Torrent Info
Title [FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
Category
Size 5.37GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[FreeCourseSite.com].url 127B
[FreeCourseSite.com].url 127B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
001 2023-CC-Domain-1-Study-guide-by-ThorTeaches.com-v1.1.pdf 1.33MB
001 2023-CC-Domain-2-Study-guide-by-ThorTeaches.com-v1.1.pdf 813.63KB
001 2023-CC-Domain-3-Study-guide-by-ThorTeaches.com-v1.1.pdf 1.15MB
001 2023-CC-Domain-4-Study-guide-by-ThorTeaches.com-v1.1.pdf 4.42MB
001 2023-CC-Domain-5-Study-guide-by-ThorTeaches.com-v1.1.pdf 754.55KB
001 2023-CC-Mnemonics-by-ThorTeaches.pdf 281.69KB
001 Domain 1 recap Certified in Cybersecurity (CC)_en.srt 33.82KB
001 Domain 1 recap Certified in Cybersecurity (CC).mp4 120.29MB
001 Domain 1 - What we will be covering_en.srt 1.23KB
001 Domain 1 - What we will be covering.mp4 10.44MB
001 Domain 2 - What we will be covering_en.srt 1.22KB
001 Domain 2 - What we will be covering.mp4 9.15MB
001 Domain 3 - What we will be covering_en.srt 1.14KB
001 Domain 3 - What we will be covering.mp4 7.58MB
001 Domain 4 - What we will be covering_en.srt 1.03KB
001 Domain 4 - What we will be covering.mp4 8.24MB
001 Domain 5 - What we will be covering_en.srt 973B
001 Domain 5 - What we will be covering.mp4 6.41MB
001 Introduction and download your free study guides_en.srt 1.13KB
001 Introduction and download your free study guides.mp4 11.55MB
001 Why you should want to get Certified in Cybersecurity_en.srt 9.30KB
001 Why you should want to get Certified in Cybersecurity.mp4 18.05MB
002 BCP - Business Continuity Planning - Part 1_en.srt 11.75KB
002 BCP - Business Continuity Planning - Part 1.mp4 40.19MB
002 Configuration Management_en.srt 11.48KB
002 Configuration Management.mp4 15.25MB
002 Connect with me on Social media and the Udemy ratings system_en.srt 2.79KB
002 Connect with me on Social media and the Udemy ratings system.mp4 12.13MB
002 Domain 2 recap Certified in Cybersecurity (CC)_en.srt 27.92KB
002 Domain 2 recap Certified in Cybersecurity (CC).mp4 87.58MB
002 Network Basics and Definitions - Part 1_en.srt 18.57KB
002 Network Basics and Definitions - Part 1.mp4 44.54MB
002 Physical Security - part 1_en.srt 19.05KB
002 Physical Security - part 1.mp4 43.48MB
002 Scheduling your exam and what to expect_en.srt 9.17KB
002 Scheduling your exam and what to expect.mp4 42.74MB
002 The differences between Information Security, IT Security, and Cybersecurity_en.srt 10.26KB
002 The differences between Information Security, IT Security, and Cybersecurity.mp4 55.99MB
003 BCP - Business Continuity Planning - Part 2_en.srt 20.68KB
003 BCP - Business Continuity Planning - Part 2.mp4 31.03MB
003 Domain 3 recap Certified in Cybersecurity (CC)_en.srt 21.09KB
003 Domain 3 recap Certified in Cybersecurity (CC).mp4 88.62MB
003 How to get the most out of my courses and the Udemy interface_en.srt 3.94KB
003 How to get the most out of my courses and the Udemy interface.mp4 29.24MB
003 Network Basics and Definitions - Part 2_en.srt 16.51KB
003 Network Basics and Definitions - Part 2.mp4 38.86MB
003 Patch Management_en.srt 21.45KB
003 Patch Management.mp4 28.32MB
003 Physical Security - part 2_en.srt 11.82KB
003 Physical Security - part 2.mp4 43.88MB
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1_en.srt 11.24KB
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4 21.43MB
003 What to expect on exam day and after_en.srt 13.70KB
003 What to expect on exam day and after.mp4 33.22MB
004 BCP - Business Continuity Planning - Part 3_en.srt 20.13KB
004 BCP - Business Continuity Planning - Part 3.mp4 45.47MB
004 Change Management_en.srt 21.25KB
004 Change Management.mp4 42.65MB
004 Domain 4 recap Certified in Cybersecurity (CC)_en.srt 125.70KB
004 Domain 4 recap Certified in Cybersecurity (CC).mp4 408.01MB
004 How to approach certification studying_en.srt 6.10KB
004 How to approach certification studying.mp4 26.50MB
