Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
001_Course Introduction.mp4 |
3.23Мб |
001 - Certified Internet of Things Security Practitioner overview.mp4 |
31.84Мб |
001 - Create Azure AD Tenant.mp4 |
7.18Мб |
001 - CyberSec First Responder Overview.mp4 |
32.18Мб |
001 - Cybersecurity Fundamentals.mp4 |
12.53Мб |
001 - General Security Principles.mp4 |
44.37Мб |
001 - Incident Response Fundamentals.mp4 |
22.91Мб |
001 - Introduction.mp4 |
2.90Мб |
001 - Introduction to CCSP.mp4 |
5.81Мб |
001 - Introduction to CISSP.mp4 |
7.09Мб |
001 - Introduction to ISSEP.mp4 |
6.79Мб |
001 - ISSAP Introduction.mp4 |
15.50Мб |
001 - ISSAP Introduction.mp4 |
15.50Мб |
001 - Leadership and Business Management.mp4 |
3.72Мб |
001 - Network Components - Routers, Switches, Firewalls.mp4 |
45.80Мб |
001 - Network Topologies.mp4 |
40.80Мб |
001 - Roles and Responsibilities.mp4 |
94.59Мб |
001 - Security Objectives.mp4 |
4.82Мб |
001 - So You Wanna be an AWS Rock Star.mp4 |
78.81Мб |
001 - The CIA Triad.mp4 |
123.72Мб |
001 - Welcome to the Cisco Certified CyberOps Associate path!.mp4 |
24.11Мб |
001 - What is Training and Awareness.mp4 |
68.93Мб |
002_Introduction to Blockchain.mp4 |
26.57Мб |
002 - Business Continuity and Disaster Recovery Roles.mp4 |
11.82Мб |
002 - CAP Basis and Foundations.mp4 |
1.55Мб |
002 - C-I-A.mp4 |
123.72Мб |
002 - Cloud Computing Concepts.mp4 |
23.75Мб |
002 - Cybersecurity Fundamentals.mp4 |
12.53Мб |
002 - General Security Principles.mp4 |
44.37Мб |
002 - Identify the Importance of Risk Management.mp4 |
114.74Мб |
002 - Introduction to Cisco Certified CyberOps Associate.mp4 |
2.21Мб |
002 - ISSAP Layout and Testing.mp4 |
10.84Мб |
002 - ISSAP Layout and Testing.mp4 |
10.84Мб |
002 - Map the IoT attack surface.mp4 |
196.49Мб |
002 - Move subscription to another directory.mp4 |
9.56Мб |
002 - Network Components 1 - Routers Switches, Firewalls.mp4 |
45.80Мб |
002 - Network Components - APs, Controllers, Endpoints.mp4 |
17.51Мб |
002 - Regulatory Compliance.mp4 |
115.54Мб |
002 - Risk Management Principles.mp4 |
15.17Мб |
002 - Risk Management - Terms and Definitions.mp4 |
5.38Мб |
002 - Security Compliance Managment Program.mp4 |
87.65Мб |
002 - Security Role.mp4 |
33.27Мб |
002 - What's in a Name.mp4 |
45.27Мб |
003_Structure of the Blockchain.mp4 |
17.80Мб |
003 - Architect for GRC - Introduction.mp4 |
25.15Мб |
003 - Assess Risk.mp4 |
320.06Мб |
003 - Build in security by design.mp4 |
116.09Мб |
003 - Deployment Models.mp4 |
20.14Мб |
003 - Governance Principles.mp4 |
14.32Мб |
003 - Incident Identification.mp4 |
17.45Мб |
003 - Kali Install.mp4 |
20.39Мб |
003 - Network Topologies.mp4 |
40.80Мб |
003 - People, Process, Technology and the NIST Framework.mp4 |
98.72Мб |
003 - Ready, Set, Go.mp4 |
28.04Мб |
003 - Risk Assessment Process.mp4 |
30.40Мб |
003 - Risk Management Overview.mp4 |
2.61Мб |
003 - Risk Management Principles.mp4 |
15.17Мб |
003 - Risk Management Process.mp4 |
72.05Мб |
003 - Security Documents.mp4 |
41.83Мб |
003 - Security Governance Fundamentals.mp4 |
80.30Мб |
003 - Security Program and Governance.mp4 |
30.85Мб |
003 - Service principals and app registration.mp4 |
13.60Мб |
003 - Systems Development Lifecycle.mp4 |
53.69Мб |
003 - VLAN Fundamentals and Configuration.mp4 |
137.24Мб |
004_Public-Key Cryptography in Blockchain.mp4 |
18.40Мб |
004 - Basic Security Terminology and Concepts.mp4 |
127.21Мб |
004 - CAP Domain 1 Introduction.mp4 |
1.43Мб |
004 - Configuring identity protection.mp4 |
20.88Мб |
004 - Control Frameworks.mp4 |
28.99Мб |
004 - Exploring the Management Console.mp4 |
37.38Мб |
004 - Identification Tools and Techniques.mp4 |
13.32Мб |
004 - Identify threats to IoT web and cloud interfaces.mp4 |
187.48Мб |
004 - Information Security Strategy.mp4 |
34.57Мб |
004 - Layer 2 Discovery Protocols.mp4 |
33.06Мб |
004 - Mitigate Risk.mp4 |
183.60Мб |
004 - Network Fundamentals.mp4 |
24.05Мб |
004 - Operational Risk Management.mp4 |
57.86Мб |
004 - Physical Cabling.mp4 |
37.64Мб |
004 - Principles of Secure Cloud Computing.mp4 |
54.98Мб |
004 - Risk Definitions.mp4 |
65.97Мб |
004 - RMF Objectives and Tasks.mp4 |
12.69Мб |
004 - SDLC Wrap-up.mp4 |
47.88Мб |
004 - Standards and Guidelines.mp4 |
20.19Мб |
004 - Standards and Guidelines.mp4 |
20.19Мб |
004 - System Resilience Principles.mp4 |
21.04Мб |
005_Blockchain Security Public-Key Cryptography.mp4 |
21.96Мб |
005 - Basic Risk Terminology.mp4 |
61.37Мб |
005 - Cloud Terms you MUST Know.mp4 |
292.87Мб |
005 - Creating an S3 Bucket.mp4 |
88.66Мб |
005 - Cyber Security Framework (CSF) Amplification Framework.mp4 |
31.95Мб |
005 - Defining the Information Systems.mp4 |
7.28Мб |
005 - Design the Threat Handling and Risk Management Capabilities - Introduction.mp4 |
10.01Мб |
005 - Enterprise System Security Framework 1.mp4 |
16.56Мб |
005 - Integrate Documentation into Risk Management.mp4 |
163.05Мб |
005 - Introduction.mp4 |
23.71Мб |
005 - Layer 1 - Troubleshooting.mp4 |
51.49Мб |
005 - Network Protocols - ICMP.mp4 |
8.36Мб |
005 - Prevent injection flaws.mp4 |
248.94Мб |
005 - Reading A Routing Table.mp4 |
32.94Мб |
005 - Regulatory Compliance.mp4 |
115.54Мб |
005 - Resource locks.mp4 |
22.52Мб |
005 - Risk Assessment.mp4 |
104.79Мб |
005 - Security Architecture Modeling.mp4 |
8.33Мб |
005 - Security Objectives.mp4 |
4.82Мб |
005 - Stakeholder Requirements Definition.mp4 |
29.75Мб |
005 - Threats and Threat Agents.mp4 |
65.98Мб |
005 - Vulnerability Management Principles.mp4 |
25.64Мб |
005 - What, Who, When, Where.mp4 |
11.49Мб |
006_Hash Functions in Blockchain.mp4 |
30.15Мб |
006 - Azure AD authentication methods and user authentication options.mp4 |
25.32Мб |
006 - Categorization Documents.mp4 |
4.68Мб |
006 - Classification.mp4 |
77.82Мб |
006 - Classify Threats and Threat Profiles.mp4 |
107.36Мб |
006 - Creating an EC2 Instance.mp4 |
86.58Мб |
006 - Data Classification and Categorization.mp4 |
21.42Мб |
006 - Enterprise System Security Framework 2.mp4 |
27.95Мб |
006 - Essential Laws and Documents.mp4 |
6.93Мб |
006 - Identify Security Requirements and Expectations.mp4 |
309.53Мб |
006 - Investigation Data Sources.mp4 |
14.68Мб |
006 - IPv4 and IPv6 Static Routing.mp4 |
60.47Мб |
006 - Layer 2 - Concepts.mp4 |
60.21Мб |
006 - Network Protocols - ARP.mp4 |
5.62Мб |
006 - Prevent session management flaws.mp4 |
139.20Мб |
006 - Protecting Privacy.mp4 |
116.62Мб |
006 - Regulatory Compliance.mp4 |
26.45Мб |
006 - Requirements Analysis.mp4 |
13.48Мб |
006 - Risk Assessment Process.mp4 |
30.40Мб |
006 - Risk Management Process.mp4 |
72.05Мб |
006 - Security Risk Analysis.mp4 |
103.87Мб |
006 - Terminology Law, Regulation, Policy, Standard, Guideline.mp4 |
40.83Мб |
006 - Verify and Validate Design.mp4 |
41.20Мб |
007_Blockchain Security Hash Functions.mp4 |
8.03Мб |
