|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [CourseClub.Me].url |
122B |
| [CourseClub.Me].url |
122B |
| [FreeCourseSite.com].url |
127B |
| [FreeCourseSite.com].url |
127B |
| [GigaCourse.Com].url |
49B |
| [GigaCourse.Com].url |
49B |
| 001 2023-CC-Domain-1-Study-guide-by-ThorTeaches.com-v1.1.pdf |
1.33MB |
| 001 2023-CC-Domain-2-Study-guide-by-ThorTeaches.com-v1.1.pdf |
813.63KB |
| 001 2023-CC-Domain-3-Study-guide-by-ThorTeaches.com-v1.1.pdf |
1.15MB |
| 001 2023-CC-Domain-4-Study-guide-by-ThorTeaches.com-v1.1.pdf |
4.42MB |
| 001 2023-CC-Domain-5-Study-guide-by-ThorTeaches.com-v1.1.pdf |
754.55KB |
| 001 2023-CC-Mnemonics-by-ThorTeaches.pdf |
281.69KB |
| 001 Domain 1 recap Certified in Cybersecurity (CC)_en.srt |
33.82KB |
| 001 Domain 1 recap Certified in Cybersecurity (CC).mp4 |
120.29MB |
| 001 Domain 1 - What we will be covering_en.srt |
1.23KB |
| 001 Domain 1 - What we will be covering.mp4 |
10.44MB |
| 001 Domain 2 - What we will be covering_en.srt |
1.22KB |
| 001 Domain 2 - What we will be covering.mp4 |
9.15MB |
| 001 Domain 3 - What we will be covering_en.srt |
1.14KB |
| 001 Domain 3 - What we will be covering.mp4 |
7.58MB |
| 001 Domain 4 - What we will be covering_en.srt |
1.03KB |
| 001 Domain 4 - What we will be covering.mp4 |
8.24MB |
| 001 Domain 5 - What we will be covering_en.srt |
973B |
| 001 Domain 5 - What we will be covering.mp4 |
6.41MB |
| 001 Introduction and download your free study guides_en.srt |
1.13KB |
| 001 Introduction and download your free study guides.mp4 |
11.55MB |
| 001 Why you should want to get Certified in Cybersecurity_en.srt |
9.30KB |
| 001 Why you should want to get Certified in Cybersecurity.mp4 |
18.05MB |
| 002 BCP - Business Continuity Planning - Part 1_en.srt |
11.75KB |
| 002 BCP - Business Continuity Planning - Part 1.mp4 |
40.19MB |
| 002 Configuration Management_en.srt |
11.48KB |
| 002 Configuration Management.mp4 |
15.25MB |
| 002 Connect with me on Social media and the Udemy ratings system_en.srt |
2.79KB |
| 002 Connect with me on Social media and the Udemy ratings system.mp4 |
12.13MB |
| 002 Domain 2 recap Certified in Cybersecurity (CC)_en.srt |
27.92KB |
| 002 Domain 2 recap Certified in Cybersecurity (CC).mp4 |
87.58MB |
| 002 Network Basics and Definitions - Part 1_en.srt |
18.57KB |
| 002 Network Basics and Definitions - Part 1.mp4 |
44.54MB |
| 002 Physical Security - part 1_en.srt |
19.05KB |
| 002 Physical Security - part 1.mp4 |
43.48MB |
| 002 Scheduling your exam and what to expect_en.srt |
9.17KB |
| 002 Scheduling your exam and what to expect.mp4 |
42.74MB |
| 002 The differences between Information Security, IT Security, and Cybersecurity_en.srt |
10.26KB |
| 002 The differences between Information Security, IT Security, and Cybersecurity.mp4 |
55.99MB |
| 003 BCP - Business Continuity Planning - Part 2_en.srt |
20.68KB |
| 003 BCP - Business Continuity Planning - Part 2.mp4 |
31.03MB |
| 003 Domain 3 recap Certified in Cybersecurity (CC)_en.srt |
21.09KB |
| 003 Domain 3 recap Certified in Cybersecurity (CC).mp4 |
88.62MB |
| 003 How to get the most out of my courses and the Udemy interface_en.srt |
3.94KB |
| 003 How to get the most out of my courses and the Udemy interface.mp4 |
29.24MB |
| 003 Network Basics and Definitions - Part 2_en.srt |
16.51KB |
| 003 Network Basics and Definitions - Part 2.mp4 |
38.86MB |
| 003 Patch Management_en.srt |
21.45KB |
| 003 Patch Management.mp4 |
28.32MB |
