|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585б |
| 0 |
8б |
| 001 Welcome.en.srt |
12.11Кб |
| 001 Welcome.mp4 |
91.41Мб |
| 002 CompTIA-Security-601-Study-Guide.pdf |
22.89Мб |
| 002 CompTIA-Security-Study-Notes-501.pdf |
19.28Мб |
| 002 Download the Study Guide.html |
1.09Кб |
| 003 Overview of Security.en.srt |
6.80Кб |
| 003 Overview of Security.mp4 |
64.44Мб |
| 004 CIA Triad.en.srt |
8.66Кб |
| 004 CIA Triad.mp4 |
74.47Мб |
| 005 AAA of Security (OBJ 2.4).en.srt |
7.07Кб |
| 005 AAA of Security (OBJ 2.4).mp4 |
59.85Мб |
| 006 Security Threats (OBJ 1.1 & 1.2).en.srt |
6.24Кб |
| 006 Security Threats (OBJ 1.1 & 1.2).mp4 |
64.17Мб |
| 007 Mitigating Threats (OBJ 5.1).en.srt |
5.92Кб |
| 007 Mitigating Threats (OBJ 5.1).mp4 |
56.32Мб |
| 008 Hackers (OBJ 1.5).en.srt |
10.42Кб |
| 008 Hackers (OBJ 1.5).mp4 |
104.89Мб |
| 009 Threat Actors (1.5).en.srt |
6.80Кб |
| 009 Threat Actors (1.5).mp4 |
68.27Мб |
| 010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt |
20.59Кб |
| 010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 |
58.00Мб |
| 011 __ Threat Hunting (OBJ 1.7).en.srt |
16.03Кб |
| 011 __ Threat Hunting (OBJ 1.7).mp4 |
42.98Мб |
| 012 __ Attack Frameworks (OBJ 4.2).en.srt |
26.01Кб |
| 012 __ Attack Frameworks (OBJ 4.2).mp4 |
87.68Мб |
| 013 Malware (OBJ 1.2).en.srt |
1.26Кб |
| 013 Malware (OBJ 1.2).mp4 |
15.01Мб |
| 014 Viruses (OBJ 1.2).en.srt |
13.35Кб |
| 014 Viruses (OBJ 1.2).mp4 |
134.66Мб |
| 015 Worms (OBJ 1.2).en.srt |
4.41Кб |
| 015 Worms (OBJ 1.2).mp4 |
47.86Мб |
| 016 Trojans (OBJ 1.2).en.srt |
7.20Кб |
| 016 Trojans (OBJ 1.2).mp4 |
62.50Мб |
| 017 Demo_ Viruses and Trojans (OBJ 1.2).en.srt |
13.37Кб |
| 017 Demo_ Viruses and Trojans (OBJ 1.2).mp4 |
91.56Мб |
| 018 Ransomware (OBJ 1.2).en.srt |
5.21Кб |
| 018 Ransomware (OBJ 1.2).mp4 |
53.37Мб |
| 019 Spyware (OBJ 1.2).en.srt |
5.70Кб |
| 019 Spyware (OBJ 1.2).mp4 |
58.14Мб |
| 020 Rootkits (OBJ 1.2 & 1.3).en.srt |
7.20Кб |
| 020 Rootkits (OBJ 1.2 & 1.3).mp4 |
75.59Мб |
| 021 Spam (OBJ 1.1).en.srt |
6.14Кб |
| 021 Spam (OBJ 1.1).mp4 |
65.14Мб |
| 022 Summary of Malware.en.srt |
4.40Кб |
| 022 Summary of Malware.mp4 |
44.67Мб |
| 023 Malware Infections.en.srt |
8.93Кб |
| 023 Malware Infections.mp4 |
93.17Мб |
| 024 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt |
9.72Кб |
| 024 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 |
96.88Мб |
| 025 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt |
11.67Кб |
| 025 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 |
49.92Мб |
| 026 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt |
7.50Кб |
| 026 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 |
62.46Мб |
| 027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt |
5.51Кб |
| 027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 |
40.59Мб |
| 028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt |
11.88Кб |
| 028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 |
75.49Мб |
| 029 Backdoors and Logic Bombs (OBJ 1.2).en.srt |
8.30Кб |
| 029 Backdoors and Logic Bombs (OBJ 1.2).mp4 |
84.09Мб |
| 030 Symptoms of Infection (OBJ 1.2).en.srt |
9.18Кб |
| 030 Symptoms of Infection (OBJ 1.2).mp4 |
91.40Мб |
| 031 Removing Malware (OBJ 4.2).en.srt |
11.31Кб |
| 031 Removing Malware (OBJ 4.2).mp4 |
108.29Мб |
| 032 Preventing Malware (OBJ 1.6 & 3.2).en.srt |
12.80Кб |
| 032 Preventing Malware (OBJ 1.6 & 3.2).mp4 |
128.84Мб |
| 033 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt |
18.25Кб |
| 033 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 |
39.54Мб |
| 034 Security Applications and Devices.en.srt |
1.18Кб |
| 034 Security Applications and Devices.mp4 |
12.76Мб |
| 035 Software Firewalls (OBJ 3.2).en.srt |
8.57Кб |
| 035 Software Firewalls (OBJ 3.2).mp4 |
91.43Мб |
| 036 Demo_ Software Firewalls (OBJ 3.2).en.srt |
14.21Кб |
| 036 Demo_ Software Firewalls (OBJ 3.2).mp4 |
61.53Мб |
| 037 IDS (OBJ 3.2 & 3.3).en.srt |
10.78Кб |
| 037 IDS (OBJ 3.2 & 3.3).mp4 |
105.77Мб |
| 038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt |
6.95Кб |
| 038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4 |
66.62Мб |
| 039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt |
8.13Кб |
| 039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4 |
81.64Мб |
| 040 Securing the BIOS (OBJ 3.2).en.srt |
8.53Кб |
| 040 Securing the BIOS (OBJ 3.2).mp4 |
86.17Мб |
| 041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt |
7.10Кб |
| 041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4 |
73.04Мб |
| 042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt |
9.57Кб |
| 042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4 |
106.73Мб |
| 043 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt |
12.65Кб |
| 043 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4 |
52.40Мб |
| 044 Mobile Device Security (OBJ 1.5).en.srt |
2.76Кб |
| 044 Mobile Device Security (OBJ 1.5).mp4 |
28.44Мб |
| 045 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt |
2.87Кб |
| 045 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4 |
33.55Мб |
| 046 Mobile Malware (OBJ 1.1 & 3.5).en.srt |
14.02Кб |
| 046 Mobile Malware (OBJ 1.1 & 3.5).mp4 |
139.49Мб |
| 047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt |
8.69Кб |
| 047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4 |
86.69Мб |
| 048 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt |
4.36Кб |
| 048 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4 |
47.75Мб |
| 049 Mobile Device Theft (OBJ 3.5).en.srt |
6.86Кб |
| 049 Mobile Device Theft (OBJ 3.5).mp4 |
69.78Мб |
| 050 Security of Apps (OBJ 3.1 & 3.5).en.srt |
11.01Кб |
| 050 Security of Apps (OBJ 3.1 & 3.5).mp4 |
109.42Мб |
| 051 BYOD (OBJ 3.5).en.srt |
10.69Кб |
| 051 BYOD (OBJ 3.5).mp4 |
107.63Мб |
| 052 Hardening Mobile Devices (OBJ 3.5).en.srt |
7.62Кб |
| 052 Hardening Mobile Devices (OBJ 3.5).mp4 |
81.84Мб |
| 053 Hardening (OBJ 3.2).en.srt |
3.67Кб |
| 053 Hardening (OBJ 3.2).mp4 |
39.72Мб |
| 054 Unnecessary Applications (OBJ 1.6).en.srt |
6.52Кб |
| 054 Unnecessary Applications (OBJ 1.6).mp4 |
69.15Мб |
| 055 Restricting Applications (OBJ 3.2 & 4.4).en.srt |
6.31Кб |
| 055 Restricting Applications (OBJ 3.2 & 4.4).mp4 |
61.92Мб |
| 056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt |
11.27Кб |
| 056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4 |
62.36Мб |
| 057 Trusted Operating System (OBJ 3.2).en.srt |
3.94Кб |
| 057 Trusted Operating System (OBJ 3.2).mp4 |
42.64Мб |
| 058 Updates and Patches (OBJ 1.6 & 3.2).en.srt |
6.93Кб |
| 058 Updates and Patches (OBJ 1.6 & 3.2).mp4 |
74.21Мб |
| 059 Patch Management (OBJ 1.6 & 3.2).en.srt |
8.01Кб |
| 059 Patch Management (OBJ 1.6 & 3.2).mp4 |
83.43Мб |
| 060 Group Policies (OBJ 2.1).en.srt |
5.14Кб |
| 060 Group Policies (OBJ 2.1).mp4 |
56.44Мб |
| 061 Demo_ Group Policies (OBJ 3.2).en.srt |
8.28Кб |
| 061 Demo_ Group Policies (OBJ 3.2).mp4 |
30.89Мб |
| 062 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt |
6.57Кб |
| 062 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4 |
69.02Мб |
| 063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt |
13.20Кб |
| 063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4 |
42.60Мб |
| 064 __ Root of Trust (OBJ 3.2).en.srt |
10.60Кб |
| 064 __ Root of Trust (OBJ 3.2).mp4 |
31.06Мб |
| 065 __ Trusted Firmware (OBJ 3.2).en.srt |
11.59Кб |
| 065 __ Trusted Firmware (OBJ 3.2).mp4 |
33.00Мб |
| 066 __ Secure Processing (OBJ 3.2).en.srt |
8.96Кб |
| 066 __ Secure Processing (OBJ 3.2).mp4 |
24.51Мб |
| 067 Virtualization (OBJ 2.2).en.srt |
4.56Кб |
| 067 Virtualization (OBJ 2.2).mp4 |
46.65Мб |
| 068 Hypervisors (OBJ 2.2).en.srt |
5.27Кб |
| 068 Hypervisors (OBJ 2.2).mp4 |
57.45Мб |
| 069 Demo_ How to create a VM (OBJ 2.2).en.srt |
8.35Кб |
| 069 Demo_ How to create a VM (OBJ 2.2).mp4 |
38.72Мб |
| 070 Threats to VMs (OBJ 2.2).en.srt |
7.83Кб |
| 070 Threats to VMs (OBJ 2.2).mp4 |
80.93Мб |
| 071 Securing VMs (OBJ 2.2).en.srt |
8.15Кб |
| 071 Securing VMs (OBJ 2.2).mp4 |
82.44Мб |
| 072 Demo_ Securing VMs.en.srt |
9.24Кб |
| 072 Demo_ Securing VMs.mp4 |
43.11Мб |
| 073 Application Security.en.srt |
3.68Кб |
| 073 Application Security.mp4 |
38.61Мб |
| 074 Web Browser Security (OBJ 3.2 & 3.3).en.srt |
15.51Кб |
| 074 Web Browser Security (OBJ 3.2 & 3.3).mp4 |
145.13Мб |
| 075 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt |
7.37Кб |
| 075 Web Browser Concerns (OBJ 3.2 & 3.3).mp4 |
71.04Мб |
| 076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt |
11.47Кб |
| 076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4 |
46.06Мб |
| 077 Securing Applications (OBJ 1.4 & 3.2).en.srt |
10.09Кб |
| 077 Securing Applications (OBJ 1.4 & 3.2).mp4 |
101.49Мб |
| 078 Software Development (OBJ 2.1 & 2.3).en.srt |
19.35Кб |
| 078 Software Development (OBJ 2.1 & 2.3).mp4 |
188.76Мб |
| 079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt |
13.75Кб |
| 079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4 |
136.96Мб |
| 080 Testing Methods (OBJ 2.3 & 3.2).en.srt |
15.01Кб |
| 080 Testing Methods (OBJ 2.3 & 3.2).mp4 |
151.04Мб |
| 081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt |
8.06Кб |
| 081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4 |
80.73Мб |
| 082 Buffer Overflows (OBJ 1.3).en.srt |
13.56Кб |
| 082 Buffer Overflows (OBJ 1.3).mp4 |
135.64Мб |
| 083 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt |
12.61Кб |
| 083 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4 |
101.76Мб |
| 084 XSS and XSRF (OBJ 1.3).en.srt |
6.76Кб |
| 084 XSS and XSRF (OBJ 1.3).mp4 |
68.72Мб |
| 085 SQL Injection (OBJ 1.3).en.srt |
13.22Кб |
| 085 SQL Injection (OBJ 1.3).mp4 |
141.47Мб |
| 086 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt |
14.12Кб |
| 086 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4 |
74.85Мб |
| 087 __ XML Vulnerabilities (OBJ 1.3).en.srt |
11.52Кб |
| 087 __ XML Vulnerabilities (OBJ 1.3).mp4 |
49.28Мб |
| 088 __ Race Conditions (OBJ 1.3).en.srt |
13.55Кб |
| 088 __ Race Conditions (OBJ 1.3).mp4 |
34.59Мб |
| 089 __ Design Vulnerabilities (OBJ 1.3).en.srt |
9.95Кб |
| 089 __ Design Vulnerabilities (OBJ 1.3).mp4 |
26.86Мб |
| 090 Network Security.en.srt |
1.73Кб |
| 090 Network Security.mp4 |
16.60Мб |
| 091 The OSI Model (OBJ 3.3 & 3.6).en.srt |
12.99Кб |
| 091 The OSI Model (OBJ 3.3 & 3.6).mp4 |
128.51Мб |
| 092 Switches (OBJ 1.4 & 2.7).en.srt |
7.75Кб |
| 092 Switches (OBJ 1.4 & 2.7).mp4 |
77.26Мб |
| 093 Routers (OBJ 3.3).en.srt |
5.38Кб |
| 093 Routers (OBJ 3.3).mp4 |
54.31Мб |
| 094 Network Zones (OBJ 3.3).en.srt |
7.42Кб |
| 094 Network Zones (OBJ 3.3).mp4 |
69.46Мб |
| 095 __ Jumpbox (OBJ 3.5).en.srt |
13.58Кб |
| 095 __ Jumpbox (OBJ 3.5).mp4 |
35.05Мб |
| 096 Network Access Control (OBJ 3.3 & 4.4).en.srt |
6.10Кб |
| 096 Network Access Control (OBJ 3.3 & 4.4).mp4 |
56.67Мб |
| 097 VLANs (OBJ 3.3).en.srt |
3.17Кб |
| 097 VLANs (OBJ 3.3).mp4 |
33.11Мб |
| 098 Subnetting (OBJ 3.6).en.srt |
4.38Кб |
| 098 Subnetting (OBJ 3.6).mp4 |
41.36Мб |
| 099 Network Address Translation (OBJ 3.3).en.srt |
5.10Кб |
| 099 Network Address Translation (OBJ 3.3).mp4 |
52.66Мб |
| 1 |
29б |
| 10 |
1.78Мб |
| 100 |
366.29Кб |
| 100 Telephony (OBJ 3.1).en.srt |
13.76Кб |
| 100 Telephony (OBJ 3.1).mp4 |
130.69Мб |
| 101 |
667.45Кб |
| 101 Perimeter Security.en.srt |
1.83Кб |
| 101 Perimeter Security.mp4 |
17.79Мб |
| 102 |
999.90Кб |
| 102 Firewalls (OBJ 3.3 & 4.4).en.srt |
17.87Кб |
| 102 Firewalls (OBJ 3.3 & 4.4).mp4 |
175.29Мб |
| 103 |
1.07Мб |
| 103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt |
8.58Кб |
| 103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4 |
28.93Мб |
| 104 |
1.27Мб |
| 104 Proxy Servers (OBJ 3.3 & 4.4).en.srt |
9.51Кб |
| 104 Proxy Servers (OBJ 3.3 & 4.4).mp4 |
91.68Мб |
| 105 |
189.96Кб |
| 105 Honeypots and Honeynets (OBJ 2.1).en.srt |
3.12Кб |
| 105 Honeypots and Honeynets (OBJ 2.1).mp4 |
30.69Мб |
| 106 |
472.38Кб |
| 106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt |
3.39Кб |
| 106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4 |
35.35Мб |
| 107 |
653.85Кб |
| 107 NIDS and NIPS (OBJ 3.3).en.srt |
9.69Кб |
| 107 NIDS and NIPS (OBJ 3.3).mp4 |
92.37Мб |
| 108 |
759.03Кб |
| 108 Unified Threat Management (OBJ 3.2 & 3.3).en.srt |
3.91Кб |
| 108 Unified Threat Management (OBJ 3.2 & 3.3).mp4 |
41.62Мб |
| 109 |
786.48Кб |
| 109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt |
8.22Кб |
| 109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4 |
76.42Мб |
| 11 |
858.18Кб |
| 110 |
1.11Мб |
| 110 Cloud Types (OBJ 2.2 & 3.6).en.srt |
5.93Кб |
| 110 Cloud Types (OBJ 2.2 & 3.6).mp4 |
63.19Мб |
| 111 |
1.39Мб |
| 111 As a Service (OBJ 2.2).en.srt |
16.19Кб |
| 111 As a Service (OBJ 2.2).mp4 |
154.35Мб |
| 112 |
1.58Мб |
| 112 Cloud Security (OBJ 2.5 & 3.6).en.srt |
5.43Кб |
| 112 Cloud Security (OBJ 2.5 & 3.6).mp4 |
53.42Мб |
| 113 |
424.43Кб |
| 113 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt |
10.36Кб |
| 113 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4 |
99.54Мб |
| 114 |
522.11Кб |
| 114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt |
16.99Кб |
| 114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4 |
50.91Мб |
| 115 |
803.78Кб |
| 115 __ CASB (OBJ 2.1).en.srt |
10.33Кб |
| 115 __ CASB (OBJ 2.1).mp4 |
29.81Мб |
| 116 |
1.15Мб |
| 116 __ API (OBJ 2.1).en.srt |
14.04Кб |
| 116 __ API (OBJ 2.1).mp4 |
40.62Мб |
| 117 |
1.28Мб |
| 117 __ FAAS and Serverless (OBJ 2.2).en.srt |
19.03Кб |
| 117 __ FAAS and Serverless (OBJ 2.2).mp4 |
51.28Мб |
| 118 |
1.34Мб |
| 118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt |
19.22Кб |
| 118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4 |
40.96Мб |
| 119 |
1.53Мб |
| 119 __ Workflow Orchestration (OBJ 2.3).en.srt |
9.60Кб |
| 119 __ Workflow Orchestration (OBJ 2.3).mp4 |
24.11Мб |
| 12 |
1.85Мб |
| 120 |
1.79Мб |
| 120 __ CI_CD (OBJ 2.3).en.srt |
16.98Кб |
| 120 __ CI_CD (OBJ 2.3).mp4 |
48.32Мб |
| 121 |
981.79Кб |
| 121 __ DevSecOps (OBJ 2.3).en.srt |
11.94Кб |
| 121 __ DevSecOps (OBJ 2.3).mp4 |
31.38Мб |
| 122 |
904.02Кб |
| 122 __ IAC (OBJ 2.2).en.srt |
10.20Кб |
| 122 __ IAC (OBJ 2.2).mp4 |
29.60Мб |
| 123 |
986.41Кб |
| 123 __ Machine Learning (OBJ 1.2).en.srt |
20.29Кб |
| 123 __ Machine Learning (OBJ 1.2).mp4 |
68.01Мб |
| 124 |
1.36Мб |
| 124 Network Attacks (OBJ 1.4).en.srt |
1.42Кб |
| 124 Network Attacks (OBJ 1.4).mp4 |
14.53Мб |
| 125 |
229.72Кб |
| 125 Ports and Protocols (OBJ 3.1).en.srt |
9.33Кб |
| 125 Ports and Protocols (OBJ 3.1).mp4 |
95.70Мб |
| 126 |
557.95Кб |
| 126 Memorization of Ports (OBJ 3.1).en.srt |
23.57Кб |
| 126 Memorization of Ports (OBJ 3.1).mp4 |
238.39Мб |
| 127 |
866.91Кб |
| 127 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt |
7.70Кб |
| 127 Unnecessary Ports (OBJ 1.6 & 3.2).mp4 |
75.22Мб |
| 128 |
1003.36Кб |
| 128 Denial of Service (OBJ 1.3 & 1.4).en.srt |
18.47Кб |
| 128 Denial of Service (OBJ 1.3 & 1.4).mp4 |
170.22Мб |
| 129 |
1.01Мб |
| 129 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt |
3.50Кб |
| 129 DDoS (OBJ 1.2, 1.3, & 1.4).mp4 |
33.73Мб |
| 13 |
985.37Кб |
| 130 |
1.28Мб |
| 130 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt |
5.56Кб |
| 130 Stopping a DDoS (OBJ 2.1 & 2.3).mp4 |
52.44Мб |
| 131 |
1.31Мб |
| 131 Spoofing (OBJ 1.4 & 3.3).en.srt |
2.96Кб |
| 131 Spoofing (OBJ 1.4 & 3.3).mp4 |
28.53Мб |
| 132 |
1.73Мб |
| 132 Hijacking (OBJ 1.3 & 1.4).en.srt |
8.92Кб |
| 132 Hijacking (OBJ 1.3 & 1.4).mp4 |
74.66Мб |
| 133 |
1.99Мб |
| 133 Replay Attack (OBJ 1.3).en.srt |
3.39Кб |
| 133 Replay Attack (OBJ 1.3).mp4 |
32.02Мб |
| 134 |
1.38Мб |
| 134 Demo_ Null Sessions (OBJ 1.6).en.srt |
5.09Кб |
| 134 Demo_ Null Sessions (OBJ 1.6).mp4 |
38.61Мб |
| 135 |
133.40Кб |
| 135 Transitive Attacks (OBJ 2.4).en.srt |
3.36Кб |
| 135 Transitive Attacks (OBJ 2.4).mp4 |
31.63Мб |
| 136 |
881.10Кб |
| 136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt |
10.32Кб |
| 136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4 |
96.23Мб |
| 137 |
1.08Мб |
| 137 ARP Poisoning (OBJ 1.4).en.srt |
3.41Кб |
| 137 ARP Poisoning (OBJ 1.4).mp4 |
32.57Мб |
| 138 |
1.56Мб |
| 138 Securing Networks (OBJ 3.3).en.srt |
2.08Кб |
| 138 Securing Networks (OBJ 3.3).mp4 |
18.57Мб |
| 139 |
1.83Мб |
| 139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt |
15.95Кб |
| 139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4 |
146.75Мб |
| 14 |
1.65Мб |
| 140 |
450.86Кб |
| 140 Securing Network Media (OBJ 2.7).en.srt |
19.89Кб |
| 140 Securing Network Media (OBJ 2.7).mp4 |
189.94Мб |
| 141 |
825.79Кб |
| 141 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt |
10.47Кб |
| 141 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4 |
97.01Мб |
| 142 |
993.00Кб |
| 142 Wireless Encryption (OBJ 1.6 & 3.4).en.srt |
12.21Кб |
| 142 Wireless Encryption (OBJ 1.6 & 3.4).mp4 |
120.29Мб |
| 143 |
1.29Мб |
| 143 Wireless Access Points (OBJ 1.4 & 3.4).en.srt |
16.94Кб |
| 143 Wireless Access Points (OBJ 1.4 & 3.4).mp4 |
136.64Мб |
| 144 |
1.50Мб |
| 144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt |
10.27Кб |
| 144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4 |
91.49Мб |
| 145 |
1.54Мб |
| 145 Demo_ Wireless Attack (OBJ 1.4).en.srt |
13.99Кб |
| 145 Demo_ Wireless Attack (OBJ 1.4).mp4 |
103.31Мб |
| 146 |
1.54Мб |
| 146 __ WPA3 (OBJ 3.4).en.srt |
12.74Кб |
| 146 __ WPA3 (OBJ 3.4).mp4 |
39.08Мб |
| 147 |
1.64Мб |
| 147 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt |
14.52Кб |
| 147 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4 |
132.20Мб |
| 148 |
78.58Кб |
| 148 Physical Security (OBJ 2.7).en.srt |
3.81Кб |
| 148 Physical Security (OBJ 2.7).mp4 |
33.92Мб |
| 149 |
477.10Кб |
| 149 Surveillance (OBJ 2.7).en.srt |
6.68Кб |
| 149 Surveillance (OBJ 2.7).mp4 |
60.79Мб |
| 15 |
982.02Кб |
| 150 |
1.21Мб |
| 150 Door Locks (OBJ 2.7).en.srt |
9.50Кб |
| 150 Door Locks (OBJ 2.7).mp4 |
85.01Мб |
| 151 |
152.35Кб |
| 151 Demo_ Lock Picking (OBJ 2.7).en.srt |
3.58Кб |
| 151 Demo_ Lock Picking (OBJ 2.7).mp4 |
36.73Мб |
| 152 |
578.75Кб |
| 152 Biometric Readers (OBJ 2.4).en.srt |
9.58Кб |
| 152 Biometric Readers (OBJ 2.4).mp4 |
92.13Мб |
| 153 |
1.86Мб |
| 153 Facilities Security (OBJ 2.7).en.srt |
1.49Кб |
| 153 Facilities Security (OBJ 2.7).mp4 |
13.93Мб |
| 154 |
4.16Кб |
| 154 Fire Suppression (OBJ 2.7).en.srt |
13.99Кб |
| 154 Fire Suppression (OBJ 2.7).mp4 |
138.65Мб |
| 155 |
568.29Кб |
| 155 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt |
5.33Кб |
| 155 HVAC (OBJ 2.5, 2.6, & 2.7).mp4 |
53.25Мб |
| 156 |
673.57Кб |
| 156 Shielding (OBJ 2.7).en.srt |
5.65Кб |
| 156 Shielding (OBJ 2.7).mp4 |
55.21Мб |
| 157 |
1.33Мб |
| 157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt |
4.77Кб |
| 157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4 |
43.89Мб |
| 158 |
1.56Мб |
| 158 __ IoT Vulnerabilities (OBJ 2.6).en.srt |
8.66Кб |
| 158 __ IoT Vulnerabilities (OBJ 2.6).mp4 |
29.61Мб |
| 159 |
1.68Мб |
| 159 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt |
16.40Кб |
| 159 __ Embedded System Vulnerabilities (OBJ 2.6).mp4 |
47.93Мб |
| 16 |
997.80Кб |
| 160 |
403.05Кб |
| 160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt |
18.85Кб |
| 160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4 |
49.63Мб |
| 161 |
811.26Кб |
| 161 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt |
8.39Кб |
| 161 __ Mitigating Vulnerabilities (OBJ 2.6).mp4 |
22.23Мб |
| 162 |
1.24Мб |
| 162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt |
14.92Кб |
| 162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4 |
47.82Мб |
| 163 |
1.60Мб |
| 163 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt |
14.81Кб |
| 163 Authentication (OBJ 2.4, 3.5, & 3.8).mp4 |
129.73Мб |
| 164 |
1.69Мб |
| 164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt |
11.42Кб |
| 164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4 |
112.74Мб |
| 165 |
330.99Кб |
| 165 802.1x (OBJ 3.4 & 3.8).en.srt |
7.76Кб |
| 165 802.1x (OBJ 3.4 & 3.8).mp4 |
79.81Мб |
| 166 |
590.14Кб |
| 166 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt |
5.17Кб |
| 166 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4 |
53.68Мб |
| 167 |
645.42Кб |
| 167 Remote Desktop Services (OBJ 3.1).en.srt |
3.87Кб |
| 167 Remote Desktop Services (OBJ 3.1).mp4 |
40.36Мб |
| 168 |
765.14Кб |
| 168 Remote Access Service (OBJ 3.1 & 3.8).en.srt |
4.47Кб |
| 168 Remote Access Service (OBJ 3.1 & 3.8).mp4 |
44.42Мб |
| 169 |
1.16Мб |
| 169 VPN (OBJ 3.3).en.srt |
6.78Кб |
| 169 VPN (OBJ 3.3).mp4 |
63.56Мб |
| 17 |
1.25Мб |
| 170 |
1.34Мб |
| 170 RADIUS vs TACACS+ (OBJ 3.8).en.srt |
4.71Кб |
| 170 RADIUS vs TACACS+ (OBJ 3.8).mp4 |
49.87Мб |
| 171 |
1.56Мб |
| 171 Authentication Summary (OBJ 3.8).en.srt |
3.81Кб |
| 171 Authentication Summary (OBJ 3.8).mp4 |
43.71Мб |
| 172 |
1.60Мб |
| 172 __ Authentication Attacks (OBJ 1.2).en.srt |
17.28Кб |
| 172 __ Authentication Attacks (OBJ 1.2).mp4 |
42.44Мб |
| 173 |
1.62Мб |
| 173 Access Control (OBJ 3.8).en.srt |
2.22Кб |
| 173 Access Control (OBJ 3.8).mp4 |
18.60Мб |
| 174 |
741.75Кб |
| 174 Access Control Models (OBJ 3.8).en.srt |
20.82Кб |
| 174 Access Control Models (OBJ 3.8).mp4 |
176.15Мб |
| 175 |
875.31Кб |
| 175 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt |
14.23Кб |
| 175 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4 |
126.18Мб |
| 176 |
1.09Мб |
| 176 Users and Groups (OBJ 3.7 & 3.8).en.srt |
22.02Кб |
| 176 Users and Groups (OBJ 3.7 & 3.8).mp4 |
201.38Мб |
| 177 |
1.30Мб |
| 177 Permissions (OBJ 3.8).en.srt |
8.89Кб |
| 177 Permissions (OBJ 3.8).mp4 |
81.02Мб |
| 178 |
84.85Кб |
| 178 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt |
6.05Кб |
| 178 Usernames and Passwords (OBJ 1.6 & 3.7).mp4 |
55.61Мб |
| 179 |
135.65Кб |
| 179 Demo_ Policies (OBJ 3.7).en.srt |
10.49Кб |
| 179 Demo_ Policies (OBJ 3.7).mp4 |
32.95Мб |
| 18 |
647.85Кб |
| 180 |
381.01Кб |
| 180 User Account Control (OBJ 3.7 & 3.8).en.srt |
4.57Кб |
| 180 User Account Control (OBJ 3.7 & 3.8).mp4 |
40.83Мб |
| 181 |
732.36Кб |
| 181 Risk Assessments (OBJ 5.4).en.srt |
20.23Кб |
| 181 Risk Assessments (OBJ 5.4).mp4 |
188.59Мб |
| 182 |
1.42Мб |
| 182 Qualitative Risk (OBJ 5.4).en.srt |
10.07Кб |
| 182 Qualitative Risk (OBJ 5.4).mp4 |
91.50Мб |
| 183 |
1.66Мб |
| 183 Quantitative Risk (OBJ 5.4).en.srt |
11.69Кб |
| 183 Quantitative Risk (OBJ 5.4).mp4 |
119.95Мб |
| 184 |
1.68Мб |
| 184 Methodologies (OBJ 1.7 & 5.4).en.srt |
6.52Кб |
| 184 Methodologies (OBJ 1.7 & 5.4).mp4 |
59.43Мб |
| 185 |
52.59Кб |
| 185 Security Controls (OBJ 5.1).en.srt |
15.72Кб |
| 185 Security Controls (OBJ 5.1).mp4 |
149.03Мб |
| 186 |
69.25Кб |
| 186 __ Types of Risk (OBJ 1.6 & 5.4).en.srt |
16.78Кб |
| 186 __ Types of Risk (OBJ 1.6 & 5.4).mp4 |
54.76Мб |
| 187 |
140.94Кб |
| 187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt |
18.54Кб |
| 187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4 |
171.62Мб |
| 188 |
185.58Кб |
| 188 Penetration Testing (OBJ 1.8).en.srt |
10.64Кб |
| 188 Penetration Testing (OBJ 1.8).mp4 |
98.42Мб |
| 189 |
259.12Кб |
| 189 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt |
11.76Кб |
| 189 __ Training and Exercises (OBJ 1.8 & 4.2).mp4 |
32.48Мб |
| 19 |
888.56Кб |
| 190 |
261.39Кб |
| 190 OVAL (OBJ 1.7).en.srt |
3.66Кб |
| 190 OVAL (OBJ 1.7).mp4 |
32.66Мб |
| 191 |
1.33Мб |
| 191 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt |
15.98Кб |
| 191 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4 |
139.57Мб |
| 192 |
1.35Мб |
| 192 Demo_ Nmap Scanning (OBJ 4.1).en.srt |
16.11Кб |
| 192 Demo_ Nmap Scanning (OBJ 4.1).mp4 |
97.26Мб |
| 193 |
1.94Мб |
| 193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt |
20.43Кб |
| 193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4 |
96.56Мб |
| 194 |
1.33Мб |
| 194 Password Analysis (OBJ 1.2).en.srt |
13.77Кб |
| 194 Password Analysis (OBJ 1.2).mp4 |
127.42Мб |
| 195 |
1.58Мб |
| 195 Demo_ Password Cracking (OBJ 4.1).en.srt |
5.11Кб |
| 195 Demo_ Password Cracking (OBJ 4.1).mp4 |
39.04Мб |
| 196 |
112.42Кб |
| 196 Monitoring Types (OBJ 3.3).en.srt |
6.47Кб |
| 196 Monitoring Types (OBJ 3.3).mp4 |
62.46Мб |
| 197 |
299.99Кб |
| 197 Performance Baselining (OBJ 2.1).en.srt |
11.00Кб |
| 197 Performance Baselining (OBJ 2.1).mp4 |
102.38Мб |
| 198 |
911.58Кб |
| 198 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt |
6.75Кб |
| 198 Protocol Analyzers (OBJ 3.3 & 4.1).mp4 |
64.92Мб |
| 199 |
1.02Мб |
| 199 SNMP (OBJ 3.1).en.srt |
8.04Кб |
| 199 SNMP (OBJ 3.1).mp4 |
79.36Мб |
| 2 |
1.39Мб |
| 20 |
1.50Мб |
| 200 |
1.30Мб |
| 200 Demo_ Analytical Tools (OBJ 4.1).en.srt |
9.77Кб |
| 200 Demo_ Analytical Tools (OBJ 4.1).mp4 |
48.58Мб |
| 201 |
1.36Мб |
| 201 Auditing (OBJ 1.7).en.srt |
4.48Кб |
| 201 Auditing (OBJ 1.7).mp4 |
42.70Мб |
| 202 |
1.39Мб |
| 202 Demo_ Auditing Files (OBJ 1.7).en.srt |
8.07Кб |
| 202 Demo_ Auditing Files (OBJ 1.7).mp4 |
52.84Мб |
| 203 |
1.40Мб |
| 203 Logging (OBJ 1.7, 4.3, & 4.5).en.srt |
8.28Кб |
| 203 Logging (OBJ 1.7, 4.3, & 4.5).mp4 |
79.54Мб |
| 204 |
1.51Мб |
| 204 Log Files (OBJ 4.3).en.srt |
11.74Кб |
| 204 Log Files (OBJ 4.3).mp4 |
114.82Мб |
| 205 |
1.56Мб |
| 205 SIEM (OBJ 1.7 & 4.3).en.srt |
19.92Кб |
| 205 SIEM (OBJ 1.7 & 4.3).mp4 |
65.87Мб |
| 206 |
1.85Мб |
| 206 __ Syslog (OBJ 1.7 & 4.3).en.srt |
12.91Кб |
| 206 __ Syslog (OBJ 1.7 & 4.3).mp4 |
42.49Мб |
| 207 |
393.09Кб |
| 207 __ SOAR (OBJ 1.7 & 4.4).en.srt |
7.88Кб |
| 207 __ SOAR (OBJ 1.7 & 4.4).mp4 |
21.26Мб |
| 208 |
651.64Кб |
| 208 Cryptography (OBJ 2.1 & 2.8).en.srt |
12.10Кб |
| 208 Cryptography (OBJ 2.1 & 2.8).mp4 |
107.94Мб |
| 209 |
752.26Кб |
| 209 Symmetric vs Asymmetric (OBJ 2.8).en.srt |
13.28Кб |
| 209 Symmetric vs Asymmetric (OBJ 2.8).mp4 |
134.00Мб |
| 21 |
544.99Кб |
| 210 |
1.04Мб |
| 210 Symmetric Algorithms (OBJ 2.8).en.srt |
10.20Кб |
| 210 Symmetric Algorithms (OBJ 2.8).mp4 |
103.40Мб |
| 211 |
1.17Мб |
| 211 Public Key Cryptography (OBJ 2.8).en.srt |
7.16Кб |
| 211 Public Key Cryptography (OBJ 2.8).mp4 |
52.38Мб |
| 212 |
1.38Мб |
| 212 Asymmetric Algorithms (OBJ 2.8).en.srt |
7.79Кб |
| 212 Asymmetric Algorithms (OBJ 2.8).mp4 |
81.35Мб |
| 213 |
1.41Мб |
| 213 Pretty Good Privacy (OBJ 2.8).en.srt |
3.38Кб |
| 213 Pretty Good Privacy (OBJ 2.8).mp4 |
38.63Мб |
| 214 |
1.64Мб |
| 214 Key Management (OBJ 2.8).en.srt |
5.45Кб |
| 214 Key Management (OBJ 2.8).mp4 |
47.95Мб |
| 215 |
1.90Мб |
| 215 One-Time Pad (OBJ 2.8).en.srt |
9.73Кб |
| 215 One-Time Pad (OBJ 2.8).mp4 |
94.51Мб |
| 216 |
286.95Кб |
| 216 Demo_ Steganography (OBJ 2.8).en.srt |
8.45Кб |
| 216 Demo_ Steganography (OBJ 2.8).mp4 |
42.15Мб |
| 217 |
472.22Кб |
| 217 __ Cryptography Considerations (OBJ 2.8).en.srt |
28.82Кб |
| 217 __ Cryptography Considerations (OBJ 2.8).mp4 |
76.61Мб |
| 218 |
686.88Кб |
| 218 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt |
17.03Кб |
| 218 Hashing (OBJ 1.2, 2.8 & 3.2).mp4 |
166.15Мб |
| 219 |
944.66Кб |
| 219 Demo_ Hashing (OBJ 2.8).en.srt |
5.86Кб |
| 219 Demo_ Hashing (OBJ 2.8).mp4 |
38.54Мб |
| 22 |
700.19Кб |
| 220 |
987.39Кб |
| 220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt |
7.31Кб |
| 220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4 |
70.64Мб |
| 221 |
1.28Мб |
| 221 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt |
3.40Кб |
| 221 Increasing Hash Security (OBJ 2.8 & 3.7).mp4 |
31.97Мб |
| 222 |
1.37Мб |
| 222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt |
7.98Кб |
| 222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4 |
51.15Мб |
| 223 |
1.39Мб |
| 223 Digital Certificates (OBJ 3.9).en.srt |
15.76Кб |
| 223 Digital Certificates (OBJ 3.9).mp4 |
144.50Мб |
| 224 |
1.39Мб |
| 224 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt |
7.09Кб |
| 224 Demo_ Certificates (OBJ 2.8 & 3.9).mp4 |
27.99Мб |
| 225 |
1.46Мб |
| 225 Certificate Authorities (OBJ 3.2 & 3.9).en.srt |
9.32Кб |
| 225 Certificate Authorities (OBJ 3.2 & 3.9).mp4 |
89.81Мб |
| 226 |
1.66Мб |
| 226 Web of Trust (OBJ 3.9).en.srt |
6.32Кб |
| 226 Web of Trust (OBJ 3.9).mp4 |
57.34Мб |
| 227 |
1.85Мб |
| 227 Security Protocols (OBJ 3.1).en.srt |
879б |
| 227 Security Protocols (OBJ 3.1).mp4 |
8.70Мб |
| 228 |
1.27Мб |
| 228 S_MIME (OBJ 3.1).en.srt |
3.33Кб |
| 228 S_MIME (OBJ 3.1).mp4 |
33.00Мб |
| 229 |
662.72Кб |
| 229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt |
12.40Кб |
| 229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4 |
121.66Мб |
| 23 |
444.67Кб |
| 230 |
976.98Кб |
| 230 SSH (OBJ 3.1 & 4.1).en.srt |
5.74Кб |
| 230 SSH (OBJ 3.1 & 4.1).mp4 |
54.40Мб |
| 231 |
1.41Мб |
| 231 VPN Protocols (OBJ 3.1 & 3..3).en.srt |
14.48Кб |
| 231 VPN Protocols (OBJ 3.1 & 3..3).mp4 |
141.32Мб |
| 232 |
78.55Кб |
| 232 Demo_ Setting up a VPN (OBJ 3.3).en.srt |
3.38Кб |
| 232 Demo_ Setting up a VPN (OBJ 3.3).mp4 |
24.77Мб |
| 233 |
280.13Кб |
| 233 Planning for the Worst (OBJ 2.5 & 5.4).en.srt |
5.10Кб |
| 233 Planning for the Worst (OBJ 2.5 & 5.4).mp4 |
47.74Мб |
| 234 |
463.33Кб |
| 234 Redundant Power (OBJ 2.5).en.srt |
7.36Кб |
| 234 Redundant Power (OBJ 2.5).mp4 |
68.69Мб |
| 235 |
906.95Кб |
| 235 Backup Power (OBJ 2.5).en.srt |
7.66Кб |
| 235 Backup Power (OBJ 2.5).mp4 |
68.99Мб |
| 236 |
1019.23Кб |
| 236 Data Redundancy (OBJ 2.5).en.srt |
10.11Кб |
| 236 Data Redundancy (OBJ 2.5).mp4 |
100.31Мб |
| 237 |
1023.66Кб |
| 237 Demo_ RAIDs (OBJ 2.5).en.srt |
8.08Кб |
| 237 Demo_ RAIDs (OBJ 2.5).mp4 |
39.33Мб |
| 238 |
1.05Мб |
| 238 Network Redundancy (OBJ 2.5).en.srt |
5.07Кб |
| 238 Network Redundancy (OBJ 2.5).mp4 |
46.67Мб |
| 239 |
1.34Мб |
| 239 Server Redundancy (OBJ 2.5 &3.3).en.srt |
3.94Кб |
| 239 Server Redundancy (OBJ 2.5 &3.3).mp4 |
38.34Мб |
| 24 |
522.85Кб |
| 240 |
1.43Мб |
| 240 Redundant Sites (OBJ 2.1).en.srt |
5.76Кб |
| 240 Redundant Sites (OBJ 2.1).mp4 |
50.70Мб |
| 241 |
1.52Мб |
| 241 Data Backup (OBJ 2.5).en.srt |
6.57Кб |
| 241 Data Backup (OBJ 2.5).mp4 |
62.71Мб |
| 242 |
1.98Мб |
| 242 Tape Rotation (OBJ 2.5).en.srt |
8.96Кб |
| 242 Tape Rotation (OBJ 2.5).mp4 |
85.12Мб |
| 243 |
27.83Кб |
| 243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt |
14.21Кб |
| 243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4 |
123.19Мб |
| 244 |
383.21Кб |
| 244 __ Business Impact Analysis (OBJ 5.4).en.srt |
36.80Кб |
| 244 __ Business Impact Analysis (OBJ 5.4).mp4 |
118.33Мб |
| 245 |
631.41Кб |
| 245 Social Engineering (OBJ 1.1).en.srt |
2.06Кб |
| 245 Social Engineering (OBJ 1.1).mp4 |
19.74Мб |
| 246 |
957.74Кб |
| 246 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt |
11.88Кб |
| 246 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4 |
94.00Мб |
| 247 |
1.11Мб |
| 247 Insider Threat (OBJ 1.5).en.srt |
5.23Кб |
| 247 Insider Threat (OBJ 1.5).mp4 |
48.34Мб |
| 248 |
1.31Мб |
| 248 Phishing (OBJ 1.1 & 5.3).en.srt |
14.83Кб |
| 248 Phishing (OBJ 1.1 & 5.3).mp4 |
135.84Мб |
| 249 |
191.98Кб |
| 249 __ Motivation Factors (OBJ 1.1).en.srt |
17.44Кб |
| 249 __ Motivation Factors (OBJ 1.1).mp4 |
159.04Мб |
| 25 |
1.35Мб |
| 250 |
394.84Кб |
| 250 More Social Engineering (OBJ 1.1 & 1.2).en.srt |
9.45Кб |
| 250 More Social Engineering (OBJ 1.1 & 1.2).mp4 |
88.13Мб |
| 251 |
411.03Кб |
