|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
189.91KB |
| 1 |
154.91KB |
| 1.1 1.Contrast & Compare Information Security Roles - CompTIA Security+ Attacks, Threats and Vulnerabilities.pdf |
5.36MB |
| 1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms.pdf |
5.20MB |
| 1.1 Incident Management.pdf |
2.75MB |
| 1.1 Information Security Governance.pdf |
3.80MB |
| 1. Compare and Contrast Information Security Roles.mp4 |
65.00MB |
| 1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms.mp4 |
204.81MB |
| 1. Incident Management.mp4 |
50.66MB |
| 1. Information Security Governance.mp4 |
54.42MB |
| 1. Penetration Testing Concepts.mp4 |
105.74MB |
| 1. Wireless Networks & Security Controls.mp4 |
149.29MB |
| 10 |
119.75KB |
| 11 |
8.59KB |
| 12 |
492.57KB |
| 13 |
636.19KB |
| 14 |
802.28KB |
| 15 |
894.37KB |
| 16 |
362.28KB |
| 17 |
784.46KB |
| 18 |
37.37KB |
| 19 |
807.24KB |
| 2 |
124.86KB |
| 2.1 11. Identity Management Controls.pdf |
2.40MB |
| 2.1 2.Compare and Contrast Security Controls and Framework Types.pdf |
3.22MB |
| 2.1 2. Digital Signatures & Digital Certificates.pdf |
986.03KB |
| 2.1 8.Penetration Testing Concepts in detail.pdf |
9.78MB |
| 2.1 Digital Forensics.pdf |
2.61MB |
| 2.1 Information Security Programs.pdf |
4.79MB |
| 2.2 How To Use (And Not Use) The NIST CSF.html |
123B |
| 2. Compare and Contrast Security Controls and Framework Types.mp4 |
90.52MB |
| 2. Digital Forensics.mp4 |
51.15MB |
| 2. Digital Signatures & Digital Certificates.mp4 |
94.99MB |
| 2. Identity Management Controls.mp4 |
90.22MB |
| 2. Information gathering.mp4 |
88.13MB |
| 2. Information Security programs.mp4 |
96.61MB |
| 20 |
418.70KB |
| 21 |
126.83KB |
| 22 |
595.78KB |
| 23 |
746.31KB |
| 24 |
32.31KB |
| 25 |
866.40KB |
| 26 |
351.95KB |
| 27 |
833.68KB |
| 28 |
533.62KB |
| 29 |
604.03KB |
| 3 |
276.37KB |
| 3.1 3. Digital certificate Authorities.pdf |
953.66KB |
| 3.1 3.Types of Threat Actors and Attack Vectors.pdf |
5.30MB |
| 3.1 Cloud, Virtualization, BYOD and Security Testing.pdf |
8.16MB |
| 3.1 Risk Management.pdf |
5.52MB |
| 3. Cloud, Virtualization, BYOD & Security Testing.mp4 |
125.73MB |
| 3. Digital Certificate Authorities.mp4 |
43.19MB |
| 3. Risk Management.mp4 |
54.88MB |
| 3. Scanning.mp4 |
40.05MB |
| 3. Types of Threat Actors and Attack Vectors.mp4 |
68.65MB |
| 30 |
15.13KB |
| 31 |
148.11KB |
| 32 |
493.24KB |
| 33 |
991.11KB |
| 34 |
51.40KB |
| 35 |
226.32KB |
| 36 |
855.05KB |
| 37 |
494.87KB |
| 38 |
656.54KB |
| 39 |
718.93KB |
| 4 |
56.18KB |
| 4.1 4. Public Key Infrastructure - PKI.pdf |
3.48MB |
| 4.1 4.Threat Intelligence & Threat research Sources.pdf |
602.94KB |
| 4.1 Implementing Personnel Policies.pdf |
2.34MB |
| 4. Exploitation.mp4 |
17.52MB |
| 4. Implementing Personnel Policies.mp4 |
54.27MB |
| 4. Public Key Infastructure.mp4 |
52.97MB |
| 4. Threat Intelligence & Threat Research.mp4 |
95.88MB |
| 40 |
821.02KB |
| 41 |
124.64KB |
| 42 |
200.59KB |
| 43 |
214.42KB |
| 44 |
497.39KB |
| 45 |
203.05KB |
| 46 |
476.54KB |
| 47 |
528.75KB |
| 48 |
802.79KB |
| 49 |
223.32KB |
| 5 |
287.93KB |
| 5.1 12.Implementing Account Policies & Authorization Solutions.pdf |
1.23MB |
| 5.1 5. Commands used in Assessing Network layout & Security.pdf |
793.42KB |
| 5.1 5. PKI Management.pdf |
3.53MB |
| 5. Account Policies & Authorization.mp4 |
40.41MB |
| 5. Commands used in Assessing Network layout & Security.mp4 |
105.95MB |
| 5. PKI Management.mp4 |
102.56MB |
| 5. Post Exploitation Maintaining access.mp4 |
41.48MB |
| 50 |
256.48KB |
| 51 |
395.54KB |
| 52 |
447.75KB |
| 53 |
612.77KB |
| 54 |
679.99KB |
| 55 |
323.33KB |
| 6 |
52.13KB |
| 6.1 6.Identification, Authentication & Access Control Systems.pdf |
1.68MB |
| 6.1 6. Security concerns regarding Vulnerabilities.pdf |
2.56MB |
| 6. Identification, Authentication & Access Control Systems.mp4 |
33.86MB |
| 6. Reporting.mp4 |
12.95MB |
| 6. Security concerns regarding Vulnerabilities.mp4 |
62.21MB |
| 7 |
270.15KB |
| 7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures.pdf |
2.78MB |
| 7. Knowledge based Authentication.mp4 |
113.72MB |
| 7. Vulnerability Scanning Techniques and Vulnerability scores & exposures.mp4 |
58.59MB |
| 8 |
448.66KB |
| 8.1 8. Technology implementing Secure Authentication.pdf |
4.88MB |
| 8.1 9.Social Engineering Attacks & Principles.pdf |
4.80MB |
| 8. Social Engineering Attacks & Principles.mp4 |
123.17MB |
| 8. Technology behind Secure Authentication.mp4 |
90.38MB |
| 9 |
403.61KB |
| 9.1 10.Malware and Types of malwares.pdf |
4.51MB |
| 9.1 9. Biometric Authentication Concepts.pdf |
15.03MB |
| 9. Biometric Authentication.mp4 |
175.85MB |
| 9. Malware and Types of malwares.mp4 |
65.23MB |
| TutsNode.net.txt |
63B |