Общая информация
Название CompTIA Security+ (SY0-501 & SY0-601) Complete Course & Exam
Тип Приложение для PC
Размер 20.49Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0
001 Welcome.en.srt 12.11Кб
001 Welcome.mp4 91.41Мб
002 CompTIA-Security-601-Study-Guide.pdf 22.89Мб
002 CompTIA-Security-Study-Notes-501.pdf 19.28Мб
002 Download the Study Guide.html 1.09Кб
003 Overview of Security.en.srt 6.80Кб
003 Overview of Security.mp4 64.44Мб
004 CIA Triad.en.srt 8.66Кб
004 CIA Triad.mp4 74.47Мб
005 AAA of Security (OBJ 2.4).en.srt 7.07Кб
005 AAA of Security (OBJ 2.4).mp4 59.85Мб
006 Security Threats (OBJ 1.1 & 1.2).en.srt 6.24Кб
006 Security Threats (OBJ 1.1 & 1.2).mp4 64.17Мб
007 Mitigating Threats (OBJ 5.1).en.srt 5.92Кб
007 Mitigating Threats (OBJ 5.1).mp4 56.32Мб
008 Hackers (OBJ 1.5).en.srt 10.42Кб
008 Hackers (OBJ 1.5).mp4 104.89Мб
009 Threat Actors (1.5).en.srt 6.80Кб
009 Threat Actors (1.5).mp4 68.27Мб
010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt 20.59Кб
010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 58.00Мб
011 __ Threat Hunting (OBJ 1.7).en.srt 16.03Кб
011 __ Threat Hunting (OBJ 1.7).mp4 42.98Мб
012 __ Attack Frameworks (OBJ 4.2).en.srt 26.01Кб
012 __ Attack Frameworks (OBJ 4.2).mp4 87.68Мб
013 Malware (OBJ 1.2).en.srt 1.26Кб
013 Malware (OBJ 1.2).mp4 15.01Мб
014 Viruses (OBJ 1.2).en.srt 13.35Кб
014 Viruses (OBJ 1.2).mp4 134.66Мб
015 Worms (OBJ 1.2).en.srt 4.41Кб
015 Worms (OBJ 1.2).mp4 47.86Мб
016 Trojans (OBJ 1.2).en.srt 7.20Кб
016 Trojans (OBJ 1.2).mp4 62.50Мб
017 Demo_ Viruses and Trojans (OBJ 1.2).en.srt 13.37Кб
017 Demo_ Viruses and Trojans (OBJ 1.2).mp4 91.56Мб
018 Ransomware (OBJ 1.2).en.srt 5.21Кб
018 Ransomware (OBJ 1.2).mp4 53.37Мб
019 Spyware (OBJ 1.2).en.srt 5.70Кб
019 Spyware (OBJ 1.2).mp4 58.14Мб
020 Rootkits (OBJ 1.2 & 1.3).en.srt 7.20Кб
020 Rootkits (OBJ 1.2 & 1.3).mp4 75.59Мб
021 Spam (OBJ 1.1).en.srt 6.14Кб
021 Spam (OBJ 1.1).mp4 65.14Мб
022 Summary of Malware.en.srt 4.40Кб
022 Summary of Malware.mp4 44.67Мб
023 Malware Infections.en.srt 8.93Кб
023 Malware Infections.mp4 93.17Мб
024 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt 9.72Кб
024 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 96.88Мб
025 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt 11.67Кб
025 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 49.92Мб
026 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt 7.50Кб
026 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 62.46Мб
027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt 5.51Кб
027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 40.59Мб
028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt 11.88Кб
028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 75.49Мб
029 Backdoors and Logic Bombs (OBJ 1.2).en.srt 8.30Кб
029 Backdoors and Logic Bombs (OBJ 1.2).mp4 84.09Мб
030 Symptoms of Infection (OBJ 1.2).en.srt 9.18Кб
030 Symptoms of Infection (OBJ 1.2).mp4 91.40Мб
031 Removing Malware (OBJ 4.2).en.srt 11.31Кб
031 Removing Malware (OBJ 4.2).mp4 108.29Мб
032 Preventing Malware (OBJ 1.6 & 3.2).en.srt 12.80Кб
032 Preventing Malware (OBJ 1.6 & 3.2).mp4 128.84Мб
033 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt 18.25Кб
033 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 39.54Мб
034 Security Applications and Devices.en.srt 1.18Кб
034 Security Applications and Devices.mp4 12.76Мб
035 Software Firewalls (OBJ 3.2).en.srt 8.57Кб
035 Software Firewalls (OBJ 3.2).mp4 91.43Мб
036 Demo_ Software Firewalls (OBJ 3.2).en.srt 14.21Кб
036 Demo_ Software Firewalls (OBJ 3.2).mp4 61.53Мб
037 IDS (OBJ 3.2 & 3.3).en.srt 10.78Кб
037 IDS (OBJ 3.2 & 3.3).mp4 105.77Мб
038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt 6.95Кб
038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4 66.62Мб
039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt 8.13Кб
039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4 81.64Мб
040 Securing the BIOS (OBJ 3.2).en.srt 8.53Кб
040 Securing the BIOS (OBJ 3.2).mp4 86.17Мб
041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt 7.10Кб
041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4 73.04Мб
042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt 9.57Кб
042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4 106.73Мб
043 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt 12.65Кб
043 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4 52.40Мб
044 Mobile Device Security (OBJ 1.5).en.srt 2.76Кб
044 Mobile Device Security (OBJ 1.5).mp4 28.44Мб
045 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt 2.87Кб
045 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4 33.55Мб
046 Mobile Malware (OBJ 1.1 & 3.5).en.srt 14.02Кб
046 Mobile Malware (OBJ 1.1 & 3.5).mp4 139.49Мб
047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt 8.69Кб
047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4 86.69Мб
048 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt 4.36Кб
048 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4 47.75Мб
049 Mobile Device Theft (OBJ 3.5).en.srt 6.86Кб
049 Mobile Device Theft (OBJ 3.5).mp4 69.78Мб
050 Security of Apps (OBJ 3.1 & 3.5).en.srt 11.01Кб
050 Security of Apps (OBJ 3.1 & 3.5).mp4 109.42Мб
051 BYOD (OBJ 3.5).en.srt 10.69Кб
051 BYOD (OBJ 3.5).mp4 107.63Мб
052 Hardening Mobile Devices (OBJ 3.5).en.srt 7.62Кб
052 Hardening Mobile Devices (OBJ 3.5).mp4 81.84Мб
053 Hardening (OBJ 3.2).en.srt 3.67Кб
053 Hardening (OBJ 3.2).mp4 39.72Мб
054 Unnecessary Applications (OBJ 1.6).en.srt 6.52Кб
054 Unnecessary Applications (OBJ 1.6).mp4 69.15Мб
055 Restricting Applications (OBJ 3.2 & 4.4).en.srt 6.31Кб
055 Restricting Applications (OBJ 3.2 & 4.4).mp4 61.92Мб
056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt 11.27Кб
056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4 62.36Мб
057 Trusted Operating System (OBJ 3.2).en.srt 3.94Кб
057 Trusted Operating System (OBJ 3.2).mp4 42.64Мб
058 Updates and Patches (OBJ 1.6 & 3.2).en.srt 6.93Кб
058 Updates and Patches (OBJ 1.6 & 3.2).mp4 74.21Мб
059 Patch Management (OBJ 1.6 & 3.2).en.srt 8.01Кб
059 Patch Management (OBJ 1.6 & 3.2).mp4 83.43Мб
060 Group Policies (OBJ 2.1).en.srt 5.14Кб
060 Group Policies (OBJ 2.1).mp4 56.44Мб
061 Demo_ Group Policies (OBJ 3.2).en.srt 8.28Кб
061 Demo_ Group Policies (OBJ 3.2).mp4 30.89Мб
062 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt 6.57Кб
062 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4 69.02Мб
063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt 13.20Кб
063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4 42.60Мб
064 __ Root of Trust (OBJ 3.2).en.srt 10.60Кб
064 __ Root of Trust (OBJ 3.2).mp4 31.06Мб
065 __ Trusted Firmware (OBJ 3.2).en.srt 11.59Кб
065 __ Trusted Firmware (OBJ 3.2).mp4 33.00Мб
066 __ Secure Processing (OBJ 3.2).en.srt 8.96Кб
066 __ Secure Processing (OBJ 3.2).mp4 24.51Мб
067 Virtualization (OBJ 2.2).en.srt 4.56Кб
067 Virtualization (OBJ 2.2).mp4 46.65Мб
068 Hypervisors (OBJ 2.2).en.srt 5.27Кб
068 Hypervisors (OBJ 2.2).mp4 57.45Мб
069 Demo_ How to create a VM (OBJ 2.2).en.srt 8.35Кб
069 Demo_ How to create a VM (OBJ 2.2).mp4 38.72Мб
070 Threats to VMs (OBJ 2.2).en.srt 7.83Кб
070 Threats to VMs (OBJ 2.2).mp4 80.93Мб
071 Securing VMs (OBJ 2.2).en.srt 8.15Кб
071 Securing VMs (OBJ 2.2).mp4 82.44Мб
072 Demo_ Securing VMs.en.srt 9.24Кб
072 Demo_ Securing VMs.mp4 43.11Мб
073 Application Security.en.srt 3.68Кб
073 Application Security.mp4 38.61Мб
074 Web Browser Security (OBJ 3.2 & 3.3).en.srt 15.51Кб
074 Web Browser Security (OBJ 3.2 & 3.3).mp4 145.13Мб
075 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt 7.37Кб
075 Web Browser Concerns (OBJ 3.2 & 3.3).mp4 71.04Мб
076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt 11.47Кб
076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4 46.06Мб
