Общая информация
Название [ CourseMega.com ] Udemy - Cyber Security Class - Asset Security & Security Engineering
Тип
Размер 5.54Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
1. Getting Started.mp4 11.03Мб
1. Getting Started.srt 2.59Кб
1. Introduction.mp4 2.20Мб
1. Introduction.mp4 53.52Мб
1. Introduction.mp4 19.30Мб
1. Introduction.mp4 27.65Мб
1. Introduction.mp4 16.85Мб
1. Introduction.mp4 8.36Мб
1. Introduction.mp4 34.45Мб
1. Introduction.mp4 14.68Мб
1. Introduction.mp4 13.43Мб
1. Introduction.mp4 17.12Мб
1. Introduction.mp4 24.31Мб
1. Introduction.mp4 60.79Мб
1. Introduction.mp4 3.37Мб
1. Introduction.mp4 38.23Мб
1. Introduction.mp4 36.36Мб
1. Introduction.mp4 15.62Мб
1. Introduction.srt 677б
1. Introduction.srt 11.10Кб
1. Introduction.srt 5.37Кб
1. Introduction.srt 6.52Кб
1. Introduction.srt 4.28Кб
1. Introduction.srt 1.98Кб
1. Introduction.srt 8.46Кб
1. Introduction.srt 3.64Кб
1. Introduction.srt 3.33Кб
1. Introduction.srt 4.57Кб
1. Introduction.srt 5.44Кб
1. Introduction.srt 12.40Кб
1. Introduction.srt 1.19Кб
1. Introduction.srt 9.20Кб
1. Introduction.srt 8.57Кб
1. Introduction.srt 4.13Кб
1. Introduction to Security Engineering.mp4 14.55Мб
1. Introduction to Security Engineering.srt 2.82Кб
1. Learning Retention Policies Data Must Be Securely Maintained - 1.mp4 22.57Мб
1. Learning Retention Policies Data Must Be Securely Maintained - 1.srt 5.60Кб
1. Summary.mp4 23.87Мб
1. Summary.mp4 18.40Мб
1. Summary.srt 8.31Кб
1. Summary.srt 5.20Кб
10. Learning Information Classification Apply Classification Labels.mp4 38.16Мб
10. Learning Information Classification Apply Classification Labels.srt 8.89Кб
10. Learning Information Systems Architecture Applications.mp4 42.20Мб
10. Learning Information Systems Architecture Applications.srt 8.13Кб
10. Learning Operating Systems Learning Security Kernel and Reference Monitor.mp4 41.53Мб
10. Learning Operating Systems Learning Security Kernel and Reference Monitor.srt 9.26Кб
10. Methods of Encryption Secure Sockets Layer.mp4 39.40Мб
10. Methods of Encryption Secure Sockets Layer.srt 10.91Кб
10. Methods of Encryption Understanding Boolean Logic.mp4 11.02Мб
10. Methods of Encryption Understanding Boolean Logic.srt 2.13Кб
10. Protecting Assets Learn About ASD.mp4 50.02Мб
10. Protecting Assets Learn About ASD.srt 10.72Кб
10. Section Outro.mp4 31.86Мб
10. Section Outro.srt 8.42Кб
10. Security Models Learning Brewer and Nash Model.mp4 15.31Мб
10. Security Models Learning Brewer and Nash Model.srt 3.30Кб
10. System and Computer Architecture Memory Types - 4.mp4 24.26Мб
10. System and Computer Architecture Memory Types - 4.srt 6.02Кб
11. Implement Protective and Monitoring Technologies - 1.mp4 29.80Мб
11. Implement Protective and Monitoring Technologies - 1.srt 6.61Кб
11. Learning Information Systems Architecture Understanding Database Types.mp4 32.77Мб
11. Learning Information Systems Architecture Understanding Database Types.srt 8.16Кб
11. Learning Operating Systems Operating System Security.mp4 42.59Мб
11. Learning Operating Systems Operating System Security.srt 10.03Кб
11. Methods of Encryption Exclusive OR (XOR).mp4 54.98Мб
11. Methods of Encryption Exclusive OR (XOR).srt 5.67Кб
11. Methods of Encryption Learning Asymmetric Key Algorithms.mp4 48.36Мб
11. Methods of Encryption Learning Asymmetric Key Algorithms.srt 9.50Кб
11. Protecting Assets Standards and Baselines.mp4 25.77Мб
11. Protecting Assets Standards and Baselines.srt 4.86Кб
11. Section Outro.mp4 63.50Мб
11. Section Outro.srt 13.25Кб
11. Security Models Learning the Trusted Computing Base.mp4 48.16Мб
11. Security Models Learning the Trusted Computing Base.srt 13.84Кб
12. Implement Protective and Monitoring Technologies - 2.mp4 27.60Мб
12. Implement Protective and Monitoring Technologies - 2.srt 6.41Кб
12. Learning Information Systems Architecture Object oriented - Database.mp4 30.38Мб
12. Learning Information Systems Architecture Object oriented - Database.srt 6.99Кб
12. Methods of Encryption Rivest Shamir Adleman.mp4 45.73Мб
12. Methods of Encryption Rivest Shamir Adleman.srt 9.24Кб
12. Methods of Encryption Understanding The Principles.mp4 31.33Мб
12. Methods of Encryption Understanding The Principles.srt 6.81Кб
12. Protecting Assets Learning System Configuration.mp4 57.56Мб
12. Protecting Assets Learning System Configuration.srt 11.41Кб
12. Section Outro.mp4 48.51Мб
12. Section Outro.srt 11.13Кб
12. Security Models The Trusted Computing Security Evaluation Criteria.mp4 20.13Мб
12. Security Models The Trusted Computing Security Evaluation Criteria.srt 4.10Кб
13. Learning Information Classification Data Classification - Provide Training.mp4 22.91Мб
13. Learning Information Classification Data Classification - Provide Training.srt 5.91Кб
13. Learning Information Systems Architecture Integrity.mp4 14.11Мб
13. Learning Information Systems Architecture Integrity.srt 3.03Кб
13. Methods of Encryption Crypto Machines.mp4 36.81Мб
13. Methods of Encryption Crypto Machines.srt 6.50Кб
13. Protecting Assets Understanding Configuration Management - 1.mp4 59.08Мб
13. Protecting Assets Understanding Configuration Management - 1.srt 12.27Кб
13. Section Outro.mp4 29.41Мб
13. Section Outro.srt 8.96Кб
13. Security Models The Requirements.mp4 23.17Мб
13. Security Models The Requirements.srt 6.90Кб
14. Learning Information Systems Architecture Redundancy.mp4 13.55Мб
14. Learning Information Systems Architecture Redundancy.srt 4.08Кб
14. Methods of Encryption Understanding The Ciphers.mp4 26.00Мб
14. Methods of Encryption Understanding The Ciphers.srt 6.92Кб
14. Protecting Assets Understanding Configuration Management - 2.mp4 63.96Мб
14. Protecting Assets Understanding Configuration Management - 2.srt 13.14Кб
14. Section Outro.mp4 18.95Мб
14. Section Outro.srt 4.76Кб
14. Security Models Information Technology Security Evaluation Criteria.mp4 19.68Мб
14. Security Models Information Technology Security Evaluation Criteria.srt 5.46Кб
15. Learning Information Systems Architecture Database Issues.mp4 21.52Мб
15. Learning Information Systems Architecture Database Issues.srt 4.49Кб
15. Methods of Encryption Data Encryption Standard (DES).mp4 38.32Мб
15. Methods of Encryption Data Encryption Standard (DES).srt 9.17Кб
15. Protecting Assets Handling Data & Removable Media.mp4 22.08Мб
15. Protecting Assets Handling Data & Removable Media.srt 4.91Кб
15. Section Outro.mp4 29.71Мб
15. Section Outro.srt 7.78Кб
16. Learning Information Systems Architecture Database Middleware - 1.mp4 41.22Мб
16. Learning Information Systems Architecture Database Middleware - 1.srt 7.91Кб
16. Methods of Encryption Advanced Encryption Standard (AES).mp4 40.95Мб
16. Methods of Encryption Advanced Encryption Standard (AES).srt 8.90Кб
16. Protecting Assets Learn and Understand Data Remanence - 1.mp4 22.21Мб
16. Protecting Assets Learn and Understand Data Remanence - 1.srt 5.60Кб
17. Learning Information Systems Architecture Database Middleware - 2.mp4 33.94Мб
17. Learning Information Systems Architecture Database Middleware - 2.srt 7.10Кб
17. Methods of Encryption Electronic Code Book Mode (ECB).mp4 16.93Мб
17. Methods of Encryption Electronic Code Book Mode (ECB).srt 3.84Кб
17. Protecting Assets Learn and Understand Data Remanence - 2.mp4 42.30Мб
17. Protecting Assets Learn and Understand Data Remanence - 2.srt 11.08Кб
18. Learning Information Systems Architecture Data warehouse and Data mart.mp4 27.49Мб
18. Learning Information Systems Architecture Data warehouse and Data mart.srt 5.20Кб
18. Methods of Encryption Cipher Block Chaining Mode (CBC).mp4 18.67Мб
18. Methods of Encryption Cipher Block Chaining Mode (CBC).srt 3.61Кб
18. Protecting Assets Tools to Securely Delete Content.mp4 52.72Мб
18. Protecting Assets Tools to Securely Delete Content.srt 8.70Кб
19. Learning Information Systems Architecture Data aggregation and Data mining.mp4 39.76Мб
19. Learning Information Systems Architecture Data aggregation and Data mining.srt 8.87Кб
19. Methods of Encryption Output Feedback Mode (OFB).mp4 28.88Мб
19. Methods of Encryption Output Feedback Mode (OFB).srt 6.41Кб
19. Section Outro.mp4 51.75Мб
19. Section Outro.srt 11.84Кб
2. Computing Systems Virtualization Virtual Machines.mp4 27.78Мб
2. Computing Systems Virtualization Virtual Machines.srt 6.03Кб
2. Cyber Security Threats.mp4 29.43Мб
2. Cyber Security Threats.srt 7.24Кб
2. Definitions and Concepts Cryptographic Services.mp4 22.99Мб
2. Definitions and Concepts Cryptographic Services.srt 5.31Кб
2. Information Life Cycle The Valuable Information Assets - 1.mp4 49.45Мб
2. Information Life Cycle The Valuable Information Assets - 1.srt 11.39Кб
2. Learning Information Classification Classifications Levels.mp4 35.11Мб
2. Learning Information Classification Classifications Levels.srt 9.30Кб
2. Learning Information Systems Architecture Mobile Device Management - 1.mp4 18.82Мб
2. Learning Information Systems Architecture Mobile Device Management - 1.srt 4.51Кб
2. Learning Layers of Responsibility Security Administrator.mp4 35.64Мб
2. Learning Layers of Responsibility Security Administrator.srt 8.59Кб
2. Learning Operating Systems User Mode & Kernel Mode.mp4 31.84Мб
2. Learning Operating Systems User Mode & Kernel Mode.srt 7.58Кб
2. Learning Retention Policies Data Must Be Securely Maintained - 2.mp4 34.22Мб
2. Learning Retention Policies Data Must Be Securely Maintained - 2.srt 8.06Кб
2. Learn More About Cryptography Public Key Infrastructure - 1.mp4 21.28Мб
2. Learn More About Cryptography Public Key Infrastructure - 1.srt 4.14Кб
2. Methods of Encryption Cryptographic Services.mp4 21.02Мб
2. Methods of Encryption Cryptographic Services.mp4 25.36Мб
2. Methods of Encryption Cryptographic Services.srt 3.93Кб
2. Methods of Encryption Cryptographic Services.srt 3.71Кб
2. Protecting Assets Administrative.mp4 14.47Мб
2. Protecting Assets Administrative.srt 4.00Кб
2. Security Models Models & Standards & Protocols.mp4 15.58Мб
2. Security Models Models & Standards & Protocols.srt 3.48Кб
2. System and Computer Architecture The Central Processing Unit.mp4 12.80Мб
2. System and Computer Architecture The Central Processing Unit.srt 2.89Кб
2. Understanding Attacks Cracking Crypto - 1.mp4 9.99Мб
2. Understanding Attacks Cracking Crypto - 1.srt 2.80Кб
2. Understanding Message Integrity Various Hashing Algorithms - 1.mp4 29.45Мб
2. Understanding Message Integrity Various Hashing Algorithms - 1.srt 5.86Кб
20. Learning Information Systems Architecture SSO For Web Applications.mp4 46.34Мб
20. Learning Information Systems Architecture SSO For Web Applications.srt 9.78Кб
20. Methods of Encryption Cipher Feedback Mode (CFB).mp4 18.40Мб
20. Methods of Encryption Cipher Feedback Mode (CFB).srt 3.79Кб
21. Learning Information Systems Architecture Learn and Understand Mobile Code.mp4 36.71Мб
21. Learning Information Systems Architecture Learn and Understand Mobile Code.srt 8.41Кб
21. Methods of Encryption Counter Mode (CTR).mp4 17.13Мб
21. Methods of Encryption Counter Mode (CTR).srt 4.58Кб
22. Learning Information Systems Architecture Cross site scripting attacks.mp4 46.23Мб
22. Learning Information Systems Architecture Cross site scripting attacks.srt 10.51Кб
22. Methods of Encryption Understanding MAC.mp4 28.27Мб
22. Methods of Encryption Understanding MAC.srt 4.55Кб
23. Learning Information Systems Architecture Java applets and ActiveX control.mp4 35.41Мб
23. Learning Information Systems Architecture Java applets and ActiveX control.srt 9.95Кб
23. Methods of Encryption Hash Message Authentication Code.mp4 59.80Мб
23. Methods of Encryption Hash Message Authentication Code.srt 8.28Кб
24. Learning Information Systems Architecture Web Application Issues - 1.mp4 20.73Мб
24. Learning Information Systems Architecture Web Application Issues - 1.srt 5.97Кб
24. Section Outro.mp4 27.09Мб
24. Section Outro.srt 4.95Кб
25. Learning Information Systems Architecture Web Application Issues - 2.mp4 14.97Мб
25. Learning Information Systems Architecture Web Application Issues - 2.srt 4.12Кб
26. Section Outro.mp4 13.40Мб
26. Section Outro.srt 2.54Кб
3. Computing Systems Virtualization Understanding Softwares.mp4 15.98Мб
3. Computing Systems Virtualization Understanding Softwares.srt 4.30Кб
3. Cyber Security Physical Security Goals.mp4 36.76Мб
3. Cyber Security Physical Security Goals.srt 9.72Кб
3. Definitions and Concepts Crypto to Protect the Data.mp4 23.61Мб
3. Definitions and Concepts Crypto to Protect the Data.srt 5.70Кб
3. Ensure Retention Policies Meet Compliance Requirements - 1.mp4 13.07Мб
3. Ensure Retention Policies Meet Compliance Requirements - 1.srt 2.88Кб
3. Information Life Cycle The Valuable Information Assets - 2.mp4 47.74Мб
3. Information Life Cycle The Valuable Information Assets - 2.srt 11.62Кб
3. Learning Information Systems Architecture Mobile Device Management - 2.mp4 28.41Мб
3. Learning Information Systems Architecture Mobile Device Management - 2.srt 6.84Кб
3. Learning Layers of Responsibility Data Owner & System Custodian.mp4 25.06Мб
3. Learning Layers of Responsibility Data Owner & System Custodian.srt 5.38Кб
3. Learning Operating Systems Learning the Architectures.mp4 42.01Мб
3. Learning Operating Systems Learning the Architectures.srt 8.54Кб
3. Learn More About Cryptography Public Key Infrastructure - 2.mp4 27.34Мб
3. Learn More About Cryptography Public Key Infrastructure - 2.srt 5.14Кб
3. Methods of Encryption Asymmetric Keys and Authentication.mp4 35.85Мб
3. Methods of Encryption Asymmetric Keys and Authentication.srt 6.87Кб
3. Methods of Encryption Symmetric Key Algorithms For Confidentiality.mp4 13.97Мб
3. Methods of Encryption Symmetric Key Algorithms For Confidentiality.srt 2.57Кб
3. Protecting Assets Technical.mp4 22.20Мб
3. Protecting Assets Technical.srt 5.66Кб
3. Security Models Three Foundational Models.mp4 29.93Мб
3. Security Models Three Foundational Models.srt 7.14Кб
3. System and Computer Architecture CPU Instruction Sets.mp4 15.97Мб
3. System and Computer Architecture CPU Instruction Sets.srt 3.52Кб
3. Understanding Attacks Cracking Crypto - 2.mp4 38.55Мб
3. Understanding Attacks Cracking Crypto - 2.srt 8.57Кб
3. Understanding Information Classification - 1.mp4 27.11Мб
3. Understanding Information Classification - 1.srt 6.44Кб
3. Understanding Message Integrity Various Hashing Algorithms - 2.mp4 38.48Мб
3. Understanding Message Integrity Various Hashing Algorithms - 2.srt 9.46Кб
4. Computing Systems Virtualization Virtual Desktop Infrastructure.mp4 31.39Мб
4. Computing Systems Virtualization Virtual Desktop Infrastructure.srt 7.97Кб
4. Cyber Security Perimeter Intrusion Detection.mp4 29.33Мб
4. Cyber Security Perimeter Intrusion Detection.srt 8.48Кб
4. Definitions and Concepts Learn and Understand Algorithms.mp4 20.62Мб
4. Definitions and Concepts Learn and Understand Algorithms.srt 4.77Кб
4. Ensure Retention Policies Meet Compliance Requirements - 2.mp4 12.49Мб
4. Ensure Retention Policies Meet Compliance Requirements - 2.srt 2.97Кб
4. Information Life Cycle What Allows Access.mp4 35.72Мб
4. Information Life Cycle What Allows Access.srt 8.74Кб
4. Learning Information Systems Architecture P2P Computing.mp4 15.30Мб
4. Learning Information Systems Architecture P2P Computing.srt 4.45Кб
4. Learning Layers of Responsibility Data Custodian & User.mp4 27.86Мб
4. Learning Layers of Responsibility Data Custodian & User.srt 6.51Кб
4. Learning Operating Systems Learning Kernel Mode Execution and Rootkits.mp4 36.55Мб
4. Learning Operating Systems Learning Kernel Mode Execution and Rootkits.srt 10.96Кб
4. Learn More About Cryptography Public Key Infrastructure - 3.mp4 29.79Мб
4. Learn More About Cryptography Public Key Infrastructure - 3.srt 5.69Кб
4. Methods of Encryption Asymmetric Keys and Integrity.mp4 12.57Мб
4. Methods of Encryption Asymmetric Keys and Integrity.srt 1.83Кб
4. Methods of Encryption Symmetric Key Algorithms For Authentication.mp4 13.55Мб
4. Methods of Encryption Symmetric Key Algorithms For Authentication.srt 2.05Кб
4. Protecting Assets Physical.mp4 16.38Мб
4. Protecting Assets Physical.srt 3.21Кб
4. Security Models Learning Bell-LaPadula Model - 1.mp4 32.11Мб
4. Security Models Learning Bell-LaPadula Model - 1.srt 8.57Кб
4. System and Computer Architecture CPU Capabilities.mp4 14.50Мб
4. System and Computer Architecture CPU Capabilities.srt 3.02Кб
4. Understanding Attacks Ciphertext-Only Attacks.mp4 9.21Мб
4. Understanding Attacks Ciphertext-Only Attacks.srt 2.15Кб
4. Understanding Information Classification - 2.mp4 24.84Мб
4. Understanding Information Classification - 2.srt 5.90Кб
4. Understanding Message Integrity Understanding Good Hashing Algorithms.mp4 18.34Мб
4. Understanding Message Integrity Understanding Good Hashing Algorithms.srt 4.45Кб
5. Cyber Security Understanding Zones.mp4 26.57Мб
5. Cyber Security Understanding Zones.srt 8.42Кб
5. Definitions and Concepts The Strength of the Cryptosystem & Crypto Terms.mp4 31.04Мб
5. Definitions and Concepts The Strength of the Cryptosystem & Crypto Terms.srt 6.49Кб
5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.mp4 19.97Мб
5. Information Life Cycle Confidentiality, Integrity, and Availability - 1.srt 5.78Кб
5. Learning Information Classification Develop An Inventory of Data Assets.mp4 17.96Мб
5. Learning Information Classification Develop An Inventory of Data Assets.srt 4.83Кб
5. Learning Information Systems Architecture Distributed Systems.mp4 22.32Мб
5. Learning Information Systems Architecture Distributed Systems.srt 6.03Кб
5. Learning Operating Systems Operating System Architectures.mp4 39.45Мб
5. Learning Operating Systems Operating System Architectures.srt 9.14Кб
5. Learn More About Cryptography Public Key Infrastructure - 4.mp4 28.84Мб
5. Learn More About Cryptography Public Key Infrastructure - 4.srt 7.45Кб
5. Methods of Encryption Cryptographic Keys.mp4 42.11Мб
5. Methods of Encryption Cryptographic Keys.srt 8.20Кб
5. Methods of Encryption Symmetric Key Algorithms For Integrity.mp4 8.03Мб
5. Methods of Encryption Symmetric Key Algorithms For Integrity.srt 1.47Кб
5. Protecting Assets Subtypes - 1.mp4 35.21Мб
5. Protecting Assets Subtypes - 1.srt 6.61Кб
5. Section Outro.mp4 44.46Мб
5. Section Outro.srt 9.44Кб
5. Security Models Learning Bell-LaPadula Model - 2.mp4 21.63Мб
5. Security Models Learning Bell-LaPadula Model - 2.srt 5.17Кб
5. System and Computer Architecture Computer Systems.mp4 40.48Мб
5. System and Computer Architecture Computer Systems.srt 7.26Кб
5. Understanding Attacks Known-Plaintext Attacks.mp4 6.19Мб
5. Understanding Attacks Known-Plaintext Attacks.srt 1.49Кб
5. Understanding Message Integrity Symmetric Algorithms.mp4 27.07Мб
5. Understanding Message Integrity Symmetric Algorithms.srt 5.13Кб
6. Cyber Security Physical Environment.mp4 34.72Мб
6. Cyber Security Physical Environment.srt 8.41Кб
6. Definitions and Concepts Understanding Keys.mp4 23.33Мб
6. Definitions and Concepts Understanding Keys.srt 4.86Кб
6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.mp4 8.39Мб
6. Information Life Cycle Confidentiality, Integrity, and Availability - 2.srt 3.31Кб
6. Learning Information Classification Data At Rest.mp4 18.79Мб
6. Learning Information Classification Data At Rest.srt 5.17Кб
6. Learning Information Systems Architecture Private Cloud and Public Cloud.mp4 33.65Мб
6. Learning Information Systems Architecture Private Cloud and Public Cloud.srt 7.33Кб
6. Learning Operating Systems Understanding Processes & Buffers.mp4 44.73Мб
6. Learning Operating Systems Understanding Processes & Buffers.srt 9.47Кб
6. Learn More About Cryptography Pretty Good Privacy.mp4 32.68Мб
6. Learn More About Cryptography Pretty Good Privacy.srt 6.66Кб
6. Methods of Encryption Learning Secure Key Distribution.mp4 42.39Мб
6. Methods of Encryption Learning Secure Key Distribution.srt 7.98Кб
6. Methods of Encryption Symmetric Key Distribution.mp4 24.09Мб
6. Methods of Encryption Symmetric Key Distribution.srt 5.14Кб
6. Protecting Assets Subtypes - 2.mp4 25.91Мб
6. Protecting Assets Subtypes - 2.srt 5.74Кб
6. Section Outro.mp4 13.58Мб
6. Section Outro.srt 2.67Кб
6. Security Models Learning Biba Model.mp4 43.01Мб
6. Security Models Learning Biba Model.srt 11.94Кб
6. System and Computer Architecture Memory Types - 1.mp4 31.93Мб
6. System and Computer Architecture Memory Types - 1.srt 10.21Кб
6. Understanding Attacks Chosen-Plaintext Attacks.mp4 18.10Мб
6. Understanding Attacks Chosen-Plaintext Attacks.srt 3.84Кб
7. Cyber Security Classes of Fire.mp4 35.05Мб
7. Cyber Security Classes of Fire.srt 6.17Кб
7. Learning Information Classification Assign an Accurate Value to Each Asset.mp4 22.47Мб
7. Learning Information Classification Assign an Accurate Value to Each Asset.srt 5.11Кб
7. Learning Information Systems Architecture Terms to Consider.mp4 22.36Мб
7. Learning Information Systems Architecture Terms to Consider.srt 6.11Кб
7. Learning Operating Systems The Buffer Overflow Attack.mp4 17.53Мб
7. Learning Operating Systems The Buffer Overflow Attack.srt 3.60Кб
7. Learn More About Cryptography Secure Electronic Transaction.mp4 39.40Мб
7. Learn More About Cryptography Secure Electronic Transaction.srt 6.84Кб
7. Methods of Encryption Learn and Understand Digital Signature Verification.mp4 28.91Мб
7. Methods of Encryption Learn and Understand Digital Signature Verification.srt 6.57Кб
7. Methods of Encryption Understanding Symmetric Algorithms.mp4 57.85Мб
7. Methods of Encryption Understanding Symmetric Algorithms.srt 9.09Кб
7. Protecting Assets Subtypes - 3.mp4 42.24Мб
7. Protecting Assets Subtypes - 3.srt 11.04Кб
7. Section Outro.mp4 39.60Мб
7. Section Outro.srt 8.19Кб
7. Security Models Learn How to Use these Models.mp4 32.71Мб
7. Security Models Learn How to Use these Models.srt 11.12Кб
7. System and Computer Architecture Memory Types - 2.mp4 22.07Мб
7. System and Computer Architecture Memory Types - 2.srt 5.18Кб
7. Understanding Attacks Chosen-Ciphertext Attacks.mp4 12.97Мб
7. Understanding Attacks Chosen-Ciphertext Attacks.srt 2.46Кб
8. Cyber Security Understanding Fire Detectors.mp4 22.72Мб
8. Cyber Security Understanding Fire Detectors.srt 5.86Кб
8. Learning Information Classification Define Classifications.mp4 27.06Мб
8. Learning Information Classification Define Classifications.srt 6.76Кб
8. Learning Information Systems Architecture Grid Computing.mp4 11.83Мб
8. Learning Information Systems Architecture Grid Computing.srt 2.55Кб
8. Learning Operating Systems States and Management.mp4 20.38Мб
8. Learning Operating Systems States and Management.srt 5.31Кб
8. Methods of Encryption Confidentiality - 1.mp4 44.01Мб
8. Methods of Encryption Confidentiality - 1.srt 8.96Кб
8. Methods of Encryption Cryptanalysis.mp4 18.16Мб
8. Methods of Encryption Cryptanalysis.srt 3.82Кб
8. Protecting Assets Using Accepted Standards - 1.mp4 40.87Мб
8. Protecting Assets Using Accepted Standards - 1.srt 11.08Кб
8. Section Outro.mp4 37.49Мб
8. Section Outro.srt 7.58Кб
8. Security Models Learning Clark-Wilson Model - 1.mp4 34.39Мб
8. Security Models Learning Clark-Wilson Model - 1.srt 9.92Кб
8. System and Computer Architecture Memory Types - 3.mp4 47.48Мб
8. System and Computer Architecture Memory Types - 3.srt 9.30Кб
9. Cyber Security Rating, Placement, Inspection, Training.mp4 34.38Мб
9. Cyber Security Rating, Placement, Inspection, Training.srt 7.80Кб
9. Learning Information Classification Define Appropriate Protections.mp4 42.59Мб
9. Learning Information Classification Define Appropriate Protections.srt 9.20Кб
9. Learning Information Systems Architecture The Internet of Things.mp4 18.49Мб
9. Learning Information Systems Architecture The Internet of Things.srt 4.63Кб
9. Learning Operating Systems Memory Management.mp4 31.00Мб
9. Learning Operating Systems Memory Management.srt 7.57Кб
9. Methods of Encryption Confidentiality - 2.mp4 25.48Мб
9. Methods of Encryption Confidentiality - 2.srt 4.56Кб
9. Methods of Encryption Symmetric Cryptography.mp4 86.27Мб
9. Methods of Encryption Symmetric Cryptography.srt 8.65Кб
9. Protecting Assets Using Accepted Standards - 2.mp4 21.59Мб
9. Protecting Assets Using Accepted Standards - 2.srt 5.03Кб
9. Security Models Learning Clark-Wilson Model - 2.mp4 15.13Мб
9. Security Models Learning Clark-Wilson Model - 2.srt 3.42Кб
9. System and Computer Architecture Read-only Memory (ROM).mp4 18.27Мб
9. System and Computer Architecture Read-only Memory (ROM).srt 5.57Кб
Bonus Resources.txt 357б
Get Bonus Downloads Here.url 180б
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент