Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
36.38Кб |
1 |
70.41Кб |
1. Application Architecture and Infrastructure.mp4 |
38.79Мб |
1. Application Architecture and Infrastructure.srt |
2.62Кб |
1. Congratulations and next steps.mp4 |
15.77Мб |
1. Congratulations and next steps.srt |
990б |
1. Course Introduction.mp4 |
69.53Мб |
1. Course Introduction.srt |
3.84Кб |
1. Cryptography, Hashing and Digital Signatures Intro.mp4 |
40.52Мб |
1. Cryptography, Hashing and Digital Signatures Intro.srt |
2.48Кб |
1. Cybersecurity Principles Intro.mp4 |
21.75Мб |
1. Cybersecurity Principles Intro.srt |
1.34Кб |
1. IAM and IAA - Identity and Access Management.mp4 |
148.42Мб |
1. IAM and IAA - Identity and Access Management.srt |
9.58Кб |
1. Incident Detection and Response.mp4 |
94.35Мб |
1. Incident Detection and Response.srt |
8.40Кб |
1. Infrastructure Security Intro.mp4 |
29.61Мб |
1. Infrastructure Security Intro.srt |
1.85Кб |
1. Logging and Monitoring.mp4 |
197.09Мб |
1. Logging and Monitoring.srt |
14.16Кб |
1. Secure Protocols Intro.mp4 |
43.61Мб |
1. Secure Protocols Intro.srt |
2.26Кб |
1. System Resilience Intro.mp4 |
223.86Мб |
1. System Resilience Intro.srt |
12.87Кб |
10 |
594.70Кб |
10. RSA.mp4 |
85.87Мб |
10. RSA.srt |
9.88Кб |
10. Secure DevOps.mp4 |
139.31Мб |
10. Secure DevOps.srt |
10.46Кб |
11 |
709.09Кб |
11. ECDSA.mp4 |
98.43Мб |
11. ECDSA.srt |
7.15Кб |
11. Secure Development and Deployment.mp4 |
72.15Мб |
11. Secure Development and Deployment.srt |
7.20Кб |
12 |
787.43Кб |
12. Application Architecture and Infrastructure.html |
203б |
12. Quantum Computing.mp4 |
96.42Мб |
12. Quantum Computing.srt |
5.57Кб |
13 |
71.53Кб |
13. Cryptography, Hashing and Digital Signatures.html |
203б |
14 |
456.70Кб |
15 |
950.56Кб |
16 |
812.88Кб |
17 |
924.33Кб |
18 |
395.57Кб |
19 |
889.28Кб |
2 |
138.69Кб |
2. Bonus and thank you note.html |
499б |
2. Cloud Models and Shared Responsibility model.mp4 |
229.93Мб |
2. Cloud Models and Shared Responsibility model.srt |
18.62Кб |
2. Consensus Mechanisms.mp4 |
106.64Мб |
2. Consensus Mechanisms.srt |
9.26Кб |
2. Contingency Planning.mp4 |
69.87Мб |
2. Contingency Planning.srt |
4.60Кб |
2. Course housekeeping.mp4 |
31.72Мб |
2. Course housekeeping.srt |
2.11Кб |
2. Data Encryption.mp4 |
164.72Мб |
2. Data Encryption.srt |
13.39Кб |
2. Infrastructure hardening.mp4 |
76.51Мб |
2. Infrastructure hardening.srt |
4.22Кб |
2. Logging and Monitoring Quiz.html |
203б |
2. MFA - Multi Factor Authentication.mp4 |
106.91Мб |
2. MFA - Multi Factor Authentication.srt |
5.96Кб |
2. Secure Protocols.mp4 |
158.92Мб |
2. Secure Protocols.srt |
13.72Кб |
2. The CIA of Cybersecurity.mp4 |
139.23Мб |
2. The CIA of Cybersecurity.srt |
10.75Кб |
20 |
97.38Кб |
21 |
832.64Кб |
22 |
92.57Кб |
23 |
365.11Кб |
24 |
657.42Кб |
25 |
245.12Кб |
26 |
768.01Кб |
27 |
919.39Кб |
28 |
583.99Кб |
29 |
598.07Кб |
3 |
255.38Кб |
3. Application infrastructure.mp4 |
129.55Мб |
3. Application infrastructure.srt |
12.51Кб |
3. Authorization and Permissions.mp4 |
172.83Мб |
3. Authorization and Permissions.srt |
12.08Кб |
3. Denial of Service.mp4 |
121.10Мб |