007 - Activation and configuration of Privileged Identity Management (PIM).mp4 |
56.14Мб |
007 - Activity - Identifying Security Requirements and Expectations.mp4 |
129.38Мб |
007 - Attacks and Social Engineering Terminology.mp4 |
93.26Мб |
007 - AWS Databases.mp4 |
85.70Мб |
007 - Control Selection Objectives and Tasks.mp4 |
2.12Мб |
007 - Data Lifecycle.mp4 |
41.77Мб |
007 - Data Security Controls.mp4 |
70.13Мб |
007 - Enterprise System Security Framework 3.mp4 |
11.54Мб |
007 - FTP and TFTP.mp4 |
21.41Мб |
007 - Incident Management.mp4 |
96.64Мб |
007 - Infrastructure Security Architecture.mp4 |
7.54Мб |
007 - Intellectual Property.mp4 |
71.69Мб |
007 - Layer 3 - IPv4 Concepts and Configuration.mp4 |
47.06Мб |
007 - Network Protocols - DHCP.mp4 |
9.90Мб |
007 - Operational Risk Management.mp4 |
57.86Мб |
007 - Perform Ongoing Threat Research.mp4 |
165.76Мб |
007 - Prevent cross-site scripting flaws.mp4 |
76.59Мб |
007 - Secure Operations.mp4 |
57.13Мб |
007 - Security Architecture Modeling - Introduction.mp4 |
8.33Мб |
007 - Security Authorization Process.mp4 |
5.13Мб |
007 - What is Eradication.mp4 |
16.88Мб |
008_Course Recap.mp4 |
3.52Мб |
008 - Cleanup and Verification.mp4 |
7.93Мб |
008 - Cloud Computing Concepts.mp4 |
23.75Мб |
008 - Communication and Network Security Overview.mp4 |
3.64Мб |
008 - Configure Source NAT.mp4 |
64.35Мб |
008 - Create a virtual network and filter network traffic.mp4 |
68.09Мб |
008 - Cryptography Terminology.mp4 |
84.82Мб |
008 - Data Destruction and Disposal.mp4 |
11.93Мб |
008 - Digital Forensics.mp4 |
83.86Мб |
008 - Enterprise Architectures - Overview.mp4 |
1.12Мб |
008 - Identify Factors that Undermine Software Security.mp4 |
219.73Мб |
008 - Implementation Objectives and Tasks.mp4 |
2.12Мб |
008 - Implement Threat Modeling.mp4 |
64.34Мб |
008 - Import-Export.mp4 |
39.39Мб |
008 - Layer 3 - IPv6 Addresses and Configuration.mp4 |
71.05Мб |
008 - Managing Third-Party Relationships.mp4 |
31.67Мб |
008 - Network Protocols - DNS.mp4 |
5.31Мб |
008 - Other Cool Services.mp4 |
92.44Мб |
008 - Prevent cross-site request forgery flaws.mp4 |
64.57Мб |
008 - Risk Management - Terms and Definitions.mp4 |
5.38Мб |
008 - Secure Maintenance.mp4 |
25.75Мб |
008 - Stakeholder Requirements Definition.mp4 |
29.75Мб |
009_Introduction to Blockchain Consensus Algorithms.mp4 |
25.91Мб |
009 - Acquisition Process.mp4 |
32.52Мб |
009 - Assess the Impact of Reconnaissance.mp4 |
105.18Мб |
009 - Cloud Reference Architecture.mp4 |
368.13Мб |
009 - Cloud Storage Architectures.mp4 |
37.06Мб |
009 - Concept of Business Continuity Planning.mp4 |
121.69Мб |
009 - Crypto Solutions.mp4 |
27.19Мб |
009 - Current State of Training and Awareness and Employee Engagement.mp4 |
106.83Мб |
009 - Defining Key Security Concepts.mp4 |
24.30Мб |
009 - Deploy, configure, and test an Azure firewall.mp4 |
34.26Мб |
009 - DNS, SMTPPOP3IMAP.mp4 |
6.94Мб |
009 - Enterprise Architectures - SABSA.mp4 |
10.24Мб |
009 - Ethics.mp4 |
35.16Мб |
009 - Hashing.mp4 |
74.11Мб |
009 - IAM... What.mp4 |
52.87Мб |
009 - Identify Factors that Undermine Software Security, Part 2.mp4 |
93.34Мб |
009 - Layer 4 - Comparing TCP and UDP.mp4 |
34.00Мб |
009 - Organization of Controls.mp4 |
13.51Мб |
009 - Prevent unvalidated redirects and forwards.mp4 |
73.22Мб |
009 - Requirements Analysis.mp4 |
13.48Мб |
009 - Returning to Normal Business Processes.mp4 |
6.75Мб |
009 - Risk Management - Risk Definition and Types.mp4 |
9.56Мб |
009 - Security Awareness.mp4 |
20.05Мб |
010_Proof of Work.mp4 |
17.50Мб |
010 - AAA.mp4 |
60.66Мб |
010 - Assess the Impact of Social Engineering.mp4 |
88.83Мб |
010 - AWS Costs.mp4 |
44.05Мб |
010 - Azure types of VPNs and ExpressRoute.mp4 |
59.26Мб |
010 - BCP Project Planning.mp4 |
80.80Мб |
010 - Bias, Distraction, Apathy and Fatigue.mp4 |
130.22Мб |
010 - Cloud Security Strategies.mp4 |
52.35Мб |
010 - Control Assurance and Documentation.mp4 |
3.88Мб |
010 - Cryptographic Attacks.mp4 |
63.86Мб |
010 - Deployment Models.mp4 |
20.14Мб |
010 - Enterprise Architectures - TOGAF.mp4 |
4.50Мб |
010 - Find Vulnerabilities in Your Software.mp4 |
265.17Мб |
010 - IAM Architecture.mp4 |
27.19Мб |
010 - Identifying Threats and Vulnerabilities.mp4 |
21.74Мб |
010 - Network Devices.mp4 |
8.71Мб |
010 - Risk Management Overview.mp4 |
2.61Мб |
010 - Security Metrics.mp4 |
14.38Мб |
010 - System Development Methodologies.mp4 |
7.72Мб |
010 - System Security Architecture and Design.mp4 |
23.70Мб |
010 - Use cryptography appropriately.mp4 |
293.15Мб |
010 - Wireless Principles.mp4 |
40.42Мб |
011_Attacking Proof of Work.mp4 |
27.78Мб |
011 - Access Control Protocols and SSO.mp4 |
11.49Мб |
011 - Activity - Identifying Vulnerabilities in an Application.mp4 |
120.29Мб |
011 - Assess the Impact of System Hacking Attacks.mp4 |
129.84Мб |
011 - Automating Network Management.mp4 |
34.35Мб |
011 - AWS Documentation.mp4 |
44.18Мб |
011 - Cloud Secure Software Development Lifecycle.mp4 |
22.32Мб |
011 - Conducting Security Control Assessment.mp4 |
7.60Мб |
011 - Deploy WAF and Front Door Service.mp4 |
41.48Мб |
011 - Enterprise Architectures - SOMF.mp4 |
6.33Мб |
011 - Ethics.mp4 |
44.00Мб |
011 - Firewalls.mp4 |
5.19Мб |
011 - Implementation, Integration, and Deployment of Systems or System Modifications.mp4 |
11.70Мб |
011 - IR Asset Inventory and Identification.mp4 |
13.92Мб |
011 - PKI Definition and Components.mp4 |
78.02Мб |
011 - Protect data in motion.mp4 |
352.80Мб |
011 - Risk Definitions.mp4 |
65.97Мб |
011 - Security Aspects of Virtualization.mp4 |
46.00Мб |
011 - Security Budget.mp4 |
21.79Мб |
011 - System Boundaries and Control Allocation.mp4 |
5.31Мб |
011 - Virtualization Fundamentals.mp4 |
29.03Мб |
012_Proof of Stake.mp4 |
21.21Мб |
012 - Application Architecture Elements of Cloud Services.mp4 |
15.28Мб |
012 - Assess the Impact of Web-Based Attacks.mp4 |
112.51Мб |
012 - Authorization Objective and Tasks.mp4 |
3.49Мб |
012 - AWS Certification Path.mp4 |
62.72Мб |
012 - Building and Breaking Passwords.mp4 |
183.00Мб |
012 - Deploy Azure Bastion.mp4 |
27.83Мб |
012 - Human Attention Spans, the Hook and Storytelling.mp4 |
81.63Мб |
012 - Industrial Control Systems (ICS).mp4 |
16.12Мб |
012 - IPS and AMP.mp4 |
17.77Мб |
012 - Network Architecture.mp4 |
9.26Мб |
012 - Other Compliance Considerations.mp4 |
102.48Мб |
012 - Principles of Secure Cloud Computing.mp4 |
54.98Мб |
012 - Protect data at rest.mp4 |
125.08Мб |
012 - Risk Frameworks.mp4 |
51.63Мб |
012 - SDLC Integration.mp4 |
10.43Мб |
012 - Security Models Part 1.mp4 |
67.94Мб |
012 - Security Programs.mp4 |
24.65Мб |
012 - Verification and Validation of Systems or System Modifications.mp4 |
20.95Мб |
012 - VLAN Fundamentals and Configuration.mp4 |
37.13Мб |
013_Attacking Proof of Stake.mp4 |
47.14Мб |
013 - Activity - Adding a Security Feature to Your Code.mp4 |
75.62Мб |
