Общая информация
Название Infosec Institute - IT & Security Courses Collection Part 1 (2020) [En]
Тип
Размер 86.96Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
001_Course Introduction.mp4 3.23Мб
001 - Certified Internet of Things Security Practitioner overview.mp4 31.84Мб
001 - Create Azure AD Tenant.mp4 7.18Мб
001 - CyberSec First Responder Overview.mp4 32.18Мб
001 - Cybersecurity Fundamentals.mp4 12.53Мб
001 - General Security Principles.mp4 44.37Мб
001 - Incident Response Fundamentals.mp4 22.91Мб
001 - Introduction.mp4 2.90Мб
001 - Introduction to CCSP.mp4 5.81Мб
001 - Introduction to CISSP.mp4 7.09Мб
001 - Introduction to ISSEP.mp4 6.79Мб
001 - ISSAP Introduction.mp4 15.50Мб
001 - ISSAP Introduction.mp4 15.50Мб
001 - Leadership and Business Management.mp4 3.72Мб
001 - Network Components - Routers, Switches, Firewalls.mp4 45.80Мб
001 - Network Topologies.mp4 40.80Мб
001 - Roles and Responsibilities.mp4 94.59Мб
001 - Security Objectives.mp4 4.82Мб
001 - So You Wanna be an AWS Rock Star.mp4 78.81Мб
001 - The CIA Triad.mp4 123.72Мб
001 - Welcome to the Cisco Certified CyberOps Associate path!.mp4 24.11Мб
001 - What is Training and Awareness.mp4 68.93Мб
002_Introduction to Blockchain.mp4 26.57Мб
002 - Business Continuity and Disaster Recovery Roles.mp4 11.82Мб
002 - CAP Basis and Foundations.mp4 1.55Мб
002 - C-I-A.mp4 123.72Мб
002 - Cloud Computing Concepts.mp4 23.75Мб
002 - Cybersecurity Fundamentals.mp4 12.53Мб
002 - General Security Principles.mp4 44.37Мб
002 - Identify the Importance of Risk Management.mp4 114.74Мб
002 - Introduction to Cisco Certified CyberOps Associate.mp4 2.21Мб
002 - ISSAP Layout and Testing.mp4 10.84Мб
002 - ISSAP Layout and Testing.mp4 10.84Мб
002 - Map the IoT attack surface.mp4 196.49Мб
002 - Move subscription to another directory.mp4 9.56Мб
002 - Network Components 1 - Routers Switches, Firewalls.mp4 45.80Мб
002 - Network Components - APs, Controllers, Endpoints.mp4 17.51Мб
002 - Regulatory Compliance.mp4 115.54Мб
002 - Risk Management Principles.mp4 15.17Мб
002 - Risk Management - Terms and Definitions.mp4 5.38Мб
002 - Security Compliance Managment Program.mp4 87.65Мб
002 - Security Role.mp4 33.27Мб
002 - What's in a Name.mp4 45.27Мб
003_Structure of the Blockchain.mp4 17.80Мб
003 - Architect for GRC - Introduction.mp4 25.15Мб
003 - Assess Risk.mp4 320.06Мб
003 - Build in security by design.mp4 116.09Мб
003 - Deployment Models.mp4 20.14Мб
003 - Governance Principles.mp4 14.32Мб
003 - Incident Identification.mp4 17.45Мб
003 - Kali Install.mp4 20.39Мб
003 - Network Topologies.mp4 40.80Мб
003 - People, Process, Technology and the NIST Framework.mp4 98.72Мб
003 - Ready, Set, Go.mp4 28.04Мб
003 - Risk Assessment Process.mp4 30.40Мб
003 - Risk Management Overview.mp4 2.61Мб
003 - Risk Management Principles.mp4 15.17Мб
003 - Risk Management Process.mp4 72.05Мб
003 - Security Documents.mp4 41.83Мб
003 - Security Governance Fundamentals.mp4 80.30Мб
003 - Security Program and Governance.mp4 30.85Мб
003 - Service principals and app registration.mp4 13.60Мб
003 - Systems Development Lifecycle.mp4 53.69Мб
003 - VLAN Fundamentals and Configuration.mp4 137.24Мб
004_Public-Key Cryptography in Blockchain.mp4 18.40Мб
004 - Basic Security Terminology and Concepts.mp4 127.21Мб
004 - CAP Domain 1 Introduction.mp4 1.43Мб
004 - Configuring identity protection.mp4 20.88Мб
004 - Control Frameworks.mp4 28.99Мб
004 - Exploring the Management Console.mp4 37.38Мб
004 - Identification Tools and Techniques.mp4 13.32Мб
004 - Identify threats to IoT web and cloud interfaces.mp4 187.48Мб
004 - Information Security Strategy.mp4 34.57Мб
004 - Layer 2 Discovery Protocols.mp4 33.06Мб
004 - Mitigate Risk.mp4 183.60Мб
004 - Network Fundamentals.mp4 24.05Мб
004 - Operational Risk Management.mp4 57.86Мб
004 - Physical Cabling.mp4 37.64Мб
004 - Principles of Secure Cloud Computing.mp4 54.98Мб
004 - Risk Definitions.mp4 65.97Мб
004 - RMF Objectives and Tasks.mp4 12.69Мб
004 - SDLC Wrap-up.mp4 47.88Мб
004 - Standards and Guidelines.mp4 20.19Мб
004 - Standards and Guidelines.mp4 20.19Мб
004 - System Resilience Principles.mp4 21.04Мб
005_Blockchain Security Public-Key Cryptography.mp4 21.96Мб
005 - Basic Risk Terminology.mp4 61.37Мб
005 - Cloud Terms you MUST Know.mp4 292.87Мб
005 - Creating an S3 Bucket.mp4 88.66Мб
005 - Cyber Security Framework (CSF) Amplification Framework.mp4 31.95Мб
005 - Defining the Information Systems.mp4 7.28Мб
005 - Design the Threat Handling and Risk Management Capabilities - Introduction.mp4 10.01Мб
005 - Enterprise System Security Framework 1.mp4 16.56Мб
005 - Integrate Documentation into Risk Management.mp4 163.05Мб
005 - Introduction.mp4 23.71Мб
005 - Layer 1 - Troubleshooting.mp4 51.49Мб
005 - Network Protocols - ICMP.mp4 8.36Мб
005 - Prevent injection flaws.mp4 248.94Мб
005 - Reading A Routing Table.mp4 32.94Мб
005 - Regulatory Compliance.mp4 115.54Мб
005 - Resource locks.mp4 22.52Мб
005 - Risk Assessment.mp4 104.79Мб
005 - Security Architecture Modeling.mp4 8.33Мб
005 - Security Objectives.mp4 4.82Мб
005 - Stakeholder Requirements Definition.mp4 29.75Мб
005 - Threats and Threat Agents.mp4 65.98Мб
005 - Vulnerability Management Principles.mp4 25.64Мб
005 - What, Who, When, Where.mp4 11.49Мб
006_Hash Functions in Blockchain.mp4 30.15Мб
006 - Azure AD authentication methods and user authentication options.mp4 25.32Мб
006 - Categorization Documents.mp4 4.68Мб
006 - Classification.mp4 77.82Мб
006 - Classify Threats and Threat Profiles.mp4 107.36Мб
006 - Creating an EC2 Instance.mp4 86.58Мб
006 - Data Classification and Categorization.mp4 21.42Мб
006 - Enterprise System Security Framework 2.mp4 27.95Мб
006 - Essential Laws and Documents.mp4 6.93Мб
006 - Identify Security Requirements and Expectations.mp4 309.53Мб
006 - Investigation Data Sources.mp4 14.68Мб
006 - IPv4 and IPv6 Static Routing.mp4 60.47Мб
006 - Layer 2 - Concepts.mp4 60.21Мб
006 - Network Protocols - ARP.mp4 5.62Мб
006 - Prevent session management flaws.mp4 139.20Мб
006 - Protecting Privacy.mp4 116.62Мб
006 - Regulatory Compliance.mp4 26.45Мб
006 - Requirements Analysis.mp4 13.48Мб
006 - Risk Assessment Process.mp4 30.40Мб
006 - Risk Management Process.mp4 72.05Мб
006 - Security Risk Analysis.mp4 103.87Мб
006 - Terminology Law, Regulation, Policy, Standard, Guideline.mp4 40.83Мб
006 - Verify and Validate Design.mp4 41.20Мб
007_Blockchain Security Hash Functions.mp4 8.03Мб
007 - Activation and configuration of Privileged Identity Management (PIM).mp4 56.14Мб
007 - Activity - Identifying Security Requirements and Expectations.mp4 129.38Мб
007 - Attacks and Social Engineering Terminology.mp4 93.26Мб
007 - AWS Databases.mp4 85.70Мб
007 - Control Selection Objectives and Tasks.mp4 2.12Мб
007 - Data Lifecycle.mp4 41.77Мб
007 - Data Security Controls.mp4 70.13Мб
007 - Enterprise System Security Framework 3.mp4 11.54Мб
007 - FTP and TFTP.mp4 21.41Мб
007 - Incident Management.mp4 96.64Мб
007 - Infrastructure Security Architecture.mp4 7.54Мб
007 - Intellectual Property.mp4 71.69Мб
007 - Layer 3 - IPv4 Concepts and Configuration.mp4 47.06Мб
007 - Network Protocols - DHCP.mp4 9.90Мб
007 - Operational Risk Management.mp4 57.86Мб
007 - Perform Ongoing Threat Research.mp4 165.76Мб
007 - Prevent cross-site scripting flaws.mp4 76.59Мб
007 - Secure Operations.mp4 57.13Мб
007 - Security Architecture Modeling - Introduction.mp4 8.33Мб
007 - Security Authorization Process.mp4 5.13Мб
007 - What is Eradication.mp4 16.88Мб
008_Course Recap.mp4 3.52Мб
008 - Cleanup and Verification.mp4 7.93Мб
008 - Cloud Computing Concepts.mp4 23.75Мб
008 - Communication and Network Security Overview.mp4 3.64Мб
008 - Configure Source NAT.mp4 64.35Мб
008 - Create a virtual network and filter network traffic.mp4 68.09Мб
008 - Cryptography Terminology.mp4 84.82Мб
008 - Data Destruction and Disposal.mp4 11.93Мб
008 - Digital Forensics.mp4 83.86Мб
008 - Enterprise Architectures - Overview.mp4 1.12Мб
008 - Identify Factors that Undermine Software Security.mp4 219.73Мб
008 - Implementation Objectives and Tasks.mp4 2.12Мб
008 - Implement Threat Modeling.mp4 64.34Мб
008 - Import-Export.mp4 39.39Мб
008 - Layer 3 - IPv6 Addresses and Configuration.mp4 71.05Мб
008 - Managing Third-Party Relationships.mp4 31.67Мб
008 - Network Protocols - DNS.mp4 5.31Мб
008 - Other Cool Services.mp4 92.44Мб
008 - Prevent cross-site request forgery flaws.mp4 64.57Мб
008 - Risk Management - Terms and Definitions.mp4 5.38Мб
008 - Secure Maintenance.mp4 25.75Мб
008 - Stakeholder Requirements Definition.mp4 29.75Мб
009_Introduction to Blockchain Consensus Algorithms.mp4 25.91Мб
009 - Acquisition Process.mp4 32.52Мб
009 - Assess the Impact of Reconnaissance.mp4 105.18Мб
009 - Cloud Reference Architecture.mp4 368.13Мб
009 - Cloud Storage Architectures.mp4 37.06Мб
009 - Concept of Business Continuity Planning.mp4 121.69Мб
009 - Crypto Solutions.mp4 27.19Мб
009 - Current State of Training and Awareness and Employee Engagement.mp4 106.83Мб
009 - Defining Key Security Concepts.mp4 24.30Мб
009 - Deploy, configure, and test an Azure firewall.mp4 34.26Мб
009 - DNS, SMTPPOP3IMAP.mp4 6.94Мб
009 - Enterprise Architectures - SABSA.mp4 10.24Мб
009 - Ethics.mp4 35.16Мб
009 - Hashing.mp4 74.11Мб
009 - IAM... What.mp4 52.87Мб
009 - Identify Factors that Undermine Software Security, Part 2.mp4 93.34Мб
009 - Layer 4 - Comparing TCP and UDP.mp4 34.00Мб
009 - Organization of Controls.mp4 13.51Мб
009 - Prevent unvalidated redirects and forwards.mp4 73.22Мб
009 - Requirements Analysis.mp4 13.48Мб
009 - Returning to Normal Business Processes.mp4 6.75Мб
009 - Risk Management - Risk Definition and Types.mp4 9.56Мб
009 - Security Awareness.mp4 20.05Мб
010_Proof of Work.mp4 17.50Мб
010 - AAA.mp4 60.66Мб
010 - Assess the Impact of Social Engineering.mp4 88.83Мб
010 - AWS Costs.mp4 44.05Мб
010 - Azure types of VPNs and ExpressRoute.mp4 59.26Мб
010 - BCP Project Planning.mp4 80.80Мб
010 - Bias, Distraction, Apathy and Fatigue.mp4 130.22Мб
010 - Cloud Security Strategies.mp4 52.35Мб
010 - Control Assurance and Documentation.mp4 3.88Мб
010 - Cryptographic Attacks.mp4 63.86Мб
010 - Deployment Models.mp4 20.14Мб
010 - Enterprise Architectures - TOGAF.mp4 4.50Мб
010 - Find Vulnerabilities in Your Software.mp4 265.17Мб
010 - IAM Architecture.mp4 27.19Мб
010 - Identifying Threats and Vulnerabilities.mp4 21.74Мб
010 - Network Devices.mp4 8.71Мб
010 - Risk Management Overview.mp4 2.61Мб
010 - Security Metrics.mp4 14.38Мб
010 - System Development Methodologies.mp4 7.72Мб
010 - System Security Architecture and Design.mp4 23.70Мб
010 - Use cryptography appropriately.mp4 293.15Мб
010 - Wireless Principles.mp4 40.42Мб
011_Attacking Proof of Work.mp4 27.78Мб
011 - Access Control Protocols and SSO.mp4 11.49Мб
011 - Activity - Identifying Vulnerabilities in an Application.mp4 120.29Мб
011 - Assess the Impact of System Hacking Attacks.mp4 129.84Мб
011 - Automating Network Management.mp4 34.35Мб
011 - AWS Documentation.mp4 44.18Мб
011 - Cloud Secure Software Development Lifecycle.mp4 22.32Мб
011 - Conducting Security Control Assessment.mp4 7.60Мб
011 - Deploy WAF and Front Door Service.mp4 41.48Мб
011 - Enterprise Architectures - SOMF.mp4 6.33Мб
011 - Ethics.mp4 44.00Мб
011 - Firewalls.mp4 5.19Мб
011 - Implementation, Integration, and Deployment of Systems or System Modifications.mp4 11.70Мб
011 - IR Asset Inventory and Identification.mp4 13.92Мб
011 - PKI Definition and Components.mp4 78.02Мб
011 - Protect data in motion.mp4 352.80Мб
011 - Risk Definitions.mp4 65.97Мб
011 - Security Aspects of Virtualization.mp4 46.00Мб
011 - Security Budget.mp4 21.79Мб
011 - System Boundaries and Control Allocation.mp4 5.31Мб
011 - Virtualization Fundamentals.mp4 29.03Мб
012_Proof of Stake.mp4 21.21Мб
012 - Application Architecture Elements of Cloud Services.mp4 15.28Мб
012 - Assess the Impact of Web-Based Attacks.mp4 112.51Мб
012 - Authorization Objective and Tasks.mp4 3.49Мб
012 - AWS Certification Path.mp4 62.72Мб
012 - Building and Breaking Passwords.mp4 183.00Мб
012 - Deploy Azure Bastion.mp4 27.83Мб
012 - Human Attention Spans, the Hook and Storytelling.mp4 81.63Мб
012 - Industrial Control Systems (ICS).mp4 16.12Мб
012 - IPS and AMP.mp4 17.77Мб
012 - Network Architecture.mp4 9.26Мб
012 - Other Compliance Considerations.mp4 102.48Мб
012 - Principles of Secure Cloud Computing.mp4 54.98Мб
012 - Protect data at rest.mp4 125.08Мб
012 - Risk Frameworks.mp4 51.63Мб
012 - SDLC Integration.mp4 10.43Мб
012 - Security Models Part 1.mp4 67.94Мб
012 - Security Programs.mp4 24.65Мб
012 - Verification and Validation of Systems or System Modifications.mp4 20.95Мб
012 - VLAN Fundamentals and Configuration.mp4 37.13Мб
013_Attacking Proof of Stake.mp4 47.14Мб
013 - Activity - Adding a Security Feature to Your Code.mp4 75.62Мб
013 - Architecture for Application Security.mp4 12.55Мб
013 - Assess the Impact of Malware.mp4 87.86Мб
013 - Authorization Roles and Responsibilities.mp4 20.74Мб
013 - DDoS protection & endpoint protection in Azure.mp4 83.51Мб
013 - Design Requirements.mp4 54.80Мб
013 - dot1Q Fundamentals and Configuration.mp4 48.98Мб
013 - Email and Web Security.mp4 2.24Мб
013 - Federal Enterprise Architecture Reference Models.mp4 5.69Мб
013 - Introduction to Marketing, Personas and the Sales Funnel.mp4 249.37Мб
013 - Making Security Authorization Decisions.mp4 6.96Мб
013 - Physical Logical Operations.mp4 24.41Мб
013 - Project Management.mp4 17.98Мб
013 - Protect data in use.mp4 131.82Мб
013 - Risk Assessment.mp4 144.08Мб
013 - Secure Operations.mp4 57.13Мб
013 - Security Models Part 2.mp4 84.49Мб
013 - What is AWS.mp4 64.60Мб
014_Nodes and Network.mp4 24.78Мб
014 - Activity - Protect Against a Poison Null Byte.mp4 95.55Мб
014 - Application Testing.mp4 28.02Мб
014 - Assess the Impact of Hijacking and Impersonation Attacks.mp4 60.28Мб
014 - Cloud Model Boundaries.mp4 23.24Мб
014 - Continuous Monitoring Tasks and Objectives.mp4 4.20Мб
014 - Deploy, configure, and secure Azure Container Registry and Azure Kubernetes Service.mp4 65.34Мб
014 - Identify the need to protect IoT resources.mp4 102.37Мб
014 - Inline Traffic Interrogation, Taps and NetFlow.mp4 2.86Мб
014 - Layer 2 Discovery Protocols.mp4 33.06Мб
014 - Managing Risks.mp4 34.93Мб
014 - RMF Objectives and Tasks.mp4 12.69Мб
014 - Secure Maintenance.mp4 25.75Мб
014 - Security Models Part 3.mp4 70.57Мб
014 - Systems Life Cycle Management Introduction.mp4 3.04Мб
014 - Tactics, Marketing Automation and Integrated Campaigns.mp4 150.86Мб
014 - Threats and Threat Agents.mp4 65.98Мб
014 - Verify and validate design.mp4 41.20Мб
014 - Why use AWS.mp4 70.13Мб
015_Attacking Block Creation.mp4 35.45Мб
015 - Activity - Hashing a Password.mp4 60.51Мб
015 - Assess the Impact of DoS Incidents.mp4 55.99Мб
015 - Azure Monitor.mp4 117.60Мб
015 - Computer Components.mp4 62.16Мб
015 - Continuous Monitoring Process.mp4 6.38Мб
015 - Defense in Depth Strategy.mp4 7.59Мб
015 - How to Get Started with AWS.mp4 102.73Мб
015 - Implement secure authentication.mp4 409.55Мб
015 - Infrastructure Security Architecture - Introduction.mp4 7.54Мб
015 - Legal Concepts.mp4 38.00Мб
015 - Manage Integration of Security into SDLC - Part 1.mp4 2.58Мб
015 - Privacy Requirements and Hosted Systems.mp4 5.39Мб
015 - Protecting Sensitive Information.mp4 67.53Мб
015 - Risk Assignment.mp4 60.41Мб
015 - RPVST+ Part 1.mp4 52.60Мб
015 - Secure Disposal.mp4 15.05Мб
015 - Security Operations Architecture.mp4 16.55Мб
016_Targeting the Node.mp4 31.39Мб
016 - Acquisition Process.mp4 32.52Мб
016 - Activity - Securing the Password Hash.mp4 60.02Мб
016 - Assess the Impact of Threats to Mobile Security.mp4 56.48Мб
016 - Assurance Frameworks and Certification.mp4 19.12Мб
016 - AWS Certifications.mp4 101.45Мб
016 - Branding and Positioning.mp4 73.07Мб
016 - Communications and Network Security - Overview.mp4 3.64Мб
016 - Cybercrime and APTs.mp4 18.85Мб
016 - Deploy and configure Azure Monitor.mp4 115.51Мб
016 - Describe the CIA Triad.mp4 10.01Мб
016 - Federal Laws.mp4 13.33Мб
016 - Implement secure authorization.mp4 144.05Мб
016 - Malware.mp4 44.80Мб
016 - Manage Integration of Security into SDLC - Part 2.mp4 17.82Мб
016 - RPVST+ Part 2.mp4 40.17Мб
016 - Threat Modeling.mp4 45.17Мб
016 - Threat Modeling.mp4 38.65Мб
017_Attacking the Network.mp4 25.92Мб
017 - Activity - Saving Hashes for Future Use.mp4 58.59Мб
017 - Assess the Impact of Threats to Cloud Security.mp4 32.84Мб
017 - Azure Security Center.mp4 161.03Мб
017 - Cloud Terms You MUST Know.mp4 272.90Мб
017 - Design, Imagery and Logos.mp4 229.83Мб
017 - EtherChannels Concepts and Configuration.mp4 47.36Мб
017 - Executive Orders and OMB Documents.mp4 12.63Мб
017 - Implement security monitoring on IoT systems.mp4 141.80Мб
017 - LAN Protocols.mp4 5.24Мб
017 - Manage Integration of Security into SDLC - Part 3.mp4 22.70Мб
017 - Preparation Resources.mp4 142.11Мб
017 - SecOps.mp4 2.11Мб
017 - Security Awareness.mp4 64.51Мб
017 - System Development Methodologies.mp4 7.72Мб
017 - Vulnerabilities.mp4 16.00Мб
017 - Web-based Vulnerabilities.mp4 69.51Мб
018_What are Smart Contracts.mp4 17.62Мб
018 - Activity - Validating a Password.mp4 54.83Мб
018 - Assess Command and Control Techniques.mp4 76.70Мб
018 - Benefits of Certification.mp4 63.23Мб
018 - Data Classification and Categorization.mp4 21.42Мб
018 - Deploy and configure Azure Security Center.mp4 64.17Мб
018 - Due Diligence and Due Care.mp4 52.88Мб
018 - Ensure the security of IP networks.mp4 438.99Мб
018 - Exploits.mp4 13.50Мб
018 - Manage Integration of Security into SDLC - Part 4.mp4 20.62Мб
018 - Network Topologies.mp4 9.40Мб
018 - NIST Documents - FIPS.mp4 7.28Мб
018 - Physical Security.mp4 112.92Мб
018 - Technical Management Processes.mp4 64.92Мб
018 - Wireless Architectures and AP Modes.mp4 35.60Мб
019_General Programming Vulnerabilities.mp4 31.12Мб
019 - Activity - Having Fun With a Modern Hashing Algorithm.mp4 66.10Мб
019 - Assess Persistence Techniques.mp4 69.11Мб
019 - AWS CSA-A Overview.mp4 118.20Мб
019 - Azure Sentinel.mp4 124.77Мб
019 - Data Lifecycle.mp4 41.77Мб
019 - Designing and Planning a Program.mp4 32.24Мб
019 - Ensure the security of wireless networks.mp4 177.27Мб
019 - Manage Integration of Security into SDLC - Part 5.mp4 10.89Мб
019 - NIST Documents - Special Publications.mp4 31.23Мб
019 - Physical WLAN Connection and Management.mp4 29.91Мб
019 - Risks.mp4 2.03Мб
019 - Utilities and HVAC.mp4 95.57Мб
019 - Vendor Security.mp4 64.89Мб
019 - WANs.mp4 7.93Мб
020_Blockchain Vulnerabilities.mp4 58.11Мб
020 - Assess Lateral Movement and Pivoting Techniques.mp4 119.39Мб
020 - CNSS.mp4 3.11Мб
020 - Common Services Security.mp4 13.93Мб
020 - Configuring a WLAN in a WLC.mp4 38.80Мб
020 - Database Architectures.mp4 38.18Мб
020 - Deploy and configure Azure Sentinel.mp4 231.34Мб
020 - Ensure the security of mobile networks.mp4 207.04Мб
020 - Gather Intelligence on Vulnerabilities and Exploits.mp4 93.59Мб
020 - Information Rights Management (IRM) Digital Rights Management (DRM) Solutions.mp4 46.92Мб
020 - Learning Science, Fogg and Gardner.mp4 139.43Мб
020 - Manage Integration of Security into SDLC - Part 6.mp4 7.71Мб
020 - Security Terms.mp4 7.53Мб
020 - What's New on the 2020 Updated Exam.mp4 87.90Мб
021_Ethereum Vulnerabilities.mp4 53.16Мб
021 - Assess Data Exfiltration Techniques.mp4 37.93Мб
021 - AWS CSA-A Exam Objectives.mp4 158.30Мб
021 - Azure Storage.mp4 127.11Мб
021 - Database Terminology.mp4 72.21Мб
021 - Data Retention.mp4 14.56Мб
021 - Ensure the security of IoT edge networks.mp4 217.27Мб
021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration.mp4 338.57Мб
021 - LAN Technologies.mp4 5.05Мб
021 - Manage Integration of Security into SDLC - Part 7.mp4 15.35Мб
021 - Policy.mp4 48.76Мб
021 - Reading a Routing Table.mp4 32.94Мб
021 - Right Message, Right Person, Right Time.mp4 174.21Мб
021 - Supplemental Regulations.mp4 3.33Мб
021 - Threat Hunting.mp4 8.68Мб
022_Alternative Distributed Ledger Architectures.mp4 34.88Мб
022 - Assess Anti-Forensic Techniques.mp4 85.33Мб
022 - CAP Domain 2 Introduction.mp4 3.48Мб
022 - Data Audits.mp4 27.04Мб
022 - Deploy, configure, and secure Azure Storage.mp4 182.14Мб
022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2.mp4 271.75Мб
022 - Improve data collection to reduce privacy concerns.mp4 280.46Мб
022 - Launching Phishing and Training, Reporting.mp4 184.05Мб
022 - Manage Integration of Security into SDLC - Part 8.mp4 28.65Мб
022 - Network Cabling and Topology.mp4 120.43Мб
022 - Personnel Security.mp4 82.05Мб
022 - Routing Decisions and Route Attributes.mp4 29.64Мб
022 - The Four Key Areas (Compute, Networking, Storage, and Databases).mp4 95.04Мб
022 - Wireless Technologies.mp4 7.79Мб
022 - Zero Trust.mp4 19.86Мб
023_Second-Layer Protocols.mp4 11.09Мб
023 - Azure SQL Database.mp4 92.45Мб
023 - Carrot vs Stick, Repeat Offenders.mp4 86.75Мб
023 - Control Frameworks.mp4 77.60Мб
023 - Data DestructionDisposal.mp4 11.93Мб
023 - Defining the Information Systems.mp4 7.28Мб
023 - Evaluate New Business Initiatives, Integrate Initiatives into Security Architecture.mp4 12.18Мб
023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3.mp4 192.69Мб
023 - Implement a Vulnerability Management Plan.mp4 107.48Мб
023 - IPv4 and IPv6 Static Routing.mp4 60.47Мб
023 - Master the Knowledge Areas.mp4 51.67Мб
023 - OSI Protocols.mp4 70.69Мб
023 - Protect sensitive data.mp4 181.92Мб
023 - Threat Intelligence Platform (TIP).mp4 16.38Мб
023 - VoIP, Email, and Remote Access Protocols.mp4 7.34Мб
024_Advanced Cryptography in Blockchain.mp4 40.48Мб
024 - Activity Examining the Web App Functionality.mp4 200.06Мб
024 - Assess Common Vulnerabilities.mp4 101.78Мб
024 - Authentication, Authorization, Accounting.mp4 112.93Мб
024 - Cloud Storage Architectures.mp4 37.06Мб
024 - Deploy, configure, and secure Azure SQL Database.mp4 91.25Мб
024 - Dispose of sensitive data.mp4 111.96Мб
024 - OSI Layers.mp4 88.81Мб
024 - OSI Reference Model - Introduction.mp4 15.04Мб
024 - OSPFv2 Part 1.mp4 51.95Мб
024 - SLAs.mp4 27.56Мб
024 - System Security Plan.mp4 4.14Мб
024 - Use the System.mp4 125.37Мб
024 - Vulnerability Management, Penetration Testing, Threat Assessment and Modeling - Part 1.mp4 45.67Мб
025 - Access Control Models.mp4 2.46Мб
025 - Activity Examining the Project Files for Security Concerns.mp4 225.42Мб
025 - Azure Key Vault.mp4 129.86Мб
025 - Categorization Documents.mp4 4.68Мб
025 - Cloud Security Strategies.mp4 52.35Мб
025 - Conduct Vulnerability Scans.mp4 43.81Мб
025 - Manage general software risks.mp4 267.26Мб
025 - OSI Layers.mp4 31.84Мб
025 - OSPFv2 Part 2.mp4 40.75Мб
025 - Security Documents.mp4 41.83Мб
025 - Take Notes.mp4 74.48Мб
025 - Vulnerability Management, Penetration Testing, Threat Assessment and Modeling - Part 2.mp4 35.50Мб
025 - Wireless Networks.mp4 105.04Мб
026 - Be Mentally and Physically Prepared.mp4 100.22Мб
026 - Cloud Platform Risks and Responsibilities.mp4 54.09Мб
026 - Conduct Penetration Tests on Network Assets.mp4 158.45Мб
026 - Deploy, configure, and secure Azure Key Vault.mp4 72.00Мб
026 - FHRP.mp4 32.48Мб
026 - Handle Error Messaging.mp4 266.41Мб
026 - Identifying the Information Types.mp4 4.56Мб
026 - Manage risks related to software installation and configuration.mp4 92.91Мб
026 - Network Devices.mp4 96.51Мб
026 - Networking Devices and Firewalls.mp4 10.40Мб
026 - RuleTime-based Access Control.mp4 7.76Мб
026 - Vulnerability Management, Penetration Testing, Threat Assessment and Modeling - Part 3.mp4 12.20Мб
027 - Activity Identifying Software Defects and Misconfiguration.mp4 136.18Мб
027 - Change Control.mp4 26.25Мб
027 - Configuring Source NAT.mp4 64.35Мб
027 - Determining the Impact Level.mp4 7.17Мб
027 - Disaster Recovery and Business Continuity Management.mp4 52.06Мб
027 - Follow Up on Penetration Testing.mp4 51.86Мб
027 - Manage risks related to software patches and updates.mp4 109.06Мб
027 - Managing Data.mp4 100.95Мб
027 - Security Management.mp4 4.40Мб
027 - Take the Exam.mp4 100.65Мб
027 - VPN and Secure Protocols.mp4 9.69Мб
027 - VPN and VLAN.mp4 61.47Мб
028 - Access Control Basics.mp4 59.03Мб
028 - Categorization Examples and Exercises.mp4 4.63Мб
028 - Cloud Computing Defined.mp4 214.84Мб
028 - Cloud Secure Software Development Lifecycle.mp4 22.32Мб
028 - Configuring NTP.mp4 59.00Мб
028 - Data Ownership.mp4 26.41Мб
028 - Deploy a Security Intelligence Collection and Analysis Platform.mp4 180.00Мб
028 - Encryption and Hashing.mp4 5.56Мб
028 - Handle Vulnerabilities Due to Human Factors.mp4 263.53Мб
028 - Manage risks related to IoT device operating systems and firmware.mp4 143.47Мб
028 - Monitoring, Detection and Response.mp4 14.93Мб
028 - Risk Management Introduction.mp4 2.50Мб
029 - Authentication.mp4 106.09Мб
029 - Benefits of Cloud Computing.mp4 250.78Мб
029 - Categorization of National Security Systems.mp4 2.98Мб
029 - Collect Data from Network-Based Intelligence Sources.mp4 95.01Мб
029 - Data Security Controls.mp4 70.13Мб
029 - Design Integrated Cryptographic Solutions.mp4 27.19Мб
029 - DHCP and DNS Fundamentals.mp4 31.35Мб
029 - Handle Vulnerabilities Due to Human Factors, Part 2.mp4 119.52Мб
029 - PKI.mp4 23.70Мб
029 - Protect local memory and storage.mp4 89.39Мб
029 - Risk Management Program.mp4 49.17Мб
029 - Software Security Testing.mp4 24.31Мб
030 - Activity Managing People Risks.mp4 145.00Мб
030 - Application Architecture Elements of Cloud Services.mp4 15.28Мб
030 - Architecting PKI.mp4 19.40Мб
030 - CAP Domain 3 Introduction.mp4 2.33Мб
030 - Cloud Computing Models.mp4 173.11Мб
030 - Collect Data from Host-Based Intelligence Sources.mp4 101.57Мб
030 - Conduct Risk Assessments.mp4 36.47Мб
030 - Configuring DHCP.mp4 42.18Мб
030 - Data Remanence.mp4 57.99Мб
030 - Microsoft Windows Introduction.mp4 15.46Мб
030 - Prevent physical port access.mp4 64.06Мб
030 - Single Sign-On (SSO).mp4 49.41Мб
031 - Access Control Models.mp4 71.03Мб
031 - Auditing in the Cloud.mp4 14.25Мб
031 - Control Selection Objectives and Tasks.mp4 6.69Мб
031 - Course summary.mp4 17.29Мб
031 - Data at Rest.mp4 89.29Мб
031 - Handle Vulnerabilities Due to Process Shortcomings.mp4 251.26Мб
031 - History.mp4 182.49Мб
031 - IAM Architecture - Introduction.mp4 6.47Мб
031 - Microsoft Windows Terms.mp4 24.00Мб
031 - Risk Assessment Process.mp4 51.31Мб
031 - SNMP and Syslogging.mp4 41.35Мб
031 - Use Common Tools to Analyze Logs.mp4 101.73Мб
032 - Access Control Concepts.mp4 3.30Мб
032 - Control Testing.mp4 69.54Мб
032 - Data in Transit.mp4 66.77Мб
032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2.mp4 116.87Мб
032 - Linux Introduction.mp4 4.74Мб
032 - Physical Logical Operations.mp4 24.41Мб
032 - Platform.mp4 149.74Мб
032 - QoS.mp4 41.17Мб
032 - Tailoring of Controls.mp4 7.34Мб
032 - Threat Intelligence and Incident Management Introduction.mp4 2.52Мб
032 - Use SIEM Tools for Analysis.mp4 53.37Мб
033 - Access Control Services.mp4 25.17Мб
033 - Classification.mp4 77.82Мб
033 - Forensics.mp4 121.28Мб
033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3.mp4 224.13Мб
033 - Linux Terms.mp4 22.20Мб
033 - Monitoring, Capacity and Maintenance.mp4 34.81Мб
033 - Monitoring Strategy and Security Plan Approval.mp4 2.06Мб
033 - Parsing Log Data with Regular Expressions.mp4 100.68Мб
033 - Services, Part 1.mp4 260.09Мб
033 - SSH.mp4 37.94Мб
033 - Threat Intelligence.mp4 22.40Мб
034 - Access Control Techniques and Technologies.mp4 9.49Мб
034 - Activity Managing Software Development Process Risks.mp4 84.11Мб
034 - Analyze Incidents with Windows-Based Tools.mp4 176.69Мб
034 - Change and Configuration Management.mp4 29.83Мб
034 - Endpoint Protection.mp4 5.13Мб
034 - FTP and TFTP.mp4 21.41Мб
034 - Incident Response and Management - Part 1.mp4 26.85Мб
034 - Preventative Measures.mp4 96.89Мб
034 - Services, Part 2.mp4 201.87Мб
034 - Step One - Prepare.mp4 11.71Мб
035 - Analyze Incidents with Linux-Based Tools.mp4 56.77Мб
035 - Apply General Principles for Secure Design.mp4 191.76Мб
035 - Business Continuity Planning.mp4 72.78Мб
035 - Cryptography Terminology.mp4 84.82Мб
035 - Defining Key Security Concepts.mp4 24.30Мб
035 - Identity Management.mp4 10.26Мб
035 - Incident Response and Management - Part 2.mp4 23.87Мб
035 - Managing Risks.mp4 34.93Мб
035 - Security and Compliance.mp4 177.22Мб
035 - Step Two - Conduct the Assessment.mp4 15.97Мб
035 - Whitelisting and Blacklisting.mp4 3.89Мб
036 - Access Control Protocols and SSO.mp4 11.49Мб
036 - Analyze Malware.mp4 102.44Мб
036 - Apply General Principles for Secure Design, Part 2.mp4 121.82Мб
036 - Backups.mp4 75.91Мб
036 - Elements of a Security Program.mp4 29.11Мб
036 - Hashing.mp4 74.11Мб
036 - Incident Response and Management - Part 3.mp4 41.47Мб
036 - Regions and Availability.mp4 167.72Мб
036 - Security Training and Awareness.mp4 30.60Мб
036 - Step Three - Report and Communicate.mp4 602.25Кб
036 - Systems-Based Sandboxing.mp4 7.37Мб
037 - AAA.mp4 60.66Мб
037 - Analyze Indicators or Compromise.mp4 176.83Мб
037 - Contingency Management Introduction.mp4 2.55Мб
037 - Cryptographic Attacks.mp4 63.86Мб
037 - Kerberos and SESAME.mp4 17.13Мб
037 - Legal Concepts.mp4 38.00Мб
037 - Secure Software Design.mp4 83.81Мб
037 - Step Four - Maintain.mp4 3.32Мб
037 - Storage Services.mp4 172.59Мб
037 - System Logs.mp4 9.07Мб
037 - Use Secure Design Patterns.mp4 272.14Мб
038 - Activity Avoiding Common Security Design Flaws.mp4 39.30Мб
038 - CAP Domain 4 Introduction.mp4 1.75Мб
038 - Deploy an Incident Handling and Response Architecture.mp4 223.32Мб
038 - EAP, SAML, OAuth.mp4 6.26Мб
038 - Intellectual Property.mp4 16.64Мб
038 - Network Logging.mp4 19.51Мб
038 - Oversee Continuity Planning Development - Part 1.mp4 44.99Мб
038 - S2S and RA VPN.mp4 48.63Мб
038 - S3 Storage Class.mp4 194.63Мб
038 - Secure SDLC.mp4 66.50Мб
038 - Symmetric Cryptography.mp4 67.95Мб
039 - Access Control Models and Governance.mp4 15.41Мб
039 - ACLs.mp4 88.26Мб
039 - Application Attacks.mp4 80.68Мб
039 - Asymmetric Cryptography.mp4 74.74Мб
039 - Contain and Mitigate Incidents.mp4 146.64Мб
039 - Contract and Service-Level Agreements (SLAs).mp4 17.85Мб
039 - Design Software to Counter Specific Threats.mp4 311.84Мб
039 - Implementation Objective and Tasks.mp4 2.12Мб
039 - Oversee Continuity Planning Development - Part 2.mp4 15.33Мб
039 - Packet Captures.mp4 20.21Мб
039 - S3 Terminology.mp4 248.84Мб
040 - Access Control Categories and Methods.mp4 21.99Мб
040 - Assurance Frameworks and Certification.mp4 19.12Мб
040 - Design Software to Counter Specific Threats, Part 2.mp4 400.77Мб
040 - Hybrid Cryptography.mp4 41.54Мб
040 - Layer 2 Security.mp4 100.28Мб
040 - NetFlow.mp4 6.81Мб
040 - Organization of Controls.mp4 13.51Мб
040 - Oversee Continuity Planning Development - Part 3.mp4 49.94Мб
040 - Prepare for Forensic Investigation as a CSIRT.mp4 29.18Мб
040 - S3 Advanced Features.mp4 206.29Мб
041 - Activity Identifying Threats and Countermeasures.mp4 70.82Мб
041 - Application Visibility and Control (AVC).mp4 2.76Мб
041 - Apply a Forensic Investigation Plan.mp4 69.20Мб
041 - Authorization Process and Types.mp4 12.79Мб
041 - Compensating Controls.mp4 3.96Мб
041 - Creating S3 Buckets Lab.mp4 177.42Мб
041 - CSA Security, Trust and Assurance Registry.mp4 14.13Мб
041 - Recovery Strategies.mp4 28.02Мб
041 - Wireless Security.mp4 32.03Мб
042 - Automating Network Management.mp4 34.35Мб
042 - Ciphers.mp4 28.87Мб
042 - Control Assurance and Documentation.mp4 3.88Мб
042 - Follow Best Practices for Secure Coding.mp4 289.66Мб
042 - Maintaining Plans.mp4 27.89Мб
042 - Monitoring Challenges.mp4 7.34Мб
042 - Privilege Access Management.mp4 8.59Мб
042 - S3 Bucket Properties.mp4 200.13Мб
042 - Securely Collect and Analyze Electronic Evidence.mp4 50.88Мб
042 - Test Essential Knowledge Areas.mp4 32.67Мб
043 - Access Control Practices.mp4 15.48Мб
043 - Activity Researching Secure Coding Best Practices.mp4 190.55Мб
043 - Controller Based and SDN Architectures.mp4 18.17Мб
043 - Defense in Depth.mp4 2.64Мб
043 - Digital Signatures.mp4 81.06Мб
043 - Follow Up on the Results of an Investigation.mp4 39.04Мб
043 - Manage Recovery.mp4 7.88Мб
043 - NextGen IPS Event Types.mp4 3.66Мб
043 - S3 Managing Objects Lab.mp4 263.73Мб
043 - The Test.mp4 9.29Мб
044 - Access Control Protocols.mp4 12.30Мб
044 - Attack Surface Analysis.mp4 7.49Мб
044 - Course Review and Exam Preview.mp4 45.48Мб
044 - Glacier.mp4 191.76Мб
044 - Law, Ethics and Security Compliance Management Introduction.mp4 1.23Мб
044 - Prevent Memory Errors.mp4 193.04Мб
044 - REST APIs.mp4 33.29Мб
044 - Types of Controls.mp4 25.74Мб
045 - CAP Domain 5 Introduction.mp4 1.26Мб
045 - Configuration Management Systems.mp4 40.77Мб
045 - Legal Parameters - Part 1.mp4 27.27Мб
045 - Network Attacks.mp4 12.68Мб
045 - PKI Definition and Components.mp4 78.02Мб
045 - Prevent Memory Errors, Part 2.mp4 165.84Мб
045 - Setting up a Glacier Vault Lab.mp4 202.24Мб
045 - Testing of Access Controls.mp4 18.19Мб
046 - Legal Parameters - Part 2.mp4 42.84Мб
046 - Maintain Secure Formatting and Resource Access.mp4 250.61Мб
046 - Network Access Control.mp4 9.26Мб
046 - PKI Certificates.mp4 32.19Мб
046 - Preparing for Security Control Assessment (SCA).mp4 10.35Мб
046 - S3 and Tape Gateway.mp4 152.11Мб
046 - Web Application Attacks.mp4 5.66Мб
047 - Activity Preventing a Race Condition.mp4 57.66Мб
047 - Architect for Application Security - Introduction.mp4 12.55Мб
047 - Conducting Security Control Assessment (SCA).mp4 7.60Мб
047 - Ethics and Management Issues.mp4 15.95Мб
047 - Key Management.mp4 82.78Мб
047 - S3 Enhanced Features.mp4 209.85Мб
047 - Social Engineering and Phishing Attacks.mp4 10.62Мб
048 - Compliance Management IAW Security Policies and Procedures - Part 1.mp4 4.42Мб
048 - Elastic Block Store (EBS).mp4 201.44Мб
048 - Endpoint-Based Attacks.mp4 12.35Мб
048 - Key Exchange.mp4 70.12Мб
048 - Preparing and Developing Security Assessment Report (SAR).mp4 3.05Мб
048 - Prevent Privacy Vulnerabilities.mp4 334.32Мб
048 - SDLC.mp4 15.74Мб
049 - Activity Handling Privacy Defects.mp4 61.75Мб
049 - CAP Domain 6 Introduction.mp4 991.60Кб
049 - Compliance Management IAW Security Policies and Procedures - Part 2.mp4 17.98Мб
049 - Creating EBS Volumes Lab.mp4 190.54Мб
049 - Evasion Methods.mp4 16.92Мб
049 - Requirements Traceability Matrix (RTM).mp4 3.19Мб
050 - Application Testing.mp4 28.02Мб
050 - Authorization Objective and Tasks.mp4 3.49Мб
050 - Compliance Management IAW Security Policies and Procedures - Part 3.mp4 13.94Мб
050 - Elastic File System (EFS).mp4 181.37Мб
050 - Malware Analysis Tool Report.mp4 10.73Мб
050 - Prevent Platform Vulnerabilities, Part 1.mp4 268.46Мб
050 - Secure Design Principles.mp4 66.65Мб
051 - Compliance Management IAW Security Policies and Procedures - Part 4.mp4 25.95Мб
051 - Creating an EFS File System Lab.mp4 192.15Мб
051 - Crypto Key Management.mp4 5.67Мб
051 - CVSS 3.0.mp4 23.01Мб
051 - Developing Plan of Action and Milestones (POAM) & assembling Security Authorization Package.mp4 8.23Мб
051 - Prevent Platform Vulnerabilities, Part 2.mp4 343.94Мб
051 - Security Models Part 1.mp4 67.94Мб
052 - Activity Staging an XSS Attack on the Web App.mp4 149.35Мб
052 - Application Threats.mp4 30.41Мб
052 - Compliance Management IAW Security Policies and Procedures - Part 5.mp4 27.06Мб
052 - Determining Information System Risk.mp4 2.30Мб
052 - EFS and PrivateLink.mp4 88.31Мб
052 - Microsoft Windows File System.mp4 10.06Мб
052 - Security Models Part 2.mp4 84.49Мб
053 - Application Security - Mobile, Web, Proxy and Database Use.mp4 15.01Мб
053 - Coordination with Auditors.mp4 18.16Мб
053 - Intro to Amazon FSx.mp4 158.75Мб
053 - Linux File System.mp4 3.62Мб
053 - Making Security Authorization Decision.mp4 6.96Мб
053 - Prevent Mobile Platform Vulnerabilities.mp4 229.43Мб
053 - Security Models Part 3.mp4 70.57Мб
054 - Capability Maturity Model (CMM) and Common Criteria (CC).mp4 13.93Мб
054 - CAP Domain 7 Introduction.mp4 1.18Мб
054 - Evidence and Attribution.mp4 4.82Мб
054 - Hands on with FSx.mp4 149.40Мб
054 - Prevent Mobile Platform Vulnerabilities, Part 2.mp4 244.16Мб
054 - Security Modes.mp4 30.90Мб
055 - Continuous Monitoring Tasks and Objectives.mp4 4.20Мб
055 - Evaluation Models.mp4 52.42Мб
055 - Indicators of Attack and Compromise.mp4 17.21Мб
055 - Integrating On-Premises Storage.mp4 179.64Мб
055 - Off-site Data Storage and Usage.mp4 9.74Мб
055 - Prevent IoT Platform Vulnerabilities.mp4 81.97Мб
056 - Common Artifact Elements and Protocol Headers.mp4 7.75Мб
056 - Prevent Desktop Platform Vulnerabilities.mp4 233.47Мб
056 - Rainbow Series.mp4 27.31Мб
056 - Storage Access Security Lab.mp4 261.03Мб
056 - System Configuration Management.mp4 5.76Мб
056 - Virtualization and Cloud Computing.mp4 34.49Мб
057 - Common Criteria.mp4 54.94Мб
057 - Limit Access Using Session Control.mp4 222.35Мб
057 - Ongoing Assessments, Remediation and Risk Acceptance.mp4 3.60Мб
057 - Security Analysis with Wireshark.mp4 6.55Мб
057 - Security Operations Architecture - Introduction.mp4 16.55Мб
057 - Storage Performance.mp4 216.48Мб
058 - Certification and Accreditation.mp4 29.89Мб
058 - Decommission of Information Systems.mp4 5.66Мб
058 - Limit Access Using Session Control, Part 2.mp4 222.33Мб
058 - NetFlow v5 and Security Events.mp4 682.89Кб
058 - Security Operation Capability Requirements.mp4 8.75Мб
058 - Virtual Private Cloud (VPC) Overview.mp4 259.61Мб
059 - Activity Handling Authentication and Authorization Defects.mp4 180.28Мб
059 - Continuous Monitoring Process.mp4 6.38Мб
059 - Continuous Security Monitoring.mp4 26.41Мб
059 - Creating a VPC Lab.mp4 270.15Мб
059 - Map Events to Source Technologies.mp4 3.01Мб
060 - Configuring DHCP Options Lab.mp4 105.53Мб
060 - Insider Threats.mp4 5.12Мб
060 - ISCM Fundamentals.mp4 3.84Мб
060 - Limit Access with User Accounts.mp4 266.40Мб
060 - TCB.mp4 17.68Мб
060 - True or False.mp4 3.43Мб
061 - Computer Components.mp4 62.16Мб
061 - Elastic IP Addresses (EIPs).mp4 172.90Мб
061 - Impact Flags with the Firepower Management Center (FMC).mp4 2.98Мб
061 - Log Management.mp4 4.89Мб
061 - Protect Data with Cryptography.mp4 133.13Мб
061 - Role of Automation in ISCM.mp4 12.31Мб
062 - Activity Having Fun with Symmetric Encryption.mp4 138.27Мб
062 - CAP Exam Details.mp4 2.37Мб
062 - Cybercrime and APTs.mp4 18.85Мб
062 - Elastic Network Interfaces (ENIs).mp4 129.38Мб
062 - Interpret Basic Regular Expressions.mp4 12.00Мб
062 - Protection Mechanisms.mp4 67.60Мб
063 - Activity Having Fun with Asymmetric Encryption.mp4 119.13Мб
063 - CAP Exam Study Tips.mp4 4.74Мб
063 - Common Architecture Flaws.mp4 86.93Мб
063 - Continuity and Recovery Solutions Design.mp4 9.81Мб
063 - Endpoints.mp4 180.59Мб
063 - NIST.SP800-61 r2.mp4 14.60Мб
064 - Apply the incident handling process (such as NIST.SP800-61) to an event.mp4 12.84Мб
064 - Continuity Planning.mp4 10.83Мб
064 - Extend Cryptosystems with PKI.mp4 204.27Мб
064 - Taking the CAP Exam.mp4 5.96Мб
064 - VPC Peering.mp4 205.64Мб
064 - Web-Based Vulnerabilities.mp4 69.51Мб
065 - BCP and DRP.mp4 4.45Мб
065 - Covert Channels.mp4 48.60Мб
065 - Creating a VPC Peering Connection Lab.mp4 249.24Мб
065 - CSIRT.mp4 5.28Мб
065 - Extend Cryptosystems with PKI, Part 2.mp4 134.51Мб
066 - Activity Protecting Data in Transit and at Rest.mp4 113.05Мб
066 - Business Impact Assessment and Analysis.mp4 13.63Мб
066 - Embedded Systems.mp4 47.89Мб
066 - Network Profiling.mp4 20.25Мб
066 - Security Groups Overview.mp4 173.18Мб
067 - Continuity Strategy.mp4 3.77Мб
067 - Implement Error Handling and Logging.mp4 270.49Мб
067 - Network Address Translation (NAT).mp4 277.86Мб
067 - Server Profiling.mp4 10.82Мб
068 - Activity Reviewing Error Handling.mp4 55.48Мб
068 - Facility Design.mp4 63.75Мб
068 - Gateways (VPGs and CGWs).mp4 211.29Мб
068 - PCI.mp4 6.53Мб
068 - Recovery and Restoration.mp4 10.93Мб
069 - Activity Improving Error Handling.mp4 99.15Мб
069 - Facility Construction.mp4 36.23Мб
069 - HIPAA.mp4 5.38Мб
069 - Recovery Plan and Strategy Development.mp4 7.26Мб
069 - VPN Configuration Options.mp4 107.08Мб
070 - Data and Software Backup.mp4 1.94Мб
070 - EC2 Overview.mp4 294.54Мб
070 - Physical Security.mp4 112.92Мб
070 - Protect Sensitive Data and Functions, Part 1.mp4 239.21Мб
070 - SOX.mp4 3.93Мб
071 - BCP and DRP structures and documentation.mp4 3.15Мб
071 - EC2 Instance Types.mp4 285.01Мб
071 - Perimeter Defenses.mp4 100.98Мб
071 - Protect Sensitive Data and Functions, Part 2.mp4 137.16Мб
071 - PSI.mp4 6.47Мб
072 - Doors and Locks.mp4 70.68Мб
072 - EC2 Pricing.mp4 350.11Мб
072 - Intellectual Property.mp4 11.08Мб
072 - Preparing Chrome to Tamper with a Website.mp4 56.28Мб
072 - SecOps Concepts.mp4 2.11Мб
073 - Activity Tampering with Website Data and Functions.mp4 154.42Мб
073 - Cyber Kill Chain Model.mp4 10.09Мб
073 - EBS and EC2.mp4 143.51Мб
073 - Internal Facilities Security.mp4 117.72Мб
073 - Physical Security Considerations.mp4 10.86Мб
074 - Data Normalization.mp4 4.07Мб
074 - Facility Requirements.mp4 7.37Мб
074 - Launching an EC2 Linux Instance Lab.mp4 295.96Мб
074 - Physical Intrusion Detection.mp4 107.72Мб
074 - Protect Database Access.mp4 295.34Мб
075 - Activity SQL Injection.mp4 210.17Мб
075 - Configuring an EC2 Linux Instance Lab.mp4 219.31Мб
075 - Interpret Common Data Values.mp4 4.80Мб
075 - Personnel Safety.mp4 33.40Мб
075 - Physical Security Threats and Access Controls.mp4 15.85Мб
076 - 5-tuple.mp4 5.79Мб
076 - Activity SQL Injection, Part 2.mp4 114.92Мб
076 - Environmental Controls.mp4 3.75Мб
076 - Setting up an EC2 Windows Instance Lab.mp4 314.34Мб
077 - Data Center Security.mp4 50.26Мб
077 - Media and Equipment Considerations.mp4 5.83Мб
077 - Perform Security Testing.mp4 313.13Мб
077 - Retrospective Analysis.mp4 4.06Мб
077 - Shared Tenancy.mp4 133.80Мб
078 - Analyze Code to Find Security Problems.mp4 104.90Мб
078 - Dedicated Hosts.mp4 206.71Мб
078 - Media Storage.mp4 33.24Мб
078 - Physical Security Program Components.mp4 22.30Мб
078 - Threat Analysis.mp4 9.12Мб
079 - Activity Performing Code Analysis.mp4 86.42Мб
079 - Correlation Rules.mp4 8.54Мб
079 - Dedicated Instances.mp4 410.93Мб
079 - Incident Management Capabilities.mp4 16.34Мб
079 - Utilities and HVAC.mp4 95.57Мб
080 - AMI Virtualization.mp4 318.39Мб
080 - Compare rule-based detection vs. behavioral and statistical detection.mp4 26.28Мб
080 - Fire Safety.mp4 86.40Мб
080 - Secure Communications and Networks.mp4 12.65Мб
080 - Use Automated Testing Tools to Find Security Problems.mp4 107.06Мб
081 - Activity Using a Test Suite to Automate Unit Testing.mp4 52.99Мб
081 - Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control).mp4 8.99Мб
081 - Instance Management.mp4 245.30Мб
082 - Connecting to Instances Lab.mp4 224.27Мб
082 - Database Architectures.mp4 38.18Мб
082 - Monitor and Log Applications to Support Security.mp4 250.87Мб
083 - Activity Monitoring and Logging a Deployed Application.mp4 85.67Мб
083 - Database Terminology.mp4 72.21Мб
083 - Working with Security Groups.mp4 263.19Мб
084 - Data Mining.mp4 33.14Мб
084 - Maintain Security After Deployment.mp4 249.23Мб
084 - Working with Security Groups Lab.mp4 257.20Мб
085 - Activity Analyzing Suspicious Binaries.mp4 140.14Мб
085 - Advanced EC2 Management.mp4 153.09Мб
085 - Transaction Management.mp4 45.60Мб
086 - AWS Batch.mp4 152.62Мб
086 - Course Summary.mp4 17.52Мб
086 - Database Attacks.mp4 65.35Мб
087 - Elastic Container Service (ECS).mp4 221.60Мб
088 - Elastic Beanstalk Environment.mp4 290.06Мб
088 - OSI Protocols.mp4 70.69Мб
089 - Identity and Access Management (IAM) Overview.mp4 189.78Мб
090 - OSI Layers.mp4 88.81Мб
090 - Principles.mp4 267.15Мб
091 - Root User.mp4 163.97Мб
092 - Authentication.mp4 164.54Мб
092 - TCPIP Model.mp4 45.84Мб
093 - Authorization Policies.mp4 328.78Мб
093 - Network Devices.mp4 96.51Мб
094 - Multi-Factor Authentication.mp4 204.78Мб
094 - Network Security.mp4 49.75Мб
095 - IP Networking.mp4 116.81Мб
095 - Key Rotation.mp4 250.64Мб
096 - Multiple Permissions.mp4 164.74Мб
097 - AWS Compliance Program.mp4 179.95Мб
097 - DNS and DHCP.mp4 79.52Мб
098 - ARP.mp4 32.60Мб
098 - AWS Security Hub.mp4 150.41Мб
099 - Multi-layer Protocols.mp4 44.73Мб
099 - Shared Responsibility Model.mp4 163.88Мб
100 - Converged Protocols.mp4 91.03Мб
100 - User Accounts.mp4 275.05Мб
101 - Network Cabling and Topology.mp4 120.43Мб
101 - Password Policies.mp4 237.56Мб
102 - Credential Rotation.mp4 149.70Мб
102 - Signaling Types.mp4 40.90Мб
103 - Network Attacks.mp4 100.89Мб
103 - Principle of Least Privilege.mp4 131.72Мб
104 - IAM Roles.mp4 214.80Мб
104 - Switching.mp4 17.10Мб
105 - Policy Conditions.mp4 206.67Мб
106 - CloudTrail.mp4 307.67Мб
106 - Wireless Networks.mp4 105.04Мб
107 - Auto Scaling Overview.mp4 158.14Мб
107 - Mobile Systems.mp4 92.38Мб
108 - Auto Scaling Groups.mp4 108.70Мб
108 - WAN Technologies.mp4 74.67Мб
109 - Remote Access.mp4 61.03Мб
109 - Termination Policies.mp4 175.06Мб
110 - Auto Scaling Configuration Lab.mp4 330.23Мб
110 - Secure Communication Protocols.mp4 81.76Мб
111 - Launch Methods.mp4 109.44Мб
112 - Firewalls.mp4 74.75Мб
112 - Load Balancer Concepts.mp4 215.85Мб
113 - DMZ.mp4 80.99Мб
113 - Elastic Load Balancing (ELB).mp4 251.51Мб
114 - DNS.mp4 376.07Мб
114 - Honeypots.mp4 42.44Мб
115 - Configuring DNS Lab.mp4 346.52Мб
115 - Endpoint Security.mp4 24.66Мб
116 - Configuring Route 53 Lab.mp4 335.08Мб
116 - IDS.mp4 67.72Мб
117 - Authentication Protocols.mp4 29.86Мб
117 - Configuring ACLs and NACLs Lab.mp4 244.77Мб
118 - Flow Logs.mp4 182.69Мб
119 - Application and Deployment Services.mp4 116.15Мб
119 - VPN and VLAN.mp4 61.47Мб
120 - Lambda.mp4 169.51Мб
121 - APO Gateway.mp4 234.75Мб
121 - Distributed and Cloud Computing.mp4 60.19Мб
122 - Kinesis.mp4 148.16Мб
122 - Virtualization.mp4 76.57Мб
123 - Kinesis Data Streams and Firehose.mp4 139.26Мб
123 - Virtualized Networks.mp4 52.07Мб
124 - Kinesis Data Analytics.mp4 105.32Мб
125 - Access Control Basics.mp4 59.03Мб
125 - Reference Architectures.mp4 145.68Мб
126 - Access Control Categories.mp4 74.25Мб
126 - CloudFront.mp4 251.75Мб
127 - Authentication.mp4 106.09Мб
127 - Web Application Firewall (WAF).mp4 242.41Мб
128 - Simple Queue Service (SQS).mp4 251.79Мб
129 - Account Management.mp4 52.85Мб
129 - Simple Notification Service (SNS).mp4 203.21Мб
130 - Simple Workflow (SWF).mp4 180.80Мб
130 - Single Sign-On (SSO).mp4 49.41Мб
131 - Step Functions.mp4 130.83Мб
132 - Identification.mp4 23.95Мб
132 - OpsWorks.mp4 201.92Мб
133 - Cognito.mp4 97.05Мб
133 - Something You Know.mp4 54.28Мб
134 - Elastic MapReduce (EMR).mp4 142.54Мб
134 - Something You Have.mp4 76.64Мб
135 - CloudFormation.mp4 267.78Мб
135 - Something You Are (Biometrics).mp4 65.83Мб
136 - CloudFormation Properties.mp4 75.66Мб
137 - Authorization.mp4 35.04Мб
137 - CloudWatch.mp4 161.32Мб
138 - Session Management and Accountability.mp4 34.26Мб
138 - Trusted Advisor.mp4 178.82Мб
139 - Organizations.mp4 241.79Мб
139 - WLAN Authentication.mp4 92.98Мб
140 - Database Types.mp4 213.23Мб
140 - Remote Authentication Services.mp4 41.08Мб
141 - Federated Identity.mp4 51.14Мб
141 - Relational Databases.mp4 206.22Мб
142 - Database Hosting Methods.mp4 122.34Мб
142 - Integrating Identity Services.mp4 37.68Мб
143 - Access Control Models.mp4 71.03Мб
143 - High Availability Solutions.mp4 161.48Мб
144 - Access Control Techniques.mp4 48.12Мб
144 - Scalability Solutions.mp4 125.03Мб
145 - Access Control Administration.mp4 29.50Мб
145 - Database Security.mp4 210.12Мб
146 - Access Control Attacks.mp4 54.84Мб
146 - Aurora.mp4 169.11Мб
147 - Redshift.mp4 285.73Мб
147 - Social Engineering.mp4 55.65Мб
148 - Circumventing Access Controls.mp4 23.39Мб
148 - DynamoDB.mp4 256.46Мб
149 - Access Provisioning.mp4 66.36Мб
149 - DynamoDB Tables Lab.mp4 204.34Мб
150 - MySQL Lab.mp4 334.42Мб
151 - Configuration Lab.mp4 332.16Мб
151 - Security Assessment Goals.mp4 56.37Мб
152 - Backups Lab.mp4 110.18Мб
152 - Control Testing.mp4 69.54Мб
153 - Penetration Testing.mp4 72.28Мб
153 - Restore Lab.mp4 114.87Мб
154 - Security Management Processes.mp4 49.28Мб
154 - Snapshot Lab.mp4 201.41Мб
155 - Monitoring Lab.mp4 152.29Мб
156 - Computer Crime.mp4 44.58Мб
156 - Media Content Delivery.mp4 344.59Мб
157 - Desktop & Appstreaming.mp4 152.54Мб
157 - Investigations.mp4 89.93Мб
158 - ElastiCache.mp4 138.85Мб
158 - Forensics.mp4 121.28Мб
159 - Evidence.mp4 141.41Мб
159 - Security Services Lab.mp4 326.63Мб
160 - Analytics Engines.mp4 284.37Мб
161 - Development Operations (DevOps).mp4 323.03Мб
161 - Log Management.mp4 92.38Мб
162 - AWS Solutions.mp4 135.61Мб
162 - Egress Monitoring.mp4 71.73Мб
163 - AWS Transit Gateway.mp4 82.37Мб
163 - Configuration Management.mp4 54.15Мб
164 - AWS Backup.mp4 102.83Мб
164 - Operations Concepts.mp4 82.09Мб
165 - AWS Cost Explorer.mp4 106.63Мб
165 - Preventive Measures.mp4 96.89Мб
166 - The Operational Excellence Process.mp4 216.43Мб
166 - Trusted Recovery.mp4 41.96Мб
167 - Patch & Vulnerability Management.mp4 45.86Мб
167 - Widget Makers Scenario.mp4 168.90Мб
168 - Resilient Design.mp4 202.78Мб
169 - Business Continuity Planning.mp4 72.78Мб
169 - Resilient Design Scenario.mp4 113.25Мб
170 - Incident Response Plan.mp4 83.99Мб
170 - Performant Design.mp4 239.53Мб
171 - Business Impact Analysis (BIA).mp4 83.10Мб
171 - Performant Design Scenario.mp4 129.42Мб
172 - Secure Design.mp4 210.76Мб
173 - Recovery Strategy.mp4 100.81Мб
173 - Secure Design Scenario.mp4 112.10Мб
174 - Cost Optimization.mp4 179.36Мб
174 - Recovery Process.mp4 129.30Мб
175 - Cost Optimization Scenario.mp4 131.92Мб
175 - Disaster Recovery Plan (DRP) Testing.mp4 49.52Мб
176 - General Best Practices.mp4 190.46Мб
176 - RAID.mp4 42.68Мб
177 - Backups.mp4 75.91Мб
178 - Network Redundancy.mp4 48.99Мб
180 - Secure Software Design.mp4 83.81Мб
181 - Secure SDLC.mp4 66.50Мб
182 - Software Development Models.mp4 107.93Мб
183 - Maturity Models.mp4 56.79Мб
185 - Change Control.mp4 58.50Мб
186 - Software Testing.mp4 94.80Мб
187 - Software Environment.mp4 87.22Мб
188 - Object-Oriented Programming (OOP).mp4 45.58Мб
189 - Distributed Computing.mp4 38.25Мб
190 - Mobile Code.mp4 48.24Мб
191 - Acquired Software.mp4 34.24Мб
192 - Application Attacks.mp4 80.68Мб
193 - Malware.mp4 44.80Мб
CAP Supplemental Materials.pdf 133.41Кб
CCSP Supplemental Materials.pdf 132.36Кб
Common Ports.pdf 94.00Кб
CSC-210 Lab Setup Guide.docx.pdf 468.19Кб
CSC-210 Links.pdf 141.65Кб
csclab.zip 431.40Мб
Encryption.pdf 223.96Кб
Ethical Hacking-textbook-lab.pdf 5.27Мб
IPSec VPN.pdf 78.69Кб
Lab Troubleshooting.docx.pdf 2.89Мб
Notes on Access Control.pdf 173.12Кб
Notes on Biometrics.pdf 204.37Кб
Notes on IPv4-IPv6.pdf 3.13Мб
Notes on Kerberos.pdf 603.08Кб
OSI Model.pdf 100.17Кб
Privilege Escalation Project - Solutions.pdf 437.24Кб
Purple Team Privilege Escalation Project Files.zip 2.75Гб
Статистика распространения по странам
Россия (RU) 5
Малайзия (MY) 4
Китай (CN) 1
Бразилия (BR) 1
Всего 11
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент