Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[CourseClub.Me].url |
122B |
[CourseClub.Me].url |
122B |
[FreeCourseSite.com].url |
127B |
[FreeCourseSite.com].url |
127B |
[GigaCourse.Com].url |
49B |
[GigaCourse.Com].url |
49B |
001 2023-CC-Domain-1-Study-guide-by-ThorTeaches.com-v1.1.pdf |
1.33MB |
001 2023-CC-Domain-2-Study-guide-by-ThorTeaches.com-v1.1.pdf |
813.63KB |
001 2023-CC-Domain-3-Study-guide-by-ThorTeaches.com-v1.1.pdf |
1.15MB |
001 2023-CC-Domain-4-Study-guide-by-ThorTeaches.com-v1.1.pdf |
4.42MB |
001 2023-CC-Domain-5-Study-guide-by-ThorTeaches.com-v1.1.pdf |
754.55KB |
001 2023-CC-Mnemonics-by-ThorTeaches.pdf |
281.69KB |
001 Domain 1 recap Certified in Cybersecurity (CC)_en.srt |
33.82KB |
001 Domain 1 recap Certified in Cybersecurity (CC).mp4 |
120.29MB |
001 Domain 1 - What we will be covering_en.srt |
1.23KB |
001 Domain 1 - What we will be covering.mp4 |
10.44MB |
001 Domain 2 - What we will be covering_en.srt |
1.22KB |
001 Domain 2 - What we will be covering.mp4 |
9.15MB |
001 Domain 3 - What we will be covering_en.srt |
1.14KB |
001 Domain 3 - What we will be covering.mp4 |
7.58MB |
001 Domain 4 - What we will be covering_en.srt |
1.03KB |
001 Domain 4 - What we will be covering.mp4 |
8.24MB |
001 Domain 5 - What we will be covering_en.srt |
973B |
001 Domain 5 - What we will be covering.mp4 |
6.41MB |
001 Introduction and download your free study guides_en.srt |
1.13KB |
001 Introduction and download your free study guides.mp4 |
11.55MB |
001 Why you should want to get Certified in Cybersecurity_en.srt |
9.30KB |
001 Why you should want to get Certified in Cybersecurity.mp4 |
18.05MB |
002 BCP - Business Continuity Planning - Part 1_en.srt |
11.75KB |
002 BCP - Business Continuity Planning - Part 1.mp4 |
40.19MB |
002 Configuration Management_en.srt |
11.48KB |
002 Configuration Management.mp4 |
15.25MB |
002 Connect with me on Social media and the Udemy ratings system_en.srt |
2.79KB |
002 Connect with me on Social media and the Udemy ratings system.mp4 |
12.13MB |
002 Domain 2 recap Certified in Cybersecurity (CC)_en.srt |
27.92KB |
002 Domain 2 recap Certified in Cybersecurity (CC).mp4 |
87.58MB |
002 Network Basics and Definitions - Part 1_en.srt |
18.57KB |
002 Network Basics and Definitions - Part 1.mp4 |
44.54MB |
002 Physical Security - part 1_en.srt |
19.05KB |
002 Physical Security - part 1.mp4 |
43.48MB |
002 Scheduling your exam and what to expect_en.srt |
9.17KB |
002 Scheduling your exam and what to expect.mp4 |
42.74MB |
002 The differences between Information Security, IT Security, and Cybersecurity_en.srt |
10.26KB |
002 The differences between Information Security, IT Security, and Cybersecurity.mp4 |
55.99MB |
003 BCP - Business Continuity Planning - Part 2_en.srt |
20.68KB |
003 BCP - Business Continuity Planning - Part 2.mp4 |
31.03MB |
003 Domain 3 recap Certified in Cybersecurity (CC)_en.srt |
21.09KB |
003 Domain 3 recap Certified in Cybersecurity (CC).mp4 |
88.62MB |
003 How to get the most out of my courses and the Udemy interface_en.srt |
3.94KB |
003 How to get the most out of my courses and the Udemy interface.mp4 |
29.24MB |
003 Network Basics and Definitions - Part 2_en.srt |
16.51KB |
003 Network Basics and Definitions - Part 2.mp4 |
38.86MB |
003 Patch Management_en.srt |
21.45KB |
003 Patch Management.mp4 |
28.32MB |
003 Physical Security - part 2_en.srt |
11.82KB |
003 Physical Security - part 2.mp4 |
43.88MB |
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1_en.srt |
11.24KB |
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4 |
21.43MB |
003 What to expect on exam day and after_en.srt |
13.70KB |
003 What to expect on exam day and after.mp4 |
33.22MB |
004 BCP - Business Continuity Planning - Part 3_en.srt |
20.13KB |
004 BCP - Business Continuity Planning - Part 3.mp4 |
45.47MB |
004 Change Management_en.srt |
21.25KB |
004 Change Management.mp4 |
42.65MB |
004 Domain 4 recap Certified in Cybersecurity (CC)_en.srt |
125.70KB |
004 Domain 4 recap Certified in Cybersecurity (CC).mp4 |
408.01MB |
004 How to approach certification studying_en.srt |
6.10KB |
004 How to approach certification studying.mp4 |
26.50MB |
004 I passed the exam now what_en.srt |
8.66KB |
004 I passed the exam now what.mp4 |
20.30MB |
004 Physical Security - part 3_en.srt |
20.21KB |
004 Physical Security - part 3.mp4 |
27.80MB |
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2_en.srt |
12.91KB |
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4 |
18.57MB |
004 The OSI Model - Part 1_en.srt |
25.40KB |
004 The OSI Model - Part 1.mp4 |
100.95MB |
005 Cryptography - Part 1_en.srt |
15.12KB |
005 Cryptography - Part 1.mp4 |
31.71MB |
005 Domain 5 recap Certified in Cybersecurity (CC)_en.srt |
50.39KB |
005 Domain 5 recap Certified in Cybersecurity (CC).mp4 |
161.52MB |
005 DRP - Disaster Recovery Planning - Part 1_en.srt |
19.73KB |
005 DRP - Disaster Recovery Planning - Part 1.mp4 |
44.90MB |
005 General Certified in Cybersecurity (CC) links.html |
3.13KB |
005 I failed the exam now what_en.srt |
16.36KB |
005 I failed the exam now what.mp4 |
24.49MB |
005 Physical Security - part 4_en.srt |
14.26KB |
005 Physical Security - part 4.mp4 |
25.06MB |
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3_en.srt |
6.39KB |
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4 |
9.47MB |
005 The OSI Model - Part 2_en.srt |
13.41KB |
005 The OSI Model - Part 2.mp4 |
49.81MB |
006 CC-Fillable-study-plan-2023.pdf |
370.96KB |
006 CC-Study-plan-by-ThorTeaches.xlsx |
10.50KB |
006 Cryptography - Part 2_en.srt |
11.73KB |
006 Cryptography - Part 2.mp4 |
51.12MB |
006 DRP - Disaster Recovery Planning - Part 2_en.srt |
9.44KB |
006 DRP - Disaster Recovery Planning - Part 2.mp4 |
37.65MB |
006 How to approach practice questions_en.srt |
18.28KB |
006 How to approach practice questions.mp4 |
118.51MB |
006 Physical Security - part 5_en.srt |
12.01KB |
006 Physical Security - part 5.mp4 |
22.64MB |
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4_en.srt |
16.02KB |
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4 |
23.36MB |
006 The OSI Model - Part 3_en.srt |
12.73KB |
006 The OSI Model - Part 3.mp4 |
56.88MB |
007 Cryptography - Part 3_en.srt |
10.82KB |
007 Cryptography - Part 3.mp4 |
32.74MB |
007 DRP - Disaster Recovery Planning - Part 3_en.srt |
15.92KB |
007 DRP - Disaster Recovery Planning - Part 3.mp4 |
47.13MB |
007 How to design your career and certification path_en.srt |
23.76KB |
007 How to design your career and certification path.mp4 |
74.37MB |
007 Logical Access Control - Part 1_en.srt |
14.43KB |
007 Logical Access Control - Part 1.mp4 |
27.12MB |
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5_en.srt |
6.48KB |
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4 |
12.71MB |
007 The TCPIP model_en.srt |
14.66KB |
007 The TCPIP model.mp4 |
48.74MB |
008 DRP - Disaster Recovery Planning - Part 4_en.srt |
21.00KB |
008 DRP - Disaster Recovery Planning - Part 4.mp4 |
64.44MB |
008 Hashing_en.srt |
10.33KB |
008 Hashing.mp4 |
19.00MB |
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1_en.srt |
13.71KB |
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4 |
44.28MB |
008 IP addresses, port numbers, and MAC addresses - Part 1_en.srt |
18.58KB |
008 IP addresses, port numbers, and MAC addresses - Part 1.mp4 |
45.83MB |
008 Logical Access Control - Part 2_en.srt |
12.28KB |
008 Logical Access Control - Part 2.mp4 |
18.17MB |
009 Attacks on our cryptography_en.srt |
15.33KB |
009 Attacks on our cryptography.mp4 |
27.86MB |
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2_en.srt |
5.00KB |
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4 |
21.54MB |
009 Incidents Response - Part 1_en.srt |
20.86KB |
009 Incidents Response - Part 1.mp4 |
35.90MB |
009 IP addresses, port numbers, and MAC addresses - Part 2_en.srt |
9.05KB |
009 IP addresses, port numbers, and MAC addresses - Part 2.mp4 |
24.34MB |
009 Logical Access Control - Part 3_en.srt |
19.06KB |
009 Logical Access Control - Part 3.mp4 |
78.46MB |
010 Data handling, data storage and data retention - Part 1_en.srt |
15.26KB |
010 Data handling, data storage and data retention - Part 1.mp4 |
56.90MB |
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3_en.srt |
13.02KB |
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4 |
34.34MB |
010 Incidents Response - Part 2_en.srt |
16.60KB |
010 Incidents Response - Part 2.mp4 |
28.47MB |
010 IP addresses, port numbers, and MAC addresses - Part 3_en.srt |
7.49KB |
010 IP addresses, port numbers, and MAC addresses - Part 3.mp4 |
20.89MB |
010 Logical Access Control - Part 4_en.srt |
13.07KB |
010 Logical Access Control - Part 4.mp4 |
43.94MB |
011 Data handling, data storage and data retention - Part 2_en.srt |
16.81KB |
011 Data handling, data storage and data retention - Part 2.mp4 |
39.16MB |
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4_en.srt |
15.16KB |
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 |
67.93MB |
011 Incidents Response - Part 3_en.srt |
13.12KB |
011 Incidents Response - Part 3.mp4 |
18.50MB |
011 IP support protocols - Part 1_en.srt |
12.20KB |
011 IP support protocols - Part 1.mp4 |
46.51MB |
011 Logical Access Control - Part 5_en.srt |
18.67KB |
011 Logical Access Control - Part 5.mp4 |
81.13MB |
012 Data handling, data storage and data retention - Part 3_en.srt |
9.11KB |
012 Data handling, data storage and data retention - Part 3.mp4 |
28.28MB |
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5_en.srt |
7.08KB |
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4 |
18.76MB |
012 Incidents Response - Part 4_en.srt |
18.01KB |
012 Incidents Response - Part 4.mp4 |
23.22MB |
012 IP support protocols - Part 2_en.srt |
10.09KB |
012 IP support protocols - Part 2.mp4 |
33.89MB |
012 What we covered in Domain 3_en.srt |
1.08KB |
012 What we covered in Domain 3.mp4 |
6.91MB |
013 Administrative (Directive) Controls_en.srt |
26.41KB |
013 Administrative (Directive) Controls.mp4 |
87.94MB |
013 Cables - Part 1_en.srt |
12.03KB |
013 Cables - Part 1.mp4 |
22.32MB |
013 Certified in Cybersecurity Domain (CC) 3 links.html |
5.06KB |
013 Incidents Response - Part 5_en.srt |
12.33KB |
013 Incidents Response - Part 5.mp4 |
44.03MB |
013 Privacy_en.srt |
9.99KB |
013 Privacy.mp4 |
16.11MB |
014 Cables - Part 2_en.srt |
13.27KB |
014 Cables - Part 2.mp4 |
45.97MB |
014 Risk Management - part 1_en.srt |
8.46KB |
014 Risk Management - part 1.mp4 |
12.94MB |
014 Training and awareness_en.srt |
14.32KB |
014 Training and awareness.mp4 |
28.09MB |
014 What we covered in Domain 2_en.srt |
996B |
014 What we covered in Domain 2.mp4 |
6.97MB |
015 Certified in Cybersecurity (CC) Domain 2 links.html |
2.15KB |
015 LAN topologies_en.srt |
14.12KB |
015 LAN topologies.mp4 |
26.23MB |
015 Risk Management - part 2_en.srt |
14.39KB |
015 Risk Management - part 2.mp4 |
30.33MB |
015 Social Engineering attacks - Part 1_en.srt |
17.45KB |
015 Social Engineering attacks - Part 1.mp4 |
31.51MB |
016 Risk Management - part 3_en.srt |
17.02KB |
016 Risk Management - part 3.mp4 |
26.77MB |
016 Social Engineering attacks - Part 2_en.srt |
18.00KB |
016 Social Engineering attacks - Part 2.mp4 |
41.60MB |
016 Wi-Fi_en.srt |
16.14KB |
016 Wi-Fi.mp4 |
51.74MB |
017 Risk Management - part 4_en.srt |
16.04KB |
017 Risk Management - part 4.mp4 |
30.80MB |
017 What we covered in Domain 5_en.srt |
1.40KB |
017 What we covered in Domain 5.mp4 |
8.47MB |
017 Wireless networks - Part 1_en.srt |
11.56KB |
017 Wireless networks - Part 1.mp4 |
20.06MB |
018 Certified in Cybersecurity (CC) Domain 5 links.html |
5.65KB |
018 Risk Management - part 5_en.srt |
14.43KB |
018 Risk Management - part 5.mp4 |
47.26MB |
018 Wireless networks - Part 2_en.srt |
10.39KB |
018 Wireless networks - Part 2.mp4 |
40.54MB |
019 Risk Management - part 6_en.srt |
10.15KB |
019 Risk Management - part 6.mp4 |
24.03MB |
019 VLANs and Routers - Part 1_en.srt |
12.02KB |
019 VLANs and Routers - Part 1.mp4 |
41.41MB |
020 Access Control Categories and Types - part 1_en.srt |
14.21KB |
020 Access Control Categories and Types - part 1.mp4 |
28.19MB |
020 VLANs and Routers - Part 2_en.srt |
14.31KB |
020 VLANs and Routers - Part 2.mp4 |
42.52MB |
021 Access Control Categories and Types - part 2_en.srt |
17.01KB |
021 Access Control Categories and Types - part 2.mp4 |
39.31MB |
021 VPNs, NAC, and third-party connectivity_en.srt |
21.54KB |
021 VPNs, NAC, and third-party connectivity.mp4 |
49.27MB |
022 SDN, SD-WAN, and SDX_en.srt |
15.48KB |
022 SDN, SD-WAN, and SDX.mp4 |
37.67MB |
022 The Ethics of your organizations and (ISC)2_en.srt |
6.83KB |
022 The Ethics of your organizations and (ISC)2.mp4 |
17.73MB |
023 Attacks and attackers - Part 1_en.srt |
13.53KB |
023 Attacks and attackers - Part 1.mp4 |
29.25MB |
023 Governance vs. Management_en.srt |
13.62KB |
023 Governance vs. Management.mp4 |
45.51MB |
024 Attacks and attackers - Part 2_en.srt |
20.30KB |
024 Attacks and attackers - Part 2.mp4 |
37.67MB |
024 Laws and regulations - part 1_en.srt |
13.84KB |
024 Laws and regulations - part 1.mp4 |
77.44MB |
025 Attacks and attackers - Part 3_en.srt |
15.68KB |
025 Attacks and attackers - Part 3.mp4 |
64.59MB |
025 Laws and regulations - part 2_en.srt |
15.05KB |
025 Laws and regulations - part 2.mp4 |
55.54MB |
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1_en.srt |
11.69KB |
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4 |
26.55MB |
026 Security governance principles_en.srt |
17.50KB |
026 Security governance principles.mp4 |
60.30MB |
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2_en.srt |
15.34KB |
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4 |
35.91MB |
027 What we covered in Domain 1_en.srt |
975B |
027 What we covered in Domain 1.mp4 |
8.34MB |
028 Certified in Cybersecurity (CC) Domain 1 links.html |
4.88KB |
028 SIEM and SOAR systems_en.srt |
10.48KB |
028 SIEM and SOAR systems.mp4 |
26.21MB |
029 Honeynets and Honeypots_en.srt |
5.43KB |
029 Honeynets and Honeypots.mp4 |
10.89MB |
030 Firewalls - Part 1_en.srt |
9.31KB |
030 Firewalls - Part 1.mp4 |
28.95MB |
031 Firewalls - Part 2_en.srt |
16.66KB |
031 Firewalls - Part 2.mp4 |
34.78MB |
032 0-day attacks and exploits_en.srt |
13.76KB |
032 0-day attacks and exploits.mp4 |
56.09MB |
033 Vulnerability Scanning_en.srt |
8.43KB |
033 Vulnerability Scanning.mp4 |
16.41MB |
034 Virtualization, Cloud, and Distributed Computing - Part 1_en.srt |
12.29KB |
034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4 |
29.24MB |
035 Virtualization, Cloud, and Distributed Computing - Part 2_en.srt |
13.87KB |
035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4 |
26.52MB |
036 Virtualization, Cloud, and Distributed Computing - Part 3_en.srt |
9.97KB |
036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4 |
21.58MB |
037 Virtualization, Cloud, and Distributed Computing - Part 4_en.srt |
17.59KB |
037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 |
58.58MB |
038 Virtualization, Cloud, and Distributed Computing - Part 5_en.srt |
18.94KB |
038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 |
87.42MB |
039 The Internet of Things (IoT)_en.srt |
10.35KB |
039 The Internet of Things (IoT).mp4 |
19.93MB |
040 Asset tracking and hardware hardening_en.srt |
14.58KB |
040 Asset tracking and hardware hardening.mp4 |
24.47MB |
041 Electricity_en.srt |
17.83KB |
041 Electricity.mp4 |
58.20MB |
042 Backups - Part 1_en.srt |
18.07KB |
042 Backups - Part 1.mp4 |
33.52MB |
043 Backups - Part 2_en.srt |
14.13KB |
043 Backups - Part 2.mp4 |
30.14MB |
044 Fault tolerance, redundancy, and resiliency - Part 1_en.srt |
10.98KB |
044 Fault tolerance, redundancy, and resiliency - Part 1.mp4 |
19.65MB |
045 Fault tolerance, redundancy, and resiliency - Part 2_en.srt |
16.91KB |
045 Fault tolerance, redundancy, and resiliency - Part 2.mp4 |
22.04MB |
046 Fault tolerance, redundancy, and resiliency - Part 3_en.srt |
10.63KB |
046 Fault tolerance, redundancy, and resiliency - Part 3.mp4 |
23.09MB |
047 Fire suppression - Part 1_en.srt |
10.31KB |
047 Fire suppression - Part 1.mp4 |
18.61MB |
048 Fire suppression - Part 2_en.srt |
14.44KB |
048 Fire suppression - Part 2.mp4 |
30.38MB |
049 Secure design principles - Part 1_en.srt |
14.65KB |
049 Secure design principles - Part 1.mp4 |
57.32MB |
050 Secure design principles - Part 2_en.srt |
17.08KB |
050 Secure design principles - Part 2.mp4 |
36.04MB |
051 What we covered in Domain 4_en.srt |
1.15KB |
051 What we covered in Domain 4.mp4 |
7.43MB |
052 Certified in Cybersecurity (CC) Domain 4 links.html |
13.46KB |