|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
169B |
| 01. Module Intro.mp4 |
874.88KB |
| 01. Module Intro.mp4 |
3.56MB |
| 01. Module Intro.mp4 |
3.08MB |
| 01. Module Intro.mp4 |
1.93MB |
| 01. Module Intro.mp4 |
1.76MB |
| 01. Module Intro.mp4 |
1.58MB |
| 01. Module Intro.mp4 |
1.43MB |
| 01. Module Intro.mp4 |
1.38MB |
| 01. Module Intro.mp4 |
1.37MB |
| 01. Module Intro.mp4 |
1.35MB |
| 01. Module Intro.mp4 |
1.30MB |
| 01. Module Intro.mp4 |
1.29MB |
| 01. Module Intro.mp4 |
1.26MB |
| 01. Module Intro.mp4 |
1.15MB |
| 01. Module Intro.vtt |
2.95KB |
| 01. Module Intro.vtt |
1.38KB |
| 01. Module Intro.vtt |
1.71KB |
| 01. Module Intro.vtt |
1.39KB |
| 01. Module Intro.vtt |
2.25KB |
| 01. Module Intro.vtt |
1.32KB |
| 01. Module Intro.vtt |
1.25KB |
| 01. Module Intro.vtt |
4.21KB |
| 01. Module Intro.vtt |
2.21KB |
| 01. Module Intro.vtt |
1.07KB |
| 01. Module Intro.vtt |
1.65KB |
| 01. Module Intro.vtt |
1.45KB |
| 01. Module Intro.vtt |
1.45KB |
| 01. Module Intro.vtt |
1.31KB |
| 01. Module Overview.mp4 |
972.08KB |
| 01. Module Overview.mp4 |
3.01MB |
| 01. Module Overview.mp4 |
1.72MB |
| 01. Module Overview.mp4 |
1.51MB |
| 01. Module Overview.mp4 |
1.39MB |
| 01. Module Overview.mp4 |
1.39MB |
| 01. Module Overview.mp4 |
1.38MB |
| 01. Module Overview.mp4 |
1.37MB |
| 01. Module Overview.mp4 |
1.32MB |
| 01. Module Overview.mp4 |
1.31MB |
| 01. Module Overview.mp4 |
1.30MB |
| 01. Module Overview.mp4 |
1.28MB |
| 01. Module Overview.mp4 |
1.22MB |
| 01. Module Overview.mp4 |
1.15MB |
| 01. Module Overview.mp4 |
1.09MB |
| 01. Module Overview.mp4 |
1.07MB |
| 01. Module Overview.mp4 |
1.07MB |
| 01. Module Overview.mp4 |
1.01MB |
| 01. Module Overview.vtt |
1.34KB |
| 01. Module Overview.vtt |
2.70KB |
| 01. Module Overview.vtt |
1.25KB |
| 01. Module Overview.vtt |
1.20KB |
| 01. Module Overview.vtt |
1.26KB |
| 01. Module Overview.vtt |
1.56KB |
| 01. Module Overview.vtt |
2.26KB |
| 01. Module Overview.vtt |
1.73KB |
| 01. Module Overview.vtt |
1.52KB |
| 01. Module Overview.vtt |
1.51KB |
| 01. Module Overview.vtt |
1.43KB |
| 01. Module Overview.vtt |
1.37KB |
| 01. Module Overview.vtt |
1.26KB |
| 01. Module Overview.vtt |
1.22KB |
| 01. Module Overview.vtt |
1.08KB |
| 01. Module Overview.vtt |
1.06KB |
| 01. Module Overview.vtt |
1.06KB |
| 01. Module Overview.vtt |
1.04KB |
| 01. Module Review.mp4 |
890.20KB |
| 01. Module Review.mp4 |
1.83MB |
| 01. Module Review.mp4 |
1.22MB |
| 01. Module Review.vtt |
2.05KB |
| 01. Module Review.vtt |
1.10KB |
| 01. Module Review.vtt |
860B |
| 02. Antivirus.mp4 |
2.35MB |
| 02. Antivirus.vtt |
2.26KB |
| 02. Application WhitelistingBlacklisting.mp4 |
2.10MB |
| 02. Application WhitelistingBlacklisting.vtt |
2.55KB |
| 02. Authentication Management.mp4 |
5.13MB |
| 02. Authentication Management.vtt |
5.95KB |
| 02. Barricades.mp4 |
3.54MB |
| 02. Barricades.vtt |
2.07KB |
| 02. Cellular.mp4 |
10.78MB |
| 02. Cellular.vtt |
14.20KB |
| 02. Certificate Authorities and Digital Certificates.mp4 |
1.31MB |
| 02. Certificate Authorities and Digital Certificates.vtt |
1.48KB |
| 02. Cloud-based vs. On-premise.mp4 |
4.14MB |
| 02. Cloud-based vs. On-premise.vtt |
5.39KB |
| 02. Cloud Storage.mp4 |
3.38MB |
| 02. Cloud Storage.vtt |
4.48KB |
| 02. Company Obligations to Protect Security.mp4 |
2.25MB |
| 02. Company Obligations to Protect Security.vtt |
3.28KB |
| 02. Computer Forensics.mp4 |
3.57MB |
| 02. Computer Forensics.vtt |
4.43KB |
| 02. Configuration Management.mp4 |
7.50MB |
| 02. Configuration Management.vtt |
7.07KB |
| 02. Directory Services.mp4 |
2.72MB |
| 02. Directory Services.vtt |
2.84KB |
| 02. Environments (Dev, Test, Staging, and Production).mp4 |
5.66MB |
| 02. Environments (Dev, Test, Staging, and Production).vtt |
7.10KB |
| 02. Filtering Through the Noise.mp4 |
7.47MB |
| 02. Filtering Through the Noise.vtt |
6.73KB |
| 02. Geographically Disperse.mp4 |
1.53MB |
| 02. Geographically Disperse.vtt |
1.53KB |
| 02. High Availability.mp4 |
4.49MB |
| 02. High Availability.vtt |
3.98KB |
| 02. Identity Provider (IdP).mp4 |
2.80MB |
| 02. Identity Provider (IdP).vtt |
2.66KB |
| 02. Importance of Policies in Reducing Risk.mp4 |
792.11KB |
| 02. Importance of Policies in Reducing Risk.vtt |
821B |
| 02. Indicators of Compromise (IOC).mp4 |
4.05MB |
| 02. Indicators of Compromise (IOC).vtt |
3.65KB |
| 02. Jump Server.mp4 |
3.45MB |
| 02. Jump Server.vtt |
4.06KB |
| 02. Load Balancers.mp4 |
6.45MB |
| 02. Load Balancers.vtt |
7.55KB |
| 02. Module Goal.mp4 |
2.01MB |
| 02. Module Goal.vtt |
2.60KB |
| 02. Networking Protocols and TCP Three-way Handshake.mp4 |
6.34MB |
| 02. Networking Protocols and TCP Three-way Handshake.vtt |
6.98KB |
| 02. Penetration Testing.mp4 |
1.82MB |
| 02. Penetration Testing.vtt |
2.08KB |
| 02. Privacy and Compliance Challenges.mp4 |
9.35MB |
| 02. Privacy and Compliance Challenges.vtt |
9.57KB |
| 02. Privilege Escalation.mp4 |
4.31MB |
| 02. Privilege Escalation.vtt |
4.07KB |
| 02. Risk Types.mp4 |
3.33MB |
| 02. Risk Types.vtt |
6.84KB |
| 02. Rogue Access Points and Evil Twin.mp4 |
5.14MB |
| 02. Rogue Access Points and Evil Twin.vtt |
6.02KB |
| 02. Script Kiddies.mp4 |
1.69MB |
| 02. Script Kiddies.vtt |
1.88KB |
| 02. Specific Types of Threats.mp4 |
1.04MB |
| 02. Specific Types of Threats.vtt |
1.29KB |
| 02. Traceroutetracert.mp4 |
2.89MB |
| 02. Traceroutetracert.vtt |
3.49KB |
| 02. What Is Social Engineering.mp4 |
3.05MB |
| 02. What Is Social Engineering.vtt |
3.66KB |
| 02. Who Should Watch this Course.mp4 |
5.18MB |
| 02. Who Should Watch this Course.vtt |
5.24KB |
| 02. Why You Should Care.mp4 |
1.42MB |
| 02. Why You Should Care.vtt |
1.49KB |
| 02. Wireless Definitions.mp4 |
3.27MB |
| 02. Wireless Definitions.vtt |
3.25KB |
| 03. Bluejack and Bluesnarfing.mp4 |
5.45MB |
| 03. Bluejack and Bluesnarfing.vtt |
6.01KB |
| 03. Certificate Authority.mp4 |
3.01MB |
| 03. Certificate Authority.vtt |
3.65KB |
| 03. Cloud Computing.mp4 |
1.97MB |
| 03. Cloud Computing.vtt |
2.66KB |
| 03. Cross Site Scripting (XSS).mp4 |
6.69MB |
| 03. Cross Site Scripting (XSS).vtt |
5.14KB |
| 03. Cryptographic Terminology and History.mp4 |
5.80MB |
| 03. Cryptographic Terminology and History.vtt |
6.58KB |
| 03. Diagrams.mp4 |
4.51MB |
| 03. Diagrams.vtt |
2.17KB |
| 03. DNSSEC.mp4 |
7.01MB |
| 03. DNSSEC.vtt |
6.65KB |
| 03. Embedded Systems.mp4 |
1.77MB |
| 03. Embedded Systems.vtt |
1.62KB |
| 03. Endpoint Detection and Response (EDR).mp4 |
3.16MB |
| 03. Endpoint Detection and Response (EDR).vtt |
3.94KB |
| 03. Environment Example.mp4 |
6.16MB |
| 03. Environment Example.vtt |
4.49KB |
| 03. Extensible Authentication Protocol (EAP).mp4 |
1.42MB |
| 03. Extensible Authentication Protocol (EAP).vtt |
1.33KB |
| 03. GDPR and Key Terminology.mp4 |
3.03MB |
| 03. GDPR and Key Terminology.vtt |
2.99KB |
| 03. Geographical Dispersal of Assets.mp4 |
2.26MB |
| 03. Geographical Dispersal of Assets.vtt |
2.31KB |
| 03. Hacktivists.mp4 |
1.63MB |
| 03. Hacktivists.vtt |
1.85KB |
| 03. IdP Example.mp4 |
2.51MB |
| 03. IdP Example.vtt |
2.93KB |
| 03. Job Rotation.mp4 |
2.81MB |
| 03. Job Rotation.vtt |
3.13KB |
| 03. Managing Risk.mp4 |
1.19MB |
| 03. Managing Risk.vtt |
1.30KB |
| 03. Mantraps.mp4 |
1.32MB |
| 03. Mantraps.vtt |
1.39KB |
| 03. New Threats Zero Days.mp4 |
2.85MB |
| 03. New Threats Zero Days.vtt |
4.11KB |
| 03. nslookupdig.mp4 |
2.91MB |
| 03. nslookupdig.vtt |
2.91KB |
| 03. Order of Volatility.mp4 |
8.94MB |
| 03. Order of Volatility.vtt |
9.21KB |
| 03. Penetration Testing Steps.mp4 |
3.09MB |
| 03. Penetration Testing Steps.vtt |
4.84KB |
| 03. Phishing.mp4 |
6.36MB |
| 03. Phishing.vtt |
3.44KB |
| 03. Potential Damages from Mishandled Data.mp4 |
2.11MB |
| 03. Potential Damages from Mishandled Data.vtt |
2.60KB |
| 03. Proxies.mp4 |
5.87MB |
| 03. Proxies.vtt |
6.94KB |
| 03. Quarantine.mp4 |
3.77MB |
| 03. Quarantine.vtt |
4.42KB |
| 03. Resource Policies.mp4 |
2.25MB |
| 03. Resource Policies.vtt |
2.42KB |
| 03. Securing Wi-Fi.mp4 |
3.18MB |
| 03. Securing Wi-Fi.vtt |
3.22KB |
| 03. Security Segmentation Models.mp4 |
4.21MB |
| 03. Security Segmentation Models.vtt |
5.38KB |
| 03. Team Models.mp4 |
2.19MB |
| 03. Team Models.vtt |
2.37KB |
| 03. Usernames.mp4 |
1.91MB |
| 03. Usernames.vtt |
1.67KB |
| 03. Virus.mp4 |
4.00MB |
| 03. Virus.vtt |
4.95KB |
| 03. Vulnerability Scanner Demo.mp4 |
10.37MB |
| 03. Vulnerability Scanner Demo.vtt |
6.24KB |
| 03. WEPWPAWPA2.mp4 |
2.42MB |
| 03. WEPWPAWPA2.vtt |
2.56KB |
| 03. What Is Cyber Threat Intelligence.mp4 |
2.39MB |
| 03. What Is Cyber Threat Intelligence.vtt |
2.61KB |
| 04. [X] as a Service.mp4 |
1.03MB |
| 04. [X] as a Service.vtt |
1.11KB |
| 04. Badges.mp4 |
2.84MB |
| 04. Badges.vtt |
3.33KB |
| 04. Baseline Configuration.mp4 |
3.66MB |
| 04. Baseline Configuration.vtt |
3.74KB |
| 04. Certificates, Tokens, and SSH Keys.mp4 |
3.67MB |
| 04. Certificates, Tokens, and SSH Keys.vtt |
2.49KB |
| 04. Chain of Custody.mp4 |
5.37MB |
| 04. Chain of Custody.vtt |
4.81KB |
| 04. Challenge Handshake Authentication Protocol (CHAP).mp4 |
1.68MB |
| 04. Challenge Handshake Authentication Protocol (CHAP).vtt |
1.64KB |
| 04. CRLs.mp4 |
2.36MB |
| 04. CRLs.vtt |
2.90KB |
| 04. Crypto-malware Ransomware.mp4 |
5.98MB |
| 04. Crypto-malware Ransomware.vtt |
3.82KB |
| 04. Data Loss Prevention (DLP).mp4 |
3.76MB |
| 04. Data Loss Prevention (DLP).vtt |
4.39KB |
| 04. Dissociation.mp4 |
2.67MB |
| 04. Dissociation.vtt |
2.28KB |
| 04. Embedded Systems Examples.mp4 |
3.30MB |
| 04. Embedded Systems Examples.vtt |
3.00KB |
| 04. Federation.mp4 |
1.82MB |
| 04. Federation.vtt |
1.75KB |
| 04. Firewalls.mp4 |
8.90MB |
| 04. Firewalls.vtt |
11.82KB |
| 04. GDPR Key Terms and Data Processing Princ.mp4 |
3.26MB |
| 04. GDPR Key Terms and Data Processing Princ.vtt |
3.63KB |
| 04. Importance of Cyber Threat Intelligence.mp4 |
1.35MB |
| 04. Importance of Cyber Threat Intelligence.vtt |
1.57KB |
| 04. Incident Notification and Escalation.mp4 |
3.38MB |
| 04. Incident Notification and Escalation.vtt |
3.84KB |
| 04. Incident Response Process.mp4 |
2.82MB |
| 04. Incident Response Process.vtt |
3.20KB |
| 04. ipconfigifconfig.mp4 |
1.31MB |
| 04. ipconfigifconfig.vtt |
1.55KB |
| 04. Known, Unknown, and Partially Known Environments.mp4 |
1.51MB |
| 04. Known, Unknown, and Partially Known Environments.vtt |
1.64KB |
| 04. Mandatory Vacations.mp4 |
1.20MB |
| 04. Mandatory Vacations.vtt |
1.10KB |
| 04. Mis-configuration Weak Configuration.mp4 |
2.31MB |
| 04. Mis-configuration Weak Configuration.vtt |
2.15KB |
| 04. Near Field Communication (NFC).mp4 |
2.15MB |
| 04. Near Field Communication (NFC).vtt |
2.53KB |
| 04. Organized Crime.mp4 |
2.09MB |
| 04. Organized Crime.vtt |
2.48KB |
| 04. Provisioning and Deprovisioning.mp4 |
3.62MB |
| 04. Provisioning and Deprovisioning.vtt |
4.46KB |
| 04. RAID.mp4 |
5.14MB |
| 04. RAID.vtt |
4.65KB |
| 04. Risk Management Defined.mp4 |
2.30MB |
| 04. Risk Management Defined.vtt |
2.02KB |
| 04. Secrets Management.mp4 |
4.89MB |
| 04. Secrets Management.vtt |
4.28KB |
| 04. SIEM.mp4 |
6.62MB |
| 04. SIEM.vtt |
6.08KB |
| 04. SQL Injection.mp4 |
2.51MB |
| 04. SQL Injection.vtt |
2.19KB |
| 04. SSH.mp4 |
1.94MB |
| 04. SSH.vtt |
2.30KB |
| 04. Types of Phishing.mp4 |
5.76MB |
| 04. Types of Phishing.vtt |
6.34KB |
| 04. Vigenere Table.mp4 |
10.21MB |
| 04. Vigenere Table.vtt |
5.98KB |
| 04. Virtualization.mp4 |
2.29MB |
| 04. Virtualization.vtt |
2.34KB |
| 04. Web Security Gateways.mp4 |
2.78MB |
| 04. Web Security Gateways.vtt |
2.92KB |
| 04. WPA and WPA2 Security.mp4 |
6.74MB |
| 04. WPA and WPA2 Security.vtt |
6.49KB |
| 05. Additional Areas of Concern.mp4 |
4.96MB |
| 05. Additional Areas of Concern.vtt |
4.73KB |
| 05. Air Gaps.mp4 |
3.65MB |
| 05. Air Gaps.vtt |
4.17KB |
| 05. Alarms.mp4 |
2.53MB |
| 05. Alarms.vtt |
3.00KB |
| 05. Certificate Issues.mp4 |
4.43MB |
| 05. Certificate Issues.vtt |
5.22KB |
| 05. Demo - Configuring Firewall Rules.mp4 |
19.10MB |
| 05. Demo - Configuring Firewall Rules.vtt |
6.93KB |
| 05. Digital Signatures.mp4 |
2.52MB |
| 05. Digital Signatures.vtt |
2.48KB |
| 05. DLL Injection.mp4 |
7.07MB |
| 05. DLL Injection.vtt |
3.53KB |
| 05. Infrastructure as a Service (IaaS).mp4 |
3.05MB |
| 05. Infrastructure as a Service (IaaS).vtt |
3.01KB |
| 05. Integrity Measurement.mp4 |
3.15MB |
| 05. Integrity Measurement.vtt |
3.65KB |
| 05. Intrusion Detection and Prevention.mp4 |
9.11MB |
| 05. Intrusion Detection and Prevention.vtt |
9.70KB |
| 05. IP Address Schema.mp4 |
3.74MB |
| 05. IP Address Schema.vtt |
3.93KB |
| 05. Jamming.mp4 |
1.65MB |
| 05. Jamming.vtt |
1.81KB |
| 05. Legal Hold.mp4 |
2.24MB |
| 05. Legal Hold.vtt |
2.61KB |
| 05. Log Files.mp4 |
6.83MB |
| 05. Log Files.vtt |
7.82KB |
| 05. Multipath.mp4 |
3.67MB |
| 05. Multipath.vtt |
3.47KB |
| 05. Nation States APT.mp4 |
2.13MB |
| 05. Nation States APT.vtt |
2.27KB |
| 05. Next-generation Firewall (NGFW).mp4 |
2.90MB |
| 05. Next-generation Firewall (NGFW).vtt |
3.20KB |
| 05. nmap and nmap demo.mp4 |
6.98MB |
| 05. nmap and nmap demo.vtt |
6.04KB |
| 05. Notifying Outside Agencies.mp4 |
2.51MB |
| 05. Notifying Outside Agencies.vtt |
2.74KB |
| 05. OCSP.mp4 |
2.63MB |
| 05. OCSP.vtt |
3.40KB |
| 05. Password Authentication Protocol (PAP).mp4 |
1.38MB |
| 05. Password Authentication Protocol (PAP).vtt |
1.78KB |
| 05. Preparation.mp4 |
2.05MB |
| 05. Preparation.vtt |
2.82KB |
| 05. Risk Management Concepts.mp4 |
5.52MB |
| 05. Risk Management Concepts.vtt |
4.89KB |
| 05. Rules of Engagement.mp4 |
3.15MB |
| 05. Rules of Engagement.vtt |
3.32KB |
| 05. SCADA ICS.mp4 |
9.42MB |
| 05. SCADA ICS.vtt |
7.71KB |
| 05. Separation of Duties.mp4 |
997.25KB |
| 05. Separation of Duties.vtt |
947B |
| 05. Shared Accounts (Improperly Configured).mp4 |
2.31MB |
| 05. Shared Accounts (Improperly Configured).vtt |
2.26KB |
| 05. Six Legal Grounds for Processing Persona.mp4 |
2.12MB |
| 05. Six Legal Grounds for Processing Persona.vtt |
2.40KB |
| 05. SMIME.mp4 |
1.80MB |
| 05. SMIME.vtt |
2.06KB |
| 05. Storage in the Cloud.mp4 |
4.44MB |
| 05. Storage in the Cloud.vtt |
5.25KB |
| 05. Threat Intelligence Classification.mp4 |
2.49MB |
| 05. Threat Intelligence Classification.vtt |
3.27KB |
| 05. Transitive Trust Authentication.mp4 |
1.86MB |
| 05. Transitive Trust Authentication.vtt |
1.80KB |
| 05. Trojan.mp4 |
7.07MB |
| 05. Trojan.vtt |
7.58KB |
| 05. Vishing.mp4 |
4.78MB |
| 05. Vishing.vtt |
4.81KB |
| 05. WPA3.mp4 |
8.42MB |
| 05. WPA3.vtt |
7.03KB |
| 06. Attestation.mp4 |
1.33MB |
| 06. Attestation.vtt |
1.16KB |
| 06. CSR and PKCS Standards.mp4 |
1.82MB |
| 06. CSR and PKCS Standards.vtt |
1.29KB |
| 06. Data Classification.mp4 |
5.08MB |
| 06. Data Classification.vtt |
5.19KB |
| 06. Data Sovereignty.mp4 |
2.47MB |
| 06. Data Sovereignty.vtt |
2.55KB |
| 06. Detection and Analysis.mp4 |
6.26MB |
| 06. Detection and Analysis.vtt |
5.53KB |
| 06. East-west Traffic.mp4 |
3.26MB |
| 06. East-west Traffic.vtt |
3.39KB |
| 06. First Responder Best Practices.mp4 |
9.58MB |
| 06. First Responder Best Practices.vtt |
9.10KB |
| 06. GDPR Compliance and Penalties.mp4 |
1.13MB |
| 06. GDPR Compliance and Penalties.vtt |
1.09KB |
| 06. HIDSHIPS.mp4 |
1.51MB |
| 06. HIDSHIPS.vtt |
1.78KB |
| 06. IaaS and Automation.mp4 |
2.74MB |
| 06. IaaS and Automation.vtt |
3.03KB |
| 06. IDSIPS Component Workflow.mp4 |
2.13MB |
| 06. IDSIPS Component Workflow.vtt |
2.32KB |
| 06. Insiders.mp4 |
2.57MB |
| 06. Insiders.vtt |
2.59KB |
| 06. Key Stretching.mp4 |
6.04MB |
| 06. Key Stretching.vtt |
6.02KB |
| 06. Lateral Movement.mp4 |
1.70MB |
| 06. Lateral Movement.vtt |
2.63KB |
| 06. LDAP Injection.mp4 |
1.21MB |
| 06. LDAP Injection.vtt |
1.27KB |
| 06. Least Privilege.mp4 |
1.21MB |
| 06. Least Privilege.vtt |
1.26KB |
| 06. Lighting and Signs.mp4 |
3.66MB |
| 06. Lighting and Signs.vtt |
3.20KB |
| 06. Load Balancer.mp4 |
2.27MB |
| 06. Load Balancer.vtt |
2.00KB |
| 06. Log Management, Syslog, Rsyslog, and Syslog-ng.mp4 |
6.54MB |
| 06. Log Management, Syslog, Rsyslog, and Syslog-ng.vtt |
5.77KB |
| 06. MicroSD HSM.mp4 |
1.47MB |
| 06. MicroSD HSM.vtt |
1.30KB |
| 06. Mobile Device Management.mp4 |
9.64MB |
| 06. Mobile Device Management.vtt |
8.10KB |
| 06. Ping and Pathping.mp4 |
5.52MB |
| 06. Ping and Pathping.vtt |
4.44KB |
| 06. Port Security and 802.1x Authentication.mp4 |
7.96MB |
| 06. Port Security and 802.1x Authentication.vtt |
7.08KB |
| 06. RFID.mp4 |
2.18MB |
| 06. RFID.vtt |
2.06KB |
| 06. SCADA Security Concerns.mp4 |
5.47MB |
| 06. SCADA Security Concerns.vtt |
5.14KB |
| 06. Secure Real-Time Transport Protocol (SRTP).mp4 |
1.19MB |
| 06. Secure Real-Time Transport Protocol (SRTP).vtt |
1.14KB |
| 06. Smart Cards.mp4 |
1.48MB |
| 06. Smart Cards.vtt |
1.63KB |
| 06. SPAM.mp4 |
4.65MB |
| 06. SPAM.vtt |
4.75KB |
| 06. Static Code Analysis.mp4 |
3.59MB |
| 06. Static Code Analysis.vtt |
4.19KB |
| 06. Strategic, Operational, and Tactical Intelligence.mp4 |
2.62MB |
| 06. Strategic, Operational, and Tactical Intelligence.vtt |
2.22KB |
| 06. Strategic Options.mp4 |
3.18MB |
| 06. Strategic Options.vtt |
3.45KB |
| 06. Virtual Networks.mp4 |
6.35MB |
| 06. Virtual Networks.vtt |
5.09KB |
| 06. Weak Configuration Considerations.mp4 |
3.13MB |
| 06. Weak Configuration Considerations.vtt |
4.87KB |
| 06. Wireless Security Examples.mp4 |
4.09MB |
| 06. Wireless Security Examples.vtt |
3.69KB |
| 06. Worms.mp4 |
1.40MB |
| 06. Worms.vtt |
1.33KB |
| 07. API Inspection and Integration.mp4 |
2.31MB |
| 07. API Inspection and Integration.vtt |
3.02KB |
| 07. Cameras and Video Surveillance.mp4 |
2.89MB |
| 07. Cameras and Video Surveillance.vtt |
2.86KB |
| 07. Capture a System Image.mp4 |
6.52MB |
| 07. Capture a System Image.vtt |
6.39KB |
| 07. Clean Desk Policies.mp4 |
1.87MB |
| 07. Clean Desk Policies.vtt |
2.51KB |
| 07. Competitors.mp4 |
2.09MB |
| 07. Competitors.vtt |
2.57KB |
| 07. Compliance Frameworks.mp4 |
4.08MB |
| 07. Compliance Frameworks.vtt |
4.31KB |
| 07. Data Loss Prevention (DLP).mp4 |
3.80MB |
| 07. Data Loss Prevention (DLP).vtt |
4.30KB |
| 07. Dumpter Diving.mp4 |
1.87MB |
| 07. Dumpter Diving.vtt |
2.31KB |
| 07. Escalation of Privilege.mp4 |
1.07MB |
| 07. Escalation of Privilege.vtt |
1.17KB |
| 07. Four Approaches to IDS.mp4 |
2.72MB |
| 07. Four Approaches to IDS.vtt |
3.22KB |
| 07. Gathering and Correlating Information.mp4 |
3.72MB |
| 07. Gathering and Correlating Information.vtt |
3.71KB |
| 07. Hashing.mp4 |
4.40MB |
| 07. Hashing.vtt |
3.95KB |
| 07. Host-based Firewall.mp4 |
2.53MB |
| 07. Host-based Firewall.vtt |
2.67KB |
| 07. hping and hping demo.mp4 |
5.28MB |
| 07. hping and hping demo.vtt |
4.53KB |
| 07. Journalctl.mp4 |
10.13MB |
| 07. Journalctl.vtt |
5.84KB |
| 07. Lightweight Directory Access Protocol over SSL (LDAPS).mp4 |
1.64MB |
| 07. Lightweight Directory Access Protocol over SSL (LDAPS).vtt |
1.64KB |
| 07. Mobile Device Management (MDM, MAM, and UEM).mp4 |
2.21MB |
| 07. Mobile Device Management (MDM, MAM, and UEM).vtt |
2.21KB |
| 07. Near Field Communication (NFC).mp4 |
2.91MB |
| 07. Near Field Communication (NFC).vtt |
2.33KB |
| 07. PKI.mp4 |
8.48MB |
| 07. PKI.vtt |
6.89KB |
| 07. Platform as a Service (PaaS).mp4 |
3.31MB |
| 07. Platform as a Service (PaaS).vtt |
3.35KB |
| 07. Potentially Unwanted Programs (PUP).mp4 |
2.72MB |
| 07. Potentially Unwanted Programs (PUP).vtt |
2.95KB |
| 07. Power Resiliency.mp4 |
3.82MB |
| 07. Power Resiliency.vtt |
3.71KB |
| 07. Privacy-enhancing Technologies, Data Masking, and Tokenization.mp4 |
2.52MB |
| 07. Privacy-enhancing Technologies, Data Masking, and Tokenization.vtt |
3.32KB |
| 07. RADIUS.mp4 |
4.14MB |
| 07. RADIUS.vtt |
4.94KB |
| 07. Risk Register, Risk Matrix, and Heat Map.mp4 |
1.63MB |
| 07. Risk Register, Risk Matrix, and Heat Map.vtt |
2.14KB |
| 07. Secure Coding Techniques.mp4 |
14.24MB |
| 07. Secure Coding Techniques.vtt |
12.55KB |
| 07. Smart Devices IoT.mp4 |
4.05MB |
| 07. Smart Devices IoT.vtt |
4.44KB |
| 07. Stopping the Spread.mp4 |
3.44MB |
| 07. Stopping the Spread.vtt |
4.81KB |
| 07. Time-Based One-Time Password (TOTP).mp4 |
2.47MB |
| 07. Time-Based One-Time Password (TOTP).vtt |
2.86KB |
| 07. User Accounts.mp4 |
1.95MB |
| 07. User Accounts.vtt |
1.84KB |
| 07. Using MDM to Locate and Secure and Lost Device.mp4 |
2.03MB |
| 07. Using MDM to Locate and Secure and Lost Device.vtt |
1.92KB |
| 07. Weak Cipher Suites and Implementations.mp4 |
2.97MB |
| 07. Weak Cipher Suites and Implementations.vtt |
3.62KB |
| 07. Wireless Security and Pen Testing Tools.mp4 |
5.03MB |
| 07. Wireless Security and Pen Testing Tools.vtt |
4.69KB |
| 07. XML Injection.mp4 |
1.80MB |
| 07. XML Injection.vtt |
1.86KB |
| 07. Zero Trust.mp4 |
3.04MB |
| 07. Zero Trust.vtt |
3.13KB |
| 08. Account Management.mp4 |
3.62MB |
| 08. Account Management.vtt |
3.57KB |
| 08. Anonymization and Pseudo-anonymization.mp4 |
2.52MB |
| 08. Anonymization and Pseudo-anonymization.vtt |
1.54KB |
| 08. Background Checks, NDAs, and Role-based Awareness Training.mp4 |
3.15MB |
| 08. Background Checks, NDAs, and Role-based Awareness Training.vtt |
3.30KB |
| 08. Boot Loader Protections and Secure Boot.mp4 |
4.96MB |
| 08. Boot Loader Protections and Secure Boot.vtt |
4.65KB |
| 08. Defining Goals and Expected Outcomes.mp4 |
7.53MB |
| 08. Defining Goals and Expected Outcomes.vtt |
6.85KB |
| 08. DLP, Content FiltersURL Filters and UpdatingRevoking Certificates.mp4 |
5.92MB |
| 08. DLP, Content FiltersURL Filters and UpdatingRevoking Certificates.vtt |
5.77KB |
| 08. EAP, PEAP, and LEAP.mp4 |
3.73MB |
| 08. EAP, PEAP, and LEAP.vtt |
4.02KB |
| 08. Fileless Virus.mp4 |
3.66MB |
| 08. Fileless Virus.vtt |
3.90KB |
| 08. FTPS and SFTP.mp4 |
2.32MB |
| 08. FTPS and SFTP.vtt |
2.63KB |
| 08. Growth of Enterprise Cloud Application.mp4 |
1.85MB |
| 08. Growth of Enterprise Cloud Application.vtt |
2.68KB |
| 08. Guards.mp4 |
1.16MB |
| 08. Guards.vtt |
1.10KB |
| 08. HMAC-Based One-Time Password (HOTP).mp4 |
1.40MB |
| 08. HMAC-Based One-Time Password (HOTP).vtt |
1.44KB |
| 08. Improper Certificate and Key Management.mp4 |
2.56MB |
| 08. Improper Certificate and Key Management.vtt |
2.63KB |
| 08. In-band vs. Out-of-band Key Exchange.mp4 |
2.58MB |
| 08. In-band vs. Out-of-band Key Exchange.vtt |
2.80KB |
| 08. IV Attack.mp4 |
4.85MB |
| 08. IV Attack.vtt |
5.31KB |
| 08. Methods of Privilege Escalation.vtt |
3.04KB |
| 08. Netstat.mp4 |
2.38MB |
| 08. Netstat.vtt |
2.31KB |
| 08. Network-based IDS.mp4 |
3.71MB |
| 08. Network-based IDS.vtt |
3.86KB |
| 08. Network Traffic and Logs.mp4 |
6.31MB |
| 08. Network Traffic and Logs.vtt |
6.71KB |
| 08. NIST and the Cyber-security Framework (C.mp4 |
1.65MB |
| 08. NIST and the Cyber-security Framework (C.vtt |
1.98KB |
| 08. NXLOG.mp4 |
2.12MB |
| 08. NXLOG.vtt |
1.23KB |
| 08. Pointer Dereference.mp4 |
2.76MB |
| 08. Pointer Dereference.vtt |
2.58KB |
| 08. Public Key.mp4 |
1.90MB |
| 08. Public Key.vtt |
2.10KB |
| 08. Replication.mp4 |
4.20MB |
| 08. Replication.vtt |
3.63KB |
| 08. Risk Control Self-assessment (RCSA).mp4 |
3.91MB |
| 08. Risk Control Self-assessment (RCSA).vtt |
4.64KB |
| 08. SEAndroid.mp4 |
2.58MB |
| 08. SEAndroid.vtt |
1.90KB |
| 08. Security Automation.mp4 |
4.25MB |
| 08. Security Automation.vtt |
4.74KB |
| 08. Shoulder Surfing.mp4 |
4.85MB |
| 08. Shoulder Surfing.vtt |
5.15KB |
| 08. Single Sign-on (SSO).mp4 |
8.92MB |
| 08. Single Sign-on (SSO).vtt |
2.59KB |
| 08. Smart Devices IoT Weak Defaults.mp4 |
1.89MB |
| 08. Smart Devices IoT Weak Defaults.vtt |
1.82KB |
| 08. Software as a Service (SaaS).mp4 |
1.96MB |
| 08. Software as a Service (SaaS).vtt |
2.29KB |
| 08. Stages of Risk Management.mp4 |
4.73MB |
| 08. Stages of Risk Management.vtt |
5.39KB |
| 08. Threat Actor Attributes.mp4 |
1.35MB |
| 08. Threat Actor Attributes.vtt |
1.20KB |
| 08. Types of Data to Secure.mp4 |
2.38MB |
| 08. Types of Data to Secure.vtt |
2.16KB |
| 08. VPN.mp4 |
6.95MB |
| 08. VPN.vtt |
7.92KB |
| 09. 802.11x Wireless Protocols.mp4 |
4.96MB |
| 09. 802.11x Wireless Protocols.vtt |
3.36KB |
| 09. Attack Vectors.mp4 |
12.61MB |
| 09. Attack Vectors.vtt |
14.32KB |
| 09. Botnets.mp4 |
4.69MB |
| 09. Botnets.vtt |
4.48KB |
| 09. Capturing Video.mp4 |
1.82MB |
| 09. Capturing Video.vtt |
1.57KB |
| 09. Continuous Monitoring and Validation.mp4 |
1.98MB |
| 09. Continuous Monitoring and Validation.vtt |
2.50KB |
| 09. Cyber Kill Chain in the Cloud.mp4 |
8.31MB |
| 09. Cyber Kill Chain in the Cloud.vtt |
7.25KB |
| 09. Data Masking.mp4 |
5.93MB |
| 09. Data Masking.vtt |
7.67KB |
| 09. Data Owner.mp4 |
1.00MB |
| 09. Data Owner.vtt |
1.08KB |
| 09. Device Security.mp4 |
6.61MB |
| 09. Device Security.vtt |
8.13KB |
| 09. Directory Traversal Command Injection.mp4 |
3.11MB |
| 09. Directory Traversal Command Injection.vtt |
3.01KB |
| 09. Elliptic Curve Cryptography (ECC).mp4 |
1.91MB |
| 09. Elliptic Curve Cryptography (ECC).vtt |
2.14KB |
| 09. IaaS, PaaS, and SaaS Differentiators.mp4 |
2.02MB |
| 09. IaaS, PaaS, and SaaS Differentiators.vtt |
1.84KB |
| 09. Measured Launch.mp4 |
1.22MB |
| 09. Measured Launch.vtt |
1.27KB |
| 09. netcat.mp4 |
3.61MB |
| 09. netcat.vtt |
3.85KB |
| 09. On-path Attacks (Formerly MiTM).mp4 |
1.99MB |
| 09. On-path Attacks (Formerly MiTM).vtt |
1.86KB |
| 09. On-prem vs. Cloud.mp4 |
3.11MB |
| 09. On-prem vs. Cloud.vtt |
2.80KB |
| 09. Password Complexity.mp4 |
2.30MB |
| 09. Password Complexity.vtt |
2.46KB |
| 09. PCI-DSS.mp4 |
1.55MB |
| 09. PCI-DSS.vtt |
1.92KB |
| 09. Persistence.mp4 |
757.99KB |
| 09. Persistence.vtt |
1.10KB |
| 09. Pharming.mp4 |
4.29MB |
| 09. Pharming.vtt |
4.24KB |
| 09. Private Key.mp4 |
976.99KB |
| 09. Private Key.vtt |
1.16KB |
| 09. Retention (Auditing, Compliance and Investigations).mp4 |
2.77MB |
| 09. Retention (Auditing, Compliance and Investigations).vtt |
3.89KB |
| 09. Risk Awareness (Inherent, Residual, Control, and Risk Appetite).mp4 |
2.06MB |
| 09. Risk Awareness (Inherent, Residual, Control, and Risk Appetite).vtt |
2.74KB |
| 09. Risk Management Data Sources.mp4 |
4.31MB |
| 09. Risk Management Data Sources.vtt |
4.67KB |
| 09. Robot Sentries.mp4 |
2.40MB |
| 09. Robot Sentries.vtt |
2.55KB |
| 09. SAML.mp4 |
3.92MB |
| 09. SAML.vtt |
4.37KB |
| 09. Secure Protocols.mp4 |
5.51MB |
| 09. Secure Protocols.vtt |
5.74KB |
| 09. Security Device Placement.mp4 |
3.99MB |
| 09. Security Device Placement.vtt |
4.79KB |
| 09. Segregation, Segmentation and Isolation.mp4 |
5.65MB |
| 09. Segregation, Segmentation and Isolation.vtt |
5.40KB |
| 09. SMS Authentication.mp4 |
1.95MB |
| 09. SMS Authentication.vtt |
1.65KB |
| 09. SNMP v3.mp4 |
1.76MB |
| 09. SNMP v3.vtt |
2.19KB |
| 09. Special Purpose Devices.mp4 |
1.87MB |
| 09. Special Purpose Devices.vtt |
1.80KB |
| 09. Split Tunnel.mp4 |
1.65MB |
| 09. Split Tunnel.vtt |
1.44KB |
| 09. Test the Plan.mp4 |
1.05MB |
| 09. Test the Plan.vtt |
1.68KB |
| 09. Use Cases for Monitoring.mp4 |
3.40MB |
| 09. Use Cases for Monitoring.vtt |
3.90KB |
| 1 |
2B |
| 1. Course Overview.mp4 |
4.89MB |
| 1. Course Overview.mp4 |
3.94MB |
| 1. Course Overview.mp4 |
3.80MB |
| 1. Course Overview.mp4 |
3.71MB |
| 1. Course Overview.mp4 |
3.71MB |
| 1. Course Overview.vtt |
2.84KB |
| 1. Course Overview.vtt |
3.16KB |
| 1. Course Overview.vtt |
3.10KB |
| 1. Course Overview.vtt |
3.02KB |
| 1. Course Overview.vtt |
2.98KB |
| 1. Module Intro and Study Tips.mp4 |
5.85MB |
| 1. Module Intro and Study Tips.vtt |
6.73KB |
| 1. Module Overview.mp4 |
1.42MB |
| 1. Module Overview.vtt |
1.82KB |
| 1. Module Overview and Domains.mp4 |
4.51MB |
| 1. Module Overview and Domains.vtt |
4.34KB |
| 10 |
226.33KB |
| 10. Application Security and Key Credential Management.mp4 |
4.05MB |
| 10. Application Security and Key Credential Management.vtt |
5.66KB |
| 10. Backup Plans Policies.mp4 |
1.83MB |
| 10. Backup Plans Policies.vtt |
2.11KB |
| 10. Bandwidth Monitors.mp4 |
2.20MB |
| 10. Bandwidth Monitors.vtt |
2.52KB |
| 10. Buffer Overflow.mp4 |
2.84MB |
| 10. Buffer Overflow.vtt |
1.76KB |
| 10. Cleanup.mp4 |
1.72MB |
| 10. Cleanup.vtt |
2.35KB |
| 10. Compute in the Cloud.mp4 |
5.78MB |
| 10. Compute in the Cloud.vtt |
7.51KB |
| 10. Continuous Integration.mp4 |
3.02MB |
| 10. Continuous Integration.vtt |
3.08KB |
| 10. Data Controller and Processor.mp4 |
578.02KB |
| 10. Data Controller and Processor.vtt |
622B |
| 10. Default Configurations.mp4 |
2.33MB |
| 10. Default Configurations.vtt |
2.54KB |
| 10. Enterprise Security Framework (ESF).mp4 |
2.17MB |
| 10. Enterprise Security Framework (ESF).vtt |
2.17KB |
| 10. Firewalls.mp4 |
12.08MB |
| 10. Firewalls.vtt |
12.14KB |
| 10. Integrity Measurement Architecture (IMA).mp4 |
749.51KB |
| 10. Integrity Measurement Architecture (IMA).vtt |
918B |
| 10. IP Scanners.mp4 |
1.77MB |
| 10. IP Scanners.vtt |
1.64KB |
| 10. IPSec and Transport Encryption.mp4 |
2.18MB |
| 10. IPSec and Transport Encryption.vtt |
2.65KB |
| 10. Logic Bomb.mp4 |
1.64MB |
| 10. Logic Bomb.vtt |
2.38KB |
| 10. Object Identifiers (OID).mp4 |
3.48MB |
| 10. Object Identifiers (OID).vtt |
2.90KB |
| 10. On-path Attacks (Formerly MiTB).mp4 |
4.09MB |
| 10. On-path Attacks (Formerly MiTB).vtt |
4.37KB |
| 10. Password History.mp4 |
3.52MB |
| 10. Password History.vtt |
3.47KB |
| 10. Perfect Forward Secrecy.mp4 |
2.67MB |
| 10. Perfect Forward Secrecy.vtt |
2.06KB |
| 10. RADIUS Federation.mp4 |
742.83KB |
| 10. RADIUS Federation.vtt |
728B |
| 10. Reception.mp4 |
1.83MB |
| 10. Reception.vtt |
1.42KB |
| 10. Record Time Offset.mp4 |
4.29MB |
| 10. Record Time Offset.vtt |
4.56KB |
| 10. Regulatory Examples.mp4 |
1.15MB |
| 10. Regulatory Examples.vtt |
1.25KB |
| 10. SSLTLS.mp4 |
1.85MB |
| 10. SSLTLS.vtt |
1.73KB |
| 10. TACACS.mp4 |
1.94MB |
| 10. TACACS.vtt |
2.02KB |
| 10. Tailgating.mp4 |
5.85MB |
| 10. Tailgating.vtt |
4.37KB |
| 10. Things Typically Monitored.mp4 |
2.38MB |
| 10. Things Typically Monitored.vtt |
3.08KB |
| 10. Tokenization.mp4 |
4.77MB |
| 10. Tokenization.vtt |
3.98KB |
| 10. Tokens.mp4 |
1.91MB |
| 10. Tokens.vtt |
2.08KB |
| 10. Types of Clouds.mp4 |
1.53MB |
| 10. Types of Clouds.vtt |
1.76KB |
| 10. Use of Open Source Intelligence.mp4 |
7.00MB |
| 10. Use of Open Source Intelligence.vtt |
5.02KB |
| 10. Vehicles.mp4 |
2.64MB |
| 10. Vehicles.vtt |
2.79KB |
| 10. Virtualization.mp4 |
2.20MB |
| 10. Virtualization.vtt |
2.18KB |
| 10. Vulnerability Scanning.mp4 |
1.26MB |
| 10. Vulnerability Scanning.vtt |
1.47KB |
| 10. Walkthrough Tests.mp4 |
2.77MB |
| 10. Walkthrough Tests.vtt |
3.49KB |
| 100 |
209.29KB |
| 101 |
212.07KB |
| 102 |
216.75KB |
| 103 |
229.08KB |
| 104 |
250.56KB |
| 105 |
345.49KB |
| 106 |
353.94KB |
| 107 |
447.79KB |
| 108 |
487.13KB |
| 109 |
488.85KB |
| 11 |
6.86KB |
| 11. Air Gaps.mp4 |
3.37MB |
| 11. Air Gaps.vtt |
3.98KB |
| 11. ARP.mp4 |
1.27MB |
| 11. ARP.vtt |
1.30KB |
| 11. ARP Poisoning.mp4 |
2.59MB |
| 11. ARP Poisoning.vtt |
2.41KB |
| 11. Authentication.mp4 |
2.70MB |
| 11. Authentication.vtt |
3.57KB |
| 11. Backup Execution Frequency.mp4 |
2.21MB |
| 11. Backup Execution Frequency.vtt |
2.25KB |
| 11. Balancing Whats Reasonable.mp4 |
1.20MB |
| 11. Balancing Whats Reasonable.vtt |
1.59KB |
| 11. BIOSUEFI.mp4 |
964.31KB |
| 11. BIOSUEFI.vtt |
1001B |
| 11. Bug Bounty.mp4 |
3.91MB |
| 11. Bug Bounty.vtt |
2.47KB |
| 11. Closed Proprietary Intelligence.mp4 |
1.36MB |
| 11. Closed Proprietary Intelligence.vtt |
1.28KB |
| 11. Cloud Access Security Broker (CASB).mp4 |
1.69MB |
| 11. Cloud Access Security Broker (CASB).vtt |