| 251 __ Fraud and Scams (OBJ 1.1).en.srt |
12.45Кб |
| 251 __ Fraud and Scams (OBJ 1.1).mp4 |
42.61Мб |
| 252 |
1.07Мб |
| 252 __ Influence Campaigns (OBJ 1.1).en.srt |
9.55Кб |
| 252 __ Influence Campaigns (OBJ 1.1).mp4 |
40.10Мб |
| 253 |
1.47Мб |
| 253 User Education (OBJ 5.3).en.srt |
10.80Кб |
| 253 User Education (OBJ 5.3).mp4 |
105.26Мб |
| 254 |
1.56Мб |
| 254 Policies and Procedures (OBJ 5.2 & 5.3).en.srt |
13.36Кб |
| 254 Policies and Procedures (OBJ 5.2 & 5.3).mp4 |
126.68Мб |
| 255 |
12.94Кб |
| 255 Data Classifications (OBJ 5.3 & 5.5).en.srt |
16.38Кб |
| 255 Data Classifications (OBJ 5.3 & 5.5).mp4 |
145.37Мб |
| 256 |
1.14Мб |
| 256 __ Data Ownership.en.srt |
9.23Кб |
| 256 __ Data Ownership.mp4 |
24.59Мб |
| 257 |
1.23Мб |
| 257 PII and PHI (OBJ 5.2 & 5.5).en.srt |
13.77Кб |
| 257 PII and PHI (OBJ 5.2 & 5.5).mp4 |
134.04Мб |
| 258 |
1.41Мб |
| 258 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt |
13.53Кб |
| 258 __ Legal Requirements (OBJ 5.2 & 5.5).mp4 |
41.27Мб |
| 259 |
1.49Мб |
| 259 __ Privacy Technologies (OBJ 5.5).en.srt |
15.48Кб |
| 259 __ Privacy Technologies (OBJ 5.5).mp4 |
38.15Мб |
| 26 |
1.04Мб |
| 260 |
1.89Мб |
| 260 Security Policies (OBJ 5.3 & 5.5).en.srt |
25.45Кб |
| 260 Security Policies (OBJ 5.3 & 5.5).mp4 |
225.33Мб |
| 261 |
1.11Мб |
| 261 User Education (OBJ 5.3).en.srt |
9.87Кб |
| 261 User Education (OBJ 5.3).mp4 |
88.88Мб |
| 262 |
1.77Мб |
| 262 Vendor Relationships (OBJ 5.3).en.srt |
18.59Кб |
| 262 Vendor Relationships (OBJ 5.3).mp4 |
167.16Мб |
| 263 |
762.14Кб |
| 263 Disposal Policies (OBJ 2.7 & 4.1).en.srt |
12.91Кб |
| 263 Disposal Policies (OBJ 2.7 & 4.1).mp4 |
110.05Мб |
| 264 |
264.86Кб |
| 264 IT Security Frameworks (OBJ 5.2).en.srt |
7.51Кб |
| 264 IT Security Frameworks (OBJ 5.2).mp4 |
71.12Мб |
| 265 |
737.06Кб |
| 265 __ Key Frameworks (OBJ 5.2).en.srt |
18.86Кб |
| 265 __ Key Frameworks (OBJ 5.2).mp4 |
77.23Мб |
| 266 |
1.40Мб |
| 266 Incident Response Procedures (OBJ 4.2).en.srt |
11.28Кб |
| 266 Incident Response Procedures (OBJ 4.2).mp4 |
99.10Мб |
| 267 |
1.43Мб |
| 267 __ Incident Response Planning (OBJ 4.2).en.srt |
43.77Кб |
| 267 __ Incident Response Planning (OBJ 4.2).mp4 |
113.29Мб |
| 268 |
211.42Кб |
| 268 __ Investigative Data (OBJ 4.3).en.srt |
29.59Кб |
| 268 __ Investigative Data (OBJ 4.3).mp4 |
74.72Мб |
| 269 |
1.40Мб |
| 269 __ Forensic Procedures (OBJ 4.5).en.srt |
33.95Кб |
| 269 __ Forensic Procedures (OBJ 4.5).mp4 |
82.94Мб |
| 27 |
1.36Мб |
| 270 |
1012.30Кб |
| 270 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt |
19.67Кб |
| 270 Data Collection Procedures (OBJ 4.1 & 4.5).mp4 |
101.16Мб |
| 271 |
1.47Мб |
| 271 Demo_ Disk Imaging (OBJ 4.1).en.srt |
14.25Кб |
| 271 Demo_ Disk Imaging (OBJ 4.1).mp4 |
63.03Мб |
| 272 |
68.99Кб |
| 272 __ Security Tools (OBJ 4.1).en.srt |
49.79Кб |
| 272 __ Security Tools (OBJ 4.1).mp4 |
134.28Мб |
| 273 |
1.24Мб |
| 273 Conclusion.en.srt |
23.11Кб |
| 273 Conclusion.mp4 |
212.10Мб |
| 274 BONUS_ What's Next_.en.srt |
9.18Кб |
| 274 BONUS_ What's Next_.mp4 |
76.89Мб |
| 28 |
168.62Кб |
| 29 |
366.36Кб |
| 3 |
634.15Кб |
| 30 |
1.34Мб |
| 31 |
1.72Мб |
| 32 |
1.96Мб |
| 33 |
1.16Кб |
| 34 |
1.80Мб |
| 35 |
1.31Мб |
| 36 |
271.75Кб |
| 37 |
1.16Мб |
| 38 |
1.49Мб |
| 39 |
593.43Кб |
| 4 |
64.47Кб |
| 40 |
1.32Мб |
| 41 |
1.82Мб |
| 42 |
827.69Кб |
| 43 |
343.51Кб |
| 44 |
1.71Мб |
| 45 |
54.61Кб |
| 46 |
1.67Мб |
| 47 |
1.18Мб |
| 48 |
722.12Кб |
| 49 |
1.26Мб |
| 5 |
1.24Мб |
| 50 |
1.95Мб |
| 51 |
588.88Кб |
| 52 |
1.71Мб |
| 53 |
57.90Кб |
| 54 |
376.39Кб |
| 55 |
1.27Мб |
| 56 |
234.08Кб |
| 57 |
762.61Кб |
| 58 |
1.11Мб |
| 59 |
615.11Кб |
| 6 |
1.41Мб |
| 60 |
705.34Кб |
| 61 |
1.62Мб |
| 62 |
249.18Кб |
| 63 |
526.14Кб |
| 64 |
863.73Кб |
| 65 |
1.69Мб |
| 66 |
469.31Кб |
| 67 |
920.29Кб |
| 68 |
1.58Мб |
| 69 |
760.12Кб |
| 7 |
1.85Мб |
| 70 |
1017.00Кб |
| 71 |
1.12Мб |
| 72 |
1.44Мб |
| 73 |
1.77Мб |
| 74 |
302.44Кб |
| 75 |
1.49Мб |
| 76 |
3.58Кб |
| 77 |
846.36Кб |
| 78 |
1.63Мб |
| 79 |
1.87Мб |
| 8 |
728.58Кб |
| 80 |
330.76Кб |
| 81 |
452.31Кб |
| 82 |
509.45Кб |
| 83 |
518.96Кб |
| 84 |
578.80Кб |
| 85 |
605.94Кб |
| 86 |
611.88Кб |
| 87 |
198.34Кб |
| 88 |
1.12Мб |
| 89 |
1.87Мб |
| 9 |
390.33Кб |
| 90 |
324.82Кб |
| 91 |
1.31Мб |
| 92 |
1.83Мб |
| 93 |
900.25Кб |
| 94 |
1014.46Кб |
| 95 |
1.91Мб |
| 96 |
584.75Кб |
| 97 |
1.06Мб |
| 98 |
1.56Мб |
| 99 |
162.64Кб |
| external-assets-links.txt |
157б |
| TutsNode.com.txt |
63б |