004 I passed the exam now what_en.srt 8.66KB
004 I passed the exam now what.mp4 20.30MB
004 Physical Security - part 3_en.srt 20.21KB
004 Physical Security - part 3.mp4 27.80MB
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2_en.srt 12.91KB
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4 18.57MB
004 The OSI Model - Part 1_en.srt 25.40KB
004 The OSI Model - Part 1.mp4 100.95MB
005 Cryptography - Part 1_en.srt 15.12KB
005 Cryptography - Part 1.mp4 31.71MB
005 Domain 5 recap Certified in Cybersecurity (CC)_en.srt 50.39KB
005 Domain 5 recap Certified in Cybersecurity (CC).mp4 161.52MB
005 DRP - Disaster Recovery Planning - Part 1_en.srt 19.73KB
005 DRP - Disaster Recovery Planning - Part 1.mp4 44.90MB
005 General Certified in Cybersecurity (CC) links.html 3.13KB
005 I failed the exam now what_en.srt 16.36KB
005 I failed the exam now what.mp4 24.49MB
005 Physical Security - part 4_en.srt 14.26KB
005 Physical Security - part 4.mp4 25.06MB
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3_en.srt 6.39KB
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4 9.47MB
005 The OSI Model - Part 2_en.srt 13.41KB
005 The OSI Model - Part 2.mp4 49.81MB
006 CC-Fillable-study-plan-2023.pdf 370.96KB
006 CC-Study-plan-by-ThorTeaches.xlsx 10.50KB
006 Cryptography - Part 2_en.srt 11.73KB
006 Cryptography - Part 2.mp4 51.12MB
006 DRP - Disaster Recovery Planning - Part 2_en.srt 9.44KB
006 DRP - Disaster Recovery Planning - Part 2.mp4 37.65MB
006 How to approach practice questions_en.srt 18.28KB
006 How to approach practice questions.mp4 118.51MB
006 Physical Security - part 5_en.srt 12.01KB
006 Physical Security - part 5.mp4 22.64MB
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4_en.srt 16.02KB
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4 23.36MB
006 The OSI Model - Part 3_en.srt 12.73KB
006 The OSI Model - Part 3.mp4 56.88MB
007 Cryptography - Part 3_en.srt 10.82KB
007 Cryptography - Part 3.mp4 32.74MB
007 DRP - Disaster Recovery Planning - Part 3_en.srt 15.92KB
007 DRP - Disaster Recovery Planning - Part 3.mp4 47.13MB
007 How to design your career and certification path_en.srt 23.76KB
007 How to design your career and certification path.mp4 74.37MB
007 Logical Access Control - Part 1_en.srt 14.43KB
007 Logical Access Control - Part 1.mp4 27.12MB
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5_en.srt 6.48KB
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4 12.71MB
007 The TCPIP model_en.srt 14.66KB
007 The TCPIP model.mp4 48.74MB
008 DRP - Disaster Recovery Planning - Part 4_en.srt 21.00KB
008 DRP - Disaster Recovery Planning - Part 4.mp4 64.44MB
008 Hashing_en.srt 10.33KB
008 Hashing.mp4 19.00MB
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1_en.srt 13.71KB
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4 44.28MB
008 IP addresses, port numbers, and MAC addresses - Part 1_en.srt 18.58KB
008 IP addresses, port numbers, and MAC addresses - Part 1.mp4 45.83MB
008 Logical Access Control - Part 2_en.srt 12.28KB
008 Logical Access Control - Part 2.mp4 18.17MB
009 Attacks on our cryptography_en.srt 15.33KB
009 Attacks on our cryptography.mp4 27.86MB
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2_en.srt 5.00KB
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4 21.54MB
009 Incidents Response - Part 1_en.srt 20.86KB
009 Incidents Response - Part 1.mp4 35.90MB
009 IP addresses, port numbers, and MAC addresses - Part 2_en.srt 9.05KB
009 IP addresses, port numbers, and MAC addresses - Part 2.mp4 24.34MB
009 Logical Access Control - Part 3_en.srt 19.06KB
009 Logical Access Control - Part 3.mp4 78.46MB
010 Data handling, data storage and data retention - Part 1_en.srt 15.26KB
010 Data handling, data storage and data retention - Part 1.mp4 56.90MB
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3_en.srt 13.02KB
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4 34.34MB
010 Incidents Response - Part 2_en.srt 16.60KB
010 Incidents Response - Part 2.mp4 28.47MB
