Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
8б |
001 Welcome.en.srt |
12.11Кб |
001 Welcome.mp4 |
91.41Мб |
002 CompTIA-Security-601-Study-Guide.pdf |
22.89Мб |
002 CompTIA-Security-Study-Notes-501.pdf |
19.28Мб |
002 Download the Study Guide.html |
1.09Кб |
003 Overview of Security.en.srt |
6.80Кб |
003 Overview of Security.mp4 |
64.44Мб |
004 CIA Triad.en.srt |
8.66Кб |
004 CIA Triad.mp4 |
74.47Мб |
005 AAA of Security (OBJ 2.4).en.srt |
7.07Кб |
005 AAA of Security (OBJ 2.4).mp4 |
59.85Мб |
006 Security Threats (OBJ 1.1 & 1.2).en.srt |
6.24Кб |
006 Security Threats (OBJ 1.1 & 1.2).mp4 |
64.17Мб |
007 Mitigating Threats (OBJ 5.1).en.srt |
5.92Кб |
007 Mitigating Threats (OBJ 5.1).mp4 |
56.32Мб |
008 Hackers (OBJ 1.5).en.srt |
10.42Кб |
008 Hackers (OBJ 1.5).mp4 |
104.89Мб |
009 Threat Actors (1.5).en.srt |
6.80Кб |
009 Threat Actors (1.5).mp4 |
68.27Мб |
010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt |
20.59Кб |
010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 |
58.00Мб |
011 __ Threat Hunting (OBJ 1.7).en.srt |
16.03Кб |
011 __ Threat Hunting (OBJ 1.7).mp4 |
42.98Мб |
012 __ Attack Frameworks (OBJ 4.2).en.srt |
26.01Кб |
012 __ Attack Frameworks (OBJ 4.2).mp4 |
87.68Мб |
013 Malware (OBJ 1.2).en.srt |
1.26Кб |
013 Malware (OBJ 1.2).mp4 |
15.01Мб |
014 Viruses (OBJ 1.2).en.srt |
13.35Кб |
014 Viruses (OBJ 1.2).mp4 |
134.66Мб |
015 Worms (OBJ 1.2).en.srt |
4.41Кб |
015 Worms (OBJ 1.2).mp4 |
47.86Мб |
016 Trojans (OBJ 1.2).en.srt |
7.20Кб |
016 Trojans (OBJ 1.2).mp4 |
62.50Мб |
017 Demo_ Viruses and Trojans (OBJ 1.2).en.srt |
13.37Кб |
017 Demo_ Viruses and Trojans (OBJ 1.2).mp4 |
91.56Мб |
018 Ransomware (OBJ 1.2).en.srt |
5.21Кб |
018 Ransomware (OBJ 1.2).mp4 |
53.37Мб |
019 Spyware (OBJ 1.2).en.srt |
5.70Кб |
019 Spyware (OBJ 1.2).mp4 |
58.14Мб |
020 Rootkits (OBJ 1.2 & 1.3).en.srt |
7.20Кб |
020 Rootkits (OBJ 1.2 & 1.3).mp4 |
75.59Мб |
021 Spam (OBJ 1.1).en.srt |
6.14Кб |
021 Spam (OBJ 1.1).mp4 |
65.14Мб |
022 Summary of Malware.en.srt |
4.40Кб |
022 Summary of Malware.mp4 |
44.67Мб |
023 Malware Infections.en.srt |
8.93Кб |
023 Malware Infections.mp4 |
93.17Мб |
024 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt |
9.72Кб |
024 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 |
96.88Мб |
025 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt |
11.67Кб |
025 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 |
49.92Мб |
026 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt |
7.50Кб |
026 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 |
62.46Мб |
027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt |
5.51Кб |
027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 |
40.59Мб |
028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt |
11.88Кб |
028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 |
75.49Мб |
029 Backdoors and Logic Bombs (OBJ 1.2).en.srt |
8.30Кб |
029 Backdoors and Logic Bombs (OBJ 1.2).mp4 |
84.09Мб |
030 Symptoms of Infection (OBJ 1.2).en.srt |
9.18Кб |
030 Symptoms of Infection (OBJ 1.2).mp4 |
91.40Мб |
031 Removing Malware (OBJ 4.2).en.srt |
11.31Кб |
031 Removing Malware (OBJ 4.2).mp4 |
108.29Мб |
032 Preventing Malware (OBJ 1.6 & 3.2).en.srt |
12.80Кб |
032 Preventing Malware (OBJ 1.6 & 3.2).mp4 |
128.84Мб |
033 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt |
18.25Кб |
033 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 |
39.54Мб |
034 Security Applications and Devices.en.srt |
1.18Кб |
034 Security Applications and Devices.mp4 |
12.76Мб |
035 Software Firewalls (OBJ 3.2).en.srt |
8.57Кб |
035 Software Firewalls (OBJ 3.2).mp4 |
91.43Мб |
036 Demo_ Software Firewalls (OBJ 3.2).en.srt |
14.21Кб |
036 Demo_ Software Firewalls (OBJ 3.2).mp4 |
61.53Мб |
037 IDS (OBJ 3.2 & 3.3).en.srt |
10.78Кб |
037 IDS (OBJ 3.2 & 3.3).mp4 |
105.77Мб |
038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt |
6.95Кб |
038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4 |
66.62Мб |
039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt |
8.13Кб |
039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4 |
81.64Мб |
040 Securing the BIOS (OBJ 3.2).en.srt |
8.53Кб |
040 Securing the BIOS (OBJ 3.2).mp4 |
86.17Мб |
041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt |
7.10Кб |
041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4 |
73.04Мб |
042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt |
9.57Кб |
042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4 |
106.73Мб |
043 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt |
12.65Кб |
043 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4 |
52.40Мб |
044 Mobile Device Security (OBJ 1.5).en.srt |
2.76Кб |
044 Mobile Device Security (OBJ 1.5).mp4 |
28.44Мб |
045 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt |
2.87Кб |
045 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4 |
33.55Мб |
046 Mobile Malware (OBJ 1.1 & 3.5).en.srt |
14.02Кб |
046 Mobile Malware (OBJ 1.1 & 3.5).mp4 |
139.49Мб |
047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt |
8.69Кб |
047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4 |
86.69Мб |
048 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt |
4.36Кб |
048 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4 |
47.75Мб |
049 Mobile Device Theft (OBJ 3.5).en.srt |
6.86Кб |
049 Mobile Device Theft (OBJ 3.5).mp4 |
69.78Мб |
050 Security of Apps (OBJ 3.1 & 3.5).en.srt |
11.01Кб |
050 Security of Apps (OBJ 3.1 & 3.5).mp4 |
109.42Мб |
051 BYOD (OBJ 3.5).en.srt |
10.69Кб |
051 BYOD (OBJ 3.5).mp4 |
107.63Мб |
052 Hardening Mobile Devices (OBJ 3.5).en.srt |
7.62Кб |
052 Hardening Mobile Devices (OBJ 3.5).mp4 |
81.84Мб |
053 Hardening (OBJ 3.2).en.srt |
3.67Кб |
053 Hardening (OBJ 3.2).mp4 |
39.72Мб |
054 Unnecessary Applications (OBJ 1.6).en.srt |
6.52Кб |
054 Unnecessary Applications (OBJ 1.6).mp4 |
69.15Мб |
055 Restricting Applications (OBJ 3.2 & 4.4).en.srt |
6.31Кб |
055 Restricting Applications (OBJ 3.2 & 4.4).mp4 |
61.92Мб |
056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt |
11.27Кб |
056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4 |
62.36Мб |
057 Trusted Operating System (OBJ 3.2).en.srt |
3.94Кб |
057 Trusted Operating System (OBJ 3.2).mp4 |
42.64Мб |
058 Updates and Patches (OBJ 1.6 & 3.2).en.srt |
6.93Кб |
058 Updates and Patches (OBJ 1.6 & 3.2).mp4 |
74.21Мб |
059 Patch Management (OBJ 1.6 & 3.2).en.srt |
8.01Кб |
059 Patch Management (OBJ 1.6 & 3.2).mp4 |
83.43Мб |
060 Group Policies (OBJ 2.1).en.srt |
5.14Кб |
060 Group Policies (OBJ 2.1).mp4 |
56.44Мб |
061 Demo_ Group Policies (OBJ 3.2).en.srt |
8.28Кб |
061 Demo_ Group Policies (OBJ 3.2).mp4 |
30.89Мб |
062 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt |
6.57Кб |
062 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4 |
69.02Мб |
063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt |
13.20Кб |
063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4 |
42.60Мб |
064 __ Root of Trust (OBJ 3.2).en.srt |
10.60Кб |
064 __ Root of Trust (OBJ 3.2).mp4 |
31.06Мб |
065 __ Trusted Firmware (OBJ 3.2).en.srt |
11.59Кб |
065 __ Trusted Firmware (OBJ 3.2).mp4 |
33.00Мб |
066 __ Secure Processing (OBJ 3.2).en.srt |
8.96Кб |
066 __ Secure Processing (OBJ 3.2).mp4 |
24.51Мб |
067 Virtualization (OBJ 2.2).en.srt |
4.56Кб |
067 Virtualization (OBJ 2.2).mp4 |
46.65Мб |
068 Hypervisors (OBJ 2.2).en.srt |
5.27Кб |
068 Hypervisors (OBJ 2.2).mp4 |
57.45Мб |
069 Demo_ How to create a VM (OBJ 2.2).en.srt |
8.35Кб |
069 Demo_ How to create a VM (OBJ 2.2).mp4 |
38.72Мб |
070 Threats to VMs (OBJ 2.2).en.srt |
7.83Кб |
070 Threats to VMs (OBJ 2.2).mp4 |
80.93Мб |
071 Securing VMs (OBJ 2.2).en.srt |
8.15Кб |
071 Securing VMs (OBJ 2.2).mp4 |
82.44Мб |
072 Demo_ Securing VMs.en.srt |
9.24Кб |
072 Demo_ Securing VMs.mp4 |
43.11Мб |
073 Application Security.en.srt |
3.68Кб |
073 Application Security.mp4 |
38.61Мб |
074 Web Browser Security (OBJ 3.2 & 3.3).en.srt |
15.51Кб |
074 Web Browser Security (OBJ 3.2 & 3.3).mp4 |
145.13Мб |
075 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt |
7.37Кб |
075 Web Browser Concerns (OBJ 3.2 & 3.3).mp4 |
71.04Мб |
076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt |
11.47Кб |
076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4 |
46.06Мб |
077 Securing Applications (OBJ 1.4 & 3.2).en.srt |
10.09Кб |
077 Securing Applications (OBJ 1.4 & 3.2).mp4 |
101.49Мб |
078 Software Development (OBJ 2.1 & 2.3).en.srt |
19.35Кб |
078 Software Development (OBJ 2.1 & 2.3).mp4 |
188.76Мб |
079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt |
13.75Кб |
079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4 |
136.96Мб |
080 Testing Methods (OBJ 2.3 & 3.2).en.srt |
15.01Кб |
080 Testing Methods (OBJ 2.3 & 3.2).mp4 |
151.04Мб |
081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt |
8.06Кб |
081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4 |
80.73Мб |
082 Buffer Overflows (OBJ 1.3).en.srt |
13.56Кб |
082 Buffer Overflows (OBJ 1.3).mp4 |
135.64Мб |
083 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt |
12.61Кб |
083 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4 |
101.76Мб |
084 XSS and XSRF (OBJ 1.3).en.srt |
6.76Кб |
084 XSS and XSRF (OBJ 1.3).mp4 |
68.72Мб |
085 SQL Injection (OBJ 1.3).en.srt |
13.22Кб |
085 SQL Injection (OBJ 1.3).mp4 |
141.47Мб |
086 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt |
14.12Кб |
086 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4 |
74.85Мб |
087 __ XML Vulnerabilities (OBJ 1.3).en.srt |
11.52Кб |
087 __ XML Vulnerabilities (OBJ 1.3).mp4 |
49.28Мб |
088 __ Race Conditions (OBJ 1.3).en.srt |
13.55Кб |
088 __ Race Conditions (OBJ 1.3).mp4 |
34.59Мб |
089 __ Design Vulnerabilities (OBJ 1.3).en.srt |
9.95Кб |
089 __ Design Vulnerabilities (OBJ 1.3).mp4 |
26.86Мб |
090 Network Security.en.srt |
1.73Кб |
090 Network Security.mp4 |
16.60Мб |
091 The OSI Model (OBJ 3.3 & 3.6).en.srt |
12.99Кб |
091 The OSI Model (OBJ 3.3 & 3.6).mp4 |
128.51Мб |
092 Switches (OBJ 1.4 & 2.7).en.srt |
7.75Кб |
092 Switches (OBJ 1.4 & 2.7).mp4 |
77.26Мб |
093 Routers (OBJ 3.3).en.srt |
5.38Кб |
093 Routers (OBJ 3.3).mp4 |
54.31Мб |
094 Network Zones (OBJ 3.3).en.srt |
7.42Кб |
094 Network Zones (OBJ 3.3).mp4 |
69.46Мб |
095 __ Jumpbox (OBJ 3.5).en.srt |
13.58Кб |
095 __ Jumpbox (OBJ 3.5).mp4 |
35.05Мб |
096 Network Access Control (OBJ 3.3 & 4.4).en.srt |
6.10Кб |
096 Network Access Control (OBJ 3.3 & 4.4).mp4 |
56.67Мб |
097 VLANs (OBJ 3.3).en.srt |
3.17Кб |
097 VLANs (OBJ 3.3).mp4 |
33.11Мб |
098 Subnetting (OBJ 3.6).en.srt |
4.38Кб |
098 Subnetting (OBJ 3.6).mp4 |
41.36Мб |
099 Network Address Translation (OBJ 3.3).en.srt |
5.10Кб |
099 Network Address Translation (OBJ 3.3).mp4 |
52.66Мб |
1 |
29б |
10 |
1.78Мб |
100 |
366.29Кб |
100 Telephony (OBJ 3.1).en.srt |
13.76Кб |
100 Telephony (OBJ 3.1).mp4 |
130.69Мб |
101 |
667.45Кб |
101 Perimeter Security.en.srt |
1.83Кб |
101 Perimeter Security.mp4 |
17.79Мб |
102 |
999.90Кб |
102 Firewalls (OBJ 3.3 & 4.4).en.srt |
17.87Кб |
102 Firewalls (OBJ 3.3 & 4.4).mp4 |
175.29Мб |
103 |
1.07Мб |
103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt |
8.58Кб |
103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4 |
28.93Мб |
104 |
1.27Мб |
104 Proxy Servers (OBJ 3.3 & 4.4).en.srt |
9.51Кб |
104 Proxy Servers (OBJ 3.3 & 4.4).mp4 |
91.68Мб |
105 |
189.96Кб |
105 Honeypots and Honeynets (OBJ 2.1).en.srt |
3.12Кб |
105 Honeypots and Honeynets (OBJ 2.1).mp4 |
30.69Мб |
106 |
472.38Кб |
106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt |
3.39Кб |
106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4 |
35.35Мб |
107 |
653.85Кб |
107 NIDS and NIPS (OBJ 3.3).en.srt |
9.69Кб |
107 NIDS and NIPS (OBJ 3.3).mp4 |
92.37Мб |
108 |
759.03Кб |
108 Unified Threat Management (OBJ 3.2 & 3.3).en.srt |
3.91Кб |
108 Unified Threat Management (OBJ 3.2 & 3.3).mp4 |
41.62Мб |
109 |
786.48Кб |
109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt |
8.22Кб |
109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4 |
76.42Мб |
11 |
858.18Кб |
110 |
1.11Мб |
110 Cloud Types (OBJ 2.2 & 3.6).en.srt |
5.93Кб |
110 Cloud Types (OBJ 2.2 & 3.6).mp4 |
63.19Мб |
111 |
1.39Мб |
111 As a Service (OBJ 2.2).en.srt |
16.19Кб |
111 As a Service (OBJ 2.2).mp4 |
154.35Мб |
112 |
1.58Мб |
112 Cloud Security (OBJ 2.5 & 3.6).en.srt |
5.43Кб |
112 Cloud Security (OBJ 2.5 & 3.6).mp4 |
53.42Мб |
113 |
424.43Кб |
113 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt |
10.36Кб |
113 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4 |
99.54Мб |
114 |
522.11Кб |
114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt |
16.99Кб |
114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4 |
50.91Мб |
115 |
803.78Кб |
115 __ CASB (OBJ 2.1).en.srt |
10.33Кб |
115 __ CASB (OBJ 2.1).mp4 |
29.81Мб |
116 |
1.15Мб |
116 __ API (OBJ 2.1).en.srt |
14.04Кб |
116 __ API (OBJ 2.1).mp4 |
40.62Мб |
117 |
1.28Мб |
117 __ FAAS and Serverless (OBJ 2.2).en.srt |
19.03Кб |
117 __ FAAS and Serverless (OBJ 2.2).mp4 |
51.28Мб |
118 |
1.34Мб |
118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt |
19.22Кб |
118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4 |
40.96Мб |
119 |
1.53Мб |
119 __ Workflow Orchestration (OBJ 2.3).en.srt |
9.60Кб |
119 __ Workflow Orchestration (OBJ 2.3).mp4 |
24.11Мб |
12 |
1.85Мб |
120 |
1.79Мб |
120 __ CI_CD (OBJ 2.3).en.srt |
16.98Кб |
120 __ CI_CD (OBJ 2.3).mp4 |
48.32Мб |
121 |
981.79Кб |
121 __ DevSecOps (OBJ 2.3).en.srt |
11.94Кб |
121 __ DevSecOps (OBJ 2.3).mp4 |
31.38Мб |
122 |
904.02Кб |
122 __ IAC (OBJ 2.2).en.srt |
10.20Кб |
122 __ IAC (OBJ 2.2).mp4 |
29.60Мб |
123 |
986.41Кб |
123 __ Machine Learning (OBJ 1.2).en.srt |
20.29Кб |
123 __ Machine Learning (OBJ 1.2).mp4 |
68.01Мб |
124 |
1.36Мб |
124 Network Attacks (OBJ 1.4).en.srt |
1.42Кб |
124 Network Attacks (OBJ 1.4).mp4 |
14.53Мб |
125 |
229.72Кб |
125 Ports and Protocols (OBJ 3.1).en.srt |
9.33Кб |
125 Ports and Protocols (OBJ 3.1).mp4 |
95.70Мб |
126 |
557.95Кб |
126 Memorization of Ports (OBJ 3.1).en.srt |
23.57Кб |
126 Memorization of Ports (OBJ 3.1).mp4 |
238.39Мб |
127 |
866.91Кб |
127 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt |
7.70Кб |
127 Unnecessary Ports (OBJ 1.6 & 3.2).mp4 |
75.22Мб |
128 |
1003.36Кб |
128 Denial of Service (OBJ 1.3 & 1.4).en.srt |
18.47Кб |
128 Denial of Service (OBJ 1.3 & 1.4).mp4 |
170.22Мб |
129 |
1.01Мб |
129 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt |
3.50Кб |
129 DDoS (OBJ 1.2, 1.3, & 1.4).mp4 |
33.73Мб |
13 |
985.37Кб |
130 |
1.28Мб |
130 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt |
5.56Кб |
130 Stopping a DDoS (OBJ 2.1 & 2.3).mp4 |
52.44Мб |
131 |
1.31Мб |
131 Spoofing (OBJ 1.4 & 3.3).en.srt |
2.96Кб |
131 Spoofing (OBJ 1.4 & 3.3).mp4 |
28.53Мб |
132 |
1.73Мб |
132 Hijacking (OBJ 1.3 & 1.4).en.srt |
8.92Кб |
132 Hijacking (OBJ 1.3 & 1.4).mp4 |
74.66Мб |
133 |
1.99Мб |
133 Replay Attack (OBJ 1.3).en.srt |
3.39Кб |
133 Replay Attack (OBJ 1.3).mp4 |
32.02Мб |
134 |
1.38Мб |
134 Demo_ Null Sessions (OBJ 1.6).en.srt |
5.09Кб |
134 Demo_ Null Sessions (OBJ 1.6).mp4 |
38.61Мб |
135 |
133.40Кб |
135 Transitive Attacks (OBJ 2.4).en.srt |
3.36Кб |
135 Transitive Attacks (OBJ 2.4).mp4 |
31.63Мб |
136 |
881.10Кб |
136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt |
10.32Кб |
136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4 |
96.23Мб |
137 |
1.08Мб |
137 ARP Poisoning (OBJ 1.4).en.srt |
3.41Кб |
137 ARP Poisoning (OBJ 1.4).mp4 |
32.57Мб |
138 |
1.56Мб |
138 Securing Networks (OBJ 3.3).en.srt |
2.08Кб |
138 Securing Networks (OBJ 3.3).mp4 |
18.57Мб |
139 |
1.83Мб |
139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt |
15.95Кб |
139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4 |
146.75Мб |
14 |
1.65Мб |
140 |
450.86Кб |
140 Securing Network Media (OBJ 2.7).en.srt |
19.89Кб |
140 Securing Network Media (OBJ 2.7).mp4 |
189.94Мб |
141 |
825.79Кб |
141 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt |
10.47Кб |
141 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4 |
97.01Мб |
142 |
993.00Кб |
142 Wireless Encryption (OBJ 1.6 & 3.4).en.srt |
12.21Кб |
142 Wireless Encryption (OBJ 1.6 & 3.4).mp4 |
120.29Мб |
143 |
1.29Мб |
143 Wireless Access Points (OBJ 1.4 & 3.4).en.srt |
16.94Кб |
143 Wireless Access Points (OBJ 1.4 & 3.4).mp4 |
136.64Мб |
144 |
1.50Мб |
144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt |
10.27Кб |
144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4 |
91.49Мб |
145 |
1.54Мб |
145 Demo_ Wireless Attack (OBJ 1.4).en.srt |
13.99Кб |
145 Demo_ Wireless Attack (OBJ 1.4).mp4 |
103.31Мб |
146 |
1.54Мб |
146 __ WPA3 (OBJ 3.4).en.srt |
12.74Кб |
146 __ WPA3 (OBJ 3.4).mp4 |
39.08Мб |
147 |
1.64Мб |
147 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt |
14.52Кб |
147 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4 |
132.20Мб |
148 |
78.58Кб |
148 Physical Security (OBJ 2.7).en.srt |
3.81Кб |
148 Physical Security (OBJ 2.7).mp4 |
33.92Мб |
149 |
477.10Кб |
149 Surveillance (OBJ 2.7).en.srt |
6.68Кб |
149 Surveillance (OBJ 2.7).mp4 |
60.79Мб |
15 |
982.02Кб |
150 |
1.21Мб |
150 Door Locks (OBJ 2.7).en.srt |
9.50Кб |
150 Door Locks (OBJ 2.7).mp4 |
85.01Мб |
151 |
152.35Кб |
151 Demo_ Lock Picking (OBJ 2.7).en.srt |
3.58Кб |
151 Demo_ Lock Picking (OBJ 2.7).mp4 |
36.73Мб |
152 |
578.75Кб |
152 Biometric Readers (OBJ 2.4).en.srt |
9.58Кб |
152 Biometric Readers (OBJ 2.4).mp4 |
92.13Мб |
153 |
1.86Мб |
153 Facilities Security (OBJ 2.7).en.srt |
1.49Кб |
153 Facilities Security (OBJ 2.7).mp4 |
13.93Мб |
154 |
4.16Кб |
154 Fire Suppression (OBJ 2.7).en.srt |
13.99Кб |
154 Fire Suppression (OBJ 2.7).mp4 |
138.65Мб |
155 |
568.29Кб |
155 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt |
5.33Кб |
155 HVAC (OBJ 2.5, 2.6, & 2.7).mp4 |
53.25Мб |
156 |
673.57Кб |
156 Shielding (OBJ 2.7).en.srt |
5.65Кб |
156 Shielding (OBJ 2.7).mp4 |
55.21Мб |
157 |
1.33Мб |
157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt |
4.77Кб |
157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4 |
43.89Мб |
158 |
1.56Мб |
158 __ IoT Vulnerabilities (OBJ 2.6).en.srt |
8.66Кб |
158 __ IoT Vulnerabilities (OBJ 2.6).mp4 |
29.61Мб |
159 |
1.68Мб |
159 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt |
16.40Кб |
159 __ Embedded System Vulnerabilities (OBJ 2.6).mp4 |
47.93Мб |
16 |
997.80Кб |
160 |
403.05Кб |
160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt |
18.85Кб |
160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4 |
49.63Мб |
161 |
811.26Кб |
161 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt |
8.39Кб |
161 __ Mitigating Vulnerabilities (OBJ 2.6).mp4 |
22.23Мб |
162 |
1.24Мб |
162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt |
14.92Кб |
162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4 |
47.82Мб |
163 |
1.60Мб |
163 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt |
14.81Кб |
163 Authentication (OBJ 2.4, 3.5, & 3.8).mp4 |
129.73Мб |
164 |
1.69Мб |
164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt |
11.42Кб |
164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4 |
112.74Мб |
165 |
330.99Кб |
165 802.1x (OBJ 3.4 & 3.8).en.srt |
7.76Кб |
165 802.1x (OBJ 3.4 & 3.8).mp4 |
79.81Мб |
166 |
590.14Кб |
166 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt |
5.17Кб |
166 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4 |
53.68Мб |
167 |
645.42Кб |
167 Remote Desktop Services (OBJ 3.1).en.srt |
3.87Кб |
167 Remote Desktop Services (OBJ 3.1).mp4 |
40.36Мб |
168 |
765.14Кб |
168 Remote Access Service (OBJ 3.1 & 3.8).en.srt |
4.47Кб |
168 Remote Access Service (OBJ 3.1 & 3.8).mp4 |
44.42Мб |
169 |
1.16Мб |
169 VPN (OBJ 3.3).en.srt |
6.78Кб |
169 VPN (OBJ 3.3).mp4 |
63.56Мб |
17 |
1.25Мб |
170 |
1.34Мб |
170 RADIUS vs TACACS+ (OBJ 3.8).en.srt |
4.71Кб |
170 RADIUS vs TACACS+ (OBJ 3.8).mp4 |
49.87Мб |
171 |
1.56Мб |
171 Authentication Summary (OBJ 3.8).en.srt |
3.81Кб |
171 Authentication Summary (OBJ 3.8).mp4 |
43.71Мб |
172 |
1.60Мб |
172 __ Authentication Attacks (OBJ 1.2).en.srt |
17.28Кб |
172 __ Authentication Attacks (OBJ 1.2).mp4 |
42.44Мб |
173 |
1.62Мб |
173 Access Control (OBJ 3.8).en.srt |
2.22Кб |
173 Access Control (OBJ 3.8).mp4 |
18.60Мб |
174 |
741.75Кб |
174 Access Control Models (OBJ 3.8).en.srt |
20.82Кб |
174 Access Control Models (OBJ 3.8).mp4 |
176.15Мб |
175 |
875.31Кб |
175 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt |
14.23Кб |
175 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4 |
126.18Мб |
176 |
1.09Мб |
176 Users and Groups (OBJ 3.7 & 3.8).en.srt |
22.02Кб |
176 Users and Groups (OBJ 3.7 & 3.8).mp4 |
201.38Мб |
177 |
1.30Мб |
177 Permissions (OBJ 3.8).en.srt |
8.89Кб |
177 Permissions (OBJ 3.8).mp4 |
81.02Мб |
178 |
84.85Кб |
178 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt |
6.05Кб |
178 Usernames and Passwords (OBJ 1.6 & 3.7).mp4 |
55.61Мб |
179 |
135.65Кб |
179 Demo_ Policies (OBJ 3.7).en.srt |
10.49Кб |
179 Demo_ Policies (OBJ 3.7).mp4 |
32.95Мб |
18 |
647.85Кб |
180 |
381.01Кб |
180 User Account Control (OBJ 3.7 & 3.8).en.srt |
4.57Кб |
180 User Account Control (OBJ 3.7 & 3.8).mp4 |
40.83Мб |
181 |
732.36Кб |
181 Risk Assessments (OBJ 5.4).en.srt |
20.23Кб |
181 Risk Assessments (OBJ 5.4).mp4 |
188.59Мб |
182 |
