Общая информация
Название Cyber Security Masterclass - All about IT Security
Тип
Размер 5.86Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 36.38Кб
1 70.41Кб
1. Application Architecture and Infrastructure.mp4 38.79Мб
1. Application Architecture and Infrastructure.srt 2.62Кб
1. Congratulations and next steps.mp4 15.77Мб
1. Congratulations and next steps.srt 990б
1. Course Introduction.mp4 69.53Мб
1. Course Introduction.srt 3.84Кб
1. Cryptography, Hashing and Digital Signatures Intro.mp4 40.52Мб
1. Cryptography, Hashing and Digital Signatures Intro.srt 2.48Кб
1. Cybersecurity Principles Intro.mp4 21.75Мб
1. Cybersecurity Principles Intro.srt 1.34Кб
1. IAM and IAA - Identity and Access Management.mp4 148.42Мб
1. IAM and IAA - Identity and Access Management.srt 9.58Кб
1. Incident Detection and Response.mp4 94.35Мб
1. Incident Detection and Response.srt 8.40Кб
1. Infrastructure Security Intro.mp4 29.61Мб
1. Infrastructure Security Intro.srt 1.85Кб
1. Logging and Monitoring.mp4 197.09Мб
1. Logging and Monitoring.srt 14.16Кб
1. Secure Protocols Intro.mp4 43.61Мб
1. Secure Protocols Intro.srt 2.26Кб
1. System Resilience Intro.mp4 223.86Мб
1. System Resilience Intro.srt 12.87Кб
10 594.70Кб
10. RSA.mp4 85.87Мб
10. RSA.srt 9.88Кб
10. Secure DevOps.mp4 139.31Мб
10. Secure DevOps.srt 10.46Кб
11 709.09Кб
11. ECDSA.mp4 98.43Мб
11. ECDSA.srt 7.15Кб
11. Secure Development and Deployment.mp4 72.15Мб
11. Secure Development and Deployment.srt 7.20Кб
12 787.43Кб
12. Application Architecture and Infrastructure.html 203б
12. Quantum Computing.mp4 96.42Мб
12. Quantum Computing.srt 5.57Кб
13 71.53Кб
13. Cryptography, Hashing and Digital Signatures.html 203б
14 456.70Кб
15 950.56Кб
16 812.88Кб
17 924.33Кб
18 395.57Кб
19 889.28Кб
2 138.69Кб
2. Bonus and thank you note.html 499б
2. Cloud Models and Shared Responsibility model.mp4 229.93Мб
2. Cloud Models and Shared Responsibility model.srt 18.62Кб
2. Consensus Mechanisms.mp4 106.64Мб
2. Consensus Mechanisms.srt 9.26Кб
2. Contingency Planning.mp4 69.87Мб
2. Contingency Planning.srt 4.60Кб
2. Course housekeeping.mp4 31.72Мб
2. Course housekeeping.srt 2.11Кб
2. Data Encryption.mp4 164.72Мб
2. Data Encryption.srt 13.39Кб
2. Infrastructure hardening.mp4 76.51Мб
2. Infrastructure hardening.srt 4.22Кб
2. Logging and Monitoring Quiz.html 203б
2. MFA - Multi Factor Authentication.mp4 106.91Мб
2. MFA - Multi Factor Authentication.srt 5.96Кб
2. Secure Protocols.mp4 158.92Мб
2. Secure Protocols.srt 13.72Кб
2. The CIA of Cybersecurity.mp4 139.23Мб
2. The CIA of Cybersecurity.srt 10.75Кб
20 97.38Кб
21 832.64Кб
22 92.57Кб
23 365.11Кб
24 657.42Кб
25 245.12Кб
26 768.01Кб
27 919.39Кб
28 583.99Кб
29 598.07Кб
3 255.38Кб
3. Application infrastructure.mp4 129.55Мб
3. Application infrastructure.srt 12.51Кб
3. Authorization and Permissions.mp4 172.83Мб
3. Authorization and Permissions.srt 12.08Кб
3. Denial of Service.mp4 121.10Мб
3. Denial of Service.srt 10.25Кб
3. Hashing.mp4 116.90Мб
