Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
61.41Кб |
1 |
587.99Кб |
1.1 Best ways to stay safe online.docx |
15.78Кб |
1.1 Cybersecurity Audit.docx |
15.03Кб |
1.1 Cybersecurity Certs.docx |
14.62Кб |
1.1 Cybersecurity Governance Roles.docx |
14.86Кб |
1.1 Cybersecurity regulations and standards .docx |
14.65Кб |
1.1 Cybersecurity Threats and Attacks.docx |
15.45Кб |
1.1 Firewalls.docx |
15.04Кб |
1.1 How to Protect Your Systems and Data.docx |
15.56Кб |
1.1 Physical Security.docx |
16.96Кб |
1.1 Software Updates.docx |
15.74Кб |
1.2 Cybersecurity Governance.docx |
14.94Кб |
1.2 Introduction to Network Security.docx |
14.71Кб |
1.2 ISO 27001.docx |
14.98Кб |
1.2 Secure a Linux server.docx |
14.83Кб |
1.3 Secure a Windows server.docx |
14.10Кб |
1.3 Securing Networks - White and Blacklisting.docx |
14.72Кб |
1. Best Ways to Stay Safe Online.mp4 |
157.35Мб |
1. Cybersecurity Certifications.mp4 |
204.90Мб |
1. Cybersecurity Governance.mp4 |
98.88Мб |
1. Cybersecurity Regulations and Standards.mp4 |
240.84Мб |
1. Introduction to Network Security.mp4 |
86.07Мб |
1. Network Security Top Tips.mp4 |
231.80Мб |
1. Physical Security.mp4 |
132.93Мб |
1. Protect Your Device - Server Security.mp4 |
251.93Мб |
1. Security Audits.mp4 |
109.84Мб |
1. Software Updates.mp4 |
223.94Мб |
1. Threat and Attack Types.mp4 |
195.13Мб |
10 |
651.45Кб |
11 |
103.18Кб |
12 |
82.23Кб |
13 |
894.58Кб |
14 |
286.37Кб |
15 |
693.67Кб |
16 |
663.46Кб |
17 |
148.15Кб |
18 |
877.08Кб |
19 |
927.97Кб |
2 |
68.29Кб |
2.1 Cybersecurity awareness and training 101.docx |
14.78Кб |
2.1 DRP’s and BCP’s.pdf |
94.40Кб |
2.1 Incident Response.docx |
14.57Кб |
2.1 Malware.docx |
15.46Кб |
2.1 Networking Protocols and Standards.docx |
15.53Кб |
2.1 Passwords.docx |
15.15Кб |
2.1 Penetration testing 101.docx |
14.48Кб |
2.1 VPN Overview.docx |
15.14Кб |
2.1 Web Security and Secure Web Browsing.docx |
15.84Кб |
2. Cybersecurity Awareness and Training.mp4 |
217.36Мб |
2. Disaster Recovery and Business Continuity Planning.mp4 |
169.72Мб |
2. Incident Response.mp4 |
76.95Мб |
2. Malware.mp4 |
142.86Мб |
2. Networking Protocols and Standards.mp4 |
97.01Мб |
2. Password Security.mp4 |
322.11Мб |
2. Penetration Testing Fundamentals.mp4 |
283.43Мб |
2. Protect Your Device - Desktop + Laptop Security.mp4 |
219.69Мб |
2. Virtual Private Networks (VPN).mp4 |
136.67Мб |
2. Web Security and Secure Web Browsing.mp4 |
70.12Мб |
20 |
341.56Кб |
21 |
66.82Кб |
22 |
549.16Кб |
23 |
573.02Кб |
24 |
214.87Кб |
25 |
488.98Кб |
26 |
246.79Кб |
27 |
414.58Кб |
28 |
164.17Кб |
29 |
457.58Кб |
3 |
164.69Кб |
3.1 Acceptable Use Policy.pdf |
33.02Кб |
3.1 Cybersecurity training Rollout Plan.docx |
15.04Кб |
3.1 IDS.docx |
15.38Кб |
3.1 Network Security Devices.docx |
15.13Кб |
3.1 Penetration Tester Engagement.docx |
14.87Кб |
3.1 Phishing.docx |
15.33Кб |
3.1 The Cloud - Pros and Cons.docx |
16.22Кб |
3.2 Cybersecurity policies and compliance.docx |
14.23Кб |
3.2 The Cloud - Security Top Tips.docx |
16.41Кб |
3.3 Data Retention Policy.pdf |
36.61Кб |
3.4 Information Security Policy.pdf |
32.37Кб |
3.5 SOC 101.pdf |
27.11Кб |
3. Cloud Security.mp4 |
234.37Мб |
3. Cybersecurity Policy and Compliance Requirements.mp4 |
38.39Мб |
3. Cybersecurity Training Implementation and Plan.mp4 |
77.36Мб |
3. Don't Use These Passwords.mp4 |
105.55Мб |
3. Intrusion Detection Systems (IDS).mp4 |
112.76Мб |
3. Network Security Devices (Firewalls, Intrusion Detection Systems, VPNs).mp4 |
116.79Мб |
3. Penetration Tester Engagement.mp4 |
72.02Мб |
3. Phishing Attacks.mp4 |
102.38Мб |
3. Protect Your Device - macOS Security.mp4 |
161.32Мб |
30 |
637.99Кб |
31 |
120.51Кб |
32 |
348.74Кб |
33 |
1011.68Кб |
34 |
947.52Кб |
35 |
659.41Кб |
36 |
56.27Кб |
37 |
1000.04Кб |
38 |
904.90Кб |
4 |
646.40Кб |
4.1 MFA.docx |
15.22Кб |
4.1 Risk management and assessment.docx |
14.32Кб |
4.1 Social engineering.docx |
15.44Кб |
4. Multi-Factor Authentication.mp4 |
139.14Мб |
4. Protect Your Device - iPhone Security.mp4 |
233.86Мб |
4. Risk Management and Assessment.mp4 |
115.52Мб |
4. Social Engineering.mp4 |
197.92Мб |
5 |
139.45Кб |
5. 03 Protect Your Device - iPad Security.mp4 |
217.95Мб |
5.1 Data Encryption.docx |
15.40Кб |
5.1 DDoS.docx |
25.51Кб |
5.1 IAM nad SIEM Implementation.docx |
14.08Кб |
5.2 IAM nad SIEM.docx |
13.79Кб |
5. Data Encryption.mp4 |
128.46Мб |
5. DDoS.mp4 |
98.66Мб |
5. IAM, Security Information and Event Mgmt.mp4 |
124.44Мб |
6 |
202.88Кб |
6.1 VAM Implementation.docx |
14.04Кб |
6.2 VAM Summary.docx |
13.97Кб |
6. Setting up Data Encryption on Windows and Mac.mp4 |
137.09Мб |
6. Vulnerability Assessment and Management.mp4 |
111.60Мб |
7 |
61.84Кб |
8 |
313.68Кб |
9 |
55.05Кб |
TutsNode.net.txt |
63б |