1.42Мб |
182 Qualitative Risk (OBJ 5.4).en.srt |
10.07Кб |
182 Qualitative Risk (OBJ 5.4).mp4 |
91.50Мб |
183 |
1.66Мб |
183 Quantitative Risk (OBJ 5.4).en.srt |
11.69Кб |
183 Quantitative Risk (OBJ 5.4).mp4 |
119.95Мб |
184 |
1.68Мб |
184 Methodologies (OBJ 1.7 & 5.4).en.srt |
6.52Кб |
184 Methodologies (OBJ 1.7 & 5.4).mp4 |
59.43Мб |
185 |
52.59Кб |
185 Security Controls (OBJ 5.1).en.srt |
15.72Кб |
185 Security Controls (OBJ 5.1).mp4 |
149.03Мб |
186 |
69.25Кб |
186 __ Types of Risk (OBJ 1.6 & 5.4).en.srt |
16.78Кб |
186 __ Types of Risk (OBJ 1.6 & 5.4).mp4 |
54.76Мб |
187 |
140.94Кб |
187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt |
18.54Кб |
187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4 |
171.62Мб |
188 |
185.58Кб |
188 Penetration Testing (OBJ 1.8).en.srt |
10.64Кб |
188 Penetration Testing (OBJ 1.8).mp4 |
98.42Мб |
189 |
259.12Кб |
189 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt |
11.76Кб |
189 __ Training and Exercises (OBJ 1.8 & 4.2).mp4 |
32.48Мб |
19 |
888.56Кб |
190 |
261.39Кб |
190 OVAL (OBJ 1.7).en.srt |
3.66Кб |
190 OVAL (OBJ 1.7).mp4 |
32.66Мб |
191 |
1.33Мб |
191 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt |
15.98Кб |
191 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4 |
139.57Мб |
192 |
1.35Мб |
192 Demo_ Nmap Scanning (OBJ 4.1).en.srt |
16.11Кб |
192 Demo_ Nmap Scanning (OBJ 4.1).mp4 |
97.26Мб |
193 |
1.94Мб |
193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt |
20.43Кб |
193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4 |
96.56Мб |
194 |
1.33Мб |
194 Password Analysis (OBJ 1.2).en.srt |
13.77Кб |
194 Password Analysis (OBJ 1.2).mp4 |
127.42Мб |
195 |
1.58Мб |
195 Demo_ Password Cracking (OBJ 4.1).en.srt |
5.11Кб |
195 Demo_ Password Cracking (OBJ 4.1).mp4 |
39.04Мб |
196 |
112.42Кб |
196 Monitoring Types (OBJ 3.3).en.srt |
6.47Кб |
196 Monitoring Types (OBJ 3.3).mp4 |
62.46Мб |
197 |
299.99Кб |
197 Performance Baselining (OBJ 2.1).en.srt |
11.00Кб |
197 Performance Baselining (OBJ 2.1).mp4 |
102.38Мб |
198 |
911.58Кб |
198 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt |
6.75Кб |
198 Protocol Analyzers (OBJ 3.3 & 4.1).mp4 |
64.92Мб |
199 |
1.02Мб |
199 SNMP (OBJ 3.1).en.srt |
8.04Кб |
199 SNMP (OBJ 3.1).mp4 |
79.36Мб |
2 |
1.39Мб |
20 |
1.50Мб |
200 |
1.30Мб |
200 Demo_ Analytical Tools (OBJ 4.1).en.srt |
9.77Кб |
200 Demo_ Analytical Tools (OBJ 4.1).mp4 |
48.58Мб |
201 |
1.36Мб |
201 Auditing (OBJ 1.7).en.srt |
4.48Кб |
201 Auditing (OBJ 1.7).mp4 |
42.70Мб |
202 |
1.39Мб |
202 Demo_ Auditing Files (OBJ 1.7).en.srt |
8.07Кб |
202 Demo_ Auditing Files (OBJ 1.7).mp4 |
52.84Мб |
203 |
1.40Мб |
203 Logging (OBJ 1.7, 4.3, & 4.5).en.srt |
8.28Кб |
203 Logging (OBJ 1.7, 4.3, & 4.5).mp4 |
79.54Мб |
204 |
1.51Мб |
204 Log Files (OBJ 4.3).en.srt |
11.74Кб |
204 Log Files (OBJ 4.3).mp4 |
114.82Мб |
205 |
1.56Мб |
205 SIEM (OBJ 1.7 & 4.3).en.srt |
19.92Кб |
205 SIEM (OBJ 1.7 & 4.3).mp4 |
65.87Мб |
206 |
1.85Мб |
206 __ Syslog (OBJ 1.7 & 4.3).en.srt |
12.91Кб |
206 __ Syslog (OBJ 1.7 & 4.3).mp4 |
42.49Мб |
207 |
393.09Кб |
207 __ SOAR (OBJ 1.7 & 4.4).en.srt |
7.88Кб |
207 __ SOAR (OBJ 1.7 & 4.4).mp4 |
21.26Мб |
208 |
651.64Кб |
208 Cryptography (OBJ 2.1 & 2.8).en.srt |
12.10Кб |
208 Cryptography (OBJ 2.1 & 2.8).mp4 |
107.94Мб |
209 |
752.26Кб |
209 Symmetric vs Asymmetric (OBJ 2.8).en.srt |
13.28Кб |
209 Symmetric vs Asymmetric (OBJ 2.8).mp4 |
134.00Мб |
21 |
544.99Кб |
210 |
1.04Мб |
210 Symmetric Algorithms (OBJ 2.8).en.srt |
10.20Кб |
210 Symmetric Algorithms (OBJ 2.8).mp4 |
103.40Мб |
211 |
1.17Мб |
211 Public Key Cryptography (OBJ 2.8).en.srt |
7.16Кб |
211 Public Key Cryptography (OBJ 2.8).mp4 |
52.38Мб |
212 |
1.38Мб |
212 Asymmetric Algorithms (OBJ 2.8).en.srt |
7.79Кб |
212 Asymmetric Algorithms (OBJ 2.8).mp4 |
81.35Мб |
213 |
1.41Мб |
213 Pretty Good Privacy (OBJ 2.8).en.srt |
3.38Кб |
213 Pretty Good Privacy (OBJ 2.8).mp4 |
38.63Мб |
214 |
1.64Мб |
214 Key Management (OBJ 2.8).en.srt |
5.45Кб |
214 Key Management (OBJ 2.8).mp4 |
47.95Мб |
215 |
1.90Мб |
215 One-Time Pad (OBJ 2.8).en.srt |
9.73Кб |
215 One-Time Pad (OBJ 2.8).mp4 |
94.51Мб |
216 |
286.95Кб |
216 Demo_ Steganography (OBJ 2.8).en.srt |
8.45Кб |
216 Demo_ Steganography (OBJ 2.8).mp4 |
42.15Мб |
217 |
472.22Кб |
217 __ Cryptography Considerations (OBJ 2.8).en.srt |
28.82Кб |
217 __ Cryptography Considerations (OBJ 2.8).mp4 |
76.61Мб |
218 |
686.88Кб |
218 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt |
17.03Кб |
218 Hashing (OBJ 1.2, 2.8 & 3.2).mp4 |
166.15Мб |
219 |
944.66Кб |
219 Demo_ Hashing (OBJ 2.8).en.srt |
5.86Кб |
219 Demo_ Hashing (OBJ 2.8).mp4 |
38.54Мб |
22 |
700.19Кб |
220 |
987.39Кб |
220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt |
7.31Кб |
220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4 |
70.64Мб |
221 |
1.28Мб |
221 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt |
3.40Кб |
221 Increasing Hash Security (OBJ 2.8 & 3.7).mp4 |
31.97Мб |
222 |
1.37Мб |
222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt |
7.98Кб |
222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4 |
51.15Мб |
223 |
1.39Мб |
223 Digital Certificates (OBJ 3.9).en.srt |
15.76Кб |
223 Digital Certificates (OBJ 3.9).mp4 |
144.50Мб |
224 |
1.39Мб |
224 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt |
7.09Кб |
224 Demo_ Certificates (OBJ 2.8 & 3.9).mp4 |
27.99Мб |
225 |
1.46Мб |
225 Certificate Authorities (OBJ 3.2 & 3.9).en.srt |
9.32Кб |
225 Certificate Authorities (OBJ 3.2 & 3.9).mp4 |
89.81Мб |
226 |
1.66Мб |
226 Web of Trust (OBJ 3.9).en.srt |
6.32Кб |
226 Web of Trust (OBJ 3.9).mp4 |
57.34Мб |
227 |
1.85Мб |
227 Security Protocols (OBJ 3.1).en.srt |
879б |
227 Security Protocols (OBJ 3.1).mp4 |
8.70Мб |
228 |
1.27Мб |
228 S_MIME (OBJ 3.1).en.srt |
3.33Кб |
228 S_MIME (OBJ 3.1).mp4 |
33.00Мб |
229 |
662.72Кб |
229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt |
12.40Кб |
229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4 |
121.66Мб |
23 |
444.67Кб |
230 |
976.98Кб |
230 SSH (OBJ 3.1 & 4.1).en.srt |
5.74Кб |
230 SSH (OBJ 3.1 & 4.1).mp4 |
54.40Мб |
231 |
1.41Мб |
231 VPN Protocols (OBJ 3.1 & 3..3).en.srt |
14.48Кб |
231 VPN Protocols (OBJ 3.1 & 3..3).mp4 |
141.32Мб |
232 |
78.55Кб |
232 Demo_ Setting up a VPN (OBJ 3.3).en.srt |
3.38Кб |
232 Demo_ Setting up a VPN (OBJ 3.3).mp4 |
24.77Мб |
233 |
280.13Кб |
233 Planning for the Worst (OBJ 2.5 & 5.4).en.srt |
5.10Кб |
233 Planning for the Worst (OBJ 2.5 & 5.4).mp4 |
47.74Мб |
234 |
463.33Кб |
234 Redundant Power (OBJ 2.5).en.srt |
7.36Кб |
234 Redundant Power (OBJ 2.5).mp4 |
68.69Мб |
235 |
906.95Кб |
235 Backup Power (OBJ 2.5).en.srt |
7.66Кб |
235 Backup Power (OBJ 2.5).mp4 |
68.99Мб |
236 |
1019.23Кб |
236 Data Redundancy (OBJ 2.5).en.srt |
10.11Кб |
236 Data Redundancy (OBJ 2.5).mp4 |
100.31Мб |
237 |
1023.66Кб |
237 Demo_ RAIDs (OBJ 2.5).en.srt |
8.08Кб |
237 Demo_ RAIDs (OBJ 2.5).mp4 |
39.33Мб |
238 |
1.05Мб |
238 Network Redundancy (OBJ 2.5).en.srt |
5.07Кб |
238 Network Redundancy (OBJ 2.5).mp4 |
46.67Мб |
239 |
1.34Мб |
239 Server Redundancy (OBJ 2.5 &3.3).en.srt |
3.94Кб |
239 Server Redundancy (OBJ 2.5 &3.3).mp4 |
38.34Мб |
24 |
522.85Кб |
240 |
1.43Мб |
240 Redundant Sites (OBJ 2.1).en.srt |
5.76Кб |
240 Redundant Sites (OBJ 2.1).mp4 |
50.70Мб |
241 |
1.52Мб |
241 Data Backup (OBJ 2.5).en.srt |
6.57Кб |
241 Data Backup (OBJ 2.5).mp4 |
62.71Мб |
242 |
1.98Мб |
242 Tape Rotation (OBJ 2.5).en.srt |
8.96Кб |
242 Tape Rotation (OBJ 2.5).mp4 |
85.12Мб |
243 |
27.83Кб |
243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt |
14.21Кб |
243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4 |
123.19Мб |
244 |
383.21Кб |
244 __ Business Impact Analysis (OBJ 5.4).en.srt |
36.80Кб |
244 __ Business Impact Analysis (OBJ 5.4).mp4 |
118.33Мб |
245 |
631.41Кб |
245 Social Engineering (OBJ 1.1).en.srt |
2.06Кб |
245 Social Engineering (OBJ 1.1).mp4 |
19.74Мб |
246 |
957.74Кб |
246 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt |
11.88Кб |
246 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4 |
94.00Мб |
247 |
1.11Мб |
247 Insider Threat (OBJ 1.5).en.srt |
5.23Кб |
247 Insider Threat (OBJ 1.5).mp4 |
48.34Мб |
248 |
1.31Мб |
248 Phishing (OBJ 1.1 & 5.3).en.srt |
14.83Кб |
248 Phishing (OBJ 1.1 & 5.3).mp4 |
135.84Мб |
249 |
191.98Кб |
249 __ Motivation Factors (OBJ 1.1).en.srt |
17.44Кб |
249 __ Motivation Factors (OBJ 1.1).mp4 |
159.04Мб |
25 |
1.35Мб |
250 |
394.84Кб |
250 More Social Engineering (OBJ 1.1 & 1.2).en.srt |
9.45Кб |
250 More Social Engineering (OBJ 1.1 & 1.2).mp4 |
88.13Мб |
251 |
411.03Кб |
251 __ Fraud and Scams (OBJ 1.1).en.srt |
12.45Кб |
251 __ Fraud and Scams (OBJ 1.1).mp4 |
42.61Мб |
252 |
1.07Мб |
252 __ Influence Campaigns (OBJ 1.1).en.srt |
9.55Кб |
252 __ Influence Campaigns (OBJ 1.1).mp4 |
40.10Мб |
253 |
1.47Мб |
253 User Education (OBJ 5.3).en.srt |
10.80Кб |
253 User Education (OBJ 5.3).mp4 |
105.26Мб |
254 |
1.56Мб |
254 Policies and Procedures (OBJ 5.2 & 5.3).en.srt |
13.36Кб |
254 Policies and Procedures (OBJ 5.2 & 5.3).mp4 |
126.68Мб |
255 |
12.94Кб |
255 Data Classifications (OBJ 5.3 & 5.5).en.srt |
16.38Кб |
255 Data Classifications (OBJ 5.3 & 5.5).mp4 |
145.37Мб |
256 |
1.14Мб |
256 __ Data Ownership.en.srt |
9.23Кб |
256 __ Data Ownership.mp4 |
24.59Мб |
257 |
1.23Мб |
257 PII and PHI (OBJ 5.2 & 5.5).en.srt |
13.77Кб |
257 PII and PHI (OBJ 5.2 & 5.5).mp4 |
134.04Мб |
258 |
1.41Мб |
258 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt |
13.53Кб |
258 __ Legal Requirements (OBJ 5.2 & 5.5).mp4 |
41.27Мб |
259 |
1.49Мб |
259 __ Privacy Technologies (OBJ 5.5).en.srt |
15.48Кб |
259 __ Privacy Technologies (OBJ 5.5).mp4 |
38.15Мб |
26 |
1.04Мб |
260 |
1.89Мб |
260 Security Policies (OBJ 5.3 & 5.5).en.srt |
25.45Кб |
260 Security Policies (OBJ 5.3 & 5.5).mp4 |
225.33Мб |
261 |
1.11Мб |
261 User Education (OBJ 5.3).en.srt |
9.87Кб |
261 User Education (OBJ 5.3).mp4 |
88.88Мб |
262 |
1.77Мб |
262 Vendor Relationships (OBJ 5.3).en.srt |
18.59Кб |
262 Vendor Relationships (OBJ 5.3).mp4 |
167.16Мб |
263 |
762.14Кб |
263 Disposal Policies (OBJ 2.7 & 4.1).en.srt |
12.91Кб |
263 Disposal Policies (OBJ 2.7 & 4.1).mp4 |
110.05Мб |
264 |
264.86Кб |
264 IT Security Frameworks (OBJ 5.2).en.srt |
7.51Кб |
264 IT Security Frameworks (OBJ 5.2).mp4 |
71.12Мб |
265 |
737.06Кб |
265 __ Key Frameworks (OBJ 5.2).en.srt |
18.86Кб |
265 __ Key Frameworks (OBJ 5.2).mp4 |
77.23Мб |
266 |
1.40Мб |
266 Incident Response Procedures (OBJ 4.2).en.srt |
11.28Кб |
266 Incident Response Procedures (OBJ 4.2).mp4 |
99.10Мб |
267 |
1.43Мб |
267 __ Incident Response Planning (OBJ 4.2).en.srt |
43.77Кб |
267 __ Incident Response Planning (OBJ 4.2).mp4 |
113.29Мб |
268 |
211.42Кб |
268 __ Investigative Data (OBJ 4.3).en.srt |
29.59Кб |
268 __ Investigative Data (OBJ 4.3).mp4 |
74.72Мб |
269 |
1.40Мб |
269 __ Forensic Procedures (OBJ 4.5).en.srt |
33.95Кб |
269 __ Forensic Procedures (OBJ 4.5).mp4 |
82.94Мб |
27 |
1.36Мб |
270 |
1012.30Кб |
270 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt |
19.67Кб |
270 Data Collection Procedures (OBJ 4.1 & 4.5).mp4 |
101.16Мб |
271 |
1.47Мб |
271 Demo_ Disk Imaging (OBJ 4.1).en.srt |
14.25Кб |
271 Demo_ Disk Imaging (OBJ 4.1).mp4 |
63.03Мб |
272 |
68.99Кб |
272 __ Security Tools (OBJ 4.1).en.srt |
49.79Кб |
272 __ Security Tools (OBJ 4.1).mp4 |
134.28Мб |
273 |
1.24Мб |
273 Conclusion.en.srt |
23.11Кб |
273 Conclusion.mp4 |
212.10Мб |
274 BONUS_ What's Next_.en.srt |
9.18Кб |
274 BONUS_ What's Next_.mp4 |
76.89Мб |
28 |
168.62Кб |
29 |
366.36Кб |
3 |
634.15Кб |
30 |
1.34Мб |
31 |
1.72Мб |
32 |
1.96Мб |
33 |
1.16Кб |
34 |
1.80Мб |
35 |
1.31Мб |
36 |
271.75Кб |
37 |
1.16Мб |
38 |
1.49Мб |
39 |
593.43Кб |
4 |
64.47Кб |
40 |
1.32Мб |
41 |
1.82Мб |
42 |
827.69Кб |
43 |
343.51Кб |
44 |
1.71Мб |
45 |
54.61Кб |
46 |
1.67Мб |
47 |
1.18Мб |
48 |
722.12Кб |
49 |
1.26Мб |
5 |
1.24Мб |
50 |
1.95Мб |
51 |
588.88Кб |
52 |
1.71Мб |
53 |
57.90Кб |
54 |
376.39Кб |
55 |
1.27Мб |
56 |
234.08Кб |
57 |
762.61Кб |
58 |
1.11Мб |
59 |
615.11Кб |
6 |
1.41Мб |
60 |
705.34Кб |
61 |
1.62Мб |
62 |
249.18Кб |
63 |
526.14Кб |
64 |
863.73Кб |
65 |
1.69Мб |
66 |
469.31Кб |
67 |
920.29Кб |
68 |
1.58Мб |
69 |
760.12Кб |
7 |
1.85Мб |
70 |
1017.00Кб |
71 |
1.12Мб |
72 |
1.44Мб |
73 |
1.77Мб |
74 |
302.44Кб |
75 |
1.49Мб |
76 |
3.58Кб |
77 |
846.36Кб |
78 |
1.63Мб |
79 |
1.87Мб |
8 |
728.58Кб |
80 |
330.76Кб |
81 |
452.31Кб |
82 |
509.45Кб |
83 |
518.96Кб |
84 |
578.80Кб |
85 |
605.94Кб |
86 |
611.88Кб |
87 |
198.34Кб |
88 |
1.12Мб |
89 |
1.87Мб |
9 |
390.33Кб |
90 |
324.82Кб |
91 |
1.31Мб |
92 |
1.83Мб |
93 |
900.25Кб |
94 |
1014.46Кб |
95 |
1.91Мб |
96 |
584.75Кб |
97 |
1.06Мб |
98 |
1.56Мб |
99 |
162.64Кб |
external-assets-links.txt |
157б |
TutsNode.com.txt |
63б |