Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
2B |
01_3rd-party-breach-overview.en.srt |
10.13KB |
01_3rd-party-breach-overview.en.txt |
6.51KB |
01_3rd-party-breach-overview.mp4 |
16.33MB |
01_3rd-party-breach-quest-diagnostics.en.srt |
13.49KB |
01_3rd-party-breach-quest-diagnostics.en.txt |
7.13KB |
01_3rd-party-breach-quest-diagnostics.mp4 |
13.02MB |
01_ai-and-siem.en.srt |
7.75KB |
01_ai-and-siem.en.txt |
4.20KB |
01_ai-and-siem.mp4 |
7.76MB |
01_application-security-defects-writing-secure-code.en.srt |
19.27KB |
01_application-security-defects-writing-secure-code.en.txt |
10.15KB |
01_application-security-defects-writing-secure-code.mp4 |
20.01MB |
01_application-security-overview.en.srt |
14.17KB |
01_application-security-overview.en.txt |
7.44KB |
01_application-security-overview.mp4 |
14.32MB |
01_characteristics-of-a-security-architecture.en.srt |
12.13KB |
01_characteristics-of-a-security-architecture.en.txt |
6.46KB |
01_characteristics-of-a-security-architecture.mp4 |
13.08MB |
01_data-collection-examination.en.srt |
10.19KB |
01_data-collection-examination.en.txt |
5.45KB |
01_data-collection-examination.mp4 |
23.80MB |
01_data-files.en.srt |
16.47KB |
01_data-files.en.txt |
8.61KB |
01_data-files.mp4 |
41.02MB |
01_devsecops-overview.en.srt |
11.19KB |
01_devsecops-overview.en.txt |
7.16KB |
01_devsecops-overview.mp4 |
12.62MB |
01 fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting en srt |
17.75KB |
01 fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting en txt |
9.24KB |
01_fight-and-mitigate-upcoming-future-attacks-with-cyber-threat-hunting.mp4 |
17.72MB |
01_ibm-x-force-iris-cyberattack-framework.en.srt |
20.03KB |
01_ibm-x-force-iris-cyberattack-framework.en.txt |
10.64KB |
01_ibm-x-force-iris-cyberattack-framework.mp4 |
18.85MB |
01_incident-response-demo-part-1.en.srt |
12.11KB |
01_incident-response-demo-part-1.en.txt |
6.47KB |
01_incident-response-demo-part-1.mp4 |
10.05MB |
01_incident-response-overview.en.srt |
890B |
01_incident-response-overview.en.txt |
560B |
01_incident-response-overview.mp4 |
2.38MB |
01_incident-response-preparation.en.srt |
12.00KB |
01_incident-response-preparation.en.txt |
6.27KB |
01_incident-response-preparation.mp4 |
30.29MB |
01_introduction-to-penetration-testing.en.srt |
823B |
01_introduction-to-penetration-testing.en.txt |
527B |
01_introduction-to-penetration-testing.mp4 |
1.89MB |
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.srt |
6.01KB |
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.en.txt |
3.87KB |
01_introduction-to-the-peer-to-peer-applied-project-data-breaches.mp4 |
6.13MB |
01_mobile-endpoint-protection.en.srt |
19.65KB |
01_mobile-endpoint-protection.en.txt |
12.64KB |
01_mobile-endpoint-protection.mp4 |
18.24MB |
01_module-overview.en.srt |
720B |
01_module-overview.en.srt |
428B |
01_module-overview.en.txt |
390B |
01_module-overview.en.txt |
264B |
01_module-overview.mp4 |
1.80MB |
01_module-overview.mp4 |
860.01KB |
01_network-protocol-analyzers-overview.en.srt |