3. Denial of Service.srt |
10.25Кб |
3. Hashing.mp4 |
116.90Мб |
3. Hashing.srt |
9.81Кб |
3. Incident Detection and Response Quiz.html |
203б |
3. Network Models.mp4 |
106.36Мб |
3. Network Models.srt |
10.93Кб |
3. Non-repudiation.mp4 |
45.48Мб |
3. Non-repudiation.srt |
2.72Кб |
3. System Resilience quiz.html |
203б |
30 |
669.70Кб |
31 |
735.23Кб |
32 |
771.27Кб |
33 |
728.85Кб |
34 |
486.61Кб |
35 |
137.38Кб |
36 |
279.58Кб |
37 |
503.81Кб |
38 |
642.57Кб |
39 |
870.27Кб |
4 |
930.66Кб |
4. Hash functions characteristics.mp4 |
127.07Мб |
4. Hash functions characteristics.srt |
11.55Кб |
4. How to measure risk.mp4 |
176.07Мб |
4. How to measure risk.srt |
10.97Кб |
4. Man-in-the-middle attack.mp4 |
92.25Мб |
4. Man-in-the-middle attack.srt |
9.72Кб |
4. Permissioned and Permissionless.mp4 |
45.07Мб |
4. Permissioned and Permissionless.srt |
2.82Кб |
4. TLS.mp4 |
58.84Мб |
4. TLS.srt |
5.22Кб |
4. VPCs.mp4 |
34.88Мб |
4. VPCs.srt |
3.46Кб |
40 |
132.35Кб |
41 |
480.46Кб |
42 |
772.63Кб |
43 |
160.86Кб |
44 |
77.86Кб |
45 |
130.54Кб |
46 |
536.52Кб |
47 |
952.49Кб |
48 |
395.05Кб |
49 |
488.34Кб |
5 |
963.84Кб |
5. ALCs.mp4 |
56.92Мб |
5. ALCs.srt |
2.96Кб |
5. Attacking applications.mp4 |
93.28Мб |
5. Attacking applications.srt |
9.76Кб |
5. Digital Signatures.mp4 |
26.19Мб |
5. Digital Signatures.srt |
2.32Кб |
5. How to measure risk (part II).mp4 |
209.75Мб |
5. How to measure risk (part II).srt |
11.82Кб |
5. IP Models.mp4 |
47.87Мб |
5. IP Models.srt |
4.46Кб |
5. NACLs.mp4 |
76.37Мб |
5. NACLs.srt |
10.20Кб |
50 |
217.67Кб |
51 |
910.62Кб |
52 |
125.18Кб |
53 |
286.67Кб |
54 |
394.54Кб |
55 |
825.77Кб |
56 |
255.85Кб |
6 |
948.21Кб |
6. Application protocols.mp4 |
79.73Мб |
6. Application protocols.srt |
12.03Кб |
6. Cryptography Basics.mp4 |
108.19Мб |
6. Cryptography Basics.srt |
7.62Кб |
6. Governance and Procurement.mp4 |
105.76Мб |
6. Governance and Procurement.srt |
7.80Кб |
6. Least Privilege and Segregation of Duties.mp4 |
88.29Мб |
6. Least Privilege and Segregation of Duties.srt |
5.18Кб |
6. Malware.mp4 |
186.06Мб |
6. Malware.srt |
12.12Кб |
6. Network Firewalls.mp4 |
35.11Мб |
6. Network Firewalls.srt |
2.71Кб |
7 |
170.05Кб |
7. Cryptography Methods.mp4 |
119.13Мб |
7. Cryptography Methods.srt |
6.72Кб |
7. Cybersecurity Principles Quiz.html |
203б |
7. Password Security.mp4 |
124.21Мб |
7. Password Security.srt |
8.01Кб |
7. Secure protocols quiz.html |
203б |
7. Social Engineering Attacks.mp4 |
274.51Мб |
7. Social Engineering Attacks.srt |
17.73Кб |
7. Testing your application.mp4 |
120.61Мб |
7. Testing your application.srt |
11.12Кб |
8 |
290.05Кб |
8. Infrastructure Security quiz.html |
203б |
8. Random numbers.mp4 |
103.25Мб |
8. Random numbers.srt |
9.41Кб |
8. Testing your Infrastructure.mp4 |
101.10Мб |
8. Testing your Infrastructure.srt |
8.83Кб |
8. User Authentication Methods.mp4 |
132.93Мб |
8. User Authentication Methods.srt |
9.37Кб |
9 |
81.69Кб |
9. IAM Quiz.html |
203б |
9. Other security practices.mp4 |
69.25Мб |
9. Other security practices.srt |
6.75Кб |
9. Prime numbers.mp4 |
87.52Мб |
9. Prime numbers.srt |
7.73Кб |
TutsNode.com.txt |
63б |