013 - Architecture for Application Security.mp4 |
12.55Мб |
013 - Assess the Impact of Malware.mp4 |
87.86Мб |
013 - Authorization Roles and Responsibilities.mp4 |
20.74Мб |
013 - DDoS protection & endpoint protection in Azure.mp4 |
83.51Мб |
013 - Design Requirements.mp4 |
54.80Мб |
013 - dot1Q Fundamentals and Configuration.mp4 |
48.98Мб |
013 - Email and Web Security.mp4 |
2.24Мб |
013 - Federal Enterprise Architecture Reference Models.mp4 |
5.69Мб |
013 - Introduction to Marketing, Personas and the Sales Funnel.mp4 |
249.37Мб |
013 - Making Security Authorization Decisions.mp4 |
6.96Мб |
013 - Physical Logical Operations.mp4 |
24.41Мб |
013 - Project Management.mp4 |
17.98Мб |
013 - Protect data in use.mp4 |
131.82Мб |
013 - Risk Assessment.mp4 |
144.08Мб |
013 - Secure Operations.mp4 |
57.13Мб |
013 - Security Models Part 2.mp4 |
84.49Мб |
013 - What is AWS.mp4 |
64.60Мб |
014_Nodes and Network.mp4 |
24.78Мб |
014 - Activity - Protect Against a Poison Null Byte.mp4 |
95.55Мб |
014 - Application Testing.mp4 |
28.02Мб |
014 - Assess the Impact of Hijacking and Impersonation Attacks.mp4 |
60.28Мб |
014 - Cloud Model Boundaries.mp4 |
23.24Мб |
014 - Continuous Monitoring Tasks and Objectives.mp4 |
4.20Мб |
014 - Deploy, configure, and secure Azure Container Registry and Azure Kubernetes Service.mp4 |
65.34Мб |
014 - Identify the need to protect IoT resources.mp4 |
102.37Мб |
014 - Inline Traffic Interrogation, Taps and NetFlow.mp4 |
2.86Мб |
014 - Layer 2 Discovery Protocols.mp4 |
33.06Мб |
014 - Managing Risks.mp4 |
34.93Мб |
014 - RMF Objectives and Tasks.mp4 |
12.69Мб |
014 - Secure Maintenance.mp4 |
25.75Мб |
014 - Security Models Part 3.mp4 |
70.57Мб |
014 - Systems Life Cycle Management Introduction.mp4 |
3.04Мб |
014 - Tactics, Marketing Automation and Integrated Campaigns.mp4 |
150.86Мб |
014 - Threats and Threat Agents.mp4 |
65.98Мб |
014 - Verify and validate design.mp4 |
41.20Мб |
014 - Why use AWS.mp4 |
70.13Мб |
015_Attacking Block Creation.mp4 |
35.45Мб |
015 - Activity - Hashing a Password.mp4 |
60.51Мб |
015 - Assess the Impact of DoS Incidents.mp4 |
55.99Мб |
015 - Azure Monitor.mp4 |
117.60Мб |
015 - Computer Components.mp4 |
62.16Мб |
015 - Continuous Monitoring Process.mp4 |
6.38Мб |
015 - Defense in Depth Strategy.mp4 |
7.59Мб |
015 - How to Get Started with AWS.mp4 |
102.73Мб |
015 - Implement secure authentication.mp4 |
409.55Мб |
015 - Infrastructure Security Architecture - Introduction.mp4 |
7.54Мб |
015 - Legal Concepts.mp4 |
38.00Мб |
015 - Manage Integration of Security into SDLC - Part 1.mp4 |
2.58Мб |
015 - Privacy Requirements and Hosted Systems.mp4 |
5.39Мб |
015 - Protecting Sensitive Information.mp4 |
67.53Мб |
015 - Risk Assignment.mp4 |
60.41Мб |
015 - RPVST+ Part 1.mp4 |
52.60Мб |
015 - Secure Disposal.mp4 |
15.05Мб |
015 - Security Operations Architecture.mp4 |
16.55Мб |
016_Targeting the Node.mp4 |
31.39Мб |
016 - Acquisition Process.mp4 |
32.52Мб |
016 - Activity - Securing the Password Hash.mp4 |
60.02Мб |
016 - Assess the Impact of Threats to Mobile Security.mp4 |
56.48Мб |
016 - Assurance Frameworks and Certification.mp4 |
19.12Мб |
016 - AWS Certifications.mp4 |
101.45Мб |
016 - Branding and Positioning.mp4 |
73.07Мб |
016 - Communications and Network Security - Overview.mp4 |
3.64Мб |
016 - Cybercrime and APTs.mp4 |
18.85Мб |
016 - Deploy and configure Azure Monitor.mp4 |
115.51Мб |
016 - Describe the CIA Triad.mp4 |
10.01Мб |
016 - Federal Laws.mp4 |
13.33Мб |
016 - Implement secure authorization.mp4 |
144.05Мб |
016 - Malware.mp4 |
44.80Мб |
016 - Manage Integration of Security into SDLC - Part 2.mp4 |
17.82Мб |
016 - RPVST+ Part 2.mp4 |
40.17Мб |
016 - Threat Modeling.mp4 |
45.17Мб |
016 - Threat Modeling.mp4 |
38.65Мб |
017_Attacking the Network.mp4 |
25.92Мб |
017 - Activity - Saving Hashes for Future Use.mp4 |
58.59Мб |
017 - Assess the Impact of Threats to Cloud Security.mp4 |
32.84Мб |
017 - Azure Security Center.mp4 |
161.03Мб |
017 - Cloud Terms You MUST Know.mp4 |
272.90Мб |
017 - Design, Imagery and Logos.mp4 |
229.83Мб |
017 - EtherChannels Concepts and Configuration.mp4 |
47.36Мб |
017 - Executive Orders and OMB Documents.mp4 |
12.63Мб |
017 - Implement security monitoring on IoT systems.mp4 |
141.80Мб |
017 - LAN Protocols.mp4 |
5.24Мб |
017 - Manage Integration of Security into SDLC - Part 3.mp4 |
22.70Мб |
017 - Preparation Resources.mp4 |
142.11Мб |
017 - SecOps.mp4 |
2.11Мб |
017 - Security Awareness.mp4 |
64.51Мб |
017 - System Development Methodologies.mp4 |
7.72Мб |
017 - Vulnerabilities.mp4 |
16.00Мб |
017 - Web-based Vulnerabilities.mp4 |
69.51Мб |
018_What are Smart Contracts.mp4 |
17.62Мб |
018 - Activity - Validating a Password.mp4 |
54.83Мб |
018 - Assess Command and Control Techniques.mp4 |
76.70Мб |
018 - Benefits of Certification.mp4 |
63.23Мб |
018 - Data Classification and Categorization.mp4 |
21.42Мб |
018 - Deploy and configure Azure Security Center.mp4 |
64.17Мб |
018 - Due Diligence and Due Care.mp4 |
52.88Мб |
018 - Ensure the security of IP networks.mp4 |
438.99Мб |
018 - Exploits.mp4 |
13.50Мб |
018 - Manage Integration of Security into SDLC - Part 4.mp4 |
20.62Мб |
018 - Network Topologies.mp4 |
9.40Мб |
018 - NIST Documents - FIPS.mp4 |
7.28Мб |
018 - Physical Security.mp4 |
112.92Мб |
018 - Technical Management Processes.mp4 |
64.92Мб |
018 - Wireless Architectures and AP Modes.mp4 |
35.60Мб |
019_General Programming Vulnerabilities.mp4 |
31.12Мб |
019 - Activity - Having Fun With a Modern Hashing Algorithm.mp4 |
66.10Мб |
019 - Assess Persistence Techniques.mp4 |
69.11Мб |
019 - AWS CSA-A Overview.mp4 |
118.20Мб |
019 - Azure Sentinel.mp4 |
124.77Мб |
019 - Data Lifecycle.mp4 |
41.77Мб |
019 - Designing and Planning a Program.mp4 |
32.24Мб |
019 - Ensure the security of wireless networks.mp4 |
177.27Мб |
019 - Manage Integration of Security into SDLC - Part 5.mp4 |
10.89Мб |
019 - NIST Documents - Special Publications.mp4 |
31.23Мб |
019 - Physical WLAN Connection and Management.mp4 |
29.91Мб |
019 - Risks.mp4 |
2.03Мб |
019 - Utilities and HVAC.mp4 |
95.57Мб |
019 - Vendor Security.mp4 |
64.89Мб |
019 - WANs.mp4 |
7.93Мб |
020_Blockchain Vulnerabilities.mp4 |
58.11Мб |
020 - Assess Lateral Movement and Pivoting Techniques.mp4 |
119.39Мб |
020 - CNSS.mp4 |
3.11Мб |
020 - Common Services Security.mp4 |
13.93Мб |
020 - Configuring a WLAN in a WLC.mp4 |
38.80Мб |
020 - Database Architectures.mp4 |
38.18Мб |
020 - Deploy and configure Azure Sentinel.mp4 |
231.34Мб |
020 - Ensure the security of mobile networks.mp4 |
207.04Мб |
020 - Gather Intelligence on Vulnerabilities and Exploits.mp4 |
93.59Мб |
020 - Information Rights Management (IRM) Digital Rights Management (DRM) Solutions.mp4 |
46.92Мб |
020 - Learning Science, Fogg and Gardner.mp4 |
139.43Мб |
020 - Manage Integration of Security into SDLC - Part 6.mp4 |
7.71Мб |
020 - Security Terms.mp4 |