7.42KB |
01_network-protocol-analyzers-overview.en.txt |
3.94KB |
01_network-protocol-analyzers-overview.mp4 |
11.40MB |
01_nist-incident-response-lifecycle-teams.en.srt |
15.85KB |
01_nist-incident-response-lifecycle-teams.en.txt |
8.37KB |
01_nist-incident-response-lifecycle-teams.mp4 |
12.51MB |
01_penetration-testing-planning.en.srt |
4.09KB |
01_penetration-testing-planning.en.txt |
2.21KB |
01_penetration-testing-planning.mp4 |
13.79MB |
01_phishing-case-study-google-facebook.en.srt |
13.71KB |
01_phishing-case-study-google-facebook.en.txt |
7.29KB |
01_phishing-case-study-google-facebook.mp4 |
12.85MB |
01_phishing-scams-overview.en.srt |
14.04KB |
01_phishing-scams-overview.en.txt |
7.34KB |
01_phishing-scams-overview.mp4 |
17.60MB |
01_point-of-sale-breach-overview.en.srt |
9.59KB |
01_point-of-sale-breach-overview.en.txt |
5.93KB |
01_point-of-sale-breach-overview.mp4 |
14.15MB |
01_port-scanning.en.srt |
9.38KB |
01_port-scanning.en.txt |
4.94KB |
01_port-scanning.mp4 |
14.43MB |
01_pos-case-study-home-depot.en.srt |
13.00KB |
01_pos-case-study-home-depot.en.txt |
8.42KB |
01_pos-case-study-home-depot.mp4 |
14.83MB |
01_python-basics.en.srt |
10.80KB |
01_python-basics.en.txt |
5.71KB |
01_python-basics.mp4 |
8.74MB |
01_qradar-siem-an-industry-example.en.srt |
7.65KB |
01_qradar-siem-an-industry-example.en.txt |
4.94KB |
01_qradar-siem-an-industry-example.mp4 |
9.75MB |
01_ransomware-case-study-city-of-atlanta.en.srt |
12.81KB |
01_ransomware-case-study-city-of-atlanta.en.txt |
8.31KB |
01_ransomware-case-study-city-of-atlanta.mp4 |
15.94MB |
01_ransomware-overview.en.srt |
8.06KB |
01_ransomware-overview.en.txt |
5.18KB |
01_ransomware-overview.mp4 |
11.03MB |
01_siem-concepts-and-benefits.en.srt |
21.44KB |
01_siem-concepts-and-benefits.en.txt |
11.26KB |
01_siem-concepts-and-benefits.mp4 |
20.03MB |
01_target-attack-timeline.en.srt |
19.55KB |
01_target-attack-timeline.en.txt |
10.29KB |
01_target-attack-timeline.mp4 |
17.43MB |
01_threat-intelligence-frameworks.en.srt |
15.64KB |
01_threat-intelligence-frameworks.en.txt |
8.23KB |
01_threat-intelligence-frameworks.mp4 |
14.24MB |
01_threat-intelligence-overview.en.srt |
9.53KB |
01_threat-intelligence-overview.en.txt |
6.08KB |
01_threat-intelligence-overview.mp4 |
12.72MB |
01_tools.en.srt |
6.21KB |
01_tools.en.txt |
3.76KB |
01_tools.mp4 |
7.45MB |
01_vulnerability-assessment-tools.en.srt |
16.31KB |
01_vulnerability-assessment-tools.en.txt |
10.37KB |
01_vulnerability-assessment-tools.mp4 |
26.13MB |
01_what-is-data-security-and-protection.en.srt |
15.82KB |
01_what-is-data-security-and-protection.en.txt |
8.51KB |
01_what-is-data-security-and-protection.mp4 |
14.81MB |
02_3rd-party-breach-impacts.en.srt |
8.60KB |
02_3rd-party-breach-impacts.en.txt |
4.54KB |
02_3rd-party-breach-impacts.mp4 |
10.35MB |
02_ai-and-siem-an-industry-example.en.srt |
5.29KB |
02_ai-and-siem-an-industry-example.en.txt |
2.88KB |
02_ai-and-siem-an-industry-example.mp4 |
5.51MB |
