|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [0] GIAC Security Essentials (GSEC)_ Introduction.mp4 |
9.40Мб |
| [1] Module introduction.mp4 |
4.74Мб |
| [10] 2.2 Categories and Types of Controls.mp4 |
25.76Мб |
| [100] 20.3 Windows-as-a-Service.mp4 |
21.85Мб |
| [101] Learning objectives.mp4 |
2.42Мб |
| [102] 21.1 NTFS and Shared Folder Permissions.mp4 |
15.18Мб |
| [103] 21.2 Registry Keys and REGEDIT.EXE.mp4 |
12.35Мб |
| [104] 21.3 Windows Privileges.mp4 |
18.72Мб |
| [105] 21.4 Overview of BitLocker Drive Encryption.mp4 |
18.49Мб |
| [106] Learning objectives.mp4 |
2.43Мб |
| [107] 22.1 Security Templates and SCA Snap-in.mp4 |
16.92Мб |
| [108] 22.2 Understanding Group Policy Objects.mp4 |
13.43Мб |
| [109] 22.3 Administrative Users, AppLocker, and User Account Control.mp4 |
15.09Мб |
| [11] 2.3 Understanding the Enterprise Architecture.mp4 |
5.92Мб |
| [110] Learning objectives.mp4 |
2.40Мб |
| [111] 23.1 Azure and High Availability.mp4 |
29.46Мб |
| [112] 23.2 Configuring Azure VM Attributes.mp4 |
25.28Мб |
| [113] 23.3 Microsoft Azure Active Directory (MAAD).mp4 |
35.36Мб |
| [114] Learning objectives.mp4 |
2.03Мб |
| [115] 24.1 Windows PowerShell.mp4 |
46.91Мб |
| [116] 24.2 Administrative Tools and Utilities.mp4 |
47.06Мб |
| [117] 24.3 Windows Auditing and Forensics.mp4 |
25.54Мб |
| [118] Module introduction.mp4 |
3.10Мб |
| [119] Learning objectives.mp4 |
2.74Мб |
| [12] 2.4 Introduction to Threat Enumeration.mp4 |
11.10Мб |
| [120] 25.1 Comparing Linux Operating Systems.mp4 |
28.13Мб |
| [121] 25.2 Mobile Device Security.mp4 |
12.54Мб |
| [122] 25.3 Linux Shells and Kernels.mp4 |
18.85Мб |
| [123] 25.4 Linux Permissions.mp4 |
29.35Мб |
| [124] 25.5 Linux User Accounts.mp4 |
26.20Мб |
| [125] Learning objectives.mp4 |
2.51Мб |
| [126] 26.1 Starting Services at Boot Time.mp4 |
32.87Мб |
| [127] 26.2 Configuration Management Tools.mp4 |
17.73Мб |
| [128] 26.3 Linux Kernel Security.mp4 |
28.08Мб |
| [129] 26.4 Linux System Enhancers.mp4 |
22.55Мб |
| [13] Learning objectives.mp4 |
1.90Мб |
| [130] Learning objectives.mp4 |
2.31Мб |
| [131] 27.1 Configuring and Monitoring Logs.mp4 |
23.45Мб |
| [132] 27.2 Leveraging the Auditd tool.mp4 |
14.11Мб |
| [133] 27.3 Linux Security Utilities.mp4 |
20.28Мб |
| [134] GIAC Security Essentials (GSEC)_ Summary.mp4 |
6.69Мб |
| [14] 3.1 Access Control Concepts.mp4 |
85.30Мб |
| [15] 3.2 Password Management.mp4 |
33.58Мб |
| [16] 3.3 Introduction to Password Cracking.mp4 |
40.48Мб |
| [17] Learning objectives.mp4 |
3.69Мб |
| [18] 4.1 Network Topologies and Zones.mp4 |
29.49Мб |
| [19] 4.2 Overview of Network Devices and Hardening.mp4 |
60.00Мб |
| [2] Learning objectives.mp4 |
3.04Мб |
| [20] 4.3 Survey of Security Devices and Wireshark.mp4 |
60.20Мб |
| [21] 4.4 Configuring Firewalls at Amazon Web Services.mp4 |
33.17Мб |
| [22] 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 |
30.05Мб |
| [23] 4.6 Examining a Classic IPS Sensor Device.mp4 |
25.42Мб |
| [24] Learning objectives.mp4 |
2.09Мб |
| [25] 5.1 Introducing the Center for Internet Security (CIS).mp4 |
19.82Мб |
| [26] 5.2 Overview of CIS Controls.mp4 |
28.25Мб |
| [27] 5.3 Samples and Case Studies.mp4 |
25.99Мб |
| [28] Learning objectives.mp4 |
2.61Мб |
| [29] 6.1 The Evolution of IEEE 802.11 Security.mp4 |
62.46Мб |
| [3] 1.1 Network Protocols and Reference Models.mp4 |
30.47Мб |
| [30] 6.2 WPA3 Security.mp4 |
13.92Мб |
| [31] 6.3 PAN, NFC, and 5G Concepts.mp4 |
15.25Мб |
| [32] 6.4 The Internet of Things (IoT).mp4 |
19.99Мб |
| [33] Module introduction.mp4 |
3.35Мб |
| [34] Learning objectives.mp4 |
2.08Мб |
| [35] 7.1 Common Attack Types.mp4 |
71.66Мб |
| [36] 7.2 CryptoMalware.mp4 |
33.11Мб |
| [37] 7.3 Defensive Strategies.mp4 |
25.00Мб |
| [38] Learning objectives.mp4 |
2.26Мб |
| [39] 8.1 Defense in Depth Overview and Strategies.mp4 |
21.20Мб |
