|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
491.25KB |
| 1 |
614.44KB |
| 1. Overview.mp4 |
74.63MB |
| 10 |
564.32KB |
| 10. Baselines & Templates & Software Assurance.mp4 |
281.69MB |
| 11 |
716.78KB |
| 11. Integrating Enterprise Applications.mp4 |
123.60MB |
| 12 |
1.27MB |
| 12. Security in the Development Lifecycle.mp4 |
275.78MB |
| 13 |
1.47MB |
| 13. Securing Enterprise Architecture.mp4 |
295.66MB |
| 14 |
1.13MB |
| 14. Authentication & Authorization - Discussion.mp4 |
274.17MB |
| 15 |
610.73KB |
| 15. Authentication & Authorization - Scenarios.mp4 |
232.25MB |
| 16 |
502.42KB |
| 16. Secure Cloud & Virtualization.mp4 |
272.33MB |
| 17 |
1.53MB |
| 17. Cryptography & PKI.mp4 |
270.62MB |
| 18 |
1.77MB |
| 18. Impact of Emerging Technologies.mp4 |
317.74MB |
| 19 |
268.83KB |
| 19. Security Architecture - Key Points.mp4 |
161.82MB |
| 2 |
255.87KB |
| 2. Services - Discussion.mp4 |
291.03MB |
| 20 |
353.35KB |
| 20. Perform Threat Management.mp4 |
288.52MB |
| 21 |
1.79MB |
| 21. Indicators of Compromise & Response.mp4 |
325.51MB |
| 22 |
670.83KB |
| 22. Vulnerability Management Activities.mp4 |
277.97MB |
| 23 |
1.48MB |
| 23. Vulnerability Assessment - Methods & Tools.mp4 |
320.23MB |
| 24 |
133.38KB |
| 24. Analyze Vulnerabilities - Vulnerabilities.mp4 |
317.65MB |
| 25 |
1.37MB |
| 25. Analyze Vulnerabilities - Vulnerable Systems.mp4 |
288.18MB |
| 26 |
1.49MB |
| 26. Analyze Vulnerabilities - Attacks.mp4 |
316.21MB |
| 27 |
785.47KB |
| 27. Use Processes to Reduce Risk.mp4 |
304.51MB |
| 28 |
191.53KB |
| 28. Triage & Incident Response.mp4 |
285.39MB |
| 29 |
1.71MB |
| 29. Forensic Concepts.mp4 |
253.80MB |
| 3 |
1.95MB |
| 3. Segmentation - Discussion.mp4 |
254.87MB |
| 30 |
346.82KB |
| 30. File Carving & Binary Analysis.mp4 |
322.47MB |
| 31 |
989.71KB |
| 31. Analysis Tools.mp4 |
335.40MB |
| 32 |
1.88MB |
| 32. Live Collection Tools.mp4 |
296.29MB |
| 33 |
1.48MB |
| 33. Security Operations - Key Points.mp4 |
171.79MB |
| 34 |
1.82MB |
| 34. Managed Configurations.mp4 |
379.72MB |
| 35 |
11.32KB |
| 35. Deployment Scenarios.mp4 |
180.24MB |
| 36 |
1.46MB |
| 36. Security Considerations.mp4 |
356.73MB |
| 37 |
620.42KB |
| 37. Hardening Techniques.mp4 |
336.87MB |
| 38 |
965.86KB |
| 38. Processes.mp4 |
431.52MB |
| 39 |
312.46KB |
| 39. Mandatory Access Control.mp4 |
286.54MB |
| 4 |
765.06KB |
| 4. Services & Segmentation - Scenarios.mp4 |
303.23MB |
| 40 |
1.13MB |
| 40. Trustworthy Computing.mp4 |
416.82MB |
| 41 |
1.93MB |
| 41. Compensating Controls.mp4 |
136.84MB |
| 42 |
28.68KB |