02_cross-site-scripting-common-attacks.en.srt |
13.88KB |
02_cross-site-scripting-common-attacks.en.txt |
7.32KB |
02_cross-site-scripting-common-attacks.mp4 |
12.68MB |
02_data-security-top-challenges.en.srt |
13.08KB |
02_data-security-top-challenges.en.txt |
8.33KB |
02_data-security-top-challenges.mp4 |
11.80MB |
02_devsecops-deployment.en.srt |
6.55KB |
02_devsecops-deployment.en.txt |
3.53KB |
02_devsecops-deployment.mp4 |
6.14MB |
02_high-level-architectural-models.en.srt |
11.35KB |
02_high-level-architectural-models.en.txt |
6.09KB |
02_high-level-architectural-models.mp4 |
12.92MB |
02_history-of-scripting.en.srt |
8.48KB |
02_history-of-scripting.en.txt |
4.45KB |
02_history-of-scripting.mp4 |
10.73MB |
02_incident-response-demo-part-2.en.srt |
13.33KB |
02_incident-response-demo-part-2.en.txt |
8.27KB |
02_incident-response-demo-part-2.mp4 |
28.14MB |
02_nist-incident-response-lifecycle.en.srt |
13.59KB |
02_nist-incident-response-lifecycle.en.txt |
8.60KB |
02_nist-incident-response-lifecycle.mp4 |
12.45MB |
02_pos-malware.en.srt |
8.69KB |
02_pos-malware.en.txt |
4.66KB |
02_pos-malware.mp4 |
12.04MB |
02_python-getting-started.en.srt |
12.22KB |
02_python-getting-started.en.txt |
6.38KB |
02_python-getting-started.mp4 |
11.59MB |
02_security-intelligence.en.srt |
8.73KB |
02_security-intelligence.en.txt |
4.71KB |
02_security-intelligence.mp4 |
8.32MB |
02_siem-deployment.en.srt |
16.31KB |
02_siem-deployment.en.txt |
8.59KB |
02_siem-deployment.mp4 |
14.81MB |
02_soc-cyber-threat-hunting.en.srt |
17.44KB |
02_soc-cyber-threat-hunting.en.txt |
11.09KB |
02_soc-cyber-threat-hunting.mp4 |
17.52MB |
02_target-attack-vulnerabilities.en.srt |
4.83KB |
02_target-attack-vulnerabilities.en.txt |
3.18KB |
02_target-attack-vulnerabilities.mp4 |
6.56MB |
02_threat-intelligence-strategy-and-external-sources.en.srt |
9.61KB |
02_threat-intelligence-strategy-and-external-sources.en.txt |
6.20KB |
02_threat-intelligence-strategy-and-external-sources.mp4 |
11.92MB |
02_user-behavior-analytics.en.srt |
18.42KB |
02_user-behavior-analytics.en.txt |
9.67KB |
02_user-behavior-analytics.mp4 |
17.21MB |
02_what-are-forensics.en.srt |
10.07KB |
02_what-are-forensics.en.txt |
6.42KB |
02_what-are-forensics.mp4 |
24.39MB |
02_what-is-a-breach.en.srt |
8.93KB |
02_what-is-a-breach.en.txt |
4.73KB |
02_what-is-a-breach.mp4 |
6.91MB |
02_what-is-incident-response.en.srt |
16.73KB |
02_what-is-incident-response.en.txt |
8.84KB |
02_what-is-incident-response.mp4 |
33.23MB |
02_what-is-penetration-testing.en.srt |
11.51KB |
02_what-is-penetration-testing.en.txt |
6.19KB |
02_what-is-penetration-testing.mp4 |
124.00MB |
03_analysis-reporting.en.srt |
9.49KB |
03_analysis-reporting.en.txt |
6.04KB |
03_analysis-reporting.mp4 |
27.56MB |
03_application-security-threats-and-attacks.en.srt |
13.26KB |
03_application-security-threats-and-attacks.en.txt |
7.08KB |
03_application-security-threats-and-attacks.mp4 |
14.08MB |
03_cross-site-scripting-effective-defenses.en.srt |
18.86KB |
