Общая информация
Название [FreeCoursesOnline.Me] O`REILLY - GIAC Security Essentials (GSEC)
Тип
Размер 2.89Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[0] GIAC Security Essentials (GSEC)_ Introduction.mp4 9.40Мб
[1] Module introduction.mp4 4.74Мб
[10] 2.2 Categories and Types of Controls.mp4 25.76Мб
[100] 20.3 Windows-as-a-Service.mp4 21.85Мб
[101] Learning objectives.mp4 2.42Мб
[102] 21.1 NTFS and Shared Folder Permissions.mp4 15.18Мб
[103] 21.2 Registry Keys and REGEDIT.EXE.mp4 12.35Мб
[104] 21.3 Windows Privileges.mp4 18.72Мб
[105] 21.4 Overview of BitLocker Drive Encryption.mp4 18.49Мб
[106] Learning objectives.mp4 2.43Мб
[107] 22.1 Security Templates and SCA Snap-in.mp4 16.92Мб
[108] 22.2 Understanding Group Policy Objects.mp4 13.43Мб
[109] 22.3 Administrative Users, AppLocker, and User Account Control.mp4 15.09Мб
[11] 2.3 Understanding the Enterprise Architecture.mp4 5.92Мб
[110] Learning objectives.mp4 2.40Мб
[111] 23.1 Azure and High Availability.mp4 29.46Мб
[112] 23.2 Configuring Azure VM Attributes.mp4 25.28Мб
[113] 23.3 Microsoft Azure Active Directory (MAAD).mp4 35.36Мб
[114] Learning objectives.mp4 2.03Мб
[115] 24.1 Windows PowerShell.mp4 46.91Мб
[116] 24.2 Administrative Tools and Utilities.mp4 47.06Мб
[117] 24.3 Windows Auditing and Forensics.mp4 25.54Мб
[118] Module introduction.mp4 3.10Мб
[119] Learning objectives.mp4 2.74Мб
[12] 2.4 Introduction to Threat Enumeration.mp4 11.10Мб
[120] 25.1 Comparing Linux Operating Systems.mp4 28.13Мб
[121] 25.2 Mobile Device Security.mp4 12.54Мб
[122] 25.3 Linux Shells and Kernels.mp4 18.85Мб
[123] 25.4 Linux Permissions.mp4 29.35Мб
[124] 25.5 Linux User Accounts.mp4 26.20Мб
[125] Learning objectives.mp4 2.51Мб
[126] 26.1 Starting Services at Boot Time.mp4 32.87Мб
[127] 26.2 Configuration Management Tools.mp4 17.73Мб
[128] 26.3 Linux Kernel Security.mp4 28.08Мб
[129] 26.4 Linux System Enhancers.mp4 22.55Мб
[13] Learning objectives.mp4 1.90Мб
[130] Learning objectives.mp4 2.31Мб
[131] 27.1 Configuring and Monitoring Logs.mp4 23.45Мб
[132] 27.2 Leveraging the Auditd tool.mp4 14.11Мб
[133] 27.3 Linux Security Utilities.mp4 20.28Мб
[134] GIAC Security Essentials (GSEC)_ Summary.mp4 6.69Мб
[14] 3.1 Access Control Concepts.mp4 85.30Мб
[15] 3.2 Password Management.mp4 33.58Мб
[16] 3.3 Introduction to Password Cracking.mp4 40.48Мб
[17] Learning objectives.mp4 3.69Мб
[18] 4.1 Network Topologies and Zones.mp4 29.49Мб
[19] 4.2 Overview of Network Devices and Hardening.mp4 60.00Мб
[2] Learning objectives.mp4 3.04Мб
[20] 4.3 Survey of Security Devices and Wireshark.mp4 60.20Мб
[21] 4.4 Configuring Firewalls at Amazon Web Services.mp4 33.17Мб
[22] 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 30.05Мб
[23] 4.6 Examining a Classic IPS Sensor Device.mp4 25.42Мб
[24] Learning objectives.mp4 2.09Мб
[25] 5.1 Introducing the Center for Internet Security (CIS).mp4 19.82Мб
[26] 5.2 Overview of CIS Controls.mp4 28.25Мб
[27] 5.3 Samples and Case Studies.mp4 25.99Мб
[28] Learning objectives.mp4 2.61Мб
[29] 6.1 The Evolution of IEEE 802.11 Security.mp4 62.46Мб
[3] 1.1 Network Protocols and Reference Models.mp4 30.47Мб
[30] 6.2 WPA3 Security.mp4 13.92Мб
[31] 6.3 PAN, NFC, and 5G Concepts.mp4 15.25Мб
[32] 6.4 The Internet of Things (IoT).mp4 19.99Мб
[33] Module introduction.mp4 3.35Мб
[34] Learning objectives.mp4 2.08Мб
[35] 7.1 Common Attack Types.mp4 71.66Мб
[36] 7.2 CryptoMalware.mp4 33.11Мб
[37] 7.3 Defensive Strategies.mp4 25.00Мб
[38] Learning objectives.mp4 2.26Мб
[39] 8.1 Defense in Depth Overview and Strategies.mp4 21.20Мб
[4] 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 53.97Мб
[40] 8.2 Core Security Strategies.mp4 6.47Мб
[41] 8.3 Defensible Network Architectures.mp4 14.66Мб
[42] Learning objectives.mp4 1.89Мб
[43] 9.1 Overview of Active Defense.mp4 19.11Мб
[44] 9.2 Active Defense Techniques.mp4 18.64Мб
[45] 9.3 Active Defense Tools.mp4 37.00Мб
[46] Learning objectives.mp4 2.61Мб
[47] 10.1 Overview of Endpoint Security.mp4 24.00Мб
[48] 10.2 Host-based Intrusion Detection.mp4 11.92Мб
[49] 10.3 Host-based Intrusion Prevention.mp4 14.01Мб
[5] 1.3 Layer 4 Protocols.mp4 54.60Мб
[50] 10.4 Next-generation Endpoint Security Solutions.mp4 15.73Мб
[51] Module introduction.mp4 2.59Мб
[52] Learning objectives.mp4 2.15Мб
[53] 11.1 Overview of Logging.mp4 30.21Мб
[54] 11.2 Logging System Setup and Configuration.mp4 15.64Мб
[55] 11.3 Logging Analysis Fundamentals.mp4 18.75Мб
[56] 11.4 Core SIEM Activities.mp4 21.72Мб
[57] Learning objectives.mp4 2.62Мб
[58] 12.1 Overview of Vulnerability Management.mp4 36.43Мб
[59] 12.2 Network Scanning.mp4 42.15Мб
[6] 1.4 Setting up a Lab Environment.mp4 40.83Мб
[60] 12.3 Using Xenmap and Yersinia.mp4 34.73Мб
[61] 12.4 Penetration Testing.mp4 55.43Мб
[62] Learning objectives.mp4 3.05Мб
[63] 13.1 Overview of Virtualization and VM Security.mp4 27.20Мб
[64] 13.2 Cloud Models and Value Proposition.mp4 75.61Мб
[65] 13.3 Common Attacks Against Cloud Services.mp4 32.86Мб
[66] 13.4 Introduction to Microsoft Azure IAM.mp4 46.62Мб
[67] Module introduction.mp4 4.67Мб
[68] Learning objectives.mp4 2.53Мб
[69] 14.1 Overview of Cryptology and Cryptosystems.mp4 27.34Мб
[7] 1.5 Using tcpdump and Wireshark.mp4 26.93Мб
[70] 14.2 Cryptographic Hashing.mp4 27.03Мб
[71] 14.3 Symmetric Key Cryptography.mp4 18.38Мб
[72] 14.4 Asymmetric Key Cryptography.mp4 11.18Мб
[73] Learning objectives.mp4 2.19Мб
[74] 15.1 Digital Signatures.mp4 14.25Мб
[75] 15.2 IPsec.mp4 44.97Мб
[76] 15.3 SSLTLS.mp4 15.68Мб
[77] 15.4 Public Key Infrastructure.mp4 45.27Мб
[78] Learning objectives.mp4 2.80Мб
[79] 16.1 The Importance of Written Security Policies.mp4 18.45Мб
[8] Learning objectives.mp4 2.58Мб
[80] 16.2 Standards, Guidelines, and Procedures.mp4 16.83Мб
[81] 16.3 Acceptable Use Policies.mp4 9.04Мб
[82] 16.4 Survey of Sample Policies.mp4 46.05Мб
[83] Learning objectives.mp4 2.16Мб
[84] 17.1 Overview of Risk Management.mp4 32.20Мб
[85] 17.2 Risk Management Best Practices.mp4 32.38Мб
[86] 17.3 Threat Assessment, Analysis, and Reporting.mp4 55.71Мб
[87] Learning objectives.mp4 2.32Мб
[88] 18.1 Fundamentals of Incident Handling.mp4 14.97Мб
[89] 18.2 Six Step Incident Response Process.mp4 32.36Мб
[9] 2.1 CIA Triad and Parkerian Hexad.mp4 10.78Мб
[90] 18.3 Conducting a Forensic Investigation.mp4 39.72Мб
[91] Learning objectives.mp4 2.41Мб
[92] 19.1 Business Continuity Planning (BCP).mp4 27.85Мб
[93] 19.2 Business Impact Analysis (BIA).mp4 10.94Мб
[94] 19.3 Backups and Restoration.mp4 21.73Мб
[95] 19.4 Disaster Recovery Planning (DRP).mp4 39.99Мб
[96] Module introduction.mp4 3.09Мб
[97] Learning objectives.mp4 2.24Мб
[98] 20.1 Operating Systems and Services.mp4 13.92Мб
[99] 20.2 Windows Workgroups vs. Domains.mp4 26.82Мб
0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377б
1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286б
3. FTUApps.com Download Cracked Developers Applications For Free.url 239б
For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url 1.82Кб
How you can help our Group!.txt 204б
Статистика распространения по странам
Великобритания (GB) 1
Хорватия (HR) 1
Турция (TR) 1
Южная Корея (KR) 1
Франция (FR) 1
Германия (DE) 1
Индия (IN) 1
Всего 7
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент