Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
195б |
001. GIAC Security Essentials (GSEC) Introduction.mp4 |
9.21Мб |
001. GIAC Security Essentials (GSEC) Introduction en.srt |
1.84Кб |
001. GIAC Security Essentials (GSEC) Summary.mp4 |
6.56Мб |
001. GIAC Security Essentials (GSEC) Summary en.srt |
1.59Кб |
001. Learning objectives.mp4 |
3.63Мб |
001. Learning objectives.mp4 |
3.02Мб |
001. Learning objectives.mp4 |
3.00Мб |
001. Learning objectives.mp4 |
2.75Мб |
001. Learning objectives.mp4 |
2.71Мб |
001. Learning objectives.mp4 |
2.60Мб |
001. Learning objectives.mp4 |
2.58Мб |
001. Learning objectives.mp4 |
2.56Мб |
001. Learning objectives.mp4 |
2.55Мб |
001. Learning objectives.mp4 |
2.50Мб |
001. Learning objectives.mp4 |
2.48Мб |
001. Learning objectives.mp4 |
2.41Мб |
001. Learning objectives.mp4 |
2.39Мб |
001. Learning objectives.mp4 |
2.39Мб |
001. Learning objectives.mp4 |
2.37Мб |
001. Learning objectives.mp4 |
2.29Мб |
001. Learning objectives.mp4 |
2.29Мб |
001. Learning objectives.mp4 |
2.23Мб |
001. Learning objectives.mp4 |
2.21Мб |
001. Learning objectives.mp4 |
2.16Мб |
001. Learning objectives.mp4 |
2.14Мб |
001. Learning objectives.mp4 |
2.13Мб |
001. Learning objectives.mp4 |
2.07Мб |
001. Learning objectives.mp4 |
2.06Мб |
001. Learning objectives.mp4 |
2.01Мб |
001. Learning objectives.mp4 |
1.88Мб |
001. Learning objectives.mp4 |
1.86Мб |
001. Learning objectives en.srt |
538б |
001. Learning objectives en.srt |
492б |
001. Learning objectives en.srt |
299б |
001. Learning objectives en.srt |
681б |
001. Learning objectives en.srt |
400б |
001. Learning objectives en.srt |
411б |
001. Learning objectives en.srt |
399б |
001. Learning objectives en.srt |
402б |
001. Learning objectives en.srt |
334б |
001. Learning objectives en.srt |
488б |
001. Learning objectives en.srt |
423б |
001. Learning objectives en.srt |
501б |
001. Learning objectives en.srt |
560б |
001. Learning objectives en.srt |
567б |
001. Learning objectives en.srt |
495б |
001. Learning objectives en.srt |
494б |
001. Learning objectives en.srt |
485б |
001. Learning objectives en.srt |
437б |
001. Learning objectives en.srt |
424б |
001. Learning objectives en.srt |
411б |
001. Learning objectives en.srt |
408б |
001. Learning objectives en.srt |
400б |
001. Learning objectives en.srt |
383б |
001. Learning objectives en.srt |
381б |
001. Learning objectives en.srt |
357б |
001. Learning objectives en.srt |
357б |
001. Learning objectives en.srt |
331б |
001. Module introduction.mp4 |
4.65Мб |
001. Module introduction.mp4 |
4.59Мб |
001. Module introduction.mp4 |
3.30Мб |
001. Module introduction.mp4 |
3.05Мб |
001. Module introduction.mp4 |
3.03Мб |
001. Module introduction.mp4 |
2.55Мб |
001. Module introduction en.srt |
978б |
001. Module introduction en.srt |
956б |
001. Module introduction en.srt |
665б |
001. Module introduction en.srt |
648б |
001. Module introduction en.srt |
586б |
001. Module introduction en.srt |
576б |
002. 1.1 Network Protocols and Reference Models.mp4 |
29.75Мб |
002. 1.1 Network Protocols and Reference Models en.srt |
8.17Кб |
002. 10.1 Overview of Endpoint Security.mp4 |
23.67Мб |
002. 10.1 Overview of Endpoint Security en.srt |
6.31Кб |
002. 11.1 Overview of Logging.mp4 |
30.01Мб |
002. 11.1 Overview of Logging en.srt |
12.04Кб |
002. 12.1 Overview of Vulnerability Management.mp4 |
35.79Мб |
002. 12.1 Overview of Vulnerability Management en.srt |
9.15Кб |
002. 13.1 Overview of Virtualization and VM Security.mp4 |
26.99Мб |
002. 13.1 Overview of Virtualization and VM Security en.srt |
7.99Кб |
002. 14.1 Overview of Cryptology and Cryptosystems.mp4 |
26.81Мб |
002. 14.1 Overview of Cryptology and Cryptosystems en.srt |
7.48Кб |
002. 15.1 Digital Signatures.mp4 |
14.12Мб |
002. 15.1 Digital Signatures en.srt |
6.29Кб |
002. 16.1 The Importance of Written Security Policies.mp4 |
18.22Мб |
002. 16.1 The Importance of Written Security Policies en.srt |
4.70Кб |
002. 17.1 Overview of Risk Management.mp4 |
31.81Мб |
002. 17.1 Overview of Risk Management en.srt |
8.66Кб |
002. 18.1 Fundamentals of Incident Handling.mp4 |
14.81Мб |
002. 18.1 Fundamentals of Incident Handling en.srt |
4.39Кб |
002. 19.1 Business Continuity Planning (BCP).mp4 |
25.79Мб |
002. 19.1 Business Continuity Planning (BCP) en.srt |
7.65Кб |
002. 2.1 CIA Triad and Parkerian Hexad.mp4 |
10.59Мб |
002. 2.1 CIA Triad and Parkerian Hexad en.srt |
4.11Кб |
002. 20.1 Operating Systems and Services.mp4 |
13.39Мб |
002. 20.1 Operating Systems and Services en.srt |
6.45Кб |
002. 21.1 NTFS and Shared Folder Permissions.mp4 |
14.39Мб |
002. 21.1 NTFS and Shared Folder Permissions en.srt |
7.47Кб |
002. 22.1 Security Templates and SCA Snap-in.mp4 |
15.84Мб |
002. 22.1 Security Templates and SCA Snap-in en.srt |
8.83Кб |
002. 23.1 Azure and High Availability.mp4 |
28.68Мб |
002. 23.1 Azure and High Availability en.srt |
16.09Кб |
002. 24.1 Windows PowerShell.mp4 |
37.59Мб |
002. 24.1 Windows PowerShell en.srt |
13.44Кб |
002. 25.1 Comparing Linux Operating Systems.mp4 |
26.70Мб |
002. 25.1 Comparing Linux Operating Systems en.srt |
9.83Кб |
002. 26.1 Starting Services at Boot Time.mp4 |
28.44Мб |
002. 26.1 Starting Services at Boot Time en.srt |
11.10Кб |
002. 27.1 Configuring and Monitoring Logs.mp4 |
21.33Мб |
002. 27.1 Configuring and Monitoring Logs en.srt |
8.77Кб |
002. 3.1 Access Control Concepts.mp4 |
84.39Мб |
002. 3.1 Access Control Concepts en.srt |
25.65Кб |
002. 4.1 Network Topologies and Zones.mp4 |
29.14Мб |
002. 4.1 Network Topologies and Zones en.srt |
13.03Кб |
002. 5.1 Introducing the Center for Internet Security (CIS).mp4 |
19.59Мб |
002. 5.1 Introducing the Center for Internet Security (CIS) en.srt |
4.79Кб |
002. 6.1 The Evolution of IEEE 802.11 Security.mp4 |
60.59Мб |
002. 6.1 The Evolution of IEEE 802.11 Security en.srt |
16.35Кб |
002. 7.1 Common Attack Types.mp4 |
71.03Мб |
002. 7.1 Common Attack Types en.srt |
25.34Кб |
002. 8.1 Defense in Depth Overview and Strategies.mp4 |
20.96Мб |
002. 8.1 Defense in Depth Overview and Strategies en.srt |
6.96Кб |
002. 9.1 Overview of Active Defense.mp4 |
19.01Мб |
002. 9.1 Overview of Active Defense en.srt |
7.83Кб |
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 |
53.45Мб |
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6 en.srt |
17.53Кб |
003. 10.2 Host-based Intrusion Detection.mp4 |
11.82Мб |
003. 10.2 Host-based Intrusion Detection en.srt |
2.87Кб |
003. 11.2 Logging System Setup and Configuration.mp4 |
15.60Мб |
003. 11.2 Logging System Setup and Configuration en.srt |
4.72Кб |
003. 12.2 Network Scanning.mp4 |
40.69Мб |
003. 12.2 Network Scanning en.srt |
12.75Кб |
003. 13.2 Cloud Models and Value Proposition.mp4 |
74.20Мб |
003. 13.2 Cloud Models and Value Proposition en.srt |
23.29Кб |
003. 14.2 Cryptographic Hashing.mp4 |
25.56Мб |
003. 14.2 Cryptographic Hashing en.srt |
9.40Кб |
003. 15.2 IPsec.mp4 |
44.01Мб |
003. 15.2 IPsec en.srt |
17.92Кб |
003. 16.2 Standards, Guidelines, and Procedures.mp4 |
16.62Мб |
003. 16.2 Standards, Guidelines, and Procedures en.srt |
4.32Кб |
003. 17.2 Risk Management Best Practices.mp4 |
32.03Мб |
003. 17.2 Risk Management Best Practices en.srt |
10.42Кб |
003. 18.2 Six Step Incident Response Process.mp4 |
32.01Мб |
003. 18.2 Six Step Incident Response Process en.srt |
8.60Кб |
003. 19.2 Business Impact Analysis (BIA).mp4 |
10.76Мб |
003. 19.2 Business Impact Analysis (BIA) en.srt |
3.62Кб |
003. 2.2 Categories and Types of Controls.mp4 |
25.18Мб |
003. 2.2 Categories and Types of Controls en.srt |
6.50Кб |
003. 20.2 Windows Workgroups vs. Domains.mp4 |
25.58Мб |
003. 20.2 Windows Workgroups vs. Domains en.srt |
15.29Кб |
003. 21.2 Registry Keys and REGEDIT.EXE.mp4 |
11.93Мб |
003. 21.2 Registry Keys and REGEDIT.EXE en.srt |
6.13Кб |
003. 22.2 Understanding Group Policy Objects.mp4 |
13.06Мб |
003. 22.2 Understanding Group Policy Objects en.srt |
8.20Кб |
003. 23.2 Configuring Azure VM Attributes.mp4 |
24.87Мб |
003. 23.2 Configuring Azure VM Attributes en.srt |
13.17Кб |
003. 24.2 Administrative Tools and Utilities.mp4 |
43.19Мб |
003. 24.2 Administrative Tools and Utilities en.srt |
12.89Кб |
003. 25.2 Mobile Device Security.mp4 |
11.96Мб |
003. 25.2 Mobile Device Security en.srt |
6.40Кб |
003. 26.2 Configuration Management Tools.mp4 |
16.52Мб |
003. 26.2 Configuration Management Tools en.srt |
7.98Кб |
003. 27.2 Leveraging the Auditd tool.mp4 |
13.41Мб |
003. 27.2 Leveraging the Auditd tool en.srt |
4.76Кб |
003. 3.2 Password Management.mp4 |
33.09Мб |
003. 3.2 Password Management en.srt |
10.12Кб |
003. 4.2 Overview of Network Devices and Hardening.mp4 |
59.26Мб |
003. 4.2 Overview of Network Devices and Hardening en.srt |
22.48Кб |
003. 5.2 Overview of CIS Controls.mp4 |
26.12Мб |
003. 5.2 Overview of CIS Controls en.srt |
8.98Кб |
003. 6.2 WPA3 Security.mp4 |
13.73Мб |
003. 6.2 WPA3 Security en.srt |
4.77Кб |
003. 7.2 CryptoMalware.mp4 |
32.35Мб |
003. 7.2 CryptoMalware en.srt |
12.85Кб |
003. 8.2 Core Security Strategies.mp4 |
6.34Мб |
003. 8.2 Core Security Strategies en.srt |
4.49Кб |
003. 9.2 Active Defense Techniques.mp4 |
18.47Мб |
003. 9.2 Active Defense Techniques en.srt |
4.80Кб |
004. 1.3 Layer 4 Protocols.mp4 |
54.01Мб |
004. 1.3 Layer 4 Protocols en.srt |
19.54Кб |
004. 10.3 Host-based Intrusion Prevention.mp4 |
13.95Мб |
004. 10.3 Host-based Intrusion Prevention en.srt |
3.75Кб |
004. 11.3 Logging Analysis Fundamentals.mp4 |
18.68Мб |
004. 11.3 Logging Analysis Fundamentals en.srt |
7.11Кб |
004. 12.3 Using Xenmap and Yersinia.mp4 |
33.56Мб |
004. 12.3 Using Xenmap and Yersinia en.srt |
19.64Кб |
004. 13.3 Common Attacks Against Cloud Services.mp4 |
32.78Мб |
004. 13.3 Common Attacks Against Cloud Services en.srt |
9.73Кб |
004. 14.3 Symmetric Key Cryptography.mp4 |
17.96Мб |
004. 14.3 Symmetric Key Cryptography en.srt |
4.65Кб |
004. 15.3 SSLTLS.mp4 |
15.19Мб |
004. 15.3 SSLTLS en.srt |
3.89Кб |
004. 16.3 Acceptable Use Policies.mp4 |
8.83Мб |
004. 16.3 Acceptable Use Policies en.srt |
1.91Кб |
004. 17.3 Threat Assessment, Analysis, and Reporting.mp4 |
52.50Мб |
004. 17.3 Threat Assessment, Analysis, and Reporting en.srt |
17.73Кб |
004. 18.3 Conducting a Forensic Investigation.mp4 |
37.57Мб |
004. 18.3 Conducting a Forensic Investigation en.srt |
18.28Кб |
004. 19.3 Backups and Restoration.mp4 |
20.70Мб |
004. 19.3 Backups and Restoration en.srt |
4.29Кб |
004. 2.3 Understanding the Enterprise Architecture.mp4 |
5.83Мб |
004. 2.3 Understanding the Enterprise Architecture en.srt |
2.49Кб |
004. 20.3 Windows-as-a-Service.mp4 |
20.02Мб |
004. 20.3 Windows-as-a-Service en.srt |
6.55Кб |
004. 21.3 Windows Privileges.mp4 |
17.35Мб |
004. 21.3 Windows Privileges en.srt |
6.03Кб |
004. 22.3 Administrative Users, AppLocker, and User Account Control.mp4 |
13.75Мб |
004. 22.3 Administrative Users, AppLocker, and User Account Control en.srt |
6.98Кб |
004. 23.3 Microsoft Azure Active Directory (MAAD).mp4 |
34.02Мб |
004. 23.3 Microsoft Azure Active Directory (MAAD) en.srt |
19.87Кб |
004. 24.3 Windows Auditing and Forensics.mp4 |
23.88Мб |
004. 24.3 Windows Auditing and Forensics en.srt |
11.32Кб |
004. 25.3 Linux Shells and Kernels.mp4 |
17.66Мб |
004. 25.3 Linux Shells and Kernels en.srt |
9.12Кб |
004. 26.3 Linux Kernel Security.mp4 |
25.93Мб |
004. 26.3 Linux Kernel Security en.srt |
9.45Кб |
004. 27.3 Linux Security Utilities.mp4 |
18.23Мб |
004. 27.3 Linux Security Utilities en.srt |
8.70Кб |
004. 3.3 Introduction to Password Cracking.mp4 |
37.66Мб |
004. 3.3 Introduction to Password Cracking en.srt |
13.89Кб |
004. 4.3 Survey of Security Devices and Wireshark.mp4 |
58.09Мб |
004. 4.3 Survey of Security Devices and Wireshark en.srt |
21.55Кб |
004. 5.3 Samples and Case Studies.mp4 |
25.72Мб |
004. 5.3 Samples and Case Studies en.srt |
7.92Кб |
004. 6.3 PAN, NFC, and 5G Concepts.mp4 |
15.19Мб |
004. 6.3 PAN, NFC, and 5G Concepts en.srt |
5.58Кб |
004. 7.3 Defensive Strategies.mp4 |
24.70Мб |
004. 7.3 Defensive Strategies en.srt |
13.63Кб |
004. 8.3 Defensible Network Architectures.mp4 |
14.61Мб |
004. 8.3 Defensible Network Architectures en.srt |
4.16Кб |
004. 9.3 Active Defense Tools.mp4 |
34.70Мб |
004. 9.3 Active Defense Tools en.srt |
12.57Кб |
005. 1.4 Setting up a Lab Environment.mp4 |
36.81Мб |
005. 1.4 Setting up a Lab Environment en.srt |
15.93Кб |
005. 10.4 Next-generation Endpoint Security Solutions.mp4 |
15.57Мб |
005. 10.4 Next-generation Endpoint Security Solutions en.srt |
4.06Кб |
005. 11.4 Core SIEM Activities.mp4 |
20.98Мб |
005. 11.4 Core SIEM Activities en.srt |
7.34Кб |
005. 12.4 Penetration Testing.mp4 |
54.97Мб |
005. 12.4 Penetration Testing en.srt |
20.69Кб |
005. 13.4 Introduction to Microsoft Azure IAM.mp4 |
42.38Мб |
005. 13.4 Introduction to Microsoft Azure IAM en.srt |
16.99Кб |
005. 14.4 Asymmetric Key Cryptography.mp4 |
11.12Мб |
005. 14.4 Asymmetric Key Cryptography en.srt |
3.81Кб |
005. 15.4 Public Key Infrastructure.mp4 |
44.22Мб |
005. 15.4 Public Key Infrastructure en.srt |
16.47Кб |
005. 16.4 Survey of Sample Policies.mp4 |
40.88Мб |
005. 16.4 Survey of Sample Policies en.srt |
13.39Кб |
005. 19.4 Disaster Recovery Planning (DRP).mp4 |
39.48Мб |
005. 19.4 Disaster Recovery Planning (DRP) en.srt |
11.02Кб |
005. 2.4 Introduction to Threat Enumeration.mp4 |
11.00Мб |
005. 2.4 Introduction to Threat Enumeration en.srt |
4.22Кб |
005. 21.4 Overview of BitLocker Drive Encryption.mp4 |
17.75Мб |
005. 21.4 Overview of BitLocker Drive Encryption en.srt |
8.56Кб |
005. 25.4 Linux Permissions.mp4 |
26.06Мб |
005. 25.4 Linux Permissions en.srt |
13.97Кб |
005. 26.4 Linux System Enhancers.mp4 |
21.02Мб |
005. 26.4 Linux System Enhancers en.srt |
7.11Кб |
005. 4.4 Configuring Firewalls at Amazon Web Services.mp4 |
32.16Мб |
005. 4.4 Configuring Firewalls at Amazon Web Services en.srt |
19.32Кб |
005. 6.4 The Internet of Things (IoT).mp4 |
19.57Мб |
005. 6.4 The Internet of Things (IoT) en.srt |
7.53Кб |
006. 1.5 Using tcpdump and Wireshark.mp4 |
25.82Мб |
006. 1.5 Using tcpdump and Wireshark en.srt |
10.43Кб |
006. 25.5 Linux User Accounts.mp4 |
24.12Мб |
006. 25.5 Linux User Accounts en.srt |
11.02Кб |
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 |
29.16Мб |
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall en.srt |
17.47Кб |
007. 4.6 Examining a Classic IPS Sensor Device.mp4 |
24.04Мб |
007. 4.6 Examining a Classic IPS Sensor Device en.srt |
10.26Кб |
1 |
397.81Кб |
10 |
794.23Кб |
100 |
678.50Кб |
101 |
177.82Кб |
102 |
355.74Кб |
103 |
421.33Кб |
104 |
375.74Кб |
105 |
719.29Кб |
106 |
970.76Кб |
107 |
989.06Кб |
108 |
1007.71Кб |
109 |
2.63Кб |
11 |
1016.75Кб |
110 |
251.67Кб |
111 |
299.32Кб |
112 |
408.39Кб |
113 |
431.24Кб |
114 |
447.04Кб |
115 |
461.99Кб |
116 |
464.59Кб |
117 |
514.32Кб |
118 |
529.69Кб |
119 |
604.60Кб |
12 |
834.40Кб |
120 |
625.45Кб |
121 |
628.50Кб |
122 |
640.08Кб |
123 |
725.47Кб |
124 |
731.27Кб |
125 |
790.16Кб |
126 |
809.83Кб |
127 |
864.61Кб |
128 |
883.37Кб |
129 |
890.27Кб |
13 |
639.66Кб |
130 |
947.86Кб |
131 |
965.16Кб |
132 |
1015.21Кб |
133 |
126.15Кб |
14 |
122.05Кб |
15 |
313.19Кб |
16 |
535.88Кб |
17 |
347.78Кб |
18 |
417.78Кб |
19 |
440.34Кб |
2 |
988.72Кб |
20 |
197.80Кб |
21 |
210.86Кб |
22 |
303.88Кб |
23 |
1000.81Кб |
24 |
454.79Кб |
25 |
933.99Кб |
26 |
223.93Кб |
27 |
668.52Кб |
28 |
861.46Кб |
29 |
992.17Кб |
3 |
423.25Кб |
30 |
1011.17Кб |
31 |
192.84Кб |
32 |
1017.71Кб |
33 |
257.42Кб |
34 |
864.16Кб |
35 |
882.52Кб |
36 |
322.95Кб |
37 |
571.64Кб |
38 |
10.86Кб |
39 |
192.24Кб |
4 |
762.86Кб |
40 |
303.36Кб |
41 |
896.62Кб |
42 |
966.71Кб |
43 |
68.63Кб |
44 |
188.37Кб |
45 |
219.53Кб |
46 |
283.16Кб |
47 |
428.16Кб |
48 |
453.84Кб |
49 |
839.84Кб |
5 |
935.24Кб |
50 |
128.27Кб |
51 |
307.85Кб |
52 |
898.45Кб |
53 |
987.92Кб |
54 |
121.50Кб |
55 |
333.44Кб |
56 |
684.31Кб |
57 |
1003.22Кб |
58 |
18.68Кб |
59 |
38.30Кб |
6 |
25.74Кб |
60 |
304.48Кб |
61 |
1005.18Кб |
62 |
419.24Кб |
63 |
440.63Кб |
64 |
1010.23Кб |
65 |
329.35Кб |
66 |
539.01Кб |
67 |
783.45Кб |
68 |
796.62Кб |
69 |
37.31Кб |
7 |
1011.62Кб |
70 |
254.12Кб |
71 |
344.08Кб |
72 |
666.46Кб |
73 |
394.07Кб |
74 |
492.82Кб |
75 |
159.37Кб |
76 |
404.52Кб |
77 |
437.98Кб |
78 |
824.77Кб |
79 |
828.27Кб |
8 |
561.93Кб |
80 |
194.28Кб |
81 |
400.76Кб |
82 |
625.45Кб |
83 |
902.93Кб |
84 |
49.22Кб |
85 |
257.36Кб |
86 |
273.30Кб |
87 |
607.59Кб |
88 |
621.03Кб |
89 |
958.01Кб |
9 |
513.33Кб |
90 |
38.20Кб |
91 |
68.13Кб |
92 |
187.80Кб |
93 |
896.99Кб |
94 |
3.02Кб |
95 |
241.30Кб |
96 |
415.34Кб |
97 |
812.79Кб |
98 |
170.83Кб |
99 |
455.61Кб |
TutsNode.net.txt |
63б |