Torrent Info
Title [FreeCoursesOnline.Me] O`REILLY - GIAC Security Essentials (GSEC)
Category
Size 2.89GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[0] GIAC Security Essentials (GSEC)_ Introduction.mp4 9.40MB
[1] Module introduction.mp4 4.74MB
[10] 2.2 Categories and Types of Controls.mp4 25.76MB
[100] 20.3 Windows-as-a-Service.mp4 21.85MB
[101] Learning objectives.mp4 2.42MB
[102] 21.1 NTFS and Shared Folder Permissions.mp4 15.18MB
[103] 21.2 Registry Keys and REGEDIT.EXE.mp4 12.35MB
[104] 21.3 Windows Privileges.mp4 18.72MB
[105] 21.4 Overview of BitLocker Drive Encryption.mp4 18.49MB
[106] Learning objectives.mp4 2.43MB
[107] 22.1 Security Templates and SCA Snap-in.mp4 16.92MB
[108] 22.2 Understanding Group Policy Objects.mp4 13.43MB
[109] 22.3 Administrative Users, AppLocker, and User Account Control.mp4 15.09MB
[11] 2.3 Understanding the Enterprise Architecture.mp4 5.92MB
[110] Learning objectives.mp4 2.40MB
[111] 23.1 Azure and High Availability.mp4 29.46MB
[112] 23.2 Configuring Azure VM Attributes.mp4 25.28MB
[113] 23.3 Microsoft Azure Active Directory (MAAD).mp4 35.36MB
[114] Learning objectives.mp4 2.03MB
[115] 24.1 Windows PowerShell.mp4 46.91MB
[116] 24.2 Administrative Tools and Utilities.mp4 47.06MB
[117] 24.3 Windows Auditing and Forensics.mp4 25.54MB
[118] Module introduction.mp4 3.10MB
[119] Learning objectives.mp4 2.74MB
[12] 2.4 Introduction to Threat Enumeration.mp4 11.10MB
[120] 25.1 Comparing Linux Operating Systems.mp4 28.13MB
[121] 25.2 Mobile Device Security.mp4 12.54MB
[122] 25.3 Linux Shells and Kernels.mp4 18.85MB
[123] 25.4 Linux Permissions.mp4 29.35MB
[124] 25.5 Linux User Accounts.mp4 26.20MB
[125] Learning objectives.mp4 2.51MB
[126] 26.1 Starting Services at Boot Time.mp4 32.87MB
[127] 26.2 Configuration Management Tools.mp4 17.73MB
[128] 26.3 Linux Kernel Security.mp4 28.08MB
[129] 26.4 Linux System Enhancers.mp4 22.55MB
[13] Learning objectives.mp4 1.90MB
[130] Learning objectives.mp4 2.31MB
[131] 27.1 Configuring and Monitoring Logs.mp4 23.45MB
[132] 27.2 Leveraging the Auditd tool.mp4 14.11MB
[133] 27.3 Linux Security Utilities.mp4 20.28MB
[134] GIAC Security Essentials (GSEC)_ Summary.mp4 6.69MB
[14] 3.1 Access Control Concepts.mp4 85.30MB
[15] 3.2 Password Management.mp4 33.58MB
[16] 3.3 Introduction to Password Cracking.mp4 40.48MB
[17] Learning objectives.mp4 3.69MB
[18] 4.1 Network Topologies and Zones.mp4 29.49MB
[19] 4.2 Overview of Network Devices and Hardening.mp4 60.00MB
[2] Learning objectives.mp4 3.04MB
[20] 4.3 Survey of Security Devices and Wireshark.mp4 60.20MB
[21] 4.4 Configuring Firewalls at Amazon Web Services.mp4 33.17MB
[22] 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 30.05MB
[23] 4.6 Examining a Classic IPS Sensor Device.mp4 25.42MB
[24] Learning objectives.mp4 2.09MB
[25] 5.1 Introducing the Center for Internet Security (CIS).mp4 19.82MB
[26] 5.2 Overview of CIS Controls.mp4 28.25MB
[27] 5.3 Samples and Case Studies.mp4 25.99MB
[28] Learning objectives.mp4 2.61MB
[29] 6.1 The Evolution of IEEE 802.11 Security.mp4 62.46MB
[3] 1.1 Network Protocols and Reference Models.mp4 30.47MB
[30] 6.2 WPA3 Security.mp4 13.92MB
[31] 6.3 PAN, NFC, and 5G Concepts.mp4 15.25MB
[32] 6.4 The Internet of Things (IoT).mp4 19.99MB
[33] Module introduction.mp4 3.35MB
[34] Learning objectives.mp4 2.08MB
[35] 7.1 Common Attack Types.mp4 71.66MB
[36] 7.2 CryptoMalware.mp4 33.11MB
[37] 7.3 Defensive Strategies.mp4 25.00MB
[38] Learning objectives.mp4 2.26MB
[39] 8.1 Defense in Depth Overview and Strategies.mp4 21.20MB
[4] 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 53.97MB
[40] 8.2 Core Security Strategies.mp4 6.47MB
[41] 8.3 Defensible Network Architectures.mp4 14.66MB
[42] Learning objectives.mp4 1.89MB
[43] 9.1 Overview of Active Defense.mp4 19.11MB
[44] 9.2 Active Defense Techniques.mp4 18.64MB
[45] 9.3 Active Defense Tools.mp4 37.00MB
[46] Learning objectives.mp4 2.61MB
[47] 10.1 Overview of Endpoint Security.mp4 24.00MB
[48] 10.2 Host-based Intrusion Detection.mp4 11.92MB
[49] 10.3 Host-based Intrusion Prevention.mp4 14.01MB
[5] 1.3 Layer 4 Protocols.mp4 54.60MB
[50] 10.4 Next-generation Endpoint Security Solutions.mp4 15.73MB
[51] Module introduction.mp4 2.59MB
[52] Learning objectives.mp4 2.15MB
[53] 11.1 Overview of Logging.mp4 30.21MB
[54] 11.2 Logging System Setup and Configuration.mp4 15.64MB
[55] 11.3 Logging Analysis Fundamentals.mp4 18.75MB
[56] 11.4 Core SIEM Activities.mp4 21.72MB
[57] Learning objectives.mp4 2.62MB
[58] 12.1 Overview of Vulnerability Management.mp4 36.43MB
[59] 12.2 Network Scanning.mp4 42.15MB
[6] 1.4 Setting up a Lab Environment.mp4 40.83MB
[60] 12.3 Using Xenmap and Yersinia.mp4 34.73MB
[61] 12.4 Penetration Testing.mp4 55.43MB
[62] Learning objectives.mp4 3.05MB
[63] 13.1 Overview of Virtualization and VM Security.mp4 27.20MB
[64] 13.2 Cloud Models and Value Proposition.mp4 75.61MB
[65] 13.3 Common Attacks Against Cloud Services.mp4 32.86MB
[66] 13.4 Introduction to Microsoft Azure IAM.mp4 46.62MB
[67] Module introduction.mp4 4.67MB
[68] Learning objectives.mp4 2.53MB
[69] 14.1 Overview of Cryptology and Cryptosystems.mp4 27.34MB
[7] 1.5 Using tcpdump and Wireshark.mp4 26.93MB
[70] 14.2 Cryptographic Hashing.mp4 27.03MB
[71] 14.3 Symmetric Key Cryptography.mp4 18.38MB
[72] 14.4 Asymmetric Key Cryptography.mp4 11.18MB
[73] Learning objectives.mp4 2.19MB
[74] 15.1 Digital Signatures.mp4 14.25MB
[75] 15.2 IPsec.mp4 44.97MB
[76] 15.3 SSLTLS.mp4 15.68MB
[77] 15.4 Public Key Infrastructure.mp4 45.27MB
[78] Learning objectives.mp4 2.80MB
[79] 16.1 The Importance of Written Security Policies.mp4 18.45MB
[8] Learning objectives.mp4 2.58MB
[80] 16.2 Standards, Guidelines, and Procedures.mp4 16.83MB
[81] 16.3 Acceptable Use Policies.mp4 9.04MB
[82] 16.4 Survey of Sample Policies.mp4 46.05MB
[83] Learning objectives.mp4 2.16MB
[84] 17.1 Overview of Risk Management.mp4 32.20MB
[85] 17.2 Risk Management Best Practices.mp4 32.38MB
[86] 17.3 Threat Assessment, Analysis, and Reporting.mp4 55.71MB
[87] Learning objectives.mp4 2.32MB
[88] 18.1 Fundamentals of Incident Handling.mp4 14.97MB
[89] 18.2 Six Step Incident Response Process.mp4 32.36MB
[9] 2.1 CIA Triad and Parkerian Hexad.mp4 10.78MB
[90] 18.3 Conducting a Forensic Investigation.mp4 39.72MB
[91] Learning objectives.mp4 2.41MB
[92] 19.1 Business Continuity Planning (BCP).mp4 27.85MB
[93] 19.2 Business Impact Analysis (BIA).mp4 10.94MB
[94] 19.3 Backups and Restoration.mp4 21.73MB
[95] 19.4 Disaster Recovery Planning (DRP).mp4 39.99MB
[96] Module introduction.mp4 3.09MB
[97] Learning objectives.mp4 2.24MB
[98] 20.1 Operating Systems and Services.mp4 13.92MB
[99] 20.2 Windows Workgroups vs. Domains.mp4 26.82MB
0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377B
1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286B
3. FTUApps.com Download Cracked Developers Applications For Free.url 239B
For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url 1.82KB
How you can help our Group!.txt 204B
Distribution statistics by country
United Kingdom (GB) 2
China (CN) 2
France (FR) 1
Italy (IT) 1
Poland (PL) 1
Cameroon (CM) 1
New Zealand (NZ) 1
Hashemite Kingdom of Jordan (JO) 1
Germany (DE) 1
Total 11
IP List List of IP addresses which were distributed this torrent