| [4] 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 |
53.97Мб |
| [40] 8.2 Core Security Strategies.mp4 |
6.47Мб |
| [41] 8.3 Defensible Network Architectures.mp4 |
14.66Мб |
| [42] Learning objectives.mp4 |
1.89Мб |
| [43] 9.1 Overview of Active Defense.mp4 |
19.11Мб |
| [44] 9.2 Active Defense Techniques.mp4 |
18.64Мб |
| [45] 9.3 Active Defense Tools.mp4 |
37.00Мб |
| [46] Learning objectives.mp4 |
2.61Мб |
| [47] 10.1 Overview of Endpoint Security.mp4 |
24.00Мб |
| [48] 10.2 Host-based Intrusion Detection.mp4 |
11.92Мб |
| [49] 10.3 Host-based Intrusion Prevention.mp4 |
14.01Мб |
| [5] 1.3 Layer 4 Protocols.mp4 |
54.60Мб |
| [50] 10.4 Next-generation Endpoint Security Solutions.mp4 |
15.73Мб |
| [51] Module introduction.mp4 |
2.59Мб |
| [52] Learning objectives.mp4 |
2.15Мб |
| [53] 11.1 Overview of Logging.mp4 |
30.21Мб |
| [54] 11.2 Logging System Setup and Configuration.mp4 |
15.64Мб |
| [55] 11.3 Logging Analysis Fundamentals.mp4 |
18.75Мб |
| [56] 11.4 Core SIEM Activities.mp4 |
21.72Мб |
| [57] Learning objectives.mp4 |
2.62Мб |
| [58] 12.1 Overview of Vulnerability Management.mp4 |
36.43Мб |
| [59] 12.2 Network Scanning.mp4 |
42.15Мб |
| [6] 1.4 Setting up a Lab Environment.mp4 |
40.83Мб |
| [60] 12.3 Using Xenmap and Yersinia.mp4 |
34.73Мб |
| [61] 12.4 Penetration Testing.mp4 |
55.43Мб |
| [62] Learning objectives.mp4 |
3.05Мб |
| [63] 13.1 Overview of Virtualization and VM Security.mp4 |
27.20Мб |
| [64] 13.2 Cloud Models and Value Proposition.mp4 |
75.61Мб |
| [65] 13.3 Common Attacks Against Cloud Services.mp4 |
32.86Мб |
| [66] 13.4 Introduction to Microsoft Azure IAM.mp4 |
46.62Мб |
| [67] Module introduction.mp4 |
4.67Мб |
| [68] Learning objectives.mp4 |
2.53Мб |
| [69] 14.1 Overview of Cryptology and Cryptosystems.mp4 |
27.34Мб |
| [7] 1.5 Using tcpdump and Wireshark.mp4 |
26.93Мб |
| [70] 14.2 Cryptographic Hashing.mp4 |
27.03Мб |
| [71] 14.3 Symmetric Key Cryptography.mp4 |
18.38Мб |
| [72] 14.4 Asymmetric Key Cryptography.mp4 |
11.18Мб |
| [73] Learning objectives.mp4 |
2.19Мб |
| [74] 15.1 Digital Signatures.mp4 |
14.25Мб |
| [75] 15.2 IPsec.mp4 |
44.97Мб |
| [76] 15.3 SSLTLS.mp4 |
15.68Мб |
| [77] 15.4 Public Key Infrastructure.mp4 |
45.27Мб |
| [78] Learning objectives.mp4 |
2.80Мб |
| [79] 16.1 The Importance of Written Security Policies.mp4 |
18.45Мб |
| [8] Learning objectives.mp4 |
2.58Мб |
| [80] 16.2 Standards, Guidelines, and Procedures.mp4 |
16.83Мб |
| [81] 16.3 Acceptable Use Policies.mp4 |
9.04Мб |
| [82] 16.4 Survey of Sample Policies.mp4 |
46.05Мб |
| [83] Learning objectives.mp4 |
2.16Мб |
| [84] 17.1 Overview of Risk Management.mp4 |
32.20Мб |
| [85] 17.2 Risk Management Best Practices.mp4 |
32.38Мб |
| [86] 17.3 Threat Assessment, Analysis, and Reporting.mp4 |
55.71Мб |
| [87] Learning objectives.mp4 |
2.32Мб |
| [88] 18.1 Fundamentals of Incident Handling.mp4 |
14.97Мб |
| [89] 18.2 Six Step Incident Response Process.mp4 |
32.36Мб |
| [9] 2.1 CIA Triad and Parkerian Hexad.mp4 |
10.78Мб |
| [90] 18.3 Conducting a Forensic Investigation.mp4 |
39.72Мб |
| [91] Learning objectives.mp4 |
2.41Мб |
| [92] 19.1 Business Continuity Planning (BCP).mp4 |
27.85Мб |
| [93] 19.2 Business Impact Analysis (BIA).mp4 |
10.94Мб |
| [94] 19.3 Backups and Restoration.mp4 |
21.73Мб |
| [95] 19.4 Disaster Recovery Planning (DRP).mp4 |
39.99Мб |
| [96] Module introduction.mp4 |
3.09Мб |
| [97] Learning objectives.mp4 |
2.24Мб |
| [98] 20.1 Operating Systems and Services.mp4 |
13.92Мб |
| [99] 20.2 Windows Workgroups vs. Domains.mp4 |
26.82Мб |
| 0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url |
377б |
| 1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url |
286б |
| 3. FTUApps.com Download Cracked Developers Applications For Free.url |
239б |
| For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url |
1.82Кб |
| How you can help our Group!.txt |
204б |