077 Securing Applications (OBJ 1.4 & 3.2).en.srt 10.09Кб
077 Securing Applications (OBJ 1.4 & 3.2).mp4 101.49Мб
078 Software Development (OBJ 2.1 & 2.3).en.srt 19.35Кб
078 Software Development (OBJ 2.1 & 2.3).mp4 188.76Мб
079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt 13.75Кб
079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4 136.96Мб
080 Testing Methods (OBJ 2.3 & 3.2).en.srt 15.01Кб
080 Testing Methods (OBJ 2.3 & 3.2).mp4 151.04Мб
081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt 8.06Кб
081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4 80.73Мб
082 Buffer Overflows (OBJ 1.3).en.srt 13.56Кб
082 Buffer Overflows (OBJ 1.3).mp4 135.64Мб
083 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt 12.61Кб
083 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4 101.76Мб
084 XSS and XSRF (OBJ 1.3).en.srt 6.76Кб
084 XSS and XSRF (OBJ 1.3).mp4 68.72Мб
085 SQL Injection (OBJ 1.3).en.srt 13.22Кб
085 SQL Injection (OBJ 1.3).mp4 141.47Мб
086 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt 14.12Кб
086 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4 74.85Мб
087 __ XML Vulnerabilities (OBJ 1.3).en.srt 11.52Кб
087 __ XML Vulnerabilities (OBJ 1.3).mp4 49.28Мб
088 __ Race Conditions (OBJ 1.3).en.srt 13.55Кб
088 __ Race Conditions (OBJ 1.3).mp4 34.59Мб
089 __ Design Vulnerabilities (OBJ 1.3).en.srt 9.95Кб
089 __ Design Vulnerabilities (OBJ 1.3).mp4 26.86Мб
090 Network Security.en.srt 1.73Кб
090 Network Security.mp4 16.60Мб
091 The OSI Model (OBJ 3.3 & 3.6).en.srt 12.99Кб
091 The OSI Model (OBJ 3.3 & 3.6).mp4 128.51Мб
092 Switches (OBJ 1.4 & 2.7).en.srt 7.75Кб
092 Switches (OBJ 1.4 & 2.7).mp4 77.26Мб
093 Routers (OBJ 3.3).en.srt 5.38Кб
093 Routers (OBJ 3.3).mp4 54.31Мб
094 Network Zones (OBJ 3.3).en.srt 7.42Кб
094 Network Zones (OBJ 3.3).mp4 69.46Мб
095 __ Jumpbox (OBJ 3.5).en.srt 13.58Кб
095 __ Jumpbox (OBJ 3.5).mp4 35.05Мб
096 Network Access Control (OBJ 3.3 & 4.4).en.srt 6.10Кб
096 Network Access Control (OBJ 3.3 & 4.4).mp4 56.67Мб
097 VLANs (OBJ 3.3).en.srt 3.17Кб
097 VLANs (OBJ 3.3).mp4 33.11Мб
098 Subnetting (OBJ 3.6).en.srt 4.38Кб
098 Subnetting (OBJ 3.6).mp4 41.36Мб
099 Network Address Translation (OBJ 3.3).en.srt 5.10Кб
099 Network Address Translation (OBJ 3.3).mp4 52.66Мб
1 29б
10 1.78Мб
100 366.29Кб
100 Telephony (OBJ 3.1).en.srt 13.76Кб
100 Telephony (OBJ 3.1).mp4 130.69Мб
101 667.45Кб
101 Perimeter Security.en.srt 1.83Кб
101 Perimeter Security.mp4 17.79Мб
102 999.90Кб
102 Firewalls (OBJ 3.3 & 4.4).en.srt 17.87Кб
102 Firewalls (OBJ 3.3 & 4.4).mp4 175.29Мб
103 1.07Мб
103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt 8.58Кб
103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4 28.93Мб
104 1.27Мб
104 Proxy Servers (OBJ 3.3 & 4.4).en.srt 9.51Кб
104 Proxy Servers (OBJ 3.3 & 4.4).mp4 91.68Мб
105 189.96Кб
105 Honeypots and Honeynets (OBJ 2.1).en.srt 3.12Кб
105 Honeypots and Honeynets (OBJ 2.1).mp4 30.69Мб
106 472.38Кб
106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt 3.39Кб
106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4 35.35Мб
107 653.85Кб
107 NIDS and NIPS (OBJ 3.3).en.srt 9.69Кб
107 NIDS and NIPS (OBJ 3.3).mp4 92.37Мб
108 759.03Кб
108 Unified Threat Management (OBJ 3.2 & 3.3).en.srt 3.91Кб
108 Unified Threat Management (OBJ 3.2 & 3.3).mp4 41.62Мб
109 786.48Кб
109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt 8.22Кб
109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4 76.42Мб
11 858.18Кб
110 1.11Мб
110 Cloud Types (OBJ 2.2 & 3.6).en.srt 5.93Кб
110 Cloud Types (OBJ 2.2 & 3.6).mp4 63.19Мб
111 1.39Мб
111 As a Service (OBJ 2.2).en.srt 16.19Кб
111 As a Service (OBJ 2.2).mp4 154.35Мб
112 1.58Мб
112 Cloud Security (OBJ 2.5 & 3.6).en.srt 5.43Кб
112 Cloud Security (OBJ 2.5 & 3.6).mp4 53.42Мб
113 424.43Кб
113 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt 10.36Кб
113 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4 99.54Мб
114 522.11Кб
114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt 16.99Кб
114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4 50.91Мб
115 803.78Кб
115 __ CASB (OBJ 2.1).en.srt 10.33Кб
115 __ CASB (OBJ 2.1).mp4 29.81Мб
116 1.15Мб
116 __ API (OBJ 2.1).en.srt 14.04Кб
116 __ API (OBJ 2.1).mp4 40.62Мб
117 1.28Мб
117 __ FAAS and Serverless (OBJ 2.2).en.srt 19.03Кб
117 __ FAAS and Serverless (OBJ 2.2).mp4 51.28Мб
118 1.34Мб
118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt 19.22Кб
118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4 40.96Мб
119 1.53Мб
119 __ Workflow Orchestration (OBJ 2.3).en.srt 9.60Кб
119 __ Workflow Orchestration (OBJ 2.3).mp4 24.11Мб
12 1.85Мб
120 1.79Мб
120 __ CI_CD (OBJ 2.3).en.srt 16.98Кб
120 __ CI_CD (OBJ 2.3).mp4 48.32Мб
121 981.79Кб
121 __ DevSecOps (OBJ 2.3).en.srt 11.94Кб
121 __ DevSecOps (OBJ 2.3).mp4 31.38Мб
122 904.02Кб
122 __ IAC (OBJ 2.2).en.srt 10.20Кб
122 __ IAC (OBJ 2.2).mp4 29.60Мб
123 986.41Кб
123 __ Machine Learning (OBJ 1.2).en.srt 20.29Кб
123 __ Machine Learning (OBJ 1.2).mp4 68.01Мб
124 1.36Мб
124 Network Attacks (OBJ 1.4).en.srt 1.42Кб
124 Network Attacks (OBJ 1.4).mp4 14.53Мб
125 229.72Кб
125 Ports and Protocols (OBJ 3.1).en.srt 9.33Кб
125 Ports and Protocols (OBJ 3.1).mp4 95.70Мб
126 557.95Кб
126 Memorization of Ports (OBJ 3.1).en.srt 23.57Кб
126 Memorization of Ports (OBJ 3.1).mp4 238.39Мб
127 866.91Кб
127 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt 7.70Кб
127 Unnecessary Ports (OBJ 1.6 & 3.2).mp4 75.22Мб
128 1003.36Кб
128 Denial of Service (OBJ 1.3 & 1.4).en.srt 18.47Кб
128 Denial of Service (OBJ 1.3 & 1.4).mp4 170.22Мб
129 1.01Мб
129 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt 3.50Кб
129 DDoS (OBJ 1.2, 1.3, & 1.4).mp4 33.73Мб
13 985.37Кб
130 1.28Мб
130 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt 5.56Кб
130 Stopping a DDoS (OBJ 2.1 & 2.3).mp4 52.44Мб
131 1.31Мб
131 Spoofing (OBJ 1.4 & 3.3).en.srt 2.96Кб
131 Spoofing (OBJ 1.4 & 3.3).mp4 28.53Мб
132 1.73Мб
132 Hijacking (OBJ 1.3 & 1.4).en.srt 8.92Кб
132 Hijacking (OBJ 1.3 & 1.4).mp4 74.66Мб
133 1.99Мб
133 Replay Attack (OBJ 1.3).en.srt 3.39Кб
133 Replay Attack (OBJ 1.3).mp4 32.02Мб
134 1.38Мб
134 Demo_ Null Sessions (OBJ 1.6).en.srt 5.09Кб
134 Demo_ Null Sessions (OBJ 1.6).mp4 38.61Мб
135 133.40Кб
135 Transitive Attacks (OBJ 2.4).en.srt 3.36Кб
135 Transitive Attacks (OBJ 2.4).mp4 31.63Мб
136 881.10Кб
136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt 10.32Кб
136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4 96.23Мб
137 1.08Мб
137 ARP Poisoning (OBJ 1.4).en.srt 3.41Кб
137 ARP Poisoning (OBJ 1.4).mp4 32.57Мб
138 1.56Мб
138 Securing Networks (OBJ 3.3).en.srt 2.08Кб
138 Securing Networks (OBJ 3.3).mp4 18.57Мб
139 1.83Мб
139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt 15.95Кб
139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4 146.75Мб
14 1.65Мб
140 450.86Кб
140 Securing Network Media (OBJ 2.7).en.srt 19.89Кб
140 Securing Network Media (OBJ 2.7).mp4 189.94Мб
141 825.79Кб
141 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt 10.47Кб
141 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4 97.01Мб
142 993.00Кб
142 Wireless Encryption (OBJ 1.6 & 3.4).en.srt 12.21Кб
142 Wireless Encryption (OBJ 1.6 & 3.4).mp4 120.29Мб
143 1.29Мб
143 Wireless Access Points (OBJ 1.4 & 3.4).en.srt 16.94Кб
143 Wireless Access Points (OBJ 1.4 & 3.4).mp4 136.64Мб
144 1.50Мб
144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt 10.27Кб
144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4 91.49Мб
145 1.54Мб
145 Demo_ Wireless Attack (OBJ 1.4).en.srt 13.99Кб
145 Demo_ Wireless Attack (OBJ 1.4).mp4 103.31Мб
146 1.54Мб
146 __ WPA3 (OBJ 3.4).en.srt 12.74Кб
146 __ WPA3 (OBJ 3.4).mp4 39.08Мб
147 1.64Мб
147 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt 14.52Кб
147 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4 132.20Мб
148 78.58Кб
148 Physical Security (OBJ 2.7).en.srt 3.81Кб
148 Physical Security (OBJ 2.7).mp4 33.92Мб
149 477.10Кб
149 Surveillance (OBJ 2.7).en.srt 6.68Кб
149 Surveillance (OBJ 2.7).mp4 60.79Мб
15 982.02Кб
150 1.21Мб
150 Door Locks (OBJ 2.7).en.srt 9.50Кб
150 Door Locks (OBJ 2.7).mp4 85.01Мб
151 152.35Кб
151 Demo_ Lock Picking (OBJ 2.7).en.srt 3.58Кб
151 Demo_ Lock Picking (OBJ 2.7).mp4 36.73Мб
152 578.75Кб
152 Biometric Readers (OBJ 2.4).en.srt 9.58Кб
152 Biometric Readers (OBJ 2.4).mp4 92.13Мб
153 1.86Мб
153 Facilities Security (OBJ 2.7).en.srt 1.49Кб
153 Facilities Security (OBJ 2.7).mp4 13.93Мб
154 4.16Кб
154 Fire Suppression (OBJ 2.7).en.srt 13.99Кб
154 Fire Suppression (OBJ 2.7).mp4 138.65Мб
155 568.29Кб
155 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt 5.33Кб
155 HVAC (OBJ 2.5, 2.6, & 2.7).mp4 53.25Мб
156 673.57Кб
156 Shielding (OBJ 2.7).en.srt 5.65Кб
156 Shielding (OBJ 2.7).mp4 55.21Мб
157 1.33Мб
157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt 4.77Кб
157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4 43.89Мб
158 1.56Мб
158 __ IoT Vulnerabilities (OBJ 2.6).en.srt 8.66Кб
158 __ IoT Vulnerabilities (OBJ 2.6).mp4 29.61Мб
159 1.68Мб
159 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt 16.40Кб
159 __ Embedded System Vulnerabilities (OBJ 2.6).mp4 47.93Мб
16 997.80Кб
160 403.05Кб
160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt 18.85Кб
160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4 49.63Мб
161 811.26Кб
161 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt 8.39Кб
161 __ Mitigating Vulnerabilities (OBJ 2.6).mp4 22.23Мб
162 1.24Мб
162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt 14.92Кб
162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4 47.82Мб
163 1.60Мб
163 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt 14.81Кб
163 Authentication (OBJ 2.4, 3.5, & 3.8).mp4 129.73Мб
164 1.69Мб
164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt 11.42Кб
164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4 112.74Мб
165 330.99Кб
165 802.1x (OBJ 3.4 & 3.8).en.srt 7.76Кб
165 802.1x (OBJ 3.4 & 3.8).mp4 79.81Мб
166 590.14Кб
166 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt 5.17Кб
166 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4 53.68Мб
167 645.42Кб
167 Remote Desktop Services (OBJ 3.1).en.srt 3.87Кб
167 Remote Desktop Services (OBJ 3.1).mp4 40.36Мб
168 765.14Кб
168 Remote Access Service (OBJ 3.1 & 3.8).en.srt 4.47Кб
168 Remote Access Service (OBJ 3.1 & 3.8).mp4 44.42Мб
169 1.16Мб
169 VPN (OBJ 3.3).en.srt 6.78Кб
169 VPN (OBJ 3.3).mp4 63.56Мб
17 1.25Мб
170 1.34Мб
170 RADIUS vs TACACS+ (OBJ 3.8).en.srt 4.71Кб
170 RADIUS vs TACACS+ (OBJ 3.8).mp4 49.87Мб
171 1.56Мб
171 Authentication Summary (OBJ 3.8).en.srt 3.81Кб
171 Authentication Summary (OBJ 3.8).mp4 43.71Мб
172 1.60Мб
172 __ Authentication Attacks (OBJ 1.2).en.srt 17.28Кб
172 __ Authentication Attacks (OBJ 1.2).mp4 42.44Мб
173 1.62Мб
173 Access Control (OBJ 3.8).en.srt 2.22Кб
173 Access Control (OBJ 3.8).mp4 18.60Мб
174 741.75Кб
174 Access Control Models (OBJ 3.8).en.srt 20.82Кб
174 Access Control Models (OBJ 3.8).mp4 176.15Мб
175 875.31Кб
175 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt 14.23Кб
175 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4 126.18Мб
176 1.09Мб
176 Users and Groups (OBJ 3.7 & 3.8).en.srt 22.02Кб
176 Users and Groups (OBJ 3.7 & 3.8).mp4 201.38Мб
177 1.30Мб
177 Permissions (OBJ 3.8).en.srt 8.89Кб
177 Permissions (OBJ 3.8).mp4 81.02Мб
178 84.85Кб
178 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt 6.05Кб
178 Usernames and Passwords (OBJ 1.6 & 3.7).mp4 55.61Мб
179 135.65Кб
179 Demo_ Policies (OBJ 3.7).en.srt 10.49Кб
179 Demo_ Policies (OBJ 3.7).mp4 32.95Мб
18 647.85Кб
180 381.01Кб
180 User Account Control (OBJ 3.7 & 3.8).en.srt 4.57Кб
180 User Account Control (OBJ 3.7 & 3.8).mp4 40.83Мб
181 732.36Кб
181 Risk Assessments (OBJ 5.4).en.srt 20.23Кб
181 Risk Assessments (OBJ 5.4).mp4 188.59Мб
182 1.42Мб
182 Qualitative Risk (OBJ 5.4).en.srt 10.07Кб
182 Qualitative Risk (OBJ 5.4).mp4 91.50Мб
183 1.66Мб
183 Quantitative Risk (OBJ 5.4).en.srt 11.69Кб
183 Quantitative Risk (OBJ 5.4).mp4 119.95Мб
184 1.68Мб
184 Methodologies (OBJ 1.7 & 5.4).en.srt 6.52Кб
184 Methodologies (OBJ 1.7 & 5.4).mp4 59.43Мб
185 52.59Кб
185 Security Controls (OBJ 5.1).en.srt 15.72Кб
185 Security Controls (OBJ 5.1).mp4 149.03Мб
186 69.25Кб
186 __ Types of Risk (OBJ 1.6 & 5.4).en.srt 16.78Кб
186 __ Types of Risk (OBJ 1.6 & 5.4).mp4 54.76Мб
187 140.94Кб
187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt 18.54Кб
187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4 171.62Мб
188 185.58Кб
188 Penetration Testing (OBJ 1.8).en.srt 10.64Кб
188 Penetration Testing (OBJ 1.8).mp4 98.42Мб
189 259.12Кб
189 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt 11.76Кб
189 __ Training and Exercises (OBJ 1.8 & 4.2).mp4 32.48Мб
19 888.56Кб
190 261.39Кб
190 OVAL (OBJ 1.7).en.srt 3.66Кб
190 OVAL (OBJ 1.7).mp4 32.66Мб
191 1.33Мб
191 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt 15.98Кб
191 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4 139.57Мб
192 1.35Мб
192 Demo_ Nmap Scanning (OBJ 4.1).en.srt 16.11Кб
192 Demo_ Nmap Scanning (OBJ 4.1).mp4 97.26Мб
193 1.94Мб
193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt 20.43Кб
193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4 96.56Мб
194 1.33Мб
194 Password Analysis (OBJ 1.2).en.srt 13.77Кб
194 Password Analysis (OBJ 1.2).mp4 127.42Мб
195 1.58Мб
195 Demo_ Password Cracking (OBJ 4.1).en.srt 5.11Кб
195 Demo_ Password Cracking (OBJ 4.1).mp4 39.04Мб
196 112.42Кб
196 Monitoring Types (OBJ 3.3).en.srt 6.47Кб
196 Monitoring Types (OBJ 3.3).mp4 62.46Мб
197 299.99Кб
197 Performance Baselining (OBJ 2.1).en.srt 11.00Кб
197 Performance Baselining (OBJ 2.1).mp4 102.38Мб
198 911.58Кб
198 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt 6.75Кб
198 Protocol Analyzers (OBJ 3.3 & 4.1).mp4 64.92Мб
199 1.02Мб
199 SNMP (OBJ 3.1).en.srt 8.04Кб
199 SNMP (OBJ 3.1).mp4 79.36Мб
2 1.39Мб
20 1.50Мб
200 1.30Мб
200 Demo_ Analytical Tools (OBJ 4.1).en.srt 9.77Кб
200 Demo_ Analytical Tools (OBJ 4.1).mp4 48.58Мб
201 1.36Мб
201 Auditing (OBJ 1.7).en.srt 4.48Кб
201 Auditing (OBJ 1.7).mp4 42.70Мб
202 1.39Мб
202 Demo_ Auditing Files (OBJ 1.7).en.srt 8.07Кб
202 Demo_ Auditing Files (OBJ 1.7).mp4 52.84Мб
203 1.40Мб
203 Logging (OBJ 1.7, 4.3, & 4.5).en.srt 8.28Кб
203 Logging (OBJ 1.7, 4.3, & 4.5).mp4 79.54Мб
204 1.51Мб
204 Log Files (OBJ 4.3).en.srt 11.74Кб
204 Log Files (OBJ 4.3).mp4 114.82Мб
205 1.56Мб
205 SIEM (OBJ 1.7 & 4.3).en.srt 19.92Кб
205 SIEM (OBJ 1.7 & 4.3).mp4 65.87Мб
206 1.85Мб
206 __ Syslog (OBJ 1.7 & 4.3).en.srt 12.91Кб
206 __ Syslog (OBJ 1.7 & 4.3).mp4 42.49Мб
207 393.09Кб
207 __ SOAR (OBJ 1.7 & 4.4).en.srt 7.88Кб
207 __ SOAR (OBJ 1.7 & 4.4).mp4 21.26Мб
208 651.64Кб
208 Cryptography (OBJ 2.1 & 2.8).en.srt 12.10Кб
208 Cryptography (OBJ 2.1 & 2.8).mp4 107.94Мб
209 752.26Кб
209 Symmetric vs Asymmetric (OBJ 2.8).en.srt 13.28Кб
209 Symmetric vs Asymmetric (OBJ 2.8).mp4 134.00Мб
21 544.99Кб
210 1.04Мб
210 Symmetric Algorithms (OBJ 2.8).en.srt 10.20Кб
210 Symmetric Algorithms (OBJ 2.8).mp4 103.40Мб
211 1.17Мб
211 Public Key Cryptography (OBJ 2.8).en.srt 7.16Кб
211 Public Key Cryptography (OBJ 2.8).mp4 52.38Мб
212 1.38Мб
212 Asymmetric Algorithms (OBJ 2.8).en.srt 7.79Кб
212 Asymmetric Algorithms (OBJ 2.8).mp4 81.35Мб
213 1.41Мб
213 Pretty Good Privacy (OBJ 2.8).en.srt 3.38Кб
213 Pretty Good Privacy (OBJ 2.8).mp4 38.63Мб
214 1.64Мб
214 Key Management (OBJ 2.8).en.srt 5.45Кб
214 Key Management (OBJ 2.8).mp4 47.95Мб
215 1.90Мб
215 One-Time Pad (OBJ 2.8).en.srt 9.73Кб
215 One-Time Pad (OBJ 2.8).mp4 94.51Мб
216 286.95Кб
216 Demo_ Steganography (OBJ 2.8).en.srt 8.45Кб
216 Demo_ Steganography (OBJ 2.8).mp4 42.15Мб
217 472.22Кб
217 __ Cryptography Considerations (OBJ 2.8).en.srt 28.82Кб
217 __ Cryptography Considerations (OBJ 2.8).mp4 76.61Мб
218 686.88Кб
218 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt 17.03Кб
218 Hashing (OBJ 1.2, 2.8 & 3.2).mp4 166.15Мб
219 944.66Кб
219 Demo_ Hashing (OBJ 2.8).en.srt 5.86Кб
219 Demo_ Hashing (OBJ 2.8).mp4 38.54Мб
22 700.19Кб
220 987.39Кб
220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt 7.31Кб
220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4 70.64Мб
221 1.28Мб
221 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt 3.40Кб
221 Increasing Hash Security (OBJ 2.8 & 3.7).mp4 31.97Мб
222 1.37Мб
222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt 7.98Кб
222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4 51.15Мб
223 1.39Мб
223 Digital Certificates (OBJ 3.9).en.srt 15.76Кб
223 Digital Certificates (OBJ 3.9).mp4 144.50Мб
224 1.39Мб
224 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt 7.09Кб
224 Demo_ Certificates (OBJ 2.8 & 3.9).mp4 27.99Мб
225 1.46Мб
225 Certificate Authorities (OBJ 3.2 & 3.9).en.srt 9.32Кб
225 Certificate Authorities (OBJ 3.2 & 3.9).mp4 89.81Мб
226 1.66Мб
226 Web of Trust (OBJ 3.9).en.srt 6.32Кб
226 Web of Trust (OBJ 3.9).mp4 57.34Мб
227 1.85Мб
227 Security Protocols (OBJ 3.1).en.srt 879б
227 Security Protocols (OBJ 3.1).mp4 8.70Мб
228 1.27Мб
228 S_MIME (OBJ 3.1).en.srt 3.33Кб
228 S_MIME (OBJ 3.1).mp4 33.00Мб
229 662.72Кб
229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt 12.40Кб
229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4 121.66Мб
23 444.67Кб
230 976.98Кб
230 SSH (OBJ 3.1 & 4.1).en.srt 5.74Кб
230 SSH (OBJ 3.1 & 4.1).mp4 54.40Мб
231 1.41Мб
231 VPN Protocols (OBJ 3.1 & 3..3).en.srt 14.48Кб
231 VPN Protocols (OBJ 3.1 & 3..3).mp4 141.32Мб
232 78.55Кб
232 Demo_ Setting up a VPN (OBJ 3.3).en.srt 3.38Кб
232 Demo_ Setting up a VPN (OBJ 3.3).mp4 24.77Мб
233 280.13Кб
233 Planning for the Worst (OBJ 2.5 & 5.4).en.srt 5.10Кб
233 Planning for the Worst (OBJ 2.5 & 5.4).mp4 47.74Мб
234 463.33Кб
234 Redundant Power (OBJ 2.5).en.srt 7.36Кб
234 Redundant Power (OBJ 2.5).mp4 68.69Мб
235 906.95Кб
235 Backup Power (OBJ 2.5).en.srt 7.66Кб
235 Backup Power (OBJ 2.5).mp4 68.99Мб
236 1019.23Кб
236 Data Redundancy (OBJ 2.5).en.srt 10.11Кб
236 Data Redundancy (OBJ 2.5).mp4 100.31Мб
237 1023.66Кб
237 Demo_ RAIDs (OBJ 2.5).en.srt 8.08Кб
237 Demo_ RAIDs (OBJ 2.5).mp4 39.33Мб
238 1.05Мб
238 Network Redundancy (OBJ 2.5).en.srt 5.07Кб
238 Network Redundancy (OBJ 2.5).mp4 46.67Мб
239 1.34Мб
239 Server Redundancy (OBJ 2.5 &3.3).en.srt 3.94Кб
239 Server Redundancy (OBJ 2.5 &3.3).mp4 38.34Мб
24 522.85Кб
240 1.43Мб
240 Redundant Sites (OBJ 2.1).en.srt 5.76Кб
240 Redundant Sites (OBJ 2.1).mp4 50.70Мб
241 1.52Мб
241 Data Backup (OBJ 2.5).en.srt 6.57Кб
241 Data Backup (OBJ 2.5).mp4 62.71Мб
242 1.98Мб
242 Tape Rotation (OBJ 2.5).en.srt 8.96Кб
242 Tape Rotation (OBJ 2.5).mp4 85.12Мб
243 27.83Кб
243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt 14.21Кб
243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4 123.19Мб
244 383.21Кб
244 __ Business Impact Analysis (OBJ 5.4).en.srt 36.80Кб
244 __ Business Impact Analysis (OBJ 5.4).mp4 118.33Мб
245 631.41Кб
245 Social Engineering (OBJ 1.1).en.srt 2.06Кб
245 Social Engineering (OBJ 1.1).mp4 19.74Мб
246 957.74Кб
246 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt 11.88Кб
246 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4 94.00Мб
247 1.11Мб
247 Insider Threat (OBJ 1.5).en.srt 5.23Кб
247 Insider Threat (OBJ 1.5).mp4 48.34Мб
248 1.31Мб
248 Phishing (OBJ 1.1 & 5.3).en.srt 14.83Кб
248 Phishing (OBJ 1.1 & 5.3).mp4 135.84Мб
249 191.98Кб
249 __ Motivation Factors (OBJ 1.1).en.srt 17.44Кб
249 __ Motivation Factors (OBJ 1.1).mp4 159.04Мб
25 1.35Мб
250 394.84Кб
250 More Social Engineering (OBJ 1.1 & 1.2).en.srt 9.45Кб
250 More Social Engineering (OBJ 1.1 & 1.2).mp4 88.13Мб
251 411.03Кб
251 __ Fraud and Scams (OBJ 1.1).en.srt 12.45Кб
251 __ Fraud and Scams (OBJ 1.1).mp4 42.61Мб
252 1.07Мб
252 __ Influence Campaigns (OBJ 1.1).en.srt 9.55Кб
252 __ Influence Campaigns (OBJ 1.1).mp4 40.10Мб
253 1.47Мб
253 User Education (OBJ 5.3).en.srt 10.80Кб
253 User Education (OBJ 5.3).mp4 105.26Мб
254 1.56Мб
254 Policies and Procedures (OBJ 5.2 & 5.3).en.srt 13.36Кб
254 Policies and Procedures (OBJ 5.2 & 5.3).mp4 126.68Мб
255 12.94Кб
255 Data Classifications (OBJ 5.3 & 5.5).en.srt 16.38Кб
255 Data Classifications (OBJ 5.3 & 5.5).mp4 145.37Мб
256 1.14Мб
256 __ Data Ownership.en.srt 9.23Кб
256 __ Data Ownership.mp4 24.59Мб
257 1.23Мб
257 PII and PHI (OBJ 5.2 & 5.5).en.srt 13.77Кб
257 PII and PHI (OBJ 5.2 & 5.5).mp4 134.04Мб
258 1.41Мб
258 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt 13.53Кб
258 __ Legal Requirements (OBJ 5.2 & 5.5).mp4 41.27Мб
259 1.49Мб
259 __ Privacy Technologies (OBJ 5.5).en.srt 15.48Кб
259 __ Privacy Technologies (OBJ 5.5).mp4 38.15Мб
26 1.04Мб
260 1.89Мб
260 Security Policies (OBJ 5.3 & 5.5).en.srt 25.45Кб
260 Security Policies (OBJ 5.3 & 5.5).mp4 225.33Мб
261 1.11Мб
261 User Education (OBJ 5.3).en.srt 9.87Кб
261 User Education (OBJ 5.3).mp4 88.88Мб
262 1.77Мб
262 Vendor Relationships (OBJ 5.3).en.srt 18.59Кб
262 Vendor Relationships (OBJ 5.3).mp4 167.16Мб
263 762.14Кб
263 Disposal Policies (OBJ 2.7 & 4.1).en.srt 12.91Кб
263 Disposal Policies (OBJ 2.7 & 4.1).mp4 110.05Мб
264 264.86Кб
264 IT Security Frameworks (OBJ 5.2).en.srt 7.51Кб
264 IT Security Frameworks (OBJ 5.2).mp4 71.12Мб
265 737.06Кб
265 __ Key Frameworks (OBJ 5.2).en.srt 18.86Кб
265 __ Key Frameworks (OBJ 5.2).mp4 77.23Мб
266 1.40Мб
266 Incident Response Procedures (OBJ 4.2).en.srt 11.28Кб
266 Incident Response Procedures (OBJ 4.2).mp4 99.10Мб
267 1.43Мб
267 __ Incident Response Planning (OBJ 4.2).en.srt 43.77Кб
267 __ Incident Response Planning (OBJ 4.2).mp4 113.29Мб
268 211.42Кб
268 __ Investigative Data (OBJ 4.3).en.srt 29.59Кб
268 __ Investigative Data (OBJ 4.3).mp4 74.72Мб
269 1.40Мб
269 __ Forensic Procedures (OBJ 4.5).en.srt 33.95Кб
269 __ Forensic Procedures (OBJ 4.5).mp4 82.94Мб
27 1.36Мб
270 1012.30Кб
270 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt 19.67Кб
270 Data Collection Procedures (OBJ 4.1 & 4.5).mp4 101.16Мб
271 1.47Мб
271 Demo_ Disk Imaging (OBJ 4.1).en.srt 14.25Кб
271 Demo_ Disk Imaging (OBJ 4.1).mp4 63.03Мб
272 68.99Кб
272 __ Security Tools (OBJ 4.1).en.srt 49.79Кб
272 __ Security Tools (OBJ 4.1).mp4 134.28Мб
273 1.24Мб
273 Conclusion.en.srt 23.11Кб
273 Conclusion.mp4 212.10Мб
274 BONUS_ What's Next_.en.srt 9.18Кб
274 BONUS_ What's Next_.mp4 76.89Мб
28 168.62Кб
29 366.36Кб
3 634.15Кб
30 1.34Мб
31 1.72Мб
32 1.96Мб
33 1.16Кб
34 1.80Мб
35 1.31Мб
36 271.75Кб
37 1.16Мб
38 1.49Мб
39 593.43Кб
4 64.47Кб
40 1.32Мб
41 1.82Мб
42 827.69Кб
43 343.51Кб
44 1.71Мб
45 54.61Кб
46 1.67Мб
47 1.18Мб
48 722.12Кб
49 1.26Мб
5 1.24Мб
50 1.95Мб
51 588.88Кб
52 1.71Мб
53 57.90Кб
54 376.39Кб
55 1.27Мб
56 234.08Кб
57 762.61Кб
58 1.11Мб
59 615.11Кб
6 1.41Мб
60 705.34Кб
61 1.62Мб
62 249.18Кб
63 526.14Кб
64 863.73Кб
65 1.69Мб
66 469.31Кб
67 920.29Кб
68 1.58Мб
69 760.12Кб
7 1.85Мб
70 1017.00Кб
71 1.12Мб
72 1.44Мб
73 1.77Мб
74 302.44Кб
75 1.49Мб
76 3.58Кб
77 846.36Кб
78 1.63Мб
79 1.87Мб
8 728.58Кб
80 330.76Кб
81 452.31Кб
82 509.45Кб
83 518.96Кб
84 578.80Кб
85 605.94Кб
86 611.88Кб
87 198.34Кб
88 1.12Мб
89 1.87Мб
9 390.33Кб
90 324.82Кб
91 1.31Мб
92 1.83Мб
93 900.25Кб
94 1014.46Кб
95 1.91Мб
96 584.75Кб
97 1.06Мб
98 1.56Мб
99 162.64Кб
external-assets-links.txt 157б
TutsNode.com.txt 63б
Статистика распространения по странам
США (US) 4
Болгария (BG) 3
Великобритания (GB) 2
Россия (RU) 2
Швеция (SE) 2
Франция (FR) 2
Танзания (TZ) 1
Китай (CN) 1
Румыния (RO) 1
Нидерланды (NL) 1
Нигер (NE) 1
Украина (UA) 1
Южная Корея (KR) 1
Нигерия (NG) 1
Намибия (NA) 1
Бельгия (BE) 1
Канада (CA) 1
Всего 26
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент