Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
491.25Кб |
1 |
614.44Кб |
1. Overview.mp4 |
74.63Мб |
10 |
564.32Кб |
10. Baselines & Templates & Software Assurance.mp4 |
281.69Мб |
11 |
716.78Кб |
11. Integrating Enterprise Applications.mp4 |
123.60Мб |
12 |
1.27Мб |
12. Security in the Development Lifecycle.mp4 |
275.78Мб |
13 |
1.47Мб |
13. Securing Enterprise Architecture.mp4 |
295.66Мб |
14 |
1.13Мб |
14. Authentication & Authorization - Discussion.mp4 |
274.17Мб |
15 |
610.73Кб |
15. Authentication & Authorization - Scenarios.mp4 |
232.25Мб |
16 |
502.42Кб |
16. Secure Cloud & Virtualization.mp4 |
272.33Мб |
17 |
1.53Мб |
17. Cryptography & PKI.mp4 |
270.62Мб |
18 |
1.77Мб |
18. Impact of Emerging Technologies.mp4 |
317.74Мб |
19 |
268.83Кб |
19. Security Architecture - Key Points.mp4 |
161.82Мб |
2 |
255.87Кб |
2. Services - Discussion.mp4 |
291.03Мб |
20 |
353.35Кб |
20. Perform Threat Management.mp4 |
288.52Мб |
21 |
1.79Мб |
21. Indicators of Compromise & Response.mp4 |
325.51Мб |
22 |
670.83Кб |
22. Vulnerability Management Activities.mp4 |
277.97Мб |
23 |
1.48Мб |
23. Vulnerability Assessment - Methods & Tools.mp4 |
320.23Мб |
24 |
133.38Кб |
24. Analyze Vulnerabilities - Vulnerabilities.mp4 |
317.65Мб |
25 |
1.37Мб |
25. Analyze Vulnerabilities - Vulnerable Systems.mp4 |
288.18Мб |
26 |
1.49Мб |
26. Analyze Vulnerabilities - Attacks.mp4 |
316.21Мб |
27 |
785.47Кб |
27. Use Processes to Reduce Risk.mp4 |
304.51Мб |
28 |
191.53Кб |
28. Triage & Incident Response.mp4 |
285.39Мб |
29 |
1.71Мб |
29. Forensic Concepts.mp4 |
253.80Мб |
3 |
1.95Мб |
3. Segmentation - Discussion.mp4 |
254.87Мб |
30 |
346.82Кб |
30. File Carving & Binary Analysis.mp4 |
322.47Мб |
31 |
989.71Кб |
31. Analysis Tools.mp4 |
335.40Мб |
32 |
1.88Мб |
32. Live Collection Tools.mp4 |
296.29Мб |
33 |
1.48Мб |
33. Security Operations - Key Points.mp4 |
171.79Мб |
34 |
1.82Мб |
34. Managed Configurations.mp4 |
379.72Мб |
35 |
11.32Кб |
35. Deployment Scenarios.mp4 |
180.24Мб |
36 |
1.46Мб |
36. Security Considerations.mp4 |
356.73Мб |
37 |
620.42Кб |
37. Hardening Techniques.mp4 |
336.87Мб |
38 |
965.86Кб |
38. Processes.mp4 |
431.52Мб |
39 |
312.46Кб |
39. Mandatory Access Control.mp4 |
286.54Мб |
4 |
765.06Кб |
4. Services & Segmentation - Scenarios.mp4 |
303.23Мб |
40 |
1.13Мб |
40. Trustworthy Computing.mp4 |
416.82Мб |
41 |
1.93Мб |
41. Compensating Controls.mp4 |
136.84Мб |
42 |
28.68Кб |
42. Security Considerations - Embedded.mp4 |
309.87Мб |
43 |
225.31Кб |
43. Security Considerations - ICS-SCADA.mp4 |
380.37Мб |
44 |
1.83Мб |
44. Security Considerations - Protocols.mp4 |
369.45Мб |
45 |
251.95Кб |
45. Security Considerations - Sectors.mp4 |
134.40Мб |
46 |
1.67Мб |
46. Cloud Technology - Basics.mp4 |
431.40Мб |
47 |
1.38Мб |
47. Cloud Technology - Advanced.mp4 |
388.48Мб |
48 |
315.43Кб |
48. PKI - Basics.mp4 |
427.75Мб |
49 |
1.13Мб |
49. PKI - Advanced.mp4 |
361.30Мб |
5 |
1.18Мб |
5. DeperimeterizationZero Trust.mp4 |
261.69Мб |
50 |
202.74Кб |
50. Hashing & Symmetric Algorithms.mp4 |
416.76Мб |
51 |
1.14Мб |
51. Asymmetric Algorithms & Protocols.mp4 |
418.05Мб |
52 |
1.65Мб |
52. Troubleshoot Cryptography - Keys.mp4 |
196.78Мб |
53 |
343.58Кб |
53. Security Engineering & Cryptography - Key Points.mp4 |
140.16Мб |
54 |
1.42Мб |
54. Troubleshoot Cryptography - Misconfigurations.mp4 |
280.87Мб |
55 |
1.75Мб |
55. Risk Assessment.mp4 |
417.25Мб |
56 |
1.08Мб |
56. Risk Handling Techniques.mp4 |
297.81Мб |
57 |
783.64Кб |
57. Risk Types.mp4 |
273.75Мб |
58 |
1.22Мб |
58. Risk Management Life Cycle.mp4 |
278.07Мб |
59 |
879.32Кб |
59. Risk Tracking.mp4 |
346.53Мб |
6 |
1.24Мб |
6. Merging of Networks.mp4 |
251.66Мб |
60 |
1.81Мб |
60. Policies and Security Practices.mp4 |
287.99Мб |
61 |
1.76Мб |
61. Shared Responsibility Model - Cloud.mp4 |
174.82Мб |
62 |
1.05Мб |
62. Performing Vendor Assessments.mp4 |
285.06Мб |
63 |
1.18Мб |
63. Technical Considerations.mp4 |
244.58Мб |
64 |
210.63Кб |
64. Data Considerations.mp4 |
306.63Мб |
65 |
184.39Кб |
65. Regulations Accreditations & Standards.mp4 |
310.52Мб |
66 |
673.25Кб |
66. Legal Considerations.mp4 |
195.14Мб |
67 |
1.84Мб |
67. Contract and Agreement Types.mp4 |
161.34Мб |
68 |
1.16Мб |
68. Business Impact Analysis (BIA).mp4 |
252.86Мб |
69 |
1.60Мб |
69. Privacy Impact Assessment.mp4 |
115.76Мб |
7 |
1.52Мб |
7. Software-defined Networking (SDN).mp4 |
222.92Мб |
70 |
407.99Кб |
70. Disaster Recovery & Business Continuity Planning.mp4 |
174.95Мб |
71 |
243.88Кб |
71. Incident Response Plan.mp4 |
197.23Мб |
72 |
1.37Мб |
72. Testing Plans.mp4 |
311.34Мб |
73. Governance, Risk & Compliance - Key Points.mp4 |
184.19Мб |
8 |
1.63Мб |
8. Infrastructure Design - Discussion.mp4 |
290.12Мб |
9 |
285.55Кб |
9. Infrastructure Design - Scenarios.mp4 |
252.35Мб |
CASP004-ADISH.zip |
4.98Мб |
TutsNode.com.txt |
63б |