|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585б |
| 0 |
107б |
| 01_adding-users.en.srt |
5.43Кб |
| 01_adding-users.en.txt |
3.21Кб |
| 01_adding-users.mp4 |
7.94Мб |
| 01_built-in-security-controls.en.srt |
9.13Кб |
| 01_built-in-security-controls.en.txt |
5.55Кб |
| 01_built-in-security-controls.mp4 |
40.21Мб |
| 01_congratulations.en.srt |
1.86Кб |
| 01_congratulations.en.txt |
1.17Кб |
| 01_congratulations.mp4 |
9.17Мб |
| 01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en srt |
8.04Кб |
| 01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en txt |
4.89Кб |
| 01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4 |
39.08Мб |
| 01_enterprise-install-of-centos.en.srt |
4.92Кб |
| 01_enterprise-install-of-centos.en.txt |
3.07Кб |
| 01_enterprise-install-of-centos.mp4 |
8.52Мб |
| 01_introduction.en.srt |
5.59Кб |
| 01_introduction.en.srt |
4.27Кб |
| 01_introduction.en.txt |
2.59Кб |
| 01_introduction.en.txt |
3.38Кб |
| 01_introduction.mp4 |
21.99Мб |
| 01_introduction.mp4 |
17.40Мб |
| 01_linux-in-the-enterprise.en.srt |
10.32Кб |
| 01_linux-in-the-enterprise.en.txt |
6.32Кб |
| 01_linux-in-the-enterprise.mp4 |
44.04Мб |
| 01_policies-part-1-organizational-policies.en.srt |
9.46Кб |
| 01_policies-part-1-organizational-policies.en.txt |
5.77Кб |
| 01_policies-part-1-organizational-policies.mp4 |
40.36Мб |
| 01_security-at-the-forefront.en.srt |
10.20Кб |
| 01_security-at-the-forefront.en.txt |
6.24Кб |
| 01_security-at-the-forefront.mp4 |
41.89Мб |
| 01_selinux.en.srt |
9.01Кб |
| 01_selinux.en.txt |
5.33Кб |
| 01_selinux.mp4 |
37.71Мб |
| 01_strategies-for-monitoring.en.srt |
8.48Кб |
| 01_strategies-for-monitoring.en.txt |
5.03Кб |
| 01_strategies-for-monitoring.mp4 |
37.50Мб |
| 01_updating-systems-in-the-enterprise.en.srt |
7.98Кб |
| 01_updating-systems-in-the-enterprise.en.txt |
4.91Кб |
| 01_updating-systems-in-the-enterprise.mp4 |
35.57Мб |
| 01_welcome.en.srt |
4.99Кб |
| 01_welcome.en.txt |
3.04Кб |
| 01_welcome.mp4 |
24.38Мб |
| 01_what-is-authorization.en.srt |
7.71Кб |
| 01_what-is-authorization.en.txt |
4.70Кб |
| 01_what-is-authorization.mp4 |
39.49Мб |
| 01_what-is-virtualization.en.srt |
7.34Кб |
| 01_what-is-virtualization.en.txt |
4.53Кб |
| 01_what-is-virtualization.mp4 |
37.90Мб |
| 01_why-do-we-need-to-learn-networking.en.srt |
9.58Кб |
| 01_why-do-we-need-to-learn-networking.en.txt |
5.82Кб |
| 01_why-do-we-need-to-learn-networking.mp4 |
46.40Мб |
| 01_why-information-security-in-the-first-place.en.srt |
7.55Кб |
| 01_why-information-security-in-the-first-place.en.txt |
4.74Кб |
| 01_why-information-security-in-the-first-place.mp4 |
31.83Мб |
| 01_windows-logon-process.en.srt |
5.70Кб |
| 01_windows-logon-process.en.txt |
3.65Кб |
| 01_windows-logon-process.mp4 |
9.02Мб |
| 02_about-linux-and-distributions.en.srt |
10.76Кб |
| 02_about-linux-and-distributions.en.txt |
6.29Кб |
| 02_about-linux-and-distributions.mp4 |
46.82Мб |
| 02_attack-surfaces.en.srt |
9.27Кб |
| 02_attack-surfaces.en.txt |
5.58Кб |
| 02_attack-surfaces.mp4 |
41.88Мб |
| 02_rights-and-permissions.en.srt |
7.16Кб |
| 02_rights-and-permissions.en.txt |
4.34Кб |
| 02_rights-and-permissions.mp4 |
11.03Мб |
| 02_splunk.en.srt |
6.23Кб |
| 02_splunk.en.txt |
3.78Кб |
| 02_splunk.mp4 |
9.27Мб |
| 02_types-of-virtualization.en.srt |
8.93Кб |
| 02_types-of-virtualization.en.txt |
5.55Кб |
| 02_types-of-virtualization.mp4 |
38.41Мб |
| 02_what-is-personal-computing.en.srt |
6.79Кб |
| 02_what-is-personal-computing.en.txt |
4.21Кб |
| 02_what-is-personal-computing.mp4 |
28.98Мб |
| 02_when-something-goes-wrong.en.srt |
8.49Кб |
| 02_when-something-goes-wrong.en.txt |
4.94Кб |
| 02_when-something-goes-wrong.mp4 |
37.64Мб |
| 02_windows-in-the-enterprise.en.srt |
7.05Кб |
| 02_windows-in-the-enterprise.en.txt |
4.20Кб |
| 02_windows-in-the-enterprise.mp4 |
29.93Мб |
| 03_access-control.en.srt |
6.04Кб |
| 03_access-control.en.txt |
3.62Кб |
| 03_access-control.mp4 |
10.07Мб |
| 03_baselining-and-assessment.en.srt |
6.77Кб |
| 03_baselining-and-assessment.en.txt |
4.26Кб |
| 03_baselining-and-assessment.mp4 |
31.98Мб |
| 03_integrity.en.srt |
7.40Кб |
| 03_integrity.en.txt |
4.32Кб |
| 03_integrity.mp4 |
29.52Мб |
| 03_linux-security.en.srt |
13.32Кб |
| 03_linux-security.en.txt |
8.06Кб |
| 03_linux-security.mp4 |
61.12Мб |
| 03_networking-in-linux.en.srt |
7.31Кб |
| 03_networking-in-linux.en.txt |
4.33Кб |
| 03_networking-in-linux.mp4 |
11.34Мб |
| 03_policies-part-2-technical-policies.en.srt |
6.20Кб |
| 03_policies-part-2-technical-policies.en.txt |
3.82Кб |
| 03_policies-part-2-technical-policies.mp4 |
29.33Мб |
| 03_restricting-access-to-software-and-resources.en.srt |
10.28Кб |
| 03_restricting-access-to-software-and-resources.en.txt |
6.22Кб |
| 03_restricting-access-to-software-and-resources.mp4 |
18.78Мб |
| 03_securing-users.en.srt |
8.15Кб |
| 03_securing-users.en.txt |
4.74Кб |
| 03_securing-users.mp4 |
14.74Мб |
| 03_what-is-a-secure-computer.en.srt |
5.22Кб |
| 03_what-is-a-secure-computer.en.txt |
3.24Кб |
| 03_what-is-a-secure-computer.mp4 |
22.06Мб |
| 03_what-is-enterprise-computing.en.srt |
12.41Кб |
| 03_what-is-enterprise-computing.en.txt |
7.46Кб |
| 03_what-is-enterprise-computing.mp4 |
52.12Мб |
| 03_when-to-use-and-not-use-virtualization.en.srt |
7.14Кб |
| 03_when-to-use-and-not-use-virtualization.en.txt |
4.20Кб |
| 03_when-to-use-and-not-use-virtualization.mp4 |
33.38Мб |
| 03_windows-server-install.en.srt |
6.22Кб |
| 03_windows-server-install.en.txt |
3.83Кб |
| 03_windows-server-install.mp4 |
8.02Мб |
| 04_about-the-instructor.en.srt |
10.78Кб |
| 04_about-the-instructor.en.srt |
10.56Кб |
| 04_about-the-instructor.en.srt |
10.56Кб |
| 04_about-the-instructor.en.txt |
6.24Кб |
| 04_about-the-instructor.en.txt |
6.23Кб |
| 04_about-the-instructor.en.txt |
6.19Кб |
| 04_about-the-instructor.mp4 |
155.29Мб |
| 04_about-the-instructor.mp4 |
155.29Мб |
| 04_about-the-instructor.mp4 |
155.29Мб |
| 04_active-directory.en.srt |
16.42Кб |
| 04_active-directory.en.txt |
9.65Кб |
| 04_active-directory.mp4 |
24.28Мб |
| 04_auditing.en.srt |
12.73Кб |
| 04_auditing.en.txt |
7.54Кб |
| 04_auditing.mp4 |
21.66Мб |
| 04_introduction.en.srt |
5.73Кб |
| 04_introduction.en.txt |
3.71Кб |
| 04_introduction.mp4 |
25.73Мб |
| 04_managing-users-on-an-enterprise-level.en.srt |
7.01Кб |
| 04_managing-users-on-an-enterprise-level.en.txt |
4.10Кб |
| 04_managing-users-on-an-enterprise-level.mp4 |
11.25Мб |
| 04_risk-in-system-management.en.srt |
12.79Кб |
| 04_risk-in-system-management.en.txt |
7.74Кб |
| 04_risk-in-system-management.mp4 |
53.73Мб |
| 04_software-firewalls-in-linux.en.srt |
8.98Кб |
| 04_software-firewalls-in-linux.en.txt |
5.02Кб |
| 04_software-firewalls-in-linux.mp4 |
16.77Мб |
| 04_what-roles-are-there-in-system-management.en.srt |
6.35Кб |
| 04_what-roles-are-there-in-system-management.en.txt |
3.90Кб |
| 04_what-roles-are-there-in-system-management.mp4 |
27.84Мб |
| 04_your-computer-vs-an-enterprise-system.en.srt |
7.92Кб |
| 04_your-computer-vs-an-enterprise-system.en.txt |
5.11Кб |
| 04_your-computer-vs-an-enterprise-system.mp4 |
33.83Мб |
| 05_about-the-instructor.en.srt |
10.38Кб |
| 05_about-the-instructor.en.txt |
6.18Кб |
| 05_about-the-instructor.mp4 |
155.29Мб |
| 05_access-control.en.srt |
8.97Кб |
| 05_access-control.en.txt |
5.35Кб |
| 05_access-control.mp4 |
13.61Мб |
| 05_confidentiality-integrity-and-availability.en.srt |
9.70Кб |
| 05_confidentiality-integrity-and-availability.en.txt |
5.91Кб |
| 05_confidentiality-integrity-and-availability.mp4 |
46.50Мб |
| 05_group-policy.en.srt |
8.30Кб |
| 05_group-policy.en.txt |
4.99Кб |
| 05_group-policy.mp4 |
12.19Мб |
| 05_networking-in-windows.en.srt |
10.75Кб |
| 05_networking-in-windows.en.txt |
6.52Кб |
| 05_networking-in-windows.mp4 |
15.06Мб |
| 05_osi-model.en.srt |
8.60Кб |
| 05_osi-model.en.txt |
5.22Кб |
| 05_osi-model.mp4 |
36.71Мб |
| 05_security-considerations-for-windows-systems.en.srt |
8.96Кб |
| 05_security-considerations-for-windows-systems.en.txt |
5.37Кб |
| 05_security-considerations-for-windows-systems.mp4 |
38.92Мб |
| 05_separation-of-duties.en.srt |
8.24Кб |
| 05_separation-of-duties.en.txt |
5.06Кб |
| 05_separation-of-duties.mp4 |
36.81Мб |
| 05_services-within-linux.en.srt |
10.74Кб |
| 05_services-within-linux.en.txt |
6.03Кб |
| 05_services-within-linux.mp4 |
16.18Мб |
| 05_sudo.en.srt |
6.87Кб |
| 05_sudo.en.txt |
4.06Кб |
| 05_sudo.mp4 |
13.44Мб |
| 05_what-is-going-to-prepare-me-for-practical-system-management.en.srt |
8.07Кб |
| 05_what-is-going-to-prepare-me-for-practical-system-management.en.txt |
4.96Кб |
| 05_what-is-going-to-prepare-me-for-practical-system-management.mp4 |
35.36Мб |
| 06_planning-for-disaster.en.srt |
10.08Кб |
| 06_planning-for-disaster.en.txt |
5.81Кб |
| 06_planning-for-disaster.mp4 |
41.18Мб |
| 06_ssh.en.srt |
12.87Кб |
| 06_ssh.en.txt |
7.37Кб |
| 06_ssh.mp4 |
24.59Мб |
| 06_windows-and-encryption.en.srt |
6.36Кб |
| 06_windows-and-encryption.en.txt |
3.92Кб |
| 06_windows-and-encryption.mp4 |
9.65Мб |
| 06_working-with-other-systems.en.srt |
10.17Кб |
| 06_working-with-other-systems.en.txt |
6.08Кб |
| 06_working-with-other-systems.mp4 |
44.73Мб |
| 07_if-you-build-it-they-will-get-around-it.en.srt |
10.41Кб |
| 07_if-you-build-it-they-will-get-around-it.en.txt |
6.11Кб |
| 07_if-you-build-it-they-will-get-around-it.mp4 |
41.96Мб |
| 07_syslog.en.srt |
12.30Кб |
| 07_syslog.en.txt |
7.45Кб |
| 07_syslog.mp4 |
21.09Мб |
| 08_cron.en.srt |
5.50Кб |
| 08_cron.en.txt |
3.35Кб |
| 08_cron.mp4 |
7.21Мб |
| 1 |
579б |
| 10 |
272.71Кб |
| 11 |
469.35Кб |
| 12 |
44.67Кб |
| 13 |
108.80Кб |
| 14 |
118.92Кб |
| 15 |
328.77Кб |
| 16 |
139.19Кб |
| 17 |
292.18Кб |
| 18 |
8.84Кб |
| 19 |
432.74Кб |
| 2 |
28б |
| 20 |
77.06Кб |
| 21 |
90.57Кб |
| 22 |
99.49Кб |
| 23 |
297.23Кб |
| 24 |
371.49Кб |
| 25 |
1.26Кб |
| 26 |
193.60Кб |
| 27 |
294.92Кб |
| 28 |
435.85Кб |
| 29 |
143.91Кб |
| 3 |
545б |
| 30 |
173.74Кб |
| 31 |
119.31Кб |
| 32 |
16.17Кб |
| 33 |
169.57Кб |
| 34 |
72.40Кб |
| 35 |
486.96Кб |
| 36 |
177.10Кб |
| 37 |
21.89Кб |
| 38 |
163.18Кб |
| 39 |
277.33Кб |
| 4 |
344.16Кб |
| 40 |
418.61Кб |
| 41 |
125.18Кб |
| 42 |
224.44Кб |
| 43 |
450.45Кб |
| 44 |
12.52Кб |
| 45 |
346.06Кб |
| 46 |
418.33Кб |
| 47 |
228.22Кб |
| 48 |
104.27Кб |
| 49 |
233.10Кб |
| 5 |
277.58Кб |
| 50 |
332.38Кб |
| 51 |
451.94Кб |
| 52 |
263.15Кб |
| 53 |
404.47Кб |
| 54 |
57.76Кб |
| 55 |
314.97Кб |
| 56 |
162.53Кб |
| 57 |
252.30Кб |
| 58 |
479.28Кб |
| 59 |
439.97Кб |
| 6 |
390.99Кб |
| 60 |
356.67Кб |
| 61 |
236.22Кб |
| 62 |
336.88Кб |
| 63 |
487.86Кб |
| 64 |
495.29Кб |
| 65 |
487.09Кб |
| 66 |
59.57Кб |
| 7 |
182.96Кб |
| 8 |
507.34Кб |
| 9 |
100.47Кб |
| TutsNode.net.txt |
63б |