| 003 Physical Security - part 2_en.srt |
11.82KB |
| 003 Physical Security - part 2.mp4 |
43.88MB |
| 003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1_en.srt |
11.24KB |
| 003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4 |
21.43MB |
| 003 What to expect on exam day and after_en.srt |
13.70KB |
| 003 What to expect on exam day and after.mp4 |
33.22MB |
| 004 BCP - Business Continuity Planning - Part 3_en.srt |
20.13KB |
| 004 BCP - Business Continuity Planning - Part 3.mp4 |
45.47MB |
| 004 Change Management_en.srt |
21.25KB |
| 004 Change Management.mp4 |
42.65MB |
| 004 Domain 4 recap Certified in Cybersecurity (CC)_en.srt |
125.70KB |
| 004 Domain 4 recap Certified in Cybersecurity (CC).mp4 |
408.01MB |
| 004 How to approach certification studying_en.srt |
6.10KB |
| 004 How to approach certification studying.mp4 |
26.50MB |
| 004 I passed the exam now what_en.srt |
8.66KB |
| 004 I passed the exam now what.mp4 |
20.30MB |
| 004 Physical Security - part 3_en.srt |
20.21KB |
| 004 Physical Security - part 3.mp4 |
27.80MB |
| 004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2_en.srt |
12.91KB |
| 004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4 |
18.57MB |
| 004 The OSI Model - Part 1_en.srt |
25.40KB |
| 004 The OSI Model - Part 1.mp4 |
100.95MB |
| 005 Cryptography - Part 1_en.srt |
15.12KB |
| 005 Cryptography - Part 1.mp4 |
31.71MB |
| 005 Domain 5 recap Certified in Cybersecurity (CC)_en.srt |
50.39KB |
| 005 Domain 5 recap Certified in Cybersecurity (CC).mp4 |
161.52MB |
| 005 DRP - Disaster Recovery Planning - Part 1_en.srt |
19.73KB |
| 005 DRP - Disaster Recovery Planning - Part 1.mp4 |
44.90MB |
| 005 General Certified in Cybersecurity (CC) links.html |
3.13KB |
| 005 I failed the exam now what_en.srt |
16.36KB |
| 005 I failed the exam now what.mp4 |
24.49MB |
| 005 Physical Security - part 4_en.srt |
14.26KB |
| 005 Physical Security - part 4.mp4 |
25.06MB |
| 005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3_en.srt |
6.39KB |
| 005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4 |
9.47MB |
| 005 The OSI Model - Part 2_en.srt |
13.41KB |
| 005 The OSI Model - Part 2.mp4 |
49.81MB |
| 006 CC-Fillable-study-plan-2023.pdf |
370.96KB |
| 006 CC-Study-plan-by-ThorTeaches.xlsx |
10.50KB |
| 006 Cryptography - Part 2_en.srt |
11.73KB |
| 006 Cryptography - Part 2.mp4 |
51.12MB |
| 006 DRP - Disaster Recovery Planning - Part 2_en.srt |
9.44KB |
| 006 DRP - Disaster Recovery Planning - Part 2.mp4 |
37.65MB |
| 006 How to approach practice questions_en.srt |
18.28KB |
| 006 How to approach practice questions.mp4 |
118.51MB |
| 006 Physical Security - part 5_en.srt |
12.01KB |
| 006 Physical Security - part 5.mp4 |
22.64MB |
| 006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4_en.srt |
16.02KB |
| 006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4 |
23.36MB |
| 006 The OSI Model - Part 3_en.srt |
12.73KB |
| 006 The OSI Model - Part 3.mp4 |
56.88MB |
| 007 Cryptography - Part 3_en.srt |
10.82KB |
| 007 Cryptography - Part 3.mp4 |
32.74MB |
| 007 DRP - Disaster Recovery Planning - Part 3_en.srt |
15.92KB |
| 007 DRP - Disaster Recovery Planning - Part 3.mp4 |
47.13MB |
| 007 How to design your career and certification path_en.srt |
23.76KB |
| 007 How to design your career and certification path.mp4 |
74.37MB |
| 007 Logical Access Control - Part 1_en.srt |
14.43KB |
| 007 Logical Access Control - Part 1.mp4 |
27.12MB |
| 007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5_en.srt |
6.48KB |
| 007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4 |
12.71MB |
| 007 The TCPIP model_en.srt |
14.66KB |
| 007 The TCPIP model.mp4 |
48.74MB |
| 008 DRP - Disaster Recovery Planning - Part 4_en.srt |
21.00KB |
| 008 DRP - Disaster Recovery Planning - Part 4.mp4 |
64.44MB |
| 008 Hashing_en.srt |
10.33KB |
| 008 Hashing.mp4 |
19.00MB |
| 008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1_en.srt |
13.71KB |
| 008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4 |
44.28MB |
| 008 IP addresses, port numbers, and MAC addresses - Part 1_en.srt |
18.58KB |
| 008 IP addresses, port numbers, and MAC addresses - Part 1.mp4 |
45.83MB |
| 008 Logical Access Control - Part 2_en.srt |
12.28KB |
| 008 Logical Access Control - Part 2.mp4 |
18.17MB |
| 009 Attacks on our cryptography_en.srt |
15.33KB |
| 009 Attacks on our cryptography.mp4 |
27.86MB |
| 009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2_en.srt |
5.00KB |
| 009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4 |
21.54MB |
| 009 Incidents Response - Part 1_en.srt |
20.86KB |
| 009 Incidents Response - Part 1.mp4 |
35.90MB |
| 009 IP addresses, port numbers, and MAC addresses - Part 2_en.srt |
9.05KB |
| 009 IP addresses, port numbers, and MAC addresses - Part 2.mp4 |
24.34MB |
| 009 Logical Access Control - Part 3_en.srt |
19.06KB |
| 009 Logical Access Control - Part 3.mp4 |
78.46MB |
| 010 Data handling, data storage and data retention - Part 1_en.srt |
15.26KB |
| 010 Data handling, data storage and data retention - Part 1.mp4 |
56.90MB |
| 010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3_en.srt |
13.02KB |
| 010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4 |
34.34MB |
| 010 Incidents Response - Part 2_en.srt |
16.60KB |
| 010 Incidents Response - Part 2.mp4 |
28.47MB |
| 010 IP addresses, port numbers, and MAC addresses - Part 3_en.srt |
7.49KB |
| 010 IP addresses, port numbers, and MAC addresses - Part 3.mp4 |
20.89MB |
| 010 Logical Access Control - Part 4_en.srt |
13.07KB |
| 010 Logical Access Control - Part 4.mp4 |
43.94MB |
| 011 Data handling, data storage and data retention - Part 2_en.srt |
16.81KB |
| 011 Data handling, data storage and data retention - Part 2.mp4 |
39.16MB |
| 011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4_en.srt |
15.16KB |
| 011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 |
67.93MB |
| 011 Incidents Response - Part 3_en.srt |
13.12KB |
| 011 Incidents Response - Part 3.mp4 |
18.50MB |
| 011 IP support protocols - Part 1_en.srt |
12.20KB |
| 011 IP support protocols - Part 1.mp4 |
46.51MB |
| 011 Logical Access Control - Part 5_en.srt |
18.67KB |
| 011 Logical Access Control - Part 5.mp4 |
81.13MB |
| 012 Data handling, data storage and data retention - Part 3_en.srt |
9.11KB |
| 012 Data handling, data storage and data retention - Part 3.mp4 |
28.28MB |
| 012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5_en.srt |
7.08KB |
| 012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4 |
18.76MB |
| 012 Incidents Response - Part 4_en.srt |
18.01KB |
| 012 Incidents Response - Part 4.mp4 |
23.22MB |
| 012 IP support protocols - Part 2_en.srt |
10.09KB |
| 012 IP support protocols - Part 2.mp4 |
33.89MB |
| 012 What we covered in Domain 3_en.srt |
1.08KB |
| 012 What we covered in Domain 3.mp4 |
6.91MB |
| 013 Administrative (Directive) Controls_en.srt |
26.41KB |
| 013 Administrative (Directive) Controls.mp4 |
87.94MB |
| 013 Cables - Part 1_en.srt |
12.03KB |
| 013 Cables - Part 1.mp4 |
22.32MB |
| 013 Certified in Cybersecurity Domain (CC) 3 links.html |
5.06KB |
| 013 Incidents Response - Part 5_en.srt |
12.33KB |
| 013 Incidents Response - Part 5.mp4 |
44.03MB |
| 013 Privacy_en.srt |
9.99KB |
| 013 Privacy.mp4 |
16.11MB |
| 014 Cables - Part 2_en.srt |
13.27KB |
| 014 Cables - Part 2.mp4 |
45.97MB |
| 014 Risk Management - part 1_en.srt |
8.46KB |
| 014 Risk Management - part 1.mp4 |
12.94MB |
| 014 Training and awareness_en.srt |
14.32KB |
| 014 Training and awareness.mp4 |
28.09MB |
| 014 What we covered in Domain 2_en.srt |
996B |
| 014 What we covered in Domain 2.mp4 |
6.97MB |
| 015 Certified in Cybersecurity (CC) Domain 2 links.html |
2.15KB |
| 015 LAN topologies_en.srt |
14.12KB |
| 015 LAN topologies.mp4 |
26.23MB |
| 015 Risk Management - part 2_en.srt |
14.39KB |
| 015 Risk Management - part 2.mp4 |
30.33MB |
| 015 Social Engineering attacks - Part 1_en.srt |
17.45KB |
| 015 Social Engineering attacks - Part 1.mp4 |
31.51MB |
| 016 Risk Management - part 3_en.srt |
17.02KB |
| 016 Risk Management - part 3.mp4 |
26.77MB |
| 016 Social Engineering attacks - Part 2_en.srt |
18.00KB |
| 016 Social Engineering attacks - Part 2.mp4 |
41.60MB |
| 016 Wi-Fi_en.srt |
16.14KB |
| 016 Wi-Fi.mp4 |
51.74MB |
| 017 Risk Management - part 4_en.srt |
16.04KB |
| 017 Risk Management - part 4.mp4 |
30.80MB |
| 017 What we covered in Domain 5_en.srt |
1.40KB |
| 017 What we covered in Domain 5.mp4 |
8.47MB |
| 017 Wireless networks - Part 1_en.srt |
11.56KB |
| 017 Wireless networks - Part 1.mp4 |
20.06MB |
| 018 Certified in Cybersecurity (CC) Domain 5 links.html |
5.65KB |
| 018 Risk Management - part 5_en.srt |
14.43KB |
| 018 Risk Management - part 5.mp4 |
47.26MB |
| 018 Wireless networks - Part 2_en.srt |
10.39KB |
| 018 Wireless networks - Part 2.mp4 |
40.54MB |
| 019 Risk Management - part 6_en.srt |
10.15KB |
| 019 Risk Management - part 6.mp4 |
24.03MB |
| 019 VLANs and Routers - Part 1_en.srt |
12.02KB |
| 019 VLANs and Routers - Part 1.mp4 |
41.41MB |
| 020 Access Control Categories and Types - part 1_en.srt |
14.21KB |
| 020 Access Control Categories and Types - part 1.mp4 |
28.19MB |
| 020 VLANs and Routers - Part 2_en.srt |
14.31KB |
| 020 VLANs and Routers - Part 2.mp4 |
42.52MB |
| 021 Access Control Categories and Types - part 2_en.srt |
17.01KB |
| 021 Access Control Categories and Types - part 2.mp4 |
39.31MB |
| 021 VPNs, NAC, and third-party connectivity_en.srt |
21.54KB |
| 021 VPNs, NAC, and third-party connectivity.mp4 |
49.27MB |
| 022 SDN, SD-WAN, and SDX_en.srt |
15.48KB |
| 022 SDN, SD-WAN, and SDX.mp4 |
37.67MB |
| 022 The Ethics of your organizations and (ISC)2_en.srt |
6.83KB |
| 022 The Ethics of your organizations and (ISC)2.mp4 |
17.73MB |
| 023 Attacks and attackers - Part 1_en.srt |
13.53KB |
| 023 Attacks and attackers - Part 1.mp4 |
29.25MB |
| 023 Governance vs. Management_en.srt |
13.62KB |
| 023 Governance vs. Management.mp4 |
45.51MB |
| 024 Attacks and attackers - Part 2_en.srt |
20.30KB |
| 024 Attacks and attackers - Part 2.mp4 |
37.67MB |
| 024 Laws and regulations - part 1_en.srt |
13.84KB |
| 024 Laws and regulations - part 1.mp4 |
77.44MB |
| 025 Attacks and attackers - Part 3_en.srt |
15.68KB |
| 025 Attacks and attackers - Part 3.mp4 |
64.59MB |
| 025 Laws and regulations - part 2_en.srt |
15.05KB |
| 025 Laws and regulations - part 2.mp4 |
55.54MB |
| 026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1_en.srt |
11.69KB |
| 026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4 |
26.55MB |
| 026 Security governance principles_en.srt |
17.50KB |
| 026 Security governance principles.mp4 |
60.30MB |
| 027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2_en.srt |
15.34KB |
| 027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4 |
35.91MB |
| 027 What we covered in Domain 1_en.srt |
975B |
| 027 What we covered in Domain 1.mp4 |
8.34MB |
| 028 Certified in Cybersecurity (CC) Domain 1 links.html |
4.88KB |
| 028 SIEM and SOAR systems_en.srt |
10.48KB |
| 028 SIEM and SOAR systems.mp4 |
26.21MB |
| 029 Honeynets and Honeypots_en.srt |
5.43KB |
| 029 Honeynets and Honeypots.mp4 |
10.89MB |
| 030 Firewalls - Part 1_en.srt |
9.31KB |
| 030 Firewalls - Part 1.mp4 |
28.95MB |
| 031 Firewalls - Part 2_en.srt |
16.66KB |
| 031 Firewalls - Part 2.mp4 |
34.78MB |
| 032 0-day attacks and exploits_en.srt |
13.76KB |
| 032 0-day attacks and exploits.mp4 |
56.09MB |
| 033 Vulnerability Scanning_en.srt |
8.43KB |
| 033 Vulnerability Scanning.mp4 |
16.41MB |
| 034 Virtualization, Cloud, and Distributed Computing - Part 1_en.srt |
12.29KB |
| 034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4 |
29.24MB |
| 035 Virtualization, Cloud, and Distributed Computing - Part 2_en.srt |
13.87KB |
| 035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4 |
26.52MB |
| 036 Virtualization, Cloud, and Distributed Computing - Part 3_en.srt |
9.97KB |
| 036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4 |
21.58MB |
| 037 Virtualization, Cloud, and Distributed Computing - Part 4_en.srt |
17.59KB |
| 037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 |
58.58MB |
| 038 Virtualization, Cloud, and Distributed Computing - Part 5_en.srt |
18.94KB |
| 038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 |
87.42MB |
| 039 The Internet of Things (IoT)_en.srt |
10.35KB |
| 039 The Internet of Things (IoT).mp4 |
19.93MB |
| 040 Asset tracking and hardware hardening_en.srt |
14.58KB |
| 040 Asset tracking and hardware hardening.mp4 |
24.47MB |
| 041 Electricity_en.srt |
17.83KB |
| 041 Electricity.mp4 |
58.20MB |
| 042 Backups - Part 1_en.srt |
18.07KB |
| 042 Backups - Part 1.mp4 |
33.52MB |
| 043 Backups - Part 2_en.srt |
14.13KB |
| 043 Backups - Part 2.mp4 |
30.14MB |
| 044 Fault tolerance, redundancy, and resiliency - Part 1_en.srt |
10.98KB |
| 044 Fault tolerance, redundancy, and resiliency - Part 1.mp4 |
19.65MB |
| 045 Fault tolerance, redundancy, and resiliency - Part 2_en.srt |
16.91KB |
| 045 Fault tolerance, redundancy, and resiliency - Part 2.mp4 |
22.04MB |
| 046 Fault tolerance, redundancy, and resiliency - Part 3_en.srt |
10.63KB |
| 046 Fault tolerance, redundancy, and resiliency - Part 3.mp4 |
23.09MB |
| 047 Fire suppression - Part 1_en.srt |
10.31KB |
| 047 Fire suppression - Part 1.mp4 |
18.61MB |
| 048 Fire suppression - Part 2_en.srt |
14.44KB |
| 048 Fire suppression - Part 2.mp4 |
30.38MB |
| 049 Secure design principles - Part 1_en.srt |
14.65KB |
| 049 Secure design principles - Part 1.mp4 |
57.32MB |
| 050 Secure design principles - Part 2_en.srt |
17.08KB |
| 050 Secure design principles - Part 2.mp4 |
36.04MB |
| 051 What we covered in Domain 4_en.srt |
1.15KB |
| 051 What we covered in Domain 4.mp4 |
7.43MB |
| 052 Certified in Cybersecurity (CC) Domain 4 links.html |
13.46KB |