3. Hashing.srt 9.81Кб
3. Incident Detection and Response Quiz.html 203б
3. Network Models.mp4 106.36Мб
3. Network Models.srt 10.93Кб
3. Non-repudiation.mp4 45.48Мб
3. Non-repudiation.srt 2.72Кб
3. System Resilience quiz.html 203б
30 669.70Кб
31 735.23Кб
32 771.27Кб
33 728.85Кб
34 486.61Кб
35 137.38Кб
36 279.58Кб
37 503.81Кб
38 642.57Кб
39 870.27Кб
4 930.66Кб
4. Hash functions characteristics.mp4 127.07Мб
4. Hash functions characteristics.srt 11.55Кб
4. How to measure risk.mp4 176.07Мб
4. How to measure risk.srt 10.97Кб
4. Man-in-the-middle attack.mp4 92.25Мб
4. Man-in-the-middle attack.srt 9.72Кб
4. Permissioned and Permissionless.mp4 45.07Мб
4. Permissioned and Permissionless.srt 2.82Кб
4. TLS.mp4 58.84Мб
4. TLS.srt 5.22Кб
4. VPCs.mp4 34.88Мб
4. VPCs.srt 3.46Кб
40 132.35Кб
41 480.46Кб
42 772.63Кб
43 160.86Кб
44 77.86Кб
45 130.54Кб
46 536.52Кб
47 952.49Кб
48 395.05Кб
49 488.34Кб
5 963.84Кб
5. ALCs.mp4 56.92Мб
5. ALCs.srt 2.96Кб
5. Attacking applications.mp4 93.28Мб
5. Attacking applications.srt 9.76Кб
5. Digital Signatures.mp4 26.19Мб
5. Digital Signatures.srt 2.32Кб
5. How to measure risk (part II).mp4 209.75Мб
5. How to measure risk (part II).srt 11.82Кб
5. IP Models.mp4 47.87Мб
5. IP Models.srt 4.46Кб
5. NACLs.mp4 76.37Мб
5. NACLs.srt 10.20Кб
50 217.67Кб
51 910.62Кб
52 125.18Кб
53 286.67Кб
54 394.54Кб
55 825.77Кб
56 255.85Кб
6 948.21Кб
6. Application protocols.mp4 79.73Мб
6. Application protocols.srt 12.03Кб
6. Cryptography Basics.mp4 108.19Мб
6. Cryptography Basics.srt 7.62Кб
6. Governance and Procurement.mp4 105.76Мб
6. Governance and Procurement.srt 7.80Кб
6. Least Privilege and Segregation of Duties.mp4 88.29Мб
6. Least Privilege and Segregation of Duties.srt 5.18Кб
6. Malware.mp4 186.06Мб
6. Malware.srt 12.12Кб
6. Network Firewalls.mp4 35.11Мб
6. Network Firewalls.srt 2.71Кб
7 170.05Кб
7. Cryptography Methods.mp4 119.13Мб
7. Cryptography Methods.srt 6.72Кб
7. Cybersecurity Principles Quiz.html 203б
7. Password Security.mp4 124.21Мб
7. Password Security.srt 8.01Кб
7. Secure protocols quiz.html 203б
7. Social Engineering Attacks.mp4 274.51Мб
7. Social Engineering Attacks.srt 17.73Кб
7. Testing your application.mp4 120.61Мб
7. Testing your application.srt 11.12Кб
8 290.05Кб
8. Infrastructure Security quiz.html 203б
8. Random numbers.mp4 103.25Мб
8. Random numbers.srt 9.41Кб
8. Testing your Infrastructure.mp4 101.10Мб
8. Testing your Infrastructure.srt 8.83Кб
8. User Authentication Methods.mp4 132.93Мб
8. User Authentication Methods.srt 9.37Кб
9 81.69Кб
9. IAM Quiz.html 203б
9. Other security practices.mp4 69.25Мб
9. Other security practices.srt 6.75Кб
9. Prime numbers.mp4 87.52Мб
9. Prime numbers.srt 7.73Кб
TutsNode.com.txt 63б
Статистика распространения по странам
Венгрия (HU) 2
Египет (EG) 1
Китай (CN) 1
Турция (TR) 1
Италия (IT) 1
Бельгия (BE) 1
Ирландия (IE) 1
Германия (DE) 1
Индия (IN) 1
Франция (FR) 1
Всего 11
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент