|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
107B |
| 01_adding-users.en.srt |
5.43KB |
| 01_adding-users.en.txt |
3.21KB |
| 01_adding-users.mp4 |
7.94MB |
| 01_built-in-security-controls.en.srt |
9.13KB |
| 01_built-in-security-controls.en.txt |
5.55KB |
| 01_built-in-security-controls.mp4 |
40.21MB |
| 01_congratulations.en.srt |
1.86KB |
| 01_congratulations.en.txt |
1.17KB |
| 01_congratulations.mp4 |
9.17MB |
| 01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en srt |
8.04KB |
| 01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en txt |
4.89KB |
| 01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4 |
39.08MB |
| 01_enterprise-install-of-centos.en.srt |
4.92KB |
| 01_enterprise-install-of-centos.en.txt |
3.07KB |
| 01_enterprise-install-of-centos.mp4 |
8.52MB |
| 01_introduction.en.srt |
5.59KB |
| 01_introduction.en.srt |
4.27KB |
| 01_introduction.en.txt |
2.59KB |
| 01_introduction.en.txt |
3.38KB |
| 01_introduction.mp4 |
21.99MB |
| 01_introduction.mp4 |
17.40MB |
| 01_linux-in-the-enterprise.en.srt |
10.32KB |
| 01_linux-in-the-enterprise.en.txt |
6.32KB |
| 01_linux-in-the-enterprise.mp4 |
44.04MB |
| 01_policies-part-1-organizational-policies.en.srt |
9.46KB |
| 01_policies-part-1-organizational-policies.en.txt |
5.77KB |
| 01_policies-part-1-organizational-policies.mp4 |
40.36MB |
| 01_security-at-the-forefront.en.srt |
10.20KB |
| 01_security-at-the-forefront.en.txt |
6.24KB |
| 01_security-at-the-forefront.mp4 |
41.89MB |
| 01_selinux.en.srt |
9.01KB |
| 01_selinux.en.txt |
5.33KB |
| 01_selinux.mp4 |
37.71MB |
| 01_strategies-for-monitoring.en.srt |
8.48KB |
| 01_strategies-for-monitoring.en.txt |
5.03KB |
| 01_strategies-for-monitoring.mp4 |
37.50MB |
| 01_updating-systems-in-the-enterprise.en.srt |
7.98KB |
| 01_updating-systems-in-the-enterprise.en.txt |
4.91KB |
| 01_updating-systems-in-the-enterprise.mp4 |
35.57MB |
| 01_welcome.en.srt |
4.99KB |
| 01_welcome.en.txt |
3.04KB |
| 01_welcome.mp4 |
24.38MB |
| 01_what-is-authorization.en.srt |
7.71KB |
| 01_what-is-authorization.en.txt |
4.70KB |
| 01_what-is-authorization.mp4 |
39.49MB |
| 01_what-is-virtualization.en.srt |
7.34KB |
| 01_what-is-virtualization.en.txt |
4.53KB |
| 01_what-is-virtualization.mp4 |
37.90MB |
| 01_why-do-we-need-to-learn-networking.en.srt |
9.58KB |
| 01_why-do-we-need-to-learn-networking.en.txt |
5.82KB |
| 01_why-do-we-need-to-learn-networking.mp4 |
46.40MB |
| 01_why-information-security-in-the-first-place.en.srt |
7.55KB |
| 01_why-information-security-in-the-first-place.en.txt |
4.74KB |
| 01_why-information-security-in-the-first-place.mp4 |
31.83MB |
| 01_windows-logon-process.en.srt |
5.70KB |
| 01_windows-logon-process.en.txt |
3.65KB |
| 01_windows-logon-process.mp4 |
9.02MB |
| 02_about-linux-and-distributions.en.srt |
10.76KB |
| 02_about-linux-and-distributions.en.txt |
6.29KB |
| 02_about-linux-and-distributions.mp4 |
46.82MB |
| 02_attack-surfaces.en.srt |
9.27KB |
| 02_attack-surfaces.en.txt |
5.58KB |
| 02_attack-surfaces.mp4 |
41.88MB |
| 02_rights-and-permissions.en.srt |
7.16KB |
| 02_rights-and-permissions.en.txt |
4.34KB |
| 02_rights-and-permissions.mp4 |
11.03MB |
| 02_splunk.en.srt |
6.23KB |
| 02_splunk.en.txt |
3.78KB |
| 02_splunk.mp4 |
9.27MB |
| 02_types-of-virtualization.en.srt |
8.93KB |
| 02_types-of-virtualization.en.txt |
5.55KB |
| 02_types-of-virtualization.mp4 |
38.41MB |
| 02_what-is-personal-computing.en.srt |
6.79KB |
| 02_what-is-personal-computing.en.txt |
4.21KB |
| 02_what-is-personal-computing.mp4 |
28.98MB |
| 02_when-something-goes-wrong.en.srt |
8.49KB |
| 02_when-something-goes-wrong.en.txt |
4.94KB |
| 02_when-something-goes-wrong.mp4 |
37.64MB |
| 02_windows-in-the-enterprise.en.srt |
7.05KB |
| 02_windows-in-the-enterprise.en.txt |
4.20KB |
| 02_windows-in-the-enterprise.mp4 |
29.93MB |
| 03_access-control.en.srt |
6.04KB |
| 03_access-control.en.txt |
3.62KB |
| 03_access-control.mp4 |
10.07MB |
| 03_baselining-and-assessment.en.srt |
6.77KB |
| 03_baselining-and-assessment.en.txt |
4.26KB |
| 03_baselining-and-assessment.mp4 |
31.98MB |
| 03_integrity.en.srt |
7.40KB |
| 03_integrity.en.txt |
4.32KB |
| 03_integrity.mp4 |
29.52MB |
| 03_linux-security.en.srt |
13.32KB |
| 03_linux-security.en.txt |
8.06KB |
| 03_linux-security.mp4 |
61.12MB |
| 03_networking-in-linux.en.srt |
7.31KB |
| 03_networking-in-linux.en.txt |
4.33KB |
| 03_networking-in-linux.mp4 |
11.34MB |
| 03_policies-part-2-technical-policies.en.srt |
6.20KB |
| 03_policies-part-2-technical-policies.en.txt |
3.82KB |
| 03_policies-part-2-technical-policies.mp4 |
29.33MB |
| 03_restricting-access-to-software-and-resources.en.srt |
10.28KB |
| 03_restricting-access-to-software-and-resources.en.txt |
6.22KB |
| 03_restricting-access-to-software-and-resources.mp4 |
18.78MB |
| 03_securing-users.en.srt |
8.15KB |
| 03_securing-users.en.txt |
4.74KB |
| 03_securing-users.mp4 |
14.74MB |
| 03_what-is-a-secure-computer.en.srt |
5.22KB |
| 03_what-is-a-secure-computer.en.txt |
3.24KB |
| 03_what-is-a-secure-computer.mp4 |
22.06MB |
| 03_what-is-enterprise-computing.en.srt |
12.41KB |
| 03_what-is-enterprise-computing.en.txt |
7.46KB |
| 03_what-is-enterprise-computing.mp4 |
52.12MB |
| 03_when-to-use-and-not-use-virtualization.en.srt |
7.14KB |
| 03_when-to-use-and-not-use-virtualization.en.txt |
4.20KB |
| 03_when-to-use-and-not-use-virtualization.mp4 |
33.38MB |
| 03_windows-server-install.en.srt |
6.22KB |
| 03_windows-server-install.en.txt |
3.83KB |
| 03_windows-server-install.mp4 |
8.02MB |
| 04_about-the-instructor.en.srt |
10.78KB |
| 04_about-the-instructor.en.srt |
10.56KB |
| 04_about-the-instructor.en.srt |
10.56KB |
| 04_about-the-instructor.en.txt |
6.24KB |
| 04_about-the-instructor.en.txt |
6.23KB |
| 04_about-the-instructor.en.txt |
6.19KB |
| 04_about-the-instructor.mp4 |
155.29MB |
| 04_about-the-instructor.mp4 |
155.29MB |
| 04_about-the-instructor.mp4 |
155.29MB |
| 04_active-directory.en.srt |
16.42KB |
| 04_active-directory.en.txt |
9.65KB |
| 04_active-directory.mp4 |
24.28MB |
| 04_auditing.en.srt |
12.73KB |
| 04_auditing.en.txt |
7.54KB |
| 04_auditing.mp4 |
21.66MB |
| 04_introduction.en.srt |
5.73KB |
| 04_introduction.en.txt |
3.71KB |
| 04_introduction.mp4 |
25.73MB |
| 04_managing-users-on-an-enterprise-level.en.srt |
7.01KB |
| 04_managing-users-on-an-enterprise-level.en.txt |
4.10KB |
| 04_managing-users-on-an-enterprise-level.mp4 |
11.25MB |
| 04_risk-in-system-management.en.srt |
12.79KB |
| 04_risk-in-system-management.en.txt |
7.74KB |
| 04_risk-in-system-management.mp4 |
53.73MB |
| 04_software-firewalls-in-linux.en.srt |
8.98KB |
| 04_software-firewalls-in-linux.en.txt |
5.02KB |
| 04_software-firewalls-in-linux.mp4 |
16.77MB |
| 04_what-roles-are-there-in-system-management.en.srt |
6.35KB |
| 04_what-roles-are-there-in-system-management.en.txt |
3.90KB |
| 04_what-roles-are-there-in-system-management.mp4 |
27.84MB |
| 04_your-computer-vs-an-enterprise-system.en.srt |
7.92KB |
| 04_your-computer-vs-an-enterprise-system.en.txt |
5.11KB |
| 04_your-computer-vs-an-enterprise-system.mp4 |
33.83MB |
| 05_about-the-instructor.en.srt |
10.38KB |
| 05_about-the-instructor.en.txt |
6.18KB |
| 05_about-the-instructor.mp4 |
155.29MB |
| 05_access-control.en.srt |
8.97KB |
| 05_access-control.en.txt |
5.35KB |
| 05_access-control.mp4 |
13.61MB |
| 05_confidentiality-integrity-and-availability.en.srt |
9.70KB |
| 05_confidentiality-integrity-and-availability.en.txt |
5.91KB |
| 05_confidentiality-integrity-and-availability.mp4 |
46.50MB |
| 05_group-policy.en.srt |
8.30KB |
| 05_group-policy.en.txt |
4.99KB |
| 05_group-policy.mp4 |
12.19MB |
| 05_networking-in-windows.en.srt |
10.75KB |
| 05_networking-in-windows.en.txt |
6.52KB |
| 05_networking-in-windows.mp4 |
15.06MB |
| 05_osi-model.en.srt |
8.60KB |
| 05_osi-model.en.txt |
5.22KB |
| 05_osi-model.mp4 |
36.71MB |
| 05_security-considerations-for-windows-systems.en.srt |
8.96KB |
| 05_security-considerations-for-windows-systems.en.txt |
5.37KB |
| 05_security-considerations-for-windows-systems.mp4 |
38.92MB |
| 05_separation-of-duties.en.srt |
8.24KB |
| 05_separation-of-duties.en.txt |
5.06KB |
| 05_separation-of-duties.mp4 |
36.81MB |
| 05_services-within-linux.en.srt |
10.74KB |
| 05_services-within-linux.en.txt |
6.03KB |
| 05_services-within-linux.mp4 |
16.18MB |
| 05_sudo.en.srt |
6.87KB |
| 05_sudo.en.txt |
4.06KB |
| 05_sudo.mp4 |
13.44MB |
| 05_what-is-going-to-prepare-me-for-practical-system-management.en.srt |
8.07KB |
| 05_what-is-going-to-prepare-me-for-practical-system-management.en.txt |
4.96KB |
| 05_what-is-going-to-prepare-me-for-practical-system-management.mp4 |
35.36MB |
| 06_planning-for-disaster.en.srt |
10.08KB |
| 06_planning-for-disaster.en.txt |
5.81KB |
| 06_planning-for-disaster.mp4 |
41.18MB |
| 06_ssh.en.srt |
12.87KB |
| 06_ssh.en.txt |
7.37KB |
| 06_ssh.mp4 |
24.59MB |
| 06_windows-and-encryption.en.srt |
6.36KB |
| 06_windows-and-encryption.en.txt |
3.92KB |
| 06_windows-and-encryption.mp4 |
9.65MB |
| 06_working-with-other-systems.en.srt |
10.17KB |
| 06_working-with-other-systems.en.txt |
6.08KB |
| 06_working-with-other-systems.mp4 |
44.73MB |
| 07_if-you-build-it-they-will-get-around-it.en.srt |
10.41KB |
| 07_if-you-build-it-they-will-get-around-it.en.txt |
6.11KB |
| 07_if-you-build-it-they-will-get-around-it.mp4 |
41.96MB |
| 07_syslog.en.srt |
12.30KB |
| 07_syslog.en.txt |
7.45KB |
| 07_syslog.mp4 |
21.09MB |
| 08_cron.en.srt |
5.50KB |
| 08_cron.en.txt |
3.35KB |
| 08_cron.mp4 |
7.21MB |
| 1 |
579B |
| 10 |
272.71KB |
| 11 |
469.35KB |
| 12 |
44.67KB |
| 13 |
108.80KB |
| 14 |
118.92KB |
| 15 |
328.77KB |
| 16 |
139.19KB |
| 17 |
292.18KB |
| 18 |
8.84KB |
| 19 |
432.74KB |
| 2 |
28B |
| 20 |
77.06KB |
| 21 |
90.57KB |
| 22 |
99.49KB |
| 23 |
297.23KB |
| 24 |
371.49KB |
| 25 |
1.26KB |
| 26 |
193.60KB |
| 27 |
294.92KB |
| 28 |
435.85KB |
| 29 |
143.91KB |
| 3 |
545B |
| 30 |
173.74KB |
| 31 |
119.31KB |
| 32 |
16.17KB |
| 33 |
169.57KB |
| 34 |
72.40KB |
| 35 |
486.96KB |
| 36 |
177.10KB |
| 37 |
21.89KB |
| 38 |
163.18KB |
| 39 |
277.33KB |
| 4 |
344.16KB |
| 40 |
418.61KB |
| 41 |
125.18KB |
| 42 |
224.44KB |
| 43 |
450.45KB |
| 44 |
12.52KB |
| 45 |
346.06KB |
| 46 |
418.33KB |
| 47 |
228.22KB |
| 48 |
104.27KB |
| 49 |
233.10KB |
| 5 |
277.58KB |
| 50 |
332.38KB |
| 51 |
451.94KB |
| 52 |
263.15KB |
| 53 |
404.47KB |
| 54 |
57.76KB |
| 55 |
314.97KB |
| 56 |
162.53KB |
| 57 |
252.30KB |
| 58 |
479.28KB |
| 59 |
439.97KB |
| 6 |
390.99KB |
| 60 |
356.67KB |
| 61 |
236.22KB |
| 62 |
336.88KB |
| 63 |
487.86KB |
| 64 |
495.29KB |
| 65 |
487.09KB |
| 66 |
59.57KB |
| 7 |
182.96KB |
| 8 |
507.34KB |
| 9 |
100.47KB |
| TutsNode.net.txt |
63B |