| 42. Security Considerations - Embedded.mp4 |
309.87MB |
| 43 |
225.31KB |
| 43. Security Considerations - ICS-SCADA.mp4 |
380.37MB |
| 44 |
1.83MB |
| 44. Security Considerations - Protocols.mp4 |
369.45MB |
| 45 |
251.95KB |
| 45. Security Considerations - Sectors.mp4 |
134.40MB |
| 46 |
1.67MB |
| 46. Cloud Technology - Basics.mp4 |
431.40MB |
| 47 |
1.38MB |
| 47. Cloud Technology - Advanced.mp4 |
388.48MB |
| 48 |
315.43KB |
| 48. PKI - Basics.mp4 |
427.75MB |
| 49 |
1.13MB |
| 49. PKI - Advanced.mp4 |
361.30MB |
| 5 |
1.18MB |
| 5. DeperimeterizationZero Trust.mp4 |
261.69MB |
| 50 |
202.74KB |
| 50. Hashing & Symmetric Algorithms.mp4 |
416.76MB |
| 51 |
1.14MB |
| 51. Asymmetric Algorithms & Protocols.mp4 |
418.05MB |
| 52 |
1.65MB |
| 52. Troubleshoot Cryptography - Keys.mp4 |
196.78MB |
| 53 |
343.58KB |
| 53. Security Engineering & Cryptography - Key Points.mp4 |
140.16MB |
| 54 |
1.42MB |
| 54. Troubleshoot Cryptography - Misconfigurations.mp4 |
280.87MB |
| 55 |
1.75MB |
| 55. Risk Assessment.mp4 |
417.25MB |
| 56 |
1.08MB |
| 56. Risk Handling Techniques.mp4 |
297.81MB |
| 57 |
783.64KB |
| 57. Risk Types.mp4 |
273.75MB |
| 58 |
1.22MB |
| 58. Risk Management Life Cycle.mp4 |
278.07MB |
| 59 |
879.32KB |
| 59. Risk Tracking.mp4 |
346.53MB |
| 6 |
1.24MB |
| 6. Merging of Networks.mp4 |
251.66MB |
| 60 |
1.81MB |
| 60. Policies and Security Practices.mp4 |
287.99MB |
| 61 |
1.76MB |
| 61. Shared Responsibility Model - Cloud.mp4 |
174.82MB |
| 62 |
1.05MB |
| 62. Performing Vendor Assessments.mp4 |
285.06MB |
| 63 |
1.18MB |
| 63. Technical Considerations.mp4 |
244.58MB |
| 64 |
210.63KB |
| 64. Data Considerations.mp4 |
306.63MB |
| 65 |
184.39KB |
| 65. Regulations Accreditations & Standards.mp4 |
310.52MB |
| 66 |
673.25KB |
| 66. Legal Considerations.mp4 |
195.14MB |
| 67 |
1.84MB |
| 67. Contract and Agreement Types.mp4 |
161.34MB |
| 68 |
1.16MB |
| 68. Business Impact Analysis (BIA).mp4 |
252.86MB |
| 69 |
1.60MB |
| 69. Privacy Impact Assessment.mp4 |
115.76MB |
| 7 |
1.52MB |
| 7. Software-defined Networking (SDN).mp4 |
222.92MB |
| 70 |
407.99KB |
| 70. Disaster Recovery & Business Continuity Planning.mp4 |
174.95MB |
| 71 |
243.88KB |
| 71. Incident Response Plan.mp4 |
197.23MB |
| 72 |
1.37MB |
| 72. Testing Plans.mp4 |
311.34MB |
| 73. Governance, Risk & Compliance - Key Points.mp4 |
184.19MB |
| 8 |
1.63MB |
| 8. Infrastructure Design - Discussion.mp4 |
290.12MB |
| 9 |
285.55KB |
| 9. Infrastructure Design - Scenarios.mp4 |
252.35MB |
| CASP004-ADISH.zip |
4.98MB |
| TutsNode.com.txt |
63B |