010 IP addresses, port numbers, and MAC addresses - Part 3_en.srt 7.49KB
010 IP addresses, port numbers, and MAC addresses - Part 3.mp4 20.89MB
010 Logical Access Control - Part 4_en.srt 13.07KB
010 Logical Access Control - Part 4.mp4 43.94MB
011 Data handling, data storage and data retention - Part 2_en.srt 16.81KB
011 Data handling, data storage and data retention - Part 2.mp4 39.16MB
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4_en.srt 15.16KB
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 67.93MB
011 Incidents Response - Part 3_en.srt 13.12KB
011 Incidents Response - Part 3.mp4 18.50MB
011 IP support protocols - Part 1_en.srt 12.20KB
011 IP support protocols - Part 1.mp4 46.51MB
011 Logical Access Control - Part 5_en.srt 18.67KB
011 Logical Access Control - Part 5.mp4 81.13MB
012 Data handling, data storage and data retention - Part 3_en.srt 9.11KB
012 Data handling, data storage and data retention - Part 3.mp4 28.28MB
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5_en.srt 7.08KB
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4 18.76MB
012 Incidents Response - Part 4_en.srt 18.01KB
012 Incidents Response - Part 4.mp4 23.22MB
012 IP support protocols - Part 2_en.srt 10.09KB
012 IP support protocols - Part 2.mp4 33.89MB
012 What we covered in Domain 3_en.srt 1.08KB
012 What we covered in Domain 3.mp4 6.91MB
013 Administrative (Directive) Controls_en.srt 26.41KB
013 Administrative (Directive) Controls.mp4 87.94MB
013 Cables - Part 1_en.srt 12.03KB
013 Cables - Part 1.mp4 22.32MB
013 Certified in Cybersecurity Domain (CC) 3 links.html 5.06KB
013 Incidents Response - Part 5_en.srt 12.33KB
013 Incidents Response - Part 5.mp4 44.03MB
013 Privacy_en.srt 9.99KB
013 Privacy.mp4 16.11MB
014 Cables - Part 2_en.srt 13.27KB
014 Cables - Part 2.mp4 45.97MB
014 Risk Management - part 1_en.srt 8.46KB
014 Risk Management - part 1.mp4 12.94MB
014 Training and awareness_en.srt 14.32KB
014 Training and awareness.mp4 28.09MB
014 What we covered in Domain 2_en.srt 996B
014 What we covered in Domain 2.mp4 6.97MB
015 Certified in Cybersecurity (CC) Domain 2 links.html 2.15KB
015 LAN topologies_en.srt 14.12KB
015 LAN topologies.mp4 26.23MB
015 Risk Management - part 2_en.srt 14.39KB
015 Risk Management - part 2.mp4 30.33MB
015 Social Engineering attacks - Part 1_en.srt 17.45KB
015 Social Engineering attacks - Part 1.mp4 31.51MB
016 Risk Management - part 3_en.srt 17.02KB
016 Risk Management - part 3.mp4 26.77MB
016 Social Engineering attacks - Part 2_en.srt 18.00KB
016 Social Engineering attacks - Part 2.mp4 41.60MB
016 Wi-Fi_en.srt 16.14KB
016 Wi-Fi.mp4 51.74MB
017 Risk Management - part 4_en.srt 16.04KB
017 Risk Management - part 4.mp4 30.80MB
017 What we covered in Domain 5_en.srt 1.40KB
017 What we covered in Domain 5.mp4 8.47MB
017 Wireless networks - Part 1_en.srt 11.56KB
017 Wireless networks - Part 1.mp4 20.06MB
018 Certified in Cybersecurity (CC) Domain 5 links.html 5.65KB
018 Risk Management - part 5_en.srt 14.43KB
018 Risk Management - part 5.mp4 47.26MB
018 Wireless networks - Part 2_en.srt 10.39KB
018 Wireless networks - Part 2.mp4 40.54MB
019 Risk Management - part 6_en.srt 10.15KB
019 Risk Management - part 6.mp4 24.03MB
019 VLANs and Routers - Part 1_en.srt 12.02KB
019 VLANs and Routers - Part 1.mp4 41.41MB
020 Access Control Categories and Types - part 1_en.srt 14.21KB
020 Access Control Categories and Types - part 1.mp4 28.19MB
020 VLANs and Routers - Part 2_en.srt 14.31KB
020 VLANs and Routers - Part 2.mp4 42.52MB
021 Access Control Categories and Types - part 2_en.srt 17.01KB
021 Access Control Categories and Types - part 2.mp4 39.31MB
021 VPNs, NAC, and third-party connectivity_en.srt 21.54KB
021 VPNs, NAC, and third-party connectivity.mp4 49.27MB
022 SDN, SD-WAN, and SDX_en.srt 15.48KB
022 SDN, SD-WAN, and SDX.mp4 37.67MB
022 The Ethics of your organizations and (ISC)2_en.srt 6.83KB
022 The Ethics of your organizations and (ISC)2.mp4 17.73MB
023 Attacks and attackers - Part 1_en.srt 13.53KB
023 Attacks and attackers - Part 1.mp4 29.25MB
023 Governance vs. Management_en.srt 13.62KB
023 Governance vs. Management.mp4 45.51MB
024 Attacks and attackers - Part 2_en.srt 20.30KB
024 Attacks and attackers - Part 2.mp4 37.67MB
024 Laws and regulations - part 1_en.srt 13.84KB
024 Laws and regulations - part 1.mp4 77.44MB
025 Attacks and attackers - Part 3_en.srt 15.68KB
025 Attacks and attackers - Part 3.mp4 64.59MB
025 Laws and regulations - part 2_en.srt 15.05KB
025 Laws and regulations - part 2.mp4 55.54MB
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1_en.srt 11.69KB
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4 26.55MB
026 Security governance principles_en.srt 17.50KB
026 Security governance principles.mp4 60.30MB
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2_en.srt 15.34KB
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4 35.91MB
027 What we covered in Domain 1_en.srt 975B
027 What we covered in Domain 1.mp4 8.34MB
028 Certified in Cybersecurity (CC) Domain 1 links.html 4.88KB
028 SIEM and SOAR systems_en.srt 10.48KB
028 SIEM and SOAR systems.mp4 26.21MB
029 Honeynets and Honeypots_en.srt 5.43KB
029 Honeynets and Honeypots.mp4 10.89MB
030 Firewalls - Part 1_en.srt 9.31KB
030 Firewalls - Part 1.mp4 28.95MB
031 Firewalls - Part 2_en.srt 16.66KB
031 Firewalls - Part 2.mp4 34.78MB
032 0-day attacks and exploits_en.srt 13.76KB
032 0-day attacks and exploits.mp4 56.09MB
033 Vulnerability Scanning_en.srt 8.43KB
033 Vulnerability Scanning.mp4 16.41MB
034 Virtualization, Cloud, and Distributed Computing - Part 1_en.srt 12.29KB
034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4 29.24MB
035 Virtualization, Cloud, and Distributed Computing - Part 2_en.srt 13.87KB
035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4 26.52MB
036 Virtualization, Cloud, and Distributed Computing - Part 3_en.srt 9.97KB
036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4 21.58MB
037 Virtualization, Cloud, and Distributed Computing - Part 4_en.srt 17.59KB
037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 58.58MB
038 Virtualization, Cloud, and Distributed Computing - Part 5_en.srt 18.94KB
038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 87.42MB
039 The Internet of Things (IoT)_en.srt 10.35KB
039 The Internet of Things (IoT).mp4 19.93MB
040 Asset tracking and hardware hardening_en.srt 14.58KB
040 Asset tracking and hardware hardening.mp4 24.47MB
041 Electricity_en.srt 17.83KB
041 Electricity.mp4 58.20MB
042 Backups - Part 1_en.srt 18.07KB
042 Backups - Part 1.mp4 33.52MB
043 Backups - Part 2_en.srt 14.13KB
043 Backups - Part 2.mp4 30.14MB
044 Fault tolerance, redundancy, and resiliency - Part 1_en.srt 10.98KB
044 Fault tolerance, redundancy, and resiliency - Part 1.mp4 19.65MB
045 Fault tolerance, redundancy, and resiliency - Part 2_en.srt 16.91KB
045 Fault tolerance, redundancy, and resiliency - Part 2.mp4 22.04MB
046 Fault tolerance, redundancy, and resiliency - Part 3_en.srt 10.63KB
046 Fault tolerance, redundancy, and resiliency - Part 3.mp4 23.09MB
047 Fire suppression - Part 1_en.srt 10.31KB
047 Fire suppression - Part 1.mp4 18.61MB
048 Fire suppression - Part 2_en.srt 14.44KB
048 Fire suppression - Part 2.mp4 30.38MB
049 Secure design principles - Part 1_en.srt 14.65KB
049 Secure design principles - Part 1.mp4 57.32MB
050 Secure design principles - Part 2_en.srt 17.08KB
050 Secure design principles - Part 2.mp4 36.04MB
051 What we covered in Domain 4_en.srt 1.15KB
051 What we covered in Domain 4.mp4 7.43MB
052 Certified in Cybersecurity (CC) Domain 4 links.html 13.46KB
Distribution statistics by country
Nigeria (NG) 3
Nepal (NP) 3
Netherlands (NL) 2
Singapore (SG) 2
Greece (GR) 2
Rwanda (RW) 1
Australia (AU) 1
Turkey (TR) 1
Italy (IT) 1
Mexico (MX) 1
Niger (NE) 1
United Kingdom (GB) 1
Kenya (KE) 1
Romania (RO) 1
South Africa (ZA) 1
Denmark (DK) 1
Jamaica (JM) 1
Total 24
IP List List of IP addresses which were distributed this torrent