03_cross-site-scripting-effective-defenses.en.txt |
9.74KB |
03_cross-site-scripting-effective-defenses.mp4 |
17.28MB |
03_cyber-threat-hunting-an-industry-example.en.srt |
11.45KB |
03_cyber-threat-hunting-an-industry-example.en.txt |
7.35KB |
03_cyber-threat-hunting-an-industry-example.mp4 |
13.17MB |
03_data-security-common-pitfalls.en.srt |
13.05KB |
03_data-security-common-pitfalls.en.txt |
8.31KB |
03_data-security-common-pitfalls.mp4 |
13.17MB |
03_data-structures.en.srt |
6.78KB |
03_data-structures.en.txt |
3.57KB |
03_data-structures.mp4 |
6.88MB |
03_examples-of-ransomware.en.srt |
9.61KB |
03_examples-of-ransomware.en.txt |
5.14KB |
03_examples-of-ransomware.mp4 |
13.19MB |
03_incident-response-demo-part-3.en.srt |
9.68KB |
03_incident-response-demo-part-3.en.txt |
5.10KB |
03_incident-response-demo-part-3.mp4 |
14.69MB |
03_incident-response-detection-analysis.en.srt |
18.56KB |
03_incident-response-detection-analysis.en.txt |
9.92KB |
03_incident-response-detection-analysis.mp4 |
161.01MB |
03_operating-system-data.en.srt |
17.20KB |
03_operating-system-data.en.txt |
9.00KB |
03_operating-system-data.mp4 |
34.05MB |
03_penetration-testing-discovery.en.srt |
6.60KB |
03_penetration-testing-discovery.en.txt |
3.52KB |
03_penetration-testing-discovery.mp4 |
11.40MB |
03_phishing-email-study.en.srt |
9.07KB |
03_phishing-email-study.en.txt |
4.91KB |
03_phishing-email-study.mp4 |
11.57MB |
03_scripting-concepts.en.srt |
7.36KB |
03_scripting-concepts.en.txt |
4.25KB |
03_scripting-concepts.mp4 |
13.32MB |
03_siem-solutions-vendors.en.srt |
16.09KB |
03_siem-solutions-vendors.en.txt |
10.25KB |
03_siem-solutions-vendors.mp4 |
19.27MB |
03_solutions-architecture.en.srt |
7.99KB |
03_solutions-architecture.en.txt |
5.04KB |
03_solutions-architecture.mp4 |
11.01MB |
03_threat-intelligence-platforms.en.srt |
14.04KB |
03_threat-intelligence-platforms.en.txt |
8.95KB |
03_threat-intelligence-platforms.mp4 |
14.54MB |
03_watering-hole-attack.en.srt |
11.37KB |
03_watering-hole-attack.en.txt |
7.21KB |
03_watering-hole-attack.mp4 |
13.35MB |
04_application-data.en.srt |
16.25KB |
04_application-data.en.txt |
8.60KB |
04_application-data.mp4 |
12.05MB |
04_application-security-standards-and-regulations.en.srt |
12.12KB |
04_application-security-standards-and-regulations.en.txt |
7.89KB |
04_application-security-standards-and-regulations.mp4 |
12.84MB |
04_containment-eradication-recovery.en.srt |
9.51KB |
04_containment-eradication-recovery.en.txt |
6.13KB |
04_containment-eradication-recovery.mp4 |
27.81MB |
04_functions-and-methods.en.srt |
2.82KB |
04_functions-and-methods.en.txt |
1.77KB |
04_functions-and-methods.mp4 |
3.53MB |
04_industry-specific-data-security-challenges.en.srt |
13.42KB |
04_industry-specific-data-security-challenges.en.txt |
7.03KB |
04_industry-specific-data-security-challenges.mp4 |
13.25MB |
04_scripting-languages.en.srt |
9.37KB |
04_scripting-languages.en.txt |
4.97KB |
04_scripting-languages.mp4 |
17.38MB |
04_security-patterns.en.srt |
4.73KB |
04_security-patterns.en.txt |
2.55KB |
04_security-patterns.mp4 |
5.65MB |
05_capabilities-of-data-protection.en.srt |
13.51KB |
05_capabilities-of-data-protection.en.txt |
7.12KB |
05_capabilities-of-data-protection.mp4 |
12.59MB |
05_impact-of-phishing.en.srt |
7.84KB |
05_impact-of-phishing.en.txt |
4.12KB |
05_impact-of-phishing.mp4 |
10.90MB |
05_network-data.en.srt |
19.33KB |
05_network-data.en.txt |
10.28KB |
05_network-data.mp4 |
21.88MB |
05_penetration-testing-additional-discovery-details.en.srt |
4.32KB |
05_penetration-testing-additional-discovery-details.en.txt |
2.57KB |
05_penetration-testing-additional-discovery-details.mp4 |
10.61MB |
05_python-libraries.en.srt |
3.11KB |
05_python-libraries.en.txt |
1.62KB |
05_python-libraries.mp4 |
3.33MB |
06_critical-data-protection-capabilities.en.srt |
15.32KB |
06_critical-data-protection-capabilities.en.txt |
8.07KB |
06_critical-data-protection-capabilities.mp4 |
14.43MB |
06_post-incident-activities.en.srt |
7.14KB |
06_post-incident-activities.en.txt |
3.79KB |
06_post-incident-activities.mp4 |
12.00MB |
07_data-protection-industry-example.en.srt |
13.63KB |
07_data-protection-industry-example.en.txt |
7.07KB |
07_data-protection-industry-example.mp4 |
15.64MB |
08_penetration-testing-attack.en.srt |
9.25KB |
08_penetration-testing-attack.en.txt |
5.76KB |
08_penetration-testing-attack.mp4 |
19.77MB |
09_penetration-testing-reporting.en.srt |
9.30KB |
09_penetration-testing-reporting.en.txt |
4.96KB |
09_penetration-testing-reporting.mp4 |
14.43MB |
1 |
24B |
10 |
108.88KB |
11 |
208.16KB |
12 |
119.39KB |
13 |
478.30KB |
14 |
500.48KB |
15 |
233.64KB |
16 |
235.83KB |
17 |
157.16KB |
18 |
263.70KB |
19 |
291.65KB |
2 |
100B |
20 |
407.78KB |
21 |
493.46KB |
22 |
67.50KB |
23 |
120.73KB |
24 |
228.26KB |
25 |
296.92KB |
26 |
170.63KB |
27 |
56.60KB |
28 |
373.45KB |
29 |
169.76KB |
3 |
51B |
30 |
194.06KB |
31 |
196.02KB |
32 |
317.55KB |
33 |
474.90KB |
34 |
69.46KB |
35 |
69.83KB |
36 |
75.33KB |
37 |
189.28KB |
38 |
262.47KB |
39 |
353.98KB |
4 |
92.14KB |
40 |
433.59KB |
41 |
219.88KB |
42 |
151.94KB |
43 |
179.38KB |
44 |
257.01KB |
45 |
318.68KB |
46 |
337.30KB |
47 |
340.43KB |
48 |
428.64KB |
49 |
493.79KB |
5 |
219.17KB |
50 |
82.41KB |
51 |
151.90KB |
52 |
167.22KB |
53 |
282.55KB |
54 |
323.18KB |
55 |
386.64KB |
56 |
418.86KB |
57 |
502.29KB |
58 |
47.35KB |
59 |
460.11KB |
6 |
373.30KB |
60 |
474.83KB |
61 |
508.45KB |
62 |
80.27KB |
63 |
202.56KB |
64 |
416.44KB |
65 |
437.21KB |
66 |
104.49KB |
67 |
105.41KB |
68 |
480.13KB |
69 |
503.76KB |
7 |
196.56KB |
70 |
106.88KB |
71 |
278.19KB |
72 |
395.08KB |
73 |
152.18KB |
74 |
460.24KB |
75 |
257.14KB |
76 |
266.51KB |
77 |
182.18KB |
78 |
245.68KB |
79 |
53.56KB |
8 |
445.58KB |
80 |
93.49KB |
81 |
119.21KB |
82 |
450.97KB |
83 |
371.21KB |
84 |
381.56KB |
85 |
358.45KB |
86 |
499.63KB |
87 |
480.92KB |
88 |
175.04KB |
89 |
125.06KB |
9 |
379.67KB |
90 |
112.52KB |
91 |
206.82KB |
TutsNode.net.txt |
63B |