7.53Мб |
020 - What's New on the 2020 Updated Exam.mp4 |
87.90Мб |
021_Ethereum Vulnerabilities.mp4 |
53.16Мб |
021 - Assess Data Exfiltration Techniques.mp4 |
37.93Мб |
021 - AWS CSA-A Exam Objectives.mp4 |
158.30Мб |
021 - Azure Storage.mp4 |
127.11Мб |
021 - Database Terminology.mp4 |
72.21Мб |
021 - Data Retention.mp4 |
14.56Мб |
021 - Ensure the security of IoT edge networks.mp4 |
217.27Мб |
021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration.mp4 |
338.57Мб |
021 - LAN Technologies.mp4 |
5.05Мб |
021 - Manage Integration of Security into SDLC - Part 7.mp4 |
15.35Мб |
021 - Policy.mp4 |
48.76Мб |
021 - Reading a Routing Table.mp4 |
32.94Мб |
021 - Right Message, Right Person, Right Time.mp4 |
174.21Мб |
021 - Supplemental Regulations.mp4 |
3.33Мб |
021 - Threat Hunting.mp4 |
8.68Мб |
022_Alternative Distributed Ledger Architectures.mp4 |
34.88Мб |
022 - Assess Anti-Forensic Techniques.mp4 |
85.33Мб |
022 - CAP Domain 2 Introduction.mp4 |
3.48Мб |
022 - Data Audits.mp4 |
27.04Мб |
022 - Deploy, configure, and secure Azure Storage.mp4 |
182.14Мб |
022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2.mp4 |
271.75Мб |
022 - Improve data collection to reduce privacy concerns.mp4 |
280.46Мб |
022 - Launching Phishing and Training, Reporting.mp4 |
184.05Мб |
022 - Manage Integration of Security into SDLC - Part 8.mp4 |
28.65Мб |
022 - Network Cabling and Topology.mp4 |
120.43Мб |
022 - Personnel Security.mp4 |
82.05Мб |
022 - Routing Decisions and Route Attributes.mp4 |
29.64Мб |
022 - The Four Key Areas (Compute, Networking, Storage, and Databases).mp4 |
95.04Мб |
022 - Wireless Technologies.mp4 |
7.79Мб |
022 - Zero Trust.mp4 |
19.86Мб |
023_Second-Layer Protocols.mp4 |
11.09Мб |
023 - Azure SQL Database.mp4 |
92.45Мб |
023 - Carrot vs Stick, Repeat Offenders.mp4 |
86.75Мб |
023 - Control Frameworks.mp4 |
77.60Мб |
023 - Data DestructionDisposal.mp4 |
11.93Мб |
023 - Defining the Information Systems.mp4 |
7.28Мб |
023 - Evaluate New Business Initiatives, Integrate Initiatives into Security Architecture.mp4 |
12.18Мб |
023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3.mp4 |
192.69Мб |
023 - Implement a Vulnerability Management Plan.mp4 |
107.48Мб |
023 - IPv4 and IPv6 Static Routing.mp4 |
60.47Мб |
023 - Master the Knowledge Areas.mp4 |
51.67Мб |
023 - OSI Protocols.mp4 |
70.69Мб |
023 - Protect sensitive data.mp4 |
181.92Мб |
023 - Threat Intelligence Platform (TIP).mp4 |
16.38Мб |
023 - VoIP, Email, and Remote Access Protocols.mp4 |
7.34Мб |
024_Advanced Cryptography in Blockchain.mp4 |
40.48Мб |
024 - Activity Examining the Web App Functionality.mp4 |
200.06Мб |
024 - Assess Common Vulnerabilities.mp4 |
101.78Мб |
024 - Authentication, Authorization, Accounting.mp4 |
112.93Мб |
024 - Cloud Storage Architectures.mp4 |
37.06Мб |
024 - Deploy, configure, and secure Azure SQL Database.mp4 |
91.25Мб |
024 - Dispose of sensitive data.mp4 |
111.96Мб |
024 - OSI Layers.mp4 |
88.81Мб |
024 - OSI Reference Model - Introduction.mp4 |
15.04Мб |
024 - OSPFv2 Part 1.mp4 |
51.95Мб |
024 - SLAs.mp4 |
27.56Мб |
024 - System Security Plan.mp4 |
4.14Мб |
024 - Use the System.mp4 |
125.37Мб |
024 - Vulnerability Management, Penetration Testing, Threat Assessment and Modeling - Part 1.mp4 |
45.67Мб |
025 - Access Control Models.mp4 |
2.46Мб |
025 - Activity Examining the Project Files for Security Concerns.mp4 |
225.42Мб |
025 - Azure Key Vault.mp4 |
129.86Мб |
025 - Categorization Documents.mp4 |
4.68Мб |
025 - Cloud Security Strategies.mp4 |
52.35Мб |
025 - Conduct Vulnerability Scans.mp4 |
43.81Мб |
025 - Manage general software risks.mp4 |
267.26Мб |
025 - OSI Layers.mp4 |
31.84Мб |
025 - OSPFv2 Part 2.mp4 |
40.75Мб |
025 - Security Documents.mp4 |
41.83Мб |
025 - Take Notes.mp4 |
74.48Мб |
025 - Vulnerability Management, Penetration Testing, Threat Assessment and Modeling - Part 2.mp4 |
35.50Мб |
025 - Wireless Networks.mp4 |
105.04Мб |
026 - Be Mentally and Physically Prepared.mp4 |
100.22Мб |
026 - Cloud Platform Risks and Responsibilities.mp4 |
54.09Мб |
026 - Conduct Penetration Tests on Network Assets.mp4 |
158.45Мб |
026 - Deploy, configure, and secure Azure Key Vault.mp4 |
72.00Мб |
026 - FHRP.mp4 |
32.48Мб |
026 - Handle Error Messaging.mp4 |
266.41Мб |
026 - Identifying the Information Types.mp4 |
4.56Мб |
026 - Manage risks related to software installation and configuration.mp4 |
92.91Мб |
026 - Network Devices.mp4 |
96.51Мб |
026 - Networking Devices and Firewalls.mp4 |
10.40Мб |
026 - RuleTime-based Access Control.mp4 |
7.76Мб |
026 - Vulnerability Management, Penetration Testing, Threat Assessment and Modeling - Part 3.mp4 |
12.20Мб |
027 - Activity Identifying Software Defects and Misconfiguration.mp4 |
136.18Мб |
027 - Change Control.mp4 |
26.25Мб |
027 - Configuring Source NAT.mp4 |
64.35Мб |
027 - Determining the Impact Level.mp4 |
7.17Мб |
027 - Disaster Recovery and Business Continuity Management.mp4 |
52.06Мб |
027 - Follow Up on Penetration Testing.mp4 |
51.86Мб |
027 - Manage risks related to software patches and updates.mp4 |
109.06Мб |
027 - Managing Data.mp4 |
100.95Мб |
027 - Security Management.mp4 |
4.40Мб |
027 - Take the Exam.mp4 |
100.65Мб |
027 - VPN and Secure Protocols.mp4 |
9.69Мб |
027 - VPN and VLAN.mp4 |
61.47Мб |
028 - Access Control Basics.mp4 |
59.03Мб |
028 - Categorization Examples and Exercises.mp4 |
4.63Мб |
028 - Cloud Computing Defined.mp4 |
214.84Мб |
028 - Cloud Secure Software Development Lifecycle.mp4 |
22.32Мб |
028 - Configuring NTP.mp4 |
59.00Мб |
028 - Data Ownership.mp4 |
26.41Мб |
028 - Deploy a Security Intelligence Collection and Analysis Platform.mp4 |
180.00Мб |
028 - Encryption and Hashing.mp4 |
5.56Мб |
028 - Handle Vulnerabilities Due to Human Factors.mp4 |
263.53Мб |
028 - Manage risks related to IoT device operating systems and firmware.mp4 |
143.47Мб |
028 - Monitoring, Detection and Response.mp4 |
14.93Мб |
028 - Risk Management Introduction.mp4 |
2.50Мб |
029 - Authentication.mp4 |
106.09Мб |
029 - Benefits of Cloud Computing.mp4 |
250.78Мб |
029 - Categorization of National Security Systems.mp4 |
2.98Мб |
029 - Collect Data from Network-Based Intelligence Sources.mp4 |
95.01Мб |
029 - Data Security Controls.mp4 |
70.13Мб |
029 - Design Integrated Cryptographic Solutions.mp4 |
27.19Мб |
029 - DHCP and DNS Fundamentals.mp4 |
31.35Мб |
029 - Handle Vulnerabilities Due to Human Factors, Part 2.mp4 |
119.52Мб |
029 - PKI.mp4 |
23.70Мб |
029 - Protect local memory and storage.mp4 |
89.39Мб |
029 - Risk Management Program.mp4 |
49.17Мб |
029 - Software Security Testing.mp4 |
24.31Мб |
030 - Activity Managing People Risks.mp4 |
145.00Мб |
030 - Application Architecture Elements of Cloud Services.mp4 |
15.28Мб |
030 - Architecting PKI.mp4 |
19.40Мб |
030 - CAP Domain 3 Introduction.mp4 |
2.33Мб |
030 - Cloud Computing Models.mp4 |
173.11Мб |
030 - Collect Data from Host-Based Intelligence Sources.mp4 |
101.57Мб |
030 - Conduct Risk Assessments.mp4 |
36.47Мб |
030 - Configuring DHCP.mp4 |
42.18Мб |
030 - Data Remanence.mp4 |
57.99Мб |
030 - Microsoft Windows Introduction.mp4 |
15.46Мб |
030 - Prevent physical port access.mp4 |
64.06Мб |
030 - Single Sign-On (SSO).mp4 |
49.41Мб |
031 - Access Control Models.mp4 |
71.03Мб |
031 - Auditing in the Cloud.mp4 |
14.25Мб |
031 - Control Selection Objectives and Tasks.mp4 |
6.69Мб |
031 - Course summary.mp4 |
17.29Мб |
031 - Data at Rest.mp4 |
89.29Мб |
031 - Handle Vulnerabilities Due to Process Shortcomings.mp4 |
251.26Мб |
031 - History.mp4 |
182.49Мб |
031 - IAM Architecture - Introduction.mp4 |
6.47Мб |
031 - Microsoft Windows Terms.mp4 |
24.00Мб |
031 - Risk Assessment Process.mp4 |
51.31Мб |
031 - SNMP and Syslogging.mp4 |
41.35Мб |
031 - Use Common Tools to Analyze Logs.mp4 |
101.73Мб |
032 - Access Control Concepts.mp4 |
3.30Мб |
032 - Control Testing.mp4 |
69.54Мб |
032 - Data in Transit.mp4 |
66.77Мб |
032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2.mp4 |
116.87Мб |
032 - Linux Introduction.mp4 |
4.74Мб |
032 - Physical Logical Operations.mp4 |
24.41Мб |
032 - Platform.mp4 |
149.74Мб |
032 - QoS.mp4 |
41.17Мб |
032 - Tailoring of Controls.mp4 |
7.34Мб |
032 - Threat Intelligence and Incident Management Introduction.mp4 |
2.52Мб |
032 - Use SIEM Tools for Analysis.mp4 |
53.37Мб |
033 - Access Control Services.mp4 |
25.17Мб |
033 - Classification.mp4 |
77.82Мб |
033 - Forensics.mp4 |
121.28Мб |
033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3.mp4 |
224.13Мб |
033 - Linux Terms.mp4 |
22.20Мб |
033 - Monitoring, Capacity and Maintenance.mp4 |
34.81Мб |
033 - Monitoring Strategy and Security Plan Approval.mp4 |
2.06Мб |
033 - Parsing Log Data with Regular Expressions.mp4 |
100.68Мб |
033 - Services, Part 1.mp4 |
260.09Мб |
033 - SSH.mp4 |
37.94Мб |
033 - Threat Intelligence.mp4 |
22.40Мб |
034 - Access Control Techniques and Technologies.mp4 |
9.49Мб |
034 - Activity Managing Software Development Process Risks.mp4 |
84.11Мб |
034 - Analyze Incidents with Windows-Based Tools.mp4 |
176.69Мб |
034 - Change and Configuration Management.mp4 |
29.83Мб |
034 - Endpoint Protection.mp4 |
5.13Мб |
034 - FTP and TFTP.mp4 |
21.41Мб |
034 - Incident Response and Management - Part 1.mp4 |
26.85Мб |
034 - Preventative Measures.mp4 |
96.89Мб |
034 - Services, Part 2.mp4 |
201.87Мб |
034 - Step One - Prepare.mp4 |
11.71Мб |
035 - Analyze Incidents with Linux-Based Tools.mp4 |
56.77Мб |
035 - Apply General Principles for Secure Design.mp4 |
191.76Мб |
035 - Business Continuity Planning.mp4 |
72.78Мб |
035 - Cryptography Terminology.mp4 |
84.82Мб |
035 - Defining Key Security Concepts.mp4 |
24.30Мб |
035 - Identity Management.mp4 |
10.26Мб |
035 - Incident Response and Management - Part 2.mp4 |
23.87Мб |
035 - Managing Risks.mp4 |
34.93Мб |
035 - Security and Compliance.mp4 |
177.22Мб |
035 - Step Two - Conduct the Assessment.mp4 |
15.97Мб |
035 - Whitelisting and Blacklisting.mp4 |
3.89Мб |
036 - Access Control Protocols and SSO.mp4 |
11.49Мб |
036 - Analyze Malware.mp4 |
102.44Мб |
036 - Apply General Principles for Secure Design, Part 2.mp4 |
121.82Мб |
036 - Backups.mp4 |
75.91Мб |
036 - Elements of a Security Program.mp4 |
29.11Мб |
036 - Hashing.mp4 |
74.11Мб |
036 - Incident Response and Management - Part 3.mp4 |
41.47Мб |
036 - Regions and Availability.mp4 |
167.72Мб |
036 - Security Training and Awareness.mp4 |
30.60Мб |
036 - Step Three - Report and Communicate.mp4 |
602.25Кб |
036 - Systems-Based Sandboxing.mp4 |
7.37Мб |
037 - AAA.mp4 |
60.66Мб |
037 - Analyze Indicators or Compromise.mp4 |
176.83Мб |
037 - Contingency Management Introduction.mp4 |
2.55Мб |
037 - Cryptographic Attacks.mp4 |
63.86Мб |
037 - Kerberos and SESAME.mp4 |
17.13Мб |
037 - Legal Concepts.mp4 |
38.00Мб |
037 - Secure Software Design.mp4 |
83.81Мб |
037 - Step Four - Maintain.mp4 |
3.32Мб |
037 - Storage Services.mp4 |
172.59Мб |
037 - System Logs.mp4 |
9.07Мб |
037 - Use Secure Design Patterns.mp4 |
272.14Мб |
038 - Activity Avoiding Common Security Design Flaws.mp4 |
39.30Мб |
038 - CAP Domain 4 Introduction.mp4 |
1.75Мб |
038 - Deploy an Incident Handling and Response Architecture.mp4 |
223.32Мб |
038 - EAP, SAML, OAuth.mp4 |
6.26Мб |
038 - Intellectual Property.mp4 |
16.64Мб |
038 - Network Logging.mp4 |
19.51Мб |
038 - Oversee Continuity Planning Development - Part 1.mp4 |
44.99Мб |
038 - S2S and RA VPN.mp4 |
48.63Мб |
038 - S3 Storage Class.mp4 |
194.63Мб |
038 - Secure SDLC.mp4 |
66.50Мб |
038 - Symmetric Cryptography.mp4 |
67.95Мб |
039 - Access Control Models and Governance.mp4 |
15.41Мб |
039 - ACLs.mp4 |
88.26Мб |
039 - Application Attacks.mp4 |
80.68Мб |
039 - Asymmetric Cryptography.mp4 |
74.74Мб |
039 - Contain and Mitigate Incidents.mp4 |
146.64Мб |
039 - Contract and Service-Level Agreements (SLAs).mp4 |
17.85Мб |
039 - Design Software to Counter Specific Threats.mp4 |
311.84Мб |
039 - Implementation Objective and Tasks.mp4 |
2.12Мб |
039 - Oversee Continuity Planning Development - Part 2.mp4 |
15.33Мб |
039 - Packet Captures.mp4 |
20.21Мб |
039 - S3 Terminology.mp4 |
248.84Мб |
040 - Access Control Categories and Methods.mp4 |
21.99Мб |
040 - Assurance Frameworks and Certification.mp4 |
19.12Мб |
040 - Design Software to Counter Specific Threats, Part 2.mp4 |
400.77Мб |
040 - Hybrid Cryptography.mp4 |
41.54Мб |
040 - Layer 2 Security.mp4 |
100.28Мб |
040 - NetFlow.mp4 |
6.81Мб |
040 - Organization of Controls.mp4 |
13.51Мб |
040 - Oversee Continuity Planning Development - Part 3.mp4 |
49.94Мб |
040 - Prepare for Forensic Investigation as a CSIRT.mp4 |
29.18Мб |
040 - S3 Advanced Features.mp4 |
206.29Мб |
041 - Activity Identifying Threats and Countermeasures.mp4 |
70.82Мб |
041 - Application Visibility and Control (AVC).mp4 |
2.76Мб |
041 - Apply a Forensic Investigation Plan.mp4 |
69.20Мб |
041 - Authorization Process and Types.mp4 |
12.79Мб |
041 - Compensating Controls.mp4 |
3.96Мб |
041 - Creating S3 Buckets Lab.mp4 |
177.42Мб |
041 - CSA Security, Trust and Assurance Registry.mp4 |
14.13Мб |
041 - Recovery Strategies.mp4 |
28.02Мб |
041 - Wireless Security.mp4 |
32.03Мб |
042 - Automating Network Management.mp4 |
34.35Мб |
042 - Ciphers.mp4 |
28.87Мб |
042 - Control Assurance and Documentation.mp4 |
3.88Мб |
042 - Follow Best Practices for Secure Coding.mp4 |
289.66Мб |
042 - Maintaining Plans.mp4 |
27.89Мб |
042 - Monitoring Challenges.mp4 |
7.34Мб |
042 - Privilege Access Management.mp4 |
8.59Мб |
042 - S3 Bucket Properties.mp4 |
200.13Мб |
042 - Securely Collect and Analyze Electronic Evidence.mp4 |
50.88Мб |
042 - Test Essential Knowledge Areas.mp4 |
32.67Мб |
043 - Access Control Practices.mp4 |
15.48Мб |
043 - Activity Researching Secure Coding Best Practices.mp4 |
190.55Мб |
043 - Controller Based and SDN Architectures.mp4 |
18.17Мб |
043 - Defense in Depth.mp4 |
2.64Мб |
043 - Digital Signatures.mp4 |
81.06Мб |
043 - Follow Up on the Results of an Investigation.mp4 |
39.04Мб |
043 - Manage Recovery.mp4 |
7.88Мб |
043 - NextGen IPS Event Types.mp4 |
3.66Мб |
043 - S3 Managing Objects Lab.mp4 |
263.73Мб |
043 - The Test.mp4 |
9.29Мб |
044 - Access Control Protocols.mp4 |
12.30Мб |
044 - Attack Surface Analysis.mp4 |
7.49Мб |
044 - Course Review and Exam Preview.mp4 |
45.48Мб |
044 - Glacier.mp4 |
191.76Мб |
044 - Law, Ethics and Security Compliance Management Introduction.mp4 |
1.23Мб |
044 - Prevent Memory Errors.mp4 |
193.04Мб |
044 - REST APIs.mp4 |
33.29Мб |
044 - Types of Controls.mp4 |
25.74Мб |
045 - CAP Domain 5 Introduction.mp4 |
1.26Мб |
045 - Configuration Management Systems.mp4 |
40.77Мб |
045 - Legal Parameters - Part 1.mp4 |
27.27Мб |
045 - Network Attacks.mp4 |
12.68Мб |
045 - PKI Definition and Components.mp4 |
78.02Мб |
045 - Prevent Memory Errors, Part 2.mp4 |
165.84Мб |
045 - Setting up a Glacier Vault Lab.mp4 |
202.24Мб |
045 - Testing of Access Controls.mp4 |
18.19Мб |
046 - Legal Parameters - Part 2.mp4 |
42.84Мб |
046 - Maintain Secure Formatting and Resource Access.mp4 |
250.61Мб |
046 - Network Access Control.mp4 |
9.26Мб |
046 - PKI Certificates.mp4 |
32.19Мб |
046 - Preparing for Security Control Assessment (SCA).mp4 |
10.35Мб |
046 - S3 and Tape Gateway.mp4 |
152.11Мб |
046 - Web Application Attacks.mp4 |
5.66Мб |
047 - Activity Preventing a Race Condition.mp4 |
57.66Мб |
047 - Architect for Application Security - Introduction.mp4 |
12.55Мб |
047 - Conducting Security Control Assessment (SCA).mp4 |
7.60Мб |
047 - Ethics and Management Issues.mp4 |
15.95Мб |
047 - Key Management.mp4 |
82.78Мб |
047 - S3 Enhanced Features.mp4 |
209.85Мб |
047 - Social Engineering and Phishing Attacks.mp4 |
10.62Мб |
048 - Compliance Management IAW Security Policies and Procedures - Part 1.mp4 |
4.42Мб |
048 - Elastic Block Store (EBS).mp4 |
201.44Мб |
048 - Endpoint-Based Attacks.mp4 |
12.35Мб |
048 - Key Exchange.mp4 |
70.12Мб |
048 - Preparing and Developing Security Assessment Report (SAR).mp4 |
3.05Мб |
048 - Prevent Privacy Vulnerabilities.mp4 |
334.32Мб |
048 - SDLC.mp4 |
15.74Мб |
049 - Activity Handling Privacy Defects.mp4 |
61.75Мб |
049 - CAP Domain 6 Introduction.mp4 |
991.60Кб |
049 - Compliance Management IAW Security Policies and Procedures - Part 2.mp4 |
17.98Мб |
049 - Creating EBS Volumes Lab.mp4 |
190.54Мб |
049 - Evasion Methods.mp4 |
16.92Мб |
049 - Requirements Traceability Matrix (RTM).mp4 |
3.19Мб |
050 - Application Testing.mp4 |
28.02Мб |
050 - Authorization Objective and Tasks.mp4 |
3.49Мб |
050 - Compliance Management IAW Security Policies and Procedures - Part 3.mp4 |
13.94Мб |
050 - Elastic File System (EFS).mp4 |
181.37Мб |
050 - Malware Analysis Tool Report.mp4 |
10.73Мб |
050 - Prevent Platform Vulnerabilities, Part 1.mp4 |
268.46Мб |
050 - Secure Design Principles.mp4 |
66.65Мб |
051 - Compliance Management IAW Security Policies and Procedures - Part 4.mp4 |
25.95Мб |
051 - Creating an EFS File System Lab.mp4 |
192.15Мб |
051 - Crypto Key Management.mp4 |
5.67Мб |
051 - CVSS 3.0.mp4 |
23.01Мб |
051 - Developing Plan of Action and Milestones (POAM) & assembling Security Authorization Package.mp4 |
8.23Мб |
051 - Prevent Platform Vulnerabilities, Part 2.mp4 |
343.94Мб |
051 - Security Models Part 1.mp4 |
67.94Мб |
052 - Activity Staging an XSS Attack on the Web App.mp4 |
149.35Мб |
052 - Application Threats.mp4 |
30.41Мб |
052 - Compliance Management IAW Security Policies and Procedures - Part 5.mp4 |
27.06Мб |
052 - Determining Information System Risk.mp4 |
2.30Мб |
052 - EFS and PrivateLink.mp4 |
88.31Мб |
052 - Microsoft Windows File System.mp4 |
10.06Мб |
052 - Security Models Part 2.mp4 |
84.49Мб |
053 - Application Security - Mobile, Web, Proxy and Database Use.mp4 |
15.01Мб |
053 - Coordination with Auditors.mp4 |
18.16Мб |
053 - Intro to Amazon FSx.mp4 |
158.75Мб |
053 - Linux File System.mp4 |
3.62Мб |
053 - Making Security Authorization Decision.mp4 |
6.96Мб |
053 - Prevent Mobile Platform Vulnerabilities.mp4 |
229.43Мб |
053 - Security Models Part 3.mp4 |
70.57Мб |
054 - Capability Maturity Model (CMM) and Common Criteria (CC).mp4 |
13.93Мб |
054 - CAP Domain 7 Introduction.mp4 |
1.18Мб |
054 - Evidence and Attribution.mp4 |
4.82Мб |
054 - Hands on with FSx.mp4 |
149.40Мб |
054 - Prevent Mobile Platform Vulnerabilities, Part 2.mp4 |
244.16Мб |
054 - Security Modes.mp4 |
30.90Мб |
055 - Continuous Monitoring Tasks and Objectives.mp4 |
4.20Мб |
055 - Evaluation Models.mp4 |
52.42Мб |
055 - Indicators of Attack and Compromise.mp4 |
17.21Мб |
055 - Integrating On-Premises Storage.mp4 |
179.64Мб |
055 - Off-site Data Storage and Usage.mp4 |
9.74Мб |
055 - Prevent IoT Platform Vulnerabilities.mp4 |
81.97Мб |
056 - Common Artifact Elements and Protocol Headers.mp4 |
7.75Мб |
056 - Prevent Desktop Platform Vulnerabilities.mp4 |
233.47Мб |
056 - Rainbow Series.mp4 |
27.31Мб |
056 - Storage Access Security Lab.mp4 |
261.03Мб |
056 - System Configuration Management.mp4 |
5.76Мб |
056 - Virtualization and Cloud Computing.mp4 |
34.49Мб |
057 - Common Criteria.mp4 |
54.94Мб |
057 - Limit Access Using Session Control.mp4 |
222.35Мб |
057 - Ongoing Assessments, Remediation and Risk Acceptance.mp4 |
3.60Мб |
057 - Security Analysis with Wireshark.mp4 |
6.55Мб |
057 - Security Operations Architecture - Introduction.mp4 |
16.55Мб |
057 - Storage Performance.mp4 |
216.48Мб |
058 - Certification and Accreditation.mp4 |
29.89Мб |
058 - Decommission of Information Systems.mp4 |
5.66Мб |
058 - Limit Access Using Session Control, Part 2.mp4 |
222.33Мб |
058 - NetFlow v5 and Security Events.mp4 |
682.89Кб |
058 - Security Operation Capability Requirements.mp4 |
8.75Мб |
058 - Virtual Private Cloud (VPC) Overview.mp4 |
259.61Мб |
059 - Activity Handling Authentication and Authorization Defects.mp4 |
180.28Мб |
059 - Continuous Monitoring Process.mp4 |
6.38Мб |
059 - Continuous Security Monitoring.mp4 |
26.41Мб |
059 - Creating a VPC Lab.mp4 |
270.15Мб |
059 - Map Events to Source Technologies.mp4 |
3.01Мб |
060 - Configuring DHCP Options Lab.mp4 |
105.53Мб |
060 - Insider Threats.mp4 |
5.12Мб |
060 - ISCM Fundamentals.mp4 |
3.84Мб |
060 - Limit Access with User Accounts.mp4 |
266.40Мб |
060 - TCB.mp4 |
17.68Мб |
060 - True or False.mp4 |
3.43Мб |
061 - Computer Components.mp4 |
62.16Мб |
061 - Elastic IP Addresses (EIPs).mp4 |
172.90Мб |
061 - Impact Flags with the Firepower Management Center (FMC).mp4 |
2.98Мб |
061 - Log Management.mp4 |
4.89Мб |
061 - Protect Data with Cryptography.mp4 |
133.13Мб |
061 - Role of Automation in ISCM.mp4 |
12.31Мб |
062 - Activity Having Fun with Symmetric Encryption.mp4 |
138.27Мб |
062 - CAP Exam Details.mp4 |
2.37Мб |
062 - Cybercrime and APTs.mp4 |
18.85Мб |
062 - Elastic Network Interfaces (ENIs).mp4 |
129.38Мб |
062 - Interpret Basic Regular Expressions.mp4 |
12.00Мб |
062 - Protection Mechanisms.mp4 |
67.60Мб |
063 - Activity Having Fun with Asymmetric Encryption.mp4 |
119.13Мб |
063 - CAP Exam Study Tips.mp4 |
4.74Мб |
063 - Common Architecture Flaws.mp4 |
86.93Мб |
063 - Continuity and Recovery Solutions Design.mp4 |
9.81Мб |
063 - Endpoints.mp4 |
180.59Мб |
063 - NIST.SP800-61 r2.mp4 |
14.60Мб |
064 - Apply the incident handling process (such as NIST.SP800-61) to an event.mp4 |
12.84Мб |
064 - Continuity Planning.mp4 |
10.83Мб |
064 - Extend Cryptosystems with PKI.mp4 |
204.27Мб |
064 - Taking the CAP Exam.mp4 |
5.96Мб |
064 - VPC Peering.mp4 |
205.64Мб |
064 - Web-Based Vulnerabilities.mp4 |
69.51Мб |
065 - BCP and DRP.mp4 |
4.45Мб |
065 - Covert Channels.mp4 |
48.60Мб |
065 - Creating a VPC Peering Connection Lab.mp4 |
249.24Мб |
065 - CSIRT.mp4 |
5.28Мб |
065 - Extend Cryptosystems with PKI, Part 2.mp4 |
134.51Мб |
066 - Activity Protecting Data in Transit and at Rest.mp4 |
113.05Мб |
066 - Business Impact Assessment and Analysis.mp4 |
13.63Мб |
066 - Embedded Systems.mp4 |
47.89Мб |
066 - Network Profiling.mp4 |
20.25Мб |
066 - Security Groups Overview.mp4 |
173.18Мб |
067 - Continuity Strategy.mp4 |
3.77Мб |
067 - Implement Error Handling and Logging.mp4 |
270.49Мб |
067 - Network Address Translation (NAT).mp4 |
277.86Мб |
067 - Server Profiling.mp4 |
10.82Мб |
068 - Activity Reviewing Error Handling.mp4 |
55.48Мб |
068 - Facility Design.mp4 |
63.75Мб |
068 - Gateways (VPGs and CGWs).mp4 |
211.29Мб |
068 - PCI.mp4 |
6.53Мб |
068 - Recovery and Restoration.mp4 |
10.93Мб |
069 - Activity Improving Error Handling.mp4 |
99.15Мб |
069 - Facility Construction.mp4 |
36.23Мб |
069 - HIPAA.mp4 |
5.38Мб |
069 - Recovery Plan and Strategy Development.mp4 |
7.26Мб |
069 - VPN Configuration Options.mp4 |
107.08Мб |
070 - Data and Software Backup.mp4 |
1.94Мб |
070 - EC2 Overview.mp4 |
294.54Мб |
070 - Physical Security.mp4 |
112.92Мб |
070 - Protect Sensitive Data and Functions, Part 1.mp4 |
239.21Мб |
070 - SOX.mp4 |
3.93Мб |
071 - BCP and DRP structures and documentation.mp4 |
3.15Мб |
071 - EC2 Instance Types.mp4 |
285.01Мб |
071 - Perimeter Defenses.mp4 |
100.98Мб |
071 - Protect Sensitive Data and Functions, Part 2.mp4 |
137.16Мб |
071 - PSI.mp4 |
6.47Мб |
072 - Doors and Locks.mp4 |
70.68Мб |
072 - EC2 Pricing.mp4 |
350.11Мб |
072 - Intellectual Property.mp4 |
11.08Мб |
072 - Preparing Chrome to Tamper with a Website.mp4 |
56.28Мб |
072 - SecOps Concepts.mp4 |
2.11Мб |
073 - Activity Tampering with Website Data and Functions.mp4 |
154.42Мб |
073 - Cyber Kill Chain Model.mp4 |
10.09Мб |
073 - EBS and EC2.mp4 |
143.51Мб |
073 - Internal Facilities Security.mp4 |
117.72Мб |
073 - Physical Security Considerations.mp4 |
10.86Мб |
074 - Data Normalization.mp4 |
4.07Мб |
074 - Facility Requirements.mp4 |
7.37Мб |
074 - Launching an EC2 Linux Instance Lab.mp4 |
295.96Мб |
074 - Physical Intrusion Detection.mp4 |
107.72Мб |
074 - Protect Database Access.mp4 |
295.34Мб |
075 - Activity SQL Injection.mp4 |
210.17Мб |
075 - Configuring an EC2 Linux Instance Lab.mp4 |
219.31Мб |
075 - Interpret Common Data Values.mp4 |
4.80Мб |
075 - Personnel Safety.mp4 |
33.40Мб |
075 - Physical Security Threats and Access Controls.mp4 |
15.85Мб |
076 - 5-tuple.mp4 |
5.79Мб |
076 - Activity SQL Injection, Part 2.mp4 |
114.92Мб |
076 - Environmental Controls.mp4 |
3.75Мб |
076 - Setting up an EC2 Windows Instance Lab.mp4 |
314.34Мб |
077 - Data Center Security.mp4 |
50.26Мб |
077 - Media and Equipment Considerations.mp4 |
5.83Мб |
077 - Perform Security Testing.mp4 |
313.13Мб |
077 - Retrospective Analysis.mp4 |
4.06Мб |
077 - Shared Tenancy.mp4 |
133.80Мб |
078 - Analyze Code to Find Security Problems.mp4 |
104.90Мб |
078 - Dedicated Hosts.mp4 |
206.71Мб |
078 - Media Storage.mp4 |
33.24Мб |
078 - Physical Security Program Components.mp4 |
22.30Мб |
078 - Threat Analysis.mp4 |
9.12Мб |
079 - Activity Performing Code Analysis.mp4 |
86.42Мб |
079 - Correlation Rules.mp4 |
8.54Мб |
079 - Dedicated Instances.mp4 |
410.93Мб |
079 - Incident Management Capabilities.mp4 |
16.34Мб |
079 - Utilities and HVAC.mp4 |
95.57Мб |
080 - AMI Virtualization.mp4 |
318.39Мб |
080 - Compare rule-based detection vs. behavioral and statistical detection.mp4 |
26.28Мб |
080 - Fire Safety.mp4 |
86.40Мб |
080 - Secure Communications and Networks.mp4 |
12.65Мб |
080 - Use Automated Testing Tools to Find Security Problems.mp4 |
107.06Мб |
081 - Activity Using a Test Suite to Automate Unit Testing.mp4 |
52.99Мб |
081 - Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control).mp4 |
8.99Мб |
081 - Instance Management.mp4 |
245.30Мб |
082 - Connecting to Instances Lab.mp4 |
224.27Мб |
082 - Database Architectures.mp4 |
38.18Мб |
082 - Monitor and Log Applications to Support Security.mp4 |
250.87Мб |
083 - Activity Monitoring and Logging a Deployed Application.mp4 |
85.67Мб |
083 - Database Terminology.mp4 |
72.21Мб |
083 - Working with Security Groups.mp4 |
263.19Мб |
084 - Data Mining.mp4 |
33.14Мб |
084 - Maintain Security After Deployment.mp4 |
249.23Мб |
084 - Working with Security Groups Lab.mp4 |
257.20Мб |
085 - Activity Analyzing Suspicious Binaries.mp4 |
140.14Мб |
085 - Advanced EC2 Management.mp4 |
153.09Мб |
085 - Transaction Management.mp4 |
45.60Мб |
086 - AWS Batch.mp4 |
152.62Мб |
086 - Course Summary.mp4 |
17.52Мб |
086 - Database Attacks.mp4 |
65.35Мб |
087 - Elastic Container Service (ECS).mp4 |
221.60Мб |
088 - Elastic Beanstalk Environment.mp4 |
290.06Мб |
088 - OSI Protocols.mp4 |
70.69Мб |
089 - Identity and Access Management (IAM) Overview.mp4 |
189.78Мб |
090 - OSI Layers.mp4 |
88.81Мб |
090 - Principles.mp4 |
267.15Мб |
091 - Root User.mp4 |
163.97Мб |
092 - Authentication.mp4 |
164.54Мб |
092 - TCPIP Model.mp4 |
45.84Мб |
093 - Authorization Policies.mp4 |
328.78Мб |
093 - Network Devices.mp4 |
96.51Мб |
094 - Multi-Factor Authentication.mp4 |
204.78Мб |
094 - Network Security.mp4 |
49.75Мб |
095 - IP Networking.mp4 |
116.81Мб |
095 - Key Rotation.mp4 |
250.64Мб |
096 - Multiple Permissions.mp4 |
164.74Мб |
097 - AWS Compliance Program.mp4 |
179.95Мб |
097 - DNS and DHCP.mp4 |
79.52Мб |
098 - ARP.mp4 |
32.60Мб |
098 - AWS Security Hub.mp4 |
150.41Мб |
099 - Multi-layer Protocols.mp4 |
44.73Мб |
099 - Shared Responsibility Model.mp4 |
163.88Мб |
100 - Converged Protocols.mp4 |
91.03Мб |
100 - User Accounts.mp4 |
275.05Мб |
101 - Network Cabling and Topology.mp4 |
120.43Мб |
101 - Password Policies.mp4 |
237.56Мб |
102 - Credential Rotation.mp4 |
149.70Мб |
102 - Signaling Types.mp4 |
40.90Мб |
103 - Network Attacks.mp4 |
100.89Мб |
103 - Principle of Least Privilege.mp4 |
131.72Мб |
104 - IAM Roles.mp4 |
214.80Мб |
104 - Switching.mp4 |
17.10Мб |
105 - Policy Conditions.mp4 |
206.67Мб |
106 - CloudTrail.mp4 |
307.67Мб |
106 - Wireless Networks.mp4 |
105.04Мб |
107 - Auto Scaling Overview.mp4 |
158.14Мб |
107 - Mobile Systems.mp4 |
92.38Мб |
108 - Auto Scaling Groups.mp4 |
108.70Мб |
108 - WAN Technologies.mp4 |
74.67Мб |
109 - Remote Access.mp4 |
61.03Мб |
109 - Termination Policies.mp4 |
175.06Мб |
110 - Auto Scaling Configuration Lab.mp4 |
330.23Мб |
110 - Secure Communication Protocols.mp4 |
81.76Мб |
111 - Launch Methods.mp4 |
109.44Мб |
112 - Firewalls.mp4 |
74.75Мб |
112 - Load Balancer Concepts.mp4 |
215.85Мб |
113 - DMZ.mp4 |
80.99Мб |
113 - Elastic Load Balancing (ELB).mp4 |
251.51Мб |
114 - DNS.mp4 |
376.07Мб |
114 - Honeypots.mp4 |
42.44Мб |
115 - Configuring DNS Lab.mp4 |
346.52Мб |
115 - Endpoint Security.mp4 |
24.66Мб |
116 - Configuring Route 53 Lab.mp4 |
335.08Мб |
116 - IDS.mp4 |
67.72Мб |
117 - Authentication Protocols.mp4 |
29.86Мб |
117 - Configuring ACLs and NACLs Lab.mp4 |
244.77Мб |
118 - Flow Logs.mp4 |
182.69Мб |
119 - Application and Deployment Services.mp4 |
116.15Мб |
119 - VPN and VLAN.mp4 |
61.47Мб |
120 - Lambda.mp4 |
169.51Мб |
121 - APO Gateway.mp4 |
234.75Мб |
121 - Distributed and Cloud Computing.mp4 |
60.19Мб |
122 - Kinesis.mp4 |
148.16Мб |
122 - Virtualization.mp4 |
76.57Мб |
123 - Kinesis Data Streams and Firehose.mp4 |
139.26Мб |
123 - Virtualized Networks.mp4 |
52.07Мб |
124 - Kinesis Data Analytics.mp4 |
105.32Мб |
125 - Access Control Basics.mp4 |
59.03Мб |
125 - Reference Architectures.mp4 |
145.68Мб |
126 - Access Control Categories.mp4 |
74.25Мб |
126 - CloudFront.mp4 |
251.75Мб |
127 - Authentication.mp4 |
106.09Мб |
127 - Web Application Firewall (WAF).mp4 |
242.41Мб |
128 - Simple Queue Service (SQS).mp4 |
251.79Мб |
129 - Account Management.mp4 |
52.85Мб |
129 - Simple Notification Service (SNS).mp4 |
203.21Мб |
130 - Simple Workflow (SWF).mp4 |
180.80Мб |
130 - Single Sign-On (SSO).mp4 |
49.41Мб |
131 - Step Functions.mp4 |
130.83Мб |
132 - Identification.mp4 |
23.95Мб |
132 - OpsWorks.mp4 |
201.92Мб |
133 - Cognito.mp4 |
97.05Мб |
133 - Something You Know.mp4 |
54.28Мб |
134 - Elastic MapReduce (EMR).mp4 |
142.54Мб |
134 - Something You Have.mp4 |
76.64Мб |
135 - CloudFormation.mp4 |
267.78Мб |
135 - Something You Are (Biometrics).mp4 |
65.83Мб |
136 - CloudFormation Properties.mp4 |
75.66Мб |
137 - Authorization.mp4 |
35.04Мб |
137 - CloudWatch.mp4 |
161.32Мб |
138 - Session Management and Accountability.mp4 |
34.26Мб |
138 - Trusted Advisor.mp4 |
178.82Мб |
139 - Organizations.mp4 |
241.79Мб |
139 - WLAN Authentication.mp4 |
92.98Мб |
140 - Database Types.mp4 |
213.23Мб |
140 - Remote Authentication Services.mp4 |
41.08Мб |
141 - Federated Identity.mp4 |
51.14Мб |
141 - Relational Databases.mp4 |
206.22Мб |
142 - Database Hosting Methods.mp4 |
122.34Мб |
142 - Integrating Identity Services.mp4 |
37.68Мб |
143 - Access Control Models.mp4 |
71.03Мб |
143 - High Availability Solutions.mp4 |
161.48Мб |
144 - Access Control Techniques.mp4 |
48.12Мб |
144 - Scalability Solutions.mp4 |
125.03Мб |
145 - Access Control Administration.mp4 |
29.50Мб |
145 - Database Security.mp4 |
210.12Мб |
146 - Access Control Attacks.mp4 |
54.84Мб |
146 - Aurora.mp4 |
169.11Мб |
147 - Redshift.mp4 |
285.73Мб |
147 - Social Engineering.mp4 |
55.65Мб |
148 - Circumventing Access Controls.mp4 |
23.39Мб |
148 - DynamoDB.mp4 |
256.46Мб |
149 - Access Provisioning.mp4 |
66.36Мб |
149 - DynamoDB Tables Lab.mp4 |
204.34Мб |
150 - MySQL Lab.mp4 |
334.42Мб |
151 - Configuration Lab.mp4 |
332.16Мб |
151 - Security Assessment Goals.mp4 |
56.37Мб |
152 - Backups Lab.mp4 |
110.18Мб |
152 - Control Testing.mp4 |
69.54Мб |
153 - Penetration Testing.mp4 |
72.28Мб |
153 - Restore Lab.mp4 |
114.87Мб |
154 - Security Management Processes.mp4 |
49.28Мб |
154 - Snapshot Lab.mp4 |
201.41Мб |
155 - Monitoring Lab.mp4 |
152.29Мб |
156 - Computer Crime.mp4 |
44.58Мб |
156 - Media Content Delivery.mp4 |
344.59Мб |
157 - Desktop & Appstreaming.mp4 |
152.54Мб |
157 - Investigations.mp4 |
89.93Мб |
158 - ElastiCache.mp4 |
138.85Мб |
158 - Forensics.mp4 |
121.28Мб |
159 - Evidence.mp4 |
141.41Мб |
159 - Security Services Lab.mp4 |
326.63Мб |
160 - Analytics Engines.mp4 |
284.37Мб |
161 - Development Operations (DevOps).mp4 |
323.03Мб |
161 - Log Management.mp4 |
92.38Мб |
162 - AWS Solutions.mp4 |
135.61Мб |
162 - Egress Monitoring.mp4 |
71.73Мб |
163 - AWS Transit Gateway.mp4 |
82.37Мб |
163 - Configuration Management.mp4 |
54.15Мб |
164 - AWS Backup.mp4 |
102.83Мб |
164 - Operations Concepts.mp4 |
82.09Мб |
165 - AWS Cost Explorer.mp4 |
106.63Мб |
165 - Preventive Measures.mp4 |
96.89Мб |
166 - The Operational Excellence Process.mp4 |
216.43Мб |
166 - Trusted Recovery.mp4 |
41.96Мб |
167 - Patch & Vulnerability Management.mp4 |
45.86Мб |
167 - Widget Makers Scenario.mp4 |
168.90Мб |
168 - Resilient Design.mp4 |
202.78Мб |
169 - Business Continuity Planning.mp4 |
72.78Мб |
169 - Resilient Design Scenario.mp4 |
113.25Мб |
170 - Incident Response Plan.mp4 |
83.99Мб |
170 - Performant Design.mp4 |
239.53Мб |
171 - Business Impact Analysis (BIA).mp4 |
83.10Мб |
171 - Performant Design Scenario.mp4 |
129.42Мб |
172 - Secure Design.mp4 |
210.76Мб |
173 - Recovery Strategy.mp4 |
100.81Мб |
173 - Secure Design Scenario.mp4 |
112.10Мб |
174 - Cost Optimization.mp4 |
179.36Мб |
174 - Recovery Process.mp4 |
129.30Мб |
175 - Cost Optimization Scenario.mp4 |
131.92Мб |
175 - Disaster Recovery Plan (DRP) Testing.mp4 |
49.52Мб |
176 - General Best Practices.mp4 |
190.46Мб |
176 - RAID.mp4 |
42.68Мб |
177 - Backups.mp4 |
75.91Мб |
178 - Network Redundancy.mp4 |
48.99Мб |
180 - Secure Software Design.mp4 |
83.81Мб |
181 - Secure SDLC.mp4 |
66.50Мб |
182 - Software Development Models.mp4 |
107.93Мб |
183 - Maturity Models.mp4 |
56.79Мб |
185 - Change Control.mp4 |
58.50Мб |
186 - Software Testing.mp4 |
94.80Мб |
187 - Software Environment.mp4 |
87.22Мб |
188 - Object-Oriented Programming (OOP).mp4 |
45.58Мб |
189 - Distributed Computing.mp4 |
38.25Мб |
190 - Mobile Code.mp4 |
48.24Мб |
191 - Acquired Software.mp4 |
34.24Мб |
192 - Application Attacks.mp4 |
80.68Мб |
193 - Malware.mp4 |
44.80Мб |
CAP Supplemental Materials.pdf |
133.41Кб |
CCSP Supplemental Materials.pdf |
132.36Кб |
Common Ports.pdf |
94.00Кб |
CSC-210 Lab Setup Guide.docx.pdf |
468.19Кб |
CSC-210 Links.pdf |
141.65Кб |
csclab.zip |
431.40Мб |
Encryption.pdf |
223.96Кб |
Ethical Hacking-textbook-lab.pdf |
5.27Мб |
IPSec VPN.pdf |
78.69Кб |
Lab Troubleshooting.docx.pdf |
2.89Мб |
Notes on Access Control.pdf |
173.12Кб |
Notes on Biometrics.pdf |
204.37Кб |
Notes on IPv4-IPv6.pdf |
3.13Мб |
Notes on Kerberos.pdf |
603.08Кб |
OSI Model.pdf |
100.17Кб |
Privilege Escalation Project - Solutions.pdf |
437.24Кб |
Purple Team Privilege Escalation Project Files.zip |
2.75Гб |