Endpoint Protections (OBJ. 3.2).mp4 |
213.38MB |
9. Endpoint Protections (OBJ. 3.2).srt |
26.17KB |
9. Federation (OBJ 1.5).mp4 |
147.91MB |
9. Federation (OBJ 1.5).srt |
16.16KB |
9. IDS and IPS (OBJ 1.1).mp4 |
139.29MB |
9. IDS and IPS (OBJ 1.1).srt |
14.62KB |
9. Mobile Security (OBJ. 3.1).mp4 |
165.85MB |
9. Mobile Security (OBJ. 3.1).srt |
18.14KB |
9. Nmap (OBJ. 2.4).mp4 |
83.97MB |
9. Nmap (OBJ. 2.4).srt |
21.17KB |
9. Protecting Web Traffic (OBJ. 3.5).mp4 |
74.33MB |
9. Protecting Web Traffic (OBJ. 3.5).srt |
8.15KB |
9. Security Appliances (OBJ. 2.2).mp4 |
134.61MB |
9. Security Appliances (OBJ. 2.2).srt |
34.57KB |
9. Supply Chain (OBJ 4.2).mp4 |
130.89MB |
9. Supply Chain (OBJ 4.2).srt |
16.00KB |
9. Virtualization (OBJ 1.6).mp4 |
172.07MB |
9. Virtualization (OBJ 1.6).srt |
18.65KB |
9. Vulnerable Web Applications (OBJ. 2.5).mp4 |
253.91MB |
9. Vulnerable Web Applications (OBJ. 2.5).srt |
27.00KB |
9. Web Application Vulnerabilities (OBJ. 2.5).mp4 |
53.44MB |
9. Web Application Vulnerabilities (OBJ. 2.5).srt |
20.29KB |
9. Zero Trust (OBJ 1.1).mp4 |
144.80MB |
9. Zero Trust (OBJ 1.1).srt |
15.80KB |
90 |
1.30MB |
91 |
1.68MB |
92 |
415.94KB |
93 |
1.07MB |
94 |
1.39MB |
95 |
1.46MB |
96 |
1.63MB |
97 |
423.26KB |
98 |
1.31MB |
99 |
1.84MB |
TutsNode.com.txt |
63B |