|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 1.1 CompTIA Security (SY0-501).pdf.pdf |
540.61Кб |
| 1. Cryptography Basics.mp4 |
260.18Мб |
| 1. Cryptography Basics.srt |
24.10Кб |
| 1. Denial of Service.mp4 |
116.11Мб |
| 1. Denial of Service.srt |
12.80Кб |
| 1. Identification.mp4 |
260.87Мб |
| 1. Identification.srt |
19.95Кб |
| 1. Incident Response.mp4 |
48.33Мб |
| 1. Incident Response.srt |
8.97Кб |
| 1. Introduction to the CompTIA Security+ Exam SY0-501.mp4 |
75.28Мб |
| 1. Introduction to the CompTIA Security+ Exam SY0-501.srt |
5.25Кб |
| 1. LAN Review.mp4 |
120.24Мб |
| 1. LAN Review.srt |
11.37Кб |
| 1. OS Utilities, Part 1.mp4 |
247.70Мб |
| 1. OS Utilities, Part 1.srt |
21.36Кб |
| 1. Secure Applications and Protocols.mp4 |
191.52Мб |
| 1. Secure Applications and Protocols.srt |
191.56Мб |
| 1. Vulnerability Scanning Tools.mp4 |
159.57Мб |
| 1. Vulnerability Scanning Tools.srt |
13.51Кб |
| 1. Wireless Review.mp4 |
172.69Мб |
| 1. Wireless Review.srt |
12.57Кб |
| 10. Code Quality and Testing.mp4 |
102.99Мб |
| 10. Code Quality and Testing.srt |
7.34Кб |
| 10. Data and System Security.mp4 |
76.59Мб |
| 10. Data and System Security.srt |
76.60Мб |
| 10. IT Security Governance.mp4 |
139.40Мб |
| 10. IT Security Governance.srt |
12.25Кб |
| 10. NIDSNIPS.mp4 |
115.03Мб |
| 10. NIDSNIPS.srt |
8.17Кб |
| 10. Single Sign-On.mp4 |
172.04Мб |
| 10. Single Sign-On.srt |
15.36Кб |
| 10. Steganography.mp4 |
78.59Мб |
| 10. Steganography.srt |
8.26Кб |
| 10. Virtual Security.mp4 |
254.76Мб |
| 10. Virtual Security.srt |
22.54Кб |
| 11. Certificates and Trust.mp4 |
278.63Мб |
| 11. Certificates and Trust.srt |
21.09Кб |
| 11. Containers.mp4 |
176.51Мб |
| 11. Containers.srt |
17.23Кб |
| 11. Disk Encryption.mp4 |
133.08Мб |
| 11. Disk Encryption.srt |
9.20Кб |
| 11. Identity and Access Management Quiz.html |
166б |
| 11. Secure Protocols Quiz.html |
166б |
| 11. Security Policies.mp4 |
174.00Мб |
| 11. Security Policies.srt |
12.26Кб |
| 11. SIEM.mp4 |
139.41Мб |
| 11. SIEM.srt |
10.96Кб |
| 12. Frameworks.mp4 |
170.87Мб |
| 12. Frameworks.srt |
12.90Кб |
| 12. HardwareFirmware Security.mp4 |
189.84Мб |
| 12. HardwareFirmware Security.srt |
13.61Кб |
| 12. IaaS.mp4 |
149.17Мб |
| 12. IaaS.srt |
13.84Кб |
| 12. Public Key Infrastructure.mp4 |
320.19Мб |
| 12. Public Key Infrastructure.srt |
32.81Кб |
| 12. The Basic LAN Quiz.html |
166б |
| 13. Cryptographic Attacks.mp4 |
416.56Мб |
| 13. Cryptographic Attacks.srt |
36.05Кб |
| 13. PaaS.mp4 |
133.48Мб |
| 13. PaaS.srt |
132.19Мб |
| 13. Quantitative Risk Calculations.mp4 |
94.82Мб |
| 13. Quantitative Risk Calculations.srt |
11.53Кб |
| 13. Secure OS Types.mp4 |
167.50Мб |
| 13. Secure OS Types.srt |
10.97Кб |
| 14. Business Impact Analysis.mp4 |
220.29Мб |
| 14. Business Impact Analysis.srt |
17.44Кб |
| 14. Cryptography Quiz.html |
166б |
| 14. SaaS.mp4 |
54.06Мб |
| 14. SaaS.srt |
3.61Кб |
| 14. Securing Peripherals.mp4 |
241.78Мб |
| 14. Securing Peripherals.srt |
16.57Кб |
| 15. Deployment Models.mp4 |
141.39Мб |
| 15. Deployment Models.srt |
20.12Мб |
| 15. Malware.mp4 |
214.64Мб |
| 15. Malware.srt |
14.35Кб |
| 15. Organizing Data.mp4 |
217.67Мб |
| 15. Organizing Data.srt |
14.20Кб |
| 16. Analyzing Output.mp4 |
297.73Мб |
| 16. Analyzing Output.srt |
22.55Кб |
| 16. Security Training.mp4 |
116.29Мб |
| 16. Security Training.srt |
14.22Кб |
| 16. Static Hosts.mp4 |
141.81Мб |
| 16. Static Hosts.srt |
141.84Мб |
| 17. IDS and IPS.mp4 |
94.64Мб |
| 17. IDS and IPS.srt |
6.04Кб |
| 17. Mobile Connectivity.mp4 |
256.07Мб |
| 17. Mobile Connectivity.srt |
16.35Кб |
| 17. Third Party Agreements.mp4 |
103.64Мб |
| 17. Third Party Agreements.srt |
11.50Кб |
| 18. Automation Strategies.mp4 |
104.43Мб |
| 18. Automation Strategies.srt |
7.10Кб |
| 18. Deploying Mobile Devices.mp4 |
78.93Мб |
| 18. Deploying Mobile Devices.srt |
7.36Кб |
| 18. Risk Management Quiz.html |
166б |
| 19. Data Destruction.mp4 |
103.84Мб |
| 19. Data Destruction.srt |
6.63Кб |
| 19. Mobile Enforcement.mp4 |
265.52Мб |
| 19. Mobile Enforcement.srt |
18.42Кб |
| 2. Authorization Concepts.mp4 |
116.48Мб |
| 2. Authorization Concepts.srt |
8.42Кб |
| 2. Cryptographic Methods.mp4 |
160.57Мб |
| 2. Cryptographic Methods.srt |
10.04Кб |
| 2. Digital Forensics.mp4 |
167.91Мб |
| 2. Digital Forensics.srt |
16.60Кб |
| 2. Host Threats.mp4 |
186.70Мб |
| 2. Host Threats.srt |
12.73Кб |
| 2. Living in Open Networks.mp4 |
175.38Мб |
| 2. Living in Open Networks.srt |
14.07Кб |
| 2. Network Models.mp4 |
147.97Мб |
| 2. Network Models.srt |
10.60Кб |
| 2. Network Topologies Review.mp4 |
62.18Мб |
| 2. Network Topologies Review.srt |
6.79Кб |
| 2. OS Utilities, Part 2.mp4 |
210.60Мб |
| 2. OS Utilities, Part 2.srt |
20.31Кб |
| 2. The CIA of Security.mp4 |
43.93Мб |
| 2. The CIA of Security.srt |
5.03Кб |
| 2. Vulnerability Scanning Assessment.mp4 |
100.51Мб |
| 2. Vulnerability Scanning Assessment.srt |
6.85Кб |
| 20. Mobile Device Management.mp4 |
125.04Мб |
| 20. Mobile Device Management.srt |
14.75Кб |
| 20. Securing Individual Systems Quiz.html |
166б |
| 21. Physical Controls.mp4 |
176.09Мб |
| 21. Physical Controls.srt |
12.45Кб |
| 22. HVAC.mp4 |
135.35Мб |
| 22. HVAC.srt |
10.30Кб |
| 23. Fire Suppression.mp4 |
72.57Мб |
| 23. Fire Suppression.srt |
5.68Кб |
| 24. Beyond the Basic LAN Quiz.html |
166б |
| 3. Access Control List.mp4 |
67.61Мб |
| 3. Access Control List.srt |
9.00Кб |