1.72KB |
| 11. Communication Tests.mp4 |
2.13MB |
| 11. Communication Tests.vtt |
1.89KB |
| 11. Continuous Delivery and Continuous Development.mp4 |
3.59MB |
| 11. Continuous Delivery and Continuous Development.vtt |
3.75KB |
| 11. Data Steward Custodian.mp4 |
2.29MB |
| 11. Data Steward Custodian.vtt |
2.52KB |
| 11. Digital Rights Management (DRM).mp4 |
1.52MB |
| 11. Digital Rights Management (DRM).vtt |
1.77KB |
| 11. False Positive.mp4 |
1.69MB |
| 11. False Positive.vtt |
1.59KB |
| 11. Gramm-Leach-Bliley Act (GLBA).mp4 |
2.46MB |
| 11. Gramm-Leach-Bliley Act (GLBA).vtt |
2.53KB |
| 11. Hoaxes.mp4 |
6.29MB |
| 11. Hoaxes.vtt |
5.57KB |
| 11. HTTPS.mp4 |
2.50MB |
| 11. HTTPS.vtt |
2.78KB |
| 11. Managed Service Providers (MSP).mp4 |
7.55MB |
| 11. Managed Service Providers (MSP).vtt |
8.08KB |
| 11. Metadata.mp4 |
6.14MB |
| 11. Metadata.vtt |
6.01KB |
| 11. NIST SP 800-53 and ISO 27001.mp4 |
7.92MB |
| 11. NIST SP 800-53 and ISO 27001.vtt |
4.97KB |
| 11. Password Reuse.mp4 |
1.96MB |
| 11. Password Reuse.vtt |
2.15KB |
| 11. Quantum Communications.mp4 |
8.30MB |
| 11. Quantum Communications.vtt |
5.97KB |
| 11. Race Conditions.mp4 |
3.39MB |
| 11. Race Conditions.vtt |
2.92KB |
| 11. Spyware.mp4 |
2.47MB |
| 11. Spyware.vtt |
2.99KB |
| 11. Static Codes.mp4 |
1.31MB |
| 11. Static Codes.vtt |
1.26KB |
| 11. TACACS+.mp4 |
4.47MB |
| 11. TACACS+.vtt |
3.65KB |
| 11. Taking Hashes.mp4 |
3.31MB |
| 11. Taking Hashes.vtt |
3.45KB |
| 11. Third-party Risks.mp4 |
3.76MB |
| 11. Third-party Risks.vtt |
5.01KB |
| 11. Two Person Integrity (TPI) Control.mp4 |
1.58MB |
| 11. Two Person Integrity (TPI) Control.vtt |
1.30KB |
| 11. Types of Certificates.mp4 |
6.20MB |
| 11. Types of Certificates.vtt |
9.05KB |
| 11. Voice over IP (VoIP).mp4 |
5.09MB |
| 11. Voice over IP (VoIP).vtt |
3.84KB |
| 11. VPN Concentrator.mp4 |
2.16MB |
| 11. VPN Concentrator.vtt |
2.09KB |
| 11. Web Application Firewalls.mp4 |
3.98MB |
| 11. Web Application Firewalls.vtt |
4.29KB |
| 11. Wi-Fi Protected Setup (WPS).mp4 |
1.73MB |
| 11. Wi-Fi Protected Setup (WPS).vtt |
1.77KB |
| 110 |
505.98KB |
| 111 |
513.09KB |
| 112 |
515.21KB |
| 113 |
542.78KB |
| 114 |
545.15KB |
| 115 |
552.67KB |
| 116 |
562.05KB |
| 117 |
570.65KB |
| 118 |
649.23KB |
| 119 |
701.75KB |
| 12 |
5.11KB |
| 12. Application Security.mp4 |
1.73MB |
| 12. Application Security.vtt |
2.03KB |
| 12. Authentication Applications.mp4 |
2.00MB |
| 12. Authentication Applications.vtt |
1.76KB |
| 12. Backup Types.mp4 |
5.50MB |
| 12. Backup Types.vtt |
6.09KB |
| 12. Captive Portal.mp4 |
3.93MB |
| 12. Captive Portal.vtt |
4.06KB |
| 12. Certificate Formats.mp4 |
1.63MB |
| 12. Certificate Formats.vtt |
1.75KB |
| 12. Cloud Security Alliance (CSA).mp4 |
2.18MB |
| 12. Cloud Security Alliance (CSA).vtt |
1.46KB |
| 12. DNSSEC.mp4 |
7.09MB |
| 12. DNSSEC.vtt |
6.96KB |
| 12. False Positive Audits.mp4 |
1.25MB |
| 12. False Positive Audits.vtt |
1.04KB |
| 12. Fog Computing.mp4 |
4.79MB |
| 12. Fog Computing.vtt |
5.01KB |
| 12. Geo-tagging.mp4 |
2.61MB |
| 12. Geo-tagging.vtt |
2.96KB |
| 12. Hardware Based Encryption (TPM and HSM).mp4 |
2.94MB |
| 12. Hardware Based Encryption (TPM and HSM).vtt |
2.44KB |
| 12. Hardware Locks.mp4 |
1.15MB |
| 12. Hardware Locks.vtt |
1.48KB |
| 12. Hashing.mp4 |
4.38MB |
| 12. Hashing.vtt |
3.92KB |
| 12. HIPAA.mp4 |
2.38MB |
| 12. HIPAA.vtt |
2.25KB |
| 12. HVAC.mp4 |
3.83MB |
| 12. HVAC.vtt |
4.82KB |
| 12. IPMAC Spoofing.mp4 |
1.61MB |
| 12. IPMAC Spoofing.vtt |
1.51KB |
| 12. Keylogger.mp4 |
1.53MB |
| 12. Keylogger.vtt |
1.80KB |
| 12. Netflow, sFlow, and IPFIX.mp4 |
9.22MB |
| 12. Netflow, sFlow, and IPFIX.vtt |
9.49KB |
| 12. New Tools Are Constantly Developed.mp4 |
2.02MB |
| 12. New Tools Are Constantly Developed.vtt |
1.63KB |
| 12. oAUTH.mp4 |
3.25MB |
| 12. oAUTH.vtt |
3.40KB |
| 12. OWASP.mp4 |
940.96KB |
| 12. OWASP.vtt |
1.05KB |
| 12. Pivoting.mp4 |
3.37MB |
| 12. Pivoting.vtt |
3.99KB |
| 12. Prepending.mp4 |
3.15MB |
| 12. Prepending.vtt |
3.02KB |
| 12. Privacy Officer.mp4 |
851.66KB |
| 12. Privacy Officer.vtt |
923B |
| 12. Quantum Computing.mp4 |
2.48MB |
| 12. Quantum Computing.vtt |
2.25KB |
| 12. Route.mp4 |
983.76KB |
| 12. Route.vtt |
946B |
| 12. Screenshots.mp4 |
1.62MB |
| 12. Screenshots.vtt |
2.00KB |
| 12. Secure POPIMAP.mp4 |
4.90MB |
| 12. Secure POPIMAP.vtt |
5.72KB |
| 12. Securing the Environment using Isolation, Containment and Segment.mp4 |
3.20MB |
| 12. Securing the Environment using Isolation, Containment and Segment.vtt |
3.68KB |
| 12. Simulation (Tabletop) Tests.mp4 |
1.49MB |
| 12. Simulation (Tabletop) Tests.vtt |
1.80KB |
| 12. Time of Check.mp4 |
2.28MB |
| 12. Time of Check.vtt |
2.07KB |
| 12. Time of Day Restrictions.mp4 |
1.88MB |
| 12. Time of Day Restrictions.vtt |
1.73KB |
| 12. Unified Threat Management (UTM).mp4 |
1.57MB |
| 12. Unified Threat Management (UTM).vtt |
1.87KB |
| 12. Vendor Management.mp4 |
4.99MB |
| 12. Vendor Management.vtt |
3.78KB |
| 12. Vulnerability Databases.mp4 |
2.44MB |
| 12. Vulnerability Databases.vtt |
2.66KB |
| 120 |
739.91KB |
| 121 |
757.60KB |
| 122 |
830.32KB |
| 123 |
844.53KB |
| 124 |
873.42KB |
| 125 |
874.26KB |
| 126 |
876.48KB |
| 127 |
879.69KB |
| 128 |
888.27KB |
| 129 |
914.94KB |
| 13 |
5.77KB |
| 13. AircraftUAV.mp4 |
2.94MB |
| 13. AircraftUAV.vtt |
3.36KB |
| 13. Backup Environments.mp4 |
1.99MB |
| 13. Backup Environments.vtt |
2.41KB |
| 13. Biometrics.mp4 |
1.66MB |
| 13. Biometrics.vtt |
1.57KB |
| 13. Content Filters.mp4 |
2.09MB |
| 13. Content Filters.vtt |
1.88KB |
| 13. Context-aware Authentication.mp4 |
4.28MB |
| 13. Context-aware Authentication.vtt |
3.84KB |
| 13. Curl and Curl Demo.mp4 |
2.61MB |
| 13. Curl and Curl Demo.vtt |
2.83KB |
| 13. Detecting an Amplification Attack (ICMP echo).mp4 |
3.99MB |
| 13. Detecting an Amplification Attack (ICMP echo).vtt |
3.98KB |
| 13. Edge Computing.mp4 |
977.26KB |
| 13. Edge Computing.vtt |
944B |
| 13. False Negatives.mp4 |
1.23MB |
| 13. False Negatives.vtt |
1.33KB |
| 13. Geographical Considerations.mp4 |
2.93MB |
| 13. Geographical Considerations.vtt |
2.71KB |
| 13. HITECH Act.mp4 |
3.83MB |
| 13. HITECH Act.vtt |
3.46KB |
| 13. Impersonation.mp4 |
1.85MB |
| 13. Impersonation.vtt |
2.20KB |
| 13. Information Lifecycle.mp4 |
2.89MB |
| 13. Information Lifecycle.vtt |
3.78KB |
| 13. Installation Considerations.mp4 |
2.06MB |
| 13. Installation Considerations.vtt |
1.99KB |
| 13. MAC Flooding.mp4 |
3.58MB |
| 13. MAC Flooding.vtt |
3.69KB |
| 13. Monitoring Social Media.mp4 |
1.31MB |
| 13. Monitoring Social Media.vtt |
1.06KB |
| 13. Network Access Control (NAC).mp4 |
4.05MB |
| 13. Network Access Control (NAC).vtt |
5.18KB |
| 13. Next-gen Secure Web Gateway (NG-SWG).mp4 |
1.22MB |
| 13. Next-gen Secure Web Gateway (NG-SWG).vtt |
1.39KB |
| 13. Online vs. Offline Certificate Authority (CA).mp4 |
3.47MB |
| 13. Online vs. Offline Certificate Authority (CA).vtt |
3.65KB |
| 13. OpenID and Shibboleth.mp4 |
2.35MB |
| 13. OpenID and Shibboleth.vtt |
2.40KB |
| 13. Partial Exercise.mp4 |
1.58MB |
| 13. Partial Exercise.vtt |
1.73KB |
| 13. Post Quantum.mp4 |
1.70MB |
| 13. Post Quantum.vtt |
1.78KB |
| 13. Public and Private Information Sharing.mp4 |
1.94MB |
| 13. Public and Private Information Sharing.vtt |
2.33KB |
| 13. Push Notifications.mp4 |
1.60MB |
| 13. Push Notifications.vtt |
1.73KB |
| 13. Rootkits.mp4 |
2.24MB |
| 13. Rootkits.vtt |
2.54KB |
| 13. Salt.mp4 |
1.77MB |
| 13. Salt.vtt |
1.85KB |
| 13. Secure Coding Concepts, Error Handling, and Input Validation.mp4 |
6.96MB |
| 13. Secure Coding Concepts, Error Handling, and Input Validation.vtt |
8.61KB |
| 13. SOAR and RunbooksPlaybooks.mp4 |
8.83MB |
| 13. SOAR and RunbooksPlaybooks.vtt |
10.26KB |
| 13. Software Diversity, Compiler, and Binary.mp4 |
2.67MB |
| 13. Software Diversity, Compiler, and Binary.vtt |
2.65KB |
| 13. SSAE 18, SOC 1, 2, and 3.mp4 |
5.08MB |
| 13. SSAE 18, SOC 1, 2, and 3.vtt |
5.16KB |
| 13. Types of Reconnaissance.mp4 |
4.61MB |
| 13. Types of Reconnaissance.vtt |
5.21KB |
| 13. Use Cases.mp4 |
5.46MB |
| 13. Use Cases.vtt |
8.52KB |
| 13. User Access Best Practices.mp4 |
3.69MB |
| 13. User Access Best Practices.vtt |
4.82KB |
| 13. Vulnerable Business Processes.mp4 |
4.36MB |
| 13. Vulnerable Business Processes.vtt |
4.51KB |
| 13. Witnesses.mp4 |
3.84MB |
| 13. Witnesses.vtt |
3.82KB |
| 130 |
929.23KB |
| 131 |
939.31KB |
| 132 |
943.18KB |
| 133 |
944.24KB |
| 134 |
988.26KB |
| 135 |
4.38KB |
| 136 |
5.23KB |
| 137 |
25.79KB |
| 138 |
42.70KB |
| 139 |
44.41KB |
| 14 |
41.77KB |
| 14. Access PointsWi-Fi Security.mp4 |
6.16MB |
| 14. Access PointsWi-Fi Security.vtt |
6.77KB |
| 14. Backdoors.mp4 |
2.02MB |
| 14. Backdoors.vtt |
2.61KB |
| 14. Benchmarks and Secure Configuration Guid.mp4 |
3.22MB |
| 14. Benchmarks and Secure Configuration Guid.vtt |
3.53KB |
| 14. Cable Locks, Safes, and Locking Cabinets.mp4 |
1.90MB |
| 14. Cable Locks, Safes, and Locking Cabinets.vtt |
2.55KB |
| 14. Cloud Access Security Broker (CASB).mp4 |
2.09MB |
| 14. Cloud Access Security Broker (CASB).vtt |
1.95KB |
| 14. Dark Web.mp4 |
3.95MB |
| 14. Dark Web.vtt |
4.18KB |
| 14. Elasticity and Scalability.mp4 |
1.80MB |
| 14. Elasticity and Scalability.vtt |
2.16KB |
| 14. Employee Protections.mp4 |
1.25MB |
| 14. Employee Protections.vtt |
1.27KB |
| 14. Enforcement and Monitoring.mp4 |
7.25MB |
| 14. Enforcement and Monitoring.vtt |
8.74KB |
| 14. Ephemeral Key.mp4 |
1.63MB |
| 14. Ephemeral Key.vtt |
1.21KB |
| 14. Firewall Considerations in a Cloud Environment.mp4 |
3.97MB |
| 14. Firewall Considerations in a Cloud Environment.vtt |
3.70KB |
| 14. Full Exercise.mp4 |
1.26MB |
| 14. Full Exercise.vtt |
1.20KB |
| 14. Identity Fraud.mp4 |
2.58MB |
| 14. Identity Fraud.vtt |
2.30KB |
| 14. Implicit Deny and ACLs.mp4 |
1001.55KB |
| 14. Implicit Deny and ACLs.vtt |
1.21KB |
| 14. In-band vs. Out-of-band Management.mp4 |
7.83MB |
| 14. In-band vs. Out-of-band Management.vtt |
7.12KB |
| 14. Intrusive vs. Non-intrusive.mp4 |
971.06KB |
| 14. Intrusive vs. Non-intrusive.vtt |
937B |
| 14. Kerberos.mp4 |
6.00MB |
| 14. Kerberos.vtt |
6.64KB |
| 14. MAC Cloning.mp4 |
3.00MB |
| 14. MAC Cloning.vtt |
2.98KB |
| 14. Module Review.mp4 |
1.43MB |
| 14. Module Review.vtt |
1.70KB |
| 14. Online vs. Offline Backups.mp4 |
2.44MB |
| 14. Online vs. Offline Backups.vtt |
2.61KB |
| 14. Outsourced Code Mangement.mp4 |
1.57MB |
| 14. Outsourced Code Mangement.vtt |
1.92KB |
| 14. Permissions Auditing and Review.mp4 |
2.11MB |
| 14. Permissions Auditing and Review.vtt |
2.58KB |
| 14. Preservation of Evidence.mp4 |
1.86MB |
| 14. Preservation of Evidence.vtt |
2.86KB |
| 14. PrintersMFDs.mp4 |
2.91MB |
| 14. PrintersMFDs.vtt |
4.30KB |
| 14. Privacy Impact Assessment.mp4 |
3.16MB |
| 14. Privacy Impact Assessment.vtt |
3.18KB |
| 14. Protocol Analyzer Output.mp4 |
25.45MB |
| 14. Protocol Analyzer Output.vtt |
10.40KB |
| 14. Replay Attacks.mp4 |
2.15MB |
| 14. Replay Attacks.vtt |
1.90KB |
| 14. Sarbanes-Oxley Act (SOX).mp4 |
6.68MB |
| 14. Sarbanes-Oxley Act (SOX).vtt |
5.85KB |
| 14. Secure Coding Techniques.mp4 |
14.24MB |
| 14. Secure Coding Techniques.vtt |
12.63KB |
| 14. Smart Cards.mp4 |
1.54MB |
| 14. Smart Cards.vtt |
1.77KB |
| 14. Stapling and Pinning.mp4 |
1.38MB |
| 14. Stapling and Pinning.vtt |
1.51KB |
| 14. TheHarvester and Demo.mp4 |
4.66MB |
| 14. TheHarvester and Demo.vtt |
3.46KB |
| 14. VDI.mp4 |
7.53MB |
| 14. VDI.vtt |
8.14KB |
| 14. War Flying.mp4 |
2.75MB |
| 14. War Flying.vtt |
2.29KB |
| 140 |
45.35KB |
| 141 |
79.39KB |
| 142 |
83.50KB |
| 143 |
98.01KB |
| 144 |
112.31KB |
| 145 |
116.71KB |
| 146 |
117.64KB |
| 147 |
134.26KB |
| 148 |
136.84KB |
| 149 |
151.44KB |
| 15 |
285.61KB |
| 15. Attribute Based Access Control (ABAC).mp4 |
5.19MB |
| 15. Attribute Based Access Control (ABAC).vtt |
4.92KB |
| 15. Backups - Distance Considerations.mp4 |
3.41MB |
| 15. Backups - Distance Considerations.vtt |
3.71KB |
| 15. Band SelectionWidth.mp4 |
3.51MB |
| 15. Band SelectionWidth.vtt |
2.94KB |
| 15. BYOD Concerns and Deployment Models.mp4 |
6.01MB |
| 15. BYOD Concerns and Deployment Models.vtt |
7.47KB |
| 15. Cipher Modes.mp4 |
1.10MB |
| 15. Cipher Modes.vtt |
1.20KB |
| 15. Code Quality and Testing.mp4 |
4.66MB |
| 15. Code Quality and Testing.vtt |
5.47KB |
| 15. DNS Poisoning.mp4 |
1.86MB |
| 15. DNS Poisoning.vtt |
1.78KB |
| 15. GDPR.mp4 |
1.74MB |
| 15. GDPR.vtt |
1.45KB |
| 15. Improper or Weak Patch Management.mp4 |
3.37MB |
| 15. Improper or Weak Patch Management.vtt |
4.48KB |
| 15. Indicators of Compromise (IOC).mp4 |
3.01MB |
| 15. Indicators of Compromise (IOC).vtt |
3.33KB |
| 15. Integer Overflow.mp4 |
2.40MB |
| 15. Integer Overflow.vtt |
2.00KB |
| 15. Invoice Scam.mp4 |
4.61MB |
| 15. Invoice Scam.vtt |
2.70KB |
| 15. Onboarding Offboarding.mp4 |
1.28MB |
| 15. Onboarding Offboarding.vtt |
1.48KB |
| 15. Overall Cost and Complexity of Testing.mp4 |
1.34MB |
| 15. Overall Cost and Complexity of Testing.vtt |
1.77KB |
| 15. Passively Test Security Controls.mp4 |
946.72KB |
| 15. Passively Test Security Controls.vtt |
1.13KB |
| 15. Port Security and 802.1x.mp4 |
7.45MB |
| 15. Port Security and 802.1x.vtt |
7.55KB |
| 15. Proximity Cards.mp4 |
2.00MB |
| 15. Proximity Cards.vtt |
2.27KB |
| 15. Real Time Operating Systems (RTOS).mp4 |
1.42MB |
| 15. Real Time Operating Systems (RTOS).vtt |
1.58KB |
| 15. Recertification.mp4 |
2.60MB |
| 15. Recertification.vtt |
3.33KB |
| 15. Recovery.mp4 |
2.33MB |
| 15. Recovery.vtt |
2.79KB |
| 15. Route Security.mp4 |
2.77MB |
| 15. Route Security.vtt |
2.84KB |
| 15. Security-as-a-Service (SECaaS).mp4 |
1.96MB |
| 15. Security-as-a-Service (SECaaS).vtt |
1.92KB |
| 15. Sn1per and Demo.mp4 |
13.75MB |
| 15. Sn1per and Demo.vtt |
7.55KB |
| 15. Spraying.mp4 |
3.05MB |
| 15. Spraying.vtt |
2.35KB |
| 15. Systems Hardening.mp4 |
4.15MB |
| 15. Systems Hardening.vtt |
4.99KB |
| 15. TCPIP and OSI Models.mp4 |
1.22MB |
| 15. TCPIP and OSI Models.vtt |
1.22KB |
| 15. Terms of Agreement and Privacy Notice.mp4 |
3.19MB |
| 15. Terms of Agreement and Privacy Notice.vtt |
3.68KB |
| 15. Trust Models.mp4 |
2.88MB |
| 15. Trust Models.vtt |
3.17KB |
| 15. USB Data Blocker.mp4 |
2.10MB |
| 15. USB Data Blocker.vtt |
1.92KB |
| 15. Version Control.mp4 |
4.17MB |
| 15. Version Control.vtt |
4.33KB |
| 15. Virtualization.mp4 |
7.89MB |
| 15. Virtualization.vtt |
6.80KB |
| 15. War Driving.mp4 |
2.17MB |
| 15. War Driving.vtt |
2.32KB |
| 150 |
157.18KB |
| 151 |
158.39KB |
| 152 |
159.80KB |
| 153 |
178.39KB |
| 154 |
185.46KB |
| 155 |
205.20KB |
| 156 |
218.68KB |
| 157 |
220.07KB |
| 158 |
227.85KB |
| 159 |
238.03KB |
| 16 |
359.48KB |
| 16. Additional BYOD Concerns.mp4 |
4.24MB |
| 16. Additional BYOD Concerns.vtt |
5.66KB |
| 16. Application Layer, Protocol Layer, and Volumetric Attacks.mp4 |
3.85MB |
| 16. Application Layer, Protocol Layer, and Volumetric Attacks.vtt |
3.71KB |
| 16. Automate Indicator Sharing (AIS).mp4 |
2.48MB |
| 16. Automate Indicator Sharing (AIS).vtt |
1.65KB |
| 16. Brute Force and Dictionary Attacks.mp4 |
5.15MB |
| 16. Brute Force and Dictionary Attacks.vtt |
3.90KB |
| 16. Containers.mp4 |
9.72MB |
| 16. Containers.vtt |
10.61KB |
| 16. Credentialed vs. Non-credentialed.mp4 |
4.62MB |
| 16. Credentialed vs. Non-credentialed.vtt |
4.43KB |
| 16. Credential Harvesting.mp4 |
4.53MB |
| 16. Credential Harvesting.vtt |
4.53KB |
| 16. Cross Site Request Forgery (XSRF).mp4 |
4.38MB |
| 16. Cross Site Request Forgery (XSRF).vtt |
4.51KB |
| 16. Culture and Creating a Culture of Security.mp4 |
3.14MB |
| 16. Culture and Creating a Culture of Security.vtt |
3.18KB |
| 16. Differences between CASB and SECaaS.mp4 |
2.15MB |
| 16. Differences between CASB and SECaaS.vtt |
1.94KB |
| 16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based.mp4 |
5.79MB |
| 16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based.vtt |
5.63KB |
| 16. Fencing.mp4 |
4.35MB |
| 16. Fencing.vtt |
2.71KB |
| 16. Group Policy.mp4 |
3.45MB |
| 16. Group Policy.vtt |
4.16KB |
| 16. Key Escrow.mp4 |
2.71MB |
| 16. Key Escrow.vtt |
2.50KB |
| 16. Legacy Platforms.mp4 |
2.70MB |
| 16. Legacy Platforms.vtt |
3.07KB |
| 16. Loop Protection and Flood Guards.mp4 |
3.03MB |
| 16. Loop Protection and Flood Guards.vtt |
4.06KB |
| 16. Non-persistence, Snapshots, and Live Boot Media.mp4 |
3.30MB |
| 16. Non-persistence, Snapshots, and Live Boot Media.vtt |
3.81KB |
| 16. Personal Identification Verification Card (PIV).mp4 |
1.77MB |
| 16. Personal Identification Verification Card (PIV).vtt |
1.41KB |
| 16. Plan Review and Maintenance.mp4 |
4.92MB |
| 16. Plan Review and Maintenance.vtt |
3.28KB |
| 16. Qualitative and Quantitative Analysis.mp4 |
4.79MB |
| 16. Qualitative and Quantitative Analysis.vtt |
4.40KB |
| 16. Quality of Service (QoS).mp4 |
3.03MB |
| 16. Quality of Service (QoS).vtt |
3.41KB |
| 16. Red, Blue, Purple, and White Security Teams.mp4 |
3.13MB |
| 16. Red, Blue, Purple, and White Security Teams.vtt |
4.12KB |
| 16. Rule-basedRole-based Access Control (RBAC).mp4 |
3.02MB |
| 16. Rule-basedRole-based Access Control (RBAC).vtt |
2.81KB |
| 16. Scanless and Demo.mp4 |
5.47MB |
| 16. Scanless and Demo.vtt |
3.12KB |
| 16. Static Code Analysis.mp4 |
3.59MB |
| 16. Static Code Analysis.vtt |
4.31KB |
| 16. Strategic Intelligence Counterintelligence Gathering.mp4 |
3.00MB |
| 16. Strategic Intelligence Counterintelligence Gathering.vtt |
2.64KB |
| 16. Surveillance Systems.mp4 |
2.67MB |
| 16. Surveillance Systems.vtt |
3.05KB |
| 16. Typo Squatting URL Hijacking.mp4 |
3.50MB |
| 16. Typo Squatting URL Hijacking.vtt |
4.33KB |
| 16. Vendor and Control Diversity.mp4 |
2.34MB |
| 16. Vendor and Control Diversity.vtt |
3.04KB |
| 16. XOR Function.mp4 |
2.25MB |
| 16. XOR Function.vtt |
1.92KB |
| 160 |
240.79KB |
| 161 |
272.39KB |
| 162 |
293.48KB |
| 163 |
317.20KB |
| 164 |
345.21KB |
| 165 |
346.06KB |
| 166 |
355.87KB |
| 167 |
387.38KB |
| 168 |
399.04KB |
| 169 |
399.16KB |
| 17 |
365.33KB |
| 17. Access Control Methods.mp4 |
1.81MB |
| 17. Access Control Methods.vtt |
2.14KB |
| 17. API Attacks.mp4 |
3.28MB |
| 17. API Attacks.vtt |
3.47KB |
| 17. Certificate Chaining.mp4 |
1.52MB |
| 17. Certificate Chaining.vtt |
1.80KB |
| 17. Common Access Card.mp4 |
1.67MB |
| 17. Common Access Card.vtt |
1.35KB |
| 17. Cost.mp4 |
2.02MB |
| 17. Cost.vtt |
2.43KB |
| 17. Cryptographic Methods and Design.mp4 |
6.71MB |
| 17. Cryptographic Methods and Design.vtt |
5.72KB |
| 17. Data Integrity.mp4 |
3.01MB |
| 17. Data Integrity.vtt |
3.65KB |
| 17. Distributed Denial of Service (DDoS).mp4 |
4.27MB |
| 17. Distributed Denial of Service (DDoS).vtt |
3.85KB |
| 17. DNSenum.mp4 |
1.78MB |
| 17. DNSenum.vtt |
1.13KB |
| 17. Expiration.mp4 |
3.78MB |
| 17. Expiration.vtt |
4.64KB |
| 17. Fire Suppression.mp4 |
5.97MB |
| 17. Fire Suppression.vtt |
5.11KB |
| 17. Fuzzing.mp4 |
8.42MB |
| 17. Fuzzing.vtt |
6.83KB |
| 17. High Availability.mp4 |
3.43MB |
| 17. High Availability.vtt |
4.17KB |
| 17. Identify Vulnerabilities and Lack of Security Controls.mp4 |
2.86MB |
| 17. Identify Vulnerabilities and Lack of Security Controls.vtt |
3.01KB |
| 17. Impact Areas.mp4 |
1.80MB |
| 17. Impact Areas.vtt |
3.47KB |
| 17. Implications of IPv6.mp4 |
4.30MB |
| 17. Implications of IPv6.vtt |
4.19KB |
| 17. Microservices and APIs.mp4 |
6.43MB |
| 17. Microservices and APIs.vtt |
6.76KB |
| 17. Module Review.mp4 |
516.01KB |
| 17. Module Review.mp4 |
598.32KB |
| 17. Module Review.mp4 |
593.17KB |
| 17. Module Review.mp4 |
1.34MB |
| 17. Module Review.vtt |
2.10KB |
| 17. Module Review.vtt |
952B |
| 17. Module Review.vtt |
704B |
| 17. Module Review.vtt |
678B |
| 17. Rainbow Tables.mp4 |
3.37MB |
| 17. Rainbow Tables.vtt |
3.51KB |
| 17. Recovery.mp4 |
2.56MB |
| 17. Recovery.vtt |
2.81KB |
| 17. Review Process Outcomes.mp4 |
1.99MB |
| 17. Review Process Outcomes.vtt |
1.40KB |
| 17. Risk Calculation.mp4 |
2.09MB |
| 17. Risk Calculation.vtt |
2.43KB |
| 17. Setting the Stage.mp4 |
1.42MB |
| 17. Setting the Stage.vtt |
1.96KB |
| 17. Spanning Tree Protocol (STP).mp4 |
5.00MB |
| 17. Spanning Tree Protocol (STP).vtt |
5.24KB |
| 17. System on a Chip (SoC).mp4 |
1.79MB |
| 17. System on a Chip (SoC).vtt |
2.13KB |
| 17. TAXII Layout.mp4 |
1.65MB |
| 17. TAXII Layout.vtt |
1.87KB |
| 17. Watering Hole Attack.mp4 |
4.97MB |
| 17. Watering Hole Attack.vtt |
3.41KB |
| 170 |
480.52KB |
| 171 |
498.57KB |
| 172 |
500.59KB |
| 173 |
503.44KB |
| 174 |
519.20KB |
| 175 |
532.25KB |
| 176 |
545.70KB |
| 177 |
547.17KB |
| 178 |
560.97KB |
| 179 |
574.02KB |
| 18 |
425.61KB |
| 18. 5G Networks and Security Concerns.mp4 |
3.03MB |
| 18. 5G Networks and Security Concerns.vtt |
2.71KB |
| 18. Additional Secure Coding Concepts.mp4 |
2.98MB |
| 18. Additional Secure Coding Concepts.vtt |
3.75KB |
| 18. Awareness Training.mp4 |
2.10MB |
| 18. Awareness Training.vtt |
1.30KB |
| 18. Biometric Factors.mp4 |
1.38MB |
| 18. Biometric Factors.vtt |
2.09KB |
| 18. Blockchain.mp4 |
7.78MB |
| 18. Blockchain.vtt |
6.80KB |
| 18. Cloud Native Controls vs. Third-party Solutions.mp4 |
5.44MB |
| 18. Cloud Native Controls vs. Third-party Solutions.vtt |
5.63KB |
| 18. DHCP Snooping.mp4 |
1.89MB |
| 18. DHCP Snooping.vtt |
1.89KB |
| 18. Effects of Impacts.mp4 |
2.50MB |
| 18. Effects of Impacts.vtt |
3.45KB |
| 18. Identify Common Misconfigurations.mp4 |
3.05MB |
| 18. Identify Common Misconfigurations.vtt |
3.21KB |
| 18. Infrastructure as Code (IAC).mp4 |
1.39MB |
| 18. Infrastructure as Code (IAC).vtt |
1.32KB |
| 18. Known Plain Text Ciphertext.mp4 |
1.72MB |
| 18. Known Plain Text Ciphertext.vtt |
1.54KB |
| 18. Likelihood of Threat.mp4 |
1.76MB |
| 18. Likelihood of Threat.vtt |
1.43KB |
| 18. Mandatory Access Control (MAC).mp4 |
1.90MB |
| 18. Mandatory Access Control (MAC).vtt |
1.84KB |
| 18. MITRE.mp4 |
6.18MB |
| 18. MITRE.vtt |
4.12KB |
| 18. Motion Detection Infrared.mp4 |
1.42MB |
| 18. Motion Detection Infrared.vtt |
1.48KB |
| 18. Nessus and Cuckoo.mp4 |
4.82MB |
| 18. Nessus and Cuckoo.vtt |
4.60KB |
| 18. Non-repudiation.mp4 |
1.41MB |
| 18. Non-repudiation.vtt |
1.59KB |
| 18. Port Mirroring, Port Spanning, and Port Taps.mp4 |
6.52MB |
| 18. Port Mirroring, Port Spanning, and Port Taps.vtt |
5.59KB |
| 18. Recovery.mp4 |
2.79MB |
| 18. Recovery.vtt |
2.87KB |
| 18. Redundancy.mp4 |
2.70MB |
| 18. Redundancy.vtt |
2.88KB |
| 18. Resource Exhaustion.mp4 |
4.10MB |
| 18. Resource Exhaustion.vtt |
3.62KB |
| 18. Secure Protocols and SSLTLS Inspection.mp4 |
3.11MB |
| 18. Secure Protocols and SSLTLS Inspection.vtt |
2.73KB |
| 18. Smurf Attack (Amplification).mp4 |
5.26MB |
| 18. Smurf Attack (Amplification).vtt |
5.40KB |
| 18. Typo Squatting URL Hijacking.mp4 |
3.49MB |
| 18. Typo Squatting URL Hijacking.vtt |
4.23KB |
| 18. Wired Brain Coffees Testing.mp4 |
4.01MB |
| 18. Wired Brain Coffees Testing.vtt |
3.49KB |
| 180 |
581.34KB |
| 181 |
613.51KB |
| 182 |
617.98KB |
| 183 |
618.16KB |
| 184 |
633.35KB |
| 185 |
637.16KB |
| 186 |
643.57KB |
| 187 |
653.44KB |
| 188 |
658.48KB |
| 189 |
663.76KB |
| 19 |
3.93KB |
| 19. Birthday Attack.mp4 |
4.76MB |
| 19. Birthday Attack.vtt |
4.04KB |
| 19. DDoS Attack Vectors.mp4 |
1.93MB |
| 19. DDoS Attack Vectors.vtt |
1.82KB |
| 19. Discretionary Access Control (DAC).mp4 |
1.27MB |
| 19. Discretionary Access Control (DAC).vtt |
1.33KB |
| 19. Facial Recognition.mp4 |
2.84MB |
| 19. Facial Recognition.vtt |
2.81KB |
| 19. Fault Tolerant Hardware.mp4 |
1.38MB |
| 19. Fault Tolerant Hardware.vtt |
1.40KB |
| 19. File Integrity Check.vtt |
3.99KB |
| 19. File Manipulation (Head, Tail, Cat, GREP and Logger).mp4 |
4.48MB |
| 19. File Manipulation (Head, Tail, Cat, GREP and Logger).vtt |
4.71KB |
| 19. Fundamental Differences and Encryption Methods.mp4 |
4.85MB |
| 19. Fundamental Differences and Encryption Methods.vtt |
4.26KB |
| 19. Gathering and Correlating Information.mp4 |
3.57MB |
| 19. Gathering and Correlating Information.vtt |
3.38KB |
| 19. Hashing.mp4 |
3.27MB |
| 19. Hashing.vtt |
3.08KB |
| 19. Hybrid Warfare.mp4 |
4.45MB |
| 19. Hybrid Warfare.vtt |
5.12KB |
| 19. Impact of Threat.mp4 |
1.08MB |
| 19. Impact of Threat.vtt |
1.05KB |
| 19. Impossible TravelRisky Login.mp4 |
4.40MB |
| 19. Impossible TravelRisky Login.vtt |
4.62KB |
| 19. Intelligence Lifecycle.mp4 |
810.98KB |
| 19. Intelligence Lifecycle.vtt |
914B |
| 19. MAC Filtering.mp4 |
4.40MB |
| 19. MAC Filtering.vtt |
3.46KB |
| 19. Memory Leak.mp4 |
3.01MB |
| 19. Memory Leak.vtt |
3.27KB |
| 19. Narrow-band and Baseband Radio.mp4 |
1.05MB |
| 19. Narrow-band and Baseband Radio.vtt |
1.17KB |
| 19. On-prem vs. Cloud Challenges and Right to Audit.mp4 |
5.79MB |
| 19. On-prem vs. Cloud Challenges and Right to Audit.vtt |
6.61KB |
| 19. Peripherals Security.mp4 |
3.46MB |
| 19. Peripherals Security.vtt |
4.56KB |
| 19. Proximity Readers.mp4 |
1.99MB |
| 19. Proximity Readers.vtt |
2.00KB |
| 19. Skills Training.mp4 |
3.14MB |
| 19. Skills Training.vtt |
2.84KB |
| 19. Software Defined Networking (SDN).mp4 |
2.02MB |
| 19. Software Defined Networking (SDN).vtt |
1.78KB |
| 19. Things to Remember.mp4 |
3.96MB |
| 19. Things to Remember.vtt |
4.75KB |
| 190 |
666.95KB |
| 191 |
707.10KB |
| 192 |
710.99KB |
| 193 |
720.82KB |
| 194 |
724.00KB |
| 195 |
730.41KB |
| 196 |
731.37KB |
| 197 |
734.01KB |
| 198 |
746.29KB |
| 199 |
767.48KB |
| 2 |
545B |
| 2. Exam Tips.mp4 |
2.36MB |
| 2. Exam Tips.vtt |
2.61KB |
| 2. Goals of the Module.mp4 |
2.37MB |
| 2. Goals of the Module.vtt |
2.55KB |
| 2. Passing the Exam - Whats Next.mp4 |
2.31MB |
| 2. Passing the Exam - Whats Next.vtt |
2.57KB |
| 20 |
47.81KB |
| 20. API Considerations and API Gateways.mp4 |
4.89MB |
| 20. API Considerations and API Gateways.vtt |
3.91KB |
| 20. CHMOD.mp4 |
1.85MB |
| 20. CHMOD.vtt |
1.81KB |
| 20. Common Vulnerabilities and Exposures (CVE).mp4 |
8.21MB |
| 20. Common Vulnerabilities and Exposures (CVE).vtt |
5.07KB |
| 20. Conditional Access.mp4 |
1.79MB |
| 20. Conditional Access.vtt |
2.08KB |
| 20. Downgrade Attack.mp4 |
1.85MB |
| 20. Downgrade Attack.vtt |
1.70KB |
| 20. Drones UAV.mp4 |
1.64MB |
| 20. Drones UAV.vtt |
1.70KB |
| 20. Funding and Executive Buy-in.mp4 |
2.43MB |
| 20. Funding and Executive Buy-in.vtt |
1.91KB |
| 20. Hardening the Environment.mp4 |
4.10MB |
| 20. Hardening the Environment.vtt |
4.89KB |
| 20. Lockout.mp4 |
1.18MB |
| 20. Lockout.vtt |
1.33KB |
| 20. Loss Calculation Terms (ALE, SLE, and ARO).mp4 |
4.87MB |
| 20. Loss Calculation Terms (ALE, SLE, and ARO).vtt |
4.26KB |
| 20. Malicious Code Execution.mp4 |
2.97MB |
| 20. Malicious Code Execution.vtt |
3.32KB |
| 20. Module Review.mp4 |
667.92KB |
| 20. Module Review.mp4 |
615.53KB |
| 20. Module Review.vtt |
835B |
| 20. Module Review.vtt |
758B |
| 20. Predictive Analysis.mp4 |
2.01MB |
| 20. Predictive Analysis.vtt |
1.83KB |
| 20. Regulatory Jurisdictional Issues.mp4 |
4.51MB |
| 20. Regulatory Jurisdictional Issues.vtt |
3.78KB |
| 20. Session Keys.mp4 |
1.57MB |
| 20. Session Keys.vtt |
1.52KB |
| 20. Social Media and Influence Campaigns.mp4 |
2.02MB |
| 20. Social Media and Influence Campaigns.vtt |
1.99KB |
| 20. Software Defined Visibility (SDV).mp4 |
1.57MB |
| 20. Software Defined Visibility (SDV).vtt |
1.11KB |
| 20. SSL Stripping.mp4 |
3.07MB |
| 20. SSL Stripping.vtt |
3.66KB |
| 20. Technology and Vendor Diversity.mp4 |
3.88MB |
| 20. Technology and Vendor Diversity.vtt |
2.89KB |
| 20. Threat Intelligence Lifecycle.mp4 |
2.25MB |
| 20. Threat Intelligence Lifecycle.vtt |
2.66KB |
| 20. Vein and Gait Analysis.mp4 |
3.65MB |
| 20. Vein and Gait Analysis.vtt |
2.87KB |
| 20. Zigbee.mp4 |
4.84MB |
| 20. Zigbee.vtt |
4.45KB |
| 200 |
776.37KB |
| 201 |
806.50KB |
| 202 |
823.10KB |
| 203 |
823.91KB |
| 204 |
852.10KB |
| 205 |
855.34KB |
| 206 |
873.74KB |
| 207 |
875.55KB |
| 208 |
881.18KB |
| 209 |
881.88KB |
| 21 |
2.00KB |
| 21. Asymmetric Encryption.mp4 |
7.71MB |
| 21. Asymmetric Encryption.vtt |
6.03KB |
| 21. Common Ports.mp4 |
2.45MB |
| 21. Common Ports.vtt |
2.09KB |
| 21. Constraints.mp4 |
4.36MB |
| 21. Constraints.vtt |
4.49KB |
| 21. Continuous Improvement.mp4 |
1.21MB |
| 21. Continuous Improvement.vtt |
1.16KB |
| 21. Crypto and Control Diversity.mp4 |
4.14MB |
| 21. Crypto and Control Diversity.vtt |
4.49KB |
| 21. CVSS.mp4 |
4.71MB |
| 21. CVSS.vtt |
3.21KB |
| 21. Cyberthreat Intelligence Frameworks.mp4 |
1.77MB |
| 21. Cyberthreat Intelligence Frameworks.vtt |
1.73KB |
| 21. Data Breach Notification Laws.mp4 |
4.10MB |
| 21. Data Breach Notification Laws.vtt |
4.22KB |
| 21. Disablement.mp4 |
1.72MB |
| 21. Disablement.vtt |
1.44KB |
| 21. Efficacy Rates.mp4 |
1.61MB |
| 21. Efficacy Rates.vtt |
2.15KB |
| 21. Logs.mp4 |
1.27MB |
| 21. Logs.vtt |
1.50KB |
| 21. Physical Attacks, Malicious USB, and Skimming.mp4 |
6.25MB |
| 21. Physical Attacks, Malicious USB, and Skimming.vtt |
7.24KB |
| 21. Privileged Accounts.mp4 |
1.98MB |
| 21. Privileged Accounts.vtt |
2.11KB |
| 21. Reasons for Effectiveness - Authority and Intimidation.mp4 |
3.06MB |
| 21. Reasons for Effectiveness - Authority and Intimidation.vtt |
3.47KB |
| 21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).mp4 |
5.11MB |
| 21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).vtt |
5.44KB |
| 21. Serverless Architecture.mp4 |
4.80MB |
| 21. Serverless Architecture.vtt |
3.23KB |
| 21. Shell and Script Environments (SSH, PowerShell, Python and O.mp4 |
2.40MB |
| 21. Shell and Script Environments (SSH, PowerShell, Python and O.vtt |
2.36KB |
| 21. Shimming.mp4 |
1.71MB |
| 21. Shimming.vtt |
1.98KB |
| 21. Threat Assessment (Disaster).mp4 |
2.75MB |
| 21. Threat Assessment (Disaster).vtt |
3.85KB |
| 21. Threat Maps.mp4 |
1.37MB |
| 21. Threat Maps.vtt |
1.39KB |
| 210 |
916.89KB |
| 211 |
919.61KB |
| 212 |
925.12KB |
| 213 |
930.23KB |
| 214 |
931.49KB |
| 215 |
945.38KB |
| 216 |
970.86KB |
| 217 |
971.40KB |
| 218 |
973.57KB |
| 219 |
975.14KB |
| 22 |
39.28KB |
| 22. Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).mp4 |
2.30MB |
| 22. Additional Risk Calculation Terms (MTBF, MTTF, and MTTR).vtt |
2.19KB |
| 22. Adversarial Artificial Intelligence (AI).mp4 |
3.46MB |
| 22. Adversarial Artificial Intelligence (AI).vtt |
3.31KB |
| 22. Air Gaps.mp4 |
5.56MB |
| 22. Air Gaps.vtt |
6.23KB |
| 22. Consensus and Social Proof.mp4 |
1.50MB |
| 22. Consensus and Social Proof.vtt |
1.62KB |
| 22. Cyber Kill Chain.mp4 |
3.99MB |
| 22. Cyber Kill Chain.vtt |
3.28KB |
| 22. Disaster Area Example.mp4 |
3.10MB |
| 22. Disaster Area Example.vtt |
3.21KB |
| 22. Filesystem Permissions.mp4 |
2.35MB |
| 22. Filesystem Permissions.vtt |
2.82KB |
| 22. IaaS, PaaS, FaaS, and SaaS Differentiators.mp4 |
1.92MB |
| 22. IaaS, PaaS, FaaS, and SaaS Differentiators.vtt |
1.77KB |
| 22. Identification vs. Authentication vs. Authorization.mp4 |
1.99MB |
| 22. Identification vs. Authentication vs. Authorization.vtt |
2.07KB |
| 22. Lightweight Encryption.mp4 |
1.76MB |
| 22. Lightweight Encryption.vtt |
1.55KB |
| 22. Live Cyber Threat Map.mp4 |
3.85MB |
| 22. Live Cyber Threat Map.vtt |
988B |
| 22. Module Review.mp4 |
586.86KB |
| 22. Module Review.vtt |
892B |
| 22. Packet Capture and TCPDump Demo.mp4 |
8.46MB |
| 22. Packet Capture and TCPDump Demo.vtt |
4.66KB |
| 22. Refactoring.mp4 |
1.41MB |
| 22. Refactoring.vtt |
1.75KB |
| 22. Registry Hardening.mp4 |
2.51MB |
| 22. Registry Hardening.vtt |
2.89KB |
| 22. Security Information and Event Management (SEIM).mp4 |
4.35MB |
| 22. Security Information and Event Management (SEIM).vtt |
3.71KB |
| 22. Wired Brain Coffees Approach to Training.mp4 |
2.92MB |
| 22. Wired Brain Coffees Approach to Training.vtt |
3.47KB |
| 220 |
1006.08KB |
| 221 |
1013.16KB |
| 222 |
1015.76KB |
| 223 |
1020.70KB |
| 224 |
5.63KB |
| 225 |
12.50KB |
| 226 |
14.07KB |
| 227 |
21.26KB |
| 228 |
28.79KB |
| 229 |
38.95KB |
| 23 |
92.97KB |
| 23. Business Impact Analysis - Key Terminology.mp4 |
9.13MB |
| 23. Business Impact Analysis - Key Terminology.vtt |
9.06KB |
| 23. Demilitarized Zone (DMZ).mp4 |
6.79MB |
| 23. Demilitarized Zone (DMZ).vtt |
8.09KB |
| 23. Diamond Model.mp4 |
2.99MB |
| 23. Diamond Model.vtt |
3.54KB |
| 23. Familiarity Liking.mp4 |
1.19MB |
| 23. Familiarity Liking.vtt |
1.39KB |
| 23. File Code Repositories.mp4 |
2.56MB |
| 23. File Code Repositories.vtt |
2.79KB |
| 23. Forensics.mp4 |
8.75MB |
| 23. Forensics.vtt |
10.04KB |
| 23. Honeypots and Honeyfiles.mp4 |
2.13MB |
| 23. Honeypots and Honeyfiles.vtt |
1.84KB |
| 23. Multifactor Authentication.mp4 |
1.62MB |
| 23. Multifactor Authentication.vtt |
1.96KB |
| 23. Pass the Hash.mp4 |
4.20MB |
| 23. Pass the Hash.vtt |
3.21KB |
| 23. Security Orchestration, Automation, and Response.mp4 |
2.79MB |
| 23. Security Orchestration, Automation, and Response.vtt |
3.59KB |
| 23. Self-encrypting Drives (SED).mp4 |
3.82MB |
| 23. Self-encrypting Drives (SED).vtt |
3.87KB |
| 23. Service Integrations and Resource Policies.mp4 |
2.47MB |
| 23. Service Integrations and Resource Policies.vtt |
2.69KB |
| 23. Steganography.mp4 |
4.47MB |
| 23. Steganography.vtt |
3.95KB |
| 23. Supply Chain Attacks.mp4 |
3.74MB |
| 23. Supply Chain Attacks.vtt |
3.82KB |
| 23. Technology Diversity.mp4 |
1.18MB |
| 23. Technology Diversity.vtt |
1.40KB |
| 230 |
49.74KB |
| 231 |
62.01KB |
| 232 |
68.10KB |
| 233 |
83.40KB |
| 234 |
87.46KB |
| 235 |
92.34KB |
| 236 |
126.30KB |
| 237 |
153.36KB |
| 238 |
156.32KB |
| 239 |
157.71KB |
| 24 |
58.75KB |
| 24. Authentication Factors.mp4 |
3.29MB |
| 24. Authentication Factors.vtt |
3.63KB |
| 24. Exploitation Frameworks.mp4 |
4.29MB |
| 24. Exploitation Frameworks.vtt |
3.87KB |
| 24. Hardware Root of Trust.mp4 |
2.28MB |
| 24. Hardware Root of Trust.vtt |
2.21KB |
| 24. Homomorphic Encryption.mp4 |
3.35MB |
| 24. Homomorphic Encryption.vtt |
3.83KB |
| 24. Honeynets.mp4 |
1.97MB |
| 24. Honeynets.vtt |
1.83KB |
| 24. Mission Essential Functions.mp4 |
3.57MB |
| 24. Mission Essential Functions.vtt |
3.82KB |
| 24. MITRE Attack Framework.mp4 |
6.25MB |
| 24. MITRE Attack Framework.vtt |
4.35KB |
| 24. Module Review.mp4 |
641.12KB |
| 24. Module Review.vtt |
854B |
| 24. Protected Distribution System (PDS).mp4 |
8.03MB |
| 24. Protected Distribution System (PDS).vtt |
6.99KB |
| 24. Research Sources.mp4 |
7.41MB |
| 24. Research Sources.vtt |
5.81KB |
| 24. Supply Chain Attack Example.mp4 |
2.59MB |
| 24. Supply Chain Attack Example.vtt |
2.73KB |
| 24. Transit Gateway.mp4 |
1.37MB |
| 24. Transit Gateway.vtt |
1.13KB |
| 24. Trust.mp4 |
1.15MB |
| 24. Trust.vtt |
1.35KB |
| 24. Vendor Diversity.mp4 |
2.14MB |
| 24. Vendor Diversity.vtt |
1.20KB |
| 240 |
162.79KB |
| 241 |
172.06KB |
| 242 |
177.37KB |
| 243 |
185.38KB |
| 244 |
185.69KB |
| 245 |
201.91KB |
| 246 |
208.28KB |
| 247 |
221.41KB |
| 248 |
234.79KB |
| 249 |
247.96KB |
| 25 |
84.06KB |
| 25. Authorization.mp4 |
1.65MB |
| 25. Authorization.vtt |
1.77KB |
| 25. Cloud-Based vs. On-prem Attacks.mp4 |
7.11MB |
| 25. Cloud-Based vs. On-prem Attacks.vtt |
6.50KB |
| 25. Common Use Cases.mp4 |
5.98MB |
| 25. Common Use Cases.vtt |
6.98KB |
| 25. Data Sanitization Tools.mp4 |
10.41MB |
| 25. Data Sanitization Tools.vtt |
8.80KB |
| 25. Fake Telemetry.mp4 |
2.18MB |
| 25. Fake Telemetry.vtt |
2.25KB |
| 25. Hardware Based Encryption.mp4 |
4.83MB |
| 25. Hardware Based Encryption.vtt |
4.62KB |
| 25. Hot and Cold Aisles.mp4 |
4.87MB |
| 25. Hot and Cold Aisles.vtt |
4.33KB |
| 25. Identification of Critical Systems.mp4 |
4.01MB |
| 25. Identification of Critical Systems.vtt |
4.67KB |
| 25. Key Points to Remember.mp4 |
4.02MB |
| 25. Key Points to Remember.vtt |
3.52KB |
| 25. Scarcity Urgency.mp4 |
933.82KB |
| 25. Scarcity Urgency.vtt |
1019B |
| 25. Service-level Agreement (SLA).mp4 |
1018.07KB |
| 25. Service-level Agreement (SLA).vtt |
938B |
| 25. VM Sprawl Avoidance.mp4 |
3.38MB |
| 25. VM Sprawl Avoidance.vtt |
2.78KB |
| 250 |
249.24KB |
| 251 |
264.95KB |
| 252 |
270.75KB |
| 253 |
278.52KB |
| 254 |
291.62KB |
| 255 |
292.42KB |
| 256 |
292.51KB |
| 257 |
299.23KB |
| 258 |
316.27KB |
| 259 |
332.95KB |
| 26 |
104.44KB |
| 26. Authentication Factors.mp4 |
1.83MB |
| 26. Authentication Factors.vtt |
2.18KB |
| 26. Cipher Suites.mp4 |
2.50MB |
| 26. Cipher Suites.vtt |
3.22KB |
| 26. DNS Sinkhole.mp4 |
5.31MB |
| 26. DNS Sinkhole.vtt |
3.53KB |
| 26. Memorandum of Understanding (MOU) and Master Services Agreement (MSA).mp4 |
3.45MB |
| 26. Memorandum of Understanding (MOU) and Master Services Agreement (MSA).vtt |
3.09KB |
| 26. Module Review.mp4 |
803.38KB |
| 26. Module Review.mp4 |
820.66KB |
| 26. Module Review.mp4 |
1.45MB |
| 26. Module Review.vtt |
1.81KB |
| 26. Module Review.vtt |
985B |
| 26. Module Review.vtt |
1.12KB |
| 26. Non-Digital and Digital Data Destruction.mp4 |
1.96MB |
| 26. Non-Digital and Digital Data Destruction.vtt |
2.80KB |
| 26. Sandboxing.mp4 |
4.92MB |
| 26. Sandboxing.vtt |
3.68KB |
| 26. Single Point of Failure (SPOF).mp4 |
3.85MB |
| 26. Single Point of Failure (SPOF).vtt |
4.43KB |
| 26. Types of Plans.mp4 |
1.13MB |
| 26. Types of Plans.vtt |
1.33KB |
| 26. VM Escape.mp4 |
2.42MB |
| 26. VM Escape.vtt |
2.74KB |
| 260 |
336.83KB |
| 261 |
343.37KB |
| 262 |
344.60KB |
| 263 |
345.23KB |
| 264 |
358.01KB |
| 265 |
360.99KB |
| 266 |
368.50KB |
| 267 |
388.69KB |
| 268 |
390.98KB |
| 269 |
396.42KB |
| 27 |
172.88KB |
| 27. Authentication, Authorization, and Accounting (AAA).mp4 |
1.24MB |
| 27. Authentication, Authorization, and Accounting (AAA).vtt |
1.25KB |
| 27. Business Partner Agreement (BPA).mp4 |
886.86KB |
| 27. Business Partner Agreement (BPA).vtt |
1010B |
| 27. Disaster Recovery Plan.mp4 |
2.19MB |
| 27. Disaster Recovery Plan.vtt |
1.65KB |
| 27. Limitations.mp4 |
3.00MB |
| 27. Limitations.vtt |
4.37KB |
| 27. Module Review.mp4 |
777.87KB |
| 27. Module Review.vtt |
1.02KB |
| 27. Order of Restoration.mp4 |
2.80MB |
| 27. Order of Restoration.vtt |
3.20KB |
| 27. Shredding.mp4 |
1.27MB |
| 27. Shredding.vtt |
1.64KB |
| 270 |
415.12KB |
| 271 |
416.30KB |
| 272 |
416.56KB |
| 273 |
428.46KB |
| 274 |
435.55KB |
| 275 |
438.25KB |
| 276 |
442.63KB |
| 277 |
448.76KB |
| 278 |
467.98KB |
| 279 |
475.66KB |
| 28 |
258.45KB |
| 28. Business Continuity Plan.mp4 |
1.68MB |
| 28. Business Continuity Plan.vtt |
1.51KB |
| 28. EOL EOS.mp4 |
2.97MB |
| 28. EOL EOS.vtt |
3.48KB |
| 28. On-prem vs. Cloud Requirements.mp4 |
4.37MB |
| 28. On-prem vs. Cloud Requirements.vtt |
4.85KB |
| 28. Phased Approach.mp4 |
3.64MB |
| 28. Phased Approach.vtt |
2.58KB |
| 28. Pulping and Pulverizing.mp4 |
2.24MB |
| 28. Pulping and Pulverizing.vtt |
2.44KB |
| 28. Random and Pseudorandom Number Generators (PRNG).mp4 |
3.54MB |
| 28. Random and Pseudorandom Number Generators (PRNG).vtt |
2.20KB |
| 280 |
493.79KB |
| 281 |
506.27KB |
| 282 |
516.89KB |
| 283 |
526.63KB |
| 284 |
530.08KB |
| 285 |
539.27KB |
| 286 |
553.60KB |
| 287 |
554.34KB |
| 288 |
560.36KB |
| 289 |
563.47KB |
| 29 |
528.54KB |
| 29. Business Resumption Plan.mp4 |
1.73MB |
| 29. Business Resumption Plan.vtt |
1.42KB |
| 29. Data Retention.mp4 |
1.69MB |
| 29. Data Retention.vtt |
1006B |
| 29. Deguassing.mp4 |
2.94MB |
| 29. Deguassing.vtt |
2.95KB |
| 29. Identifying Most Critical Systems First.mp4 |
5.08MB |
| 29. Identifying Most Critical Systems First.vtt |
4.55KB |
| 29. Quantum Random Number Generators (QRNG).mp4 |
1.53MB |
| 29. Quantum Random Number Generators (QRNG).vtt |
1.97KB |
| 290 |
565.83KB |
| 291 |
571.67KB |
| 292 |
572.41KB |
| 293 |
579.75KB |
| 294 |
605.42KB |
| 295 |
610.42KB |
| 296 |
620.32KB |
| 297 |
633.21KB |
| 298 |
635.59KB |
| 299 |
638.29KB |
| 3 |
515B |
| 3. Example Certifications.mp4 |
1.86MB |
| 3. Example Certifications.vtt |
2.30KB |
| 3. Key Areas to Focus On.mp4 |
1.92MB |
| 3. Key Areas to Focus On.vtt |
2.93KB |
| 3. Threat Types.mp4 |
1.27MB |
| 3. Threat Types.vtt |
1.86KB |
| 30 |
553.17KB |
| 30. Incident Management Plan.mp4 |
3.05MB |
| 30. Incident Management Plan.vtt |
2.21KB |
| 30. Purging.mp4 |
2.04MB |
| 30. Purging.vtt |
1.11KB |
| 30. Risk Assessment.mp4 |
1.88MB |
| 30. Risk Assessment.vtt |
2.18KB |
| 30. User Account.mp4 |
1.18MB |
| 30. User Account.vtt |
1.18KB |
| 300 |
641.29KB |
| 301 |
646.49KB |
| 302 |
648.36KB |
| 303 |
649.80KB |
| 304 |
669.33KB |
| 305 |
682.21KB |
| 306 |
705.75KB |
| 307 |
710.45KB |
| 308 |
721.11KB |
| 309 |
721.44KB |
| 31 |
2.13KB |
| 31. Continuity of Operations.mp4 |
1.72MB |
| 31. Continuity of Operations.vtt |
1.78KB |
| 31. Data Retention.mp4 |
6.04MB |
| 31. Data Retention.vtt |
5.08KB |
| 31. Shared, Generic, Guest, and Service Accounts.mp4 |
2.94MB |
| 31. Shared, Generic, Guest, and Service Accounts.vtt |
3.03KB |
| 31. Wiping.mp4 |
4.16MB |
| 31. Wiping.vtt |
4.59KB |
| 310 |
724.73KB |
| 311 |
740.51KB |
| 312 |
744.22KB |
| 313 |
750.15KB |
| 314 |
759.74KB |
| 315 |
761.03KB |
| 316 |
768.44KB |
| 317 |
795.24KB |
| 318 |
819.84KB |
| 319 |
823.88KB |
| 32 |
20.34KB |
| 32. IT Contingency Planning.mp4 |
5.15MB |
| 32. IT Contingency Planning.vtt |
5.68KB |
| 32. Module Review.mp4 |
823.16KB |
| 32. Module Review.vtt |
1.11KB |
| 32. Privileged Accounts.mp4 |
1.76MB |
| 32. Privileged Accounts.vtt |
1.85KB |
| 32. Putting It All Together.mp4 |
5.50MB |
| 32. Putting It All Together.vtt |
4.77KB |
| 320 |
830.29KB |
| 321 |
835.13KB |
| 322 |
835.27KB |
| 323 |
857.49KB |
| 324 |
859.45KB |
| 325 |
869.17KB |
| 326 |
872.02KB |
| 327 |
873.58KB |
| 328 |
874.19KB |
| 329 |
878.10KB |
| 33 |
89.71KB |
| 33. Change Management.mp4 |
3.20MB |
| 33. Change Management.vtt |
3.49KB |
| 33. Example Process.mp4 |
7.27MB |
| 33. Example Process.vtt |
8.43KB |
| 330 |
878.50KB |
| 331 |
886.20KB |
| 332 |
894.69KB |
| 333 |
909.38KB |
| 334 |
911.82KB |
| 335 |
915.30KB |
| 336 |
918.73KB |
| 337 |
931.22KB |
| 338 |
941.94KB |
| 339 |
949.91KB |
| 34 |
716.35KB |
| 34. Asset Management.mp4 |
2.27MB |
| 34. Asset Management.vtt |
3.15KB |
| 340 |
959.87KB |
| 341 |
969.82KB |
| 342 |
970.95KB |
| 343 |
972.54KB |
| 344 |
975.04KB |
| 345 |
975.58KB |
| 346 |
979.73KB |
| 347 |
988.74KB |
| 348 |
990.99KB |
| 349 |
992.07KB |
| 35 |
28.78KB |
| 350 |
995.92KB |
| 351 |
1004.34KB |
| 352 |
1005.86KB |
| 353 |
1009.79KB |
| 354 |
1011.56KB |
| 355 |
1015.78KB |
| 356 |
1017.22KB |
| 357 |
1017.33KB |
| 358 |
1019.84KB |
| 359 |
1022.65KB |
| 36 |
167.78KB |
| 360 |
1023.98KB |
| 361 |
11.47KB |
| 362 |
18.65KB |
| 363 |
30.71KB |
| 364 |
34.03KB |
| 365 |
34.10KB |
| 366 |
57.18KB |
| 367 |
57.79KB |
| 368 |
61.03KB |
| 369 |
62.99KB |
| 37 |
45.82KB |
| 370 |
76.11KB |
| 371 |
82.45KB |
| 372 |
91.37KB |
| 373 |
95.82KB |
| 374 |
96.53KB |
| 375 |
103.94KB |
| 376 |
110.55KB |
| 377 |
111.96KB |
| 378 |
112.35KB |
| 379 |
125.42KB |
| 38 |
83.70KB |
| 380 |
147.36KB |
| 381 |
149.04KB |
| 382 |
161.26KB |
| 383 |
162.87KB |
| 384 |
167.49KB |
| 385 |
179.86KB |
| 386 |
190.96KB |
| 387 |
201.18KB |
| 388 |
209.91KB |
| 389 |
213.93KB |
| 39 |
114.88KB |
| 390 |
214.40KB |
| 391 |
225.33KB |
| 392 |
232.38KB |
| 393 |
232.57KB |
| 394 |
233.30KB |
| 395 |
249.09KB |
| 396 |
251.97KB |
| 397 |
260.55KB |
| 398 |
270.14KB |
| 399 |
288.29KB |
| 4 |
186B |
| 4. Objectives Study Guide.mp4 |
5.80MB |
| 4. Objectives Study Guide.vtt |
5.98KB |
| 4. Security+ Exam Format.mp4 |
3.44MB |
| 4. Security+ Exam Format.vtt |
2.17KB |
| 4. Types of Access Control (Managerial, Operational, and Physical).mp4 |
1.73MB |
| 4. Types of Access Control (Managerial, Operational, and Physical).vtt |
1.85KB |
| 40 |
170.73KB |
| 400 |
288.59KB |
| 401 |
288.71KB |
| 402 |
299.70KB |
| 403 |
304.86KB |
| 404 |
306.04KB |
| 405 |
312.09KB |
| 406 |
333.03KB |
| 407 |
337.01KB |
| 408 |
338.75KB |
| 409 |
340.11KB |
| 41 |
222.47KB |
| 410 |
340.63KB |
| 411 |
373.13KB |
| 412 |
379.81KB |
| 413 |
380.95KB |
| 414 |
391.48KB |
| 415 |
398.65KB |
| 416 |
401.81KB |
| 417 |
411.56KB |
| 418 |
418.38KB |
| 419 |
418.75KB |
| 42 |
301.31KB |
| 420 |
427.25KB |
| 421 |
427.95KB |
| 422 |
428.84KB |
| 423 |
439.12KB |
| 424 |
448.79KB |
| 425 |
454.42KB |
| 426 |
454.90KB |
| 427 |
480.57KB |
| 428 |
482.13KB |
| 429 |
487.90KB |
| 43 |
458.03KB |
| 430 |
493.46KB |
| 431 |
494.46KB |
| 432 |
496.68KB |
| 433 |
497.41KB |
| 434 |
503.91KB |
| 435 |
505.34KB |
| 436 |
512.92KB |
| 437 |
514.02KB |
| 438 |
514.98KB |
| 439 |
527.02KB |
| 44 |
479.08KB |
| 440 |
530.34KB |
| 441 |
537.32KB |
| 442 |
539.17KB |
| 443 |
540.59KB |
| 444 |
543.34KB |
| 445 |
544.90KB |
| 446 |
555.50KB |
| 447 |
567.08KB |
| 448 |
568.78KB |
| 449 |
569.93KB |
| 45 |
482.50KB |
| 450 |
579.34KB |
| 451 |
595.89KB |
| 452 |
598.71KB |
| 453 |
613.07KB |
| 454 |
617.99KB |
| 455 |
619.11KB |
| 456 |
625.41KB |
| 457 |
629.86KB |
| 458 |
631.52KB |
| 459 |
632.87KB |
| 46 |
516.06KB |
| 460 |
637.84KB |
| 461 |
645.54KB |
| 462 |
651.97KB |
| 463 |
652.29KB |
| 464 |
662.78KB |
| 465 |
662.87KB |
| 466 |
666.97KB |
| 467 |
675.17KB |
| 468 |
681.71KB |
| 469 |
687.81KB |
| 47 |
540.12KB |
| 470 |
697.24KB |
| 471 |
704.61KB |
| 472 |
708.41KB |
| 473 |
708.67KB |
| 474 |
709.37KB |
| 475 |
712.12KB |
| 476 |
713.66KB |
| 477 |
721.41KB |
| 478 |
728.06KB |
| 479 |
730.76KB |
| 48 |
567.10KB |
| 480 |
735.38KB |
| 481 |
736.25KB |
| 482 |
747.52KB |
| 483 |
751.22KB |
| 484 |
754.10KB |
| 485 |
766.79KB |
| 486 |
770.31KB |
| 487 |
770.56KB |
| 488 |
771.07KB |
| 489 |
776.56KB |
| 49 |
600.07KB |
| 490 |
778.34KB |
| 491 |
782.46KB |
| 492 |
807.71KB |
| 493 |
810.60KB |
| 494 |
820.01KB |
| 495 |
822.46KB |
| 496 |
828.41KB |
| 497 |
832.80KB |
| 498 |
837.22KB |
| 499 |
839.50KB |
| 5 |
5B |
| 5. Deterrent.mp4 |
746.28KB |
| 5. Deterrent.vtt |
791B |
| 5. Registering for an Exam.mp4 |
1.87MB |
| 5. Registering for an Exam.vtt |
2.31KB |
| 50 |
1.02KB |
| 500 |
840.61KB |
| 501 |
844.45KB |
| 502 |
847.58KB |
| 503 |
848.13KB |
| 504 |
864.62KB |
| 505 |
866.19KB |
| 506 |
870.69KB |
| 507 |
872.77KB |
| 508 |
881.02KB |
| 509 |
886.69KB |
| 51 |
26.81KB |
| 510 |
888.04KB |
| 511 |
888.53KB |
| 512 |
893.57KB |
| 513 |
900.43KB |
| 514 |
902.03KB |
| 515 |
910.71KB |
| 516 |
915.41KB |
| 517 |
921.28KB |
| 518 |
923.41KB |
| 519 |
925.95KB |
| 52 |
102.21KB |
| 520 |
927.33KB |
| 521 |
932.86KB |
| 522 |
933.66KB |
| 523 |
934.26KB |
| 524 |
934.70KB |
| 525 |
960.07KB |
| 526 |
966.81KB |
| 527 |
973.59KB |
| 528 |
981.19KB |
| 529 |
988.97KB |
| 53 |
931.06KB |
| 530 |
999.85KB |
| 531 |
1000.15KB |
| 532 |
1001.18KB |
| 533 |
1002.22KB |
| 534 |
1004.67KB |
| 535 |
1006.85KB |
| 536 |
1009.40KB |
| 537 |
1010.50KB |
| 538 |
1022.02KB |
| 539 |
4.74KB |
| 54 |
948.57KB |
| 540 |
7.92KB |
| 541 |
8.11KB |
| 542 |
8.94KB |
| 543 |
9.33KB |
| 544 |
10.36KB |
| 545 |
24.35KB |
| 546 |
24.70KB |
| 547 |
30.65KB |
| 548 |
32.17KB |
| 549 |
39.50KB |
| 55 |
953.98KB |
| 550 |
42.56KB |
| 551 |
42.61KB |
| 552 |
43.19KB |
| 553 |
48.22KB |
| 554 |
54.17KB |
| 555 |
60.24KB |
| 556 |
64.03KB |
| 557 |
65.88KB |
| 558 |
68.37KB |
| 559 |
75.99KB |
| 56 |
1016.69KB |
| 560 |
79.13KB |
| 561 |
83.14KB |
| 562 |
87.56KB |
| 563 |
92.66KB |
| 564 |
94.82KB |
| 565 |
101.19KB |
| 566 |
103.41KB |
| 567 |
107.23KB |
| 568 |
110.06KB |
| 569 |
113.95KB |
| 57 |
4.69KB |
| 570 |
122.58KB |
| 571 |
126.73KB |
| 572 |
131.08KB |
| 573 |
131.63KB |
| 574 |
131.76KB |
| 575 |
132.21KB |
| 576 |
139.99KB |
| 577 |
140.27KB |
| 578 |
146.27KB |
| 579 |
147.17KB |
| 58 |
24.73KB |
| 580 |
150.16KB |
| 581 |
150.83KB |
| 582 |
153.06KB |
| 583 |
153.15KB |
| 584 |
155.87KB |
| 585 |
171.27KB |
| 586 |
171.50KB |
| 587 |
178.38KB |
| 588 |
178.64KB |
| 589 |
180.14KB |
| 59 |
38.57KB |
| 590 |
183.15KB |
| 591 |
186.27KB |
| 592 |
188.38KB |
| 593 |
197.70KB |
| 594 |
200.83KB |
| 595 |
204.51KB |
| 596 |
205.76KB |
| 597 |
207.68KB |
| 598 |
212.37KB |
| 599 |
214.60KB |
| 6 |
13B |
| 6. Exam Lifecycle.mp4 |
1.59MB |
| 6. Exam Lifecycle.vtt |
1.55KB |
| 6. Preventive.mp4 |
847.79KB |
| 6. Preventive.vtt |
1.06KB |
| 60 |
46.27KB |
| 600 |
221.89KB |
| 601 |
233.74KB |
| 602 |
234.17KB |
| 603 |
238.22KB |
| 604 |
239.09KB |
| 605 |
240.62KB |
| 606 |
242.08KB |
| 607 |
245.18KB |
| 608 |
247.41KB |
| 609 |
248.05KB |
| 61 |
178.26KB |
| 610 |
250.19KB |
| 611 |
267.74KB |
| 612 |
272.71KB |
| 613 |
273.58KB |
| 614 |
274.04KB |
| 615 |
275.04KB |
| 616 |
285.92KB |
| 617 |
287.23KB |
| 618 |
288.54KB |
| 619 |
288.61KB |
| 62 |
214.54KB |
| 620 |
290.31KB |
| 621 |
300.25KB |
| 622 |
302.34KB |
| 623 |
309.51KB |
| 624 |
312.71KB |
| 625 |
317.36KB |
| 626 |
318.44KB |
| 627 |
321.63KB |
| 628 |
330.02KB |
| 629 |
331.87KB |
| 63 |
271.21KB |
| 630 |
337.75KB |
| 631 |
346.45KB |
| 632 |
354.63KB |
| 633 |
354.80KB |
| 634 |
356.81KB |
| 635 |
361.37KB |
| 636 |
363.31KB |
| 637 |
368.42KB |
| 638 |
369.93KB |
| 639 |
372.08KB |
| 64 |
295.05KB |
| 640 |
378.80KB |
| 641 |
381.38KB |
| 642 |
382.73KB |
| 643 |
383.87KB |
| 644 |
385.26KB |
| 645 |
386.96KB |
| 646 |
398.75KB |
| 647 |
402.22KB |
| 648 |
408.51KB |
| 649 |
420.95KB |
| 65 |
315.19KB |
| 650 |
425.02KB |
| 651 |
430.02KB |
| 652 |
434.23KB |
| 653 |
437.07KB |
| 654 |
440.76KB |
| 655 |
444.32KB |
| 656 |
445.01KB |
| 657 |
461.98KB |
| 658 |
470.32KB |
| 659 |
478.22KB |
| 66 |
324.62KB |
| 660 |
480.54KB |
| 661 |
481.52KB |
| 662 |
485.80KB |
| 663 |
486.75KB |
| 664 |
487.20KB |
| 665 |
499.49KB |
| 666 |
501.35KB |
| 667 |
502.03KB |
| 668 |
515.62KB |
| 669 |
523.64KB |
| 67 |
392.56KB |
| 670 |
535.28KB |
| 671 |
546.08KB |
| 672 |
566.42KB |
| 673 |
582.12KB |
| 674 |
587.89KB |
| 675 |
590.23KB |
| 676 |
592.98KB |
| 677 |
593.91KB |
| 678 |
597.40KB |
| 679 |
597.70KB |
| 68 |
400.04KB |
| 680 |
597.71KB |
| 681 |
603.65KB |
| 682 |
605.63KB |
| 683 |
613.37KB |
| 684 |
615.47KB |
| 685 |
620.88KB |
| 686 |
623.66KB |
| 687 |
628.71KB |
| 688 |
630.37KB |
| 689 |
633.51KB |
| 69 |
466.69KB |
| 690 |
634.75KB |
| 691 |
637.43KB |
| 692 |
638.53KB |
| 693 |
639.13KB |
| 694 |
640.40KB |
| 695 |
647.09KB |
| 696 |
648.06KB |
| 697 |
648.32KB |
| 698 |
652.72KB |
| 699 |
661.19KB |
| 7 |
13B |
| 7. Detective.mp4 |
933.23KB |
| 7. Detective.vtt |
980B |
| 7. Prerequisite Experience.mp4 |
2.67MB |
| 7. Prerequisite Experience.vtt |
2.10KB |
| 70 |
491.45KB |
| 700 |
664.31KB |
| 701 |
669.31KB |
| 702 |
674.59KB |
| 703 |
676.40KB |
| 704 |
689.82KB |
| 705 |
695.43KB |
| 706 |
699.40KB |
| 707 |
703.58KB |
| 708 |
706.53KB |
| 709 |
707.82KB |
| 71 |
496.24KB |
| 710 |
708.85KB |
| 711 |
709.11KB |
| 712 |
711.84KB |
| 713 |
712.28KB |
| 714 |
725.12KB |
| 715 |
735.33KB |
| 716 |
739.26KB |
| 717 |
742.71KB |
| 718 |
743.94KB |
| 719 |
747.72KB |
| 72 |
559.89KB |
| 720 |
748.70KB |
| 721 |
750.44KB |
| 722 |
757.25KB |
| 723 |
759.43KB |
| 724 |
760.19KB |
| 725 |
764.93KB |
| 726 |
769.09KB |
| 727 |
779.66KB |
| 728 |
787.56KB |
| 729 |
795.09KB |
| 73 |
584.89KB |
| 730 |
795.23KB |
| 731 |
798.55KB |
| 732 |
798.76KB |
| 733 |
799.14KB |
| 734 |
805.27KB |
| 735 |
806.72KB |
| 736 |
809.42KB |
| 737 |
820.36KB |
| 738 |
820.37KB |
| 739 |
825.93KB |
| 74 |
659.52KB |
| 740 |
832.36KB |
| 741 |
833.18KB |
| 742 |
835.02KB |
| 743 |
838.28KB |
| 744 |
843.07KB |
| 745 |
860.65KB |
| 746 |
867.35KB |
| 747 |
869.94KB |
| 748 |
871.29KB |
| 749 |
872.00KB |
| 75 |
665.27KB |
| 750 |
873.61KB |
| 751 |
889.44KB |
| 752 |
895.10KB |
| 753 |
920.41KB |
| 754 |
929.10KB |
| 755 |
941.73KB |
| 756 |
947.21KB |
| 757 |
949.78KB |
| 758 |
957.41KB |
| 759 |
972.41KB |
| 76 |
673.98KB |
| 760 |
973.93KB |
| 761 |
979.41KB |
| 762 |
998.35KB |
| 763 |
1013.07KB |
| 77 |
702.18KB |
| 78 |
729.34KB |
| 79 |
753.03KB |
| 8 |
107.86KB |
| 8. Corrective Recovery and Compensating.mp4 |
2.63MB |
| 8. Corrective Recovery and Compensating.vtt |
2.59KB |
| 80 |
763.39KB |
| 81 |
768.86KB |
| 82 |
818.76KB |
| 83 |
836.70KB |
| 84 |
860.19KB |
| 85 |
865.26KB |
| 86 |
878.25KB |
| 87 |
979.03KB |
| 88 |
982.78KB |
| 89 |
1014.54KB |
| 9 |
67.23KB |
| 9. Module Review.mp4 |
614.70KB |
| 9. Module Review.vtt |
818B |
| 90 |
1021.67KB |
| 91 |
17.06KB |
| 92 |
24.84KB |
| 93 |
34.95KB |
| 94 |
70.44KB |
| 95 |
82.26KB |
| 96 |
132.14KB |
| 97 |
156.29KB |
| 98 |
157.19KB |
| 99 |
199.71KB |
| architecture-design-comptia-security-plus.zip |
35.53MB |
| attacks-threats-vulnerabilities-comptia-security-plus.zip |
34.31MB |
| comptia-security-plus-exam-briefing.zip |
9.65MB |
| governance-risk-compliance-comptia-security-plus.zip |
13.49MB |
| implementation-comptia-security-plus.zip |
22.86MB |
| operations-incident-response-comptia-security-plus.zip |
25.04MB |
| TutsNode.net.txt |
63B |