| 3. Contingency Planning.mp4 |
165.09Мб |
| 3. Contingency Planning.srt |
15.87Кб |
| 3. Know Your Protocols - TCPIP.mp4 |
131.84Мб |
| 3. Know Your Protocols - TCPIP.srt |
8.38Кб |
| 3. Man-in-the-Middle.mp4 |
410.12Мб |
| 3. Man-in-the-Middle.srt |
32.68Кб |
| 3. Network Scanners.mp4 |
164.82Мб |
| 3. Network Scanners.srt |
16.22Кб |
| 3. Network Zone Review.mp4 |
124.63Мб |
| 3. Network Zone Review.srt |
124.65Мб |
| 3. Social Engineering Principles.mp4 |
39.68Мб |
| 3. Social Engineering Principles.srt |
2.82Кб |
| 3. Symmetric Cryptosystems.mp4 |
193.38Мб |
| 3. Symmetric Cryptosystems.srt |
193.40Мб |
| 3. Vulnerabilities with Wireless Access Points.mp4 |
135.76Мб |
| 3. Vulnerabilities with Wireless Access Points.srt |
10.10Кб |
| 3. What is Risk.mp4 |
213.85Мб |
| 3. What is Risk.srt |
15.11Кб |
| 3. You Can Boost Brain Power.html |
114б |
| 4. Backups.mp4 |
91.13Мб |
| 4. Backups.srt |
11.46Кб |
| 4. Cracking 802.11 – WEP.mp4 |
217.01Мб |
| 4. Cracking 802.11 – WEP.srt |
15.17Кб |
| 4. Know Your Protocols - Applications.mp4 |
48.83Мб |
| 4. Know Your Protocols - Applications.srt |
7.45Кб |
| 4. Network Access Controls.mp4 |
159.43Мб |
| 4. Network Access Controls.srt |
14.65Кб |
| 4. Password Security.mp4 |
160.40Мб |
| 4. Password Security.srt |
13.96Кб |
| 4. Protocol Analyzers.mp4 |
185.27Мб |
| 4. Protocol Analyzers.srt |
15.44Кб |
| 4. Social Engineering Attacks.mp4 |
131.61Мб |
| 4. Social Engineering Attacks.srt |
11.09Кб |
| 4. Symmetric Block Modes.mp4 |
114.29Мб |
| 4. Symmetric Block Modes.srt |
11.04Кб |
| 4. System Resiliency.mp4 |
191.02Мб |
| 4. System Resiliency.srt |
16.75Кб |
| 4. Threat Actors.mp4 |
142.12Мб |
| 4. Threat Actors.srt |
10.01Кб |
| 5. Attacking Web Sites.mp4 |
91.15Мб |
| 5. Attacking Web Sites.srt |
11.54Кб |
| 5. Cracking 802.11 – WPA.mp4 |
185.74Мб |
| 5. Cracking 802.11 – WPA.srt |
11.24Кб |
| 5. Dealing with Incidents Quiz.html |
166б |
| 5. Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html |
84б |
| 5. Linux File Permissions.mp4 |
190.84Мб |
| 5. Linux File Permissions.srt |
21.69Кб |
| 5. Managing Risk.mp4 |
255.51Мб |
| 5. Managing Risk.srt |
17.94Кб |
| 5. RAID.mp4 |
154.52Мб |
| 5. RAID.srt |
154.55Мб |
| 5. RSA Cryptosystems.mp4 |
193.89Мб |
| 5. RSA Cryptosystems.srt |
14.47Кб |
| 5. SNMP.mp4 |
203.51Мб |
| 5. SNMP.srt |
22.10Кб |
| 5. The Network Firewall.mp4 |
190.86Мб |
| 5. The Network Firewall.srt |
18.81Кб |
| 5. Transport Layer Security (TLS).mp4 |
195.77Мб |
| 5. Transport Layer Security (TLS).srt |
195.77Мб |
| 6. Attacking Applications.mp4 |
181.96Мб |
| 6. Attacking Applications.srt |
15.20Кб |
| 6. Cracking 802.11 – WPS.mp4 |
196.32Мб |
| 6. Cracking 802.11 – WPS.srt |
13.93Кб |
| 6. Diffie-Hellman.mp4 |
97.29Мб |
| 6. Diffie-Hellman.srt |
8.95Кб |
| 6. Internet Service Hardening.mp4 |
79.02Мб |
| 6. Internet Service Hardening.srt |
9.01Кб |
| 6. Logs.mp4 |
125.72Мб |
| 6. Logs.srt |
16.47Кб |
| 6. NAS and SAN.mp4 |
265.96Мб |
| 6. NAS and SAN.srt |
22.12Кб |
| 6. Proxy Servers.mp4 |
211.77Мб |
| 6. Proxy Servers.srt |
17.71Кб |
| 6. Using Guides for Risk Assessment.mp4 |
114.52Мб |
| 6. Using Guides for Risk Assessment.srt |
9.44Кб |
| 6. Windows File Permissions.mp4 |
220.82Мб |
| 6. Windows File Permissions.srt |
20.19Кб |
| 7. Exploiting a Target.mp4 |
168.36Мб |
| 7. Exploiting a Target.srt |
15.43Кб |
| 7. Honeypots.mp4 |
81.32Мб |
| 7. Honeypots.srt |
6.11Кб |
| 7. PGPGPG.mp4 |
188.42Мб |
| 7. PGPGPG.srt |
13.53Кб |
| 7. Physical Hardening.mp4 |
138.46Мб |
| 7. Physical Hardening.srt |
10.58Кб |
| 7. Protecting Your Servers.mp4 |
86.62Мб |
| 7. Protecting Your Servers.srt |
8.62Кб |
| 7. Security Controls.mp4 |
96.83Мб |
| 7. Security Controls.srt |
10.90Кб |
| 7. Tools of the Trade Quiz.html |
166б |
| 7. User Account Management.mp4 |
143.25Мб |
| 7. User Account Management.srt |
9.80Кб |
| 7. Wireless Hardening.mp4 |
272.51Мб |
| 7. Wireless Hardening.srt |
272.54Мб |
| 8. AAA.mp4 |
170.75Мб |
| 8. AAA.srt |
12.00Кб |
| 8. Hashing.mp4 |
106.49Мб |
| 8. Hashing.srt |
9.99Кб |
| 8. Interesting Security Controls.mp4 |
30.96Мб |
| 8. Interesting Security Controls.srt |
4.68Кб |
| 8. RFI, EMI and ESD.mp4 |
32.97Мб |
| 8. RFI, EMI and ESD.srt |
4.16Кб |
| 8. Secure Code Development.mp4 |
182.37Мб |
| 8. Secure Code Development.srt |
15.36Кб |
| 8. Virtual Private Networks.mp4 |
179.46Мб |
| 8. Virtual Private Networks.srt |
19.72Кб |
| 8. Vulnerability Impact.mp4 |
237.32Мб |
| 8. Vulnerability Impact.srt |
15.58Кб |
| 8. Wireless Access Points.mp4 |
277.12Мб |
| 8. Wireless Access Points.srt |
18.64Кб |
| 9. Authentication Methods.mp4 |
206.27Мб |
| 9. Authentication Methods.srt |
206.27Мб |
| 9. Defense in Depth.mp4 |
97.93Мб |
| 9. Defense in Depth.srt |
7.25Кб |
| 9. HMAC.mp4 |
65.55Мб |
| 9. HMAC.srt |
4.95Кб |
| 9. Host Hardening.mp4 |
334.60Мб |
| 9. Host Hardening.srt |
24.77Кб |
| 9. IPSec.mp4 |
210.05Мб |
| 9. IPSec.srt |
16.42Кб |
| 9. Secure Deployment Concepts.mp4 |
223.45Мб |
| 9. Secure Deployment Concepts.srt |
16.89Кб |
| 9. Testing Your Infrastructure Quiz.html |
166б |
| 9. Virtualization Basics.mp4 |
139.29Мб |
| 9. Virtualization Basics.srt |
10.96Кб |
| Alfa AWUS036NHA 150Mbps Wireless USB Adaptor.html |
84б |
| Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter.html |
84б |
| Defense against the Black Arts.html |
84б |
| hackers bags.html |
84б |
| Panda Wireless PAU06 300Mbps N USB Adapter.html |
84б |
| Seagate Portable.html |
84б |